Thursday, 29 November 2012

Best Windows 8 convertible laptops


With the arrival of Windows 8, various convertible devices have shown up on the market. While they come in various shapes and sizes, they all fundamentally pair the touchscreen operation of a tablet with the physical keyboard of a laptop. Due to Windows 8's touch-optimised interface, convertibles allow for a good mix of casual swiping and getting on with some real work when needs be. Let me give you some pointers on what to look out for if you'd like to get hold of one.
If you're yet to lay eyes on Windows 8 then take a look at our review. In short, it's a drastic change from the Windows you've become so familiar with over the years. The classic desktop and Start menu are gone, replaced instead with big, colourful live tiles. Those tiles and the reliance on gestures as a method of navigation show that Windows 8 has been built with touch interaction at its heart -- using a traditional keyboard and trackpad combination isn't the best way to get around.
The first choice you'll have to make is whether to go with full fat Windows 8 or opt for the lighter RT version. Windows RT runs on the low-powered mobile processors that you'd find in phones and you can't install any normal desktop software alongside it. You'll only be able to get apps from the app store, which at the moment isn't particularly well stocked.
Full fat Windows 8 is the version you'd expect to find on any regular desktop computer -- you can install and run programs such as Adobe Photoshop onto it as well as download apps from the store. Full Windows 8 machines run on the same chips you'd find in normal laptops so you'll get a much bigger serving of power -- at a higher price, of course.
Except for the Microsoft Surface, all models listed below are full Windows 8 machines. The Surface will be available in a Pro version early next year. Lenovo's Yoga will soon be available in an 11-inch RT version.
In terms of design, each manufacturer has its own take on what they think is the best way to turn the devices from tablet to laptop. Dell's XPS 12 employs a screen that flips over inside its frame, Lenovo's Yoga bends completely back on itself and both the Sony Vaio Duo 11 and Toshiba Satellite U920T use a slide-then-lift method.
Microsoft's Surface meanwhile is much more tablet than it is laptop, but you can buy it with a laptop-style keyboard that attaches to the device. Samsung, Dell and Asus all offer similar keyboard docking tablets but are yet to put any physical products in my hands so I can't recommend these just yet.
Take a look through the five devices listed below and see which style would suit you best. Be sure to check out our full reviews of regular laptops too -- you can still get a better performing laptop for less money if you don't want a convertible touchscreen.

Wednesday, 28 November 2012

Home PC Firewall Guide


The Internet is a hostile network like the wild west without a sheriff! A personal computer connected to the Internet without a firewall can be hijacked and added to an Internet outlaw's botnet in just a few minutes. A personal firewall can block malware that could otherwise scan your computer for vulnerabilities and then try to break in at a weak point.
The only way to make a home computer 100% secure is to turn it off or disconnect it from the Internet. The real issue is how to make one 99.9% secure when it is connected. At a minimum, home computers need to have personal firewall and anti-malware software installed and kept up-to-date to find and remove viruses, spyware, Trojans and other malware. A home network that uses a wired or wireless router with firewall features provides additional protection.

Home PC Firewall Choices

Choices -- Your choices include using the firewall built into Windows, using a third party product, choosing an Internet security suite that includes a firewall, and/or using a hardware firewall router or gateway.
Microsoft Windows Firewall -- The Windows 7, Vista and XP Service Pack 2/3 operating systems have firewalls built in that are turned on by default to block threats from the Internet. You should leave this feature turned on until you replace it with third-party software and/or hardware.
Two-Way Third-Party Personal Firewall Software -- These firewalls block both incoming and outgoing threats. A computer may have outgoing threats when it becomes infected with a virus, Trojan horse or spyware. A challenge for this type of firewall is to distinguish between threats and legitimate software. Three common ways to address this are by vendors including a list of safe software for the firewall to check [white list], malware to block [black list] and/or by issuing a pop up alert to the user asking for advice on what to do [better for experts]. For links to vendors and reviews of over thirty products, see our Personal Firewall Reviews page.

Recommended personal firewalls with links to vendors:

  • Online Armor
  • Checkpoint ZoneAlarm Firewall
  • PC Tools Firewall Plus
  • Private Firewall
  • Comodo Firewall Pro
  • Agnitum Outpost Firewall Pro
Internet Security Software Suites -- These products include two or more security features such as a personal firewall, anti-virus, anti-spyware and more. For links to vendors and reviews of over thirty products, see our Internet Security Suites page.

