Showing posts with label Security. Show all posts
Showing posts with label Security. Show all posts

Saturday, June 16, 2012

LinkedIn investigating reports of more than six million stolen passwords

ImageBusiness social network LinkedIn said it is investigating reports that more than six millionpasswords have been stolen and leaked onto the Internet.

Although LinkedIn did not confirm if any user data had been hacked or leaked, researchers at U.K. Web security company Sophos say they have confirmed that a file posted online does contain, in part, LinkedIn passwords ``hashes.'' That's a way of encrypting or storing passwords in a different form.

Graham Cluley, a consultant with Sophos, recommended that LinkedIn users change their passwords immediately.

LinkedIn has a lot of information on its more than 160 million members, including potentially confidential information related to jobs being sought. Companies, recruiting services and others have accounts alongside individuals who post resumes and other professional information.

JMD COMPUTER India - Outsourcing Website Development India - website development India - e commerce development India

There's added concern that many people use the same password on multiple websites, so whoever stole the data could use the information to access Gmail, Amazon, PayPal and other accounts, Cluley said.

As a precautionary measure, LinkedIn issued security tips in a blog post Wednesday. The company said users should change passwords at least every few months and avoid using the same ones on multiple sites.

LinkedIn also had suggestions for making passwords stronger, including avoiding passwords that match words in a dictionary. One way is to think of a meaningful phrase or song and create a password using the first letter of each word.

Cluley said hackers are working together to break the encryption on the passwords.

``All that's been released so far is a list of passwords and we don't know if the people who released that list also have the related email addresses,'' he said. ``But we have to assume they do. And with that combination, they can begin to commit crimes.''

It wasn't known who was behind such an attack.

Sunday, November 6, 2011

Laptop Tracker Software For Quick Heal Users - English Version


Saturday, July 16, 2011

Protect your Data, Passwords

artical PictureIt’s hard to remember multiple passwords and keep sensitive information secure in this digital age. Whether you use a Mac, PC or smartphone, various free tools can help you with this by securing all passwords with a master password, encrypting data and securely wiping any sensitive info explain Karan Bajaj & Hitesh Raj Bhagat

EXCLUSIVELY FOR MAC OSX
Encrypt This

Simply drag and drop the files/folders you want to protect onto the application’s icon. It will then ask you to set a password for accessing the files and then create a protected disk image of your content.
Get it from www.nathansheldon.com

Pastor
One of the simplest password managers for MAC, Pastor requires a master password to be set to access all the stored passwords and serial numbers. It even comes with a password generator.
Get it from www.mehlau.net

Password Vault Lite
This app stores all your passwords online and safeguards them with a master password. It can also run from a USB drive and features an auto-lock timer that locks the program after some inactivity.
Get it from www.lavasoftware.com

TXTCrypt
As the name suggests, TXTcrypt works for text and not for files. Simply type in any text (mails/notes), protect it with a password and share it with anyone. The receiver needs the password and TXTcrypt to decrypt and read it.
Get it from www.txtcrypt.com

EXCLUSIVELY FOR WINDOWS PCs
AxCrypt

An open-source encryption solution, AxCrypt integrates with Windows Explorer to give you encryption options with a simple right click. The developers also offer portable versions (to use on flash drives).
Get it from www.axantum.com/axcrypt

Crypt4Free
Crypt4Free is a small package that allows easy encryption and schredding (secure deletion) of files on your Windows system. It also compresses encrypted files to reduce size while sending.
Get it from www.aeppro.com

MyPadlock
MyPadlock locks down all your passwords using 128-bit AES encryption — all you need to remember is one master password in order to access all the passwords you have stored inside. Data is stored locally.
Get it from www.mypadlock.com

Zero Footprint Crypt
Equally suited to both beginners and experts, Zero Footprint Crypt works just like a file explorer (with the same tree-style/hierarchy structure). After encryption, you can also use it to securely wipe the original file from the drive.

Get it from www.goo.gl/k4oE4 Available across multiple platforms KeePass
Perhaps the most popular cross-platform password safe, KeePass is easy to use, totally free (open source) and uses the most secure encryption algorithms around.
www.keepass.info

Lastpass
LastPass not only stores all passwords and login data, it also stays synced across browsers, giving you access to your passwords wherever you are.
www.lastpass.com Password Dragon Written using Java, Password Dragon is a password manager that works on Linux and can even be stored on and launched from a USB flash drive.
www.passworddragon.com

TrueCrypt
TrueCrypt creates a virtual encrypted disk on the machine — you can add, copy, paste files into the drive and it encrypts onthe-fly. It can also be used to encrypt external drives.
www.truecrypt.org

Apps for Android
File Locker
File Locker comes with its own file browser. You can batch select and encrypt/decrypt files irrespective of size. It also allows you to open documents from within the app and notifies you if a file is left unlocked by mistake. The interface can be configured to either display all files, only locked files or only unlocked files.

Pocket
Pocket allows you to save login information for websites, bank accounts and so on under various categories. The application requires a master password to view the data stored inside and allows you to copy text while keeping it masked. This way no one can read your login credentials even if the app is left running.

Apps for iOS
Enlume

With Enlume Password Manager, you can store your passwords and other information in a categorised way. If you categorise the information you store, it also becomes easy to search. The data is then protected by a master password—if the password is incorrectly entered too many times, it locks down the app for 24 hours.

