5/16/2008

Facebook ban Google access to user data

securitysofts

May 16, according to foreign media reports, although claiming to promote the social networking site Facebook's open and can carry data, but the premise is: Do not touch my user data.

Thursday, Facebook released a one-paragraph 7 of the blog articles, in a nutshell, is prohibited Google has just launched the "Friend Connect" the use of Facebook's API (Application Programming Interface).

The article said "Now Google has launched a Friend Connect, we have the opportunity to start an assessment of the technology, found that the technology will be without the permission of the user, sent to a third party Facebook user information, this practice Does not meet our users to achieve privacy protection standards, in violation of our terms of service. As we have to ban other users without access to information on the permit application, we must stop Friend Connect Facebook users access to information, until its compliance with To our rules. We have repeatedly and Google on the issue of the contacts, hoping to cooperate with them, in full accordance with the wishes of users share personal information. "

In conclusion, the article mentioned that "We believe that, MySpace's Data Availability, Google's Friend Connect and Facebook Connect will participate in the social network of a great transformation that allows users to enjoy a better, more secure social experience, while protecting their privacy is not Violations. We look forward with the developer community and industry to help all of our users to carry personal information anytime, anywhere, and privacy are not violated. "

Nearly a week, two major U.S. social networking sites MySpace and Facebook and Google were launched to help users of personal information, and other data into third-party site tools. Of which, MySpace product called "Data Availability", allowing users with Yahoo, eBay and other companies operating sites share personal data. "Facebook Connect" allows users to personal data or friends out into third-party site.

At present, users in the use of a variety of network services, often need to sign a different site, which is very time-consuming effort. MySpace, Facebook and Google have launched a new product is to solve this problem, through these products, users can use the same site at different friends list and to maintain the consistency of their social activities.

The social networking sites, and other sites allow users to share personal information There is a certain risk. Because in a very long time, the social networking sites are considered to be "the wall in the Garden." Social networking sites for the strict control of the user data, an increase of users to other sites difficult, from a certain extent, enhance user loyalty. With the increase in user activity, social networking sites attractive to advertisers is also increasing. Facebook and MySpace allows users to transfer of personal data to other sites, equivalent to their overturned on a wall.

CBS will be 1.8 billion U.S. dollars acquisition of CNET

securitysofts

The May 15, according to foreign media reports, the U.S. CBS (CBS) announced today that will be about 1.8 billion U.S. dollars acquisition of CNET Networks. Prior to this, CNET with the dissenting shareholders for the growing.

Under the agreement, CBS will pay CNET shareholders of the purchase price of 11.50 U.S. dollars per share, representing a CNET Wednesday's closing price premium of 45 percent, but higher than the maximum CNET shares over the past two years. Affected by this news, CNET shares Thursday on the Nasdaq before trading was up 42 percent, rose to 11.30 U.S. dollars; CBS shares in the New York Stock Exchange before trading was down 3 percent, fell to 24.10 U.S. dollars.

CBS said that through this transaction, the company will be among the top 10 Internet company in the United States included, the number of visitors per month as an independent 54 million people in the world, has about 200 million users. CBS President and CEO Leslie Muwei Si (Leslie Moonves) said: "CNET is a profit, growth, well-managed Internet companies, the acquisition of such a company very little chance." He also said that the deal will help CBS will provide their own content to a global audience.

Mu Weisi said, CBS with a combination of CNET, will be in the fast-growing advertising market occupied an important position, but also by a large amount of new content, promotion and advertising program to accelerate its own development. CNET's assets, including the Internet, entertainment, news and information Web site CNET, ZDNet and GameSpot.com. CBS said in a statement, CNET has a large scale access to international markets, especially the Chinese market.

After the completion of the transaction, CNET's Web site will be incorporated into the CBS news and sports sites, CBS radio and CBS television digital media platform, and the CBS network's audience distribution networks. CBS network audience by more than 300 partner sites formed, covering 82 percent of U.S. Internet users.

In the meantime, CNET is facing a dissenting shareholder-sponsored proxy battle to Jana Partners investment company headed by the opposition groups have been committed to elections seven new members to the eight-member board of directors of CNET. So far, Jana Partners also on CBS did not comment on the acquisition of CNET transactions. Jana Partners CENT is the first major shareholders, as at February 20 holders of the latter 10 per cent of the shares.

CNET was established in 1992, is the world's first website to the concept of IT companies listed. But in recent years, CNET has encountered strong challenges from competitors. 2005 to 2007 between, CNET shares fell 19 percent, while the Nasdaq composite index rose 22 percent. At the same time, other Internet company's shares are soaring. The first quarter of 2008, CNET's net loss of 6.1 million U.S. dollars, a loss of 4 cents a share, on revenue of 91.4 million U.S. dollars, year-over-year growth of 89.1 million U.S. dollars of 2.6 percent.

5/14/2008

Unisys revealed: biometric security technology in identity management has become increasingly important

securitysofts

With the popularity of Internet banking, in order to protect the security of online transactions, most banks through the use of digital certificates to ensure the authenticity of the user identity. As of September 2007, China's financial center of the digital certificate issuance of over 1.9 million. However, according to the Centre "2007 China Internet banking investigation report" shows that there are still outstanding 71.7 percent of respondents use Internet banking because of suspected network-security without the use of online banking, this proportion than in 2006 increased by 10 percent. Unisys Global Public Sector Director, Greater China Qin Feng said that with the online services and transactions increase, as security management business, banks and the Government's major task. In this regard, traditional settings, including password plus token has been inadequate, as the technology development, dynamic password, such as fingerprint recognition technology has been adopted to deal with the new network identity theft issues.

