Gmail and Google Apps Finally Leave Beta

Google finally takes its Google Apps suite out of beta - mainly to persuade the enterprise market that it is 'serious'.
By Asavin Wattanajantra

The applications that make up Google Apps – Gmail, Google Calendar, Google Docs and Google Talk – have finally been taken out of beta for both consumers and enterprise.

The word “beta” is now removed from the product logos for apps like Gmail, which has worn the tag for more than five years.

Google said that it realised having its applications constantly in beta confused some people, especially those who thought of ‘beta’ as being not ready for ‘prime time’ use.

However, it seems that Google’s movements in the enterprise space was the real motivation for the company to get rid of the label, to make sure that it was thought of as a ‘mature’ product suite.

“We’ve come to appreciate the beta tag just doesn’t fit for large enterprises that aren’t keen to run their business on software that sounds like it’s still in the trial phase,” said Google Enterprise product management director Matthew Glotzbach.

“So we’ve focused our efforts on reaching our high bar for taking products out beta, and all the applications in the Apps suite have now met that mark.”

Glotzbach said that 1.75 million users around the world use Google Apps since it was released for businesses two years ago.

In the UK, the Guardian News and Media group is one of the high-profile organisations that already use Google Apps, which we reviewed earlier in the year.

Google Apps has also has two new features. One is email delegation, which allows IT staff to screen and send others' email.

The other is email retention, which gives administrators the ability to set up policies and comply with regulations, so they can determine what email is purged from the system.

In May, Google Enterprise's Dave Armstrong claimed that Google were well positioned to offer consumer tools better than ones found in the workplace.

Source Content : ITPRO

First Patch for Firefox 3.5



Mozilla has only just released the latest version of Firefox, and the browser needs a fix.
By Stuart Turton

Mozilla has announced its first patch for the recently released Firefox 3.5, as it looks to stamp out persistent bugs in the TraceMonkey rendering engine.

Firefox 3.5.1 is slated for release in mid-July and will include fixes for three significant bugs and "topcrashes" that have shown up since launch. Topcrashes is the term given to any frequently reported crashes within the browser.

Chief among these topcrashes is a problem affecting TraceMonkey, the new JavaScript engine that debuted in Firefox 3.5.

Though considered the browser's headline new feature, TraceMonkey has proved something of a millstone around Firefox's neck and was one of the major causes of its six-month delay.

However, delays are not on the agenda for Firefox 3.5.1: "[The] goal of this release should be a quick turnaround that fixes topcrashes and bugs we almost held ship for," Mozilla wrote in its developer's notes.

Mozilla recorded around 6.5 million downloads of Firefox 3.5 in the first 36 hours of release, a far cry from the 8.3 million downloads of Firefox 3 in its first 24 hours. However, that browser was backed by a huge, if ultimately ill-fated, PR campaign that encouraged so many people to download it the servers crashed under weight of numbers.

Source Content : ITPRO

Could AVG Start Working on The Apple Mac Platform?



Does AVG, well known for its free security software product, look to provide Apple anti-virus?
By Asavin Wattanajantra

Security firm AVG is advertising for a senior developer who is an expert in Mac OS X systems, raising the possibility that it is looking to offer anti-virus for Apple technology.

In a description of the job requirements, the developer would be required to adjust basic system architecture for Mac OS X conditions and port AVG technologies to the Mac OS X environment.

AVG and Apple have not commented by the time of writing on what this job ad could mean, but it recently has become more common for Apple users to encounter the type of malware usually targeted at Windows users.

Apple quietly admits the need for anti-virus software on Macs, while in April security researchers discovered the first Mac botnet, which was created via a trojan infecting pirate downloads of iWork 09.

Only last month, security experts found two new worms targeting the Mac OS X, targeting users who downloaded a Trojan horse after clicking on a video promising hardcore porn.

Source Content : ITPRO

Facebook Trials New Privacy Tools



Facebook has announced it is trialling a system to simplify its privacy settings. By Jennifer Scott


Facebook is simplifying its privacy tools for users of the site.

A blog post from Chris Kelly, Facebook’s chief privacy officer, has outlined new features for the dominating social network that will reportedly make it easier to decide which information, if any, gets shared.

Kelly said: “The power to share is the cornerstone of Facebook. Privacy and the tools for tailoring what information is shared with whom are at the heart of trust.”

“That's why in the coming days, we'll be improving privacy on Facebook by launching a series of tests that guide people to new, simpler tools of control and connection.”

Normally every new feature of Facebook asks the user what privacy settings they want but this will now become standardised across the board and be available to see, and adjust, on just one page.

Kelly also promised that overlapping settings will be removed and combined to turn the process into “one decision” rather than several.

It will also launch a “Transition Tool” so each user can confirm what they want their privacy settings to be after the roll out.

These moves follow the launch of a beta last week called the “Publisher Privacy Control” so you can decide how you want each post to be displayed individually every time you chose to post something.

The new privacy features and Transition Tool will be tested by a small group of users over the coming weeks before the final version is rolled out.

Kelly said: “Our goal is to ensure that people understand the changes to our privacy settings and make choices that reflect their comfort level.”

The announcement comes in the same week as the hiring of Richard Allan to lobby the EU government on issues such as privacy.

Facebook got in trouble earlier this year over privacy issues surrounding proposed new terms and conditions from the site but things settled once it put the rules to a vote for its users.

Source Content : ITPRO

Google: Are spammers running out of new ideas?




Spammers might be using old techniques, but that isn’t to say there aren’t new players looking to make money.

By Asavin Wattanajantra

With its latest report suggesting the resurgence of old-style spam attacks, Google has raised the possibility that spammers could be running out of original ideas.

The second quarter of 2009 saw a substantial 53 per cent increase in average spam levels from the first quarter. However, Google said in a blog post that many of the new attacks were simple rehashes of attacks that occurred in the past.

“Like Hollywood, are we now starting to see spam ‘remakes’, based on originals of a few years ago?” asked Amanda Kleha, of the Google message security and archiving team.

For example, on 18 June, Google saw a new attack that released 50 per cent of a day’s spam volume in two hours. Yet Google said it used a simple ‘newsletter’ with malicious links and images inserted in the content, which Kleha said was “old school by today’s spam standard".

Kleha also said Google had seen another ‘retro’ technique reborn in a sudden wave of image spam, which most anti-spam filters have learned to block.

She suggested that it was designed to test the defences of the different spam filters, so that spammers could analyse what subject lines and content had the highest probability of success.

She added: “Another is that there may some new players entering the spam game, following the McColo and 3FN takedowns, and these new players are opening with well-tested techniques.”

Source Content : ITPRO

The History of Search Engine



The launch of Wolfram Alpha this month has some wondering if we’re moving into a new age of search. We certainly could be, but it’s unlikely it’ll be a Google-free world.