TheVault
The Vault is a password manager for iOS devices that keeps your login credentials secure. Apart from passwords, it can also store screenshots and photos as well. All the information is stored on the device itself and it also allows importing of data from other password storing applications as well.

Apps for BlackBerry
iLocker Lite

iLocker offers enhanced security by allowing you to lock any application with a password. It can be set to lock an application after the phone is locked, immediately and even at a scheduled time. This way, not only are all your applications protected, even the content inside the application is kept safe from prying eyes.

Password Manager
Password Manager Secret Server stores important passwords in an intuitive user interface that makes it easy to organise and access. You can create a favorite list of passwords or securely share a password with any one you want. A nice touch is that it shows you which password was recently accessed or modified within the app.

- JMDComputerIndia.com

Wednesday, July 13, 2011

How to remove new folder.exe virus from pendrive

If you are using pen drive for data transfer at school, college or at your office you must have come across this virus. This virus creates an exe file in your USB drive with the name New Folder.exe. Here are some symptoms of thremove new folder.exe virusis virus.

  • Task manager is disabled.
  • Registry Editor is disabled.
  • Folder options not working.
  • Taking too much time for accessing pen drive.
  • Uses half of your computers processing power.

You can easily remove this virus from your computer by using Smart Virus Remover tool. It is a small 550 Kb file. Just download the file from the link given at the end of this article. Run this downloaded exe by double clicking on it. Then click on “Delete Autorun.inf file”.

After that click on” Remove virus from USB”. The virus will be removed from your pen drive. To restore your task manager, registry editor and other things which were disabled by virus – click on “Restore Default Windows Settings”.

- JMDComputerIndia.com

Thursday, March 24, 2011

Intel launches second generation processor - Intel Insider

Intel today launched a second generation processor called Intel Insider, a feature that will help people download and view movies in High Definition (HD) on their laptops and PCs.

The PCs and Laptops with the Intel Insider processor would be available in the country from next month onwards, Intel's Managing Director, South Asia, R Shivakumar told PTI here.

'The launch of Intel Insider in India is absolutely befitting considering it is the home of one of the largest film industries in the world -- Bollywood. With Intel Insider, people can watch their favourite movies in HD at their homes on the day of release itself,' Shivakumar said.

In a bid to boost its sales, Intel has tied-up with Hungama.com, which will act as a platform for download and streaming of famous Bollywood and international movies, including blockbusters from Yash Raj Films , Paramount Pictures , T-Series and Reliance Home Video .

The introduction of Intel Insider is a significant breakthrough in the entertainment space where consumers can unlock an ever increasing and expanding world of high- definition content on their PCs, he added.

The technology also offers a 'proactive queue' capability that will help consumers pre-download films ahead of the release date, and give them the ability to purchase those films, securely, even if they are not connected to the Internet.

This will allow consumers to start watching their movies immediately on the release date without waiting to download during peak traffic times.

-JMD Computer

Nokia job cuts might begin from April end

The world's leading mobile phone maker Nokia said Wednesday negotiations with unions over upcoming job cuts would begin at the end of April.

'We don't have an exact starting date, but we are planning to begin talks at the end of April, and then we will of course talk about the numbers,' company spokesman Tomi Kuuppelomaeki told AFP.

Nokia has not yet said how many of its 16,000 developers worldwide it will let go as part of a new corporate strategy to phase out development of its smartphone platform Symbian.

On February 11, chief executive Stephen Elop announced the company would begin adopting Microsoft's Smartphone platform instead, resulting in 'substantial' job losses.

The move was a dramatic strategy shift aimed at streamlining a company that has so far been steadily losing ground on the Smartphone market to Apple's iPhone, RIM's Blackberry, and phones running Google's Android platform.

The announcement sent shock waves through Finland, where most of the company's Symbian development is done, and where around 20,000 people work for Nokia.

Some industry analysts have speculated that up to 6,000 jobs could be at risk, with hundreds or thousands more lost among subcontractors.

-JMD Computer

Wednesday, March 23, 2011

9 Things you can do with Wi-Fi

Wi-Fi can be used for a lot more than just connecting to your computer or phone to the internet. The technology can come handy for a variety of other tasks.
Here are nine little-known uses of Wi-Fi.

Make DTH signal go the distance
Monsoon Multimedia's Vulkano is a device that connects to (and controls) your existing DTH set top box (STB).

It has to be set up so that the STB outputs to the Vulkano, while the Vulkano is connected via HDMI to the TV.

You can watch TV normally, but Vulkano also lets you stream your existing TV, which you've already paid for, to any internet-connected PC, Android phone or iPad/iPhone/iPod Touch.

Whether you're within your Wi-Fi connected home, or anywhere in the world, you can connect to the Vulkano box, switch on the STB and watch or record live TV.
If you have a recorder like TataSky+, the Vulkano box can also be used to schedule a recording on it.

At $280, this is a cool new way to make your TV channels go the distance.

Control DSLR over Wi-Fi with your iPhone
If you have an iPhone or iPod Touch, an app called DSLR Camera Remote by OnOne Software ($19.99 for the pro version, $1.99 for the lite) can work as a remote viewfiner and shutter release for one of the compatible Nikon or Canon DSLRs.
Connect the DSLR to a PC using USB, download and install the client software and then the app on the iPhone/iPod.