Unisys in 2007, has published two related report also proved that the Asia-Pacific region and Hong Kong in favour of using biometrics technology to enhance security management capacity. "Asia-Pacific consumer finance market research report: return and compromise", Unisys testing with existing customers in the maintenance of the relationship between the bank or choose a new bank will make a compromise in which the findings show that the highest of all banks Recognition System The third option business. In addition, "global security Unisys confidence index" showed that in Hong Kong, 97% of the respondents were willing to take more security means, such as biometrics. 87% of Hong Kong residents expressed grave or very worried that personal information was unauthorized access or abuse and credit card information theft.

In fact, the Government and the industry is growing rapidly experience the biometric technology value to ensure that they adopt the appropriate safety measures to reduce the security risk in the complex of exposure. Establish consumer confidence, consumer confidence was, this is more and more well-known biometric authentication methods, and represents a great advantage.

Based on biometrics and other authentication measures enterprises can be used to guarantee to consumers protect their personal information the most realistic approach. But if the people accept the new security measures, enterprises need to inform these new security measures in principle, as well as their targets to be achieved. Why, for example, to extract fingerprints » Their photos will be preserved where?

Today, people long for in life and access to safe, and this desire has never been stronger. They expect, or even expect them to life in all aspects of security and protection for all - whether dealing with the relationship between health care providers, social or e-mail exchanges, such as online shopping. More importantly, the people also hope that new technology can bring about faster and greater convenience, including the Airport Customs rapid access, and hope to be able to launch mobile phone banking business.

With the public's acceptance of biometric technology, the use of the technology matures, innovation will be further voice, face, fingerprint and iris recognition and other biometric identification methods familiar to expand to new areas. A promising option is the blood recognition technology, the use of this technology exists in the wrist or finger vein of biological information code. Similarly, a biometric identification technology, automatic rapid DNA matching may also be more widely recognized. Biometric's continued investment in research and development activities will promote the further deepening and expanding to new markets, such as access to family and the elderly care services.

More and more use of "pre-registration choose (opt-in)" security projects will promote support for remote scanning of the further application of technology, to achieve regional security on the verification and faster access. For example, Unisys has registered visitors (Registered Traveller) program allows frequent access to passengers flying in support of the certificate to identify more easily through airport security checks, and will not lower safety standards. At present the United States already use the item, Australia also began to actively explore, travel facilitation (Facilitated Travel) and security early warning concept enjoys popular support.

The most important is the application of a variety of biometric security solutions and other authentication methods, or combine, such as radio frequency identification (RFID) and smart card technology. Beijing Frontier General Inspection Station at the end of 2007 launched self-service clearance system, self-service clearance system will take full advantage of the smart passports, documents and fingerprint recognition technology, through advanced information technology, to complete the border inspection procedures. Where can change from the existing passport holders of the new smart travel documents of passengers, when a simple, by fingerprints, machine quickly identify accurate, visitors can clearance rate from the present 45 seconds / 10 were substantially upgraded to Seconds / person, to effectively improve the efficiency of port clearance, saving passengers time to designate the seizure.

Regardless of what the use of safety measures, the most effective security would be to enterprises as a whole, to assess all possible security risks, including the risk of internal and external risks. This means the overall security can help enterprises further reduce security threats and risks.

Well-to-business and government, the next step is to identify and maintain globally consistent application of security, privacy in the context of strengthening moral solution. 2007, industry, government and academia alliance of global Centre for Ethical Identity Assurance (CEIA) was established to develop and promote the identity authentication standards, and support compatible with various sectors and geographical business practice. CEIA is an important measure for the drafting of a "consumer bill of rights" Bill to protect personal information and preventing identity fraud.

The reality is that the identity and biometric technology, technology-based security improvements can enhance people's privacy, convenience and choice. More and more people have realized this, but if you want to achieve this advantage, the Government and the fact that enterprises need to clearly communicate to consumers, highlighting the need of consumers in the privacy and security to choose between, they can At the same time get the two. Technology has been chosen so that enterprises can meet its security needs of the correct solution portfolio. There is no doubt that biometric technology will be those who seek to take the overall identity management methods of government and industry security solutions to play a major role.

Senior Network Management talk about how to protecting ARP virus

securitysofts

Visit our Web site readers are mostly in the enterprise network management and network security enthusiasts, I believe the most recent period for us the most headaches is the ARP to deceive the type worm, the virus is very troublesome to deal with, a machine infected Net result of all the machines in the Internet disruption or chaos. The author also has categories for the ARP deception by the worm Kunrao, below the author in accordance with their own experience and experience and we are working together to deceive the ARP-like virus under control ideas.

1, ARP deception virus overview:
We can not for lack of space between here substantially on the ARP to deceive the working principle of the virus and spread mechanism, the author of the ARP is only a deception virus probably introduced. The so-called ARP deceive the virus is actually a computer infected with the virus constantly posing as the gateway IP address, repeatedly told the network gateway in all the computer's MAC address corresponding information is infected machines MAC, such as his contract Far greater than the actual gateway sent the ARP information and data.

Therefore, the correct ARP packets have been false data packets disguised by the mask, leading to other computers to the Internet when the corresponding data will be sent to the Gateway (in fact the gateway corresponding MAC is already poisoning the MAC address of the machine ), Then send and receive data from poisoning machines and completely normal machines, the gateway address is correct and complete Skip, resulting in network access problems, out false information to deceive on the page, other computer or the Internet is slow Can not get online, or even access to the address into a false pages, and so on.

2, ARP deception virus control key:
ARP deceive the birth and spread of the virus outbreak and the key is that he sent to the network in a large number of false data packets, false data packets is to tell the contents of other computers Gateway is the MAC address of the infected MAC, such as the machine's MAC address 1111-1111-1111 is, your IP address is 192.168.1.5, the network is truly the gateway address 192.168.1.254, then falsely told the other data packets is the corresponding computer 192.168.1.254 MAC address is 1111-1111-1111.