Indeed, this latest development – as cool as it is – is a continuation of a long string of innovation the sector has seen since the birth of the web. Wolfram Alpha is likely to fill one niche area of the market, while other innovations step-up to solve other problems. That may still leave Google holding the bulk of the market, but at the very least it’s encouraging that so many are continuing to develop new ideas despite such a near monopoly.

How search works

Every search engine is a bit different, much to the annoyance of search engine optimisers the world over. That said, search engines basically send out a robot or spider across the web to follow each and every link. The service then indexes what it finds, with different engines storing different bits – for example, Google, stores everything found in the source of the page, while others just look at what’s displayed.

When a user searches all these indexed pages, relevancy comes into play. Google’s PageRank is the most famous algorithm, but every engine has its own way of finding the best results.

But it’s not just the web that’s searched. Wolfram Alpha is promising to return answers, not just documents, from across the web, while many other searches look at more than the web or even limit themselves to specific niche areas of it. Consider the Pirate Bay. The now-notorious site offers a search of BitTorrents, specific file types that are key to its users. Or consider Google Maps – it is searching for anything that can be geographically pin-pointed. Even services like Twitter are changing the way search works, by letting us search what people are tweeting about.

Before the web

Quite simply, the world didn’t need search in the early days. In the beginning, all web servers were listed on a CERN website that was edited by a man then known as Tim Berners-Lee – those were the days before he was knighted.

Once that list became unwieldy, a search tool dubbed Archie – that’s ‘Archive’ without the ‘v’ – searched via a database of web servers. Soon after, Gopher’s rise led to a pair of new search tools, comically dubbed Veronica and Jughead, which searched using file names and menu titles.

It wasn’t until 1993 that the first robot came about. It was called the World Wide Web Wanderer, but it was for measuring the web, not searching it.

Modern search kicked off in December of that year with JumpStation, which used a robot to crawl the web, indexing it to make it searchable – the three key aspects of modern, or at least current, search. JumpStation was limited to titles, but another system called WebCrawler took it a step further the next year, managing to search full text.

Going commercial

Lycos kicked off the money making in 1994. The Carnegie Mellon project not only robotically indexed every word on a page for searching, but it was also used by the public and went commercial.

But it had competition. Among the pack that emerged over the next few years was Excite, Magellan and Infoseek, in addition to Altavista and Yahoo. Perhaps surprisingly now, at the time Yahoo didn’t search via full pages and keywords, but instead used a web directory system.

By 1996, dominant browser Netscape was struggling to keep things fair, so for a fee of $5 million it let search engines buy the search spot on the Netscape page in rotation.

But the search engine market was set for a shakeup. In that same year, Larry Page and Sergey Brin teamed up at Standford University to develop a search engine based on relevancy, initially dubbing it BackRub. Two years later, Google was incorporated as a company with investment of $1 million; a year later, they had $25 million to play with.

Google time



In 2000, the market as we know it now started to take shape. The dot com bust took down some, but Google’s PageRank bumped it into the limelight, and it started offering advertising that year.

Still, competition remained. In 2002, Yahoo upped its game by picking up proper search tech in the form of Linktomi in and later Overture, which owned Altavista. Yahoo even used Google’s search until 2004, when it melded its acquisitions together into a coherent search tool. That year also saw Microsoft enter the ring, creating its own tool in 2004.

But Google’s IPO in 2004 showed who was really in control of the market, putting the net worth of the company at about $23 billion. Now, it gains several hundred million queries a day. That said, Google has been hit by privacy and other controversies, and notably misses searching the “deep web” – all the data that isn’t linked the way Google likes it.

Challenging Google’s dominance

While Google has seen a few challenges to its market dominance, although none have yet to make much of a dent.

Last year, an engine named Cuil launched, to much media coverage. While the company itself didn’t use the phrase “Google Killer,” a lot of journalists and bloggers did. And it sure didn’t look good for Cuil – or any other Google challengers – when the service was derided for poor results and performance.

Last year, Cuil co-founder Tom Costello told IT PRO: “Other people tend to want to actually make it a story about ‘oh, here’s David coming along against Goliath.’ And again, I think that with the story of David and Goliath, David doesn’t always win on the first shot. A lot of time, people want a very quick resolution to these things.”

Even though Cuil continued to struggle to gain market share in the following months, Costello thinks the service has a future. “Even when you see Google – built to the kind of dominant position they have - it took them 10 years to build to that position. Search is not a business where you have overnight success. It’s not a business where you change the behaviour of billions of people worldwide who use search overnight.”

Maybe the challenge won’t come from a new service, but from established players instead. That’s certainly the goal Microsoft had in mind when it made a massive bid for Yahoo last year. While the bid failed, Microsoft has continued to try to partner with Yahoo on search.

At the moment, Microsoft’s third and fourth ranked Live and MSN searches pull in about five per cent of the market, with second-ranked Yahoo adding another 10 per cent, according to Net Applications. Google takes about 81 per cent, though, meaning it has a lot of room for error to stave off any challenges, even from big players.

While a straight-up deal between Yahoo and Microsoft could cause some disruption in the online ad market, it’s going to take something new to topple Google from its throne. Could pairing a big name with a new idea be enough? If Wikia Search is anything to go by, then the answer is no.

That project was backed by Wikipedia founder Jimmy Wales, so it had an attention-pulling big name from the start. It was never intended to overtake Google – Wales said he hoped one day to get five per cent of the market – but to offer an open, transparent search alternative. Wales said at the time: “The idea that Google has some edge because they've got super-duper rocket scientists may be a little antiquated now.”

Instead, Wikia Search looked to crowdsource its relevancy, asking users to rank the results of a search, rather than rely on mysterious algorithms like Google. But the service never took off, and as the recession hit, Wales shut it down, noting it was pulling just 10,000 unique users a month.

What’s next?

While Wales has promised to return to search as soon as finances allow, others are looking for new ways to find information on the web. Sir Tim Berners Lee is still at it, pointing to the semantic web – and in turn search – as the future. This looks to remove ambiguous words from the search process, making results more specific.

Microsoft is also set to be launching its new search tool as early as June. Codenamed “Kumo” at the moment, it looks to be a rebrand of its current Live search, but includes a few changes such as using categories to separate out different types of results.

And then there’s Wolfram Alpha, the engine that promises to return answers, not documents. While it certainly looks impressive, it’s so unlike what people currently use search for that it’s unlikely to be the force that topples Google.

But then, in such a fast moving area of the tech world, who knows when the next Google could be created in a university somewhere around the world…

Source Content : www.itpro.co.uk

Need to Know : Firefox 3.5

Version 3.5 of the Firefox web browser is imminent. We explain what to expect from this major update.

By Benny Har-Even

Firefox 3.5

While we agree that Internet Explorer has come on a long way, we still don’t think it’s the best option out there.

There are now several web browsers out there, all competing for your attention and the biggest of these alternatives, Firefox, has just received a major update.

