Home Security Equipment - Surveillance Equipment - Cameras


Home security concerns are foremost on all homeowner's minds, as the number of thefts and burglaries are on the increase. Surveillance equipment has become popular, as they are deterrents to unsavory elements with nefarious intentions.

Wireless Video Surveillance Systems

These are easy to use and install. The systems comprise camera, transmitter, receiver, antenna, cable, monitor or VCR, motion detectors, alarm and about 12-volt dc. Be sure to study your house carefully and determine the optimum positions for your cameras. Figure out if you will be using a covert style or overt style of surveillance system. In covert style select optimum positions for your cameras, which you choose to hide from prying eyes. In overt style you are letting people know that you are filming them, which can be a cause for criminals to hesitate attempting a break-in.

While video surveillance system has its advantages such as catching criminals in the act of burglary, identifying criminals and getting them a firmer punishment, it is a costly procedure requiring constant maintenance and cameras themselves could be the targets of potential thieves.

Night Vision Cameras

Night vision cameras could be based on thermal imaging or image enhancement technologies. They are used to detect motion, which are not perceptible to the human eye in the dark. They are good additions to your home security systems.

Web Cameras

Many people have resorted to using web cameras placed at convenient locations to become rather inexpensive video surveillance systems. People get alarm systems that permit PC's to call cell phones when alarms are sounded alerting homeowners who are away and concerned about home security. These networking cameras are easier to use, could provide details such as who visited and when the kids left to play etc. giving parents far from home accurate information about their home security as well as their children's security. But the images are not of high quality, maintaining it could drain your computers resources.

These are all very well, good home security systems, but you need to strengthen your doors, windows etc. to make it real hard for a burglar to vandalize your house. You could go in for a high priced top end CCTV surveillance system offering better control, security and peace of mind!

Home security is extremely important for security sake as well as to be able to leave your kids alone at home while you are at work, or when single senior citizens live by themselves, or when you leave your house due to seasonal reasons etc. choose your home security system wisely within a budget and make sure it is utilized to a maximum.




Click Here for FREE Home Security Information and DIY Home Security Systems and Equipment brought to you by the renown Home Security Expert




Trojans: The Enemy in Disguise

For all of us that have watched the movie Troy remember what the Greeks did. Yeah they won the battle by using deception. It is all in the game of war. The point was not about winning or losing the battle but rather how they did it. The Greeks hid under the disguise of a giant horse, which the Trojans thought was a parting gift.

They forgot, who gives gifts nowadays, and that being a giant horse made of wood. A horse made of wood for God's sake! How do you cut so much wood without chainsaws, and carry them to make a horse? They surely did not have highways back then. Things to consider when something looks too good to be true.

Well apparently the Trojans did not bother taking that into consideration and took the horse as a present. And what a gift it was, filled with Greek soldiers, that came out of hiding when the rest of the world was asleep. I guess they did not have guards working in shifts like we do now.

So when the rest of the world (world refers to Trojans' occupied land) was sleeping they managed to ravage the city, took down the king. We all know when you kill a king you become a king replacing him, ah the good old days. The Greeks were in-charge, and just when the Trojans thought they had won, they lost it big time.

They put their guards down and let their sworn enemies in, talk about not having customs to check shipments. The story of Troy has been told. So what does this have to do with computing? Well two things, one the name Trojan horse and second the tactics. Unlike scare tactics this will make you cry for a long time.

In the world of computing a Trojan horse does exactly what the Greeks did. Impersonate something that is harmless or appealing and when the time is right unleash the fury. A Trojan horse is a software that promises to do something, but does something else as well.

It might to what it said, but the problem is it tries to do more. It then ravages your system, looking for connections back to its creator or inviting more of its friends. Yeah I know everyone has an anti-virus installed, but the Trojan horse is not a virus at first but contains codes that are viruses.

Trojan Horses are normally downloaded as software, or when you click an unknown link on the internet. The anti-virus does not stop any installers from coming in, so here they come with all their wits. Once in a Trojan horse can act as a keylogger, i.e. it takes into account all the keys that you are pressing on your keyboard.

This information is then sent to the creator of the Trojan horse. This would not sound much when internet banking was not available, since you now do banking online it is something to worry about. Apart from that Trojan horse also opens back doors to allow more of its friends in. They seriously jeopardize privacy and security.