As TCP / IP protocol transmission from the low-level data link layer to start high-level network layer, so the computer must be identified by MAC address, the network of other computers have received the corresponding MAC address 192.168.1.254 is 1111-1111-1111 , Then they will be the first through the MAC and ARP cache of information to determine the target gateway computer.

So by the above analysis we can be more specific, that is, to prevent the virus ARP deception is the key to dealing with this illegal data packets - IP address is the gateway and the MAC address of the computer is infected with the virus.

3, ARP virus prevention ideas:
This paper is a discussion of the ARP cheating worm control ideas, is not burning in a Prevention of the measures, if ARP has been deceiving the outbreak of the virus, network administrators then you need to do is to detect the virus by sniffer target computer, I specific methods in the previous "close-Downloader virus" has been introduced in the article, here is not described in detail.

Below that line of thought under control - we will control the key points on handling ARP packets deceit, deception because we know that the contents of the packet is "IP address is the gateway and the MAC address of the computer is infected with the virus", as long as for this Packet filter can be. The network does not have the virus when we can know the true gateway to the correct corresponding MAC address, it is only through arp-a switch on or directly in the query. Here assume that the real gateway corresponding MAC address is 2222-2222-2222.

Then we need to switch settings on a list of filtering access control strategy, will switch from all the various ports sent out on the direction of the source address is 192.168.1.254 However, the source MAC address is not 2222-2222-2222 or destination address is 192.168 .1.254 And purpose of the MAC address is not 2222-2222-2222 packets discarded (Add to the black hole loopback loop), while the corresponding close automatically switch ports.

4, ARP deception control the virus simulation process:
As ARP deceive the spread of the virus is sent through switch broadcasting false information, and the information content of the false data source or destination IP address information must include 192.168.1.254, and the corresponding MAC address is not necessarily correct 2222-2222-2222, Such false information will be before we switch on the set of access control lists or filter shielding strategy, combined with the corresponding port completely shut down automatically to avoid ARP deceive the spread of worms. After infected with the virus will not be able to access the computer, he will be linked network administrators, thus helping us to quickly positioning of the computer, the first time to solve the problem.

Tip:
But if taken in the enterprise network topology in a switch ports such as the HUB has also connect the equipment, then connect HUB if the equipment under the computer virus infection ARP deception, it will automatically switch ports are still closed, the entire HUB Even under all the computer equipment will not be able to access, it is proposed to make full use of all or switch to connect corporate computers.

5, summed up:
Such preventive measures are needed with ACL access control lists and routing strategies such as routing switching equipment function, we must first ensure that the exchange of routing equipment to support these functions, a reasonable addition to the establishment, can not filter out the correct Data packets. Of course, this content is the author several times in the fight against the virus ARP deceive the idea of a preventive, and hope more friends to explore, learn more proposals, we will make progress together ARP deception killing the virus completely.

5/13/2008

Sichuan Wenchuan county earthquake death toll is currently 11,921 people!

securitysofts   From: china.com.cn

State Information Office in May 13, 2008(Tuesday) afternoon 16:00 of the State Council Information Office press release Office held a press conference, the Ministry of Civil Affairs Vice-Minister Luo Ping, China Seismological Bureau spokesman Zhang Hong-wei, and so on 4 Chuan Wenchuan earthquake disaster and earthquake relief progress and answering a reporter's question.

Reuters: There are two issues, the first question, we all know that a lot of people have not been rescued and are now 24 hours, generally you think the number of days in hope that there can be rescued or they need about how kind of Time » The second issue, we also know that in the northern or western Sichuan, there are many large a particularly long tunnel, you have such equipment after the collapse of the tunnel was or how the future can guarantee their safety »

Civil Affairs Bureau relief Secretary Wang Zhenyao: Thank you very much on this issue Reuters questions.

You know now the first phase of disaster relief, disaster relief throughout the course of a very important time period is 24 hours, 48 hours, 72 hours after the earthquake occurred, is the urgent need to engage in the implementation stage. First, it is within the community before the half-hour or a few hours before is the key, why the last two days to resolutely personnel, the armed forces, armed police, all kinds of rescue teams into the disaster area, that is to participate in the coordination of the whole guidance Rescue activities.

Judging from the current situation, the disaster killed 11,921 people has come to see now why would like to open up the road, is to check every detail, in addition to the county what other townships and villages which, in addition to schools, there are not some individual, Have buried the population, so the first stage is now urgent rescue, relief is rescue, now this is very tense and conducting. We say that the first task is to save people.

Now we earthquake relief, as long as there is a hope, any information, to ensure that the implementation of relief, the current needs of the staff into the area, officers into the organization and implementation of those houses collapsed, every check is still not survive Or the staff to check whether there are victims, should now be said to focus on the implementation of large areas of search and rescue. May be a few days later, it may have some sporadic, but at present is to focus on the main area of the search results.

Let's bless the victims, bless China!

5/11/2008

China Netcom using IPv6 and other new communications technologies protect the Olympic Games

Attracted worldwide attention in 2008 Beijing Olympic Games will soon began, to provide communications support for the Olympic operators have also used the new technology. Tencent Technology recently learned that China Netcom used by the new technologies, including the new generation of broadband network technology (IPv6), a high-level security assurances, and so on the video surveillance network, China Netcom said it will use these technologies to Olympic venues , The Olympic command center and other key areas of real-time monitoring, protection of the Olympic Games of the smooth and orderly held. In addition, China Netcom provided by the Olympic tournament network management system: the Beijing Olympic Games can also many events in the networking management, facilitate access to Olympic organizers race information.

It is understood that the former China Netcom in the previous Olympic tournament also bear some security work for the 2008 Olympic communications support has accumulated useful experience.
Edit by: securitysofts

Blocked enterprises confidential information leak from seven physical channels

Enterprise information leakage, in addition to information systems, but also through physical channels, a number of industrial espionage to be no suspicion of defrauding employees of the company confidential information. The Culture and Education How do you stop these people.

