The Best Tuneup Utilities

October 31st, 2013 | Edited by | software

Oct
31

Remember how your PC sprinted like a cheetah when you first booted it up? Your computer can have that fresh-out-of-the-box performance once again after you run a pc tuneup utility.
What is a PC tuneup utility, you ask? It’s an application designed to fix the wear and tear that computers suffer over time by repairing hard drive fragmentation, fixing the problematic Windows registry, and deleting useless and duplicate files. While all of the tools listed below perform these basic actions, a few stand out from the pack by implementing unique features.
For example, the Editors’ Choice award-winning Iolo System Mechanic 10 ($39.95, 4.5 stars) scored high marks for its top-notch tune-up capabilities, but also for its Program Accelerator (which smartly re-aligns all of a program’s dependent files on the hard drive so that the PC finds them faster), useful desktop widget (which delivers at-a-glance system information), and Whole Home Licensing (which does away with install limitations). SlimWare Utilities’ SlimCleaner also scored an Editors’ Choice Award for its unique approach. Not only is it free and license-free, but it uses aggregated data from its user base to recommend the optimal settings for your PC; it even rewards you with badges for contributing accurate information.

tuneuputiliti

This tuneup utility collection doesn’t represent the full scope of PC repair tools, but the ones included here are some of the best that you’ll find. Some are paid apps, some are free apps, but you can rest easy knowing that even the lowest scoring of these PC tune up utilities will leave your PC in better condition than they found it.

360Amigo System Speedup Pro

Starting at $19.95 per year
360Amigo System Speedup Pro can help blow the cobwebs from a neglected OS, but it needs a more thorough cleaning ability and more flexible installation abilities to contend with its best rivals.

AVG PC Tuneup 2011

Starts at $29.99 for one license
AVG PC Tuneup 2011 offers excellent system-cleaning performance and can turn back the clock on a worn machine.

Comodo System Utilities

Free
Comodo System Utilities is a free and effective system-enhancing utility that is as potent, if not more so in certain cases, as paid apps.

Diskeeper 2011 Professional

$59.95
Diskeeper 2011 may be pricey, and sports a busy interface, but it can repair the elements that negatively impact system performance and, thanks to some unique tools, slow the wear-down process.

Iolo System Mechanic 10

$39.95
$40.48 at LenovoIolo System Mechanic remains one of the best PC tune-up utilities around, as it digs deep, cleans up PCs well, and offers informative, easy-to-understand help about the problems that plague computers.

Norton Utilities

$49.99 for three licenses
This PC tune-up utility can give an aged PC a new lease on life, but its lacks some of the features and performance found in competing software.

PC Tools Performance Toolkit 2011

$39.95
This PC clean-up tool will make your system boot faster and run smoother, but the limited installations may not be household-friendly.

SlimWare Utilities SlimCleaner

Free
Featuring free, effective, community-based problem solving, SlimCleaner is an excellent application for those who don’t want to pony up money for a tune-up utility or deal with licenses.

Spamfighter Full-Diskfighter

Starting at $9.95 per month
Spamfighter Full-Diskfighter will improve your PC’s performance, but there are other suites that do a better job at making your computer run like new.

Can cloud computing be secure? Six ways to reduce risk and protect data

October 17th, 2013 | Edited by | software

Oct
17

As traditional perimeters disappear, organisations need to adopt new measures to ensure data and devices are safe in the cloud.

One observation about those clouds – they were constantly morphing. They had no fixed edge as they billowed and blew across the sky.
That lack of an edge that clearly defines the cloud environment your organisation may be considering sending your data to can make it seemingly difficult to protect. In fact, security is cited in numerous studies as the number one inhibitor to cloud adoption.
Think about possible points of entry for an attacker in a cloud environment. A customer uses an insecure mobile phone to access your network … you can be attacked. A contractor on your network uses a web application that has an embedded vulnerability, a back door that is not protected … you can be attacked. A database administrator at the cloud provider shares a password with someone … your data can be breached. These represent just some of the scenarios that keep the chief information security officer awake at night.
Securing the security perimeter of the traditional data centre was made relatively straightforward with the help of firewalls and intrusion detection systems. When we traded terminals for PCs, anti-virus software helped keep those devices safe.
With employees, customers, business partners, suppliers and contractors increasingly accessing corporate applications and data with mobile devices from the cloud, protecting the edge of the network is no longer enough. As the traditional perimeter disappears, here are six things to do to help ensure security in the cloud.

cloud_security_password_610

1. Know who’s accessing what
People within your organisation who are privileged users, – such as database administrators and employees with access to highly valuable intellectual property – should receive a higher level of scrutiny, receive training on securely handling data, and stronger access control.

