Smart ® Acer Iconia Dual-Screen, Double the Fun

Total Page:16

File Type:pdf, Size:1020Kb

Smart ® Acer Iconia Dual-Screen, Double the Fun SA’s LARGEST TECH MAGAZINE FREE! smart ® Acer Iconia Dual-screen, double the fun Nintendo 3DS Portable gaming goes 3D Homefront Home is where the war is THE MOBILITY ISSUE WWW.TECHSMART.CO.ZA ISSUE 91 April 2011 ISSN 1726–3358 EDITORIAL & HIGHLIGHTS The Mobility Issue ›› April 2011 9 11 13 19 32 BBC or BAC? y grandpa told me the other day that he is tired of being a MBBC. “A BBC?” I asked. “Yes, a Born Before Computer,” » Reviews came the reply. So, one notebook and a wireless modem later, he’s not only working on his new PC but also connecting to the Toshiba Portégé R700 web. Helping him through the process it struck me how Can a notebook be both small and powerful? Yes, if it’s daunting it can be to learn to use a PC if you have no experience Toshiba’s R700 thin-and-light. 9 of it before. Simple things PC users take for granted, like moving the cursor on screen, when to double click and how to expand Motorola Defy and minimise a program, are not as straight forward as one Motorola’s Android powered Defy looks set to live a might think. But luckily it’s easy to master with a bit of practice, hard-knock life. 11 and from what I can gather from emails received from a number pertoire, and proprietor. of our older readers, once these Silver Surfers are connected to the web there’s no turning back. Nintendo 3DS In this issue we’re introducing QR codes with many of our Portable gaming goes 3D with the highly anticipated reviews. These make it easy to quickly link to the relevant 3DS. Is it worth the hype? 13 review on techsmart.co.za via your smartphone. We give a full explanation of what QR codes are and how they work on p27. Norton 360 V 5.0 Try it out, it might just change the way you browse the web. Is this the anti-virus package that has it all? We delve through Norton 360’s vast functionality. 19 Enjoy the issue, Mike ([email protected]) » Interviews Homefront interview We talk to David Votypka, general manager at Kaos Studios and Frank DeLise, executive producer at THQ, 32 about their new title. TechSmart exclusively uses the LG W2794V monitor for all reviews. Copyright © 2011. All rights reserved. No material, text or photo graphs may be reproduced, copied or in any other way transmitted without the written consent of the publisher. Opinions expressed are not necessarily those of the publisher or of the editor. We recognise all trademarks and logos as the sole property of their respective owners. TechSmart shall not be liable for any errors or for any actions in reliance thereon. All prices were correct at time of going to print. Editor TechSmart & TechSmart.co.za 97 902 Mike Joubert > 083-290-2889 copies per month [email protected] Consumer: SciTech Business manager [Oct – Des 2010] George Grobler [email protected] Print media manager Published by Suzanne Rall [email protected] Advertising manager (Agencies) Carmel Anne Singh > 079-515-8708 [email protected] Sales administrator Marlien vd Westhuizen > 012-362-2732 SMARTPUBLISHING [email protected] MASS MEDIA SPECIALISTS Designer Brett Wilson Tel: 012-362-2732 Contributors Mike Joubert [MJ], 1218 Arcadia St, Hatfield, Pta Hanleigh Daniels [HD], Johan Keyter [JK], www.smartpublishing.co.za Linda Pretorius [LP] Accounts & subscriptions Distributed by Ronel Keet > 012-362-2732 [email protected] Distribution Renier van Vuuren > 073-166-1515 smart distribution [email protected] Ten letters. The longest length of a word you can type using only letters from one row of your keyboard, such as typewriter, re such as typewriter, keyboard, can type using only letters from one row of your letters. The longest length of a word you Ten techsmart.co.za l April 2011 3 NEWS TOP TECH TITBITS Google starts local tech IE9, Firefox 4, Chrome 11 Beta MWEB now targets hosting incubator launches oogle has launched Umbono, its t’s been an extremely busy month on ust as local service provider MWEB Gnew technology incubator based in Ithe browser scene, with all and sundry Jdid when it introduced the first Cape Town. This initiative brings releasing new versions. Microsoft’s IE9 affordable uncapped ADSL offerings in together seed capital, Google has seen the light of day, sporting a sleek the country last year, it is now seeking mentorship, angel investors, local tech new look and improved performance, but to revolutionise the hosting market stars, entrepreneurs and business strangely no support for Windows XP. In with its new Uncapped Hosting offering, leaders, in an