OS-OMicron.org http://tiki.is.os-omicron.org Future ideas in the present. Sun, 18 Mar 2018 16:54:17 +0000 en-US hourly 1 https://wordpress.org/?v=4.9.4 Going Javascript Crazy http://tiki.is.os-omicron.org/going-javascript-crazy/ http://tiki.is.os-omicron.org/going-javascript-crazy/#respond Sat, 08 Aug 2015 11:26:56 +0000 http://www.ajaxlessons.com/?p=8

gjcIt sounded like my latest career move was going to be a bit more interesting than I had planned. Congratulations, Bob, on your new job. Belo’s quite an outfit,” read the note from the estimable editor of this fine journal. “And, uh, ummm, do you plan to still write a column for ajaxlessons.com? I know you won’t leave us in suspense for the follow to the last one you wrote. The one about sex.”

The note went on to offer helpful hints and insights into Texas life, including this bit of borrowed wisdom: “If I owned both hell and Texas, in the summer I’d rent out Texas and live in hell.”

Nothing like a bit of encouragement. But I suppose

]]>

gjcIt sounded like my latest career move was going to be a bit more interesting than I had planned. Congratulations, Bob, on your new job. Belo’s quite an outfit,” read the note from the estimable editor of this fine journal. “And, uh, ummm, do you plan to still write a column for ajaxlessons.com? I know you won’t leave us in suspense for the follow to the last one you wrote. The one about sex.”

The note went on to offer helpful hints and insights into Texas life, including this bit of borrowed wisdom: “If I owned both hell and Texas, in the summer I’d rent out Texas and live in hell.”

Nothing like a bit of encouragement. But I suppose

]]>
http://tiki.is.os-omicron.org/going-javascript-crazy/feed/ 0
Cold As Ice! Willing to Sacrifice For Beauty http://tiki.is.os-omicron.org/cold-as-ice-willing-to-sacrifice-for-beauty/ http://tiki.is.os-omicron.org/cold-as-ice-willing-to-sacrifice-for-beauty/#respond Sat, 25 Jul 2015 14:33:04 +0000 http://tiki.is.os-omicron.org/?p=77 skintagOkay, so maybe you don’t exactly love your skin tags. It’s no secret that those who suffer from the harmless, if not annoying, issue of skin tags have a definite hate-hate relationship with them. They’re prone to popping up in the folds of your skin which are in the most unflattering places. You can find skin tags hanging out on someone’s neck, armpits, groin area and sometimes in the creases of their eyelids. Anyone can be susceptible to having skin tags. They are generally harmless on their own and don’t grow to wider than 3mm. They protrude a bit and kind of flap around but they aren’t cancerous and are usually more annoying than anything. Babies, people who are unhealthily …

]]>
skintagOkay, so maybe you don’t exactly love your skin tags. It’s no secret that those who suffer from the harmless, if not annoying, issue of skin tags have a definite hate-hate relationship with them. They’re prone to popping up in the folds of your skin which are in the most unflattering places. You can find skin tags hanging out on someone’s neck, armpits, groin area and sometimes in the creases of their eyelids. Anyone can be susceptible to having skin tags. They are generally harmless on their own and don’t grow to wider than 3mm. They protrude a bit and kind of flap around but they aren’t cancerous and are usually more annoying than anything. Babies, people who are unhealthily overweight and seniors can be more prone to the flappy-bits than others. There are several methods of removal and all of them can be done at home.

You can cut them, thread them, use a cream, and you can also you a freezing solution to remove them. All of these you can do from home, unless of course you have a skin tag right by your eye and you want a professional to remove it, and all of the supplies you need can be bought in any drug store.

Some methods are more permanent than others. You would think cutting and threading would be permanent but since you are not going to the root of the problem there is a chance that the skin tag will grow back. A single person can have anywhere from 1 to 100 skin tags growing on their bodies at any time. Creams and freezing solutions are generally a more permanent option for removing skin tags because they attack the cells from within.

So let’s say you have a skin tag on your neck. Maybe it’s at the back of your neck close to your hairline and you keep catching it on your brush or comb. Maybe you’ve unintentionally ripped it off so many times you are hyperconscious when you do your hair now. So let’s get rid of that sucker once and for all!

Freezing is an excellent way to remove skin tags. You can buy Compound W® or Dr. Scholls Skin Tag Remover® from any drug store or department store. Both products operate under the same principle so you can decide which brand you want to work with.

Each box will come with the freezing solution, an application tip, and applicator and skin shields of varying sizes. Think of the skin shields as tiny circular band aids. You place the shield of the most appropriate size at the base of the skin tag you want to remove. This is very important because you don’t want to damage the cells of the surrounding skin with the liquid nitrogen formula.

Once you’re set up, get your applicator ready and apply the solution via the tip to the side of the skin tag, as close to the base of it as you can get. You generally need to hold it there for 20-30 seconds before removing. And that’s it! Easy, right? It usually only takes one application and then you wait. Over an average of two weeks the skin tag will start to die from the inside and might turn black as well. Then, the skin tag will simply fall off! Using this method is super effective and the skin tags generally don’t grow back in the same location.

So go ahead. Use your hand-held freeze-ray and get that sucker!

]]>
http://tiki.is.os-omicron.org/cold-as-ice-willing-to-sacrifice-for-beauty/feed/ 0
Avoid HP ProLiant Disk Problems By Doing This! http://tiki.is.os-omicron.org/avoid-hp-proliant-disk-problems-by-doing-this/ http://tiki.is.os-omicron.org/avoid-hp-proliant-disk-problems-by-doing-this/#comments Sun, 08 Feb 2015 04:13:26 +0000 http://www.ajaxlessons.com/?p=38 ahpdpStop complaining about how you want an HP computer but you are scared of the high potential of HP ProLiant disk problems! This article is about how you can avoid these problems before they become worse and make it so your data cannot be retrieved.

