Saturday, 4 August 2012

8 LED Solar Wall Light (Black Body,White LED)









8 LED solar garden light,WALL LAMP,outdoor Lawn lamp,led,automatic,light-operated,waterproof
Instructions: open the lampshade turning to the left, toggle switch, plug the lamp, set in the place where the sunlight is available.

No wiring required - Instantly get started with solar outdoor lighting with no additional electric bill costs! Assembles and installs in seconds. The solar panel converts sunlight into electricity and charges the rechargeable battery during the day. At night, light turns on automatically

low power consumption
long lift
solar lamp,Solar Lawn Light,solar lawn lamp,led light,solar Garden light Solar light

LED Solar Light
PACKAGE:GROSS WEIGHT 1KG,COLOR PACK
Dimension:35CM(H)*20CM(W)
Charging battery:3*AA BATTERY 1200MAH/EACH
Solar panel:6V/120MAH[0.72W]
LAWN LAMB:8 LED

Thursday, 3 March 2011

Phishing for Trouble: 12 Tips To Avoid Being A Victim Of The Internet’s Cruelest Scam

"internet scams"
Online scams have been around ever since people started using the Internet. However, what used to be as “simple” as getting people to give you their confidential information via an e-mail by simply asking for it has, over the years, evolved to beat the technologies that were placed to prevent it, and taken the modern day form of “phishing.” In my opinion phishing is perhaps the cruelest scam of all, since it not only deceives you, it does so by manipulating your trust and feeding on your fear. And more often than not, it’s difficult to realize that you’ve been stabbed from behind by an enemy pretending to be your friend.
What is phishing and how do you protect yourself from it?
According to Antiphishing.org:
Phishing is a form of online identity theft that uses spoofed e-mails designed to lure recipients to fraudulent Websites which attempt to trick them into giving out personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc.
 By hijacking the trusted brands of well-known banks, online retailers and credit card companies, data suggests that phishers are able to convince recipients to respond to them. As a result of these scams, an increasing number of consumers are suffering credit card fraud, identity theft, and financial loss.
The majority of Internet surfers use Internet Explorer (or IE) as the main browser on their personal computers. This is fine, except for the fact that IE is well-known for all its security and design flaws. Sure, everything looks good on the surface, but the industry standard browser has many holes to cover up. One such flaw in the Internet Explorer allows scam artists to insert malicious codes into your e-mails to steal the identity of major brands and disguise as them, sending out SPAM that appear to be legitimate, official correspondence.
These phishing scams generally follow a certain pattern. Almost all use “scare tactics” with the intention of making you panic and take action instinctively to protect yourself. They send e-mails that seem to be from a known, legitimate business (Chase Bank or PayPal, for instance) to warn you about your account status, security breach, or general misuse of your account by somebody else, asking you to take action by clicking on the link contained in the e-mail to prevent it from happening.
These scam artists got so sophisticated that they even use the brand’s logo, official e-mail addresses, Website images and type fonts in their e-mails. Then they ask you to click on the link contained in the e-mail, which seems to be on the same domain as the sender of the e-mail. Everything, up to this point, will seem perfectly natural.
What happens after is a different story.
When you click on the link contained in the e-mails, an automated script takes you to a different domain that may look exactly like the Website you’re expecting to see. They use scripts that cause the legitimate Website address to appear in the address bar, but the actual site being displayed is that of the fraudster. What these scam artists do is that they completely replicate the major brand’s Website. They don’t need to duplicate everything, just a single login page. When you enter your login id, password, credit card info or any other vital information and submit it, the information is automatically added to a remote database, and you’re then redirected to the brand’s actual Website. Most users, thinking they were redirected because they entered the information wrongly, would not suspect anything. By this time, however, it may already be too late.
As if that was not scary enough, sometimes these phishing e-mails automatically install a software called a key logger when you open e-mail attachments or click on the links. This is extremely vicious software that can record every “key” you type on the keyboard and “log” the information, sending it to a remote server. Even if you enter your password into encrypted login pages, the software can track what alphabets and numbers you used for your login or password.
Now that’s a frightening thought!
Besides emptying your bank and credit cards, some phishers also hijack your browser and ISP service. You might not even notice it when your Internet connection gets disconnected for mere seconds before being reconnected, but this time your connection may be shared by a shadowy figure from halfway across the world. Nothing may seem amiss until you receive your phone bills. In one case I personally heard of, an acquaintance of mine got his browser hijacked and connected to a foreign ISP, in some part of the world I cannot remember. What happened is that instead of paying local charges, he paid full international calling rates to be connected to the foreign ISP, which remains till this date, untraceable. Although he later realized it happened when he tried to gain “free” access to an adult entertainment site, the same scenario could happen with almost any other Website with a criminal mind behind it.