2. Limit data access based on user context
Change the level of access to data in the cloud depending on where the user is and what device they are using. For example, a doctor at the hospital during regular working hours may have full access to patient records. When she’s using her mobile phone from the neighborhood coffee shop, she has to go through additional sign-on steps and has more limited access to the data.

3. Take a risk-based approach to securing assets used in the cloud
Identify databases with highly sensitive or valuable data and provide extra protection, encryption and monitoring around them.

4. Extend security to the device
Ensure that corporate data is isolated from personal data on the mobile device. Install a patch management agent on the device so that it is always running the latest level of software. Scan mobile applications to check for vulnerabilities.

5. Add intelligence to network protection
The network still needs to be protected – never more so than in the cloud. Network protection devices need to have the ability to provide extra control with analytics and insight into which users are accessing what content and applications.

6. Build in the ability to see through the cloud
Security devices, such as those validating user IDs and passwords, capture security data to create the audit trail needed for regulatory compliance and forensic investigation. The trick is to find meaningful signals about a potential attack or security risk in the sea of data points.

Adding a layer of advanced analytics – a security intelligence layer – brings all of this security data together to provide real-time visibility into the both the data centre and the cloud infrastructure.

In the same way that clouds in the sky have an ever-evolving perimeter, so does cloud computing. Security is an important factor in cloud deployments and by building in the security capabilities described in these six steps, organisations can better manage and protect people, data and their devices in the cloud.

Java called favorite target for hack attacks this year

October 15th, 2013 | Edited by | software

Oct
15

Java was the most targeted development platform for exploit attacks during the first half of the year, and attacks have increasingly shifted to zero-day vulnerabilities, according to F-Secure’s new threat report.
“Of the top five most targeted vulnerabilities, four are found in the Java development, either the Runtime Environment (JRE) or the browser plug-in,” according to the report, based on information about attacks detected through F-Secure’s sensors and telemetry systems. The company notes that it’s not surprising Java is an appealing target since “next to the Windows operating system (also a popular target for exploits), Java is probably the second most ubiquitous program in an organization’s IT setup.”
Analysis of attacks shows the top five exploited vulnerabilities accounting for 95 percent of all attacks, with the U.S. the geographic location most targeted. F-Secure estimates 78 out of every 1000 users in the U.S. saw a detection identifying an exploit of a specific vulnerability in the last six months. Germany also saw a fairly high number of attacks with about 60 out of 1000 users hit within the same time frame.
“Unfortunately, removing either the runtime or plug-in may not be a feasible option for companies that use Java in business-critical instances,” the F-Secure report points out. Defense and mitigation strategies might involve something more complicated than uninstalling a program, such as “some combination of tweaking Java’s security settings, configuring web browser settings to minimize unwanted applet execution (or installing other third-party plug-ins to do so) and monitoring network traffic.”
F-Secure says 70 percent of the exploit-related attacks are carried out by means of five kits: BlackHole, SweetOrange, Crimeboss, Styx, and Cool. All of these remain under active development.
Another security threat to be reckoned with in the first half of 2013: Mac malware. F-Secure reports it saw the “first Mac malware signed with a valid Apple Developer ID,” an ominous event because this allowed the malware to bypass Apple’s first line of defense. After independent researcher Jacob Appelbaum identified the malware, Apple was swift in revoking the misused developer ID attributed to “Rajinder Kumar” (hence this malware has been dubbed “Kumar in the Mac”).
While this is noteworthy, malware targeting Android continued to dominate mobile threats in the first half of the year, according to the report. Of interest is the discovery of Android malware dubbed Stels, which is designed for distribution via spam e-mails and a bot that uses Twitter to update its command-and-control server addresses.

Java hackers

Bitcoin draws cybercrooks
The rise of Bitcoin as a crypto-based computer-based digital currency is also luring the online criminal underworld as a money-making option, F-secure says.
Bitcoin is not linked to any existing currency, but it does have value based on what people think it’s worth for use in instant transactions, notes Mikko Hypponen, chief research officer at F-Secure Labs. “Today, there are massively large networks of computers mining Bitcoins and other competing crypto currencies (such as Litecoin),” Hypponen says in the report. Because at least six members of the peer-to-peer network have to confirm Bitcoin transactions before they go through, the Bitcoin system rewards users participating in this needed mining with Bitcoins.
“The basic idea behind mining is easy enough: if you have powerful computers, you can make money,” Hypponen says, but adds, “unfortunately, those computers don’t have to be your computers.”
In analyzing malware, F-Secure has found that infected computers taken over by cybercrimals can also be commandeered to make Bitcoins, and that’s what has happened in some instances.
There has been a rise in the first half of the year in several types of malware targeting Bitcoin, and a botnet based on the ZeroAccess family of malware includes a powerful rootkit to hide its presence. F-Secure has spotted a large ZeroAccess botnet operator running a Bitcoin mining operation with various plug-ins on infected PCs. “We estimate them to be make over $50,000 a day by mining Bitcoins on infected computers,” Hypponen says. “If such operations are already happening today, it’s easy to see that mining botnets will become very popular for online criminals in the future.”

