Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Wednesday, August 6, 2008

The recent cellphone technology

"I need to chat with my friend"
"Here, use my phone."
"Have you heard the new Coldplay song?"
"Yeah, I have it here on my phone."
"So who's this new hot mama you've been dating?"
"Check out her picture on my phone."
"Did you bring the can opener with you?
"of course not, use my phone"

Tuesday, July 29, 2008

What is a keylogger?

A keylogger, sometimes called a keystroke logger, key logger, or system monitor, is a hardware device or small program that monitors each keystroke a user types on a specific computer's keyboard. As a hardware device, a keylogger is a small battery-sized plug that serves as a connector between the user's keyboard and computer. Because the device resembles an ordinary keyboard plug, it is relatively easy for someone who wants to monitor a user's behavior to physically hide such a device "in plain sight." (It also helps that most workstation keyboards plug into the back of the computer.) As the user types, the device collects each keystroke and saves it as text in its own miniature hard drive. At a later point in time, the person who installed the keylogger must return and physically remove the device in order to access the information the device has gathered.
A keylogger program does not require physical access to the user's computer. It can be downloaded on purpose by someone who wants to monitor activity on a particular computer or it can be downloaded unwittingly as spyware and executed as part of a rootkit or remote administration (RAT) Trojan horse. A keylogger program typically consists of two files that get installed in the same directory: a dynamic link library (DLL) file (which does all the recording) and an executable file (.EXE) that installs the DLL file and triggers it to work. The keylogger program records each keystroke the user types and uploads the information over the Internet periodically to whoever installed the program.
Although keylogger programs are promoted for benign purposes like allowing parents to monitor their children's whereabouts on the Internet, most privacy advocates agree that the potential for abuse is so great that legislation should be enacted to clearly make the unauthorized use of keyloggers a criminal offense.
Source: http://searchsecurity.techtarget.com/sDefinition/0,,sid14_gci962518,00.html

Saturday, July 26, 2008

Where and how to become a CISCO certified?

Hey guys, wazup! Wanna be a CISCO certified? I guess all IT professionals want to become CISCO certified, right? yeah, you write! I know not much about computer technology but im craving to become one of those multi-talented geeks out there. (a geek?, sounds like ew to me! hehehe)
It is a huge help for us if you want to share your ideas, suggestions and comments here regarding CISCO certification. Please tell us the magic on how to become one of them.
Are you ONE of them?

Sunday, July 13, 2008

Fixing my client's wrecked PC...


still fixing up to this moment...have a break and make a blog.
im done fixing all the laundries. lol

DOTa: Jakiro vs. Earthshaker


intel828c pwned 6I earthshaker’s head for 325 gold!
watch and learn!

How safe is your PC from these anti-viruses?

Each year, more and more viruses, worms, and Trojan horses are dimensioned and discharged into the untamed world of internet. Set outing anti-virus software on your desktops and servers is all well and good, but if your users don’t know the “rules of assignation,” your virus prevention efforts could be for nothing. (pag xure oi !! ew! xure na gyud ni yot!) ok continue blogging…
How safe is your PC from these antiviruses? Here are some list of antiviruses that I have tried and their business overviews.
Kaspersky - Founded in 1997, Kaspersky Lab is an international information security software vendor. Kaspersky Lab is headquartered in Moscow, Russia and has regional offices in the UK, France, Germany, the Netherlands, Poland, Japan, China, Korea, Romania and the United States. Further expanding the company’s reach is its large partner network comprising over 500 companies globally.
Norton from Symantec - symantec is a global leader in infrastructure software, enabling businesses and consumers to have confidence in a connected world. The company helps customers protect their infrastructure, information and interactions by delivering software and services that address risks to security, availability, compliance and performance. Headquartered in Cupertino, Calif., Symantec has operations in more than 40 countries.
McAfee - is the world’s largest dedicated security technology company. McAfee delivers proactive and proven solutions and services that secure systems and networks around the world, allowing users to browse and shop the Web securely. With our unmatched security expertise and commitment to innovation, McAfee helps home users, businesses, the public sector and service providers to comply with regulations, protect data, prevent disruptions, identify vulnerabilities and continuously monitor and improve their security. Our products are unique in how they work together to make securityaffordable and manageable. These days, the threats are tougher, and the perpetrators are trickier. But as we have for more than 20 years, McAfee delivers superior protection that is trusted by millions of people.
AVG - Founded in 1991, with corporate offices in Europe, the US and the UK, AVG is focused on providing home and business computer users with the most comprehensive and proactive protection against computer security threats.With more than 70 million active users around the world, the AVG family of security software products is distributed globally through resellers and through the Web and supports all major operating systems and platforms.
Lists of viruses found in my computer. (hehehhe) A big thanks to my pro GUARDIAN.
AdWare.Win32.Virtumonde.zyv
Trojan-Downloader.Win32.Hmir.esn
Worm.Win32.Downloader.re
Backdoor.Win32.Agent.ltd
Trojan.Win32.Buzus.lab
Trojan-Downloader.Win32.VB.fnr
Trojan-GameThief.Win32.OnLineGames
Worm.Win32.Runfer.acb
Trojan-Clicker.Win32.Agent.bdf
Trojan-GameThief.Win32.OnLineGames.scaj

Jakiro - The Twin Head Dragon DOTa


Originally found gnawing at the roots of the World Tree during an excavation, this magnificent Chimaera’s age is impossible to determine. With his large snapping heads and agressive, unpredictable behavior, Jakiro is an intimidating creature to say the least, yet in loyal to the Sentinel for reasons all his own. Due to his strange mystical nature, he has a strange affinity with the element forces of ice and fire, allows him to devastate all he sees before him, and is more than capable of keeping a targets enemy in his line of fury. The Scourge would do best to be wary of this dragon, lest they all freeze and shatter as their precious Frozen Throne melts before their eyes.
Jakiro - The Twin Head DragonRange: 400
Move Speed: 290Primary: INTStr: 24 + 2.3
Agi: 10 + 1.2
Int: 28 + 2.8Damage: 42 - 54 HP: 606
Mana: 364HP Regen: 0.97 Mana Regen: 1.13Attack Speed: 1.4
Armor: 0

GiggleYohoo designed by CHRiS CaGanG - ALL RIGHTS RESERVED series of 2022

Click to TOP