Rabu, 18 April 2012
YAHOO! rise to new applications
YAHOO! increase the quality of services to the user by presenting a new application on its web pages, which is Yahoo Mail, TV widget and Zimbra. The addition of these new applications is part of inistiatif Yahoo! To make its services more rich.
As announced in December last year, Yahoo is now paving the way for outside developers and integrate with the features of social networking sites.
Yahoo also adds to the application of blogging wordpress site so that users could post or update their blog without having to exit from the yahoo page first.
Users can also edit and share photos with Picnik and e-mail storage capacity will be larger with a capacity of 100 MB free from the Zumo. For widgets that allow to see the video or television broadcasts, Yahoo has added a Youtube channel to broadcast and some cable TV. They both provide access to the video and their site.
Most interestingly, Yahoo Zimbra also add content, the e-mail and open source software in collaboration with Yahoo!. With this application users can automatically save e-mail in the form of the document.
Proxy Server on Squid
Explanation of terms transparent and transparent proxy cache depends on the instance, but we assume here that the context of HTTP Proxy / cache with transparent hijacking of port 80 which is an HTTP path that failed in the internet. The difference is that the cache include cache, but the proxy only proxies without caching. Transparent Overload has different meanings depending on the situation. The word can mean a plow setup port path 80 where klientnya try to go to another server, can also mean a transparent proxy which can not change the meaning / content of the request. there is no tool like transparent proxy, only the semi-transparent and there is no such tool trasnparan cache. Squid can be configured to act in a transparent. In this mode the client is not required to configure their browser to access the cache but squid will pick the right package and request a transparent cache.
Thing that can solve the biggest problem with using caching: encourage the users to use the cache server.
Advantages transparent caching:
Advantages and disadvantages of transparent caching completely the opposite of all that has been mentioned in the example for proxy caching. Advantage, the administration made easy to understand browser does not have to be configured to talk to the cache. Control center, users can not change the browser to complete the cache.
Losses transparent caching:
Not strong, because transparent caching depends on a stable path routed between the client with the original serveryang, in terms of path through the cache. This is the internet easily influenced to change - change in routing. In other words, if a relationship between the client with the cache set and routing changes occur which cause the client to take a path that no longer flows through a network of diverting, periods will stop and the user must fill out the page, if the routes in the internet then the result is uncertain will be more unpredictable.
User control,
Transparent caching takes away control from the user. Some users have biases are very strong and will change the ISP caching too late to avoid it.
Dependencies browser,
For transparent many successful operation depends on the browser cache provides a number of the original server name in the HTTP request header. This is necessary because the cache was not able to access the destination server IP address from the IP address of the original package, for that reason the cache disappeared. They could not determine the address of the original server to send permintaan.Beberapa initial browser / previously not provide this information and therefore will not work properly with transparent cache, but 90% of the browser puas.Dalam fact, many have observed that complement the network number HTTP is a significant demand for non cachetable fill (35-45%). Occurrence rate is proportional to the amount of cache contents are sent to non cachetable cache.
Selasa, 14 Juli 2009
USB FireWall 1.1.2
Download Now (1.88MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : Not rated
- Average User Rating : 2.5 stars (out of 9 votes) Rate it!
- Downloads : 46,086
- Operating Systems : Windows Vista, Windows 95, Windows Me, Windows XP, Windows 2000, Windows NT, Windows 98
- Additional Requirements : Windows 95/98/Me/NT/2000/XP/2003 Server/Vista
- Limitations : No limitations
- Date Added : April 08, 2008
From http://download.cnet.com/windows
DOWNLOAD HERE
ThreatFire AntiVirus Free Edition 4.5
Download Now (7.44MB)
Tested spyware free [Image]
Features
- License : Free (Buy it now)
- Editor's Rating : 4.0 stars
- Average User Rating : 3.0 stars (out of 236 votes) Rate it!
- Downloads : 1,250,365
- Operating Systems : Windows 2003, Windows Vista, Windows XP
- Additional Requirements : No additional requirements
- Limitations : No limitations
Publisher's description of ThreatFire AntiVirus Free Edition
From PC Tools:
Version 4.5 includes on-demand antivirus scanner, new Threat Detection map, System Activity Monitor for viewing detailed process information.
