Zamzar.com online file converter adds browser plugin
Zamzar.com is a free online service that will convert video, audio, and documents. You upload the file, enter your email address, and Zamzar will send you a note when your new file is ready for download.
Well now it looks like Zamzar's got the online video bug, adding support for converting videos from YouTube and a number of other services. You can either enter the URL of the video, or use a new browser plugin to automatically find videos to convert on the page you're visiting.
Zamzar will allow you to convert files from YouTube, Google Video, Myspace, Revver, putFile, Break.com, Apple Trailers, Dailymotion, Metacafe, iFilm, Grouper, and Blip.tv. You can convert files to a variety of formats, including 3GP, FLAC, MP4, and AVI.
Sunday, October 5, 2008
Thursday, September 18, 2008
How to recognize spoofed Web site.
Site Spoofing
Some malicious individuals use phishing scams to set up convincing spoofs of legitimate Web sites. They then try to trick you into visiting these Web sites and disclosing personal information, such your credit card number.
Fortunately, there are several steps you can take to help protect yourself from these and other types of attacks.
What is a spoofing attack?
Spoofing attacks are commonly used in conjunction with phishing scams. The spoofed site is usually designed to look like the legitimate site, sometimes using components from the legitimate site. The best way to verify whether you are at a spoofed site is to verify the certificate.
Do not rely on the text in the address bar as an indication that you are at the site you think you are. There are several ways to get the address bar in a browser to display something other than the site you are on.
How to verify a site certificate
Always verify the security certificate issued to a site before submitting any personal information. Before you submit any personal information, ensure that you are indeed on the website you intend to be on.
You should find that the http://www. In the address bar has an S added to the address, like this https://www. This indicates a Secure site.
You should also be checking the yellow lock icon on the status bar.
This symbol signifies that the website uses encryption to help protect any sensitive personal information—credit card number or payment details—that you enter.
Secure site lock icon. If the lock is closed, then the site uses encryption. Double-click the lock icon to display the security certificate for the site. This certificate is proof of the identity for the site.
When you check the certificate, the name following 'Issued to' should match the site you think you are on. If the name differs, you may be on a spoofed site.
If you are not sure whether a certificate is legitimate, do not enter any personal information. Play it safe and leave the Web site.
Also, be cautious about clicking links in e-mail messages or in online ads from retailers you don't recognize or trust. If you have any doubt about a link, do not click it.
Instead, type the Web site address into the address bar of your Web browser, or try to confirm that the link is legitimate.
Remember, if an offer sounds too good to be true, it probably is.
Some malicious individuals use phishing scams to set up convincing spoofs of legitimate Web sites. They then try to trick you into visiting these Web sites and disclosing personal information, such your credit card number.
Fortunately, there are several steps you can take to help protect yourself from these and other types of attacks.
What is a spoofing attack?
Spoofing attacks are commonly used in conjunction with phishing scams. The spoofed site is usually designed to look like the legitimate site, sometimes using components from the legitimate site. The best way to verify whether you are at a spoofed site is to verify the certificate.
Do not rely on the text in the address bar as an indication that you are at the site you think you are. There are several ways to get the address bar in a browser to display something other than the site you are on.
How to verify a site certificate
Always verify the security certificate issued to a site before submitting any personal information. Before you submit any personal information, ensure that you are indeed on the website you intend to be on.
You should find that the http://www. In the address bar has an S added to the address, like this https://www. This indicates a Secure site.
You should also be checking the yellow lock icon on the status bar.
This symbol signifies that the website uses encryption to help protect any sensitive personal information—credit card number or payment details—that you enter.
Secure site lock icon. If the lock is closed, then the site uses encryption. Double-click the lock icon to display the security certificate for the site. This certificate is proof of the identity for the site.
When you check the certificate, the name following 'Issued to' should match the site you think you are on. If the name differs, you may be on a spoofed site.
If you are not sure whether a certificate is legitimate, do not enter any personal information. Play it safe and leave the Web site.
Also, be cautious about clicking links in e-mail messages or in online ads from retailers you don't recognize or trust. If you have any doubt about a link, do not click it.
Instead, type the Web site address into the address bar of your Web browser, or try to confirm that the link is legitimate.
Remember, if an offer sounds too good to be true, it probably is.
Thursday, April 10, 2008
Something new in your fight against the nongs.......
Threatfire
"ThreatFire 3's ability to block installation of malware strictly by identifying bad behaviour is phenomenal. It did a better (and faster) job than Norton AntiBot and even beat out Spy Sweeper, our current Editors' Choice for signature-based anti-spyware. This free tool is an excellent addition to your security arsenal."
- www.pcmag.com, October 2, 2007*
What is ThreatFire?
