Thursday, March 31, 2011

Transformers: Dark of the Moon

"Transformers 3" features Sam Witwicky (LaBeouf) taking his first tenuous steps into adulthood while remaining a reluctant human ally of Optimus Prime. The film centers around the space race between the U.S.S.R. and the USA, suggesting there was a hidden Transformers role in it all that remains one of the planet's most dangerous secrets. The villain of the third film will be Shockwave.

Rango



From the director of "The Pirates of the Caribbean" comes RANGO, featuring Johnny Depp in an original animated comedy-adventure that takes moviegoers for a hilarious and heartfelt walk in the Wild West. The story follows the comical, transformative journey of Rango (Depp), a sheltered chameleon living as an ordinary family pet, while facing a major identity crisis. After all, how high can you aim when your whole purpose in life is to blend in? When Rango accidentally winds up in the gritty, gun-slinging town of Dirt - a lawless outpost populated by the desert's most wily and whimsical creatures - the less-than-courageous lizard suddenly finds he stands out. Welcomed as the last hope the town has been waiting for, new Sheriff Rango is forced to play his new role to the hilt . . . until, in a blaze of action-packed situations and encounters with outrageous characters, Rango starts to become the hero he once only pretended to be. With a cast that includes Depp, Isla Fisher, Abigail Breslin, Alfred Molina, Bill Nighy, Harry Dean Stanton, Ray Winstone and Timothy Olyphant as the Spirit of the West, Rango is an exciting new twist on the classic Western legend of the outsider who saves a town - and himself in the process.

Paul

Paul (2011)


Simon Pegg and Nick Frost (Hot Fuzz, Shaun of the Dead) reunite for the comedy adventure Paul as two sci-fi geeks whose pilgrimage takes them to America's UFO heartland. While there, they accidentally meet an alien who brings them on an insane road trip that alters their universe forever. For the past 60 years, an alien named Paul (voiced by Seth Rogen) has been hanging out at a top-secret military base. When he discovers he's been taken prisoner, the space-traveling smart ass decides to escape the compound and hop on the first vehicle out of town-a rented RV containing Earthlings Graeme Willy (Pegg) and Clive Gollings (Frost). Chased by federal agents and the fanatical father of a young woman that they accidentally kidnap, Graeme and Clive hatch a fumbling escape plan to return Paul to his mother ship. And as two nerds struggle to help, one little green man might just take his fellow outcasts from misfits to intergalactic heroes. Paul is directed by Superbad's Greg Mottola, from a story by Pegg & Frost. Joining the comedy's cast are Jason Bateman, Kristen Wiig, Bill Hader, Blythe Danner, Joe Lo Truglio, John Carroll Lynch, David Koechner and Sigourney Weaver. Written by Universal Pictures

McAfee Total Protection 2010 Review

The good: Two massive steps in the right direction kick off the 2010 version of Total Protection: the new interface and the overhauled performance. This version should go a long way to fixing McAfee's battered reputation.

The bad: It might not be clear enough that running a full scan when installing will significantly speed up later scans. There's not much in the way of easily accessible live support, either, so if something goes wrong, it may take a while to get a human on the phone.

The bottom line: McAfee Total Protection 2010 hits many of the right notes. It's easy to use and it's effective, but years of below-average releases will likely leave many users unwilling to give it a try.
Review:

Editors' note: Additional information has been added to the support section of the review since it was originally published. However, the final score for McAfee Total Protection 2010 remains unchanged.

McAfee debuts its 2010 product line today, introducing an overhauled interface and new features in a bid to remain competitive. The change to its interface is as dramatic a shift as the one that Avast introduced in its 2010 suites, although McAfee's new veritcal look is drastically different from any major security program currently on the market. Most of the features in McAfee ... Expand full review

Editors' note: Additional information has been added to the support section of the review since it was originally published. However, the final score for McAfee Total Protection 2010 remains unchanged.

Read more:

AVG Internet Securuty Business Edtition Review


AVG Internet Securuty Business Edtition offer complete protection within a network and able to balance resources through intelligent system scan.

Antivirus name of this one is fairly popular in the homeland. Yes, AVG is one of the pioneering exterminator virus that is widely used computer users in Indonesia. The main reason for a fairly easy interface plus a free version that has been used since. Now, AVG Technologies presents a more complete solution by dividing the two products: Home Security and Business Security. The second segment is one of them comes through Internet Security 2011 version of Business Edition.

