Jun 3, 2011

Important Facebook Social Plugins for your business

 


Social networking sites are the latest buzzword on the web. They have proved their effectiveness for various business purposes. Be it launching a new product or promoting an existing product, social networking sites have become an important medium of communication. There are various Facebook applications which have been useful for both consumers and business owners. Therefore, the demand for Facebook application development is increasing by leaps and bounds.
Various companies are cashing on the Facebook application development market. There are expert Facebook apps developers who are providing innovative services such as Facebook fan page development, Facebook connect integration and Facebook integration with Php.
Social plug-ins of Facebook allows one to easily integrate Facebook's social features on a blog. It also allows users to interact with other websites even without logging in.
Here are some important social plug-ins for a business
Facebook Like Buttons
When a user visits a third-party website and clicks on an embedded "Like" button, a link to that page is added to that user's Facebook profile. The link is also shared with that user's friends. The best thing for those third-party websites is that, after a user clicks "Like," Facebook allows the owner of that website to update that user with links and photos in his or her News Feed.
There are many ways to attach a Like Button to a website. Facebook has easy to follow instructions for putting the button on a webpage, email or attachment. By placing a Like Button on various things and sending them out to friends, one is helping to spread the word about a website, company, cause or happening.
Facebook Recommendations
This social plugin gives users personalized suggestions for pages on your site they might like. You can test it out for your site. Simply enter in your web address, and click in the grey panel somewhere and it will show the recommendations This works even if you haven't yet implemented Facebook Like. It is similar to the Activity Feed's show recommendations option.
This plug-in shows the recent top content and the number of times that content has been liked to users whether or not they are logged into Facebook. If the user is logged into Facebook, they will see any friends who have liked content on the site.

Activity Feed

This plug-in shows all the recent activity on a website to anyone, whether or not they are logged into Facebook. The Activity Feed box will start with activity on a website by a user's friends (if they are logged in), and also can show the number of times certain content on the website has been recommended.

Facebook Login

This plugin allows users to connect to a website through their facebook account. The Login Button shows profile pictures of the user's friends who have already signed up for your site. Facebook Login replaces Facebook Connect, which now has over 100 million Facebook users logging in to other websites.

Live Stream

This is another brilliant plug-in which allows one to create a real-time chat for users on a website. Live Stream is crucial in case of events such as webinars and online classes.

Facepile

With this you can see a row of users that have liked your page or connect to your site through the Login Button via the website's application ID.
Facebook has truly been a blessing for business owners across the globe.



How to Make a Bootable Antivirus Cd

 
How to Make a Bootable Antivirus Disc
Purpose of this document.

This document will teach you how to make a bootable anti-malware ( bootable antivirus ) cd/dvd step-by-step.

Why Bootable Antivirus?
In a bootable environment we are running a stripped down version of windows in a ram disk (programs are loaded directly into ram), thus the hard drive on the PC is treated as attached storage (like a flash drive). In this state malware (malware consists of viruses, trojans, spyware, adware, rootkits, etc) is helpless and totally at your mercy. This is the best free way to remove any piece of malware with a 100% success rate.

Steps:
Please follow all the steps below:

1. Go to http://ubcd4win.com/downloads.htm
2. Select a mirror with a green status. (like "Mirror#3" for example)
3. When you click on the mirror it will take you to another site where the download will be available.
4. Click the download link for Ultimate Boot CD and save the download to wherever you download stuff.
5. Once the installer has been downloaded double click it.
6. Choose your language
7. Click next about 3 more times and select the file path where you would like to install ultimate boot cd 4 win. Please note that you should have a drive with at least 5-10 gb of free space to allow for future plugin growth. I will choose C:UBCD4Win. The install should take a few minutes.
8. Click Yes to the MD5 Hash Check. The install will continue once the hash check succeeds.
9. Click Yes to see if a patch file exists.
10. Click the checkbox to launch ubcd4winbuilder.exe.
11. Click the "i agree" button.
12. Click "NO" to searching for windows files.
13. Obtain a windows xp operating system disc w/SP2.
14. Explore the disc and copy the entire content (all the folders and files on the windows xp cd) to any location on your computer. You should allocate at least 700 MB of free space for the windows xp disc.
15. Open UBCD4win (if it's not already open). Click Source browse button (3 dots ...) and browse to your i386 folder. My path was C:WindowsXPcd for example.
16. Next go to the media output section and choose a spot for your ISO image to be created. This ISO can be burned with almost any burning software. Once the ISO is burned it will be bootable.
17. Next, click the plugins button. Don't be too overwhelmed here, actually you should be very happy! Look at all those plugins!
18. Now it's time to update our anti-malware software packages.
19. The first one I have on my list is a-squared free anti-spyware. Click that line and then click the config button. A command prompt will automatically open and start downloading the latest updates for that program...totally awesome, isn't it!
20. So, now you need to update all the anti-malware programs in our plugin list. Click each one and then hit the config button.
21. After you're done configing/updating your plugins click the close button.
22. Next, click Build.
23. Click yes to create a directory and then click i agree.
24. At this point your ISO is created and is ready to be burned.