ThreatFire is zero-day security software designed for the average consumer. ThreatFire protects in real-time against viruses, worms, trojans, spyware, adware, rootkits, keyloggers, and buffer overflows. It is designed to be used alongside your current antivirus to protect you between antivirus updates. Because it is behaviour-based and not signature-based, ThreatFire protects against both known and unknown, or zero-day, threats. It is easy to install, painless to use, and immediately effective against today's computer security threats. And best of all, ThreatFire is free to all home users.
http://www.threatfire.com/Download/
"ThreatFire 3's ability to block installation of malware strictly by identifying bad behaviour is phenomenal. It did a better (and faster) job than Norton AntiBot and even beat out Spy Sweeper, our current Editors' Choice for signature-based anti-spyware. This free tool is an excellent addition to your security arsenal."
- www.pcmag.com, October 2, 2007*
What is ThreatFire?
ThreatFire is zero-day security software designed for the average consumer. ThreatFire protects in real-time against viruses, worms, trojans, spyware, adware, rootkits, keyloggers, and buffer overflows. It is designed to be used alongside your current antivirus to protect you between antivirus updates. Because it is behaviour-based and not signature-based, ThreatFire protects against both known and unknown, or zero-day, threats. It is easy to install, painless to use, and immediately effective against today's computer security threats. And best of all, ThreatFire is free to all home users.
http://www.threatfire.com/Download/
Wednesday, July 4, 2007
Play Safe when using a Public computer.
Don't save your logon information. Always log out of Web sites by clicking "log out" on the site. It's not enough to simply close the browser window or type in another address. Many programs [ especially instant messenger programs ] include automatic login features that will save your user name and password.
DO NOT use this option so that no one can log in as you.
Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.
Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.
Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have. But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief. If you really want to be safe, avoid typing your serial numbers, User names/Passwords, PIN credit card number or any other financial or otherwise sensitive information into any public computer.
Are public computers at libraries, Internet cafes, airports, and copy shops safe? That depends on how you use them! Take these tips to help keep your personal or financial information private.
DO NOT use this option so that no one can log in as you.
Don't leave the computer unattended with sensitive information on the screen. If you have to leave the public computer, log out of all programs and close all windows that might display sensitive information.
Watch for over-the-shoulder snoops. When you use a public computer, be on the look out for thieves who look over your shoulder or watch as you enter sensitive passwords to collect your information.
Don't enter sensitive information into a public computer. These measures provide some protection against casual hackers who use a public computer after you have. But keep in mind that an industrious thief might have installed sophisticated software on the public computer that records every keystroke and then e-mails that information back to the thief. If you really want to be safe, avoid typing your serial numbers, User names/Passwords, PIN credit card number or any other financial or otherwise sensitive information into any public computer.
Are public computers at libraries, Internet cafes, airports, and copy shops safe? That depends on how you use them! Take these tips to help keep your personal or financial information private.
Thursday, June 7, 2007
jdbgmgr.exe virus
You have received an eMail telling you about this virus.
The eMail identifies an obscure file found on tens of millions of PCs -- and it offers simple instructions on how to find the file in question.
The file uses a teddy bear as its associated icon, giving the impression that an immature hacker drew it.
Gullible users will assume they have found a dangerous virus -- simply because they WILL find this file on their PC.
So you're staring at this file on your PC. It's JDBGMGR.EXE, just like the eMail from your friend warned and your antivirus software says "no viruses found," What do you do.
We believe gullible users will trust their eyeballs over their antivirus software.
What will happen if we delete this file from our computer?
We posed this very question to Microsoft. Their answer: If a user has Visual J++ 1.x installed but JDBGMGR.EXE is missing, the net result would be that some Java programs wouldn't run.
Ok, before we do damage to our computer or send an eMail on to our friends. How do we check any eMail sent to us like this one to see if it is a hoax.
Just do a little checking before getting into a tiz be going to http://urbanlegends.about.com/ or http://www.truthorfiction.com/search.htm and do a search first.
The eMail identifies an obscure file found on tens of millions of PCs -- and it offers simple instructions on how to find the file in question.
The file uses a teddy bear as its associated icon, giving the impression that an immature hacker drew it.
Gullible users will assume they have found a dangerous virus -- simply because they WILL find this file on their PC.
So you're staring at this file on your PC. It's JDBGMGR.EXE, just like the eMail from your friend warned and your antivirus software says "no viruses found," What do you do.
We believe gullible users will trust their eyeballs over their antivirus software.
What will happen if we delete this file from our computer?
We posed this very question to Microsoft. Their answer: If a user has Visual J++ 1.x installed but JDBGMGR.EXE is missing, the net result would be that some Java programs wouldn't run.
Ok, before we do damage to our computer or send an eMail on to our friends. How do we check any eMail sent to us like this one to see if it is a hoax.
Just do a little checking before getting into a tiz be going to http://urbanlegends.about.com/ or http://www.truthorfiction.com/search.htm and do a search first.
