Thursday, August 28, 2008

Print Lease Agreement

Ten million zombies sending malware programs use false


Botnet
A report by Commtouch and PandaLabs in the second quarter of detected an increase of zombie computers worldwide.




zombie computers are computers infected by 'bots' and controlled remotely by cyber criminals . 'Bot is short for the word robot. Are small programs that are put on computers with the intention of allowing cyber criminals to take control of them. Botnets, or 'botnets', are groups of computers infected by bots together to act jointly. The phisher instructs those computers, for example, downloading a new threat on your computer, display advertising to the user, launch denial service or, above all, sending spam.
The
report by PandaLabs
Commtouch and shows that during the second quarter of Turkey has become the largest number of zombie computers in the world with an eleven percent of the total, closely followed by Brazil with 8.4 percent and Russia with 7.4 percent. United States, which in the first quarter had a five per cent of all zombies, has slipped to ninth place, representing only 4.3 percent of the total.

This large number of "zombies" remains the main cause of the avalanche of spam experienced by consumers and businesses, and is that between April and June 74 percent of mail received in the mailbox was spam. Luis Corrons, technical director of PandaLabs investigate further (on Wikipedia)

A Multiplication Chart That Goes To 30

to infect the user downloads


Panda Software warns that programs and Torrent101 BitRoll-5.0.0.0-4.5.0.0 be being used to install malware on users' computers.

Such programs are used to exchange files between remote users, point about. Both installers are available for download from the Internet, so that any user can access them and become infected.

Cyber \u200b\u200bcriminals are also using other false applications, such as a program called wavesoftwarecreative.exe (which are passed through a sound software) or another called bitdownloadsetup.exe to install this malware.

The Lop adware is designed to display ads from various advertisers to the user during navigation popups, banners, etc.

also changes the home page of Internet Explorer to its own search engine. If you search it, it will return as a result of advertising pages related to the keyword searched.

To evade detection, this adware connects from time to time to a website from which it downloads new files containing new variants of itself

, so it is very difficult to delete all active malicious files on the system. Also, if the user tries to use the program installed, you will search for files but not download them.
As highlighted Luis Corrons, technical director of PandaLabs, "In many cases, installing the adware was 'approved' by the user, since it was included in the license agreement various programs and user, unknowingly, accepted it during the main program installation. But, as explained Corrons, "in this case, however, the license agreement is not mentioned programs at any time to install the Lop adware."

can check for free if you are infected with this malware from the website Infected or Not. (Source www.vnunet.es)


Driver Coprocessor For Presario V6000

8 million affected in a major cyber attacks

A hacker has been stealing personal information and card numbers credit for all customers of the Best Western hotel chain in Europe since 2007.

For twelve months, all data from each customer of more than 1,300 hotels that Best Western has across Europe to have been taken by an Indian hacker, has revealed a Research
Sunday Herald newspaper

.


The attack
one of the most serious in the history

in scale and scope, Indian hacker managed A unlock the hotel's reservation system, remotely access the same database and put up for sale information on how to access this system through a network controlled by the Russian mafia. The extracted data include
complete customer information, home address, phone numbers, details of credit card and

job.

explains Jacques Erasmus, an ex-hacker who now works for security firm Prevx, this is a big hit. "A lot of databases hacked and several companies that are for sale online, but the volume and quality of information that has been stolen Best Western is exceptional. "

Although the security hole was closed immediately by the technicians of Best Western when the newspaper alerted the company last Friday, experts fear that the information has already been used for criminal attacks. " Best Western deactivated the system immediately. At the moment we are working with our partners that handle credit cards to ensure that all relevant procedures are followed and that the interests of our customers are protected, "said a company spokesman.

The publication notes that the Indian hacker managed infect the reservation system of Best Western with a Trojan virus that registered key to enter. As an employee of the company used its user name and password, the hacker got the information to connect remotely without being detected.

"Large companies use antivirus software to protect their infrastructure, but the problem with this system is that these products only detect around 60 percent of attacks there. In just his hands, the virus can pass through the programs, and this is what happened here, "said Erasmus.

Tuesday, August 19, 2008

Shampoo And Fermentation

history Databases Part Three (years)

Continuing with the tutorial database data (see Part 1

,

see Part 2) in this third part I will focus only building exercises with their results so they can serve as an example.

11 .- Get a list of items, including for each data item name, price and name of the manufacturer.

SQL statement: SELECT

art. NAME, art.

PRICE,
fab. NAME

Nombre_Fabricante ARTICLES

WHERE fab art. CODFRABICANTE = fab. CODE
;

Result query
12 .- Get the average price of the products of each manufacturer showing the manufacturer's code. SQL statement: select CODFRABICANTE, AVG (PRICE) as average from GROUP ARTICLES by CODFRABICANTE;
NOTE:
In this statement we have included a new concept by

GROUP
serves to group information, it is this case was grouped by manufacturers which are differentiated by whether ID or manufacturer code.