- Provided by: PC Tools
- Web site : http://www.pctools.com/
- Support web site: http://www.pctools.com/support/
- Support e-mail : support@pctools.com
- Support phone : 1-800-764-5783
From http://download.cnet.com/windows
DOWNLOAD HERE
Rising Antivirus 2009 Free Edition 21.22.30
Download Now (60.92MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : Not rated
- Average User Rating : 4.0 stars (out of 145 votes) Rate it!
- Downloads : 385,606
- Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows 2000, Windows NT, Windows XP, Windows 98
- Additional Requirements : No additional requirements
- Limitations : No limitations
- Date Added : January 30, 2009
Rising Antivirus
Software publisher profile
- Provided by : Rising Antivirus
- Web site : http://www.rising-global.com
- Support web site : http://support.rising-global.com
- Support e-mail : Not provided
- Support phone Not provided
From http://download.cnet.com/windows
DOWNLOAD HERE
PC Tools AntiVirus Free Edition 5
Download Now (21.67MB)
Tested spyware free
Features
- License : Free (Buy it now)
- Editor's Rating : 4.0 stars
- Average User Rating : 3.0 stars (out of 362 votes) Rate it!
- Downloads : 2,827,709
- Operating Systems : Windows Vista, Windows XP, Windows 2000
- Additional Requirements : Windows 2000/XP/Vista
- Limitations : No limitations
- Date Added : August 27, 2008
PC Tools
From http://download.cnet.com/windows
DOWNLOAD HERE
Multi Virus Cleaner 2009 9.0.1
Download Now (2.88MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : Not rated
- Average User Rating : 3.0 stars (out of 80 votes) Rate it!
- Downloads : 420,620
- Operating Systems : Windows 2003, Windows Vista, Windows 95, Windows Me, Windows Server 2008, Windows 3.x, Windows 2000, Windows NT, Windows 7, Windows XP, Windows 98
- Additional Requirements : No additional requirements
- Limitations : No limitations
- Date Added : April 22, 2009
Publisher's description of Multi Virus Cleaner 2009
Multi Virus Cleaner 2009 screenshot
From AxBx:
From http://download.cnet.com/windows
DOWNLOAD HERE
BitDefender Free Edition 10.0
Download Now (49.06MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : Not rated
- Average User Rating : 3.5 stars (out of 69 votes) Rate it!
- Downloads : 211,760
- Operating Systems : Windows Me, Windows NT, Windows 2000, Windows XP, Windows 98
- Additional Requirements : No additional requirements
- Limitations : No limitations
- Date Added : April 20, 2009
SoftWin
Software publisher profile
- Provided by : SoftWin
- Web site : http://www.bitdefender.com
- Support web site : http://kb.bitdefender.com/site/index.html
- Support e-mail : support@bitdefender.com
- Support phone : 800 388 8062
From http://download.cnet.com/windows
DOWNLOAD HERE
Avira AntiVir Personal - Free Antivirus 9.0.0.403
Download Now (30.8MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : 5.0 stars
- Average User Rating : 3.5 stars (out of 2497 votes) Rate it!
- Downloads : 47,461,059
- Operating Systems : Windows Vista 64-bit, Windows Vista 32-bit, Windows XP, Windows 2000
- Additional Requirements : No additional requirements
- Limitations : No limitations
- Date Added : June 19, 2009
From http://download.cnet.com/windows
DOWNLOAD HERE
AVG Anti-Virus Free Edition 8.5.374
Download Now (63.15MB)
Tested spyware free
Features
- License : Free
- Editor's Rating : 5.0 stars
- Average User Rating : 4.0 stars (out of 18901 votes) Rate it!
- Downloads : 204,782,083
- Operating Systems : Windows Vista, Windows 2000, Windows XP
- Additional Requirements : No additional requirements
- Limitations : No limitations
- Date Added : June 17, 2009
Software publisher profile
- Provided by : AVG Technologies USA
- Web site : http://www.avg.com/
- Support web site : http://www.avg.com/support/
- Support e-mail : Not provided
- Support phone : Not provided
From http://download.cnet.com/windows
DOWNLOAD HERE
Avast Home Edition 4.8.1335.90416
Download Now (300.94K)
Tested spyware free
Features
- License: Free
- Editor's Rating: 5.0 stars
- Average User Rating: 4.5 stars (out of 10876 votes) Rate it!