Have you ever gotten an e-mail with either of these subjects?-
eBay Verify Accounts
Critical : Paypal Security Warning
Didn’t those e-mails look real? Yet, Paypal officials say on their Website that they will never ask for the following personal information in e-mails:
Credit and debit card numbers
Bank account numbers
Driver’s License numbers
E-mail addresses
Passwords
Your full name
But you wouldn’t know this, would you, until you’ve read their Security Center guidelines. The phishing scams are generally targeted at new users who don’t know all this information, or don’t think they need to know it to protect themselves. The seasoned user, however, would spot a phishing e-mail a mile away. I recommend that Paypal users, old and new, read all the information in the Security Center here.
The highest reported number of incidents of phishing so far was in March 2005, to a total of 13,353 incidents reported to the APWG (Anti-Phishing Work Group). Considering that only 1% of people actually bother to make a report, the actual number of phishing e-mails circulating the Internet everyday is astounding. So much so, that you could say phishing has become perhaps the #1 scam on the Internet. The United States continues to be the top geographic location for hosting phishing sites, with more than 34%.China remains second with 12%, followed by Korea at 9%.
How to protect yourself from phishing scams.
Here are a few simple precautions that you can take to avoid being a victim to a phishing scam:
1) Never update any personal or financial records by clicking on e-mail links. If you get an e-mail asking you to do so, ignore it. Phishers often use links within e-mails to direct their victims to a spoofed site, usually to a similar address such as “secure-mybank.com” instead of “mybank.com.”
2) If you really feel the need to verify the claims, warnings or statements made in the e-mails, open up your browser, type in the Website’s main URL manually, and log into your account.
3) Look for secure Websites that start with “https” instead of “http.” All secure Websites start with “https” (“s” for security) and if it does not, there are no guarantees on the safety of your information.
4) Look for a lock icon on the browser’s status bar. This small and often unnoticed icon lets you check the level of encryption, expressed in bits, by hovering over the icon with your cursor. Note that the fact that the Website is using encryption doesn’t necessarily mean that the Website is legitimate. It only tells you that data is being sent in encrypted form.
5) Report the message to the company that the message claims to be from. By doing that you will be alerting the company of the abuse of their brand, so that they can report it to the proper authorities and help keep other people from being ripped off.
6) Educate yourself. Banks or e-commerce companies generally personalize e-mails, while phishers do not. Learn to recognize a legitimate e-mail from a spoofed one. This may be hard to do sometimes, with the scammers continuously “upgrading” themselves, but it’s absolutely necessary that you at least keep up with them. Let common sense guide you. If anything seems too good to be true, then it probably is.
7) Always check your critical accounts for any irregular incidents or payments. Check all your statements, and if you see any unauthorized transactions, get to the bottom of it immediately.
8) Never reply to spam e-mails, as this will give the sender confirmation they have reached a live address. The last thing you want to do is to provide encouragement to the scammer that his plans are working!
9) Always keep your computer secure by installing anti-virus software and keeping it up to date. By doing so, you will ensure protection against malicious software and be alerted of any intrusions by worms, Trojans, or similar dangers.
10) If you’re on broadband, get a firewall. You’ll need a firewall since your internet connection is on 24/7 and you’re not always there to spot intrusions and illegal use of your bandwidth.
11) Update the security patches for your Internet Explorer browser, or better still, download Mozilla’s browser called Firefox (http://www.firefox.com) which is reputed to be more secure than its Microsoft counterpart.
12) Arm yourself with browser enabled plug-ins and tools such as NetCraft (http://toolbar.netcraft.com/) and a lot more by doing a simple Google search for “anti-phishing software.”
So that’s it folks, the run-down on the Internet’s most cruel scam, phishing. PC World reported that research firm Gartner found phishing scams are costing consumers $2 billion a year. In March 2005, Microsoft filed 117 phishing lawsuits in the Western District of Washington with unnamed defendants.
While the Federal Trade Commission (FTC) and others have concentrated on public education, the Anti-Phishing Act of 2005 was proposed by U.S. Senator Patrick Leahey (D- Vermont). This would make the creation and use of e-mail addresses and Websites that are intended to spoof legitimate businesses for purpose of procuring personal information punishable by fines and jail time. Scams such as phishing can be reported, tracked down, and shut down. However, catching phishers can prove to be difficult, especially when it is done from third world countries with no laws on Internet security. Besides that, fraud sites usually operate for very short periods of time.
Therefore it’s up to every individual to educate themselves and ensure their own safely when it comes to online financial transactions and activity.
Prevention is, as they say, always better than cure.
Resources
Anti-Phishing Working Group – Phishing Activity Trends Report (2005)