Enterprise information leakage, in addition to information systems, but also through physical channels, a number of industrial espionage to be no suspicion of defrauding employees of the company confidential information. The Culture and Education How do you stop these people.

U.S. companies each year because of hacking and illegally intruded into, physical security incidents and other criminal activities suffered the loss of up to 300 billion U.S. dollars. A company may become a target of espionage, regardless of financial data, intellectual property, or customer data, the spy who are interested. Spy physical invasion of the most common motive is to engage in industrial espionage.

Following is commonly used by spies several means, the experts on the basis of this proposed approach to stop.

Channel 1:

Employees into the company behind the spy

Spyware companies most likely to sneak into the way technology is also one of the lowest levels: the main entrance from behind the authorized staff to enter. According to statistics, 90% of the companies too easily into. In order to get mixed, with a spy may be a cup of coffee or a sandwich or wear false identity papers Taiyaodabai access. The regulations also prohibit smoking for espionage through the back door into the building to provide convenient, because smokers often gathered in the back door Tunyuntuwu. In addition, there are many people directly through the door into the delivery.

Once the spy into the company, in many ways to sensitive information. They can impersonate IT support staff, copying documents unattended. Or simply to empty conference room, with access to notebook computers, from access to data on corporate networks. In many cases, several espionage cases together, posing as a consultant, posing as another employee, if someone walked into the past, expressed regret spy on, pretend, "is scheduled to repeat the meeting room," then Shankai.

Stop approach: We can not simply the development of security policies on Wanshi, must implement: If someone is unable to prove that their employees, security personnel, reception and other staff shall not be allowed to enter the building. Many companies also report on suspicious persons formulate a clear point of order.

Two channels:

Spies posing as employees

Spyware is often disguised as IT support staff, sitting in the previous user's PC, no one would doubt their identities. Some spy waiting for opportunities to find the office empty; In other cases, spyware will be posing as cleaners, the company managed to get after work.

A company has to employ experts to find the security flaws, but asked him to avoid the use of the system CEO. However, to leave the CEO in his office, CEO's assistant asked him: "You want to update the CEO's computer» "In this way, he sat the" Fortune "Top 50 companies next to the CEO's desk. Although he avoided as far as possible to see any of the above sensitive computer information, a more sensitive information will not work if you do not see. This is indeed a Taida Yi.

Stop approach: First, to enhance staff safety awareness. Most companies rarely in strengthening the awareness of staff have input, the majority of people think that building in general be OK. Lawless elements used precisely this mentality. Companies need to provide what is appropriate and what is inappropriate, then the implementation.

The second is to use protection tools, such as a password screen protection for data encryption, and has requested access to a large number of employees (for example, IT managers and executives) use a strong password. It is regrettable, however, most networks have not taken adequate and effective protection, many companies set up a common and stupid passwords, these accounts is often a password.

Finally, the importance of the need to classify information, and the priorities for storage. Even if only to the IT managers and senior staff of the accounts implemented encryption, can also solve the problem of 70%.

Commercial spy everywhere

Three channels: spies posing as visitors

Another sneak into the company is posing as a means of legitimate visitors, such as telephone or electrical Weixiu Gong, burglar alarms or fire department inspectors sent to check the smoke alarm and other staff. Spy bought fluorescent T-shirt and work boots, and then downloaded from the Internet Hot Stamping logo, posing as a dress, as long as the package will spend the first seven U.S. dollars. But security experts posing as visitors in the building Zhuanyou company, found detailed information on customer accounts, payroll data disk, with the default voice mail guide, advertising expenditure information, bank statements, Staff Directory, and filled the company's strategy notes The whiteboard.

Stop approach: an attempt to enter the building must verify the identity of the foreigners, and not only verify identity. Employees should be required to visitors at his employer's name and then check the information online, then call the other side, to ensure the accuracy of visitors. This is very cumbersome, but it is very necessary.

Four channels: Web applications through espionage theft

Not all spies have adopted a low technology content; According to SANS Institute in 2007 released the top 20 Internet security risks report shows, more and more people in the use of Web application security vulnerabilities. Report of the existence of loopholes in the Web application as the first Dah Sing emerging risks, it can lead to strokes in the site, data theft, computer has been connected to the endangered sites. The report said, Web application attacks in 2008 will be substantially increased.

To stop: The Web scanning tools can help find application loopholes with the source code if the assessment tools and application penetration testing a combination of better results. SANS Institute proposed inspection of the targeted Web application framework, and adopt corresponding measures for reinforcement.

Channel 5: spy bribe-house staff

Engage in espionage destruction is an effective means of bribe-house staff and theft of information. This often means high-tech ride and not the top, as long as the use of existing staff access, you can download large amounts of data.

To prevent: the use of access control and should take the initiative to review technology. For example, if a 30 day visit record, but a sudden visit to 100 records every day, then this is a dangerous signal that needs attention. In addition, if employees suddenly begin to access data from home, but also attention. With anomaly detection procedures can be found in such acts.

Moreover, the use of the operating system's access control capabilities are also important. People did not spend very much time to a reasonable allocation of these features, many employees access to the actual task beyond the completion of the necessary access.

Anti-hacking technology to

Six channels: "keystroke recorders" theft

Sneaked into the building can be installed inside the spy keystroke recorders. Such equipment will be the keystrokes of computer users through the e-mail to the address specified, but also to save keystrokes in the flash memory. Many keystroke recorders were found almost impossible, such as directly connected to the keyboard connector of the keystroke recorders. There had been such a thing: spies posing as office cleaners, use of such tactics from a British bank Qiede almost 300 million pounds.

Block approach: a comprehensive examination of the physical computer equipment. If unable to fully inspect the computer, the glue can be used to connect to the computer keyboard are all Nianlao so keystrokes on the keyboard to connect.

