26 Jun 2011, 5:01am

Comments Off on PDF Letter

PDF Letter

Give permission for this operation should only be the case if the letter was received from a trusted sender – Use a spam filter. If the email client is a function, enable it. Many postal services, as anti-virus software, have their own spam filter – a regular update e-mail program – this will increase the protection against spam. With the company’s website Agnitum (www. agnitum.ru / products / spam-terrier) can be downloaded free spam filter for Outlook Spam Terrier and Outlook Express. He automatically detects the flow of correspondence letters advertising, eliminating the need for users to manually browse and filter out unwanted messages.

The filter is self-learning. To determine which messages should be considered them as spam, you must specify a message from an existing mail that the user considers spam. Carefully you will be trained Spam Terrier, the more accurate the results will be. Effectively deal with promotional mailing can also use the tool Vade Retro from the company Goto Software (). The program is available for free download and free of charge as does the first update anti-spam database.

Further updates will cost base approximately $ 40 per year subscription. 3. Need to check e-mail attachments. Pictures, executable files with the extension exe, music, accounts – all this gets on your computer as attachments to emails. But not always in Embedding is what is written in the letter: there are often hidden virus or ‘Trojan’. Therefore, when working with attached files should be cautious and follow the main rules: – Never open attachments in emails received from strangers – unless the sender calls himself a member of the FSB, the bank officer or employee of the Technical Support e-mail server, it will almost certainly receive such a letter indicates tampering or cheating! It is better to immediately delete the message – make sure there is always a file extension such as it seems at first glance. For example, an attachment pretending to be a document PDF, showing the following extension, but in reality it can be located the executable file. Such a situation with a high degree of probability points to attack your computer. To avoid possible infection need to know exactly what you received. Include a map recorded in the type system extensions. To do this, open a Windows Explorer menu ‘Tools’ and select’ Folder Options’ tab ‘View’ and uncheck the box next to ‘Hide extensions for known file types’ then click on ‘OK’. Now enhanced with the resulting file will be shown in full. 4. Configuring your email client (software running on a PC, which allows you to receive, send and organize e-mail), for example, Outlook can move any suspicious e-mails into a special folder for spam. The user selects the level of protection from unwanted mail.

25 Jun 2011, 1:20pm

Comments Off on SLR Canon EOS


March 25, 2009, Canon has officially unveiled its latest digital slr camera eos 500D, where the main features and advantages are: low price ($ 899 abroad), the ability to shoot video in hd quality (Similar to Canon eos 5D Mark II); and 15.1 megapixel sensor from the more expensive model Canon eos 50D. Studying the technical characteristics of Canon eos 500D confront us with the "brainchild 50D and 5D Mark ii. In addition to the 15.1 megapixel Canon matrix equip its advanced camera photodiodes and microlenses, which are combined into an array without any gaps, thus the system noise becomes much more efficient, and the index increases sensitivity up to iso 12800. Continuing to talk about kinship and 500D 50D, it should be noted that the Canon eos 500D Digital borrowed a fourth-generation digic processor, which was first used in the 50D. The only thing that distinguishes them, this rate of fire. The new 500D it is 3.4 frames / sec, while the 50D – 6,3 fps. And what connects the budget model 500D and not the budget camera 5D Mark ii? This mode records video in hd quality with a resolution 1920h1080p, where the duration of the movie is 29 minutes. 59 sec.

And up to 4 gb. The disadvantage is the difference between the 500D recording speed, which is 10 extra frames per second (500D – 20 frames per second, 5D Mark ii – 30 frames / sec). During the video might make a good quality picture with just one touch of the shutter button. In our novelty comes built-in microphone and a miniature speaker, which are involved in movie mode and playback of movies. Also merit 500D is built-in flash that can illuminate objects on the distance of 3.7 meters with the standard lens 18-55mm. Along with this set of necessary power, depending on the distance to the object. And finally, we can not say about the system of protection against dust, which includes: anti-static coating matrix, an ultrasonic vibrator, which is when the camera comes into effect for a short time. And if the sensor motes stuck, it comes with the camera software detect and correct images. Digital Camera Canon eos 500D is designed for anyone who seeks to capture the important and interesting moments of his life, regardless of whether you are a beginner or amateur photographer.

24 Jun 2011, 11:21pm

Comments Off on Cloud Virus Protection Internet

Cloud Virus Protection Internet

What could be better than one guard? A whole army of good guards. This simple principle is based cloud protection technology (from the English. In-the-Cloud). Explain what lies behind this new concept. What is a cloud? Almost every developer of software packages to protect against Internet threats, has already launched its cloud on the Internet. It consists of servers, one of the developers of antivirus protection, and all Internet-connected PC, which software works this developer. For example, Kaspersky Lab calls his art a cloudy solution of Kaspersky Security Network.

How does it work? 1. I suspect the file has not yet been identified by the program security as a pest, shoot digital imprint, and on this basis creates a unique checksum. It is transmitted through the Internet connection into a cloud security developer. 2. Server checks whether the known cloud passed checksum, and therefore hiding behind her file.

If known – the data about malware being transferred back to the user's computer, and installed anti-virus solution on it enters the fight. 3. In Otherwise, the analysis software on the server examines in detail the file. If he is potentsialnuyuugrozu, the checksum as a new signature is entered into the database of the cloud. 4. Then cloud provides a new signature available to all connected computers. In subsequent queries, the cloud fraction of a second can confirm that we are talking about the virus. The main advantage of cloud technology: it allows faster detection of new threats, it is very important during virus outbreaks. Cloud technology has not only advantages. For example, the user should be the developer of a degree of trust – yet the PC and the cloud constantly exchanging files. The biggest drawback is that a brand new threat is revealed only if there is an Internet connection. But if computer is currently disconnected from the network, then hit a new pest, say, a flash drive, have used alternative methods of identification, such as behavioral analysis.

  • Archives

  • Tags