effort to assist selected the meantime the company is charged at only R19 per month. MWEB start-up teams to transform their ideas desperately trying to get rid of their old has bundled all the elements needed into companies. For six months, teams IE6 browser, even coming up with a for website hosting into one easy-to- will enjoy free office space and campaign to help drop its market share use fixed rate package that includes no bandwidth, in addition to the $25 000 below 1%. Mozilla’s new speedy Firefox 4 limit on the amount of traffic to your s about an initial public offering worth five times as much. s about an initial public offering worth five to $50 000 in funding that they’ll has done extremely well with 7.1 million website, as well as uncapped storage receive from Umbono’s panel of angel downloads in its first 24 hours (IE9 did space. Websites will be hosted locally investors as well as Google itself. 2.35 million), while not wanting to be left on MWEB’s data centres, meaning local Applications are available on the out of the action, Google released their visitors will experience a faster Umbono website Chrome 11 Beta. All of these have sup- browsing experience on your site. (http://bit.ly/umbono) and the port for HTML5, a new language for de- MWEB provisions the website, registers programme is open to all South African veloping webpages that provides better it for you and will renew the domain on residents. multimedia integration. an annual basis. HOT NEW PRODUCTS 1 2 3 1. Porsche 918 Spyder luxurious design emulates that of a 4. SingStar Afrikaans Treffers s global resource levels continues to modern football stadium, whilst the on- outh Africa is one of only five Aplummet, who knows when it’ll be field action boast stunning looks with S territories world-wide to be granted time to wave goodbye to the iconic atmospheric lighting as well as chrome the right to have a local SingStar supercar? That however hasn’t stopped metal “players”. Pricing thought is release. This in the form of SingStar Porsche from developing the monstrous strictly in the realm of Russian Afrikaans Treffers, a competitive karaoke new 918 Spyder, a 373 kW V8 supercar billionaires, since it kicks off at €48 500 title that has players mated to two electric motors producing (almost R480 000) for the classic Black singing along to 163 kW, making it slightly more and White version. 26 Afrikaans 4 efficient. Porsche estimates the Spyder artists, the likes will consume three litres per 100 km, 3. TomTom’s online live traffic of Jack Parow, but as soon as the electrical charge has ondering how the traffic will look like Karen Zoid and been depleted it’ll go into full slung fuel Wwhen you head home today? Steve Hofmeyr. downing mode again. The Spyder goes Wonder no more, with TomTom’s launch Gamers score from 0-100 km/h in around 3.1 of live traffic maps, available for free at points if they hit seconds, which is awesome if you have www.tomtom.com/livetraffic (click on the right notes, around R5.9 million to spare. the SA flag at the bottom). Powered by with the player TomTom HD Traffic, the same system that closest to the 2. 11 the beautiful game provides live traffic updates on certain pitch of the song utch company GRO Design has TomTom GPS models, the new live traffic is eventually Dcome up with certainly the most map enables anyone online to view the crowned champ, striking foosball table ever. Dubbed “11 up-to-the-minute traffic situation in their or Liefling, or Up to $25 billion. After rejecting a $5-6 billion buy-out offer from Google last year, Groupon is reportedly in talks with bank offer from Google last year, Up to $25 billion. After rejecting a $5-6 billion buy-out the beautiful game”, this table’s local area. Baby Tjoklits. techsmart.co.za l April 2011 5 INTERVIEWS SCI NEWS Chris Botha, group MD of The MediaShop At 33 Chris Botha is group MD of The MediaShop, one of the biggest media agencies in SA. e talks to communications approach and not accounts and Twitter feeds. If you use it H TechSmart about limited to advertising. only to promote and sell, you will never online advertising, make a success of it. Marketers need to marketing your brand TS: Is the cellular market attracting use their accounts in a much smarter via social media and advertising spend in SA? How long way that rewards consumers and users “consumer touch- before smartphones become viable for visiting their FB page or following point strategies”. advertising platforms here? them on Twitter. It is a conversational CB: Not at the moment. I do however tool, not an advertising medium.