Wednesday, 2 March 2011

Apple iPad 2: Thinner, lighter, faster




Apple (AAPL) didn't reinvent the wheel with the iPad 2 that goes on sale March 11, but the truth is, it really didn't have to.



With sales of 15 million units, the original iPad was already a runaway best seller, way out in front. That's because Apple, more than any of the growing slew of rivals that are trying to knock the company off its perch, has already set the bar high for tablets. Though I spent only a few minutes holding an iPad 2 after Apple's media event in San Francisco, CEO Steve Jobs has by all appearances another winner on his hands.
As expected, the new iPad adds front and rear cameras that permit the kind of FaceTime video chat that is so appealing on the latest iPhones and on Mac computers. FaceTime is especially inviting on the iPad's 9.7-inch screen, the same size and resolution as its predecessor. Several competitors have already introduced tablets with cameras, including the generally praised — and more expensive —Motorola Xoom that went on sale recently.
The VGA camera on the front of the second-generation iPad can capture video (and audio) at up to 30 frames per second, a standard measure of smoothness; the rear camera can shoot in high-definition, up to what techies refer to as 720p.
The presence of cameras also permits the Photo Booth feature popular on Macs that lets you snap pictures with a bunch of wacky special effects, one of which can morph your head into two.
The hardware itself is a head-turner. New tablets come in black or white — Apple says both will be available on day one — and are noticeably slimmer. In fact, they're 33% thinner than the first iPad and, at 1.3 pounds for the Wi-Fi-only model, a tad lighter.
Keeping iPad 2 svelte may be one reason Apple didn't add the SD memory card slot some users have been craving.
Some will also complain about the lack of a USB port. As before, you'll hook up most accessories through Apple's standard 30-pin connection. For now, you'll have to purchase an optional camera connection kit that already exists for the first iPad to add USB or SD.
Apple will be selling a new $39 accessory that will let you plug the iPad into an HDTV with an HDMI port so you will be able to "mirror" the apps and whatever else is on the iPad screen on a bigger display. Consider the rich possibilities for gamers.

