This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions..

Wednesday, April 22, 2009

How Fixing Broken Windows Can Decrease Click Fraud

There is a theory in law enforcement that goes something like this:

If someone breaks a window in a building, and it isn't fixed quickly, others will soon be broken. As the evidence of neglect builds, vandals will be more emboldened to break into the building and commit more vandalism and eventually destroy it completely.

If, on the other hand, that window is promptly fixed, it discourages further crime because it is clear that someone is watching the store.

Further, if instead of just fixing the window, you find the vandal and hold them accountable for it, a message goes out loud and clear: we're watching and you will get caught.

The problem with the broken windows theory is that it requires more than police action to put into practice. If the community isn't involved in the cleanup effort, the initiative fails. When the community is drawn in to help police the problems, to report them and to 'mind the store', so to speak, crime rates drop.

This theory can be extended to police nearly any venue where there is unacceptable behavior - including the problem of click fraud in the venue of PPC advertising. At the moment, the PPC industry is like a vacant building with nobody watching the store. It's easy to enter fraudulent clicks. It's even easier to get away with it. At the moment, a large percentage of advertisers leave the detection of fraudulent clicks up to the PPC provider - and the policy of most PPC providers is that they will provide refunds for proven click fraud upon request from the advertiser.

What happens when:

- The PPC provider's software detection methods don't catch the click fraud?
- The advertiser doesn't use fraud detection software?
- The advertiser can't back up the claim of click fraud?
- The major players in the industry refer to the problem as 'negligible'?

Simply put - the click fraudster gets away with it. The rewards are enormous - estimates put the amount of money lost to click fraud in the range of billions of dollars annually. But the loss to any individual advertiser is usually negligible, and even Google sees refunding money to advertisers as no more than the cost of doing business.

If we're ever going to put a dent in click fraud, three things have to happen.

1. Advertisers have to take responsibility for monitoring their own campaigns. If you don't know it's happening, you can't take steps to stop it.

2. Advertisers need to use the information they generate through their analytics to demand refunds from the PPC companies on a consistent basis. As long as the losses are minor compared to the profits for the PPC companies, their incentive for responding is limited.

3. Click fraud perpetrators have to be identified, actively pursued and penalized. Currently, modern techniques that use proxies and 'zombie networks' can make it almost impossible to identify and punish offenders.

Those are the three elements of the Broken Window theory that make it work - community action, official backing and action and penalizing perpetrators.

The first element in combating click fraud as a community is in getting click fraud prevention and tracking software into the hands of all advertisers. The difficulty of sifting through hundreds of pages of data to make comparisons and weed out patterns that signal click fraud is a daunting one for most companies.

Click fraud detection software makes it almost painless - but can be expensive. Other parts of the internet market have benefited from open sourcing of software to manage content, manipulate graphics, and create communities and process payments. An open offering of free click fraud prevention software will encourage advertisers to start monitoring their own logs and records and identify potential fraudulent clicks.

In addition, an open offering encourages others to modify and extend the software and make those extensions available to the community at large.

With those monitors in place, the second part of the equation becomes more possible. When it's easy for advertisers to identify and document fraudulent clicks on their campaigns, it becomes that much easier for them to demand refunds for those clicks. The third part is an outgrowth of creating a community that actively works to eliminate click fraud.

For the time being, click fraudsters are loose in a neighborhood of broken windows. With the right tools, we can begin to repair the windows and create a community that makes it nearly impossible to get away with their tactics.

Tuesday, April 21, 2009

How to Prevent Identity Theft

Internet banking is a piece of cake for all those who know how to handle it. Free online bill-payment, the 'next day’ bank to bank funds transfer and much more, are some of its features that make your life so much easier. But, with this bliss you may also invite a serious trouble. One of the worst things that could happen to you is someone using your identity to borrow money from creditors and stealing money from your bank accounts. This is called Identity theft.

One would only need two pieces of your personal information to impersonate you: your date of birth (DOB) and your Social Security Number (SSN). Technically, these are the keys to your bank accounts, credit files, credit cards, health information and everything. No matter how fool proof banking might be these days you are ALWAYS at a risk of being a victim of Identity theft.