First of all, you have to understand that because this server is still an early release, it still needs more improvements. As of now, most of its disk related problems are not resolvable (depending on the model number, of course) and they are typically hard to fix. Even if the owner has to sacrifice the hard drive just to make it work again by reformatting it or erasing all the contents, it will probably not …

]]>
ahpdpStop complaining about how you want an HP computer but you are scared of the high potential of HP ProLiant disk problems! This article is about how you can avoid these problems before they become worse and make it so your data cannot be retrieved.

First of all, you have to understand that because this server is still an early release, it still needs more improvements. As of now, most of its disk related problems are not resolvable (depending on the model number, of course) and they are typically hard to fix. Even if the owner has to sacrifice the hard drive just to make it work again by reformatting it or erasing all the contents, it will probably not …

]]>
http://tiki.is.os-omicron.org/avoid-hp-proliant-disk-problems-by-doing-this/feed/ 2
Firewalls Make Things Better http://tiki.is.os-omicron.org/firewalls-make-things-better/ http://tiki.is.os-omicron.org/firewalls-make-things-better/#respond Sat, 24 Jan 2015 16:32:31 +0000 http://tiki.is.os-omicron.org/?p=6

If you have a high-speed Internet connection that’s always on, your home computer may be probed by a hacker at any hour of any day. These hackers are seeking an entree they can use to hide software that would allow the computer to be “zombied,” or controlled remotely.

And everyone who uses the Internet, even with a dial-up connection, may catch a computer virus.

fmtb“Probably every machine on the Internet is touched multiple times a day by one type of a scan or another,” says Jeff Carpenter, a manager with the Computer Emergency Response Team, a federally funded research center at Carnegie-Mellon University that responds to attacks on the Internet. He also runs the site Exchange-Mail.org, which concentrates on

]]>

If you have a high-speed Internet connection that’s always on, your home computer may be probed by a hacker at any hour of any day. These hackers are seeking an entree they can use to hide software that would allow the computer to be “zombied,” or controlled remotely.

And everyone who uses the Internet, even with a dial-up connection, may catch a computer virus.

fmtb“Probably every machine on the Internet is touched multiple times a day by one type of a scan or another,” says Jeff Carpenter, a manager with the Computer Emergency Response Team, a federally funded research center at Carnegie-Mellon University that responds to attacks on the Internet. He also runs the site Exchange-Mail.org, which concentrates on Exchange Servers and avoiding attacks.

Once the computer has been hacked–and chances are good that you wouldn’t know until it was too late–the hacker could extract enough personal information to impersonate you or steal important financial data.

What’s more, your computer could then be commandeered to help cripple major web sites, not to mention banks, brokerages, or other businesses via denial-of-services attacks. (You aren’t likely to be accused of wrongdoing if that happens, however.) Such attacks shut down major web sites including eBay and Yahoo! two years ago. “We’ve seen in several large incidents tens of thousands of home machines compromised in a very short period of time,” says Carpenter.

James Lewis, a senior fellow with the Center for Strategic and International Studies, in Washington, D.C., said in an interview: “A cyber attack isn’t going to stop the U.S. military from being able to protect the United States from a military attack. But it could do a lot of economic damage, and that’s where we need to worry.” A recent business survey found that 90 percent of large corporations and government agencies detected a computer security attack.

An official at a consortium of electric utilities says that computers controlling the nation’s electric-power system have already been probed in recent months by computers in the Middle East.

Hackers can so freely roam the Internet because it wasn’t designed for the kind of use it now gets. The Internet itself lacks effective technological, legal, and human resources to stop these incursions.

Hackers aren’t the only peril to your computer. Viruses–the malicious software planted for the express purpose of causing disruption or damage–have most likely turned up in a majority of home computers in the U.S. When we surveyed nearly 8,000 subscribers to Consumer Reports.org, our web site, 58 percent said they had found at least one virus on their home computer in the past two years. And 10 percent said the virus had caused some kind of damage.

Your computer and all the sensitive personal data stored on it do not have to be so vulnerable. Properly armored, your computer can become an important line of defense against cyberspace invaders. Readily available software can effectively block most hackers and viruses. In our survey, only 7 percent of those using antivirus software suffered computer damage in an invasion. By contrast, 30 percent of those without antivirus software had their computer damaged.

This report explains how prevalent and damaging viruses are. It draws on our survey and interviews with dozens of computer-security experts nationally. We also conducted our first tests of widely used antivirus software and of antihacker products known as firewalls. The box on page 18 offers advice on how to recognize incursions and protect your computer.

FIREWALLS HOLDING OFF HACKERS

The first time a hacker took over Raleigh Burns’ home computer, the machine seemed to take on a life of its own. “You expect to see your screen saver, but instead the cursor is flying around and boxes pop up with things being typed in there,” said Burns, a computer-security administrator for a Cincinnati hospital. “The only thing that’s missing are the keys going down and the mouse moving by itself on the desktop.”

But it wasn’t until months later, when another hacker began downloading Burns’ personal financial records, that he finally installed a firewall.

Like Burns, at least 10 million Americans use a high-speed Internet connection.How many of them protect themselves with a firewall? Only about 60 percent, if the ConsumerReports.org subscribers we surveyed are typical of the overall online population. That would leave about 4 million computers vulnerable. Only a tiny fraction of our survey respondents said that they knew hackers had actually broken into their computer. However, many people never know they have been hacked.

