Monday, 4 July 2011

Free Symbian Software for mobile


Symbian is a mobile operating system (OS) and computing platform designed forsmartphones and currently maintained by Nokia. The Symbian platform is the successor to Symbian OS and Nokia Series 60; unlike Symbian OS, which needed an additional user interface system, Symbian includes a user interface component based on S60 5th Edition. The latest version, Symbian^3, was officially released in Q4 2010, first used in the Nokia N8.
Symbian OS was originally developed by Symbian Ltd.[4] It is a descendant of Psion's EPOC and runs exclusively on ARM processors, although an unreleased x86 port existed.
Devices based on Symbian accounted for 29.2% of worldwide smartphone market share in 2011 Q1.[5] Some estimates indicate that the cumulative number of mobile devices shipped with the Symbian OS up to the end of Q2 2010 is 385 million.[6]
By April 5, 2011, Nokia released Symbian under a new license and converted to a proprietary shared-source model as opposed to an open source project.[2]
On February 11th, 2011, Nokia announced that it would migrate away from Symbian toWindows Phone 7.[7]In spite of this, Nokia stated that Symbian will continue to be maintained for some years.

Sunday, 3 July 2011

Gadgets and Gizmos


With all of the new designs to cell phones and laptops, it’s hard to stay up to date with all of the latest technology. Just when you think you’re FINALLY caught up, there seems to be at least a hundred new products that hit the market. Whether its iPods, fancy cell phones, GPS systems for your car or even something as common as an up to date television, there seems to be no end to modern advances in gadgets and gizmos.
If you own a small business and rely on the internet for most of your tasks, having access to the latest advances in technology—and knowing how to use them—is very important.  With the way cell phones are designed now, you can set up calendars, reminders, fully functioning address books and even notepads all in one device.  Such amazing gadgets are making it much easier for people to do business on the go.  Some small businesses are able to travel and actually conduct the majority of their business by simply using their phones now.

Speed Up Your Slow Computer with Auslogics BoostSpeed


Your one-stop PC maintenance and optimization tool.
The program will clean up, speed up and repair your system
to make it running as fast and stable as new.
  • Cleans up the Windows registry
  • Defragments hard drives
  • Frees up disk space
  • Recovers accidentally deleted files
  • Speeds up Internet connection
  • No matter which modification of Windows 7 you run, it will get cluttered and start slowing down over time. Fortunately, there are safe ways to speed up Windows 7 without having to download any software. We are going to cover these ways.

    There are many ways to improve computer performance, from hardware upgrades to editing the registry. However, upgrading hardware can be pretty expensive. In this article we're going to show you how it's possible to speed up PC in five simple steps.


Free Virus Scan, Free Virus Protection


Millions of people around the world use AVG Anti-Virus Free for their basic online activities. Whether it's surfing the Internet, conducting web searches, or simply keeping up with friends on Facebook, AVG Anti-Virus Free has got you covered.
AVG Anti-Virus Free Edition 2011 allows you to:
  • Surf and search with confidence AVG LinkScanner's® real-time protection
  • Stay protected on social networks with AVG Social Networking Protection
  • Enjoy a faster running PC AVG Smart Scanning works while you're away and runs in low-priority mode when you return
  • Stay up-to-date with the latest threat information from the AVG Community Protection Network and AVG Protective Cloud Technology
  •  1991 with the express purpose of protecting people around the world using the latest in cutting edge security technologies. AVG gained success quickly and is now recognized as one of the biggest players in the security software market. AVG currently holds corporate offices in Europe, the US and the UK.
    AVG is uniquely positioned to spearhead innovation in the industry thanks to its employing some of the world’s leading experts in software development, threat detection, threat prevention and risk analysis. Not content to rest on its internationally recognized success, AVG continues to invest in R&D, teaming with leading universities to maintain its technological edge.


    AVG has experienced significant growth in the last few years and continues to expand to address the needs of the global market through improved technology and broader language and platform support.

About Microsoft Security Essentials


About Microsoft Security Essentials

Microsoft Security Essentials provides real-time protection for your home or small business PC that guards against viruses, spyware, and other malicious software.
Microsoft Security Essentials is a free* download from Microsoft that is simple to install, easy to use, and is automatically updated to protect your PC with the latest technology.

Microsoft Security Essentials runs quietly and efficiently in the background so that you are free to use your Windows-based PC the way you want—without interruptions or long computer wait times.

Before installing Microsoft Security Essentials, we recommend that you uninstall other antivirus software already running on your PC. Running more than one antivirus program at the same time can potentially cause conflicts that affect PC performance.

Read the Microsoft Security Essentials Privacy Statement and License Agreement.

Need security for your business?
Microsoft Security Essentials is available for small businesses with up to 10 PCs. If your business has more than 10 PCs, you can protect your computers with Microsoft Forefront Endpoint Protection.

