Preventing Malware In Your Android

Malware In AndroidAs the most popular platform, with a market share in the range of 85 percent based on the 2014 second quarter, Android has became the favorite target of malicious programs or malware makers. Google’s Android as the owner implement security measures at Play Store app store to keep malware not to be entered.

Still, Android owners are not 100 percent safe and be smart to keep the devices that are not infiltrated by malicious programs. Well, to minimize the likelihood of malware infections, there are a number of tips that can be applied such as;

Only download applications from the Play Store

This one is the main advice to avoid malware. Google constantly monitors the applications store the Play Store and quickly crack down if there is a problem.

Use the services of a trusted application catalog

Encase your Android devices cannot access the Play Store, you can be obtained from other sources are equally reliable, such as Nokia Store, Galaxy Apps (Samsung), and the Amazon App Store.

Avoid suspicious applications and application stores

Avoid application that looks “suspicious” as it reaps the bad reviews, explores the grandiose promises, or ask permissions that do not fit its function.

Do not use pirated applications

Download paid applications without spending any money is lucrative. However, this action have a great risk because of pirated applications that usually comes in the form of Android Application Package (APK) is very easy to insert malware.

If you want to install the application side loading, make sure the APK file is obtained from reliable sources.

Always update your phone software

The latest version of the software, usually has better protection against malware. In the Android version 4.2, for example, embed Google overcharge protection posed by malware premium text sender. Each new release of Android gives improvement in terms of security.

Use the Google malware scanner

Each version of the Android phones 2.2 and above are equipped with malware scanner. Before installing applications obtained from sources outside the Play Store, Google will scan the relevant application to ensure its safety.

This feature is enabled by default and can be accessed from the Settings menu in the app drawer Google. Devices running Android 4.2 or later can activate malware scanner to activate the option “Verify Apps” from a menu in the settings security.

Consider using the anti-virus

Unlike Windows PCs are in absolute need antivirus, Android may reduce the risk of malicious programs through the insulation Application Sandbox. However, anti-virus applications can still further improve security.

There are hundreds of anti-virus applications are available in the Play Store, you should select the names that have good reputations such as Avast, AVG, BitDefender, Kaspersky, Sophos, Symantec, and Trend Micro. There are also some popular newcomers such as Lookout and TrustGo.

HTML, The Basic Language Of Internet

HTMLThe very basic language of the internet is HTML (HyperText Markup Language). If you can do crossword puzzles, if you can write a report for your teacher or boss, you can be creating web pages in a matter of minutes.

Even if you’re not a writer or not a ‘techie’. It’s sort of like your first date. Terrifying to think about, but not nearly as bad as you thought when it’s over.

The truth is that you can create your first webpage with just eight words enclosed in symbols. That’s right! The following words, with each enclosed in bracket symbols (shift-comma and shift-period on the keyboard), make a complete usable web page.

——————————————-

html

head

title

/title

/head

body

don’t enclose this one, it’s your content- hi (:

/body

/html

——————————————

If you copy what’s between the dashed lines above, open notepad,paste it into a page, enclose each word in those symbols and save it as anyname.htm, you can open your web browser and load it just like any other web page or double click on it and it should load automatically.

Now, that wasn’t as bad as you thought, was it? All you need now is to learn some more of those words enclosed in symbols and you’ll be a pro.

Those words such as html, head, /head and /html (when enclosed in brackets) are called tags. The ones such as html and head are called start tags and the ones with this symbol / such as /html and /head are called end tags.

What you see in the web browser is what you put between the body and /body tags. You could type an entire report or letter without knowing any more than you do now.

If you learn just two more tags you can create links and use images in your web pages. Also, and nearly as important, you could be making changes in web pages that you may own already.

LINKS-

The html below will put a link to Google on your web page when brackets are placed around

a href=”http://google.com” and /a

———————————————

a href=”http://www.google.com” Google /a

———————————————

To put the link on the web page you created above just copy the line between the dashed lines above, insert the brackets and paste it between the body and /body tags and save it. Then load it or double click it as before.

The tag used for links is the a tag and it’s counterpart the /a tag. As you can see there is a little more to this tag. In the tag you add the webpage that the link will load into your browser.

