Tag Archive: Security Devices



Google announced that it is making a pre-release version of the Android 1.5 SDK available to developers. This next version of Android is based on the Cupcake branch of the open source mobile platform and introduces a bunch of APIs for features such as the promised on-screen keyboard, video recording and playback capabilities, and a new home screen framework for developing widgets and populating live folders with custom content.

Google Android

Google Android

Google’s own applications on the platform have also been tweaked to offer a number of usability and performance enhancements. For developers, applications will reportedly be easier to write and much more robust, with better debugging capability and virtual testing. You can see the full list of feature improvements here. No word on when all this will actually be available on existing Android smartphones, or if it’s intended for future devices only, but the Open Handset Alliance says it will be releasing a series of articles in the coming weeks to highlight new APIs and help developers prepare their applications for the release of Android 1.5.

Advertisements

Summary

Email Scam
Email Scam

 

 

Email provides us a convenient and powerful communications tool. Unfortunately, it also provides scammers and other malicious individuals an easy means for luring potential victims. The scams they attempt run from old-fashioned bait-and-switch operations to phishing schemes using a combination of email and bogus web sites to trick victims into divulging sensitive information. To protect yourself from these scams, you should understand what they are, what they look like, how they work, and what you can do to avoid them. The following recommendations can minimize your chances of falling victim to an email scam:

 

·         Filter spam.

·         Don’t trust unsolicited email.

·         Treat email attachments with caution.

·         Don’t click links in email messages.

·         Install antivirus software and keep it up to date.

·         Install a personal firewall and keep it up to date.

·         Configure your email client for security.

 

These recommendations are explained in the section “What You Can Do to Avoid Becoming a Victim.” Ignoring them may leave you vulnerable to identity theft, information theft, the abuse of your computer for illegal activity, the receipt of bogus or illegal merchandise, and financial loss.

 


How Safe Your Computer?

How Safe Your Computer?

Computer security is a field of computer science concerned with the control of risks related to computer use. The means traditionally taken to realize this objective is to attempt to create a trusted and secure computing platform, designed so that agents (users or programs) can only perform actions that have been allowed.

 This involves specifying and implementing a security policy.

The actions in question can be reduced to operations of access, modification and deletion.

Computer security can be seen as a subfield of security engineering, which looks at broader security issues in addition to computer security..

For more information about the topic Computer security, read the full article at Wikipedia.org, or Visit www.infonetzsecurity.com.