Recommended publications
  • Internet Telephony Magazine Digital Edition February 2007
    Q71373-01 Internet Telephony 1/15/07 2:35 PM Page 1 Communications costs can be a killer. But Covad VoIP can save you up to 20% on communications costs because we combine voice and broadband service over a single, reliable connection. Save travel costs with Web conferencing and route incoming calls to any number so you can always be reached. Don’t just survive, thrive: go to covadvoip.com or call 1-800-631-4825 to learn more. DON’T LET THE PHONE SYSTEM BE THE DEATH OF YOUR BUSINESS. Covad ClearEdge Integrated Access Internet TelephonyInternet 8.125 x 10.875 4C Q71373-01 GCV CBS Q71373 ©2007 Covad Communications Company.All Rights Reserved.The Covad name and logo are registered trademarks of Covad Communications Group, Inc. Up to 20% total cost of ownership savings based on case studies by Covad comparing total cost of ownership of Covad’s VoIP solutions versus KTS solutions. Service not available in all areas and is provided subject to Covad's standard terms and conditions. Cisco, Cisco Systems, the Cisco Systems logo, and the Cisco Square Bridge logo are registered trademarks or trademarks of Cisco Systems, Inc. and/or its affiliates in the U.S. and certain other countries. By Richard “Zippy” Grigonis Group Publisher and Editor-In-Chief, Rich Tehrani ([email protected]) Do You Webinar. ? EDITORIAL Group Editorial Director, Greg Galitzine ([email protected]) Executive Editor, Richard “Zippy” Grigonis ([email protected]) Lately, I can’t help but notice the increasing Associate Editor, Erik Linask number of Webinars making their appearance ([email protected]) on the Internet, and with good reason.
    [Show full text]
  • 2015 Internet Security Threat Report, Volume 20
    APRIL 2015 VOLUME 20 INTERNET SECURITY THREAT REPORT APPENDICES 2 2015 Internet Security Threat Report | Appendices THREAT ACTIVITY TRENDS MALICIOUS CODE TRENDS SPAM & FRAUD ACTIVITY TRENDS VULNERABILITY TRENDS GOVERNMENT THREAT ACTIVITY TRENDS BACK TO TABLE OF CONTENTS 4 Appendix A: 79 Appendix D: Threat Activity Trends Vulnerability Trends 5 Threat Activity Trends 80 Vulnerability Trends 6 Malicious Activity by Source 81 Total Number of Vulnerabilities 12 Malicious Web-Based Attack Prevalence 83 Zero-Day Vulnerabilities 14 Analysis of Malicious Web Activity by Attack Toolkits 86 Web Browser Vulnerabilities 16 Analysis of Web-Based Spyware, Adware 88 Web Browser Plug-In Vulnerabilities and Potentially Unwanted Programs 90 ICS Vulnerabilities 18 Analysis of Web Policy Risks from Inappropriate Use 92 Footnotes 20 Analysis of Website Categories Exploited 93 About Symantec to Deliver Malicious Code 93 More Information 22 Bot-Infected Computers 24 Analysis of Mobile Threats 30 Data Breaches and Identity Theft 36 Appendix B: Malicious Code Trends 37 Malicious Code Trends 38 Top Malicious Code Families 42 Analysis of Malicious Code Activity by Geography, Industry Sector, and Company Size 45 Propagation Mechanisms 48 Targeted Attacks Intelligence: Going from Isolated Attacks to Coordinated Campaigns Orchestrated by Threat Actors 61 Appendix C: Spam & Fraud Activity Trends 62 Spam and Fraud Activity Trends 63 Analysis of Spam Activity Trends 64 Analysis of Spam Activity by Geography, Industry Sector, and Company Size 67 Analysis of Spam Delivered
    [Show full text]
  • Norton Antivirus Product Manual
    NortonTM AntiVirus Product Manual Care for our Environment; ‘It's the right thing to do.’ Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. This manual is made from recycled materials. Norton AntiVirus™ Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 21.4 Copyright © 2014 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, LiveUpdate, Norton 360, and Norton are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Portions of this product Copyright 1996-2011 Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED “AS IS” AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Experiences in Building a Multi-University Testbed for Research in Multimedia Communications