So now let's see what we can do, firstly guys don't surf too much porn, these software lurk over there like a snake under dead leaves. Secondly and this is actually most important try not to use pirated software, try to get this straight nothing is for free, you should have learned that from the Trojans by now.

Apart from that, anything on the internet that claims it can do something do Google the name. You can always check on something, on what it really is. You have to give the advertiser benefit of the doubt. When you Google, you can actually see people that have been cheated (if they have been) before this post in forums or blogs.

Do read the posts and blogs thoroughly as you might discover some surprises at the end. Never click on any pop-ups. Always keep your computer's anti-virus updated, always update windows, please don't forget to install only original software. If you can't afford original software, there are plenty of open source software.

Open source software might no be as good as something you have to buy, but it is good to improvise legally. Well you wouldn't want someone to steal from you would you? Well I hope this helped, to shed some light on what a Trojan horse is and what it can do. Next time we shall discuss about other threats.
Oh one more thing, the soldiers in the horse did open the gates of Troy and let an entire Greek army in. Just like it does in a computer.

Article Source: http://EzineArticles.com/6888388

How To Prevent And Detect Keyloggers

Wondering how to prevent and detect keyloggers, also known as keystroke loggers? Keyloggers are a very real threat to your Internet security and privacy; silently working in the background secretly recording every keystroke and sometimes even capturing screen shots. Keyloggers are often bundled with other malware, such as computer viruses, spyware, and trojan horses.

This malicious software can lead you to having your personal info stolen; added to the every growing list of victims of identity theft, one of the fastest growing crimes in Canada and the USA.

Don't disconnect your Internet connection forever just yet. Fortunately, there are steps to take to prevent and detect keyloggers.
First of all, if you haven't already, install anti-virus software. This Internet security software helps prevent keyloggers and other malicious software. It is important to remember to keep it up-to-date; anti-virus software is only as good as the last update. It is good to know that there is reputable and free anti-virus software available for download online.

It is crucial that you have anti-spyware software installed on your computer. It detects most, but certainly not all keystroke loggers. There is free anti-spyware software available for download online. It is crucial to make sure that it is reputable anti-spyware software before you download it. There is so-called "free anti-spyware software" that in reality is not free and might even be bundled with malicious software, including a keylogger.

Probably the most important step is to have reputable anti-keylogger software installed. Anti-virus and anti-spyware software do not protect you from all keystroke loggers. Unlike other Internet security software anti-keylogger software does not rely on virus signatures and "full system scans". It actually detects and blocks keyloggers.

Ensure that you have a firewall installed. This Internet security software can block a hacker from remotely installing a keylogger on your computer. It can also stop a keylogger already installed on your computer to send personal information and other data remotely to a cyber criminal. There is reputable free personal firewalls available for download online. Windows XP, Vista, and 7 all include a free firewall. If you have not other firewall installed on your computer ensure that it is activated.

Last but not least, check your computer manually for hardware keyloggers. This is especially important when using a public computer, such as one in a public library. Specifically check the cable between your computer and your keyboard as well as your USB ports for a hardware keystroke logger.

By following these steps you'll greatly reduce the chances of having a keylogger as well as other malicious software installed on your computer. When it comes to keystroke loggers and other malware an ounce of prevention can indeed be worth a pound of cure.

Christopher Hecker is passionate about sharing his knowledge and expertise on Internet security and privacy. Please visit Internet security 101 for free Internet security software, advice and tips to protect your computer from malicious software, including keyloggers.

Article Source: http://EzineArticles.com/6887187

Know More About the Free Android Security Software by Avast

Software security has long been the concern of users worldwide. With the technological advancement it is essential to take this factor into consideration. When the world is fast shrinking and the Smartphone has now become synonymous with computing it is important to create security software. Avast is an extremely popular name known for providing computer security. With its breakthrough in providing software security to Android software it has proved its innovation and credibility. This software by Avast is available for free and it provides security from virus, theft and comprises firewall components.

Let us find out what this software is all about and how it is capable of providing security to android phone users.

Antivirus feature
It provides real-time security and automatic updates. The users get free mobile security feature that provides protection against online threats and is integrated with the Android browser.