More Information at: www.ehow.com

Monday, April 20, 2009

Spyware The Peeping Toms of the Web

While the internet is a great tool for research, or for just keeping in touch with e-mail or looking for a perfect gift, there is an annoying problem that is becoming increasingly dangerous for your computer. While everyone understands what a computer virus does, many people are still relatively unaware of the problem that is Spyware.

Spyware is another word for Advertising Supported software (Adware). There are several large media companies that place banner ads and pop-ups on certain web pages in exchange for a portion of the revenue from banner sales. This is the front for the more harmful Spyware that almost always comes along with it behind the scenes. While the banner placement may be a great concept, the downside is that the advertising companies also install tracking software on your system, which is continuously "calling home" and using your Internet connection to report on everything on your computer and everywhere you go, and then reports this information back to the source program. While every site you may visit may have a privacy policy about not sharing information, the fact remains that someone put a program on your PC that is sending non-stop information about you and your surfing habits to someone else.

Although Spyware is something that because of its very nature seems like it should be illegal, it actually is not, though there are obviously major privacy issues. Spyware also has a tendency to open your computer up to receiving more computer viruses, which is another reason why someone should look at removing any Spyware from their computer. Spyware detection and removal software often comes with security software like Norton or MacAfee, but there are also plenty of programs out there that exist for the specific purpose of finding and removing Spyware. Any detailed research will help you find programs that you can download to your computer in order to take care of these problems.

There is also the type of Spyware that can be intentionally downloaded to a computer. This type is most often used by parents or guardians to get a monthly report to find out all the various web sites people in their household have visited over the past month. In some Christian circles, a particular type of Spyware has become popular, where a certain group of friends will receive a monthly list of every web site visited in the past month, as an “accountability” thing. Otherwise, most Spyware is best removed from a computer as soon as it is found.

Sunday, April 19, 2009

Top 10 Virus on January 2009

Here are the top 10 Virus/Trojan on January 2008

1. Windx-Maxtrox

Display your desktop wallpaper after modified by the virus Windx-Maxtrox.Virus created with Visual Basic has a body the size of the original around 77Kb, without in-pack. The virus is suspected to originate from the strong North Sulawesi has an executable file infection capabilities. Precisely, it will infected program in the Program Files directory. Technical infection canny enough to avoid implementing it detection heuristic antivirus engine. Characteristics that can be recognized on the infected computer is changing the image of the desktop wallpaper images into animation.

2. Autoit variants

Most variants use Autoit folder icon in the typical virus impersonation.Ciri this one is made using a scripting automation. That if the compile into a executable file, which is also in-pack using UPX. And nearly 90% of all viruses and their variants autoit that we have, using similar folder icon in impersonation. This virus will also create an autorun.inf file at the time of the disk drive or flash drive.

3. Malingsi

The virus attacks the other virus Malingsi fat.Virus well with the size of 705,312 bytes is created using Visual Basic in the pack-use PECompact. It seems this virus is intended to attack another virus, this is seen from the message in the body. This virus breed and spread using intermediaries Personalization, which acts as a bot.

4. Recycler variants

File viruses hiding behind the false Recycle .Whom become typical of this virus is a technique, how it spread. Of all the variants that we have, how that is done the same, namely masquerade as Recycle Bin. For example the virus attacks the flash disk. In the flash disk of the victim will be the folder with the name of Recycler in which there is a folder using the name of alpha numeric example “S-1-5-21-1482476501-1644491937-682003330-1013″ with the icon is similar to the Recycle Bin icon. If this folder, click on or accessed from the Explorer, the file the virus will not be visible. To view them, you can go to command prompt with the command “dir / a”.

5. Fdshield

The name used by Fdshield time spread.Virus made using Delphi language using this icon that resembles the Internet Explorer. Has a file size of 553,472 bytes, without in-pack. One thing the light of this virus is of the name used when spread, labeled “17 + + & Confidential Sexs Women artists Indonesia (foto2_kamera tersembunyi_liputan). Exe”. For users who do not careful - careful, will take the file is an HTML file. If you see in the directory C: \ Windows \ System32, the mother found a file with the name “rundl32.exe”. Do not be deceived again! That is not part of the Windows files, but it really is a file virus. Note the letter “L” is just one. And now see in the Schedule Task, have a new job with the name “Windows FD Shield” which will execute the virus file at the time that he has set.