What is Firefox?



If you recall your web history, in the late nineties, the ‘browser wars’ were conducted between Microsoft and Netscape. We all know who won that one, but out of the ashes of Netscape came an open source browser project – originally Phoenix (out-of-the-ashes, geddit), then changed to Firebird, and then eventually to Firefox.

Since version 2, released in October 2006, it’s started to significantly eat away at Microsoft’s market share and version 3 achieved a over eight million downloads in a single day - getting itself into the Guinness World Records in the process.

Firefox is widely liked for its expandability, with its design allowing for the creation for third-party plug-ins or ‘add-ons’. These provide extra features and make for a highly customisable web browsing experience.

What happened to Firefox 3.1?

Soon after version 3.0 was released, Mozilla began to take up the version 3.1 update and this was supposed to have been released some months ago. However, as new features and enhancements were added it was renamed to version 3.5, to better reflect the number of improvements.

OK, so what’s new in 3.5?

There are a number of new features in 3.5, but the one that many will care about it promised speed improvements – competition has hotted up in recent months with both Google’s Chrome and Apple’s Safari 4 claiming speed records, and Firefox 3 is starting to feel its age.

It’s all to do with the use of the Javascript rendering engine. Javascript is used for much of the new fangled Web 2.0 world we live in today, so getting it speedy is important - and Mozilla claims that it’s twice as fast as Firefox 3 was and can compete with Chrome and Safari.

The new version also supports HTML5, the latest web standard and this contains support for a new video tag – which means that you’ll be able to watch video in your browser without any need for a plug-in. The videos are in the open source Ogg Theora format though, and Daily Motion is the only major video site to support it as yet.

Other new bits include an ‘In-Private’ mode – just hit ‘Ctrl-shift-P’ to stop Firefox from remembering your browsing session – perfect for searching for that new job or - ‘ahem’ – other activities. You can also tell 3.5 to forget a site you’ve been to after the fact, just by finding and deleting in the history.

Tear it Up

We also like being able to tear off your tab and drag it out to make a new windows (nicked from Chrome) and ‘Location Aware Browsing’, so if you’re searching for information you don’t need to tell it anything – it knows where you are. Yes, you can turn it off, you paranoid people.

Downloadable fonts can help make web site start to look ‘the way the director intended’. This means you don’t need to have a font already on your system for the web page to use it, negating the need for designers to user static images, which makes for a more editable and searchable internet.

Finally, the ‘session restore’ has been improved, so in the event of a unexpected shut-down or crash, everything is remembered, which could be great if you’re composing an email in the browser.

Sounds awesome! When can I get it?

Now. Firefox 3.5 is available for download.

Look out for our full review of the full version on the site later this week.

Want to read more background on the latest IT topics? Click here for all the tech cheatsheets in our Need to Know series.

Source Content : www.itpro.co.uk

Opera 10 beta review

By Darian-Graham Smith, 12 Jun 2009



Opera was a real innovator in the browser space, but its desktop offering is something of the forgotten man in the industry. We take a look at the beta of its latest release.

Tabbed browsing, plug-ins, rendering speed. Others such as Firefox and Safari may now crow loud about these but Opera had them first. Indeed for years it was the definitive browser for the clued-in geek, and now is forced to jostle for attention alongside fast, flashy upstarts such as Chrome. Can the new public beta of Opera 10 see off the newcomers?

The fightback starts with a redesigned front-end: the drab toolbar of Opera 9 has been replaced by a bolder design, with clearly delineated buttons bearing revamped icons. It does look more inviting, but functionally it's near-identical and, truth be told, it now looks a little like Safari.

Thankfully, Opera keeps its tabs within the main window, which we think is more usable than the non-standard way Safari carves up the title bar. You can also now drag the search field to resize it, although this feels like cosmetic tinkering rather than a functional improvement.

In fact, the big new interface feature is wholly invisible when you start Opera 10. To find it, you need to drag the toolbar downwards; that's not an intuitive operation, but when you try it you'll be delighted to see your web page tabs grow into thumbnails of the pages themselves.

Sadly, no matter where you've scrolled to, the previews show only the top of the page you're viewing - or sometimes, a section further down the page if something about the layout confuses them. Either way, they all too often don't resemble the pages they represent.

As a final interface enhancement, you can also now customise the Speed Dial grid. Where Opera 9 always showed a grid of nine page previews, the new beta will accommodate anything from four to 25 pages. The latest beta of Safari has a similar option, so it's good to see Opera catch up so quickly.

Computer Accessories




A home away from home is a great thing, so why not have an office away from the office too?The spare room or a quiet corner can be a perfect place for productivity. To outfit your workspace, you might need to invest in some new hardware like a second computer, a bigger monitor or a high-quality printer. Once you've got your home computer set-up, you'll need to connect it to the Internet or network it to other computers and peripherals in the house. With a good grasp of the facts and a firm idea of your work habits, you'll be ready to make sensible choices for your home-made office.

  • The Computer. Not everyone needs the same level of performance in a home office computer. You might use your computer primarily for word processing and email which requires little processing power. On the other hand, you may want more power to run database analysis, large spreadsheets or graphics applications. The type of work you do and your work load will determine whether you need a computer with a lot of brawn or just a little.
  • Processor. A computer's processor or central processing Unit (CPU) is the engine that powers the device. The speed of the processor is called the clock speed which measures how fast the processor can carry out instructions. Speed is measured in MegaHertz (MHz) and is one measure of a computer's power. A typical home office Windows PC should have at minimum a 500 MHz processor. A power user would probably prefer 800 MHz or higher. If you know your computing needs are modest, and you want to save some money, an older machine with a slower processor is worth considering. When looking at an Apple Macintosh, keep in mind that you can't simply compare processor speeds with Windows machines, as the two types of computers have different system designs. Macs generally have lower processor speeds in MHz but don't let that fool you. Newer Macs like the iMac can definitely keep pace with PCs.
  • Random Access Memory (RAM). When the computer is turned on, RAM is used to hold the operating system, applications and data that you're currently running. Information in RAM is rapidly available to the processor. When RAM fills up, the computer slows down because it now has to retrieve information from the slower hard drive. Imagine documents on your desk in front of you, readily at hand when you need them. But when your desktop is full, you have to file and retrieve documents elsewhere, which takes more time. The amount of RAM you need is influenced by the type of applications you use. Graphics programs like Adobe PhotoShop or Illustrator use a fair bit of memory. Word processing and spreadsheet programs use somewhat less memory. Users who like to multi-task and prefer having multiple applications running simultaneously will definitely want plenty of memory. More memory gives you a larger "workspace" and makes your computer perform faster with fewer glitches. A typical user needs at least 64 MB of RAM with 128 MB becoming the norm. In virtually all computers, you can expand the memory as you need more.
  • Hard Drive. This is the computer's filing cabinet where all your applications and data are permanently stored. Most users can fit many years of productivity into a 6 to 10 GB hard drive. If you need to store a lot of information like several years of business records or image catalogues, then you may want a more spacious hard drive. Luckily, a bigger hard drive won't cost you that much extra. Alternately, you could invest in a removable storage drive.
  • Expansion. It never hurts to get a system with room to grow, especially if you foresee your home office needs evolving. Find out how many RAM slots a system has and what the maximum amount of RAM is. Adding expansion cards to your system for 3D graphics or ethernet will increase the functionality of your computer. Look for a system with two or three free expansion slots and room for additional disk drives.