Query Result
13 .- Get the average price of the products of each manufacturer, showing the name of the manufacturer. SQL statement: select FABRICANTES.NOMBRE, AVG (PRICE) as average from GOODS, MANUFACTURERS WHERE ARTICULOS.CODFRABICANTE GROUP = FABRICANTES.CODIGO by FABRICANTES.NOMBRE; Query Result

14 .- Get the name of the manufacturers who offer products whose average price is equal to $ 5445.

Note:
I selected the amount of $ 5445 porque la consulta anterior me devolvió los valores promedio y en consultas anteriores se que insumos nacionales posee mas de un articulo. De lo contrario no se reflejaría la sentencia si un fabricante posee un solo articulo puesto que su promedio seria el mismo valor del articulo

Sentencia SQL:



select fab. NOMBRE
as EMPRESA
from fabricantes fab
inner JOIN articulos
art
on
fab. CODIGO = art. CODFRABICANTE
GROUP BY EMPRESA HAVING

AVG (precio) = 5445;
Extended Description: (Here I have included new commands) * A Manufacturers Table I have assigned an alias fab (not write fabrica.nombre) * A table articles I have assigned an alias
art

(not write articulos.codfrabicante)

* To Field Factory. NAME fab.NOMBRE or an alias assigned him COMPANY. *
INNER JOIN returns all rows from both tables where there is a common Keys. (In previous consultations have written all of two tables componetes example
Select articles. Name articles. Codfrabicante, articles. Price manufacturers. Code,
manufacturers. name from articles, manufacturers WHERE ........ * BAY GROUP groups the result by a field name. *
WHERE HAVING similar to but is treated as a function. * AVG returns the average.
Query Result 14 .- Get the name and price of the product cheaper. SQL statement:
select name, price from items order by price limit 1;
Query Result



Note: We could have done subqueries in the WHERE and entangled enough but the best is to LIMIT

use the default order is ascending is why we deliver the lowest price ... if descending "order by name desc" we deliver the product more expensive.

16 .-



Get a list of names and prices of more expensive items from each supplier (including the provider's name)
SQL statement: select to . name, to . price
f
. NAME as items from manufacturer to

inner join manufacturers f on to . codfrabicante = code group by f . name
order by price desc;
Query Result Note: Here again use the limit in descending order and also group by manufacturers to showcase their products more expensive .. the inner join to help me bring the records in the related table (manufacturers) the manufacturers as it is only to give names to the column. 17 .- Add a new product from manufacturer 2 USB lamp $ 7990.
SQL statement:

insert into items (codigoart, name, price, codfrabicante) values \u200b\u200b(114, 'USB Lamp', 7990, 2);
Query Result
To see the result now arem a select manufacturer 2 with its products select f.codigo, f.nombre, a.name, a.precio from manufacturers
f inner join on items to f.codigo = WHERE codfrabicante f.codigo = 2;


(The select is very complete but only reference to show inserted record)



18 .- Rename the article 108 to Laser Printer.

select * from articles WHERE codigoart = 108;
SQL statement: UPDATE Articles in September Name = 'Laser Printer' where codigoart = 8;

Query Result

19 .- Apply 10% discount on all products.


SQL statement: update articles September price = price * 0.9;
Note: Self-explanatory
all products were reduced by 10% .


20 .- Apply a discount of $ 1777, which price is greater than or equal to $ 20000. SQL statement:
Update articles September price = price - 1777 WHERE price> = 20000;


That's all
... Soon second set of 20 exercises more .

Monday, August 18, 2008

What Is The Best Financial Calculator

Google seeks more security through cryptography


KeyCzar The company has implemented an open source tool that allows developers to use encryption in their applications.
KeyCzar The ultimate goal is to provide developers with a secure and reliable tool that can be easily inserted into your code. As highlighted by Steve Weiss, engineer security software from Google, which has helped develop KeyCzar, "it is difficult to use cryptography and, if made badly, can create serious security holes."
Weiss explained that common errors, such as using outdated algorithms or not being able to mingle with new encryption keys can lead to tools are completely useless. KeyCzar The objective is to simplify these acts and allow developers to not only put the coding tools in place, but key manage and change if necessary
. That is
KeyCzar facilitates rotation and suspension without the developer key have to worry about compatibility or changes affecting the source code. Google has warned, however, that KeyCzar not be seen as a complete coding system, as it contains libraries and runs most of the tasks of coding, but a first step. KeyCzar The first version is available for download from the Google Code

service company. The tool is currently limited to the Java programming language and Python, but Google is already preparing a version for C + +.

www.vnunet.es source)