AVG Internet Security Business Edition 2011 the most complete variant of the 5 others on the product package Business Security. It offers total protection (against viruses, trojans, worms, spyware, and the like) for an office or SoHo users who have a minimum of 5 computers (which connect via a network or the internet). Firewall protection and protection on the e-mail has also been included. In the Business Edition of this series, also provided settings across computers in a network (remote admin), making it easier for security management.

Like other models of Internet Security, AVG IS 2011 BE secure access to the Web with a technology called LinkScanner. LinkScanner module will perform inspection Web pages and links in them secretly (in the background / background) to ensure these sites do not threaten the security of data. The same process was done on search engines Google, Yahoo, and Bing so that each search result will be assigned a rating (rating) specific. The goal is that users know the site / link where a trusted and who not. Techniques such as this we think is very useful to guide the lay user inadvertently open the Web.

The speed of the new version of AVG now detects every threat is also a matter that deserves thumbs up. Any interference will be recognized immediately as well as AVG instantly eradicated. If the threat is not recognized, AVG can automatically report the threat to the server (online). Scanning system and a new Smart Scan is designed to be able to work flexibly. This flexibility is manifested in the form of acceleration is much faster when the PC did not do the weight and walk slowly when the PC was used for other processes.

You are fond of online transactions and accessing social networking sites will be greatly assisted by the presence of firewalls and Identify Protection provided by AVG. All important information like passwords, credit card numbers or other secret code will be protected. The way to prevent any application so as not to seize the valuable information. Users of instant messaging ICQ, MSN, and Yahoo also may perform filtering so as not threatened with a false link or by the presence of undesirable persons. (Deny Prasetyo)


Conclusion


For those of you who want a complete AVG with more features than the free version, AVG Internet Security Business Edition 2011 can be ogled. With the ability to protect the five PCs in a network, this application is suitable for home office owners. Security management is also more easily done via the remote admin facility.

Operating Systems
Windows XP, Vista, 2000, 7, Server

Main Components

Views major components of information security that accompanied the status of a unified look easy to understand. Users also can choose Indonesian if desired.

Priority Scan

Scheduling a scan with a method that can be selected. Priority scan can also be determined whether to be slow (but save resources), fast (resource optimization), or automatic (user-sensitive).

Application Status
Viewing the current application, much like accessing the Services in System Configuration Utility in Windows. Here are displayed the status of file / application with color coded green for safe conditions, yellow for caution, and red is likely to threaten.

Plus: The interface is easy; complete protection; rapid detection capability; available updates offline, there is a remote admin facility; there is a rescue CD.

Minus: detection is sometimes wrong (need updating).

Assessment Score
- Performance: 4/5
- Facilities: 4.25/5
- Usage: 4.25/5
- Price: 3.25/5
- Total Score: 3.98/5

THE KASPERSKY!!!

Kaspersky Labs continues to gain popularity in the security software industry, and it’s easy to see why. Kaspersky Anti-Virus 2011 continues the legacy of providing rock-solid security without sacrificing performance, making it one of the best antivirus software solutions available. Kaspersky Anti-Virus earns the TopTenREVIEWS Silver Award for providing excellent security in an antivirus application that is both professional and easy to use.

Kaspersky Anti-Virus is a comprehensive program, protecting users from a number of threats including bots, worms, Trojans, rootkits, spyware, viruses and other malware. More than just traditional virus scanning, the software includes advanced technologies implemented to detect and prevent new threats.

Some of the new features for 2011 include the new Desktop Security Gadget, System Watcher technology, and additional improvements throughout the software.

Scope of Protection:

As far as desktop antivirus software, Kaspersky Anti-Virus is as all-encompassing as they come. The software is designed to protect users from several angles, effectively detecting, preventing and removing all forms of malware. The antivirus software is equipped to protect users from traditional viruses, but also has advanced technology to protect from even new unknown threats. Furthermore, there are a couple of tools and web-specific features that Kaspersky includes that are normally only found in more comprehensive Internet Security Suites.

Effectiveness:

Kaspersky is known for their quick response to new viruses, and they’re often among the first to detect new viruses in the wild. One reason the software is so effective is because it is updated regularly and is proactively looking for new security threats. The malware landscape continues to change, and Kaspersky adjusts to address the threats.