As long as both the iPhone and the PC are on the same wireless network, you'll be able to see what the DSLR sees, even in another room.
Apart from actually taking the photograph, you can also control the exposure and various other settings remotely.

Turn webcams into surveillance cameras
An app called iCam ($4.99) for the iPhone, iPad or iPod Touch can be used to remotely monitor your home when you are away.

You need to install the free iCamSource software (available for Windows & MAC) on each laptop or PC that you want to use, and then configure it to the iCam software in a simple , two-step process.

You can configure up to 12 different webcams with each iPhone, and view the feeds from four of them simultaneously. Like a high-end surveillance system, iCam also offers push notifications.

The app continuously monitors the camera feeds for movement. If movement is detected, a message will pop up informing you of the same.

Share Net connection using Wi-Fi
Free program called Connectify turns your Windows 7 machine into a Wi-Fi hotspot.

Download Connectify from connectify.me and set it up by giving your Wi-Fi network a name and password, just as you would with a regular Wi-Fi router.

So whether your laptop is connected via Ethernet or to a USB broadband modem, you can share internet with other nearby laptops or devices like Wi-Fi enabled phones, iPods and tablets.

Similar functionality can be found on smartphones like the Samsung Galaxy S and HTC HD2; both have built in software that lets you share your GPRS connection with other Wi-Fi devices in the vicinity.

Transfer photos from digicam to PC
Imagine a memory card for your digital camera that never ran out of space. That's what the Eye-Fi wireless SD can do for you.

The card packs in regular flash memory and a Wi-Fi adapter into a standard SD card that can fit many digital cameras.

When you first get it, you need to configure the card to your Wi-Fi network by connecting it to a PC.

You can also configure it with Flickr, Picasa, Evernote, YouTube, Snapfish, Photobucket and many more.

When you get within range of your configured Wi-Fi network, photos and videos stored on the card will automatically get transferred to your computer or connected site.

The 4GB Eye-Fi SD card is available for 3,800 (including customs & delivery) from eBay India's Global Easy Buy program.

Note: Although Eye-Fi is supported by over 1000 camera models, before buying, do check the compatibility list on the company website.

Send photos to digital photo frame
The iGala Wi-Fi photo frame looks just any other 8-inch photo frame. But it's actually pretty advanced.

Based on Linux, the touchscreen can be used to configure it to your Wi-Fi network.

Sign in to your Flickr account on it to instantly have it display photos from your stream.

You could also use it just like any other photo frame, by displaying images from the 1GB built in memory or external SD/USB devices.

Available from Thinkgeek.com for $240 (They ship to India; customs and shipping charges extra).

Make your own portable Wi-Fi hotspot
You may not always have an available Wi-Fi connection to get your fix. However , with the help of a handy new device, you can create your own Wi-Fi hotspot wherever you go.

The Tata Photon+ Wi-Fi is a small, battery-powered device that connects to Tata Photon's broadband network (just like the USB device) and instantly creates a portable Wi-Fi hotspot that can be used by up to five devices at a time.

It also has a single Ethernet port to connect to a desktop or laptop without Wi-Fi .

Buy the device for 6,499 and choose from a number of different plans starting at 500 per month.

Modern warfare with the Parrot AR.Drone
Designed solely for the Apple iOS platform, the AR.Drone is a toy quadricopter that you can control via Wi-Fi from your iPhone, iPad or iPod Touch.

The Drone broadcasts its own Wi-Fi network and connects to your iPhone/iPod once you download the free app.

Each pairing between an AR.Drone and iOS device is unique, so you can even have multiple Drones in the same area.

Meanwhile, two cameras built into the drone relay a live video feed directly to your iPhone/iPod so that you can send it along on reconnaissance missions (just don’t stray too far away).

Multiple AR.Drones can take on each other in a dogfight or a race around obstacles if that takes your fancy.

For indoor use, the supplied hull shield needs to be out on that surrounds the rotors and protects them from any impact against the wall or other Drones.

The hull can be removed for outdoor use.

The Parrot AR Drone is available from international reseller shopyourworld.com for 21,000 (including customs and all shipping charges)

Monitor entire house with Rovio
Rovio is a toy, but a pretty advanced one at that. The battery-powered, camera-toting and Wi-Fi enabled Rovio will wait patiently at home for your command. Connect to it from a remote location, and you'll see what Rovio sees.

You can also move Rovio around and use it to communicate with other people thanks to the built in speaker and mic.

Teach Rovio your home's layout by setting waypoints and Rovio can navigate to those preset locations all by itself.

And Once Rovio's battery is depleted, it can automatically back itself into the charging dock at home.

Available from http://jmdcomputerindia.com for $199 (They ship to India; customs and shipping charges extra).

Monday, March 21, 2011

CISCO - LINKSYS E-1000

GO WIRELESS AND EASILY PUT THE SPEED AND POWER OF WIRELESS-N TECHNOLOGY IN YOUR HOME…..

PRESENTING LINKSYS E-1000 WIRELESS N ROUTER……..

image

BEST FOR   : - 

STANDARD, QUICK TO INSTALL, WIRELESS – N CONNECTIVITY FOR SURFING THE WEB, SENDING EMAIL AND FILE SHARING….

BENEFITS : -

Ø WIRELESSLY SURF THE WEB AND SEND E MAIL.

