Pakcik Google

only search Ask MrJ

Monday 18 November 2013

7 habits of good security


Thank To HP for sent this eNewsletter to me.
Must read IT business eNewsletter
You might not think about it when you’re caught up browsing the web, shopping and interacting on social media, but you are the first line of defence to protect against cyber security risks. The power to be safe is in your hands and at your fingertips. Developing and maintaining good habits can make online activity much safer and more enjoyable for you and your colleagues.

The following seven good habits take only minutes to learn and are easy enough to incorporate into your daily computing.
1. Create strong passwords
Passwords are usually the first, and sometimes only, protection against unauthorised access. They are the keys to your online kingdom, so keep these guidelines in mind.
Make passwords long and complex to combat sophisticated criminal tools
Use a mix of upper and lower case alpha, numeric and special characters
Use a variety of passwords on different systems and sites
Change passwords regularly
Be cautious when allowing your computer or websites to ‘remember’ passwords
Since it can be difficult to remember a long, complex password, consider using a passphrase. For example, think of a phrase you can remember such as, “I love chocolate”. Replace some of the letters with numbers, special characters, and upper-case letters and you’ve got something like “!LoveChoc0l@te”. The more numbers and special characters you use, the harder it will be to crack your password. 
2. Lock your computer screen
You never know who might use your computer when you’re not around – friends, family or colleagues – so it’s important to lock your screen to prevent unauthorised access. In the office, a co-worker, guest or a service provider such as a cleaning crew might view or use your unattended computer. This is an easy way for private information to become public.

It only takes a few seconds to lock your PC. Just press the Ctrl+Alt+Delete keys and then select the option “Lock this computer”. For your smartphones and tablets, use the passcode feature, as these devices are just as vulnerable as your PC. 

3. Secure mobile devices from loss
While mobile devices such as smartphones, tablets and laptops are loved for their mobility, this convenience can become a security risk. It’s easy to lose or misplace these devices, so be sure to:
Make a list of phone numbers and email addresses to report stolen or lost devices
Use a hardware cable lock for laptops or store it in a locked drawer
Keep smartphones and tablets on you when in public
Keep devices with you and never put them in your checked baggage when travelling
Lock devices out of sight if you must leave them in your car
4. Protect data on mobile devices and removable media
Mobile devices and removable media, such as USB drives, enable us to easily share and transport information, but can lead to the loss or misuse of data. Although it’s important to protect the actual devices themselves from loss, it’s equally important to protect the information they contain.
Turn on and accept automatic updates
Create regular backups of important data
Disable features you do not use
Erase all data before you discard, donate or give it away
Encrypt the information, if possible
Use anti-virus software and keep it up to date
5. Identify URLs before clicking
Simply stated: think before you click. A malicious website that looks like a legitimate one is a common method used by criminals. However, verifying the real destination is easy – just place your cursor over the displayed URL and the true destination will reveal itself with a small pop-up. Don’t click if it looks suspicious.

For URL shorteners like tinyurl.com and bit.ly, simply add a plus sign (+) to the end of the URL to display its true source. For QR codes, choose a reader app that allows you to preview the destination before opening the link. And when it comes to mobile apps and software, download from a trusted source, like Google Play, Microsoft.com or Java.com. 

6. Use public Wi-Fi safely
Public Wi-Fi is riskier than corporate or home Wi-Fi because you can’t determine its setup and security features. So, take extra precautions when using it.
Do not access sensitive personal accounts, such as financial accounts
Ensure websites use HTTPS and display a lock icon
Watch out for “shoulder surfing” from people and security cameras
Never use a public computer, such as one in a hotel lobby, to access personal information
Use only for general web browsing, e.g., weather forecasts and restaurant reviews

7. Think before you post to social media
Social media provides a convenient, fun way to stay in touch with friends and family. But be cautious about what you post. Understand both personal and business risks, and take the following precautions.
Always comply with the your company’s business conduct
Ask friends and family to keep your personal information private, including relationships
Be cautious about participating in games and surveys or clicking on links suggested by others
Review and update your social media privacy and security settings often

Use daily
Bad habits might die hard, but good habits can protect you from cyber threats. You are the first line of defence in protecting you, your colleagues and your devices against security risks. And as criminal methods and tactics are becoming more advanced, it’s more important than ever to establish and maintain good security habits.