    Experiences in Building a Multi-University Testbed for Research in Multimedia Communications Ram Dantu Henning Schulzrinne Paul Sroufe Network Security Laboratory Department of Computer Network Security Laboratory Department of Computer Science Department of Computer Science & Engineering Columbia University Science & Engineering University of North Texas New York, New York 10027, University of North Texas Denton, Texas 76203 USA USA Denton, Texas 76203 USA [email protected] [email protected] [email protected] Abstract feature support make VoIP a compelling proposition for service providers, equipment manufacturers, and The next generation Internet needs to support end users alike. It is estimated that in a few years most enterprises and residences will be transitioning from multimedia services such as Voice/Video over IP (VoIP) and IP-based television (IPTV) and media circuit-switched to VoIP services. Such trends will distribution. The goal of the project is to develop a result in what we can call IP-based multimedia testbed for understanding and analysis of communications infrastructure, encompassing the equivalent of conventional phone conversations, vulnerabilities of IP-based multimedia networks. This advanced communication and content distribution is a collaborative project between University of North Texas, Columbia University, Purdue University, and services. University of California at Davis. This project was awarded in 2006 and in one year, we have developed a In light of this growing interest, security in voice multi-university testbed with variety of PBX solutions communications is evolving into a key requirement for including Asterisk, a multitude of voice and video IP VoIP solutions. Packet-based communication is phones, and multiple universities were connected particularly vulnerable to security risks including voice “tapping” by sniffing packets, unpaid service usage by through a secure VPN and Internet2.
    [Show full text]
  • Antivirus Bot Protection Norton Safe Web Firewall NEW!
    Antivirus Antispyware Bot Protection Identity Protection Norton Safe Web Norton™ Pulse Updates Firewall Network Monitoring NEW! SONAR™ 2 Behavioral Protection Parental Controls NEW! Norton System Insight Vulnerability Protection NEW! Norton Insight Network NEW! Professional-Strength AntiSpam NEW! Norton Download Insight NEW! Norton File Insight NEW! Norton Threat Insight IMPROVED! Helps stop online identity theft, viruses, spyware, bots and more — Guards your PC, online activities, and your identity against all types of Internet threats. IMPROVED! Helps stop attacks before they get on your PC — Proactively blocks hackers and prevents dangerous software from downloading to your computer when you surf the web. NEW! Delivers clear performance and threat explanations — Gives you greater insight into downloaded applications and files by telling you where they came from, if they can be trusted, and how they may impact your PC's resources and performance. NEW! Identifies unsafe web sites right in your search results — Warns you of dangerous web sites and suspicious sellers so you can surf and shop online with confidence. Uses intelligence-driven Norton Insight Network for faster, fewer, shorter scans — Detects and eliminates dangerous software with the shortest scan times of any security product.* • Automatically finds and fixes common problems • Accelerates startups • Defragments disk for faster performance • Frees up disk space – boosts performance • Removes cookies, temporary files, Internet clutter • Lets you view current Windows processes for maximum performance • Purges unwanted security-sensitive data • Automatically benchmarks performance to optimum standards • Registry Defragmenter • Disk Bleacher • Registry Cleaner • Restore Center • Startup Manager • System Optimiser • Service Manager • Process Viewer • Disk Defragmenter • Performance Test • Disk Cleaner Boost PC performance.