Since Sept. 11, government and industry have been trying to tighten computer security. But recent developments appear to do little to identify and shut down hackers. An antiterrorism law enacted last fall stiffened some penalties for hacking, but those provisions may apply only to attacks on government, military, or commercial computers, not on private home computers.

A government-industry program, the National Cyber Security Alliance, recently launched a campaign and web site (www.staysafeonline.info) to educate consumers about computer security.

Earlier this year, Microsoft, whose software has suffered an embarrassing series of security flaws, launched an initiative to find and fix vulnerabilities in existing software and to make security a higher priority for new software.

You can help forestall digital disaster by installing a firewall, software or hardware designed to block intruders, on any home computer that has a high-speed connection. A computer with a slower dial-up connection through a 56K modem is much less vulnerable to attack because of the different way in which it is identified on the Internet.

With a dial-up connection, your computer has a dynamic Internet provider address–the string of numbers that identifies your machine and that changes every time you log on. You’re harder to follow over time. By contrast, a high-speed connection typically has a fixed IP address or one that changes only occasionally. Since it rarely changes, hackers can readily track the computer for an extended period. A firewall makes your computer less visible on the Internet and helps ensure that any hacker who does find your computer won’t be able to get into its programs and files.

PROTECTING HIGH-SPEED CONNECTIONS

There are three ways to equip your computer with a firewall:

* With Windows XP, activate its built-in firewall via the Control Panel Network.

* Buy a separate software firewall, an application that runs in the background to keep watch over your computer at all times.

* Interpose a hardware firewall between your computer and the Internet. These devices contain firewall software that operates pretty much the way a basic software product does.

We tested XP’s own firewall, five software products, and one hardware firewall that’s included in a router, a device used to connect several home computers to a single high-speed Internet connection.

We tested the vulnerability of those products with both incoming and outgoing communications. For incoming attacks, we poked and probed the computer over the Internet just as a hacker would. For outgoing communications, we checked the software’s ability to filter things like instant messages. That’s important because instant-messaging applications and other types of file-sharing programs can be used to infect your computer with a type of software called a Trojan Horse, which performs outgoing communications. A firewall that only handles incoming threats offers no protection here.

We also looked at other useful features, such as the ability to alert you when an intruder attempts to break in and the ability to trace an intruder’s address.

Incoming threats. Six of the seven products we tested provided excellent protection. They put a computer in “stealth mode,” making it virtually undetectable and closing the software gateways technically known as “ports” (not to be confused with the ports for universal serial bus or serial cables). Either weakness can be exploited by a savvy hacker. The seventh, though still very good, wasn’t quite as effective.

Outgoing protection. Most proved effective in this regard. But Windows XP, BlackIce Defender, and the Linksys Etherfast Router offered no outgoing protection. (As we went to press, the maker of BlackIce said it was releasing a successor, version 3.5, with outgoing protection.) If you use antivirus software and practice good computer hygiene, outgoing protection isn’t essential. But if you or the kids use the computer for instant messaging and other kinds of online file-sharing, make sure the computer has outgoing protection.

RECOMMENDATIONS

All of the products provide very good incoming protection. But your first choice should be ZoneAlarm Pro 3.0 or Norton Personal Firewall 2002, each $50. They provide maximum protection and an extra margin of safety with outgoing protection. If your computer uses Windows XP, be sure to activate its built-in firewall.

]]>
http://tiki.is.os-omicron.org/firewalls-make-things-better/feed/ 0
Web Development History Is Amazing http://tiki.is.os-omicron.org/web-development-history-is-amazing/ http://tiki.is.os-omicron.org/web-development-history-is-amazing/#respond Thu, 04 Dec 2014 00:15:08 +0000 http://www.ajaxlessons.com/?p=14

Last year marked a revolution in back-end design. The major force behind this change was not just a need for better functionality but for a better process in Web development. In an industry survey from 1999, Web startups found that 80 percent of their budget was typically spent on development costs. These companies also observed that the best sites redesign every two months. The enormous development costs got people’s attention. Complex, transaction-heavy sites were demanding better processes. The old one-tier sites with static HTML or just CGI were fading away, and even the newer, two-tier systems like flat ASP or Cold Fusion were becoming impossible to keep clean and updareable.

wdhWhat is meant exactly by tiered site architecture? The three

]]>

Last year marked a revolution in back-end design. The major force behind this change was not just a need for better functionality but for a better process in Web development. In an industry survey from 1999, Web startups found that 80 percent of their budget was typically spent on development costs. These companies also observed that the best sites redesign every two months. The enormous development costs got people’s attention. Complex, transaction-heavy sites were demanding better processes. The old one-tier sites with static HTML or just CGI were fading away, and even the newer, two-tier systems like flat ASP or Cold Fusion were becoming impossible to keep clean and updareable.

wdhWhat is meant exactly by tiered site architecture? The three aspects of any site are presentation, logic, and data. The further you separate these areas, the more layers, or “tiers,” your system has. The earliest Web sites were static HTML pages, with maybe some small logical piece running HTML forms through a Common Gateway Interface (CGI). Sites like the initial CERN Web site and many university Web sites still combine presentation, logic, and data in one layer. The problem with this approach is that when you change any one aspect you have to wade through all the rest. For example, if you want to change the site’s presentation (i.e., do a redesign), the code and data are also affected. Two-tier architecture sites, like the early HotWired and current sites like Reebok.com and Discover.com, divide the site into two layers: a combined presentation and logic layer and a separate database. This was an improvement over single-tier architecture, as changes in content (publishing a new article, for example) only a ffected the database and didn’t impact the site’s logic or design. But a change in the site’s design still risked messing up the logical portion.