Ø SHARE FILES AND PRINTERS

Ø QUICK SET UP

PASSWORD PROTECTED GUEST ACCESS, PARENTAL CONTROLS, ADVANCED SETTING

HOW WE DO IT :-

Ø WIRELESS N TECHNOLOGY WITH 2 INTERNAL ANTENNAS

Ø 2.4 GHz BAND OPERATION

Ø CISCO CONNECT SOFTWARE

Ø ADVANCED SECURITY AND FIREWALL PROTECTION

Specifications

Ø Standards                              :               802.11n, 802.11g, 802.11b, 802.3, 802.3u

Ø Ports                                      :               Power, Internet, and Ethernet (1-4)

Ø Buttons                                   :               Reset, Wi-Fi Protected Setup

Ø LEDs                                    :               Ethernet (1-4), Wi-Fi Protected Setup, Wireless, Internet, Power

Ø Cabling Type                           :               CAT 5e

Ø RF Pwr (EIRP) in dBm                :               17.5 dBm

Ø Antenna Gain in dBi                 :               1.5 dBi

Ø UPnP able/cert                       :               Able

Ø Security Features                  :               WEP, WPA, WPA2

Ø Security Key Bits                   :               Up to 128-Bit Encryption

Environmental

Ø Dimensions                           :               7.95" x 1.34" x 6.3" (202 x 34 x 160 mm)

Ø Weight                                   :               9.81 oz (280 g)

Ø Power                                    :               12V, 0.5A

Ø Certification                            :               FCC, CE, IC-03, Wi-Fi, Windows 7

Ø Operating Temperature             :               32 to 104°F (0 to 40°C)

Ø Storage Temperature               :               -4 to 140°F (-20 to 60°C)

Ø Operating Humidity                  :               10 to 85% Noncondensing

Ø Storage Humidity                    :               5 to 90% Noncondensing

Please call for any support or inquiry….

Sunday, March 13, 2011

BELKIN Play Max wireless router

One of the best routers available today with just one flaw. The name ‘Play Max’ raised our expectation before we actually tested this IEEE 802.11n based router and when we did it we were not at all disappointed, in fact disappointment came from other features.  image

Once out of box what you have in hand is a compact clean looking router with hidden antennas and single indicator light and WPS button in front for hassle free secure connection setup. Number of connection ports at back is where Play Max has edge when compared with other similar products; there are 5 gigabit ports (1xWAN, 4xLAN) which would be ample for any wired connection plus being gigabit would mean faster data transfer speeds.  2 USB 2.0 ports are also present at the back for connecting external USB based storage devices with FAT 16/32 and NTFS file system, USB printers are also supported by Play Max giving you ability to convert your USB based printer to network one.

Setting up this router was the simplest of jobs and a mere 3 step process with initial configuration provided in small booklet attached to box. To use most of the features of this router including using USB storage/printer you have to install router management software that would sit in task bar and add to CPU usage, which as per us is a major con of Play Max. The main issue we faced with the router was that it does not support plugging in a 3G USB modem.

To test the performance of this router which supports true dual band in 2.5 Ghz and 5 GHz  band respectively, we carried out two tests. First we used Qucheck 3.0 to test throughput, we connected one machine with wire to router and other wirelessly to N based laptop (both laptop and machine were running Windows 7) and then checked throughput over TCP protocol. Play Max was able to transfer 1000 Kb payload at 64 mbps which is one of the best scores we have seen. In second test we transferred 40 MB of mixed data from machine to laptop; Play Max was able to complete this transfer in 4 seconds which is again very high when compared to other products. We also tried using the router to stream HD videos from a windows media center to an Xbox 360 over WiFi, and it worked great.

Besides performance and features there are number of bundled utilities for different purposes like torrent gene for downloading files to external storage, bit boost for traffic prioritization, music mover for wireless music play from external storage. All in all, a high performing router with not so user friendly bundled software.

Friday, March 4, 2011

Interesting story behind Trojan Horse

We all have heard about the viruses named Trojan Horse, Trojan Horse is a kind of virus which appears to perform it’s intended tasks, But silently steals all the information from your computer or harms your computer in a way which may be difficult to recover.

Interestingly I got to know a story about the name Trojan Horse virus, Here it goes…

In Greek Mythology they believe there was a city called, City Of Troys & there was other kingdom of Greeks. They fought for about 10 years and the war was called the Trojan War. After 10 years of fight the greeks still had nothing in their hands, it was a fruitless siege , So the greeks declared that they quit from the War.

Now the greeks built a giant horse made of wood & gave it as a trophy of victory to the citizens of Troy called TROJANS. The trojans happily took the horse inside the city. On the same night the trojans were busy celebrating their victory while 30 soldiers who were hiding inside the Giant Wooden Horse came out  & opened the city gates for the Greek Army. The Greek army then destroyed the entire troy city.

Since then everything that causes the target to bring a vulnerable object in to a secured area is referred as a Trojan Horse. Hence the name Trojan Horse is given to viruses that pretend to be something else, but once they are inside the system they start messing up the entire system.

SvcHost Exe process info & virus details

What is an SVCHost.exe file? & What is it doing in your task manager?