Channel 7: theft through phishing

Phishing is a use of social engineering tricks, espionage aimed at trick people into disclosing information (such as the password) or jeopardize the implementation of the operation of confidential data, such as clicking on the link, thereby allowing others to remotely control the computer. In fact, phishing is the most important one of the Internet security risks.

Stop approach: continuously strengthen their security awareness, through the exercise to simulate phishing act. The company also should be avoided in public sites reveal too much information, including the company logo and employee's email address.

Another solution is to disable the computer USB port, or use a centralized tool to restrict the use of ports and external equipment, which will increase the difficulty of espionage export data.
Edit by: securitysofts

Kaspersky nearly 20 kinds of practical use

Kaspersky is the more common use of antivirus software, the article on the use of a number of Kaspersky skills, let Kaspersky more convenient to use
The following methods set up Kaspersky, will be especially handy to use:

1: President Kabbah must be fully installed before unloading other soft kill. If you have a conflict, in the normal Windows environment can not kill any anti-installed software and then need to enter the security mode, the installation of an anti-operation. Kabbah 6.0 and rising serious conflict [even if the closure of rising monitoring] [Jinshan also the case], the specific performance of the boot into the desktop after the Dead! For many netizens said, after Kabbah antivirus system led to the collapse of the situation can not start, I have encountered! Personal feeling is that viruses or Trojan associated with the system files. Kabbah Tip: You can not remove, I have chosen is: delete. In the process and remove viruses or Trojan associated with system files were deleted, resulting in a system crash! Some prefer Cuosha 1000, can not pass up a feeling. After the collapse of several systems, I chose the Zhuangwan system, in the case of non-toxic system installed immediately Kabbah, to install software, Internet! Kabbah's protection or good, so viruses or Trojan infection was not so easy, there will be no recurrence of the collapse of the system!

2: Kabbah must remember that the "self-protection" on the check, to prevent malicious code amended Kabbah! The default is on the elections, it is better not to amend.

3: In the first Zhuangwan Kabbah after a comprehensive scan this time may be president of points], in subsequent scans, we can confirm the safety of the documents [such as: movies, games] does not scan, this can greatly save scan时间. Method: Set - - confidence in the region - excluding tag - add - that you can choose the safety of the document. Kabbah scanning the cabinet is quite time-consuming.

4: reduction systems or heavy equipment in the system, be sure to do a good job in the virus database backup, restore or re-installation. Under normal circumstances, Kabbah of the virus on this file in the directory: C: \ Documents and Settings \ All Users \ Application Data \ Kaspersky Lab need only to AVP6 backup to other disk [Application Data folder attribute is hidden, To be amended to find, and then in the reduction or heavy equipment, you AVP6 backup coverage to the directory under it. [Note Kabbah switch off the self-protection, or else they might not be able to copy into account]. And then withdraw from Kabbah, President Kabbah re-entry, he will remind you restart the computer to complete the update, which can then be convenient to have previously updated the virus to direct the use of [remember that open "self-protection"]! If the above content backup, and that your virus database will be a reduction in your previous restore points of that place, you will re-update the virus, president more time!

5: Kaspersky dmp file is interrupted because of Kaspersky procedures after generation of temporary files, delete can rest assured, in no way affect the use of.

6: President Kabbah during the upgrade, it will affect the speed of Internet access, particularly for a greater impact on online games. Moreover, the failure of President Kabbah sometimes upgrade will keep repeatedly connect to the network, affecting the normal operation of the game. Is set to upgrade manually, can be avoided.

7: real-time monitoring of the document, Kabbah in default on all the networks set, all local disk, all the mobile disk are to monitor, if your computer configuration is not high, then the document can be customized monitoring, it Only monitoring system can be set, the other can be released, since in general can do a regular full scan. Laws are as follows: Open Kabbah's main interface options: setting - paper - custom - the scope of protection, the default for all local disk, all set in front of the net remove the hook, then right-click the "add" to open " My Computer ", select System-General is the C-], then under the" includes all of the folders "option in front of the hook bear, and then set point - OK - Application - determined that a completely OK.

8: If you are not using Microsoft's mail, can anti-spam features to remove.

9: win2000. win2003 installed Kabbah 6.0 need to download the orca. msi this change msi file tools, installation, its version of the 3.1.4000.1830, is win2003sp1SDK in the tool. 2 orca with open KIS6.0 or kav6.0, found LaunchCondition this Table, will MsiNTProductType = 1 or Version9X delete this line, then save msi file, you can installed in 2003.

10: installation repeatedly restart, this may be the computer out the existing anti-virus program firewall program did not fully uninstall the swap, these procedures manual uninstall out after re-install the test.

11: adsl users often broken network and unloading Kabbah after the Internet security suite normal, the general security suite Kabbah is due to the settings, select the "network attack against the defense," Kabbah detection has been attacked, the protective net off. Click on the "intrusion detection system" - "set up" and get rid of its default, "the prohibition of attacks on computer time" in front of that could be the hook. Here to explain to remove the blockade, only removed the blockade of the time constraints, the blockade is the same function effectively.

No. 1

12: 360 Jihuo Ma is activated KAV [Kabbah anti-virus software], if you like to activate KIS Internet security suite that is necessary to amend the registry, the registry in the HKEY_LOCAL_MACHINE \ SOFTWARE \ KasperskyLab \ AVP6 \ environment in the ProductType of the KIS into KAV it can use, but recommended key.

13: Kabbah Shazhu often hear the same sounds, is not feeling very不爽, and sometimes do not pay attention to also threaten his jump, to close Kabbah of "self-protection" and then to C: \ Program Files \ Kaspersky Lab \ Kaspersky Internet Security 6.0 \ Skin \ sounds, using their favorite to replace the original Wav files on the line.