One new feature worth noting is the System Watcher, which monitors and logs application activity and behavior. If something suspicious is detected, the software stops the process and informs the user. But more than just uncovering stealth threats, System Watcher can rollback your system and actually delete any malware that was created or spread in the process.

The software works in real-time, protecting you as you surf the web, download files, send and receive emails, and access files and documents. Third party testers and security organizations collectively approve and recommend the software as well. Kaspersky has received top marks in recent VB100 (Virus Bulletin 100%) tests, and certification from ICSA. AV Comparatives has awarded the software with an A+, and West Coast Labs has verified the software for anti-virus, anti-spyware, anti-Trojan, and anti-malware. Overall, this software is one of the most effective available, and has the experience and accolades to prove it.

Ease of Installation:

The software is available as a box copy, or you can download the software online and install immediately. The product includes three licenses, and the software works on laptops and netbooks as well. Installation is quick and straightforward, and doesn’t require a restart.

But what if your system is already infected to the extent that you can’t install antivirus software, or even start the computer? If you aren’t able to download the software because of malware, you have the option to download a specialized tool used to preemptively scan your PC and remove the threat to accommodate a clean install.

If your computer is dead, you’ll need the Backup and Rescue Disk, which you can either purchase or create yourself (so remember to do it before your computer dies). This bootable recovery disk can rescue your computer by booting prior to the OS to detect and remove malware, and is a great tool for emergencies.

Ease of Use:

This antivirus software is designed to be simple to use. The software has traditionally been geared towards expert users, but we’ve seen a definite shift to a consumer-level approach in the last few years. The advanced tools are still there (and still plenty strong), but beginners won’t be intimidated. Whether you’re an advanced user looking for intensive controls, or a laid-back user who simply needs protection without constant supervision, Kaspersky will work for you.

The interface is effectively organized and user-friendly. The interface features a color-coded graphic so you always know your security status (the traffic-light color-coded security status is actually bold enough that “at-a-glance" is an understatement; more like “can’t miss it”).

The dashboard is similar to last years’ interface, with left nav tabs and quick access to the quarantine, reports and settings. Accompanying icons and the graphical user interface add accessibility, and are applicable and appealing.

One of the best parts of this security program is that you can set your preferences and let it protect you without constantly monitoring it. Scans and updates are set by to occur automatically by default, and the software includes real-time security as you surf the web, download and open files, or communicate with email or IM. In the event of an infection or potential threat, the software immediately lets you know and provides quick access to identify and fix the problem so you can move on.

Features:

Of course even though the software is easy to use, it is also very customizable. Users can control just about every component of the software to schedule scans, adjust security levels, toggle specific features and even change the appearance of the software. There are several improved features and a couple new ones, all included with the intent to provide better security and overall performance.

Introduced last year, the Kaspersky URL Advisor continues to protect users while online. The browser plug-in is available for IE and Firefox, and stops you from navigating to infected websites. You’ll also be protected from phishing scams.

The software also still utilizes the proprietary iChecker and iSwift scanning technologies to keep you protected without hogging your resources. iChecker makes it possible for the software to identify files that have been opened or changed since the last scan, and only scan them, effectively speeding up scans. iSwift keeps an eye on resource usage and can throttle the resource demand as needed to optimize performance to run faster if the system is idle (or slower if you need the PC resources for other programs).

Some other continued features are the virtual keyboard and gamer mode. While the efficacy is debatable, the virtual terminal lets you input sensitive information (credit card numbers, passwords or other personal information) by clicking on the digital “keyboard” with your mouse. While it’s no way to type an essay, the virtual keyboard does avoid key loggers and keystroke recognition malware attempts to steal your information. The game mode makes it possible to enjoy full-screen video games (or movies) without interruptions.

One new feature that we’d like to highlight is the desktop security gadget. The sleek gadget docks on your desktop and provides better access and awareness to your system security at all times. The antivirus widget will change color if your security is at risk, and includes quick links to the most important aspects of the software. You can even drag and drop files directly to the gadget for an immediate manual scan. The buttons and even the appearance of the gadget can be changed (and if you don’t like it you can always disable it).

Updates:

Frequent updates are essential for effective antivirus and antispyware protection, so Kaspersky Anti-Virus updates on a regular basis for continual security. Updates run in the background automatically, and are frequent enough that they aren’t very big, so you shouldn’t notice any slowdown.