Call and SMS security feature- Another amazing feature about this software is the 'filtering' option for all calls and SMS. Now the user need not bother about annoying sms and calls that can be barred by specifying phone numbers in a well defined group.

Firewall component
The firewall component is only available to rooted devices to block specified applications. This enables in protecting the device against illegal access. It provides protection against USB bugs so that your device cannot be altered through computer software. It can also enable data connection and GPS module.

Anti- theft feature
An interesting feature that comes with Avast security is that of the anti-theft feature. The user is free to make changes to the anti-theft feature by changing its icon and renaming it in order to hide it from prying eyes. This feature is also capable of operating in a stealth mode for accessing via phone call. This feature enables wiping, tracking and locking of the device. For added security the users can define two numbers so as to receive notification in case of device theft. Later on this can be controlled via SMS.

Special features for rooted devices
The rooted phones are protected against factory resets. The device can be locked via SMS command when the SIM card is changed. The user can utilize the features that enable texting, initiating a call, setting off an alarm, GPS location tracking, data erasing, downloading contacts and even rebooting the phone. It comes packed with security features for rooted devices as well. It provides the users free of cost security for SIM-card change notifications, privacy reports, firewall, call and SMS filtering and application management.

Avast is a Free Mobile Security that is known to provide complete Android security. This security software is known to have surpassed all the other existing commercial products. What is especially attractive is the easy to use display function and its' capability to provide detailed instructions. It provides complete security to mobile and rooted devices and it is exactly what the user has been looking for.

She is a Technology writer who is keen on any new emerging technology updates. She is working with Qresolve as a Technical Support Engineer. Semeli Karen McPherson has been offering online tech support to global customers for issues related to laptops, desktops, Mac and devices including iPods, tablets, iPhones, computer support and more.

She caters to the segment of core technology and provides viable solutions to any issues related to technology and software. Her expertise and skills in handling key technology issues is immaculate and quick result bearing. Through her articles and postings she aims to provide knowledge and solutions to common technology issues that a user faces.

Article Source: http://EzineArticles.com/6896996

Virus Removal - Fixing the Facebook Virus

This guide will help you identify Facebook malware so you can avoid infection and will also provide tips on how to remove malware once you've been infected.

What To Watch Out For
One example of Facebook malware I've recently observed are fake notifications that say somebody has "posted something on your wall" or "tagged a video of you", which you can see in the image below. Notice that the icon next to the notification appears strange, but many malicious applications utilize standard notification icons which makes them hard to spot.

These applications also typically bear unassuming names like "Comments" or "Livefeed" which sound similar enough to features currently used on Facebook that they do not arouse much suspicion.

If you click a notification and are taken to a page asking for access to your profile, the most important thing to remember is never click allow. Most Facebook malware can only interact with your account if you click the allow button, so only click it if you are absolutely sure you want to use the application.

If you see a suspicious notification and want to verify its legitimacy, visit your profile directly by clicking the Profile button at the top of Facebook rather than clicking the link in the notification. If you can't find a corresponding post on the wall, click the X on the false notification and select "Report Spam" immediately.

What To Do If Infected
If you happened to click a strange link on Facebook or accidentally allowed an application that appeared to be malicious, follow these steps right away to revoke its access and protect your account.
Click the Applications button in the bottom left corner of Facebook and select Edit Applications.

If you have the new version of Facebook, this option can be found under Account (in the top right) then click Application Settings.
Try to locate the application you interacted with. In my case, it was a fake application called "Comments", but I've seen others listed as "Feed". Click the X to the right of the application then click Remove to disable it.
The application will no longer be able to interact with your profile once you have removed it this way.

Extra Precautions
It doesn't hurt to follow the steps in the previous section even if you think you haven't been infected. Browse through your list of applications that have access to your profile and remove any that you are not currently using.
If you see fake notifications from a friend, you can manually block that application to make sure you aren't accidentally infected. To do this, visit the application's homepage on Facebook (remembering not to click the Allow button) and click Block Application. This will completely stop the application from interacting with your profile at all.

When you receive a fake notification from a friend, let them know about it right away and have them follow the steps presented in this guide. The longer they are infected, the more time the malicious application will have to spread itself.