14: Kabbah 6.0 KEY document was included in the blacklist, this situation is the result of President Kabbah updated server blocked this KEY, this time in service as long as the option to delete the original and re-KEY to add a The key to use it. It is also possible, the same Kabbah in a KEY part of the update on the server was blocked, but in another part of updating the server has not been closed, so you can choose再换KEY before the other servers to update try.

15: Kabbah after the installation of the virus prompted the damage

1, the system time to adjust your normal time.

2, follow the prompts to download the updated virus.

3, key damaged, replace the other can use the key.

4, Kabbah completely uninstall the software and installation directory and registry keys on the complete removal of President Kabbah, re-install Kabbah.

16: Kabbah antivirus after all EXE files are opened up, "Select Open With" tips.

Solution:

1, restart the computer in accordance with a command prompt F8 to enter the safe mode

2, the implementation of this order assoc. Exe = exefile [Note: assoc with. Exe between a space], the screen shows ". Exe = exefile"

3, now close the command prompt window, press [Ctrl + Alt + Del] key combination for a "Windows security" window, click Shutdown button to select the "restart" option, the normal mode is activated, all the EXE files can be a normal operation. This method applies win2000, winXP

17: If you are using the 163 like-mail and use FOXMAIL, Outlook Express software, you are set on, otherwise there might not be able to see your mail, or download e-mail attachments can not be the case

Method: Set - services under the network settings - port settings - found that the port for 80 items - the Xiaogou removed!

18: loaded KIS6.0 just friends, there will be a restart after you have not conducted a comprehensive computer scanning tips, but what if the shielding of the ads will prompt a pop-up box, you can not let it Then Tip: Choose: "services" and "Confirmation" of the hook to the front of it.

19: You can not uninstall the normal Kabbah solution

1, please stop the process

2, in the "services" to stop klblmain services, and startup type to "Disabled" [According to this need, if unloaded automatically install the interface, please do so in accordance with the above]

3, manually delete the following several folders: C: \ Program Files \ Kaspersky Lab, C: \ Program Files \ Common Files \ Kaspersky Lab, C: \ Documents and Settings \ All Users \ Application Data \ Kaspersky Lab [to Open hidden folders]

4, kaspersky do with the registry, keyword search, find deleted after. Of course, the registry can be used to delete the unloading specialized tools, such faster. Delete the registry and delete the folder does not require the order, and then restart the installation process, we must reopen!
Edit by: securitysofts

From "Edison Chen incident" read computer data security, experts teach you how to protect privacy

Edison Chen, "Yan Zhao leaked" the recent incidents of public opinion become hot spots, around the Yanzhao sources and leaked process, computer data security issues once again become a community-wide discussion of the topic. According to reports, Chen's computer may be sent to repair the leak led to Yan Zhao, then general users, enterprises and institutions should be how to protect their confidential information and date?
The rising data security experts said that the artist may have compromised Yanzhao three conditions: First, for service, not the private information from the hard drive to delete the second, delete means too simple, such as direct DEL keys Delete or format the hard drive; third, using a professional means delete, but was resumed with professional equipment. Rising data security experts have warned, no matter DEL delete or format the hard disk, not from the fundamental guarantee for removal of hard data, so the destruction of important data, we must seek assistance from professional security company.
Rising data security experts, data security services, including data recovery and data destruction, which are highly professional work. For ordinary users, be they computer failures, the virus caused the destruction of data loss, or delete their information professionals are likely to be fully restored. Therefore, if the user would like to restore, or removal of the important privacy of computer data, we must seek help from rising this brand security company, can be the appropriate services, protection of private information from disclosure. And the usual computer maintenance, to have the best brand of professional firms.
According to experts, the most advanced data recovery techniques, even from the hammer to drive in the restoration of the damaged part of the data. Therefore, contains important information on individuals and businesses drives, computers, hackers often become targets of the hunt. Some professional hackers will handle the waste from the enterprise hard drive in the restoration of confidential data, for sale abroad. Rising data security experts advise users and business units, storage of confidential information and computer hard drives should not be arbitrary treatment.
Experts suggest that for ordinary users speaking, the use of rising anti-virus software integration in 2008 "document to smash the" delete files after the function, can allow the majority of data recovery means failure. If more thorough in order to remove the data on your hard drive, you can turn to professionals such as rising data recovery, they have years of experience in data security, and will sign with the users of data in the process of destruction of private information confidential contract, you do not have to worry about The privacy of information leakage.
Edit by: Securitysofts

Break the speed limit

In today's attention to mission-critical applications and the immediate response of the generation, data delayed stifled the user experience. Gartner research institutions that delay is "the application performance of the silent killer", a delay hindered the user to enjoy the benefits of WAN, but also makes wide-area network (WAN) can not develop their potential. Therefore, service providers and users would like the issue of delay can be resolved, at the same time play the application's performance.

With the consolidation of IT resources and web applications for internal and external users by the change, customers have become very dependent on the smooth and safe transmission network in order to achieve applications. However, even when there are sufficient bandwidth, latency (network transmission document the time spent) will also reduce the efficiency of application.

Delay is a method to solve the realization of the entire WAN application acceleration, and strive to achieve the transmission speed local area network.

The wide area network optimization

Accelerate the application of a new generation of wide-area network optimization solutions. An application acceleration solutions may be a hardware, a package or two of the integrated. The Internet or by reducing the number of data transmission network, these solutions can accelerate application delivery. Through the use of sophisticated data compression algorithm that can achieve this purpose.

Reverse - positive cache technology is another way to accelerate the flow. Users do not have to have been from the remote server to receive, in their access client, hidden in local memory. By easing congestion and speed up SSL encryption so that the transfer protocol optimization, while addressing such as Microsoft's CIFS (a tedious document processing agreement, originally designed for LAN operations) of such general agreement document the problem. The rapid messaging (MAPI), the Microsoft Exchange Server and Outlook e-mail clients used by the agreement, is another benefit a lot from the acceleration of the agreement.

