Saturday, March 5, 2011

Protect your facebook account


1.10 privacy settings for Facebook users.  THIS SITE.
2.Protect Facebook account from hackers and phishing scams.  THIS SITE.
3.5 tips to protect your Facebook account :


1. Make your profile ‘PRIVATE”. You could do under the “Privacy setting tap” in your Facebook. When the “Private” option is on, only your friends that you are accepted will be able to see your photos and walls. This is a way that you could protect from people you don’t know to look at your information.
2. Block people that you don’t want to show your information to. You can simply go to their photograph and there should be a block option for you to choose. When this is activated, this person no longer to be able to see anything that related to your account and this a great options to avoid people that is bothering you.
3. When you block a person, there will be a window pops up and ask you for the reason. You must REPORT them if they have cyber stalking or harassment. It is important to REPORT if this is really happening, because people will not stop if no one reports.
4. Only add people that you really know and this is the best internet security in any ways. By building your list to 1000 of people doesn’t mean you really have a big group of friends. Think what is your purpose for using this Face Book, if you just want to keep on adding people, I am so sure you will not put any personal or photos in here, however, if you are use this as for your friends, then you should stop adding people you don’t know for security reasons.
5. Do not buy anything through Facebook. I know there are lots of applications that you need to pay for, but try to ignore it and use the “FREE” things they offers. It is not clever to give out your financial information to 3rd party just because you want to send a picture of a birthday cake to your friends

Follow those simple rules if you want to keep your facebook account safe.Obey the RULES and TERMS of Facebook.



In order to protect your Facebook account against hackers check this site for full info how to set up your settings.


DONT SHARE YOUR PERSONAL INFORMATION WITH ANYBODY NO MATHER HOW GOOD YOU KNOW THEM.THEY MIGHT NOT STEAL YOUR ACCOUNT BUT THEIR PC CAN BE INFECTED AND THAT MEANS BOTH ACCOUNTS ARE COMPROMISED !!!













Protect Your Computer from Spyware and Adware



Adware is software that displays advertisements on your computer. These are ads that inexplicably pop up on your display screen, even if you're not browsing the Internet. Some companies provide "free" software in exchange for advertising on your display. It's how they make their money.


Spyware is software that sends your personal information to a third party without your permission or knowledge. This can include information about Web sites you visit or something more sensitive like your user name and password. Unscrupulous companies often use this data to send you unsolicited targeted advertisements.



Is Your PC Affected by Spyware?


The main problem that most people notice with either kind of program is that they cause performance issues with their computers. For example, Internet Explorer might not work properly any more, your computer might hang more frequently, or your computer might slow down significantly. Removing spyware successfully is difficult enough to make preventing it in the first place a priority.
Unauthorized adware and spyware usually install on your computer covertly by using one of two methods:
Tricking you into clicking a link that installs it. Links to spyware can be deceptive. For example, a Web site that's trying to push spyware onto your computer might open a window that looks like a Windows dialog box, and then trick you by installing when you click a Cancel button to close the dialog box. Sometimes, spyware pushers will put a fake title bar in an empty window, and then install spyware when you try closing the window.
Installing freeware that includes it. For example, you might install a free file-sharing program that surreptitiously installs spyware on your computer. File-sharing programs can be a major conveyor of adware.
For full info and how to protect your pc from threats check this site.
Keep in mind some kinds of adware can break your anti-spyware tools.






PHP For the Absolute Beginner



This area is intended for everyone new to PHP. It opens with a series of informal, entertaining tutorials written by Vikram Vaswani, founder and CEO of Melonfire. These tutorials build on a previously-published 5-part series which has now been updated and extended to embrace PHP 5, making parts of it suitable for those of you who already have worked with PHP 4 in the past.


If you want to learn about elementary PHP 4 or basic PHP 5 visit this site for more info.

What is Aspect-Oriented Software Development?


Aspect-Oriented Software Development (AOSD), sometimes just called Aspect-Oriented Programming (AOP), is a new approach to software design that addresses modularity problems that are not handled well by other approaches, including Structured Programming and Object-Oriented Programming (OOP). AOSD complements, but doesn't replace those approaches.
Typical enterprise and internet applications today have to address "concerns" like security, transactional behavior, logging, etc.. The subsystems that provide these services can be implemented in a modular way. However, to use these services, you must insert the same "boilerplate" code fragments into various places in the rest of the application to invoke these services. This violates the "don't repeat yourself" (DRY) principle and it compromises the overall system modularity, because the same invocation code is scatteredthroughout the application.
For example, if you want to control access to certain services in your application, you could insert authorization-checking boilerplate at the beginning of every method that needs this control. Because this redundant boilerplate appears in many places in the code, it would now be difficult and error prone to modify or replace this security approach later, should that become necessary. Also, your application code is now tangled with code for the security (and probably other) concerns, which both compromises clarity and makes it hard to reuse your code in another context, since you would have to drag along the same security approach, which may not be appropriate.
Because concerns like security typically cut across a number of application module boundaries (e.g., classes). We call them cross-cutting concerns.
Note that the loss of modularity is at the intersection between the different concerns. AOP restores modularity by developing the cross-cutting concerns, or aspects, in isolation and then combining them with other modules using declarative or programmatic mechanisms that are modular. That is, the points of intersection are defined once, in one place, making them easy to understand and maintain. The other modules require no modifications to be advised by the aspects. This "intersection" process, sometimes called weaving, can occur at build or run time. AOSD weaving is a key innovation that provides very fine grained query and composition semantics. Where traditional code linking has the ability to resolve method and variable names, weaving adds the ability to replace method bodies with new implementations, insert code before and after method calls, instrument variable reads and writes, and even associate new state and behavior with existing classes, typically for adding "mixin" behaviors.

For more info check AOSD web site.