IMAGES-

If you want an image on your web page use the html tag below (enclosed in brackets as above).

——————————————–

img src=”a:mypicture.jpg”

——————————————–

This is set up to put an image called mypicture.jpg on a web page.

Again if you just copy this (replacing ‘mypicture.jpg’ with the name of your image) and paste it between the body tags the picture (which must be in the same folder) will appear in the browser window. (by the way if you make changes to the web page then save the changes, you need to click the refresh button on the browser to see the changes in the browser window.)

Of course, there is also a lot more to HTML (It doesn’t get too complex until you start making tables). In fact complete books (many of them) have been written on the subject, but if you look at the HTML for most web pages you will find less than ten different tags, including the ones above.

Well, that’s enough to get you started. I hope this has been helpful and encouraging.

Computer Data Loss, a Serious and a Very Expensive Threats

Computer Data LossData loss is an expensive reality. It’s a hard fact that it happens more often than users like to admit. A computer data loss disaster can mean lost income and missed business opportunities or worse, it will make companies go out of business.

The other side of data loss is the psychological and emotional turmoil it can cause to IT managers and business owners. Despair, panic, and the knowledge that the whole organization might be at risk are involved. In a sense, that’s only fair, since human error is one of the two largest contributing factors in data loss. Together with mechanical failure, it accounts for almost 75 per cent of all incidents. (Software corruption, computer viruses and physical disasters such as fire and water damage make up the rest.)

Disk drives today are typically reliable. Human beings, it turns out, are not. A study has reveal that approximately 15 per cent of all unplanned downtime occurred due to human error. A significant proportion of that happened because users failed to implement adequate backup procedures, either having trouble with their backups, or having no backup at all.

In many cases, the problem starts long before the precipitating system error is made, that is, when users place their faith in out-of-box solutions that may not, in fact, fit their organization’s needs. Instead of assessing their business and technology requirements, then going to an appropriate engineered solution, even experienced IT professionals at large corporations will often simply buy what they’re sold. In this case, faith in technology can be a vice instead of a virtue.

Sometimes, the underlying cause of a data loss event is simply shoddy housekeeping. The more arduous the required backup routine, the less likely it will be done on a regular basis. A state ambulance monitoring system suffered a serious disk failure, only to discover that its automated backup hadn’t run for fourteen months. A tape had jammed in the drive, but no-one had noticed.

When disaster strikes, the normal human reaction is panic. Because the loss of data signifies critical consequences, even the most competent IT staff can jump to conclusions, and take inappropriate action. A blank screen at a critical time can lead to a series of naive decisions, each one compounding the preceding error. Wrong buttons get pushed, and the disaster only gets worse.

Sometimes the pressure to correct the system failure speedily can result in an attempt to reconfigure an entire RAID array. IT specialists are typically not equipped to deal with crisis modes or data recovery techniques. Just as a good physician is trained to prolong life, the skilled IT specialist is trained to keep the system running. When a patient dies, the physician turns to others, such as nurses or counselors to manage the situation. When significant data loss occurs, the IT specialist turns to the data recovery professional.

Data recovery specialists are innovative problem solvers. Often, the application of basic common sense, when no-one else is in any condition to apply it, is the beginning of the journey towards data recovery. The data recovery specialist draws on a wealth of experience, married to a “never say die” attitude, and a comprehensive tool kit of problem-solving procedures.

Successful recovery outcomes hinge on a combination of innovative logistics, applied problem-solving, and “technology triage,” the process of stabilizing an affected system quickly, analyzing and treating its wounds, and preparing it for surgery. The triage process sets priorities, such as targeting which files are needed first or which are absolutely vital to the functioning of the business, and establishes whether files might be recovered in less structured formats (such as text-only), which may be desirable when time is crucial.

The art and science of professional data recovery can spell the difference between a business’ success or its failure. Before that level of intervention is required, though, users can take steps to ensure that the probability of a data loss disaster is minimized.

Basic to any business technology plan is a regular fire-drill procedure. Back-up routines may be in place, staff may assigned to specific roles, hardware and software may be configured – but, if the user isn’t completely sure that everything works the way it should, a data loss event is inevitable.