Best Practices
Malicious applications won't always follow the methods I've described in this article, so the best defense you can have is to always be aware of your digital environment. I'll leave you with a few tips for staying safe on social networks:
Don't assume links and messages from friends are safe: Malware often takes advantage of the fact that you trust your friends. Keep an eye on links and messages from friends, and if in doubt, ask them if they actually sent you something. Most of the time they will have no idea their account has been spamming their friends.

Watch the links you click: Fake applications put a lot of effort into looking legitimate, but many of them still carry tell-tale signs of being malicious. If you're suspicious of a link, hold your mouse over it and look at the URL in your browser's status bar. If the URL looks strange (i.e. long strings of random characters or pointing to a site outside of Facebook), think twice before clicking it.

Expand shortened links: Short links are very popular on social networks, making it easier to share URLs. The downside is that you don't necessarily know where the link will take you, so consider previewing your short URLs before clicking.

If it's too good to be true, it probably is: If see a link or message on Facebook that claims you can monitor who views your profile or provide other enticing information, there's a good chance it's a trap trying to lure you in.
Stay updated - Many applications exploit vulnerabilities in your browser or operating system to gain access to your information. Stay safe by keeping your browser up-to-date and installing operating system updates when they are released.

If you've spotted a malicious application or have an experience involving Facebook malware, share it with us in the comments - those experiences can be invaluable for helping others stay safe in the future. If you have any other tips for staying safe on social networks, let us know!

Article Source: http://EzineArticles.com/6908888

How To Use Microsoft Safety Scanner To Clean Up Your Computer

If you are like most people today, you come home and get on the internet and surf the web, looking for interesting news and sites. Most users know about viruses on the web, but some do the unthinkable, and surf the web unprotected. It only takes one "drive by" virus to infect your computer, and worse yet, some even start emailing embarrassing emails to every one of your contacts in your email program.

Sometimes the unthinkable happens and you find your computer acting strangely, your home page will not load or worse yet, you find a strange program starting up when you get to your desktop. At this point you start freaking out, wondering what to do. All is not lost, Microsoft Safety Scanner is a free Microsoft online application that will assist you in cleaning up your hard drive.

System Requirements
To run the Microsoft Safety Scanner your computer must meet some very simple system requirements that most computers sold in the past five years should easily meet. The scanner will run on Windows XP, Windows 7, and Windows Vista. The CPU should be a 500 MHz or higher and have at least 256 MB of RAM with at least 200 MB of available space on the hard drive.

Downloading the Software
The safest way to logon to your computer until the virus is remove is by logging into safe mode. When booted into safe mode, your computer only loads up the most basic drivers and files. The virus will not be active, and is more easily removed from this mode.

Safe mode has multiple choices, but we will concentrate on one mode, Safe Mode, Safe Mode With Networking. This will still allow you to connect to the internet to download Microsoft Safety Scanner.

Steps To Start Up In Safe Mode
  1. From Shut Down menu, choose Restart and OK.
  2. When the computer starts back up, press the F8 key.
  3. You can arrow down to Safe Mode With Networking.
  4. Press Enter.
Download Microsoft Safety Scanner
Once you are at the desktop, bring up Internet Explorer and browse to Google.com. You will then type in Microsoft Safety Scanner, and go to the download page. Simply download the application from Microsoft's page. Then double-click the downloaded application and allow it to install on your computer.

During installation, you will need to accept the End user license agreement, and then choose the Scan Type. You have three choices: Quick, Full, and Customized. I suggest the full scan to ensure the virus is found and removed properly.

Once you click next, the scanner begins to scan your computer for viruses, spyware, and remove any that is found. The best part about this free software, is the report it gives you after the scan has finished. It will report about all the files that were removed, giving you a record of what was done to your computer. I suggest running multiple scans, and you will find that rebooting after Microsoft Safety Scanner has cleaned up the viruses and spyware, it will actually find a few more after rebooting back into safe mode.
I find the Microsoft Safety Scanner runs its scan very fast, and is very thorough, leave it to Microsoft to create an application to cleanup the holes in its operating system. Warning: After 10 days, your Microsoft Safety Scanner will expire, so I suggest finding a good antivirus program that you can install before then next virus hits.

The internet is not always a safe place, and everyone at one time or another will find that their computer has been infected. You have learned how Microsoft Safety Scanner is a free online tool that you can use to clean up your computer after being infected.