Enter the three-tier system, perhaps best exemplified currently by base technologies like ATG Dynamo, and now cropping up everywhere. Amazon and E*Trade are two sites that are now fully three tier. In this system, designers and information architects work on the front layer or interface of a Web site, programmers and software architects work on the middle layer, and integrators and database designers work on the back end. The three-tier system is currently a great way to make the three pieces of Web development (front, middle, and rear) operate with some independence from each other. This independence allows sites to be built more quickly, and also permits one tier to be altered without rewriting the others. Nam Szeto, creative director at Rare Medium in New York, notes that “if more strides can be made to free up the display layer from the business logic layer, Web designers and developers can enjoy more freedoms building sophisticated and elegant interfaces that aren’t wholly contingent on whatever happens on the back-end.”

Working within a good three-tier system permits designers to develop a dynamic interface in a meaningful, malleable way, taking into consideration the ultimate purpose of the site, and working with–not against–the structure of the site’s data and content. The two most important components of back-end functionality that specifically affect the designer’s job are transactions and content management. In order to have a site that can be at all affected by the people who use it, the site must be able to handle transactions. Content management allows a site’s editorial staff to keep the content fresh by rotating news, posting articles, and updating information. Whether it’s an experimental site to express oneself or a retail site that delivers products to customers, both of these components–transactions and content management–will affect how ultimately compelling the user-experience is and how flexible the front-end can and should be.

Transactions allow a user to take actions that affect the site or the real world: pay a bill, buy a product, or post a message to a bulletin board–they are an integral part of a site’s interactivity. Usually, transactions involve HTML pages that present a face for an application server, which then does the actual work. (An application server is a generic framework that allows the installation of custom software components that provide the functionality necessary in a transactional site.)

Content management, the second task of back-end technology, is the be-all and end-all of sites like online newspapers. Workflow is also a part of this picture, permitting articles in a newspaper to be entered by a reporter, proofread by a proofreader, modified and approved by an editor, and posted to the site by another editor. Workflow also allows a story to be published live and on schedule, and retired to the archive at the appropriate time. A number of systems have been built to handle content management on the Web. A system called Vignette is one of the largest, and though it is two tier, it performs workflow and content management very well. In the future, the popular content management systems, induding Vignette, will begin relying more and more on Extensible Markup Language (XML) and will make their systems fully three tier. This bodes well for sites that combine content and transaction.

Besides workflow, another important subcategory of content management is templating, which means finding all the pages in a site that share a common format and creating a single template that encapsulates the common design elements and contains some tags or code to pull in dynamic content. “A great templating architecture is essential not only for content management, but for all the disparate development areas of a dynamic Web site,” says Lisa Lindstrom of Hyper Island School of New Media Design in Sweden. “It makes designers, producers, and developers use the same terminology and will make the content gathering easier for the client.” Microsoft’s Active Server Pages (ASP), Sun’s Java Server Pages (JSP), the open-source PHP, and Allaire’s Cold Fusion are all engines that enable templating, but if the ultimate goal of a site is to become truly three tier, only ASP and JSP or variants allow for this type of structure.

There are other areas of back-end development, such as using an open architecture, that can aid in the implementation of a three-tier system and allow more freedom for front-end creatives. An open architecture means that programmers write custom code to plug into the application server to deal with existing or third-party systems. An open system allows two pieces from different vendors to work together. Misty West, community director for wholepeople.com, a new site serving whole foods markets, says, “Open architecture on the Web represents global success where Esperanto failed. Open architecture isn’t just central to the Web, it is the Web.”

Finally, having an application server that is easily clusterable also helps sustain the health of a three-tier system. This means that as the site develops, more machines can be added to serve more people, and the software on all those different machines will still work together. Three-tier systems are much easier to build and maintain, but they put more burdens on a system, so more hardware will be needed as the site grows. The best current candidate for meeting these requirements is the class of application servers, based on Java, known as Enterprise Java Bean (EJB) Servers. These use an object-oriented middle layer that meets the Sun standard and uses Java Server Pages (JSP) for the presentation layer.

In short, if you are a designer who wants to work with a team that builds useful, dynamic sites, an understanding of three-tier architecture is essential. Three-tier sites are functional for the user, but also make creativity and constant improvement possible for the designer. These sites have useful and powerful back-ends that won’t entangle you in creative restrictions. And that is the ultimate purpose of three-tier architecture.

]]>
http://tiki.is.os-omicron.org/web-development-history-is-amazing/feed/ 0
I Love You: Profile Of A Killer Virus http://tiki.is.os-omicron.org/i-love-you-profile-of-a-killer-virus/ http://tiki.is.os-omicron.org/i-love-you-profile-of-a-killer-virus/#respond Sat, 22 Nov 2014 08:55:53 +0000 http://tiki.is.os-omicron.org/?p=12

The feeling definitely wasn’t mutual for corporate users on the receiving end of last week’s “ILoveYou” e-mail virus. IT managers at scores of companies spent the end of last week trying to repair the damage, while employees had to bide their time until their e-mail and other systems were restored after the fast-moving virus hit.

pkvAfter the initial wave, as many as five new strains of the virus began showing up Friday morning, including one labeled “fwd: Joke” and another, more destructive one labeled “Mother’s Day Order Confirmation.”

These, as well as many more versions expected in the coming days, are likely to keep corporations and computer users around the world on high alert for some time.