To Have or Not to Have Supply Chain Software: Can the Riddle Be Solved?

by Khudsiya Quadri



The first question that comes to mind is: will supply chain software help reduce the cost of the supply chain? So the riddle is to have or not to have supply chain software within your organization…?

For an organization to be efficient and profitable—i.e., successful—a well-managed supply chain is critical. In today’s market, customers’ needs are changing so rapidly that organizations must be quick to respond to these rapid changes while making sure the cost of materials and finished goods stays low. Supply chain management (SCM) software helps organizations achieve this low pricing for their customers by providing better visibility into changes in customers’ demands, enabling negotiation of best possible prices from suppliers, helping optimize inventory levels at various stages of processes, consolidating distribution networks, and optimizing freight and logistics.

by Khudsiya Quadri

So do all of these concerns mean SCM solution market has not see a change in demand for SCM solutions, even though the entire worldwide economy is in a downturn? It’s true the enterprise software market has slowed down, but the market for SCM solutions is still in rapid growth state. According to AMR Research group, the worldwide market for SCM software is expected to reach or exceed $8 billion by 2010.

Now the question: what does supply chain software encompass that makes it so crucial for all types of organizations? Firstly, we need to understand what SCM is. Basically, it’s a combination of science and software that brings together all the steps within a supply chain—sourcing, procurement, inventory management, advance planning and scheduling, and warehousing and distribution. With the help of SCM software, organizations are able to organize and automate the forecasting, planning, execution, and control of these significant processes.

As well, flexibility within SCM software is essential to being able to integrate with third parties who are involved in an organization’s supply chain, toward providing end-to-end visibility. SCM software is developed to provide organizations with advance capabilities for data communication, collaboration, and coordination with vendors and suppliers, as well as transportation and shipping organizations. The chain does not end here; other partners of suppliers and vendors as well need to be incorporated within the whole supply chain software network.

Another question arises: what are the cost benefits for your organization to implement SCM software? Here are some important factors:

  • Firstly, SCM software helps an organization manage its entire supply chain network by providing visibility to all the activities happening across all suppliers, manufacturing plants, and distribution centers.
  • By centralizing data and information, SCM software assist organizations make effective decisions about production, distribution, and logistics strategies of goods. This in turn means SCM solutions can help companies eliminate inaccuracy in production and logistics. As well, SCM solution can bring efficiency to processes and remove delays that result from a lack of coordination between departments and third-party organizations.
  • By sharing information upstream and downstream, SCM solutions can give all parties involved a better picture of what’s happening so no gaps will be found in the processes. Because of SCM’s ability to enable collaboration along the entire supply chain, all key information regarding changes to a customer order or demand will be communicated more effectively, giving all parties involved a better plan of action for inventory management, logistics planning, and cash flow management.
  • As supply chain software makes information clearly available, it allows effective communication with other partners, which in the end helps organizations improve logistics and tracking of goods, and enables them to remove or fix any problems before they become uncontrollable.
  • SCM solutions can help organizations achieve their inventory levels and delivery dates through its variety of modules.

Now the time has come to answer the riddle about whether you should have SCM software within your organization or not. For many organizations, the supply chain network is becoming more multifaceted; for this reason, many organizations are facing multiple challenges in managing their enormous networks. Any company with a complex network of suppliers, vendors, and other partners can see rapid benefits from a SCM software implementation. SCM software helps the organization make its operations run more smoothly throughout its supply chain, from timely execution to delivery of product.

Supply chain software solutions are not just for manufacturers or production plants; in today’s marketplace, everyone is beginning to benefit from using supply chain software. For example, retailers and service providers are a couple of examples of the types of organizations that are using SCM software to boost efficiency and gain visibility throughout their networks. Higher visibility of what’s happening during each process within a supply chain has helped organizations achieve considerable return on investment (ROI).

Once SCM software is in place at an organization, it gives that organization the ability to produce and deliver only the amount of product needed, when it’s needed—without any delay. As noted in my previous blog about better inventory management, an organization’s main objective from its supply chain is to have the right inventory, at the right time, at the right location, and in the right quantity. Basically, it is more than just visibility into the supply network; it’s collaboration within the network as well.

Nobody says it’s easy to integrate SCM software within an organization’s enterprise structure. SCM software could be added on to an organization’s current enterprise resource planning (ERP) application, or it could just replace some manual process done on spreadsheets or in a Microsoft Access Database. To maximize cost savings, it is key to have a SCM software that is capable of integrating with other systems—ERP, customer relationship management (CRM), accounting, or financial modules—for better information flow and ROI. As well, many parties both internal and external play equally key roles in SCM’s success. We have a perfect example of this in the relationship between Wal-Mart and Procter and Gamble (P&G). By implementing SCM software, Wal-Mart gained by having the right amount of inventory on its shelves, while P&G knew exactly what was needed, when it was needed, and where it was needed.

Keep in mind that employees of organizations should never be threatened by use of an application or software. To have a successful supply chain application in place, it’s important to merge the expertise and knowledge of employees with the software. This will bring greater ROI and profitability in the long run. As well, a system is often only as good as its users and the data input into it.

Essentially, it’s important to ask questions before any kind of software implementation, to find out if you need a new SCM solution or not. Once that is out of the way, try to find the software that is most compatible with your business and that will integrate with your current applications and systems. Lastly, remember to have a dependable software provider by doing research on its size, global reach, and financials—but never overlook a review of its past customers and current customer feedback in order to get a complete picture of the software provider’s strengths and weaknesses, as well as the strengths and weaknesses of its software product.

Source Content : http://blog.technologyevaluation.com/

Don't Buy Software Online Before You Read This 10 Tips To Buying Software Online


Buying software online can be tricky, especially if you are new to shopping via the internet. Whether you are upgrading an existing software package or looking for a specific program to install, the process will be a lot less complicated if you know what to look for.

Tip # 1
Read customer reviews. Many popular online stores, such as Amazon, allow users to leave their comments about a particular product. Reading other customer reviews may help to make your decision easier because it gives you an idea of others who have experienced the product firsthand.

