Jump to content
xisto Community

karl77

Members
  • Content Count

    42
  • Joined

  • Last visited

Everything posted by karl77

  1. http://forums.xisto.com/no_longer_exists/ One of the security fixes in Firefox 3.0.9 introduced a regression that caused some users to experience frequent crashes. Users of the HTML Validator add-on were particularly affected, but other users also experienced this crash in some situations. In analyzing this crash we discovered that it was due to memory corruption similar to cases that have been identified as security vulnerabilities in the past. Hope this helps.
  2. The usual way to do this in VB.NET is: Code: if StrComp(String1,String2,vbTextCompare)=0 then 'same stringsend ifBut the improvements of .Net, and the last recommandations imply that all should be methods/attributes: Code:If String.Compare(String1,String2,True)=0 then 'same stringsend if You can also use the method: Code:if String1.CompareTo(String2,True)=0 then 'same stringsend if
  3. You'll find below global steps to take to secure your computer:Operating system and software patches and updates----------------------------------------------------There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any type of method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.Passwords-----------Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.?Change passwords often. It is recommended at least once every few months.Create a BIOS password.When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23.Get a hardware or software firewall----------------------------------It's highly recommend all users have some type of firewall solution. There are two types of firewall's your computer and/or network can have.Trojans, viruses, spyware, and other malware--------------------------------------------Software trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information.To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.Know how to handle e-mails---------------------------Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See our phishing dictionary definition for additional information about this term as well as examples of these type of e-mails.Alternative browser-------------------Before the release of Microsoft Windows XP SP2 and Internet Explorer 6.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.However, these as some of basic steps to take ...You'll find below global steps to take to secure your computer:Operating system and software patches and updates----------------------------------------------------There is no such thing as perfect software, often a software program may have several issues and could potentially have security vulnerabilities that can leave your computer open to attacks that compromise your computer and your data.Software patches, updates, and drivers are made available, often for free, to consumers to help keep a software program and operating systems running properly and secure. If the program you're using does not have any type of method of checking for updates on its own it is up to you to verify the program is up-to-date. Often this can be done by visiting the web site of the developer who created the program. A listing of third-party companies and links to each of their pages can be found on our third-party support page.Passwords-----------Make sure a password has been set on computer. Default passwords such as password, root, admin or no password will allow easy access to your computer or your Internet account.?Change passwords often. It is recommended at least once every few months.Create a BIOS password.When creating a password, add numbers or other characters to the password to make it more difficult to guess; for example: 1mypassword23.Get a hardware or software firewall----------------------------------It's highly recommend all users have some type of firewall solution. There are two types of firewall's your computer and/or network can have.Trojans, viruses, spyware, and other malware--------------------------------------------Software trojans, viruses, spyware, and other malware can not only damage or destroy your computer data but is also capable of monitoring your computer to learn more about your viewing habits on the Internet or even log all your keystrokes to capture sensitive data such as passwords and credit card information.To help protect your computer from these threats we suggest installing a virus protection program as well as a spyware protection program.Know how to handle e-mails---------------------------Today, e-mail is one of the most popular features on the Internet. Being able to identify threats sent through e-mail can help keep your computer and your personal information safe. Below are some of the most common threats you may encounter while using e-mail.Attachments - Never open or run e-mail attachments. Viruses, spyware, and other malware are commonly distributed through e-mails that have attachments. For example, an e-mail may want you to open an attachment of a funny video, when it's actually a virus.Phishing - Phishing or an e-mail phish is an e-mail that appears to be from an official company (such as your bank) indicating you need to log onto the site to check your account settings. However, the e-mails are actually sites setup to steal confidential information such as your passwords, credit card information, social security information, etc. See our phishing dictionary definition for additional information about this term as well as examples of these type of e-mails.Alternative browser-------------------Before the release of Microsoft Windows XP SP2 and Internet Explorer 6.0, Microsoft Internet Explorer was notorious for security and spyware related issues. Although it has improved since then we still highly recommend considering an alternative browser such as Mozilla Firefox.However, these as some of basic steps to take ...
  4. Removable storage devices such as USB flash memory has simple plug-and-play design that allows you to easily and quickly transfer and store data. However it also makes virus and spyware spread easily. Many viruses transmit via USB drives by utilizing system Autorun features. To do this a virus first copies itself and the "autorun.ini" file into removable disk. When you plug your removable disk into your PC, the system reads the autorun.ini first, then it runs the virus executable file specified in autorun.ini. The virus executable is then launched and copied to your system. To protect your system against this kind of virus/spyware, you need to disable the Autorun features on your system.?To disable the autorun feature, please do as follow:1/ Click Start, then click Run, type "gpedit.msc" to open the Group Policy dialog.?2/ In the left pane, expand the Computer Configuration in Local Computer Policy.?3/ Then locate and expand Administrative Templates.?4/ Select System.?5/ In the right pane, double click Turn off Autoplay to open the properties dialog.?6/ Select the Enabled radio box. In the Turn off Autoplay on: select list, select?? All drives to disable autoplay on all drives.?7/ Click OK to save the change.?8/ Done.?This could prevent some worries....
  5. A couple of weeks ago one of my friends downloaded and installed a key logger program from the internet and now I can't even get a command promt.It seems to be locked out entirely. Is there a way to regain controle of the machine. it happens to have removable hard drive racks,and the hard drive that is locked is win2k.the one he's using now is linux,which is still pretty much a learning curve for him.
  6. I'm also having a troube with my sound driver under linux. I tried to search the internet for the Cirrus Logic / CS429X driver, but with no luck.By default, the system installed an intel driver but is not stable.?
  7. Anyone here use Torrents? I found this multi-search engine for Torrents. I thought you guys might be interested? Click Here: TorrentPond.com URL: http://forums.xisto.com/no_longer_exists/
  8. karl77

    Ubuntu

    Hello,I tried recently to install Ubuntu 9.04 desktop on a dell laptop, but it freezes at the install loader. I guess some problem with the drivers.I hope the next version will be enhanced and more stable.
  9. I don't practice Yoga, but wonder if it can halp overweight people to keep their health at good level.
  10. I agree with InsatiableKisses, vitamin C alone can't be harm at my point of view.I used to take natural vitamin C for long years now. But I don't really know if a mix of vitamins can harm.cheers.
  11. Hello,I am a Linux fan. I like sometimes to play under linux (but online, something like Hold Em / Poker).Thanks for the link.
  12. Hello, Last Thursday, the Google's CEO predicts a strong year for Android: http://forums.xisto.com/no_longer_exists/ Google is pushing this main project vowed to target the next generation of smart phones for mobile services. And you, what do you think? Would Android take a great expansion this year? Maybe, it will start getting installed on some laptops.
  13. Hello all,I am a new subscriber and I was looking for a tutorial (with some screenshots) on how set up a subdomain once enough credits are collected. I finally found it at the first page of this 7 pages long post.Thanks.
  14. I am a new subscriber and hope this service can host my website.
×
×
  • Create New...

Important Information

Terms of Use | Privacy Policy | Guidelines | We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.