What is driving the demand for application accelerator »

Decentralized business model (in the traditional concept, which is a strategic approach) to promote the application of the threat accelerator market profit growth, become a potential corporate debt. Delay only accelerate the market for one of the factors, other factors including:

Server decentralization: the decentralization of resources could achieve the effective control is to comply with government regulations and ensure business continuity in the key. As the "Sarbanes - Oxley Act" (The Sarbanes-Oxley Act (SOX) and "The New Basel Capital Accord" (BASEL II), such provisions require companies to protect their critical applications and customer data ( As in the case of patients with medical information), control access to data and prove that they aim to achieve the protection of the measures taken and when applications, data and resources have been concentrated in a few regions, to provide for the protection of the highly decentralized state, More easily.

WAN Capacity: WAN link with limited bandwidth. When a user tries to spread throughout the enterprise network sent more rich content, such as page images, multimedia and other large-volume document, which has become one of the obstacles can not be ignored. Through consumption than traditional client / server at least up to 10 times the bandwidth, the traditional web application to the problem worse. Faced with the pressure, including the costs, IT managers can not expect only the help of additional bandwidth, we can find a way out.

Feasibility: not connected to data centers and enterprises in other sectors connected equipment, work will stop. To create a smoother-based applications, the network can understand a higher level (from 4-7) the content and services, transport services is bound to complete the conditions. Equally important is the uninterrupted operation in the workplace, there should be a number of branch offices and remote users connect the line to ensure uninterrupted business processes in the case continue.

Competition: because the manager or the end-user enterprises will deploy more applications, applications (the same requirements of the limited bandwidth) will intensify the competition between. This will lead to business-critical applications for non-critical communications traffic and slow down. Therefore, to ensure that application performance and reliability requirements of a fully compatible with a high degree of reliability of the wide area network optimization controller.


Security: As the mobility of employees, companies need to provide for their employees access to enterprise applications and other major decentralization of resources means security. In many cases, secure access must be extended to enterprises such as customers and partners such "an outsider."

Manageability: IT managers can not control or manage their invisible things. If IT managers fail to spread awareness of what is happening in the business, the ability to control or change their on how best to improve the performance there will be no clear concept.


Support: data replication and disaster recovery high on the feasibility of a key role. Since the establishment of enterprise data centers away from the support of the original location, so they can not send high-bandwidth, low-latency server, allowing the copying of data, can not meet their recovery point objectives of the request. Enterprises must overcome the technical obstacles, so as to avoid loss of data to ensure that in the event when faced with catastrophic events, to carry out a smooth switch.

Changing attitudes

Taking into account the trend and the driver of factors, wide-area Internet companies are re-visit the application accelerator, as part of its strategy to optimize and create new customer value and unique competitive advantages.

To Cathay Pacific Airways as an example. In order to support the future expansion of Cathay Pacific Airways need to upgrade networks, all from the private system needs to change public system. The system can use IP-based applications, improve customer experience. Companies selected Juniper Networks WX series WAN application acceleration platform is in order to accomplish this task. As a result, high-speed links, and do not respond to the demand for equipment upgrades, Cathay Pacific wide area network capacity increased by 68 percent, and the existing network to minimize interference and effective by eliminating the demand for more high-speed connections and equipment to update the savings Cost.

Another example is BuzzCity Pte Limited. Singapore-based BuzzCity Pte is a mobile applications and content delivery company. The company needs to support its core business of the Web current and future performance, while reducing the expansion of applications and hardware costs. By Juniper Networks DX Series platform, provide load balancing and application acceleration, the company can easily break through the heavy before the monthly 75 million to 90 million page views, while supporting up to 60:1 for the customer's server ratio.

The last whole year, Juniper DX and WX series series solutions in the IT industry was the rapid growth in profits. This reflects the return of the IP network operators expect traffic growth, its causes, including further strengthen the interaction and so on, the use of broadband, video and continuously enhance network reliability. IP network provider in which the strategy and their corporate customers is a key business tool. In addition, the market is showing a high-performance, integrated solutions development of the momentum to improve operating efficiency.

Application acceleration solution seems to be a change in thinking. The rules of the game is no longer guarantee the normal operation of a second time or output or even trading volume. Today's network goal is to provide users with compatible, high-performance, reliable and safe application of experience.
Edit by: Securitysofts

On a unified multi-threat security solutions

Increasingly complex security threats, continued to improve the regulatory requirements and continuous development of new applications to the enterprise network security has brought more new problems. As the management problems, increase the number of single-point solution is not always the best option. Fortinet's Asia Pacific vice president Jens Andreassen, consider the question is: How can we carry out a practical security gap analysis, and choose a suitable manufacturers to improve network security, and will not increase the complexity of management.

Every day in their efforts to safeguard network security IT managers face increasingly complex challenges, because they face the threat of more complex, the increasing burden of compliance, and new applications and technology has also brought more loopholes.

Hackers are now more concerned about the access to economic interests rather than Yangmingliwan, and organized crime in the network security in the struggle began increasing the proportion occupied. In addition, because the network layer to maintain sustained vigilance and have developed a variety of firewall and intrusion prevention system (IPS), therefore, not only confined to the security of the network, thereby including the content (data) layer.

Information security, anti-virus, anti-spam, Web filtering, anti-spyware technology needs… this list continues to lengthen, it is very difficult to keep up with this small business development speed.

Compliance with the protection of the guiding principles for IT managers have brought a heavier responsibility. They must not only adopt the latest technology to deal with potential threats, and must prove to make every effort to protect sensitive data and networks.

All kinds of traffic and activities must be recorded in the log, in order to review and prove their compliance, and also to facilitate evidence collection. This is for the rapid identification and repair of network security loopholes in the system is essential. These more weight to their burden.

Therefore, in order to fully enhance operational efficiency and gain a competitive advantage and business success, IT managers for their hard work and efforts to provide a better user mobility, interoperability and third-party network access capabilities.

