Archive for May, 2010

File-sharing technology is a popular way for users to exchange, or “share,”
files. However, using this technology makes you susceptible to risks such as
infection, attack, or exposure of personal information.

What is file sharing?

File sharing involves using technology that allows internet users to share
files that are housed on their individual computers. Peer-to-peer (P2P)
applications, such as those used to share music files, are some of the most
common forms of file-sharing technology. However, P2P applications introduce
security risks that may put your information or your computer in jeopardy.

What risks does file-sharing technology introduce?

* Installation of malicious code – When you use P2P applications, it is
difficult, if not impossible, to verify that the source of the files is
trustworthy. These applications are often used by attackers to transmit
malicious code. Attackers may incorporate spyware, viruses, Trojan
horses, or worms into the files. When you download the files, your
computer becomes infected (see Recognizing and Avoiding Spyware and
Recovering from Viruses, Worms, and Trojan Horses for more information).
* Exposure  of  sensitive  or  personal  information  – By using P2P
applications,  you  may  be  giving other users access to personal
information. Whether it’s because certain directories are accessible or
because you provide personal information to what you believe to be a
trusted person or organization, unauthorized people may be able to
access your financial or medical data, personal documents, sensitive
corporate information, or other personal information. Once information
has been exposed to unauthorized people, it’s difficult to know how many
people  have accessed it. The availability of this information may
increase your risk of identity theft (see Protecting Your Privacy and
Avoiding Social Engineering and Phishing Attacks for more information).
* Susceptibility to attack – Some P2P applications may ask you to open
certain ports on your firewall to transmit the files. However, opening
some of these ports may give attackers access to your computer or enable
them to attack your computer by taking advantage of any vulnerabilities
that may exist in the P2P application. There are some P2P applications
that  can  modify and penetrate firewalls themselves, without your
knowledge.
* Denial of service – Downloading files causes a significant amount of
traffic over the network. This activity may reduce the availability of
certain  programs on your computer or may limit your access to the
internet  (see  Understanding  Denial-of-Service  Attacks for more
information).
* Prosecution – Files shared through P2P applications may include pirated
software, copyrighted material, or pornography. If you download these,
even unknowingly, you may be faced with fines or other legal action. If
your computer is on a company network and exposes customer information,
both you and your company may be liable.

How can you minimize these risks?

The best way to eliminate these risks is to avoid using P2P applications.
However, if you choose to use this technology, you can follow some good
security practices to minimize your risk:
* use and maintain anti-virus software – Anti-virus software recognizes
and  protects  your  computer against most known viruses. However,
attackers are continually writing new viruses, so it is important to
keep your anti-virus software current (see Understanding Anti-Virus
Software for more information).
* install or enable a firewall – Firewalls may be able to prevent some
types of infection by blocking malicious traffic before it can enter
your computer (see Understanding Firewalls for more information). Some
operating systems actually include a firewall, but you need to make sure
it is enabled.
_________________________________________________________________

Authors: Mindi McDowell, Brent Wrisley, Will Dormann

Cisco has released updates to address multiple vulnerabilities in
Cisco PGW Softswitch. These vulnerabilities may allow an attacker to
cause a denial-of-service condition.

US-CERT encourages users and administrators to review Cisco security
advisory cisco-sa-20100512-pgw and apply any necessary updates to help
mitigate the risks.

Relevant Url(s):
<http://www.cisco.com/en/US/products/products_security_advisory09186a0080b2c519.shtml>

If you are in need of computer repair in Philadelphia area there are a few things you must look for when you seek out a computer repair service.
There are many companies to choose from nowadays. Few questions that you should ask yourself are: do they actually remove the viruses from your computer or do they simply format your hard drive and you loose all your data.
Another question to ask is whether they do data recovery in case your hard drive goes bad.
One of the biggest questions is the price of the repair, do they charge hourly or give you a set price for a repair?
Another important question is hours of operation. Does the company offer 24/7 support or will they only service you at their own convenience?

Philly IT Solutions offers computer services at some of the lowest prices on the market. They will remove the viruses on your computer without erasing all data. If the hard drive goes bad, Philly IT Solutions will recover your old data so you don’t have to loose that 20 page report or pictures from your honeymoon.
Philly IT Solutions offers 27/7 support and will service your computer at YOUR convenience.

One of the greatest services that people enjoy from Philly IT Solutions is that they will pick up your computer to be serviced for free and will drop it off after repairs are done. They understand that you have a busy schedule and will work around it to bring best service possible. You can contact them here: http://www.phillyitsolutions.com/contact-us.php

So good luck getting your computer repair problems fixed, and please leave comments about what Philadelphia repair company you went with, along with your honest feedback! Thank you much.

Starting this week google users will see significant changes in google’s design.

New colorful design does not come as a surprise. Google has been testing it for years.

With its new look, Google is emphasizing the menu of search options that had previously been hidden on the left-side rail of the search results pages.

Even Google’s logo is getting in on the act, with a subtle overhaul that brightens the colors and drops the shadowing cast by the letters.

Google is also changing the way search tools and search refinements appear on the left hand side of its search results page. A search for “rolling stones” will trigger a list of results under the header “something different,” which in this case would bring up other classic rock bands such as Aerosmith and Led Zeppelin.

The changes will appear on a rolling basis to most users over the course of Wednesday, Wiley said, but could take longer for some users of Google search in languages other than English.