Wednesday, May 2, 2007
Firefox keyboard shortcuts
Many Firefox keyboard combinations are the same as those of Internet Explorer. In particular, menu navigation uses the same combinations of arrow keys and Alt as most Windows applications, and navigation within text-editing fields supports the same keystrokes as most text editors (Ctrl+Left Arrow to move one word left, for example). Scrolling keys such as Page Up and Page Down work as you'd expect, too. The table below shows the major keys used by both browsers. (On the Macintosh, substitute Command for Ctrl and Option for Alt.)
Keyboard shortcuts common to Firefox and Internet Explorer
Key combination Use
----------------------------------
Ctrl+A Select all content
Ctrl+C Copy current selection
Ctrl+D Add a bookmark
Ctrl+H Display the History sidebar
Ctrl+I or Ctrl+B Open Bookmarks sidebar
Ctrl+N Open a new window
Ctrl+O Open a file
Ctrl+P Print current page
Ctrl+R or F5 Reload current page
Ctrl+Shift+R or Ctrl+F5 Reload current page from origin
Ctrl+V Paste currently copied content
Ctrl+W or Ctrl+F4 Close the current tab
Ctrl+X Cut the current selection
Ctrl+Y or Ctrl+Shift+Z Redo last operation
Ctrl+Z Undo last operation
Alt Begin menu navigation
Alt+D or F6 Focus and highlight the location bar
Alt+F4 or Ctrl+Shift+W Close current window
Alt+Home Go to home page
Alt+Left Arrow or Backspace Go back one page
Alt+Right Arrow or Shift+Backspace Go forward one page
Delete Delete current item
End Move to bottom of page
Esc Stop current operation
F11 Display in full-screen mode
Home Move to top of page
Firefox also has some unique keyboard combinations. The next list shows the common ones that don't match Internet Explorer.
Keyboard shortcuts available in Firefox only
Key combination Use
------------------------------------
Ctrl+hyphen Decrease text size
Ctrl+Plus Increase text size
Ctrl+0 (Ctrl+Zero) Restore text to normal size
Ctrl+Down Arrow Select next search engine in location bar
Ctrl+F or / Find content by search string
Ctrl+G or F3 Repeat last Find operation forward
Ctrl+J (Ctrl+Y on Linux) Open download manager window
Ctrl+K Search the Web using the current search engine and keyword
Ctrl+n (where n is a number) Go to the nth tab
Ctrl+S Save current page as file
Ctrl+T Open new tab
Ctrl+Tab or Ctrl+Page Down Move to the next tab
Ctrl+Shift+Tab or Ctrl+Page Up Move to the previous tab
Ctrl+U View page source
Alt+Enter Open URL in a new tab
F6 Move to next frame
F7 Toggle caret browsing
Shift+F3 Repeat last Find operation backward
Keyboard shortcuts common to Firefox and Internet Explorer
Key combination Use
----------------------------------
Ctrl+A Select all content
Ctrl+C Copy current selection
Ctrl+D Add a bookmark
Ctrl+H Display the History sidebar
Ctrl+I or Ctrl+B Open Bookmarks sidebar
Ctrl+N Open a new window
Ctrl+O Open a file
Ctrl+P Print current page
Ctrl+R or F5 Reload current page
Ctrl+Shift+R or Ctrl+F5 Reload current page from origin
Ctrl+V Paste currently copied content
Ctrl+W or Ctrl+F4 Close the current tab
Ctrl+X Cut the current selection
Ctrl+Y or Ctrl+Shift+Z Redo last operation
Ctrl+Z Undo last operation
Alt Begin menu navigation
Alt+D or F6 Focus and highlight the location bar
Alt+F4 or Ctrl+Shift+W Close current window
Alt+Home Go to home page
Alt+Left Arrow or Backspace Go back one page
Alt+Right Arrow or Shift+Backspace Go forward one page
Delete Delete current item
End Move to bottom of page
Esc Stop current operation
F11 Display in full-screen mode
Home Move to top of page
Firefox also has some unique keyboard combinations. The next list shows the common ones that don't match Internet Explorer.
Keyboard shortcuts available in Firefox only
Key combination Use
------------------------------------
Ctrl+hyphen Decrease text size
Ctrl+Plus Increase text size
Ctrl+0 (Ctrl+Zero) Restore text to normal size
Ctrl+Down Arrow Select next search engine in location bar
Ctrl+F or / Find content by search string
Ctrl+G or F3 Repeat last Find operation forward
Ctrl+J (Ctrl+Y on Linux) Open download manager window
Ctrl+K Search the Web using the current search engine and keyword
Ctrl+n (where n is a number) Go to the nth tab
Ctrl+S Save current page as file
Ctrl+T Open new tab
Ctrl+Tab or Ctrl+Page Down Move to the next tab
Ctrl+Shift+Tab or Ctrl+Page Up Move to the previous tab
Ctrl+U View page source
Alt+Enter Open URL in a new tab
F6 Move to next frame
F7 Toggle caret browsing
Shift+F3 Repeat last Find operation backward
Subscribe to:
Posts (Atom)