Monday, April 25, 2011

How to clean up the junk on your PC

MUNICH: It's a familiar problem for anyone with an older computer: a PC may run lightning-fast and smooth when it's new, but over time it starts coughing up unusual error messages and unidentifiable icons appear on the taskbar. If the computer also starts getting slower at the same time as well, then it's time for a spring cleaning. 'When any computer is used under normal circumstances, a certain volume of garbage data is automatically produced,' says Harald Goerl, a professor for operating systems and computer architecture at the Bundeswehr University in Munich, Germany. Goerl nevertheless sees no need for routine clean-ups. 'You only need...

Thursday, April 14, 2011

U.S. shuts down massive cyber theft ring

(Reuters) - U.S. authorities claimed one of their biggest victories against cyber crime as they shut down a ring they said used malicious software to take control of more than 2 million PCs around the world, and may have led to theft of more than $100 million. A computer virus, dubbed Coreflood, infected more than 2 million PCs, enslaving them into a "botnet" that grabbed banking credentials and other sensitive data its masters used to steal funds via fraudulent banking and wire transactions, the U.S. Department of Justice said on Wednesday. The government shuttered that botnet, which had operated for a decade, by seizing hard drives used to run it after a federal court in Connecticut gave the go-ahead. "This was big money stolen on a large scale by foreign criminals. The FBI wanted to...

Cyber attack hits WordPress.com, 18 million blogs compromised

Automatic, the company that owns the Word Press.com blogging platform that powers more than 18 million blogs, announced this morning that its servers had been broken into and source code, among other things, could have been exposed.   Word Press founder Matt Mullenweg writes 'Tough note to communicate today: Automatic had a low-level (root) break-in to several of our servers, and potentially anything on those servers could have been revealed.' According to Mullenweg, the break-in was limited but proprietary information could have been accessed: We have been diligently reviewing logs and records about the break-in to determine the extent...

Tuesday, April 5, 2011

Vibrant Mehsana

img alt="" galleryimg="no" loading="lazy" onload="var downlevelDiv = document.getElementById('78f00510-f2e9-4e6d-b322-b625913cc073'); downlevelDiv.innerHTML = "";" src="//lh6.ggpht.com/_B9cueL6JU0Q/TZoSvcLe0fI/AAAAAAAAFKk/ilNsUMNXjgk/rw/video515acea3c631%5B3%5D.jpg?imgmax=800" style="border-bottom-style: none; border-left-style: none; border-right-style: none; border-top-style: none;">Vibrant Mehsana...
Page 1 of 30012345Next

 
Design and Bloggerized by JMD Computer