“It killed us;

]]>

The feeling definitely wasn’t mutual for corporate users on the receiving end of last week’s “ILoveYou” e-mail virus. IT managers at scores of companies spent the end of last week trying to repair the damage, while employees had to bide their time until their e-mail and other systems were restored after the fast-moving virus hit.

pkvAfter the initial wave, as many as five new strains of the virus began showing up Friday morning, including one labeled “fwd: Joke” and another, more destructive one labeled “Mother’s Day Order Confirmation.”

These, as well as many more versions expected in the coming days, are likely to keep corporations and computer users around the world on high alert for some time.

“It killed us; it absolutely destroyed us,” said Carl Ashkin, CEO of Darby Group Cos. Inc., a health care company in Westbury, N.Y., that had to shut down its e-mail server for an entire day.

Darby Group, which has 2,500 employees, lost data in shared files, artwork, logos and other materials, forcing its technical services team to work through the weekend. The company had to lock out its 300 outside salespeople to prevent the infection from spreading and undertook the costly process of having each laptop sent by overnight express to be checked out.

“This one was just particularly nasty. It hit us bad,” said Ashkin, an eWeek Corporate Partner. “We had 10,000 instances before we were able to get ahold of it.”

The virus, which contained the heading “I LoveYou” with an attachment titled “LOVE-LETTER-FOR-YOU.TXT.vbs,” hit more than 100,000 systems in its first hours, beginning in Asia and Europe and spreading west, according to security company F-Secure Corp., of Espoo, Finland. It primarily affected users of Microsoft Corp.‘s Outlook e-mail program, Windows 98 and Windows 2000, and in some cases, Windows 95 and Windows NT 4.0 when Version 5.0 of Microsoft’s Internet Explorer is installed.

“This is an indication of a scary world for the future,” said Peter Kastner, chief research officer and CIO for Aberdeen Group, a Boston- based consultancy that had to shut down its e-mail server for hours. A few early risers opened the attachment, spamming their co-workers and anyone else in their address books.

The virus propagates a worm that replicates to everyone in an infected user’s address book, wiping out sound and graphics files such as MP3 and JPEG files. Many users also had to reset their browser’s home page. Reminiscent of last year’s infamous Melissa virus, this latest strain, in terms of volume and damage, was much worse.

Tanya Candia, F-Secure’s vice president of worldwide marketing, said the company got its first reports around 9 a.m. from Norway. Four hours later, F-Secure had reports from 20 countries. Text of the message included the line “I hate to go to school” with the author identified as “spyder” and a Manila copyright tag. “It seems to be an order of magnitude vastly more disruptive than Melissa,” Candia said. “In the first hours, we had two or three times [more than] the reports of incidents with Melissa. Melissa spread itself to the first 50 names in an address book. This one doesn’t stop at all.”

The Mother’s Day virus includes a graph of text that states the recipient’s credit card has been charged for the amount of $326.92 for a Mother’s Day diamond special. The e-mail urges the recipient to examine the attached invoice carefully and save it. Once the fictional invoice is opened, the virus is in motion again.

Richard Jacobs, president of Sophos Inc., an anti-virus software maker in Wakefield, Mass., said this strain is likely to dupe more people because of the timing, with Mother’s Day coming up May 14, and because a bill is involved. The Mother’s Day virus is even nastier, Jacobs said, because instead of overriding JPEG files, it overrides and deletes BAT and INI files, which can cause more damage and prevent systems from booting up.

“This one could be more difficult to clean up,” Jacobs said. He added that more strains are expected, because anyone who receives a virus also receives the source code for it, making it very easy for someone to go in, intentionally change a few words and launch a new strain.

]]>
http://tiki.is.os-omicron.org/i-love-you-profile-of-a-killer-virus/feed/ 0
Choosing Antivirus Programs http://tiki.is.os-omicron.org/choosing-antivirus-programs/ http://tiki.is.os-omicron.org/choosing-antivirus-programs/#comments Fri, 31 Oct 2014 00:56:55 +0000 http://tiki.is.os-omicron.org/?p=14

cavpWhen choosing an antivirus program, it’s important the program can detect and eliminate all types of viruses, even new ones that have just been created. The protection system must be able to quarantine the virus so it doesn’t spread. Most antivirus software manufacturers request that people send viruses-once quarantined with the antivirus program–to their research center, for purposes of learning more about the virus and recording the virus definition. “When Symantec receives an infected file from someone,” explains Garcia, “we are able to clean the file and return it to the user virus free. We then keep the virus for research purposes.”

Garcia advises that when choosing an antivirus protection program, users look for some important functions. The program should

]]>

cavpWhen choosing an antivirus program, it’s important the program can detect and eliminate all types of viruses, even new ones that have just been created. The protection system must be able to quarantine the virus so it doesn’t spread. Most antivirus software manufacturers request that people send viruses-once quarantined with the antivirus program–to their research center, for purposes of learning more about the virus and recording the virus definition. “When Symantec receives an infected file from someone,” explains Garcia, “we are able to clean the file and return it to the user virus free. We then keep the virus for research purposes.”

Garcia advises that when choosing an antivirus protection program, users look for some important functions. The program should be approved and certified by the International Computer Security Association (ICSA). The ICSA certifies antivirus programs as comprehensive and effective. Additionally, and most importantly, the program must have a “live update” function. “Every day new viruses are created,” says Garcia. “With live update, you are able to ensure your protection includes the latest shield against new viruses. Software is updated via the Internet, keeping your program completely revised.”

Garcia also notes it’s a good idea to be aware of how viruses can attack, making sure not to execute commands which can trigger a virus. “Never open an e-mail attachment from someone you do not know. That’s not to say viruses only come from strangers, but it is just a safe practice to always delete e-mail if you do not recognize the source.”