6. Purwo variant

Message delivered creator.One more new variants, Purwo.C, still created using Visual Basic, with the body size of about 56KB, without the pure-pack. This virus uses Word document icon similar property MsOffice to deceive potential victims. When he infected create a folder with the name “Purwokerto Under Cover” of the hidden attributes, and contain a file called “KoruptorPurwokerto.exe” on each drive that he find. In the folder C: \ Windows \ System32 \ file system also have windowss.exe, and in the C: \ Windows \ javaa \ service.exe. At the time it will show a black screen that contains the text of the message from the author. And be careful, this virus will also remove some of the files belong to you that he met.

7.Formalin

File properties Formalin.Icon virus that is used by this virus resembles the withdrawal folder, and it is created using Visual Basic. On Formalin.D, the file size of 18,432 bytes, with the condition of the pack using UPX. The virus creates a folder “disguise” with names such as seepage problems UAN and UAS, My Completed Downloads, Picture Wallpaper, Crack Program, don’t opened !,Ensurt Data (dont’ removed), and others. At the infected computer, Internet Explorer in the caption will be changed to “Your computer has been infected Formalin virus.” He also tries to disable “safe-mode” with how to remove some registry related. And in the file properties of the virus, the property description in the version information will have any posts such as “Kasian dch loe”.

8. Raider.vbs variant

Raider habits virus body has up-to-encryption.Virus if this type of VBScript, its file opened with Notepad, not a lot of strings that can be read as in most encryption. This has become a habit in every variant. Typically, the Registry, it will provide a key to making the new HKLM \ Software with the same name as the name on the computer name, with its contents as a string value is the name of the virus, Raider, and the date the first time the computer is infected.

9. Autorunme variant

Virus Autorunme hide the Recycle Bin folder that is not a production dibuatnya.Virus local programmers use this pack PECompact. He does not have the icon, only the icon from the standard Windows applications. infected time, he tried to embed the file on the parent directory C: \ Windows \ System with the name and msvc32s.exe with hidden and system attributes, and create new autorun in registry with the name “Windows msvc Control Centers.” The virus can spread through the data storage media such as flash disks can also be spread through Instant Messaging application. In the flash disk, it will make the Recycle Bin folder imitation that contains files with the name autorunme.exe, and direct autorun.inf file to run the virus. So when a user plug and play their flash disk drive and access is, the virus will be active.

10. Rieysha variant

Sma-Virus Found Rieysha variants of Rieysha again, this time with the name Rieysha-high school. Like previous variants, it is still possible to use Visual Basic. This time around the size of 104KB, with the icon that resembles a file Real Media Player. Menginfeksi time, it will create a duplicate file exe, mp3, doc, and replaced with a 3gp himself. In addition, there are at least 2 pieces of virus files on the root drive, with the name “sma3gp.exe” and “CeritaSeru.vbs”.

Source: bibeh.com

Thursday, April 9, 2009

Safe and Secure Online Payments with SSL Certificates

The seamless world of the Internet has broken open the physical barriers that existed across regions on the Globe. Today, therefore, you could be sitting in Munich and buying goodies from Seoul. Very convenient, and thrilling. But, when you pay for your goodies and swipe you’re Credit Card, are you sure, you are paying only for what you paid for? Chances are your Credit Card Information traverses through alien territory into the wrong pair of hands. The result, the next morning, you will find your Bank account eroded or emptied? Not a situation that most of us can afford or enjoy.

How do we then transact on the Internet and yet safeguard our hard earned monies from those Electronic pirates? The answer is relatively simple. Every time you choose to buy product or services through web-sites, before entering your Credit Card and other personal information look for information on whether the payment gateway is secured. Informed customers would always prefer to transact their business through secure sites and this will automatically bring in more business to Websites secured through SSL certificates from well known providers.


Payment gateways are secured through SSL or Secured Socket Layer. When you enter your personal and or Credit Card information into a secure site, an encrypted public key is created. This is termed as a handshake to authenticate safe transaction. The unique encryption method which gets established in the process will have a unique session key. This process protects theft of valuable data and only the transaction that you intend to complete is processed.