Gene Smyth is the marketing manager for a great telescope resource website called Best Telescopes reviews.

Gene has over 10 years experience in the technology industry and his main hobby is backyard astronomy. He feels that this would be an awesome family activity that not only will bring your family closer together, but may spark an avid interest in science that will follow your children for the rest of their life.
If you don't know the difference between a Reflector and a Refractor, discover more about the best telescopes, the differences between each type, and more at:

Article Source: http://EzineArticles.com/6935766

Free Antivirus Software 2012 Editions: An Overview

The article intends to draw a comparison among free antivirus programs available for users who are concerned about both security and money. Every year, most of the antivirus software vendors roll out free editions along with commercial security suites. While these suites comprise a set of enhanced features and utilities intended to give maximum protection to computing and browsing needs, free versions are designed to do the needful for security needs of home users who need their computer only for limited use.

While the use may be limited or limitless, the need for a strong security solution lingers due to rise in the number of the security threats and ultimately the increased cost of maintaining computer security. The year 2012 is expected to see major changes in terms of free security solutions despite the fact that most of them have already made inroads in the last quarter of 2011. Thus, only major improvements along with a few new rollouts are expected in 2012. Below is the list of some of the famous free antivirus software editions as well as their features:

Kaspersky Anti-Virus 2012 12.0.0.374 Final
Kaspersky has been a trusted security solution for years. If one goes by the rating and reviews given by anonymous users, then the program certainly tops the list of security solutions. Look below for more info:

Vital Stats:
License: freeware
OS Support: Windows 7/Vista/XP (SP2 or later)/2k
Browser Support: Microsoft IE 6 or later versions
Installation Type: CD or online download
Technical Support: knowledge base, online forum, free technical support

Pros:
Powerful antivirus engine that detects and removes viruses in real-time, improved user interface, HTTP, NNTP, and IMAP traffic support, next-generation anti-malware technology that allows installation even on infected computers, TheBat! plug-in, Script Checker with browser GUI plug-in, Anti-Rootkit technology, and superior damage cleanup against spyware among others.

Cons:
Routine updates slowdown PC and internet connection. Updating takes good amount of time.

Avira Free Antivirus 2012 12.0.0.872
If you are looking for a decent, free security solution, Avira Free Antivirus 2012 12.0.0.872 is here to do the needful. The program offers excellent protection from viruses, dialers, worms, rootkits, adware, and spyware etc. in addition to the internet and email security. Below are the details:

Vital Stats:
License: freeware
OS Support: Windows 7/Vista/XP (SP2 or later)/2k
Browser Support: Microsoft IE 6.0 or later
Installation Type: online download
Technical Support: email and chat

Pros:
 up to 5 times faster scanning, light on resources, user-friendly interface, On-Demand Scan for scanning all the infections, anti-rootkit technology for protection against hidden rootkits and malware, high-speed scanning and multi-threading functions, and On-Access Scan for incessant monitoring and scanning of file access attempts among others.

Cons:
 interface needs little improvement, large data files can slow down the scanning speed, not efficient against detection and removal of malware, and is more an affordable program than a security solution.

AVG Anti-Virus Free 2012 v12.0.1890
Ranked among the well-known security solution providers, AVG offers another free tool for personal computer users. AVG Anti-Virus Free 2012 v12.0.1890 has been designed to provide excellent protection against malware and phishing programs. See below for more details:

License: Freeware
OS Support: Windows 7/Vista/XP
Browser Support: Microsoft IE, Mozilla Firefox, and Google Chrome
Installation Type: online download
Technical Support: online forum, knowledge base, and email

Pros:
antivirus\anti-spyware protection, refurbished E-mail Scanner for maximum protection against email phishing, improved installation technologies, light on resources, multi-language program, Facebook access tool, and enhanced Safe Search technology to prevent browser crash or update.

Cons:
complicated user interface, creates issues with third-party firewall programs like ZoneAlarm, slow down internet connection and browsing, overwrite previous settings post-download, upgrade and update issues, and Rootkit scan has to be launched separately from full system scan.