    [Show full text]
  • Norton-360.Pdf
    Norton™ 360 Product Manual Norton™ 360 Product Manual The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 22.21.3 Copyright © 2021 NortonLifeLock Inc. All rights reserved. NortonLifeLock, the NortonLifeLock Logo, the Checkmark Logo, Norton, Norton Secured Logo, LifeLock, and the LockMan Logo are trademarks or registered trademarks of NortonLifeLock Inc. or its affiliates in the U. S. and other countries. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of NortonLifeLock Inc. and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. NORTONLIFELOCK INC. SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by NortonLifeLock as on premises or hosted services.
    [Show full text]
  • INTERNET SECURITY THREAT REPORT APPENDIX 2014 P
    2013 Trends, Volume 19, Published April 2014 INTERNET SECURITY THREAT REPORT APPENDIX 2014 p. 2 Symantec Corporation Internet Security Threat Report 2014 :: Volume 19 CONTENTS 5 APPENDIX :: A 20 Malicious Web Activity: Malicious Code By Number of Infections per Site THREAT ACTIVITY TRENDS for Top-Five Most Frequently Exploited Categories 6 Threat Activity Trends 20 Malicious Web Activity: Malicious Code by Number of Infections per Site 7 Malicious Activity by Source 21 Malicious Web Activity: Fake Antivirus by Category 8 Malicious Activity by Source: 22 Malicious Web Activity: Browser Exploits by Category Overall Rankings, 2012–2013 23 Malicious Web Activity: Social Networking Attacks by Category 8 Malicious Activity by Source: Malicious Code, 2012–2013 24 Bot-Infected Computers 9 Malicious Activity by Source: 24 Top-Ten Bot Locations by Average Lifespan Phishing Hosts, 2012–2013 of Bot, 2012–2013 9 Malicious Activity by Source: Spam Zombies, 2012–2013 26 Denial of Service Attacks 10 Malicious Activity by Source: Web Attack Origins, 2012–2013 30 Analysis of Mobile Threats 30 Android Mobile Threats: 10 Malicious Activity by Source: Newly Discovered Malicious Code, 2012–2013 Bots, 2012–2013 31 Mobile Threats: Malicious Code by Platform, 2013 11 Malicious Activity by Source: Network Attack Origins, 2012–2013 31 Android Mobile Threats: Average Number of Malware Variants 12 Malicious Web-Based Attack Prevalence per Family, 2012–2013 12 Malicious Website Activity, 2012–2013 32 Mobile Threats: Malicious Code Actions in Malware, 2012–2013 14
    [Show full text]
  • Norton 360 User Guide on the CD Or the USB Drive in PDF Format
    User Guide See back cover for Quick Installation. We protect more people from more online threats than anyone in the world. Care for our Environment, ‘It's the right thing to do’. Symantec has removed the cover from this manual to reduce the Environmental Footprint of our products. Norton 360™ User Guide The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version 4.0 Copyright © 2009 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, Norton, SONAR, LiveUpdate, Norton AntiSpam, Norton AntiVirus, Norton Internet Security, Norton 360, and Norton SystemWorks are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Windows is a trademark of Microsoft Corporation. Portions of this product Copyright [1996-2008] Glyph & Cog, LLC. Other names may be trademarks of their respective owners. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Symantec Corporation and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. SYMANTEC CORPORATION SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION.
