Monday, December 25, 2006

Apple iPod Nano vs FAKE thing

Real:The iPod Nano has a gorgeous, superslim design with a bright, photo-friendly screen. It is easy to operate and works seamlessly with iTunes and the iTunes Music Store, which has the world's largest selection of music. It boasts a nimble processor and system performance with no skipping, thanks to flash memory.


Fake:The screen of the counterfeit iPod Nano is very different from that of the real thing, being longer, and displaying a clearly different user interface. The quality of the counterfeit unit also bears little resemblance to the real thing. The controls are also different, with a Play/Pause symbol on the center click button that’s missing on the real iPod Nano. Also missing from the counterfeit iPod Nano is the connection for the iPod dock.


About top two Search leaders


Search leaders Google and Yahoo have created largely self-service empires that let marketers bid for and place promotions next to search results, requiring advertisers to pay only when people click. The cost-effectiveness of search ads has attracted pioneering companies for years, but now marketers of all stripes are signing on, including national and international businesses.
Microsoft the third competitor is way back.

How to keep your wireless networks safe

introduction

Wireless networks are becoming more and more common. Sometimes called Wi-Fi or 802.11 (after the standards which define how it works), they allow computers to connect to one another without cables. Using radio technology similar to cordless phones, they make it incredibly easy to connect to company networks, email and the internet. Unfortunately, they also make it very easy for outsiders to do the same.

How to keep it safe


Don't broadcast the name of the network (known as the SSID)

Change the default SSID to something more obscure. Don't use a name that identifies your organisation

If possible and if your access point allows it, restrict wireless access to normal office hours

Use MAC filtering. Each network card has a unique code called a MAC address. You can set access points to restrict access to certain, trusted MAC addresses

Switch on and use the built-in encryption to prevent eavesdropping

Restrict the ability of users (and network administrators) to set up 'quick and dirty' wireless networks, even temporarily. One rogue access point can undo all the good work you do on the others

Make sure all your other security measures - passwords etc. - are in place so that you have a second line of defence against intruders