Tip # 2
When considering any type of software, make sure that it is compatible with your computer. Most software requires a specific processor type, such as Pentium or Celeron, and a certain amount of free hard drive space. The reason is because, in order for software to function properly at quickly, the computer must be able to handle the application. By being familiar with your computer's configuration, you will be able to select the right software.

Tip # 3
Become familiar with the software by reading it's description and capabilities. Before purchasing any type of software, you should make sure that it is exactly what you want or will enjoy learning. Often times, after software is opened, there is no refund policy for buyer's remorse.

Tip # 4
Purchase software from a reputable company. This will ensure customer service, reliability, quality products and timely shipment. By purchasing software from a reliable source, you will also ensure that the title is authentic and not an illegal copy. The best way to check out a business's reputation is through the Better Business Bureau.

Tip # 5
The best part of shopping for software online is the competition. Because there are so many retailers, prices are more competitive than if only one store had the software that you want. Shop around and compare prices before making a final decision.

Tip # 6
When making a purchase online, consider using a credit card. Most credit card companies provide a dispute resolution process, which is beneficial if the product is not delivered, is not as advertised or is damaged and the company will not stand behind the transaction.

Tip # 7
If purchasing from another individual, such as often the case with online auctions, confirm that the software has all manuals and/or product keys to ensure proper installation.

Tip # 8
Learn about the company's return, refund and/or exchange policy. In many cases, especially with software, the company may refuse to accept the product back for a refund. However, there is always the possibility that a program is damaged or doesn't function properly, in which case the store should honor the purchase with an exchange for the same title. When buying software online, it's best to purchase from a store that is reasonable when it comes to exchanges if not refunds.

Tip # 9
When purchasing software online, take a moment to look at the company's shipping costs, methods and availability of a way to track the package following shipment.

Tip # 10
Common payment methods include credit cards, checks and/or money orders. If you want to purchase software online, you will need to do so from a company that accepts a convenient payment method. If you do not have a credit card, most companies will accept a mailed payment. Most companies, however, recommend not sending cash.

4 Programs For Your Computer [Smart and Free Programs]


One of the fun parts of owning a computer is, of course, access to the internet. The worldwide web is chock full of useful information, readily available at your fingertips! It is also home to potentially lethal viruses, many of which can wreak havoc on your system within moments. The following four programs can help you avoid trouble; best of all they are absolutely free.

Firefox : a web browser for the ages. Okay, a web browser that beats Internet Explorer by preventing pop ups and harmful scripts from being downloaded to your computer. Lots of nifty features too, including tabbed browsing, live bookmarks, and tons of add-on features.

Spybot Search and Destroy : gets rid of adware, spyware, and malware. Blocks the installation of spyware before it occurs; works in conjunction with anti-virus software, not as a replacement for one.

AVG Antvirus : offers basic antivirus protection including scanning email attachments for viruses and scanning of all hard drives, removable drives, and external drives on your computer. A paid version does some additional tasks and includes technical support.

Zone Alarm : if you don't have a firewall installed on your computer, you are opening yourself up to potential catastrophic security breaches. With Stealth Mode enabled you can search the internet in private, away from the intruding eyes of those who might want to steal your important information.

As with many freeware programs, 'pro' or professional versions of the software are sometimes available to give computer users a maximum amount of protection, for a price. Still, all four of these programs have something to offer and are worth exploring. Your computer safety and privacy is essential, insure it today by downloading the programs that are right for you.

How To Find Cheap Used Laptops

There are many reason why one would want to buy cheap used laptops, the main, and most obvious reason being that a new laptop is simply too expensive. If your goal is to find a cheap used laptop, then take some time to do the research, and you will be sure to get a great deal. I will detail 5 ways you can use to locate the right used laptop that suits your needs, and price range.

One of the first steps in your research should be to get on the Internet and begin your search. Your first stop should be eBay. Unless you've been living under a rock for the past few years, you already know that eBay is an auction site where you bid for items. It's also a great place to find hard to find items such as, a piece of toast with a religious icon burned into it, or a clip Elvis's sideburns. But, it's also a great place to find inexpensive used equipment, i.e. laptops.

Once on eBay, you can do a quick search by typing "used laptop" into the search function. You're sure to find hundreds of selections, and name brands too. Spend some time there conducting your research. You don't have to bid right away so take your time. Compare prices, and look for sellers with good ratings. The higher the rating, the more reputable the seller.

Another place to find used laptops is Amazon.com. Amazon is not only a great bargain store that sells new items, you can also find used items for sale at a great price, often a lot cheaper than their respective new items. If you've used Amazon before, then you've probably seen the links "new & used". By clicking on this link when you do a search, you'll be able to see both options. But of course we're interested in used. You'll be given the prices for the used items, as well as its condition, and the rating of the seller.

Still another stop you should make before concluding your research is Craig's List. This website is much like a newspaper classified section in its apparent simplicity. But don't let that simplicity fool you. Do a search for "used laptop" and you will find a huge selection. You can even choose by location to find something local, or you can opt to expand your search to other regions if you wish. One bad thing about Craig's List is that it doesn't include a seller's rating, so you have to be careful. One way to avoid being scammed this is to stick to buying locally, where you can have potential face-to-face interaction with the seller.

One more place where you can try to find cheap used laptops is Overstock.com. Although this site won't yield as much of a selection as eBay, or Graig's List, and perhaps even fewer than Amazon, it's still a good place to look. You may find something in there you didn't see in any of the other sites, so it won't hurt to look.

You don't have to limit your search to the Internet. You can also try doing a bit of off line research. Look in your local newspaper and see what turns up. Often times, some people will opt to sell their used computers by placing ads in the newspaper, so you may be pleasantly surprised by what you find. Try the Sunday paper since it usually has a larger classified section.

There you have it, 5 ways to look for cheap used laptops. By doing some thorough research, you're sure to find a great deal. With all of the selections you'll have at your disposal, you'll be able to find a laptop that has the features you're searching for, at a price range you're comfortable with.

Computer Maintenance

You may not realize it, but your computer and your car have something in common: they both need regular maintenance. No, you don't need to change your computer's oil. But you should be updating your software, keeping your antivirus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer's security.


Getting started

Here are some basics maintenance tasks you can do today to start improving your computer's security. Be sure you make these part of your ongoing maintenance as well.

  • Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
  • Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
  • Install software updates immediately. When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention

A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords


Developing ongoing maintenance practices

Now that you've done some ground work, it's time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. We recommend setting aside time each week to help keep your computer secure.

  • Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost. (Accidents can happen.) To learn more read our tips for backing up information.
  • Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program's user manual to see if you can schedule an automatic scan of your computer. To learn more, read our tips for reducing your virus risk .
  • Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly (we recommend monthly) to reduce your risk. Also, choose your passwords carefully. To learn more, read our tips for creating stronger passwords.