Recommended Internet security (IS) suites with links to vendors:

  • Norton Internet Security 2011http://www.awltovhc.com/mq82r6Az42OQSRPTSVOQPXVTQPT or Norton 360 V 5.0
  • Kaspersky IS 2011
  • BitDefender IS 2011
  • Webroot IS Complete

Hardware Firewalls -- A hardware firewall is usually a small box that sits between a modem and a computer or network. The firewall is either based on "network address translation" (NAT) which hides your computer from the Internet or NAT plus "stateful packet inspection" (SPI) for more protection. There are three basic types of hardware devices that include firewalls for home users, Wired Routers, Wireless Routers, and Broadband Gateways. They are inexpensive enough to be used with one computer and can also be used to create a home computer network. They can be used in addition to a software firewall on each computer because they run on a separate box preventing most compatibility problems.

Recommended hardware firewall products with links to vendors:

  • D-Link 655 Xtreme N Wireless Router with QoS and Gigabit Ports -- "Support for WEP, WPA™, and WPA2™ security standards ensure that you will be able to use the best possible encryption regardless of your other wireless devices. To prevent possible attacks from the Internet, the DIR-655 uses dual active firewalls (SPI & NAT) to help protect your valuable data." Editor's Choice -- PC Magazine, Computer Shopper, LAPTOP Magazine, Maximum PC, Practically Networked...
  • ZoneAlarm Secure Wireless Router with a SPI firewall and WPA2 security also includes gateway antivirus, remote access VPN, intrusion detection and prevention, secure wireless communications, fast wireless performance, extended range, built-in USB 2.0 wireless print server, setup wizard, web-based management, monthly security report, flexible optional services, automatic updates, online technical support.
Important Tips -- Never use two personal firewall software products at the same time. Fully uninstall one before installing another to prevent compatibility problems. Also, turn off the firewall built into Windows 7, Vista and XP Service Pack 2/3. After installation, be sure to test it with an online service like Security Space to make sure that it is configured correctly.

Monday, 26 November 2012

Pew study: Parents of teens online worry about ads, strangers




Parents are more worried about advertisers having access to their children's online data than about their children talking to strangers online, according to a report published today.
The Pew Internet Project and the Berkman Center for Internet & Society at Harvard University collaborated on the report, which is based on a survey if 802 parents of children aged 12 to 17 with questions about social-networking sites, namely Facebook. As more and more teens and pre-teens use social media as a part of their every day communications , the study finds that parents worried about a variety of online dangers -- it's no longer just about warning your kids not to talk to strangers.
The survey found that 81 percent of parents said they are concerned about how much information advertisers can learn about their teen's online behavior. When it came to their teens interacting with strangers online, 72 percent said they were concerned.
Parents were even less were worried about their children's reputation online, but not by much, according to the study. The survey asked if parents were concerned that something their teens posted online could ruin the teens' reputations, and if their behaviors online could end up affecting their academic or employment opportunities. Sixty-nine parents said yes to both scenarios.
Apparently, a teen's image has been a very real concern for a majority of the parents interviewed. Fifty-nine percent of parents whose teens use social-networking sites have talked to their teen because of something they've posted on their account.
Some of the parents took direct other action in an attempt to prevent online dangers -- reading privacy policies (44 percent), helping their child set up privacy settings on a social network (31 percent), and doing Internet searches to see what information is publicly available on their child (42 percent). Fifty percent of parents who have teens online, and not just those on social media, said they have used parental controls or other ways to block, filter, or monitor their child's online activities.
Overall, the report found that parents are increasingly joining social-networking sites to monitor their children's behavior. The percentage is up from 2011, according to the report, from 58 percent to 66 percent. Half of this growing group of social-media savvy parents join to comment or respond to posts to make sure their kids know they are watching.
"While parents may forge connections with their teens on social media in order to passively observe them, many are also actively engaging with their children and making their presence known," the report said