Having adequate, tested, and current backups in place is critical. A hardware breakdown should not be compounded by human error – if the malfunctioning drive is critical, the task of dealing with it should go to a data recovery professional.

Just as data loss disasters are rooted in a combination of mechanical failure and human error, so, too, the data recovery solution lies in a creative marriage of the technological and the human. The underlying philosophy of successful data recovery is that technology is something to be used by human beings, not something that uses us.

Power Supply Problems

Power Supply ProblemsThe power supply convert’s your regular household current into low DC voltage used by the computer. When this component fails, there is simply no activity going on with your computer. Remember to do the easy troubleshooting first. Inspect the Power Supply for any damage. Double-Check all connections.

Learning how to check your power supply and how to replace it when needed can be a life saver if you’re a computer buff or in business with the trusted PC. Don’t take for granted the simple pleasure of turning on your PC and everything works just fine.

Here are some signs that could indicate when your power supply is going bad or just dies on you;

No power to the computer

Here you must first check the wall outlet for power by connecting another device such as a radio or lamp to be sure power is present. If the computer is connected through a surge protector, check it as well.

If the wall out has power, check the power cable going to the PC to see if AC voltage is making its way to the system unit. Do this with the use of a multimeter.

If there is power, you will have to open the PC and check for power from the power supply to the motherboard.

When using a multimeter to check voltage, be sure you have a good ground for the black lead of the multimeter.

Re-booting problems

One main problem you may face with an ailing Power Supply is that it may re-boot the computer without any warning. All information is lost and it seems as though this happens at the worst possible time.

Booting errors when the computer first start’s up is another indicator of this component going on the blink.

Power distribution problems

When the power supply begins to fail, you may receive power at one device and not another. For example, the Hard Drive may receive power but the CDROM Drive has nothing at all.

Another headache with would cause re-booting is the intermittent power going to the drives or the motherboard itself. Follow the steps below to check your power supply should you experience some of the above problems.

Checking the power supply

If the wall outlet and the power cord are good, make sure the connection at the motherboard is secure. Then you may have to face the fact that the power supply itself is bad. If you have a Multimeter you can test the power supply output before purchasing a new one. Simply follow these steps.

Turn off the PC, but do not unplug it, open the system unit. Set the multimeter to read DC volts in the next range higher than 12 volts. Locate a power connector similair to the hard drive, or cdrom drive connector that is unused and turn on the PC.

You can also unplug a drive connector and use it as well. Turn on the PC and insert the BLACK probe into the power connector on one of the BLACK wires. Touch the RED probe to the YELLOW wire on the power connector.

The multimeter reading should be +12 volts. Now touch the RED probe to the RED wire and the reading should be +5 volts. If no readings or different readings occurred, you’ll have to replace the power supply. If the readings were correct, you should check the P8 or P9 connectors at the motherboard. These connectors may also be named P4 and P5. To check these connectors, perform the following. . .

Insert the BLACK probe into P8 at one of the BLACK wires. Insert the RED probe into the P8 connector at the RED wire. The reading on the multimeter should be +5 volts

Check the power going to the Motherboard connections by inserting the RED probe into P8 at the YELLOW wire and you should get +12 volts. Leave the BLACK wire touching the black wire at the P8 connector. Check the BLUE wire and the reading should be a -12 volts.

Now move the BLACK probe to the BLACK wire on the P9 connector. Test the WHITE wire by inserting the RED probe and the reading should be -5 volts. Check the RED wires on the P9 connector and you should get +5 volts on each red wire. You won’t get exactly 5 or 12 volts but the readings will be very close, such as 5.02 volts.

If the Power Supply is a couple of volts off, in either direction, such as when the RED wire should be reading -5 volts but it reads -8 volts, or if there are no readings, replace the power supply.

DO NOT remove the power supply from the system unit case when performing these tests. DO NOT perform these tests if you do not feel comfortable or do not know what you’re doing. Be sure to remove any and all electrical static build-up from your clothes and body BEFORE touching any parts inside the system unit. And NEVER open the power supply case for any reason, since high voltage may be present.