Making a schedule

One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, we suggest making a regular "appointment" with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information.

iSoftware TV - Software for The Future Of Television

Watch Over 3000 Internet Channels on Your PC!!


iSoftware TV is the new way to enjoy Internet TV in your pc. With one easy download software, you can be watching thousands of worldwide channels in tons of categories such as movies, news, sport, music, shopping and much much more.

iSoftware TV can works anywhere in the world. Whether you are in the United States or in Australia, enjoy thousands of satellite channels directly in your PC!

While traditional satellite TV and Cable services can cost easily in excess of $90/month, this new satellite technology literally turns your home PC into an international television broadcasting unit, allowing you to view all of your favorite & once unattainable programs with one easy click of your mouse. Watching TV on your PC has never been easier!

Our product has been in development for over 7 years, and has been revamped by experts from Microsoft and IBM. With hundreds of thousands of dollars of research and development put into this product, Desktop Satellite TV is indeed the fastest, easiest and most cost effective way to view international television in today’s high paced environment.






Or Click Here, and you will get :

*If you have any other questions, please visit our Support link to contact our free 24/7 technical support group.

Get the Money you need NOW!

Guaranteed Personal Loans and Credit Cards - Bad Credit Approved!!

Did you knonw you qualify for Personal loans or VISA...........even if you have horrible, terrible or worse credit? Bankruptcy ok! Homeownership is not required, this is not payday loans!

Start today and improve your credit situation!




Since 1998 we have been the leader in online personal loans and credit cards. Now is the time to apply for your loan or credit. Don't worry about bad credit because it does not matter, it's guaranteed! This day could change your life forever!

Don't Wait! Get the Money you need NOW!
Get the highest rated Internet credit E-book FREE just for visiting.
Money and Credit await you!

Top 10 Spyware Warning Signs

Everyone is talking about spyware infections, and I wonder if my PC is infected with spyware or not? I saw in a normal PC, almost 9 out of 10 computers are infected with some form of spyware. But how do I know if my PC is infected with spyware or not.


Thanks for the information I have read about the signs and symptoms of spyware. Hopefully this information will be useful for you. There are more than 10 spyware signs point to the fact that the computer is spyware. They are:

1. Weak enforcement:

Even if your PC is new, it is slow and sluggish after the attack on spyware. It takes too long to connect to the network and so minute.

2. PC crashes:

Without warning, the PC hangs and freezes, thus suggesting the presence of spyware.

3. Redirect browser:

You can see some site as the default homepage. I have my site www.google.com standard. If the home page changed and strangers without their knowledge, this is an alarming sign of spyware infection.

4. The pop-up ads:

Never stop pop-ups that fill the screen are the signs of spyware infections. In general, computers infected with spyware are prone to pop up in connection with pornography, gambling, drugs and other dangerous sites, you download their products.

5. False alarms:

False notice that your PC is infected with malware, the urgent attention. You are in your control with a simple click on the descriptions.

6. Mysterious e-mails:

You get a lot of emails with the mysterious subject to temptation, such as celebrities naked, Britney Discover, Anna Kournikova May SUN, etc. Here is a strange e-mails in your folder, even if you can not write.

7. Kidnapped toolbars:

Their lack of Google / Yahoo Toolbar kidnapped in May and a new toolbar appears on the website.

8. New Files:

Without their intervention, new files on the desktop. Spyware Advertisers click.

9. Mystery Favorites:

All of your favorites and bookmarks are gone and a mysterious Web sites you temptation.

10. Disappointing research results:

Also, the preferred search engine results curious. If such relocation of the search engine itself

Each of these signs of spyware 10th May following the attack of spyware. Go before your PC infected with spyware. The new technology of real-time protection provided by the supplier of anti-spyware to prevent attacks from the fight against spyware before it your PC. Scan your PC with anti-spyware software, and you will find any spyware and adware threats to your PC to hide.



Click here for the Best Buy Homepage

How to Make Vista Boot Faster

Vista has been seen as a slower Windows program, but how do you make vista boot faster? A lot of people when asked to choose Vista or XP as an operating system choose XP. They claim that this new Vista does not work as well as the traditional XP operating system.

Personally, I think the main reason why Vista is looked down upon is because there are not that many tools out there to make the program better. Windows XP has BootVis and TuneXP if there happens to be any problems with the system that causes it to slow down. But, both systems are not compatible with Vista.

The best course of action to take in making Vista boot faster is to defrag your system. When you open new files or download anything new, the files spread themselves along your hard drive. When this happens, it takes space away that you could be using on that hard drive to make the computer faster.

Defragmenting your hard drive condenses files together so you have more free space to operate your computer with. You can even place the boot up files at the start of the drive to cause the system to come on faster.

Some people say that you can manual defrag your system by utilizing "defrag c:-b" as the command prompt. This command will defrag your c drive and allow Vista to boot faster. It is your personal preference if you want to utilize this method to fix the problem you are having with the Windows Vista program. The thing with the program is there is no status bar so you have to wait until the computer prompts that the defragmentation has ended.Hopefully some of these tips were useful in helping you solve your Vista problem. If all of this does not work, you may want to try to take your computer to a specialist to get it fixed. Network administrators can work wonders on a computer.

Coupons For Discount

Check out some of this week's Weekly Deals, good through Friday at Midnight:

LG HBM-760 Bluetooth headset - $19.99 shipped W-LG760 4/3/2009
Original BlackBerry Stereo Headset - $4.99 each
when you buy 2
No code required 4/3/2009
Blue Ant X3 Bluetooth Headset - $24.99 W-X3WH 4/3/2009
Sandisk 4GB Micro SD Memory Card with SD
Adapter
No code required 4/3/2009
Motorola Mini USB Charger - $2.50 each when
you buy 4 or more
No code required 4/3/2009

If you want to use a text link to direct your users to the page where these are located, you can use this one:

Check out the newest coupons this week at Accessory Geeks

Virus Scanner Myths

By Mike Warenda

There are many programs out there that tell you they are the best at removing Viruses and Malware. I have seen this too many times now where I show up at a home and they tell me well I have Norton or some other name brand product, so I should be safe from viruses and stuff. I look at the program and see it is not only outdated, but the last scan was sometimes years ago. I then break the news to them how they are probably infected with all kinds of goodies.

Too many people make the assumption that if the program is starting up it is working. Virus scanners are usually only a one year subscription and if you do not pay again in a year you no longer get updates. Therefore, any virus made after the last day you received updates can get right by your anti-virus software. You should check your anti-virus periodically to make sure everything is running smooth and you're receiving your updates.

If you are not receiving updates for the product check to see if the subscription date is past due. If so you will need to purchase another subscription or another product. If you can't get updates and your subscription has not run out yet, this means you are infected. Now you are probably wondering, well how did this happen if I had a virus scanning program? Well this is easy to explain.

There truly is no one great product when it comes to removing malicious programs. Every time they update your anti-virus software someone will be updating their malware programs. It is a never ending battle. The makers of these malware find weaknesses in the anti-virus software and pretty much disable it and your updating abilities of most programs. This leaves you helpless to their attacks.