An svchost.exe file is a windows generic host process & is there for a good reason, This files is a native integral part of the windows operating system. It basically supports various windows services running from the Dynamic Link Library (DLL) files of windows. The services that may require SVCHOST.Exe include Windows Firewall, Automatic System Updates, Windows themes , Plug and play, Fax & printer services & many more. These services ideally start automatically when the windows system starts. These files are found in all windows operating systems launched after windows 2000 NT. (i.e Windows XP, Vista & 7).

clip_image001

When your windows system boots, The Svchost.exe file checks the windows registries & automatically builds a list of services that needs to be loaded. Usually each SVChost.exe carries different services from windows. If you find multiple SVChost.exe files in your task manager, there is nothing to worry about, it’s absolutely normal for windows to run multiple svchost.exe simultaneously.

SVCHOST.exe Virus & Removal

It is possible for malicious software’s to modify the windows registry & make SVCHOST.exe process to load the wrong malicious .dll files. Which will endup in making your computer or network affected with viruses and malewarez.

Another common approach is those viruses files are names SCVHOST.exe did you see the difference in the filenames? SVC vs SCV??

What this file sCvhost.exe does is that it allows hackers to access all your personal information, This is a virus of tye W30/Agobot-S, You may also call this a trojan horse. Since it hides itself with a genuine process name.

How to remove Svchost.exe virus or sCvhost.exe virus:

1. Removing the Svchost virus can be a very tedious task, Though i personally managed to somehow remove the virus using advanced tactics, It is not recommended that you try and follow the same, Because a single mistake could lead to a damaged Operating system, Which would be difficult to recover.

2. So instead of giving you the steps I find it appropriate to suugest you that you should use an Anti-virus to do this for you.

3. You can grab your self a free copy of antivirus over here (Norton Internet Security).

100% CPU utilization error in SVCHOST.EXE Process & Memory Leaks:

The first solution to this problem is that you may just want to restart the computer, Most of the times this will solve your problem, Another quick solution for this problem is to start the task manager & find the process causing this problem & then right click the process name and set the priority to low.

Saturday, November 13, 2010

Walkie Talkies FAQ

Q: Which radio band is right for me?
A: FRS Walkie Talkies are ideal for folks who generally wish to use these for outdoor purposes such as when hunting, fishing or camping. They are free of interference from business and government agencies and don't require you to have a license. GMRS have a much broader range for talk, extending up to five miles. These aren't intended for hobby use, rather they're meant for purposeful communications such as business or commercial activity. You must obtain a license from the FCC in order to operate in this band.

Q: What's the advantage of GPS-enabled Walkie Talkies?
A:
GPS units are equipped to map out your route, location and destination. These are ideal for the great outdoors to ensure your safety and prevent you from getting lost.

Q: What's the advantage of weather-alert enabled Walkie Talkies?
A: Weather-alert Walkie Talkies can provide you with advanced warning of severe weather to come. With an advanced signal to notify you of approaching storms, you can take the necessary precautions to make sure you and your family are safe.

Q: What brands manufacture Walkie Talkies?
A: There are a variety of brands on the market today. Here, on WalkieTalkies.com, we'll be carrying brands such as Audiovox, Cobra, Kenwood, Cherokee, Garmin Rino, Uniden, Midland and Sylvania.

Q: How do I know how what distance capability I'll need?
A: People who plan to use these for general outdoor activities such as walking or biking usually only need 2 or 5-mile capabilities. Same probably goes for business people who might use these at trade shows or the like. However, if the planned use is for greater distance activities such as hunting, hiking or camping, greater capabilities might be preferred to ensure safety and effective communication.

Q: What's the difference in channels?
A: Channels 1-7 are solely for use with the FRS/GMRS system. Channels 8-14 are solely for FRS and 15-22 is for GMRS. Some radios will only give you one Channel option where some will give you seven. Consider a 14-channel unit if you plan to use your radio in a large, urban environment where GMRS is already popular.

Walkie Talkie Distances

Size doesn't matter, right? Well, perhaps. But when comparing distance capabilities in walkie-talkies it sure does! There's the more common 2-mile and 5-mile units. And then theres the less common like the 7-mile, 8-mile or even 10-mile units. Your range of service needed really just depends on what your use will be. Hikers, for example, might prefer a greater range of distance.

image  image

The important thing to keep in mind when considering distance is that buildings, hills and other tall, solid structures can very easily get in the way of your transmitted signal. Distance is especially an issue with hunters, hikers and campers. FRS radios can grant you a range of up to 2 miles, whereas GRMS units can typically take you up to 5 miles. Just remember that the height of the antennae may be more important than the level of your radio's output power.

image

The greater distance units, like the 7-mile, 8-mile or 10-mile radios, may be more ideal for folks who generally do a lot of caravanning on road trips. The walkie-talkies would be great for outdoorsmen or hunters when they catch their target so they could buzz their buddies into helping them carry the large animal back to their vehicle.

Whatever the case may be, it's free two-way communications, where you don't have to rely on a cell-phone tower to get signal. With just the push of a button, you can easily get the attention of your friends, family and coworkers and get your message across. And you can do it knowing that in this case; when it comes to two-way radio distance range, size does matter.

Walkie Talkie Channels

How many channels do I need? Just like your radio or TV at home, walkie-talkies utilize channels to obtain their signal. FRS radios typically have either seven or 14 channels. Though, in most cases, the manufacturer will give you 38 possible CTCSS tones to use in the receiving and transmitting of your handheld radio. This means that, with a 14-channel radio, you could have up to 532 separate channel configurations or frequencies. GMRS units provide you up to 22 channels.