The following programs are some of the most recognized on the market.

Norton AntiVirus

Symantec manufactures Norton Antivirus 2000, a protection against viruses and other malicious codes at all possible virus entry points, including e-mail attachments and Internet downloads, as well as disk drives and networks. Norton Antivirus 2000 not only automatically scans incoming email attachments, but also eliminates viruses in multiple compressed file levels. LiveAdvisor personalized support services are delivered directly via the Internet.

Norton Antivirus 2000 includes support from the Symantec AntiVirus Research Center (SARC). With offices in the United States, Japan, Australia, and the Netherlands, the center’s mission is to provide global responses to computer virus threats; to research, develop, and deliver technologies that eliminate such threats; and to educate the public on safe computing practices. As new computer viruses appear, SARC develops identification and detection for the viruses and provides either a repair or delete operation, keeping users protected against the latest threats. For added protection, SARC’s The Seeker Project, a research and development project focused on virus search, retrieval, and analysis, searches the Internet and retrieves viruses before users of Norton AntiVirus come into contact with them. A two-pronged approach targets all known virus transmission sites where virus writers post their creations and trade tools and ideas with others, and randomly searches the Internet for viruses in general distributio n. For additional information, visit Symantec’s Website at www.symantec.com.

Microsoft Security Essentials

The Trojan horse is also a dangerous form of virus. A recent example of a Trojan horse attack would be the Distributed Denial of Service (DDOS) attacks early this year, which shut down leading e-commerce sites, including eBay, Amazon, and Yahoo. According to an FBI investigation into the attack, hackers initiated the assault by implanting DDOS vandals in unprotected computers and then sending a trigger signal to the machines to launch a simultaneous attack using hundreds of third-party systems all over the world.

To execute the attacks, hackers planted many copies of a Trojan virus on multiple machines either by hacking into the machines and planting the Trojans manually or by sending the Trojans to people via e-mail and tricking them into executing the virus. When executed, the Trojan embedded itself in the system and hibernated until the hacker began the attack.

“In light of the recent DDOS vandals that hijacked the computers of innocent users and used them to launch an attack on several high-profile Internet sites, we are offering our Microsoft Security Essentials product free of charge to home users,” says Shimon Gruper, of Microsoft. “We offer preemptive digital asset protection. It snares malicious vandals before they can cause irreparable damage or access confidential information on a user’s machine.”

eSafe features Sandbox II, a new version of Aladdin’s proactive virus and vandal quarantine technology that constantly monitors a computer for hostile activity; ready to intervene the moment a malicious code is identified. eSafe traps and quarantines the vandal, alerting users to the invader before any critical information can be assaulted or system resources hijacked.

eSafe Desktop 2.2 also contains new protection features for the personal firewall module that provides increased protection against Internet vandals such as Trojan horses, back doors, hacker tools, and other viruses. For more information on eSafe, check out Aladdin’s Website at www.aks.com.

McAfee for Windows 2000

Through its consumer Website at www.mcafee.com, McAfee offers PC security and management within several areas for all Windows 2000 applications. The McAfee Clinic is a suite of hosted application services providing consumers with critical PC security and virus protection. Programs include VirusScan, First Aid, and VirusScan Online among others. The McAfee Antivirus Center is a comprehensive virus information center that includes viruses’ characteristics, updates of VirusScan, and a virus calendar.

VirusScan Online provides a Web-based online antivirus service that provides protection without the installation and administrative overhead. An online antivirus scanning service allows users to scan their PC or server over the Internet in real-time using a Web browser. The scan service allows users to scan systems for viruses and clean or delete detected infected files. The ActiveShield, a component of VirusScan Online, is a downloadable, PC-resident service that provides continuous, real-time antivirus protection at the system level, automatically updating itself whenever the user logs onto the Internet. A rescue disk is available for users to create an emergency reboot disk that allows them to restart their computer if the system becomes infected with a virus and cannot boot up in a normal sequence.

Additionally, the McAfee PC Checkup Center, an online resource, provides consumers with information and services to assist them in optimizing their PCs. The PC Checkup Center links consumers to a hosted application service offered through the McAfee Clinic and includes Clean Hard Drive and Software Update Finder.

Prevention

Clearly, it’s not just a luxury to have an antivirus protection program–it’s a necessity. No longer can computer users be without state-of-the-art protection against all forms of computer viruses. It’s an insurance policy that Garcia says, “You’ll be glad when you need it and have it, but don’t get caught without it or you’ll regret it.”

About 64 percent of companies were hit by at least one virus in the past 12 months, up from 53 percent the year before. That makes viruses the single-biggest computer and network security concern to the 2,700 executives, security professionals, and technology managers in 49 countries who responded to the Global Information Security survey conducted by Information Week and PricewaterhouseCoopers LLP. In the United States viruses stung 69 percent of companies.

The Global Information Security Survey also reports the number of companies hit by Trojan horses jumped to eight percent, up from three percent.

]]>
http://tiki.is.os-omicron.org/choosing-antivirus-programs/feed/ 3
Let’s Talk HTML Basics http://tiki.is.os-omicron.org/lets-talk-html-basics/ http://tiki.is.os-omicron.org/lets-talk-html-basics/#respond Mon, 04 Aug 2014 10:22:36 +0000 http://www.ajaxlessons.com/?p=10

HTMLHTML documents are plain-text, also known as ASCII files, that can be created using any simple text editor like Notepad or WordPad on Windows. It is best to create your code with these simple text editors as opposed to Word or WordPerfect, which may reformat your code as you create it. You are probably wondering how any lowly text editor could design such sophisticated-looking Web sites. Well, it’s the Web browser that determines how the page actually looks. The browser reads the text, looks for HTML markings, then visually displays the page according to the instructions.