There are many things you can do to prevent this from happening to you. Always scan every file you download before opening it. Don't open email or click on any links in emails from people or sites you do not know. You would be surprised to see what can be hidden in a link. Every now and again test your anti-virus software by going to sites that will scan your PC for free. There are many sites on the computer there to help people free; all you have to do is look for them.

Before you even get started with installing any programs you should first make sure your hardware is clean and free of dust. Dust buildup can make a computer run very slow and cause freeze issues alike. It is always good to start here because sometimes people think they are infected with viruses and it comes out to be just dust caked in the heat sink of the processor.


http://www.pctools.com/free-antivirus/

Organize and Protect Your Wires and Cables with Expandable Braided Sleeving

Why should you consider expandable braided sleeving for your tricky cable management jobs instead of another wire bundling solution? Because braided sleeving is expandable, so it fits over big, bulky connectors. And it's flexible, so it fits easily into tight spot - great for harnessing and protecting automotive, aerospace and electronic wiring as well as home stereos and computers. In fact, you'd be hard pressed to find a wire bundling job that our braided wire sleeves, like our fiberglass sleeving, aren't perfectly suited for.

Plus, the braided sleeving from CableOrganizer.com has a few extra things going for it. You can take this expandable sleeving outside and leave it there because it's weather resistant and dries quickly. The different types of sleeving, like our fiberglass sleeving, have been tested and proven to resist all sorts of automotive and aircraft fluids, like gasoline, fuel oil, de-icing fluid, lubrication oil, solvents and more. They even fend off salt water, so these wire sleeves are perfect for scuba diving and marine equipment.

Our expandable sleeving does all that and does it with style, too! Expandable sleeving comes in black, natural and a range of bright colors. Take your pick from polyester, polyethylene or Mylar®, Fiberglass, Teflon®, Halar® sleeving. Braided sleeving is sold by the foot or in bulk packaging. These wire sleeves are great for gift giving, too.

When couplings and connectors prohibit the use of expandable sleeving, our Side-Entry products provide the ideal solution. These innovative wire sleeves offer the best of both worlds: 360 degrees of protection and the elimination of the need to disconnect bulky connectors and clamps.

For Braided Sleeving Glossary, click here.

CableOrganizer.com- Thousands of Wire Management Products! $10 Off Orders of $300 or More. Coupon Code "tenoff250cj"! Click here!

You Need to Use Malware Protection to Safeguard Your Digital Data - No Computer Should Be Without It

As a computer technician I am amazed to see that so many people are still not using malware protection. Malware protection will protect your computer systems and the wealth of information it holds from getting damaged. I have done my share of work in the technical field that I can honestly say I have seen it all. However, the malware I have had to remove from computers is simply surprising. If you are unfamiliar with malware and do not understand the damage it can cause I can explain that to you and if you are someone who has suffered damage from malware I am sure that you will agree that it is a very real and very serious issue.

Malware is software that mimics a virus. It can get into your computer systems when you are browsing certain sites and it then installs itself. The most recent one that I have had to remove takes over your browser whether you use Internet Explorer, Firefox, etc. It doesn't matter, this software will reroute all of your searches to a totally different place and will also change your homepage.

On the majority of these damaged systems I was not able to remove the malware and I had to rebuild the entire operating system from scratch. Malware is most certainly becoming more and more prevalent which has been proven by all the damaged systems I have had to deal with lately. In order to avoid this you must take certain steps if you want to protect yourself from this annoying malware you should make sure that you are running some form of malware protection, I cannot stress this enough. If you do not choose to use the protection you are in jeopardy of having your computer system basically completely taken over. I encourage everyone to get malware protection so you don't have to hire me to tell you your system has been ruined...


I N T E R M E Z O

Free Advertising at AdsVert.com

Feature Summary

  • Free to Join
Free to join, no catches or hidden fee's.
  • Triple Ad Exposure System
Your targeted ad is shown three times every time you show one AdsVert ad.
  • Incredible viral marketing system
Each adsvert.com ad contains a special link called a referral link, this means every time you show an ad you are not only earning triple advertising exposure, but you are also promoting your own viral marketing system. If somebody joins Adsvert.com via your referral link you will earn an instant advertising bonus, you will also earn extra advertising every time they show an ad, and it doesn't stop there. If somebody joins via your referrals link you gain another instant advertising bonus, and even more residual advertising. This carries on for 5 levels giving you an incredible massive passive viral advertising system.

Incredible Viral Advertising

Referral Level
Referrals
Credit Rate
Your Bonus Ads
One
20
0.2
400
Two
80
0.2
1,600
Three
320
0.2
6,400
Four
1280
0.2
25,600
Five
5120
0.2
102,400
Visitors seeing your ads each day:
136,400
*Based on each member showing just 100 ads per day, and each member referring just 20 people.

  • Fast setup, can be installed on ANY web site in minutes
With our flexible system you can install text ads on any web site very quickly, and with the minimum of fuss. Our system supports two types of ad installations, floating and static. Floating Ads Floaters are very quick to install and easy to use, these type of ads can be installed on any web site and can be used in conjunction with affiliate links. You don't have to modify any html or even own the site. Floaters hover over the top of web site content, they can be moved by the end user and closed if the viewer wishes. Note: Floaters are NOT popups. Static Ads Static ads are slightly harder to install and you must have access to a sites HTML to use them, static ads cannot be moved or closed by the end user like floaters can.
  • Full Geographic country or region targeting
This type of targeting allows you to choose which country or region viewers of your ad come from. This option can be used in conjunction with category targeting.
  • Full Category driven targeting
Category driven targeting means only people who are actually interested in seeing your ad will see it. This option can be used in conjunction with geographic targeting. No programming knowledge required. Our systems do all the hard work and generate everything you need to get your ads shown as quickly as possible with the absolute minimum of fuss and hassle.
  • Can be used on any web site
Our flexible floating ads can be used with ANY web site including affiliate links, you don't need to install any html or have custom access to the site, floating ads can be setup in seconds.
  • No bidding or ridiculous pay per click charges
Unlike most sites offering targeted text adverts you don't have to pay for clicks and you don't have to out bid other users to gain a better position. All ads and members are treated equally and given the same amount of advertising exposure.
  • What is Targeting?
Targeting allows us to instantly pick the best ads to show people when they visit sites, this means better quality visitors see your ads, higher click through rates, and more sales or signup's for you.

Securing Windows XP Home Edition (2)

continued from previous post

3. Use Private Folders To Protect Data: As mentioned in Step 1 above, Windows XP Home uses something called Simple File Sharing for sharing files, folders and other resources. When you mark a file or folder as Shared, anyone who can get to your computer can access the share and the data it contains because of how Windows XP Home uses the Guest account and its blank password (unless you have followed the information in Step 1) to grant access. Windows XP Home does not allow for more customized file and folder sharing like you would find in Windows 2000 or in Windows XP Professional (with Simple File Sharing disabled).