However, please note that when in a well-populated area, anyone with CTCSS disabled on their walkie-talkie will be able to hear your radio transmission on their radio. The tones, sometimes called interference or squelch codes, are meant to help prevent this. They help filter out static, noise and unwanted chatter on the two-way radio channels. Just select a predetermined channel and code, and you can communicate only with someone using the exact same channel and code. Just remember that your conversation may be semi-private and that privacy is not guaranteed.

      image     image

Channels 1-7 are solely for use with the FRS/GMRS system; including the more common 2 channels and 4 channels. Eight through 14 channels are solely for FRS, and GMRS gives you between 15 channels and 22 channels for a wide range of communication options. Even though FRS offers 14 channels, some radios come with only one channel and some with only seven. These radios can cost half as much and, for most people, be completely adequate. The sturdy single channel radios are good for business use. Other cheaper models with one channel are just toys. The one and seven channel radios generally have the GMRS interstitial frequencies and not the FRS-only channels. Consider a 14-channel unit if you plan to use your radio in a large urban environment where GMRS is already popular.

Having a 15-channel or more GMRS unit definitely provides you with more choices for your business communications. Though, if you're on an FRS/GMRS system, having 2 channels or 4 channels might suit you just fine. Be sure to determine your use and functionality before making your final selection.

Sunday, August 22, 2010

Fingerprint Time Attendance System - Time Counts In Office

Fingerprint Time Clock and Recorder to be used as a business clocking in/out  system for employees. No more cards, no more paperwork, no more hassle! This digital fingerprint access terminal and data logger registers finger prints for time management and can also work as an authorized personnel access device (door unlocking) when attached to electronic doors.

For Employment - The purpose of this device is to help employers and employees more easily record daily time worked. This model fingerprint time attendance unit helps companies to manage attendance records more easily (it comes with professional attendance software that lets you create different shifts, set holidays, and automatically create attendance reports showing who came late or left early, who took vacation, etc.) while allowing for company hourly and contract workers to more quickly Punch IN/Punch OUT while also not having to rely on inconvenient ID card systems devices because anyone can forget or lose a card, but you can't misplace your finger!

For Hourly Employers: The price of longed for work hours can be really high. Studies have shown which if we have twenty employees reception compensate for merely 4 mins of "wasted" time per day (coming in late, withdrawal early, lengthened lunches, etc.), which will sum 1600 mins per month. If your normal compensate rate is $12.00 per hour, afterwards we compensate an additional $320 any month for work which was never done. Add in an estimated employer grant upon supervision benefits as well as alternative taxes, afterwards your annual price is upon top of $5000 for which dull time. The resolution to stealing this mislaid time is Fingerprint clocking, a singular as well as cannot be common between employees.

Companies with large number of employees usually need to install several Time & Attendance machines. In this case, networking becomes important.Prices vary depending on needs, with a small business system costing a few hundred dollars/pounds and larger systems supporting many complex functions costing several thousands of dollars/pounds. A Time & Attendance System will protect a company from potential payroll fraud, provide electronic data and will give employees confidence in the accuracy of salary payments.

For HR - This fingerprint time attendance device is perfect for company HR Managers of any small or medium sized business. This device will work wonders in making your job easier while also making it possible to more closely monitor employee time, thereby saving your company money and time. Do you know what Buddy clocking is and how much it can cost your profitability? "Buddy-clocking" is when a co-worker clocks in or out for another employee. With text messaging and the widespread use of cell phones, it is easy and convenient for an employee to text a co-worker and say "hey, can you clock in for me, I'll 15 minutes late". Well, with the unit those days have come to an end! Now your company will be able to capture every minute of work you pay for.

Easy Access - Designed with 3 cool functions that lets you retrieve data through a network with TCP/IP, download data with a USB key, or connect to a computer with a USB cable, you have easy access to the machines stored data. View every entry and exit logs, along with individual personal details anytime you like – daily, weekly, monthly, whatever. The provided software allows the computer user to view a variety of recorded data such as; Employee History, Attendance Records per Dedicated Time Period, Group Scheduling Reports, Overtime Analysis, Early and Late Reports by Employee or Group, and many more. This function is immensely beneficial to any business and will assists your HR & Admin department to run like clock work with amazing efficiency.

Time counts - At a Glance…

BIO Fingerprint device (at ePathChina.com) is the most outstanding fingerprint identification terminal, which represents our state-of-the-art technology of processing fingerprints.


Unique super high-speed identification technology embedded, 5000 persons identified per sec. Never false identification has happened. Super-large fingerprint templates capacity 3000 /10000 /30000 versions for alternation.
Lock & Unlocks Doors Record Employee Attendance Security Level Integrated Registration View accessible Data over an TCP/IP network Download accessible Data Straight to a USB Flash Drive

The undiluted resale object to sell to your bigger clients or implement in your own office, click "Add to Cart" right away as well as let us boat we a single today. The electronics gadgets is in batch right right away as well as is accessible to we true from a leaders in bureau approach indiscriminate electronics, ePathChina.com.

About the Author

JMD Computer  - an author from JMDComputerindia.com - Do the biggest electronics wholesaler in India

(ArticlesBase SC #2930650)

Article Source: http://www.articlesbase.com/ - Fingerprint Time Attendance System - Time Counts In Office

 

JMDComputerindia.com

Sunday, May 2, 2010

Steps to Protect Your Computer..!!