How to Secure a Wireless Network


Wireless net (WI-FI) prevails an ascending technology in a cyber globe. It abolishes the bounds of wired technology peculiarly conducted in internet connection. It conducts radio frequency and utilized to wireless information exchange over a PC set-up. “Wi-Fi” continues a characteristic of the Wi-Fi association. It attains with WEP, WPA, and WPA2 encryption. For connection with Wi-Fi, wireless local area network is exercise to bond contrary apparatus for switch of information, which is marketed under Wi-Fi.
Wi-Fi attracts ample boons at our doorstep composing trouble-free breakneck and cost effectiveness solution network configuration and reconfiguration. Every goodness carries badness with it. Here all communication dealt through radio frequency, interception hazard is emerging. If the information affected encrypted the assailant could debase the information. The wireless networking security core accommodates secrecy, coherence, availability.
The principal reward of wireless network embodies ease, mobility, productivity, deployment, expandability, and expense. The dislikes of wireless network involve Security, extent of acreage, dependability and speed. The wireless network adjures four elements exchange of details via radio frequency, access points and users. Every technology expects security or assailants may annoy the data that proceed in it. There are absolute benchmark determine the shelter of wireless network security.

Encryption

The chief discipline to assign impunity to wireless network is to encrypt the details exchange on wireless network there exists two categories of encryption WEP (wired equivalent privacy) and WPA (Wi-Fi protected access) WEP was first encryption approach but due to defective encryption an exigency of  fresh encryption arise and WPA was come into exist. In order to conduct WPA all the communication apparatuses must be configured through WPA. Once you encrypt your router, you have to array your wireless network apparatuses with adequate data to approach the network. Alike encryption will maintain hackers and snoopers out of your wireless network. Ceaselessly conduct a longer key capacity for encryption to deliver stronger security. Hence turn on your encryption element in wireless router.

Spyware/firewall usage

Anti spyware, made in on computer will attribute protection cover to your network across malware, alien assailants and hazards. It alarms opposite numerous malicious sites or URL appearing caution popup. One should always arouse his system firewall to defend from jeopardy and exposure it is a safety shield that allocated by OS in your PC.

Non- broadcast WLAN

Ample wireless access points providers non- promoting their SSID (service set identifier) who is central saying endures to control your identity from outsider attackers by function this SSID will be depicting in the list of attainable wireless network. Hence disable your identifier broadcasting system if your wireless router affirms you.

Default ID & Password

When you amass wireless router from manufacturer it will access with default ID. Hackers have cognizance of default id hence alter your id and password you can recall or rewrite down it on a separate note hence that in case you elapse you will obtain easily. Even your router is not broadcasting its id; it has a big hazard to be applied by malicious cyberpunk. The stronger you maintain your password the safer your system will be.

MAC (Media Access Control)

Each wireless router has media access control, which apportions odd chosen apparatuses that contrasts with MAC address to the network. Hackers may copy MAC and can defraud your data via wireless network hence coherently display your identity to definite computers that you absolutely perceive otherwise you will be a dupe of fraud access control.

Turn-off Wi-Fi in idol time 

Wi-Fi endures based on radio frequency and assailants may debase its signal for their malicious action therefore when you are not conduct your Wi-Fi it should be turn off hence outsider may not debase it. The more it is exemplary the more in a jeopardy zone of threats and vulnerability.

Hot spot

Today the globe is abutted more with Wi-Fi there are ample locus in our area, which is comprehensively colonized by Wi-Fi hence people chronically utilize their laptop in such locus preserving in attend that they are cautious while utilizing wireless technology. However, the essential fact is that Hot spot are no harmless in today’s age because hackers have a briefing about akin locus. Hence they can hack facilely your wireless system and can defraud your data, deliver numerous male ware, baffle your email by allowing numerous spam mails hence one should not facilitate Wi-Fi in accessible hot spot or you may be assault by attackers.

Knowledge

User must be attentive of pros and betrays of Wi-Fi and user cautious himself by following the precaution about the wireless network conduct. So there continues a less chance of being hacked. User has to update himself about the budding technology adept by cyber network in respect of wireless security hence user might long exult the benefit of akin technology. User should approach other about the correct conduct of wireless network.

Network scrutinizing

Network should be examined coherently and match with former map with appropriate network mapping apparatuses. The approach of audit the network is to detect out the action aftereffects and identify the security and also layup bottom parameters on which future check will be affirmed. The audit comprises feeble keys for encryption, key reuse and WEP security areas, and pass of network stumblers, packet logging and analysis breakthrough access point hardware and configuration, felonious network access, interfaces with other networks.
Although it is imaginative to exterminate entire barriers or hazard in wireless network but yes it is a conceivable appeal to appraise and administer unwanted hazard.