The addition of new or upgrade existing applications to achieve the various new technologies to improve the basic, perhaps can improve business performance, but unfortunately, it also added a new attack loopholes.

Practical Network Security
IT security in general is only part of the overall IT budget, and the overall IT budget and the overall operating budget is only a small part. We need not only the threats of the business in accordance with the potential impact on their grade level, but also need to balance the budget in IT related technologies and products. All of this must be in accordance with the rules, to reduce capital expenditures and related operating expenses.

This explains the integration of all network security functions more and more interested in the reasons, because it can reduce the implementation of safety facilities and management of the complexity and cost.

But it also concerned about the unity of the IT managers to provide a practical approach in particular, the method can be summarized as the following three points:

1) security to be regarded as more networks and the availability of an important part of this availability enables users to complete its main business. In practice, security technology and products is how they choose to serve this objective decision. This approach is that the benefits of IT in accordance with the overall goals and core business easily make security decisions.

2) integration of many companies that manufacturers are "wholly or do, or do the whole", while some companies still insist on buying the best single totally different functional products. But the reality is: even if the integration of two or three functions can also bring significant benefits, such as reducing the complexity of management and reduce the impact on the environment (because less equipment) and generate a higher return on investment. These factors will help reduce the risk of network protection, so as to cope with equipment from different manufacturers result of the evolving security "threat situation."

3) no matter what the programme, must be the safety of existing investments added. This is almost needless to repeat the obvious, but too many manufacturers seem to think their solution is better than years of IT managers cautious investment, implementation, training and experience. The complexity of the management can never be totally avoided, but it can choose the right products to reduce.

Fix the network and found security flaws
Develop small-scale network integration plan and from the unified threat management as a means of benefit are: IT infrastructure will be divided into functional regional network, which the district can be physical (such as: data center or core network) or the logic (For example: visitors access or e-mail communication). Through this scheme, there will be able to figure out what kind of safety deficiencies, and to enable IT administrators ultimately determine the appropriate solution.

IT managers should ask a simple question: whether or not the function of regional networks using the appropriate products and technologies.
1) peripheral
2) Data Center
3) core network
4) ROBO / SOHO
5) secure e-mail communications
6) end

Neighboring
The network perimeter is the first line of defense is the focus of various external threats, particularly network and content on the criminal purpose of the external threats. The potential defect is common in VPN (IPSEC or SSL), firewall, intrusion prevention system (IPS) and various anti-virus solutions - throughput, availability, as the threat of procedure.

Data Center
Data Center has a variety of servers and applications to help business users work. Here is the greatest challenge throughput and real-time operation, in particular with important applications and content of anti-virus scanning on the throughput and real-time operation. If unable to keep up with security solutions, certain things will be slipped into the past, many users of the impact, if not all users.

Core Network
Core Internet challenges including high bandwidth and a large number of concurrent sessions, and the existence of small packets of real-time applications such as voice over IP (VoIP).

Many solutions that can be achieved on the 512-byte packet of high throughput. But in reality, when dealing with small packet performance usually decreased significantly. Although the main core network and firewall, VPN and the operation of the IPS, but the choice of the solution must provide scalable capacity, performance, high availability and redundancy. It belongs to speed up the network and content protection capacity of the ATCA hardware and dedicated ASIC processor areas.

Remote office / branch office (ROBO) and small office / home office
Remote office / branch office (ROBO) and small office / home office (SOHO) has brought many of the same issues, and also an increase of wireless networks and various access equipment (such as: DSL modem) roaming users and attack vulnerabilities , And other real-time voice and presence applications. For any programme to provide a small packet throughput of the inspection is very important.

Secure e-mail communications
E-mail is an important way to virus infection, resulting data is the main source of insecurity, the main legal disputes spread medium. In regulatory terms, advanced archiving is an important function, outside of the important content filtering to protect confidential information.

Terminal
Depth protection requirements on the network pay close attention to the various terminals: desktop computers, notebook computers and PDA, and so more and more. Security flaws in this area could damage the integrity of networks and applications, enterprises can meet the safety standards is the key. Guard against spyware and viruses the ability of particular importance. Personal Firewall and reliable VPN client can work together to increase protection.

Fully integrated
Measure unified threat management (UTM) solutions, regardless of network security features of the whole or in part, it is important to choose the manufacturers not only to provide a variety of security technology, but also to provide unified management, reporting and threat analysis. Otherwise, all kinds of totally different end product will still have the same management burden and operating costs an even greater impact.

Unified management, reporting and analysis
Security infrastructure management mainly involves the formulation of security policy, issued and implemented, and all parts of a variety of network security device configuration management. UTM solution should be able to provide a single management and control platform, a unified security features, strategies and configuration change control, thus realizing precise management control.

Strategic management of the reporting requirements of a strong, these features will be all kinds of equipment and technology integration activities, while providing network capacity and use of data to achieve a good network management. Scheduled and on-demand report, coupled with a large number of standard reports, means that when needed it easy to customize. These features include the relationship between the incident, evidence analysis and vulnerability scanning, and so on, in and management control platform more closely integrated, have become very important.

Unified Threat Research
Any UTM solutions are dependent on the timely updated summary of features, URL and other threats to information, so as to follow up the rapid evolution of the threat. Automatic Updates will be able to do this, but by the hour rather than daily updates service level agreements for the network to provide the best protection.

Aggregate
A unified security solutions, even if only two or three functions, but also able to network security concerns of IT managers to provide a method in their network infrastructure in the integration of a variety of new security technology. Solutions must provide a unified management and reporting control platform, all the functions of integration as one. Without these things, the solution can not be achieved lower operating costs requirements.

UTM should be end-to-end network solutions for comprehensive and uniform protection, the solution enables IT administrators the flexibility to apply to the use of environmental security features to protect various parts of the network.
Edit by: Securitysofts