1. Turn on automatic updates.

After installing your operating system, you usually forget to pay attention on operating system updates. If your operating system is not updated for protection against loopholes and security threats found after you installed it, your computer may be vulnerable to outside world. Hackers can get access to your computer by using these loopholes and they can do anything with your computer. So, to keep you safe, turn on automatic updates. When automatic updates are turned on your operating system is updated frequently and you will be safe from unwanted trouble. You can turn on automatic updates from Control Panel => Security Center => Automatic Updates. You must be logged in as Administrator to change this setting.

2. Turn on Windows Firewall.

Windows Firewall is a barrier between your computer and outside internet. It protects you by filtering incoming and outgoing traffic and allows only trusted programs to communicate through internet. You can turn on Windows Firewall from Control Panel => Windows Firewall. You must be logged in as Administrator to change this setting.

3. Install good anti-virus software.

Anti-virus software protects your computer from viruses that can damage your computer. Only installing anti-virus software is not enough. Your anti-virus software must be updated regularly with latest virus definition database, as new viruses are found daily.

4. Run windows in a restricted mode.

When you log in using a limited account, you are protecting your computer from various threats, as limited account runs in restricted mode and can not damage your computer by changing system files or registry. In fact, limited account can not install new programs and can not write to system files or registry, thus making you safe from unwanted programs which gets installed automatically from internet without your knowledge. Log in as Administrator only when you want to do some maintenance work or install new programs.

5. Do NOT click on untrusted links.

You should not click any link received in your email, unless you trust the sender. If you click on this untrusted links, it can take you to fake websites and can steal your user name, password, credit card details, or can install unwanted programs without your knowledge. Instead of clicking on the link you received in your email, copy the link address and paste it in a new browser window. Before writing your user name, password, credit card and any other personal details, recheck the domain name in address bar.

6. Do NOT write in pop up windows.

You should write your user name, password, credit card and any other personal details in main window only. If during your work, any pop up window opens asking your password or credit card details, close it immediately. DO NOT write your personal information in any pop up window.

- JMD Computer                                                  Give Comment

Tuesday, March 9, 2010

How to reset Trial period in Softwares

Many Software use  third party software like Sentinel or Win License for protection and licensing. These protectors will have functionality for trial periods also. Using this, many software gives 15 or 30days trial period after installation like Kaspersky. However there are software that can reset the trial period of such software. As you all know, the protection software will store the trial details in the Windows Registry. Finding and Decrypting the registry values is almost close to impossible when manually done. But a Software called “Trial Reset” can do this job for you. The software is free and it can effectively clear trial period of almost any protection.

This is how Trail Reset works

  • The host software will create registry keys, which contains the encrypted keys and details like trial date, system ID etc.
  • The registry cannot be found out manually, not it can be edited.
  • Trial Reset software will first locate the protection registry key
  • You can clear the key contents, and this will refresh the trial period

List of supported protectors

Protectors, ACProtect, ActiveMark, Armadillo, ASProtect, DBPE, EncryptPE, Enigma, ExeCryptor, ExeShield, eXPressor, ICE License, NoCopy, Obsidium, OneWay, Orien, PCGuard, ProtectionPlus, ProtectShareware, SafeSerial, SDProtector, Sheriff, SGLicense, ShareGuard, SoftLocx, SoftSentry, SoftWrap, STProtector,SVKP,Thinstall, VBOLock, VBox, VisualProtect, WinLicense, Xheo Licensing, XProtector and ZipWorx.

Click here to Download Trial Reset

Sunday, January 31, 2010

Hide Private Files and Folder On USB With WinMend

WinMend is a free tool which is the first free tool which lets you hide your private files and folder which you don’t want others to see while they access or use your USB Pen Drive. This works successfully to hide files and folders both on your computer and your Removable Drive.


This application has a very simple interface, which allows you to hide any folder or file not only computer, but even on the removable drive. All the files hidden with this tool will be securely hidden even when the USB drive is accessed in another operating system or at any other computer.


You can set password to hide files and folders using this tool, it has a very basic interface which is very simple to use too. So, hide your files and folders on go with this free utility.


Download WinMend

download button

- JMD Computer                                                       Give Comment

How to Kill Any Running Process From Desktop Shortcut

Yes you can kill (Terminate) any program or process running in windows simple by desktop shortcut to terminate the running process by forcefully end it with task kill command in windows. In this method I used to kill yahoo messenger as it keeps running under the processes, even after closing yahoo messenger completely or you can use this method to kill any hanged process in windows, through this way you can forcefully kill any process on windows instantly.

Here is how you can create a desktop shortcut to kill any process instantly In order to terminate the process instantly you will need to send some kill signal command using the some arguments with task kill windows command, Follow the procedure below

1. Right click on the empty area of the desktop and select New >> Desktop shortcut

2. Now copy and paste the following path in the target box

C:\Windows\System32\taskkill.exe –f –im

For Example C:\Windows\System32\taskkill.exe –f –im YahooMessenger.exe


Note:
a. –f is for force kill and –im is to kill all instances of any process

b. You can get to know the process name for any program through Task Manager under the Process tab . Press ctrl+shift+esc to open task manager.