Windows XP Home does offer the polar opposite of sharing though- marking a folder Private. If you mark a folder as Private the contents of that folder and any sub-folders will be accessible only by you.

To make the most of this feature it helps if you keep all of your personal or confidential data in one place so that you can just mark the one folder as Private rather than having to scour the computer looking for various folders you might want to keep Private. Your User Account folder under Documents and Settings which contains your My Documents folder, your Favorites and other personal configuration data for Windows is marked Private by default in Windows XP Home.

To mark a folder as private you need to right-click on it and select Sharing and Security. On the Sharing tab click the checkbox that says "Make This Folder Private". If the folder is owned by another user or by the operating system itself this option will be grayed out. You may also see a checkmark inthe box that is grayed out if the folder is a sub-folder of a different folder already marked as Private.

4. Use Limited Accounts For Everyday Use: Windows 2000 and Windows XP Professional offer a number of different user account types and also provide a means to create your own custom user account types. Windows XP Home essentially offers two choices- Administrator and Limited. The Administrator account has essentially full control over anything and everything on the computer. The Limited account can use the computer, but is extremely restricted in its ability to install software or alter system configurations in any way.

One of the primary reasons for using the Limited account is to protect the system from yourself. It's possible that a family member with Administrator access can accidentally change or delete critical information on the computer. It is also possible that someone with an Administrator account may have their account hacked or become infected with a virus or worm of some sort. Typically, the attacker or malware will be able to wreak havoc on the system using the access privileges of the account that has been compromised. So, it makes sense to save your Administrator account for when it is needed, but use Limited accounts for everyday use by most users.

To choose an account type in Windows XP Home click on User Accounts in the Control Panel. Once you select a user you can click on the "Change My Account Type" button. You will be able to choose between Administrator and Limited and can see a brief description of the abilities of each account type. You are required to have at least one Administrator account, so be sure to leave or create one- but save it for use when necessary and stick to using Limited accounts wherever possible.

5. Upgrade to Windows XP Professional: I realize that switching operating systems isn't exactly helpful for securing the one you have. However, it is truly my best recommendation for someone using Windows XP Home edition that wants to ensure a high degree of security on their system.

The Simple File Sharing "feature" which doesn't let you protect individual files or select which users can simply read the file vs. which ones can change or delete it turns out to be a feature you may not want if you're trying to be secure.

Windows XP Home lets you mark folders and their data as Private, but does not include support for EFS (Encrypted File System) which you can use in Windows 2000 and in Windows XP Professional to encrypt your data for even more protection from unauthorized access.

These are just a couple of reasons. The bottom line is that it seems that Microsoft did not have security in mind when selecting the features and options to include in Windows XP Home. Users who truly want to be secure (and don't want to switch to Linux or another operating system entirely) should move to Windows XP Professional. Shop Online at BestBuy.com.


ZoneAlarm Extreme Security - Stops Attacks Others Miss!


$20 Off on ZoneAlarm Internet Security Suite

Securing Windows XP Home Edition (1)

5 Simple Steps For A More Secure Home Computer

Users should follow basic security advice like that found in Security Basics In A Home Computing Environment, Password Security, or In Depth Security. But, there are some additional steps to take that are unique to Windows XP Home edition.

The following list includes five things you can do to make sure your Windows XP Home edition is secure- including tricks and tips you might need to know in order to follow the advice from the other articles and implement those recommendations on this operating system.

1. Password Protect The Guest Account: This security measure is discussed in Microsoft Windows Security 101. However, it is not an easy or intuitive task in Windows XP Home. If you open the Control Panel and select User Accounts you will see a list of the users that are able to log on to the system. Selecting your own user account you will see an option that says "Assign Password" or, if a password is already assigned, "Change My Password". However, if you select the Guest account your options are limited to "Turn On The Guest Account" or "Turn Off The Guest Account" as the case may be.

Windows XP Home uses the Guest account as an integral part of network file and folder sharing. Using Simple File Sharing, when you share out a file or folder it is accessible to anyone who can "see" your computer. If you don't have other security measures in place such as a firewall that means that users on the public Internet may be able to connect to your share using the Guest account.

Even if you select "Turn Off The Guest Account" it will only be turned off in terms of its ability to log on directly to Windows. In the background, the account will still be functional because Windows XP Home uses the Guest account to authenticate users connecting remotely to shared resources on that machine. It is virtually impossible to truly disable the Guest account and doing so would cause a number of problems on a Windows XP Home computer.

So, in order to protect your system and ensure that not just anybody can connect to your file or folder shares- even when using Simple File Sharing- you need to assign a password to the Guest account. Because Windows XP Home offers no "easy" point and click solution to help you, you will have to use the command prompt. Click on Start, then All Programs, then Accessories and finally select Command Prompt. Once you have the black command prompt window open you will type the following:

* net user guest

You will of course replace the brackets and the word "password" with the password you wish to assign. Refer to the Password Security article for tips on choosing a good password.

2. Enable The Internet Connection Firewall (ICF): Microsoft Windows XP - both Home and Professional editions- come with a built-in firewall. Unfortunately, it is not enabled by default so you have to know enough to go in and turn it on. For the record, I actually recommend that you leave ICF disabled and install a 3rd-party firewall such as Zone Labs ZoneAlarm which has a version available for free for personal use.

The advantage of using a 3rd-party product like ZoneAlarm is that it monitors both inbound and outbound traffic. ICF only monitors and blocks inbound traffic. That is great for protecting you from external hacking or malicious activity, however it will not protect you from situations where a virus or Trojan on your system attempts to initiate unauthorized or malicious network activity out from your computer.

In any event, ICF is better than nothing. It is free and it is built in. So, if you choose not to download and install a 3rd-party product you should at least turn on the Internet Connection Firewall. To enable ICF you need to select Network and Internet Connections from the Control Panel. Then select the Network Connections icon at the bottom of the screen.

At this point you need to right-click the network connection you want to enable ICF on. For most home users there should only be one network connection present. Simply right-click it and select Properties. Click on the Advanced tab and click the checkbox next to "Protect my computer...".

Once you enable ICF, the Settings button at the bottom of the Advanced tab will be enabled as well. If you click on Settings you can configure ICF to allow certain traffic through and what sorts of information you want logged. Most users will be fine leaving this on the default settings.

Whether you use ICF or some 3rd-party firewall, be aware that should you suddenly start experiencing problems connecting with certain sites, computers on your network or the Internet as a whole- your firewall is the first place you should look. Odds are there is some firewall rule that is blocking traffic you would rather allow.


To be continued to the next post...

Keep Evil Away From Your Computer



ZoneAlarm Extreme Security

') ')