OTT Versus IPTV

October 10th, 2013 | Edited by | software

Oct
10

There are countless debates between the pro-IPTV gurus and the uber-OTT crowds. Which viewer experience will win? How quickly? How much money is at stake? And who will be the biggest loser? OSP® magazine went looking for a definitive answer and found less than definitive information.
For those not intimately familiar with the landscape, here is the crux of the argument: Quite simply, the over-the-top (OTT) proponents say it should be all about the viewers. Viewers should be able to access the content they desire and watch it whenever and wherever they want on the device they choose.
The IPTV-ers ask why providers who deliver the bandwidth to stream that content should be saddled with the cost of upgrading their networks to handle the huge bandwidth demands of OTT video. Even worse, they say, is the defection principle: The more viewers crave this OTT-everywhere, the more they may consider dropping their cable or Internet Protocol Television (IPTV) subscriptions altogether.
When OSP® magazine tried to determine a position to take, we reviewed forecasts from both camps:

Forecasts Claiming OTT Will Oust IPTV
• Informa Telecoms and Media expect worldwide viewers of OTT television services delivered to the living room TV to outnumber IPTV services worldwide by 2013.
• Informa forecasts that by 2015, 380 million people globally will view online video via connected devices such as TVs, games consoles or set-top boxes from the likes of Apple and Google. That will be more than double the number of IPTV subscribers.
• The gap between OTT TV and IPTV will likely be even more pronounced by 2015 in some markets, such as the UK, where there are already more OTT TV viewers. By 2015, only 3.6mn people are likely to be watching managed IPTV in the UK, while 27mn will be watching online video on the TV.
• Research and Markets projects OTT revenue to rise to nearly $3 billion in 2014.

Forecasts Purporting That IPTV Will Dominate OTT
• The Broadband World Forum recently shared research that puts the total number of IPTV subscribers worldwide at nearly 45.4mn by the end of 2010, with over 11.5mn added in the 12-month period.
• Europe held on to its position as Number One region for IPTV subscribers, but the growth rate was lower in comparison to other markets, mostly due to maturing IPTV territories such as France and Belgium. Asia showed strong growth last year with over 50% for the year, and is described as being the one to watch to overtake Europe in 2011 with the largest IPTV subscriber base. In addition, the Middle East and Africa region had the strongest percentage growth (despite starting with a low overall number of subscribers) at 63.5%.
• A second research firm, SNL Kagan, estimates that worldwide IPTV subscriptions were 46.2 million at the end of 2010. (This is .8M more than the forecast above.) According to that firm, 6.9 million IPTV consumers are in the U.S. This would be around 15% of the global 46.2 million in IPTV subscriptions. The firm estimates there will be 59.7 million by 2013. That figure could give IPTV an 8.3 percent share of all pay-TV households worldwide.
• A new survey from Pyramid Research said IPTV service revenue increased 45% between 2009 and 2010 to reach $11.8 billion. Over the next 5 years, the firm expects IPTV service revenue to increase at a CAGR of 25% with revenue reaching $36.3 billion by 2015. This will represent 15% of total pay-TV revenue in 2015, compared with 6% today.