3. Give a name to your shortcut and click

- JMD Computer                                                       Give Comment

Thursday, December 3, 2009

CRIME WATCH

(1) Today I passed by a building which has an ATM machine. There was an old man looking at me. Suddenly, he called me. He said he did not know how to read, so he gave me his ATM card and asked me to help him withdraw money from the ATM machine. I answered ‘NO! If you need help, ask the security to help you.’ Then he said ‘never mind…’ and continued to find other people to help him…

REMEMBER: ATM machines have CCTVs. If you help him he will later claim that you have robbed him or stolen his ATM card. Besides, his ATM card could be a stolen one. So please be careful of these tactics.

(2) Suddenly your house lights go off. From your window you find that your neighbors still have their lights. So you go out of your house to check the Meter Box. But once you open the door, a knife will be pointing at you and preventing you from closing it. This is when you will be robbed and injured.

REMEMBER: Even though your electricity suddenly goes off, DO NOT opens your door immediately. Look around to see if there is anything unusual or if there is any noise around.

(3) This is another incident. You may have heard about it before; it is about a lady who saw a kid crying by the roadside. When she spoke to the kid, the kid told her he was lost and wanted her to take him home. The kid even gave her a paper with his house address. So she took him home. But when she rang the door bell, she had an electric shock. Later when she woke up, she was naked in an empty room.

REMEMBER: Being such a compassionate and helpful person might not be a good thing these days. Girls, please be careful. DON’T BE TOO KIND!

(4) One day, there was an old lady outside my house holding two packets of sweets. At first I thought she was our neighbor and wanted to give us these packs of sweets as a gift. But then when she spoke, I realize that she was foreigner. I could not understand what she was talking about. I guessed she must be asking for money. I sensed there was something wrong and immediately closed the door and ignored her. Later, I found she and an accomplice robbed someone else down the road.

(5) I was at the ATM machine to withdraw some money. Behind me, there was an old lady. She asked me whether I was able to withdraw my money because she said she had problem with the machine. Suddenly a small girl came up beside me. The small girl was tugging and squeezing in front of me. I thought she was just naughty and playful. But then, the small girl placed her hand inside the tray of the ATM machine where the money was being dispensed out; ready to take away my money. I sensed something wrong and immediately pushed her away. Later I realized that the small girl and the old lady worked hand in hand together. She was trying to steal my money while the old lady was trying to distract my attention by asking me questions!

REMEMBER: BE VERY CAREFUL when you are at an ATM machine and be alert. Look out for anyone suspicious around you!

(6) My parents are retired and stay at home most days. One afternoon, a young stranger went to their house and said his motorcycle had no more fuel and the petrol station was too far away, for him to push his bike there. So he asked my parents for an empty coke bottle to buy some petrol. He said he will pay RM2 for the bottle. So my mum gave one coke bottle to him. He really took out the money from his pocket, but it was a RM 100 note. He told my mum he had no small change and asked my mum to give him the change. Luckily my mum was smart. She just told him to take it for free.

REMEMBER: obviously that note is fake! Who would want to pay for RM2 for an empty coke bottle! It’s very OBVIOUS that that stranger was a trickster.

(7) This happened in Bali. A newly married couple was having their honeymoon at the hotel. When both were in the changing room, the wife suddenly went missing. The husband was very anxious and went around finding her. He asked the hotel staff to help him find her. Then he thought his wife was just playing hide and seek. So he went back and waited for his wife. After a few hours, he decided to call the police. Three weeks passed and there was still no news about his missing wife. So he went back and was very disappointed and sad. A few years later, he came back to Bali, to watch a ‘FREAK SHOW’ in an old house. He saw a dirty and rusty metal cage. Inside there was a lady without limbs. Her body including the face was full of scars. When he had a closer look at her face, he was shocked to find out that she was his missing wife caged there and used for begging.

(8) This happened in Shanghai. A few years ago, a lady reported to the police that her cousin sister was missing in the shopping complex. But after five years, one of her friends found her cousin sister begging at the road side on one of the streets in Bangkok, Thailand. The worst thing was that her cousin sister had no more limbs and her body was tied to a lamp post with a shackle (metal chain).

(9) Let’s just shorten this story. DO NOT open your house door when you hear the sound of a BABY CRYING! It might be a trap! Women in the house must be alert to this form of trick. The police said it is the work of a robber or murderer using the recording of a crying baby to attract your attention. This normally happens at night and when you are alone in the house.

(10) I read an e-mail that was sent by my friend. Her friend, known as A, went to Luo Hu Commercial City with 2 friends, B and C. Luo Hu Commercial City is known as the Shenzhen counterfeit goods distribution center. There are many people there. It’s also near to the Shenzhen train station and Hong Kong’s Luo Hu Port. C went to the toilet at the shopping centre while A and B waited outside. After waiting for a long time they felt uneasy and went into the toilet to look for her. When they went in, there was nobody inside. Both were scared and they called C’s phone. There was no reply. So they reported to the police. The police asked them whether they had seen anybody suspicious going into the toilet. Both said there was none and it’s impossible to bring a person out of the toilet without them noticing! Then I remembered seeing a cleaner pushing a trolley in, and then coming out of the toilet. The police told them that were not the first time such a thing happened there. The police suspected a gang of criminals who were always attacking women in the toilets of shopping complexes. They use cleaners to kidnap people to harvest their organs for sale.

REMEMBER: please be careful when using the toilet. Do not go to the wash room or toilet ALONE! Please at least have a partner with you.

- JMD Computer                                                       Give Comment

 
Design and Bloggerized by JMD Computer