The only drawback to this is that it is impossible to know what your page will look like when it is done. Fortunately,

]]>

HTMLHTML documents are plain-text, also known as ASCII files, that can be created using any simple text editor like Notepad or WordPad on Windows. It is best to create your code with these simple text editors as opposed to Word or WordPerfect, which may reformat your code as you create it. You are probably wondering how any lowly text editor could design such sophisticated-looking Web sites. Well, it’s the Web browser that determines how the page actually looks. The browser reads the text, looks for HTML markings, then visually displays the page according to the instructions.

The only drawback to this is that it is impossible to know what your page will look like when it is done. Fortunately, you can do a test run on a browser before you actually publish your page. It’s not a perfect scenario, but it works.

You will also need access to a Web server to get your files on to the Web. Contact your local internet provider to see if you can post your files free of charge.

TAGS

The tag is a code that describes how the images and texts are going to appear on your site. For example, if you want a certain word or block of text bold, you would type it as follows: (the tag for bold is <B>)

<B>Welcome To My Web Page</B>

The first <B> instructs the browser to make anything after it appear bold. The second </B> (notice the backslash to denote an ending bracket) tells the browser to stop the bold instructions.

Tags denote the various elements in an HTML document. An element is a basic component in the structure of a text document. Elements can be heads, tables, paragraphs, and lists; and they may contain plain text, other elements, or a combination of both.

An HTML tag is made up of a left angle bracket (<), a tag name, and a right angle bracket (>). They are usually paired to begin and end the tag instruction. For example, <H1> and </H1>. The end tag is similar to the start tag except that a slash “/” precedes the text within the brackets.

Some elements may include an attribute, or additional information inside the start tag. For example, if we wanted to create a table using HTML, we would use the table tag, <table>. We could add attributes to the tag to define the border and width of the table, as in: <table border=2 width=100%>.

Mark-Up Tags

* HTML–This announces to your browser that the file contains HTML coded information. The file extension .html also indicates that this is an HTML document and must be coded. The final tag in your document will be </HTML>.

* Head–The head element identifies the first part of your HTML-coded document that contains the title. The title is shown as part of your browser’s window.

<head>

<title> my web page </title>

* Title–The title element contains your document title and identifies its content in a global context. The title is usually displayed in the title bar at the top of the browser window, but not inside the window itself. The title is also what is displayed on someone’s hotlist or bookmark list, so choose something descriptive, unique, and relatively short.

</head>

* Body–The second and largest part of your HTML document is the body, which contains the content of your document (displayed within the text area of your browser window).

* Headings–HTML has six levels of headings numbered one through six, with one being the largest. Headings are usually displayed in larger and/or bolder fonts. The first heading in each document could be tagged <H1>.

<body>

<H1> This displays a large font </H>

Additional code here

* Paragraphs–You must indicate paragraphs with &lt;P&gt; elements. Without them, the document becomes one large paragraph. Your browser doesn’t acknowledge carriage returns, so when it comes across a spot where you pressed Enter, it will just keep reading the text until it comes to &lt;P&gt;. You can also use break tags (<br>) to identify a line break.

</body>

* Lists–Sometimes you’ll want to present your information in the form of a list. HTML lets you create unnumbered, numbered, bulleted, and definition lists.

* Tables–You can also set up data into tables. HTML reduces multiple spaces to a single space, and doesn’t pay attention to tabs. You can use rows and columns, however, and that will work in most situations. Refer to your selected text for more information.

ADDING IMAGES TO YOUR WEB PAGE

When you display images on your Web page, they don’t actually appear on your text editor. All you do is add a tag to the document that basically says “add image here.”

Use the image tag and define the source, which is the location of where the image is located.

<IMG SRC=”A:myimage.gif”>

This HTML tag will display the image named myimage.gif, which is located on the A: drive.

CREATING A HYPERLINK

This is the backbone of all Web pages–creating the ability for your user to link to other locations, whether it be relative (within your own Web site) or absolute (to some other Web site). Here is an example.

<A HREF=”HTTP://www.google.com”>GO TO GOOGLE</A>

This bit of HTML code will display the words “Go to AOL” on your page, and will be linked to the AOL Web site. The user can click on these words to complete the link.

YOU’RE ON YOUR WAY

Although there is much more to know about decorating” and designing your page for optimum beauty and presentation, hopefully you understand what HTML is about and how to go about making use of it. The concept isn’t too far out-once you grasp it you should zip through the basics in no time.

]]>
http://tiki.is.os-omicron.org/lets-talk-html-basics/feed/ 0
Taming Photoshop Yourself http://tiki.is.os-omicron.org/taming-photoshop-yourself/ http://tiki.is.os-omicron.org/taming-photoshop-yourself/#comments Thu, 03 Jul 2014 23:53:35 +0000 http://www.ajaxlessons.com/?p=6 tpyIn reality, unless you’re doing heavy commercial work and fine printing on a press, you can muddle along with Photoshop for long time without having to become an expert. Color management does make life easier in Photoshop, but like a car driver, you only need to know enough to make the car go, not how to get under the hood and fix the engine.

As you play in Photoshop and you see what you can do, the more you do do. That last line should drive my editor crazy. (Editor’s note: yes, it did.) To get my Photoshop education, I’ve taken weeldong classes and two-hour seminars. I’ve gone to conventions that lasted several days and were made up of two-hour

]]>
tpyIn reality, unless you’re doing heavy commercial work and fine printing on a press, you can muddle along with Photoshop for long time without having to become an expert. Color management does make life easier in Photoshop, but like a car driver, you only need to know enough to make the car go, not how to get under the hood and fix the engine.