This concludes the How to Make a Bootable Antivirus CD tutorial.

100 s of Google accounts hacked Google Suspects Chinese Involvement


Internet Search Gaint Google has announced that Chinese hackers are at it again -- this time, targeting Gmail account holders. However, this isn't the first time that Google has come under attack. In January 2010, Google suffered a cyber attack that used malicious code called "Aurora," which targeted the Gmail accounts of human rights activists. The attack was traced back to China, and Google ultimately decided to partially pull out of China last year over issues regarding censorship. This decision has put a growing strain on Google's relationship with China.

Google has now announced that Chinese hackers have used phishing schemes to steal the passwords of "hundreds of Google email account holders." 


Google said the hack originated from the capital of China's eastern Shandong province, Jinan. Jinan contains one of the six technical reconnaissance bureaus that belong to the People's Liberation Army, as well as a technical college. A previous attack on Google was traced back to this area before. 

Technical reconnaissance bureaus are responsible for China's electronic eavesdropping, and according to the U.S.-China Economic and Security Commission, these bureaus are likely gearing toward the "defense or exploitation of foreign networks."

While hacking is considered a hobby in China that the Chinese government allegedly condones, Google didn't directly blame the Chinese government for the recent attack. However, an anonymous former U.S. government official said the Chinese government is likely partially responsible as a result of Beijing's fears that "contagion from the Arab 'jasmine' uprisings could spread to China." But the official also believes that independent Chinese citizens are partially responsible as well, saying that they have the government's approval to perform a security breach.

The Chinese government has denied Google's accusations regarding the recent attacks, as it has in the past. For example, hacking attacks last year, which targeted Google and over 20 other companies, were traced back to the Lanxiang Vocational School in Jinan, but the school denied that it had anything to do with it. 

"Blaming these misdeeds on China is unacceptable," said Hong Lei, Chinese Foreign Ministry spokesman. "Hacking is an international problem and China is also a victim. The claims of so-called Chinese state support for hacking are completely fictitious and have ulterior motives."

The most recent attack on Gmail accounts, which attempted to trick Gmail users into providing personal information through the use of highly personalized messages and a document for them to download, changed the email forwarding settings of Gmail accounts in order to send emails to other accounts. 

Luckily, Google was able to detect the hackers' attempts and notified the victims immediately. The FBI is now working with Google following the attacks, while Washington investigates Google's claims. 

"We recently uncovered a campaign to collect user passwords, likely through phishing," said said Google. "It affected what seem to be the personal Gmail accounts of hundreds of users, including, among others, senior U.S. government officials, Chinese political activists, officials in several Asian countries, military personnel and journalists."

The Pentagon recently announced that cyber attacks on government entities could be considered an act of war. 

"We'll certainly see more of this in the future, as Chinese hackers -- independent and otherwise -- target Google because of its global popularity and its decision to defy the Chinese government on censorship, which some hackers will misconstrue as being anti-Chinese," said Michael Clendenin, managing director of RedTech Advisors.
Hacking has become a major issue lately, with multinational companies being the recipients of many of these attacks. For instance, consumer electronics corporation Sony was hacked several times over the last month, losing user information and credit card numbers linked to its PlayStation Network (PSN) and Sony Online Entertainment (SOE) databases. After that fiasco, the U.S. government's top IT provider Lockheed Martin was hacked through the use of stolen RSA information.
Earlier this week, Australia's government warned its resource corporations of cyber attacks becoming more frequent, and worried that the country's resources may be at risk as well after a successful cyber attack was launched against Australia's parliament in February. What seems odd, though, is that Australia's largest oil and gas company, Woodside Petroleum, defended China, saying not to "just pick on the Chinese."