OTTvsIPTV_0611

Quality of Experience Makes or Breaks Either
HOW providers get the largest piece of this very profitable pie has everything to do with execution. Both IPTV and OTT video showcases each and every OSP wart. There are still far too many unresolved problems in the legacy/FTTC/FTTN and even the FTTH network that can make or break the customers’ Quality of Experience (QoE). Thankfully, standards organizations are working on that very thing.
Recently, the Alliance for Telecommunications Industry Solutions (ATIS) IPTV Interoperability Forum (IIF) completed an important update to its standard on Quality of Service (QoS) Metrics for Linear IPTV (ATIS-0800008).
In close collaboration with the Video Services Forum (VSF), the IIF implemented several updates to expand and improve its previous work on linear IPTV metrics, most notably in the area of content quality, which was particularly under-standardized in the past. To address this need, the IIF and VSF worked together to define an initial set of IPTV-related content quality metrics for both video and audio in order to address the increasing requirements for measurements related to QoE.
For example, new video metrics included in the ATIS-0800008 revision include Frame Loss Length, I/P/B-Slice/Frame Losses, or Motion Activity. New audio metrics include Audio Dropouts, Loudness, Dial norm and Program Reference Level. These metrics will be instrumental in allowing IPTV service vendors to get a better understanding of possible quality issues with their video streams.
Other noteworthy additions to ATIS-0800008 include defining metrics availability and reliability for different protocol stacks and encryption levels, adding metrics for Multicast Listener Discover (MLD) Join Latency and MLD Leave Latency to accommodate IPv6, and improving the definitions of previously-established metrics.
“QoE is essential for providers to be competitive in the broadband services marketplace,” adds VSF President Richard Friedel. “The metrics developed as part of this joint work will not only enable test equipment vendors to provide a well-defined common set of QoE metrics, but they will also allow IPTV service providers to deliver better service by understanding quality issues with their video streams.”

Could It Be That Both IPTV and OTT Will Win?
Quite clearly, the devil is in the details when it comes to HOW well providers meet their delivery objectives. But they better hurry and get the user experience right. We are all aware that end users are not patient. And shockingly (not!), they want their pay services delivered right the first time. One messy evening filled with jitter and delay could cause a customer to become a loud defector.
What’s the solution? It has everything to do with how communications providers, vendors, and the industry as a whole choose to approach the challenge. Undoubtedly, the winners will be the ones who take action to leverage OTT opportunities — as well as deliver quality to their IPTV pay subscribers.
So does it matter that neither IPTV nor OTT may be the clear winner? We say no. The only winners will be those who leverage and capitalize on both.

Source: www.atis.org

HTML5 articles and sections: what’s the difference?

October 5th, 2013 | Edited by | software

Oct
05

An article is an independent, stand-alone piece of discrete content. Think of a blogpost, or a news item.

Consider this real-world article:


<article>
<h1>Bruce Lawson is World's Sexiest Man</h1>
<p>Legions of lovely ladies voted luscious lothario Lawson as the World's Sexiest Man today.</p>
<h2>Second-sexiest man concedes defeat</h2>
<p>Remington Sharp, jQuery glamourpuss and Brighton roister-doister, was gracious in defeat. "It's cool being the second sexiest man when number one is Awesome Lawson" he said, from his swimming pool-sized jacuzzi full of supermodels.</p>
</article>

It could be syndicated, either by RSS or other means, and makes sense without further contextualisation. Just as you can syndicate partial feeds, a “teaser” article is still an article:


<article>
<a href=full-story.html>
<h1>Bruce Lawson is World's Sexiest Man</h1>
<p>Legions of lovely ladies voted luscious lothario Lawson as the World's Sexiest Man today.</p>
<p>Read more</p>
</a>
</article>

Other articles can be nested inside an article, for example a transcript to a video:


<article>
<h1>Stars celebrate Bruce Lawson</h1>
<video>…</video>

<article>
<h1>Transcript</h1>
<p>Priyanka Chopra: “He’s so hunky!”</p>
<p>Konnie Huq: “He’s a snogtabulous bundle of gorgeous manhood! And I saw him first, Piggy Chops!”</p>
</article>

</article>

The transcript is complete in itself, even though it’s related to the video in the outer article. The spec says “When article elements are nested, the inner article elements represent articles that are in principle related to the contents of the outer article.”

SECTION

Section, on the other hand, isn’t “a self-contained composition in a document, page, application, or site and that is intended to be independently distributable or reusable”. It’s either a way of sectioning a page into different subject areas, or sectioning an article into … well, sections.

Consider this article:

<article>
<h1>Important legal stuff</h1>
<h2>Carrots</h2>
<p>Thingie thingie lah lah</p>
<h2>Parsnips</h2>
<p>Thingie thingie lah lah</p>
<h2>A turnip for the books</h2>
<p>Thingie thingie lah lah</p>
<strong>Vital caveat about the information above!</strong>
</article>

html5-article-section-elements

Does the “vital caveat about the information above” refer to the whole article, eg everything under the introuctory h1, or does it refer only to the information under the preceding h2 (“A turnip for the books”)? In HTML4, there is no way to tell. In HTML5, the section element makes its meaning unambiguous (and therefore, more “semantic”):


<article>
<h1>Important legal stuff</h1>

<section>
<h2>Carrots</h2>
<p>Thingie thingie lah lah</p>
</section>

<section>
<h2>Parsnips</h2>
<p>Thingie thingie lah lah</p>
</section>

<section>
<h2>A turnip for the books</h2>
<p>Thingie thingie lah lah</p>
</section>

<strong>Vital caveat about the information above!</strong>
</article>

Now we can see that the vital caveat refers to the whole article. If it had been inside the final section element, it would unambiguously refer to that section alone. It would not have been correct to divide up this article with nested article elements, as they would not be independent discrete entities, which is why we used the section element.