- Downloads: 51,421,154
- Operating Systems: Windows Vista, Windows 95, Windows Me, Windows NT, Windows 2000, Windows XP, Windows 7, Windows 98
- Additional Requirements: No additional requirements
- Limitations: No limitations
- Date Added: June 28, 2009
ALWIL Software
software publisher profile
* Provided by: ALWIL Software
* Web site: http://www.avast.com
* Support web site: http://forum.avast.com/
* Support e-mail: support@avast.com
* Support phone: Not provided
From http://download.cnet.com/windows
DOWNLOAD HERE
Rabu, 08 Juli 2009
Firewall Software
Name / Description | Type | Size |
Establish SSL tunnel(s) towards Defzone Firewalls or OpenVPN endpoints. | Free | 7.49 MB |
Get a packet filter for TCP/IP. | Free | 118.62 KB |
Protect your computer from all Phishing and Pharming attacks. | Free | 1.04 MB |
Online Armor Personal Firewall 3.5.0.14 Protect your system from parasites, viruses, and identity theft while surfing the Web. | Free | 10.29 MB |
PC Tools Firewall Plus 4.0.0.45 Protects computer from intruders. | Free | 6.1 MB |
Securepoint Personal Firewall & VPN Client 3.6.11 Protect your PC against attacks from the Internet. | Free | 1.43 MB |
Using Internet Security and Acceleration (ISA) Server 2000 as a Firewall 1 Learn how to design and set ISA Server. Tested spyware free | Free | 45.18 MB |
Detect and prevent intrusion from outside as well as internal attacks caused by Trojans.Tested spyware free | Free | 2.64 MB |
Protect your Internet connection from hackers and other security breaches. | Free | 26.48 MB |
Comodo Internet Security 3.9.95478.509 Protect your PC from harmful threats. Download Now (72.25MB). Tested spyware free [Image] | Free | 72.25 MB |
Next |
Free Download Database Tools
Free Download Database Tools
Free virus by Norton Internet Security 2008 Title | Licensi | Size |
---|---|---|
Crack Killer 1.2 Publisher's description Crack Killer is a database application that enables software authors to track and report web sites hosting cracks, serials and pirated versions of their software. To the program features referred solid database to keep track of active and killed sites; highly configurable SMTP e-mail complaint capabilities; DMCA complaint notice generator; IP check function to help identify relocating and reborn sites; support for multiple companies; HTML and CSV export and import; ability to run SQL queries on the database; database filtering. | Free | 1.07 mb |
EasyPHP 2.0 beta 1 PHP execution & development tool EasyPHP is a complete software package allowing you to use all the power and the flexibility that dynamic languages like PHP offer, as well as the efficient use of databases. Package includes an Apache server, a MySQL database, a full PHP execution, as well as easy development tools for your web site or your applications. | Free | 12.3 Mb |
EMS SQL Manager 2005 Lite for SQL Server 2.7 Publisher's description (From EMS Database Management Solutions ): EMS SQL Manager Lite for SQL Server is a light and easy-to-use freeware graphical tool for MS SQL/MSDE administration. It has minimal required set of instruments for those users who are new to MS SQL server and need only it's basic functionality. It makes creating and editing MS SQL Server database objects easy and fast, and allows you to run SQL scripts, manage users and their privileges, simply edit SQL queries. Version 2.7 added more Database properties, DB Explorer: it is now possible to view brief table information in SQL Assistant. Possibility to modify the schema/owner in object editors. Incremental search has been added to a number of object lists. | Free | 13.28 mb |
Foxy SQL Free 1.1 Execute SQL commands and queries for any database. Publisher's description (From CHARONWARE ): Foxy SQL Free is a database script and query tool designed for DB professionals. It allows them to execute SQL commands and queries against any database. Connections: Native, ODBC, ADO. Supported DB: Oracle, MS SQL, IB, DB2, MySQL, PostgreSQL, Firebird, Sybase ASE and more. Key features: user-friendly interface, syntax highlighting, users can run queries, insert, edit, delete records, browse data. Version 1.1 may include unspecified updates, enhancements, or bug fixes. | Free | 1.81 mb |