The attacks targeted the Gmail accounts of senior U.S. government officials, Chinese political activists, officials in several Asian countries, military personnel and journalists


Jun 2, 2011

Blue Gene


Blue Gene is a computer architecture project designed to produce several next-generation supercomputers, designed to reach operating speeds in the petaflops range, and currently reaching sustained speeds over 360 teraflops.

It is a cooperative project among IBM (particularly the Thomas J.
Watson Research Center), the Lawrence Livermore National Laboratory, the United States Department of Energy (which is partially funding the project), and academia.
There are four Blue Gene projects in development: BlueGene/L, BlueGene/C, BlueGene/P, and BlueGene/Q. On June 26, 2007, IBM unveiled Blue Gene/P, the second generation of the Blue Gene supercomputer.

Designed to run continuously at one petaflops, it can be configured to reach speeds in excess of three petaflops.
Furthermore, it is at least seven times more energy efficient than any other supercomputer, accomplished by using many small, low-power chips connected through five specialized networks.
For more information about the topic Blue Gene, read the full article at Wikipedia.org,

Jun 1, 2011

Google faces new trouble from Android malware

As in the March episode, when Google removed more than 50 apps, the newest round consisted of pirated legitimate programs that had been modified with malicious code and then re-released to the Android Market under false names.





For the second time in three months, Google yanked dozens of malware-infected smartphone apps from the Android Market.
The 34 apps were pulled over the weekend and Tuesday by Google after security researchers notified the company.
Google acknowledged giving some Android apps the heave-ho. "We've suspended a number of suspicious applications from Android Market and are continuing to investigate them," a Google spokeswoman said in an email reply to questions late Tuesday.
But there was an important difference to this campaign, said Kevin Mahaffey, co-founder and CTO of Lookout, a San Francisco firm that specializes in mobile security.
"These apps have the ability to fire up a page on the Android Market," said Mahaffey, adding that the hackers can send commands to the smartphone telling it which Market page to display.
He speculated that the attackers probably intended the new feature as a way to dupe users into downloading additional rogue apps that would have malicious functions, just as a hijacked PC is told to retrieve more malware. "They seem to have been designed to encourage people to install additional payloads," Mahaffey said.
Mahaffey said it was impossible to deduce hacker intent from the malicious apps' code, but he believed the criminals took the new path because social engineered attacks -- those that rely on tricking victims into installing malware rather than depending on an exploited vulnerability -- are more difficult to defend.
"Social engineered attacks are much more subtle, but very powerful because they're hard to protect against," said Mahaffey. "It could be they changed because either [the attackers] believed exploits were a dead giveaway, or they found this more effective."


Increase Traffic to Your Website: Did You Try This?

For marketers having a lot of traffic is generally an important topic. However, how should a person go about getting visitors to his/her website? While there is more than one technique, if you want to be given some sources of traffic for a website, I invite you to stay up to the end of this article.

mong the different techniques that could be used to drive traffic, there is guest blogging. What is guest blogging? As a short explanation for this article, I can say that guest blogging can be a higher level of article marketing.

If you want to hear about traffic techniques other than the classical article marketing, watch this video: Traffic Dashboard



Commenting on blogs is also a way to drive traffic. However, writing comments that add to the discussion could be advantageous. One drawback I find concerning blog commenting is the fact that there could be a moderator who will have to approve the comment before it is published.

Uploading video on sites such as YouTube is also a way to try to direct visitors to a site. A marketer should not forget to make his/her link visible. This can be done by inserting the link in the video as well as putting it in the description space of the video.

Of course this list is n1ot complete as there are a lot more ways to drive traffic to a site. If you want to hear about methods that could be helpful in getting traffic to a site,

Comments system

Disqus Shortname