Same limitations on storage

While the design is a little different, Apple kept the same storage limits and prices as before: The Wi-Fi model with 16, 32 or 64 gigabytes costs $499, $599 or $699, respectively. Models with Wi-Fi and 3G cellular (through Verizon or AT&T) are $629, $729 and $829. With the first-generation iPad, those upper limits were plenty generous. Now that you can capture video directly from the device, it remains to be seen if some people will wish they had even more storage.
Apple also souped up the machine's innards. IPad 2 is considerably faster, thanks to a robust "dual-core" Apple A5 processor that gamers in particular ought to appreciate. Apple also claims way faster graphics and superior speeds through the Safari Web browser. I'll be putting these to the test.
I'm also curious to see if the new iPad matches the 10 hours or so of battery life that Apple is claiming, about the same impressive longevity measure as the current generation. If so, that's a notable achievement, given the overall thinness of the device.
But Apple's biggest advantage against rivals who have built tablets around GoogleAndroid, among others, is one they already have: the 65,000 apps that are made especially for the iPad's large display and the 350,000 apps overall when you include all the iPhone apps that work on the machine.
I'll be trying out two new $4.99 iPad-ready apps: versions of Apple's iMovie video-editing software and the GarageBand music-creation program. Sorry, but the iMovie app works only with the new iPad.
The new iPad will also run a fresh version of Apple's mobile operating system software, iOS 4.3. It enhances the AirPlay feature that lets you wirelessly stream multimedia content to an HDTV through an optional Apple TV box. For example, you can now use AirPlay to share wirelessly on the TV your home videos that are stored in your Photo library.
Using another iOS 4.3 feature upgrade, called iTunes Home Sharing, you'll also be able to wirelessly share music, videos, podcasts and other stuff stored in iTunes on any of your computers, via your home network.
Moreover, through either AT&T or Verizon, you can employ the iPad as a personal hot spot for sharing a Wi-Fi connection with other devices. No details on what that will cost.
Stay tuned for a full-fledged review.

The iPad's new engine: The A5 chip

The iPad 2's A5 chip is sending a strong message to the competition: Apple is moving to dual-core processing power in a completely redesigned tablet but keeping the 10-hour battery life.

Apple's A5 processor supersedes the A4 chip currently used in the iPad and iPhone 4. The A5 effectively doubles the processing power by adding another processor core to the single-core A4.
"We get up to twice as fast on CPU [Central Processing Unit] performance," said Steve Jobs, speaking at the iPad 2 event today in San Francisco.
And Apple is also trumpeting its graphics processing. "We've really gone all out on the graphics performance. Up to nine times faster graphics," Jobs said.
And to placate consumers who may be worried that all that extra performance means worse battery life, Jobs added: "Same low power as A4. We don't want to give up any of that legendary battery life."
Analysts say Jobs is right on the money: the key is balancing battery life and performance. "It's a post-PC era. It's not just about speeds and feeds. It's about the totality. It's about good-enough performance and 10 hour battery life." said Ashok Kumar, an analyst at Rodman & Renshaw.
"In the new design paradigm of smart phones and tablets, computing efficiency trumps raw computing power," Wayne Lam, an analyst at IHS iSuppli, wrote in a research note today. "Designs like the iPad demand highly integrated microprocessors that emphasize graphics performance, lower power consumption, and small space usage."

Steve Jobs discusses the new A5 chip at the iPad 2 event in San Francisco today.

Apple is not only touting that the iPad 2 will be the first dual-core tablet to ship in volume but also making a lot of noise about the '9X' improvement in graphics processing.

But Apple isn't being shy about the boost in performance--and analysts are duly impressed. "Nine times faster graphics is a reasonable marketing number," said Joe Byrne, an analyst at The Linley Group, a chip consulting firm. "For iPad owners, this means games that are a better match for the larger screen size...appear much better. There's enough potential iPad volume to justify [game] developers' extra investment," he said.
All of this is not good news for Motorola, whose Xoom tablet, which began shipping last month, was the first dual-core tablet from a top-tier supplier. "I don't think anybody else has a fighting chance in this market," said Kumar, referring to Apple's dominance.
"I think this is the first dual-core tablet to ship in volume," said Jobs. And he may not be far off the mark, considering Apple's ability to ramp up large volumes very quickly.
The A5 follows a hugely popular A4 chip. "Driven by the soaring sales of products including the iPad and the iPhone 4, Apple's shipments of products based on its A4 microprocessor reached nearly 50 million units in 2010 from virtually zero sales in 2009," IHS iSuppli said.