MDB Browser and Editor 2.3 Modify Access databases with this SQL tool and editor. Publisher's description (From Jerry Fugini ): This application can be used to work with tables from databases created in Access 97 or 2000 in a manner similar to FoxPro 2.6. You can open tables or SQLs from a view window, browse, set, create or delete indexes, set relations, copy to text or another table, append from text or another table and delete records. The application does require some knowledge of SQL but makes the operations easier than having to write SQLs. Users can also create, delete and run queries. A help file provides all necessary information on how to use the dialogs. | Free | 5.28 mb |
Microsoft Data Access Components (MDAC) 2.80.1022.3 Enable universal data access for your Windows-family operating system. (From Microsoft ): Microsoft Data Access Components (MDAC) 2.8 contains core Data Access components such as the Microsoft SQL Server OLE DB provider and ODBC driver. This redistributable installer for the MDAC 2.8 release installs the same Data Access components as Microsoft Windows Server 2003. This release does not include Microsoft Jet, the Microsoft Jet OLE DB Provider or ODBC driver, the Desktop Database ODBC Drivers, or the Visual FoxPro ODBC Driver. | Free | 5.3 mb |
Microsoft Jet Database Engine 3.5 Update your copy of Microsoft Jet, version 3.51.0623, to version 3.51.3328.0. (From Microsoft ): The Jet35sp3.exe file contains an update of several DLL files that are included with Microsoft Access 97, Microsoft Office 97 Professional Edition, Microsoft Visual Basic (version 5.0 or later), and other products that incorporate Jet 3.5x. Microsoft Jet database engine version 3.51 provides an improved Compact utility that combines Compact and Repair into a single process. Also, the updated version of the Jet database engine generates an error if it encounters a problem during the Compact process, and then creates the table, MSysCompactError, in the destination database. | Free | 1.29 mb |
SQLyog 7.15 Manage MySQL databases. Publisher's description (From Webyog ): Import data from ODBC datasource, synchronize your database. Execute queries for updation of result. Copy databases between hosts. Generate Schema for your database. Manage Foreign Relationships and all options fully InnoDB compliant. Reorder columns. SQLyog is an easy to use, compact and very fast graphical tool to manage your MySQL database anywhere in the world. SQLyog is a tool that allows you manage MySQL database. | Free | 10.53 mb |
StarInix Database Compare 2.0.15 Publisher's description (From StarInix ): The Free Database Compare application will allow you to compare the structure of two databases and display all the differences between them. Supported databases include: SQL Server (All Editions), MySQL and Access databases. You can compare two different databases, like access and SQL 2000. It will also allow you to create snapshots of a database and compare a live database to a snapshot. A database structure viewer is included. Version 2.0.15 may include unspecified updates, enhancements, or bug fixes. | Free | 3.03 mb |
Writer's Database 1.2 Publisher's description (From Ultima Thule ): This program is a database system that enables writers to keep track of the works they have created, the potential publishers they have identified, and any submissions to those publishers. It allows you to quickly and easily see which works are awaiting submission, which submissions are outstanding, and which publishers you have tried. This version features minor bug fixes. Keep track of potential publishers with this databse for writers. | Free | 1.53 mb |
Next |
The key to network security: intrusion-prevention systems augment the defenses provided by firewalls and antivirus software
Today, enterprises should seriously consider integrating intrusion-prevention systems (IPS) as a critical element in existing security infastructure to thwart both internal and external network attacks. One of the most misunderstood threats is the one coming from inside the firewall--the credentialed user. The problem is compounded by mobile users with laptops that unwittingly obtain and release threats contracted from other networks they previously interacted with that are less secure than their own enterprise network.
In addition, there are an increasing number of unauthorized services, users and applications living on networks today. These include instant messaging, peer-to-peer applications, rogue e-mail, FTP and Web servers. Most companies have policies in place that prohibit these kinds of services; however, a lack of visibility increases the difficulty in policing this traffic, so many rogue services live on, and networks remain vulnerable.