OK. So we’ve seen that we can have article inside article and section inside article. But we can also have article inside section. What’s that all about then?

article inside section

Imagine that your content area is divided into two units, one for articles about llamas, the other for articles about root vegetables. (Or see today’s Guardian home page with its main news, a section of election picks, a section of “latest multimedia” etc).

You’re not obliged to markup your llama articles separately from your root vegetable articles, but you want to demonstrate that the two groups are thematically distinct, and perhaps you want them in separate columns, or you’ll use CSS and JavaScript to make a tabbed interface. In HTML4, you’d use our good but meaningless friend div. InHTML5, you use section which, like article invokes the HTML5 outlining algorithm, while div doesn’t because it has no meaning. (A great read on the outlining algorithm is Lachlan Hunt’s A Preview of HTML 5):


<div role=main>

<section>
<h1>Articles about llamas</h1>

<article>
<h2>The daily llama: buddhism and South American camelids</h2>
<p>blah blah</p>
</article>

<article>
<h2>Shh! Do not alarm a llama</h2>
<p>blah blah</p>
</article>

</section>

<section>
<h1>Articles about root vegetables</h1>

<article>
<h2>Carrots: the orange miracle</h2>
<p>blah blah</p>
</article>

<article>
<h2>Swedes: don’t eat people, eat root vegetables</h2>
<p>blah blah</p>
</article>

</section>

</div>

Why not article? Because, in this example, each section is a collection of independent entities, each of which could be syndicated—but you wouldn’t syndicate the collection as an individual entity.

Note that a section doesn’t need to be lots of articles; it could be a collection of paragraphs explaining your creative commons licensing, an author bio or a copyright notice. In our example, each article could contain sub-articles or section, as explained above—or both.

FINALLY, A CONCLUSION!

Jeremy Keith writes that authors are confused about when to use the two elements. I think the namearticle is a cause of confusion; perhaps post or entry or even story would be more intuitive if you’re thinking about blog or news sites (although not all sites are like that, of course).
But I disagree that the two elements are so similar that they should be amalgamated. Jeremy writes

the only thing that distinguishes the definition of article from the definition of section is the presence of the phrase “self-contained”. A section groups together thematically-related content. An article groups together self-contained thematically-related content. That distinction is too fine to warrant a separate element, in my opinion.

I agree that the difference between them is the “self-contained”ness. But, personally, I find it pretty easy to work out whether something is self-contained or not and have tried to explain it above. Your comments will hopefully let me know if I’ve explained it clearly enough. (I think it’s very tough explaining it in the terse language required in normative sections of a specification).
It seems to me that brand-new elements will require people to spend time learning them without being able to immediately understand the difference in a matching exercise. Dan Cederholm’s Simplequiz showed that in 2003 many of us didn’t understand HTML4 elements properly. How many of us would have chosen ol rather than ul from name and single line from the spec if asked the most appropriate element for breadcrumb trails, or chosen dt as the most appropriate term for the speaker’s name in a dialogue (as the HTML4 spec wrongly specifies)? But seven years down the line, I imagine we all agree that it would have been wrong to amalgamate dlul and ol.
I also think the spec isn’t sufficiently clear (and emailed the Working Group): the definition for article says “The article element represents a self-contained composition in a document, page, application, or site and that is intended to be independently distributable or reusable, e.g. in syndication.”
This suggests that if you have a self-contained composition that you do not intend to be distributable via syndication, you shouldn’t use article.
Section says “Authors are encouraged to use the article element instead of the section element when it would make sense to syndicate the contents of the element” – here, the intent of syndication is diluted into “it would make sense to syndicate the content”.
I suggest that article be amended to say something similar, eg “The article element represents a self-contained composition in a document, page, application, or site which would make sense if independently distributed or reused, e.g. in syndication.” so that the two mentions of article match.
If we didn’t have an article element, we’d be left with lots of different riffs on section,section or section, which is what HTML5 tries to avoid.

Source: www.brucelawson.co.uk

Page 14 of 16« First...1213141516