Sabtu, 29 Agustus 2009

Continuing

4. Use antivirus software. Install antivirus software which will scan your system searching and erasing viruses on a regular basis. Leaders in antivirus software products for Windows systems are Norton Antivirus, McAfee, Kaspersky Anti-Virus and PC-cilin.

5. Regularly update operating system. Windows XP has built-in automatic update service. It regularly contacts Microsoft server to find updates and notifies you if updates are ready to be installed. Updates are important because hackers regularly find holes in operating system which are often used by virus creators.

6. Don't install and don't run suspicious software. Check new programs which you are going to install with anti-virus software. Don't download software from suspicious websites. To download software always seek website of software creator or official distributor. Do not open applications received by email from unknown persons.

7. Limit access to your computer. Protect enter to system with password.

8. If you use Internet Explorer, consider moving to another browser. As IE is the most distributed browser today virus creators actively use defects in its security system to infect computers. Infection may arise if you will visit webpage which contains invisible harmful code. You are more safe if you use less known browser only because virus creators do not pay much attention to it. Major IE competitors Firefox and Opera browsers provide now the same comfortable interface and range of services for working on the Web.

9. Use spam protection. Viruses are often distributed via email. Switch on spam filters in your email box to block spam receiving. If you need assistance with using of the filters you can ask your email service provider.
About the Author

Evgeny Kovalenko is the Editor of FSSD computer software directory with free submission service for software developers and distributors.

9 Steps to Protect your MS Windows System from Viruses

Nowadays as the Internet and other networks are greatly developed computer viruses are distributed rapidly and intensively. Everyday several new viruses capable to damage considerably your computer system arise. Anti-virus specialists work hardly to make updates their software against new viruses as soon as possible. The viruses can get inside computer in different ways. That is why there is no simple method to protect system. Only series of measures can give you reliable protection from the infection. Below are 9 steps to protect MS Windows based PC system from viruses.

1. Make regular backups. It should be said that there is no absolutely safe way of protection. Virus creators regularly find holes in new computer products to use them for infection of computer systems. Some dangerous viruses can considerably damage data files or even erase entire file system. Make regular backups of your data files to separate file storage device. It can be separate hard drive, flash card, compact disc or another file storage device which you choose. To ease the procedure you can use some automatic backup software. And be ready if the system will die because of virus infection.

2. Be ready to reinstall your system if it dies because of viruses. Get distributives of your operation system and distributives of software which you use and keep them together, for instance, on a set of CDs not far away from you. In this case if virus infection will cause unrecoverable system failure you can rapidly reinstall your working medium.

3. Protect your network connection with Firewall. Firewall is a software which blocks suspicious potentially dangerous connections to preventing viruses from network to penetrate into your system. Windows XP system has quit simple but reliable built-in firewall. You can enable it as follows. 1) in Control Panel, double-click Networking and Internet Connections, and then click Network Connections. 2) Right-click the connection on which you would like to enable firewall, and then click Properties. 3) On the Advanced tab, check the option to Protect my computer and network.

Rabu, 01 Juli 2009

technoraty code

vjz3y4sq5b

Senin, 29 Juni 2009

Security risks for your IT infrastructure

Security has always been an important part of any IT infrastructure. It means protecting your information and information systems from unauthorized access, use, disclosure, disruption, modification or destruction. But, there will always be people who will try to infiltrate or want to access your network to do their malicious deeds.

As the security technology improves, simultaneously the skills of these hackers. But what can we do to protect ourselves from these threats?

1. Physical Attacks

We can set a policy in place that prohibits the use of any type of external storage device. Also, we can use Read Only Domain Controllers (RODC) that helps the networks concerned. Further, the BitLocker feature, which is designed to protect data by providing encryption for entire volumes, helps to protect sensitive data.

2. Comprise Pass-phrases in place of Passwords

A password is a secret word or string of characters that is used for authentication, to prove identity or gain access to a resource. Password policies should use encryption method, which is if less than 15 characters long, is automatically stored in backup. So instead of a password, have your users come up with a passphrase instead. And please do not write your password for someone else.

3. Avoid phishing attacks through E-mails

The rise in specifically targeted e-mail attacks has been of significant concern to security experts. Such attacks are both harder to detect than mass phishing attacks and more likely to be acted on given the fact they are customized to their recipients, including things such as their name and official title.

You can receive an e-mail claiming to be from your bank or from your HR department, claiming that a new policy is in place and it’s required that you change your password for security reasons. You provided the password and credentials, which is used by the bad guys for their benefits.

5. Be cautious on self-replicating worms

A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes and it may do so without any user intervention. Although, worms do not corrupt or devour files like a virus, they usually consume your PC’s bandwidth.

Recently, the Conficker worm had caused so many problems to networks are still around and Microsoft announces a $250,000 bounty on the head of those who created it. A new variant known as Conficker B++ has also been spotted in the industry and the IT industry’s attempts to bring it down.

6. Increasingly Malicious Malware

Malware is software designed to infiltrate or damage a computer system without the owner's informed consent. Although most of the malware is not malicious in nature and is usually referred to as spyware, malware includes computer viruses, worms, Trojan horses, most rootkits, dishonest adware, crimeware and unwanted software.

7. Have a heads up on Unauthorized Network Access

One of the biggest challenges for any organization is to keep an eye on the person who wants to access the network that should not. Fortunately, we have tools like Network Access Control (NAC), which uses a set of protocols to define and implement a security policy that describes how to secure access to network nodes by devices when they initially attempt to access the network. It forms a standard, when met, the computer is able to access network resources and the Internet, within the policies defined within the NAC system.