For More.....Go to  
HP Technology

Friday 25 October 2013

What is Chromebook



A Chromebook is a personal computer running Chrome OS as its operating system. The devices are designed to be used while connected to the Internet and support applications that reside on the Web, rather than traditional applications that reside on the machine itself.


Samsung

The new Samsung Chromebook is an ultraportable, sleek laptop for everyday adventures. It boots in second, has apps built-in, and keep getting better over time with automatic updates.





For mor info Go to this link  :  http://www.samsung.com/us/computer/chromebook

Lisa Kelly : Five reasons growing SMEs cannot ignore the cloud

Trusted or not........

When a growing business cannot justify developing its in-house IT department, the cloud can deliver pay-as-you-go, access to skilled staff and flexibility. But can SME business leaders trust the cloud with
security and standardisation?


For many growing businesses, IT is seen as both an opportunity and a potential hindrance. Leaders in small and medium-sized enterprises (SMEs) recognise that technology is critical to supporting growth, productivity and competitiveness. But high capital costs, access to scarce skills, and the retention of legacy IT systems often make it difficult to maximise the return on investment and benefits that modern technology offers.

For complete article go to this link : http://docs.media.bitpipe.com/io_10x/io_102267/item_465972/whitepaper_30713835518.pdf


Brocade : Brocade VCS Fabric Technical Architecture



Providing 24/7/365 access to information with zero downtime is crucial to the success of your business. To achieve this, new technologies such as virtualisation and cloud computing are being adopted. However, utilising these technologies places great demand on the network and creates a number of challenges that must be addressed and remediated.

The time for the data centre network to evolve is now, and Ethernet fabrics can help you get the job done. Inside, explore how scaled-out Ethernet fabrics provide the reliability and scalability your network needs while simultaneously decreasing both complexity and operational expenses.

This resource takes a deep dive into the technical architecture of Ethernet fabric technology, explaining:
Virtual cluster switching technology
How the control, data, and management planes function
A comparison of Ethernet fabric with the TRILL standard
And much more!


Go link below and search  this title
Brocade VCS Fabric Technical Architecture

http://searchnetworking.bitpipe.com

Robert Sutter : 3 Methods To Ensure Strong Adventure Race Training

Perhaps adventure race training is something that you want to go about doing. If this is the case, I believe that there are many ways to make sure that you get the most out of the work you put forth. It's clear that your attention is going to be set on larger races in general but what can be done, on your part, in order to ensure success? There are many ways that this can be gone about and here are only 3 steps that can help you to get the most out of this level of training.

1. When engaged in adventure race training, make absolutely certain that you pace yourself as much as possible. These races typically last for a couple of hours, meaning that you're going to need all of the energy that you have in order to reach the end. So many novices seem to utilize everything from the get-go, which is a problem when they find themselves dawdling behind. Make sure that you pace yourself as you find yourself in events like Spartan Race; your body will thank you for it.

2. It is apparent that your diet is going to require a number of different nutrients. Some of these may prove to be more essential than others but I feel as though they all come together in order to create that much more effective of a regimen. Protein is one such example, as it is able to keep your muscles going. Carbohydrates are utilized for the sake of energy, each of them being able to help your body along as you start to become more and more involved in a given race.

3. You want to make sure that you're able to go about training without accidentally hurting yourself. I've seen people go about a number of runs in the past and it seemed like they returned with problems involving their legs. If it wasn't slight soreness at one point, it was an actual fracture at another. It's understandable that there's a level of vigor when it comes to preparation but even going about light jogs can ensure that your physical stature is not going to be put in jeopardy.

There is much work to associate with adventure race training and there are many steps to consider as well. Even though these are only a few, I'd like to think that they can come into play in order to help individuals from a physical standpoint. It seems like those who are new to on-foot racing may not know everything that there is to know about this physical activity. As long as you keep these steps in mind, though, you're only going to do your physical conditioning more favors.