For example, popular file- and music-sharing applications may open up ports and allow unauthorized back door access, increasing vulnerability. End-users have no idea they are downloading malicious code hidden inside the music, video or other file type.
Worms such as Sobig and Bagle propagate this way and can cause mass mailings to a user's personal contact list, or others can install applications like IRC bots that run at predesignated times and execute specific instructions to cause harm. For example, Internet relay chat bots can issue timed-distributed denial-of-service attacks (DDoS) on well-known Internet sites.
Today's networked businesses are no longer simple architectures requiring just a firewall and antivirus to protect the perimeter. Extension of the business network through virtual private networks (VPNs) and Web-enabled applications has blurred the distinction between internal and external users.
Most businesses are now highly interconnected, and advances in networking and communication technologies, combined with Web-enabled applications, have reduced the financial barriers or the traditional "cost of connectivity." Inexpensive access has created highly efficient communications with both partners and employees, bringing together the right people with essential data and applications at the optimal time.
The benefits of these connections are obvious; however, they come with little control over the security at these "semi-trusted" networks. Traffic of these external networks should be rigorously monitored.
An offshore contractor, for example, directly linked into your software development group, may not be as vigilant regarding security and may deliver some infected traffic into the network. Having an IPS system in place would analyze and mitigate that traffic before it could inflict any significant havoc.
Various emerging threats should cause concern for any network administrator, and could be combated in part or fully by an effective IPS installation. These include:
* Phishing (including pharming and spear phishing). These information traps require some human intervention; however, the reliance on spam to propagate gives the IPS a chance to contribute to their detection and disarming.
* Mobile malicious code. PDAs and smartphones are increasingly becoming targets for viruses and worms. Most of these devices are unprotected and must be monitored as their use for external network access increases.
* Blended threats. Worms with multiple infection and entry methods that require a combination of strong policies, updated signature files and visibility to stop their lightening-quick movement.
* Industrial system security. Power and gas companies, traditionally siloed networks, are becoming internet-worked and increasingly customer facing, which opens up these vital services to external threats.
Today's IPS products support multiple detection methods (signature, protocol anomaly and behavioral anomaly), as well as addressing a range of performance needs. These systems are effective in protecting against a wide range of threats from both inside and outside the network. The real challenge that an IPS faces is in its ability to:
* monitor and manage an ever-increasing volume of network security data;
- handle a large volume of threats from multiple IPS devices across large enterprise networks; and
- validate attacks with aggregation and correlation of information from devices like intrusion-detection systems (IDS), firewalls and vulnerability-assessment devices, including accurate analysis and actionable reporting.
IPS solutions should scale to manage the volume of security threats occurring across the network. Functionality that aggregates and correlates large amounts of data in real time across hundreds of distributed IPS units is essential. Future IPS requirements will include the ability to collect and analyze threats and data from other devices, such as firewalls, IDS and vulnerability-assessment tools. Improved reporting functionality, including real-time flow monitoring that captures and analyzes every packet flowing through the network, will also become increasingly critical over time.
Rabu, 01 Juli 2009
Database Tools
(from wikipedia free)
A DBMS is a set of software programs that controls the organization, storage, management, and retrieval of data in a database. DBMS are categorized according to their data structures or types. It is a set of prewritten programs that are used to store, update and retrieve a Database. The DBMS accepts requests for data from the application program and instructs the operating system to transfer the appropriate data. When a DBMS is used, information systems can be changed much more easily as the organization's information requirements change. New categories of data can be added to the database without disruption to the existing system.Organizations may use one kind of DBMS for daily transaction processing and then move the detail onto another computer that uses another DBMS better suited for random inquiries and analysis. Overall systems design decisions are performed by data administrators and systems analysts. Detailed database design is performed by database administrators.
Database servers are computers that hold the actual databases and run only the DBMS and related software. Database servers are usually multiprocessor computers, with generous memory and RAID disk arrays used for stable storage. Connected to one or more servers via a high-speed channel, hardware database accelerators are also used in large volume transaction processing environments. DBMSs are found at the heart of most database applications. Sometimes DBMSs are built around a private multitasking kernel with built-in networking support although nowadays these functions are left to the operating system.