There is also Network Access Protection (NAP), which is used for controlling network access of a computer host based on the system health of the host.

Rabu, 24 Juni 2009

Life insurance

Life insurance or life assurance is a contract between the policy owner and the insurer, where the insurer agrees to pay a sum of money upon the occurrence of the insured individual's or individuals' death or other event, such as terminal illness or critical illness. In return, the policy owner agrees to pay a stipulated amount called a premium at regular intervals or in lump sums. There may be designs in some countries where bills and death expenses plus catering for after funeral expenses should be included in Policy Premium. In the United States, the predominant form simply specifies a lump sum to be paid on the insured's demise.

As with most insurance policies, life insurance is a contract between the insurer and the policy owner whereby a benefit is paid to the designated beneficiaries if an insured event occurs which is covered by the policy.

The value for the policyholder is derived, not from an actual claim event, rather it is the value derived from the 'peace of mind' experienced by the policyholder, due to the negating of adverse financial consequences caused by the death of the Life Assured.

To be a life policy the insured event must be based upon the lives of the people named in the policy.

Insured events that may be covered include:

* Serious illness

Life policies are legal contracts and the terms of the contract describe the limitations of the insured events. Specific exclusions are often written into the contract to limit the liability of the insurer; for example claims relating to suicide, fraud, war, riot and civil commotion.

Life-based contracts tend to fall into two major categories:

* Protection policies - designed to provide a benefit in the event of specified event, typically a lump sum payment. A common form of this design is term insurance.
* Investment policies - where the main objective is to facilitate the growth of capital by regular or single premiums. Common forms (in the US anyway) are whole life, universal life and variable life policies.

Selasa, 16 September 2008

Parties to contract

here is a difference between the insured and the policy owner (policy holder), although the owner and the insured are often the same person. For example, if Joe buys a policy on his own life, he is both the owner and the insured. But if Jane, his wife, buys a policy on Joe's life, she is the owner and he is the insured. The policy owner is the guarantee and he or she will be the person who will pay for the policy. The insured is a participant in the contract, but not necessarily a party to it.

The beneficiary receives policy proceeds upon the insured's death. The owner designates the beneficiary, but the beneficiary is not a party to the policy. The owner can change the beneficiary unless the policy has an irrevocable beneficiary designation. With an irrevocable beneficiary, that beneficiary must agree to any beneficiary changes, policy assignments, or cash value borrowing.

In cases where the policy owner is not the insured (also referred to as the celui qui vit or CQV), insurance companies have sought to limit policy purchases to those with an "insurable interest" in the CQV. For life insurance policies, close family members and business partners will usually be found to have an insurable interest. The "insurable interest" requirement usually demonstrates that the purchaser will actually suffer some kind of loss if the CQV dies. Such a requirement prevents people from benefiting from the purchase of purely speculative policies on people they expect to die. With no insurable interest requirement, the risk that a purchaser would murder the CQV for insurance proceeds would be great. In at least one case, an insurance company which sold a policy to a purchaser with no insurable interest (who later murdered the CQV for the proceeds), was found liable in court for contributing to the wrongful death of the victim (Liberty National Life v. Weldon, 267 Ala.171 (1957)).

Jumat, 18 Juli 2008

The insurer (the life insurance company) calculates the policy prices with intent to fund claims to be paid and administrative costs, and to make a profit. The cost of insurance is determined using mortality tables calculated by actuaries. Actuaries are professionals who employ actuarial science, which is based in mathematics (primarily probability and statistics). Mortality tables are statistically-based tables showing expected annual mortality rates. It is possible to derive life expectancy estimates from these mortality assumptions. Such estimates can be important in taxation regulation.
The three main variables in a mortality table have been age, gender, and use of tobacco. More recently in the US, preferred class specific tables were introduced. The mortality tables provide a baseline for the cost of insurance. In practice, these mortality tables are used in conjunction with the health and family history of the individual applying for a policy in order to determine premiums and insurability. Mortality tables currently in use by life insurance companies in the United States are individually modified by each company using pooled industry experience studies as a starting point. In the 1980s and 90's the SOA 1975-80 Basic Select & Ultimate tables were the typical reference points, while the 2001 VBT and 2001 CSO tables were published more recently. The newer tables include separate mortality tables for smokers and non-smokers and the CSO tables include separate tables for preferred classes.
Recent US select mortality tables predict that roughly 0.35 in 1,000 non-smoking males aged 25 will die during the first year of coverage after underwriting.
Mortality approximately doubles for every extra ten years of age so that the mortality rate in the first year for underwritten non-smoking men is about 2.5 in 1,000 people at age 65
Compare this with the US population male mortality rates of 1.3 per 1,000 at age 25 and 19.3 at age 65 (without regard to health or smoking status).
The mortality of underwritten persons rises much more quickly than the general population. At the end of 10 years the mortality of that 25 year-old, non-smoking male is 0.66/1000/year. Consequently, in a group of one thousand 25 year old males with a $100,000 policy, all of average health, a life insurance company would have to collect approximately $50 a year from each of a large group to cover the relatively few expected claims. (0.35 to 0.66 expected deaths in each year x $100,000 payout per death = $35 per policy). Administrative and sales commissions need to be accounted for in order for this to make business sense. A 10 year policy for a 25 year old non-smoking male person with preferred medical history may get offers as low as $90 per year for a $100,000 policy in the competitive US life insurance market.

The insurance company receives the premiums from the policy owner and invests them to create a pool of money from which it can pay claims and finance the insurance company's operations. Contrary to popular belief, the majority of the money that insurance companies make comes directly from premiums paid, as money gained through investment of premiums can never, in even the most ideal market conditions, vest enough money per year to pay out claims.