SSL certification has been found to be very reliable across, Internet users and also among the customers. These certificates are issued by a reliable and trusted authority, the Certificate Authority. The web-site through which you are attempting to transact business carries signs of the agency which has issued the SSL certificates. There are other similar agencies too, which offer these SSL certifications. When you click on the sign, the details of the certifying agency are displayed.

When you click on such secured domains, your system generates a SSL handshake which is accessed by the web-site server. The unique encryption method employed then allows a secure transaction to go through.

Why all this bother?

When you are transacting valuable business or even sending across precious data, it is necessary to route them through secure servers which have the seal of security such as an SSL certificate. In the absence of this Security, it would compare with sending a snail mail in a transparent envelope.

For E-Commerce and other Web-site owners, the SSL certification acts as a stamp of credibility and assurance of safety to their valuable customers.

For the Service Providers and other Vendors/Merchants in the Internet world, exhibiting their site security sign – a reputed one at that, not only assures the customer that the information he parts with will be securely handled, but also separates them from the crowd. Informed customers would always prefer to transact their business through secure sites and this will automatically bring in more business to Websites secured through SSL certificates from well known providers.

Wednesday, April 1, 2009

The Home Computer User’s Guide to Spyware

As with the computer virus, spyware can be broken down into a number of different categories. Most users are familiar with the term “adware” which refers to software which serves annoying ads. There are however a number of other spyware variants you should be aware of.

To begin with it is important to have a clear definition of spyware. This will also help us understand why the term is commonly used to encompass a number of different variants. Spyware is a program, usually installed without your knowledge, which records what you do on your computer and then shares it with its creator.

The information which the spyware program collects can vary from the websites you visit to log-in and passwords for your online banking site. The sharing of your personal information with a third party is why spyware in its purest form is labelled as a malicious threat and clearly is a major privacy issue.

Adware is the second mostly commonly used term. Adware is designed to display adverts relevant you, commonly based on your surfing habits, to generate Pay-Per-Click advertising revenue or sales through affiliate links. Adware is commonly bundled with free software by developers instead of charging a price.

The malicious nature of adware can vary enormously. At one of the scale, adverts are displayed in a non-intrusive manner in a window within the free program you have downloaded. When the program is not running, ads are not displayed. At the other end of the scale, a user could find their desktop overwhelmed as the adware program spews out multiple pop up ads in a very aggressive manner. Whilst it may be possible to believe the former is not transmitting personal data to a third party, it is difficult to expect the later not to.

The adware issue is further complicated by marketing companies who do not like their software being labelled “spyware.” These marketing companies generate millions of dollars of income often via recognised brand name clients. So to avoid legal issue security companies refer to this software as PUPs (potentially unwanted programs).

Browser hijackers are another aggressive form of spyware. They attack important browser settings like your default homepage which your browser loads when you start the program. Hackers direct you to sites which generate revenue for them like the Russian website “Cool Web Search”. Browser hijackers can also insert sites into your bookmarks. They also can cause your browser to crash and stop working completely and are typically difficult to remove.

Key Loggers capture all your key strokes into a DLL file which the creator retrieves. Software key loggers are often bundled with a Trojan Virus which gives the creator access to your computer.

Here are some tips and strategies to fight the different types of spyware.
- Keep Windows XP and ALL your web browsers (including Internet Explorer and FireFox) up to date with the latest patches.
- Install a reputable anti-spyware program like Webroot Spy Sweeper or PC Tools Spyware Doctor. Run frequent scans and keep the definitions up to date.
- Install a reputable anti-virus program like Norton Anti-Virus or McAfee VirusScan. Run frequent scans and keep the definitions up to date.
- Install a firewall which manages both inbound and outbound connections. Top personal firewall software picks include Zone Labs’s Zone Alarm and Norton Personal Firewall. Alternatively purchase a router with a hardware firewall.
- Avoid downloading free software programs including screensavers and weather toolbars.
- Avoid know high spyware risk area on the internet including illegal music sharing sites, Peer-to-Peer programs, free game download sites and adult sites.