As you play in Photoshop and you see what you can do, the more you do do. That last line should drive my editor crazy. (Editor’s note: yes, it did.) To get my Photoshop education, I’ve taken weeldong classes and two-hour seminars. I’ve gone to conventions that lasted several days and were made up of two-hour lectures, and I’ve read as many magazines as I could. Poof! before I knew it, I was an expert. I guess rather than approaching Photoshop as a chore–just something to do otherwise I’d fall behind the professional curve and become a dinosaur–I’ve approached it as a new hobby. It was something I couldn’t wait to learn and implement.

The photo of the girl in this column with the big head and large eyes was done originally with a normal lens for display on the outside of the new Toys R Us store in Times Square. The original image is going to be blown up several stories high. I made a print of the altered image for Epson to hang in a show in their booth at the PhotoPlus convention in New York this past November. I had three people ask me what lens I used. Asking a question like that today with all the computer imaging tools at our disposal, shows that they are behind the curve. I was tempted to tell them I used a special patented morph lens with a triple density ga-ga filter over it. But, no, I simply explained that I used the liquefy feature in Photoshop for her head and the perspective function in the transform section of Photoshop for her body.

The before shot was captured digitally on a Leaf C-Most back on a Mamiya 645AF camera. The lens- was a 55-110mm lens, which actually acts as approximately a 75-150mm lens because the digital chips are smaller than the 645 film size. So while a 55mm would act normally on a 35mm camera, it acts as a wide-angle lens when using a 120mm film size. So in this case, using a digital back where the chip is about the size of a 35mm piece of film, a 55mm lens acted like a 55mm lens on a 35mm camera, rather than the wide-angle lens on a 645 camera. Makes your hair hurt, doesn’t it? (Editor’s note: yes, it does). Just understand this original photo, the one on the left, was shot with a normal lens. The great part about shooting digitally is that I didn’t have to scan anything. I also had all my original shots right after the shoot. Normally, I would have to wait to get them back from the client, which would take weeks, if not months. With digital capture, they got ’em, and I got ’em.

So now that I got ’em right after the shoot, I find myself on a two-hour train ride. Usually it’s a long two hours. But with a laptop, Photoshop, and a few files, I find the train ride too short. I’m always rushing to save my files and close the computer as the conductor yells out, “last stop!”

This photo was done all on my laptop during a train ride. It was much more fun than what I usually do, which is catch up on e-mail, write stuff like this column, play games, or even watch a movie. Making these “komic kid” images is more fun than any Hollywood movie for me. I still hate melting clocks, but maybe on the next train ride, for next month, I’ll try a flying baby.

]]>
http://tiki.is.os-omicron.org/taming-photoshop-yourself/feed/ 3
Why You Should Hire A San Diego SEO Company http://tiki.is.os-omicron.org/why-you-should-hire-a-san-diego-seo-company/ http://tiki.is.os-omicron.org/why-you-should-hire-a-san-diego-seo-company/#comments Mon, 02 Jun 2014 05:23:23 +0000 http://tiki.is.os-omicron.org/?p=35 wshseopFor many years lots of companies have acquired more search engine traffic and converting those visitors into sales by with the help of San Diego SEO company like this one. Over the past 17 years, social media has become an important driver of traffic, there have been constant dynamism on algorithms, search engine landscape has gone through many changes and search engine ranking signal. San Diego SEO Company is in a dynamic state to ensure its clients are always getting the most current SEO strategies.

SEO is the process of editing website code and content for the purpose of building authority and relevancy for keywords for the purpose of increasing the amount of organic search engine traffic to …

]]>
wshseopFor many years lots of companies have acquired more search engine traffic and converting those visitors into sales by with the help of San Diego SEO company like this one. Over the past 17 years, social media has become an important driver of traffic, there have been constant dynamism on algorithms, search engine landscape has gone through many changes and search engine ranking signal. San Diego SEO Company is in a dynamic state to ensure its clients are always getting the most current SEO strategies.

SEO is the process of editing website code and content for the purpose of building authority and relevancy for keywords for the purpose of increasing the amount of organic search engine traffic to your website. With a good provider, you are allowed to focus on your business and industry leaving the SEO to SEO experts. We are the best company in the industry and by hiring us, you are sure you are working with the best search engine optimization company. Different companies have different needs so clients receive customized SEO strategies that ensure all the key search engine ranking criteria are optimized. It has vast experience that can help the clients get the most successful results and the highest return on investment with the following services, pay per click management, search engine optimization, internet marketing services and social media management.

How An Internet Marketing Company Will Help You Become More Famous!

Aside from optimizing your rank of relevance in search engine results, there is another way in which you can get more views or exposure. Whether you are selling something on the internet or not, as long as you are longing for some exposure, then all you need is a good company that will make you known in a way that will make people be curious of what you have and even possibly become your avid consumer. One of the services that you can get to buy exposures is by internet marketing. Most quality internet marketing companies have an offer like this and instantly you can get the exposure that you need.

They offer all the kinds of services that you will possibly need to get more attention. A good company will also offer all the kinds of services that have anything to do with exposures. You can also send them pictures of your products and they will enhance it and make sure it looks appealing so the customers will go ahead and try your products. All their services are about helping people get the likes, tweets, and other acknowledging responses that can possibly get to attract more attention in many ways.

]]>
http://tiki.is.os-omicron.org/why-you-should-hire-a-san-diego-seo-company/feed/ 3