    [Show full text]
  • Web Based Attacks February 2009 Onfidence Confidence in a Connected World
    alware authors are leveraging this fact to deliver attacks via onfidence in a connected world. The Web has become an important part of home and work life. M the Web for financial gain rather than personal fame. This paper examines some of the more popular attack techniques and outlines some best practices for being safe online. Web Web Based Attacks February 2009 C WHITE PAPER: CUSWEBT BAOMSIEDZE ATTACKS White Paper: Web Based Attacks Web Based Attacks February 2009 Contents 1. Introduction . .4 Anatomy of a Web attack . .5 2. How do Web sites get infected? ....................................................6 Why target mainstream Web sites? . .6 The complexity of modern Web sites ................................................6 How are legitimate Web sites compromised? .........................................6 SQL Injection Attacks.............................................................7 Malicious advertisements (malvertisements) . 8 3. Getting onto a user’s computer (part 1 – automatically) . 8 The drive-by download . .8 Software vulnerabilities..........................................................10 Web attack toolkits . .10 Hiding the attacks: the cat and mouse game . 11 Obfuscation of the actual attacks .................................................11 Dynamically changing URLs and Malware . 12 Hijacking Web pages or “Clickjacking” . .12 Today’s attacks render old detection technologies ineffective...........................13 How often do these attacks occur? . 13 4. Getting onto a user’s computer (part 2 – with a
    [Show full text]
  • SIP Communicator Administrator Guide
    SIP Commun icator Administrator Guide Version 5 Author: Dellwood 1 SIP_COM__adminV5_16-07-10 Contents 1. Logging on as Administrator ………………………………………. Page 3 2. Changing the Administrator password …………………………….. Page 3 3. Domain Settings …………………………………………………… Page 3 4. Creating Dial Plans ………………………………………………… Page 4 5. Creating Extensions ………………………………………………... Page 5 6. Configuring Handsets ……………………………………………… Page 7 7. Configuring Service Flags …………………………………………. Page 10 8. Configuring Group Mailboxes …………………………………….. Page 12 9. Configuring Auto Attendants ……………………………………… Page 12 10. Configuring Hunt Groups …………………………………………. Page 14 11. Configuring Conference Bridges ………………………………….. Page 15 12. Configuring Calling Cards ………………………………………… Page 16 13. Assigning Barge-In Permissions ……………………………………. Page 17 14. Installing & Configuring TAPI Driver ………………………………. Page 18 15. Programming Tips …………………………………………………. Page 21 16. Glossary ……………………………………………………………. Page 21 2 SIP_COM__adminV5_16-07-10 1. Logging on as Administrator: Browse to: https://pbxX.spitfiretsp.net/ Where X = PBX number where domain is configured Enter the admin user account: [email protected] Enter the admin password: Supplied by Spitfire 2. Changing the Administrator password: · Select Accounts from the menu bar: · Click Edit next to the Admin account. · Change the Web Password. · Click Save. 3. Domain Settings: · Used to set default settings and timers for the domain. · Voicemail Timeout: Number of seconds that a call will ring at an extension before going to voicemail. Users can over-ride this setting. · Voicemail Size: Number of messages that can be stored. · Mailbox Escape Account: Where calls should be directed if caller dials “0” while listening to mailbox greeting. Users can over-ride this setting · Mailbox Direct Dial Prefix: Dial this digit in front of the extension number to call/transfer a call directly to the mailbox.
    [Show full text]
  • Spitfire Wins Prestigious Award!
    Spitfire News for the latest communications news, views and comment WINTER 2010/11 Spitfire wins prestigious award! Spitfire has won the Service Provider of the Year category of the Comms National Awards! The Comms National Awards are widely acknowledged as a benchmark of excellence within the telecoms industry. The judges were looking for demonstrations of a service provider’s ability to identify new market opportunities and to effectively deliver solutions, they also looked for evidence of support, reliability and ease of doing business. The entries were judged by a panel of six independent judges who awarded Spitfire their trophy for the SIP Communicator™, our hosted telephony solution. Tom Fellowes, our Sales Director collected the Ethernet over Fibre is the award with Susie Ward, Marketing & HR Director. gold standard of high quality Commenting on the award Tom says, “We are Internet connectivity. delighted with the achievement. Hosted telephony p3 has come of age in the last two years as the recession has made the possible cost savings compelling to many SME business owners. SIP We have recently Communicator™ requires little capital outlay, no launched VDSL2 superfast in-house technical expertise and the service is broadband. very flexible. Billing is based on a monthly service p4 charge and the costs are estimated to be about fifty per cent less than a conventional phone Spitfire is the first certified system. To receive SIP Trunk provider in the UK this award for SIP for the new snom ONE IP Communicator™ is a telephony system. p6 terrific endorsement.” Inside www.spitfire.co.uk 0800 33 34 35 Foreword This issue of Spitfire News contains much of what we believe will become some of the dominant telecommunications technologies for the second decade of the 21st Century.
    [Show full text]