Microsoft Offers Free Software in Exchange for Your Privacy


Want a free copy of Windows Vista Ultimate direct from Microsoft, no piracy required? Don't care about your privacy? Have I got a deal for you! Microsoft is offering up free copies of Vista Ultimate, Office Ultimate, Money Plus Premium, Student with Encarta Premium and Streets and Trips, all for free. All you've gotta do is allow them to track your every move for a few months.
Yes, Microsoft is looking for people to help test its new "Windows Feedback Program," and isn't afraid to reel people in with bribes. You'll have all of your computer usage tracked for three months, and you'll also need to submit to surveys every two weeks. As long as you don't mind Papa Gates and his menagerie knowing just how often you look at your ex-girlfriends Facebook profile, it's actually a pretty serious amount of free software for almost no work at all on your part. Not that I'll be taking part, mind you. I respect myself and my privacy. But hey, don't let me stop you. I won't tell; your computer will do that for me.

Top Ten Hacking Techniques (2011)


1.  top tenWeb Hackingtechniques 2010 Jeremiah Grossman Founder & Chief Technology Officer Webcast 03.17.2011 © 2011 WhiteHat Security, Inc.
   2. Jeremiah Grossman• WhiteHat Security Founder & CTO• Technology R&D and industry evangelist• InfoWorlds CTO Top 25 for 2007• Co-founder of the Web Application Security Consortium• Co-author: Cross-Site Scripting Attacks• Former Yahoo! information security officer © 2010 WhiteHat Security, Inc. | Page 2
  4. 400+ enterprise customers •Start-ups to Fortune 500Flagship offering “WhiteHat Sentinel Service” •1000’s of assessments performed annuallyRecognized leader in website security •Quoted thousands of times by the mainstream press 4
 5. About the Top Ten“Every year the Web security community produces a stunningamount of new hacking techniques published in various whitepapers, blog posts, magazine articles, mailing list emails, etc. Withinthe thousands of pages are the latest ways to attack websites, Webbrowsers, Web proxies, and so on. Beyond individual vulnerabilityinstances with CVE numbers or system compromises, were talkingabout brand new and creative methods of Web-based attack.” 5
  6.New Techniques 2009 (80) Creating a rogue CA certificate 2008 (70) GIFAR (GIF + JAR) 2007 (83) XSS Vulnerabilities in Common Shockwave Flash Files 2006 (65) Web Browser Intranet Hacking / Port Scanning 6
    2010 69 new techniques1) Padding Oracle Crypto Attack2) Evercookie3) Hacking Auto-Complete4) Attacking HTTPS with Cache Injection5) Bypassing CSRF protections with ClickJacking and HTTP Parameter Pollution6) Universal XSS in IE87) HTTP POST DoS8) JavaSnoop9) CSS History Hack In Firefox Without JavaScript for Intranet Portscanning10) Java Applet DNS Rebinding http://jeremiahgrossman.blogspot.com/2011/01/top-ten-web-hacking-techniques-of-2010.html 7
 7. Bypassing CSRF with Clickjackingand HTTP Parameter Pollution 5Clickjacking is when an attacker invisibly hovers an object(button, link, etc.) below a users mouse. When the userclicks on something they visually see, theyre insteadreally clicking on something the attacker wanted them to.HTTP Parameter Pollution is where an attacker submitsmultiple input parameters (query string, post data,cookies, etc.) with the same name. Upon receiptapplications may react in unexpected ways and open upavenues of server-side and client-side exploitation. Bycleverly leveraging these two former Top Ten attacks,CSRF attacks can be carried out against a user evenwhen recommended token defenses are in use. Lavakumar Kuppan (@lavakumark) http://blog.andlabs.org/2010/03/bypassing-csrf-protections-with.html 8
 8. Clickjacking (Top Ten 2009)Think of any button – image, link, form, etc. – on any website – that can appearbetween the Web browser walls. This includes wire transfer on banks, DSL routerbuttons, Digg buttons, CPC advertising banners, Netflix queue.Next consider that an attacker can invisibly hover these buttons below the usersmouse, so that when a user clicks on something they visually see, theyre actuallyclicking on something the attacker wants them to.What could the bad guy do with that ability? 9
 9. Hover Invisible IFRAMEs HTML, CSS, and JavaScript may size, follow the mouse and make transparent third- party IFRAME content.<iframe src="http://victim/page.html" scrolling="no" frameborder="0" style="opacity:.1;filter: alpha(opacity=.1); -moz-opacity 1.0;">!</iframe> 10
 10. HTTP Parameter Pollution (HPP) - Top Ten 2009If an attacker submit multiple input parameters (query string, post data, cookies,etc.) of the same name, the application may react in unexpected ways and openup new avenues of server-side and client-side exploitation. GET /foo?par1=val1&par1=val2 HTTP/1.1 User-Agent: Mozilla/5.0 Host: Host Accept: */* POST /foo HTTP/1.1 User-Agent: Mozilla/5.0 Host: Host Accept: */* par1=val1&par1=val2 POST /index.aspx?par1=val1&par1=val2 HTTP/1.1 User-Agent: Mozilla/5.0 Host: Host Cookie: par1=val3; par1=val4 Content-Length: 19 par1=val5&par1=val6 11