Norton AntiVirus 2012 19.1.1
Another popular name in the world of security solution vendors, Symantec has launched Norton AntiVirus 2012 19.1.1 for

License: freeware
OS Support: Windows 7/Vista/XP
Browser Support: IE 6.0 or later, Google Chrome 10.0 or later, and Mozilla Firefox 3.0 or later versions.
Installation Type: online download
Technical Support: online forum

Pros:
handy, quick installation and configuration, SONAR2 Behavioral Protection technology that scans your computer for wary, online threats, Pulse Updates for updating your system every 5-15 minutes for enhanced protection from newly growing threats and infections without hampering your computer's speed and functionality, Norton Protection System tool for enhanced protection against viruses, spyware, and Trojans among other infections, and Bot protection technology among others.

Cons:
complicated user interface (needs whole lot of improvement), can freeze computer, not so effective detection capability, and heavy on resources.

Article Source: http://EzineArticles.com/6916035

5 Tips for Preventing Virus Attacks on Your Computer

1. Keep your signature files up to date:
On most virus removal programs, there is a component that will check for virus signature updates at regular intervals when your computer is connected to the internet. You may either get a prompt to update your signature files, or a status indicator will say that the current signature file is not up to date. You can check for signature updates manually by right clicking on most antivirus icons in the lower right corner of your desktop.

2. Your toolbars on your browser need to be kept at a minimum.
Toolbars generally are not a good thing to install. Some toolbars, when installed, are hard to get rid of. One example is Babylon, which is a toolbar that lingers on your computer when you thought you got rid of it. Toolbars can be installed in Internet Explorer, Firefox, Google Chrome and more. Toolbars sometimes come bundled with other software that you install on your computer. Toolbars are stealthy. They get installed in your browser, then suddenly, your whole browsing experience has been hijacked. The next time your computer is infected with spyware or viruses and you've got 4 or more toolbars, Eliminate the toolbars, and run a virus scan to see if that eliminated the problem.

3. Do research on new programs before downloading them.
Some viruses come in the form of a program that you are downloading from a seemingly friendly internet web site; some programs that say they can magically fix your computer can also cause your system to crash. By researching the name of the web site that provides a download and by researching the name of the exe, zip, tar or whatever file extension it has in Google before you actually use it, you may find that the program has been mentioned as a possible virus, worm, or malware. Some driver downloads, pornographic web sites, and legitimate looking adware removal programs have been known to be viruses in disguise. A Trojan horse is a legitimate looking program that does your computer harm. The AVG antivirus logo has been copied onto Trojan horse programs and users have had a serious virus attack. Virus removal programs such as AntiVirus Live, Advanced Virus Remover are also programs that disguise themselves as legitimate programs. These programs will hold your computer hostage until you pay ransom money. Don't pay, because the problem will only get worse, and not better.

4. Do virus scans on your computer on a regular basis.
A virus scan is very important to do on your computer on a regular basis, but more often than a periodic PC Tune up. It is recommended to do a virus scan at least once a week, if not every day, according to your internet use and the number of critical files on your pc. Kaspersky, Mcafee, Trendmicro all are some of the companies that have a free web scanner that will run on your computer to detect viruses. When you perform a virus scan, your antivirus program searches your system for virus signatures that are attached to executable programs and applications, such as email clients. A virus scanner can search all executables when a system is booted or scan a file only when a change is made to the file because some viruses will change your computer files.

5. Avoid downloading content from P2P file sharing sites.
 Peer-to-Peer networking, known as P2P, is similar in concept to a browser. It is an application that runs on your PC and allows sharing of files. Napster and Lime wire used to be two of the most popular peer-to-peer application programs, sharing MP3 music files, until they were shut down by the U.S. Justice Department. Today, favorites like Emule, Gnutella, Morpheus, Bearshare, and Kazaa share center stage. There are many virus programs that spread through various P2P networks, so by avoiding downloading P2P software, you will have less problems with malware and viruses. With the massive popularity of P2P file sharing also comes the risks of embedded adware / spyw3are in client distributions. A recent scan by the Center for information security found spyware and pests in Kazaa, Edonkey, Morpheous, and Bearshare. The vulnerabilities included active content and embedded url's, and vulnerabilities in the media reader. It is suggested that you read the EULA's or End user license agreements.
James Bell

Article Source: http://EzineArticles.com/6919841
 
Support : Creating Website | Johny Template | Mas Template
Copyright © 2011. Information Computer and Technology - All Rights Reserved
Template Modify by Creating Website
Proudly powered by Blogger