The software isn’t just equipped to keep itself up to date, but can also help you identify and locate essential updates for your system and other applications. The vulnerability scan checks for outdated drivers and can keep you on top of crucial security updates. The tool also identifies settings (like if your computer is set to autorun external media) that you might want to adjust for optimal security.

Help & Support:

Kaspersky offers some great support for all of their product. Technical support comes in the form of a searchable online knowledgebase, FAQs, product manuals and an active form. You can easily access these resources online or from the program itself.

The software also includes context-sensitive helps. Not only are the included help files complete, but they open to information that corresponds with where you are in the software. For more personalized issues you can connect with a support team member over the phone or via online live chat.

Summary:

Overall, Kaspersky Anti-virus 2011 continued to deliver superb protection and security. As one of the best antivirus software, it is robust and integrates innovative technologies to defend from even the newest threats. It’s a great option for protection and PC peace of mind.

Microsoft products we hardly knew (images)


Reports have it that Microsoft is killing off its would-be iPod killer, the Zune digital music and video player. Microsoft declined to confirm the reports, though plenty are speculating that the company will keep the Zune brand and continue to produce media player software for Windows Phone 7 and the Xbox 360. If true, that would relegate the much hyped device to the dustbin of failed tech products.

And that got us thinking about other consumer products eliminated by Microsoft over the years. The software giant is hardly alone in tech flops. Apple's success with the iPad and now iPad 2 makes it easy to forget the Newton. And Sony's Betamax flop is the stuff of business school case studies.

Microsoft continues to make boatloads of money selling operating systems for computers bought by consumers. And gamers keep buying Xbox 360s and the games that get played on them. But there's a rogue's gallery of products introduced with great fanfare that have slid into oblivion. Here are a few of them.

The Ps3!

The good: More affordable $299 price; slimmer, more compact design with quieter operation; all games in high-definition; easy-to-use interface; doubles as a Blu-ray and upscaling DVD player; built-in Wi-Fi; 120GB hard drive; HDMI output with 1080p support; no external power supply; built-in Web browser; free online gaming service.

The bad: Lacks backward support for PS2 games; no infrared port means non-Bluetooth universal remotes aren't compatible; online gaming, media, and commerce options still aren't as fully developed as Xbox Live, though they're getting better.

The bottom line: With a smaller design, more energy-efficient operation, lower price tag, and built-in Blu-ray and multimedia capabilities, the PS3 Slim delivers a compelling package for an affordable price.

How Save Is Your Smartphone?

Smartphones are getting pretty clever these days but it is unlikely they will outwit the cybercriminals as fraudsters increasingly go mobile.

Last week Android Market, the shop front for applications aimed at Android smartphones, was hit by around 60 malicious apps.

It is thought that they did little real damage other than to Android's reputation, but the incident put the issue of mobile security back in the headlines.

Phones are attractive to criminals because they are essentially mini computers but with some important added extras.

"Phones also have direct access to address books, calendars as well as offering an ability to generate revenue," said Ian Fogg, an analyst with Forrester Research.

The type of personal data typically stored on a phone opens up a rich new vein for the modern fraudster's preferred crime - identity theft.

However, a more immediate income can be made from so-called rogue dialling programs - malicious bits of code capable of placing calls, unbeknown to the owner.

They are, according to Ovum analyst Graham Titterington, the "number one malware threat" to smartphones.

"Rogue dialling connects the phone automatically to a premium number that invariably belongs to a crook based in another country," he explained.

But it is not an insurmountable issue, he thinks.

"I don't understand why the mobile operators can't just cut off payments - then the problem goes away. But this type of international co-operation seems to be lacking at the moment," said Mr Titterington.

The close relationship between smartphones and location poses a risk that malicious apps will be able to track exactly where a person is at any given time.

"It could even be that it would be used to find out when someone is away from home," said Mr Fogg.

While it sounds scary, these nightmare scenarios are very far removed from the real picture, for the moment at least.

"So far there has been no major detrimental impact on consumers," points out Ben Wood, an analyst from CCS Insight."There will be a day when there is a catastrophic security lapse and then people will start taking it more seriously," he added.

Android may have hit the headlines but all smartphone operating systems have been targeted by malware of one kind or another.

To date, most iPhone security lapses have focused on offering users the power to break free from Apple's control with software that 'jailbreaks' the iPhone, a modification which enables users to run non-Apple approved software.
Continue reading the main story
TOP FIVE MOBILE MALWARES
Android - DroidDream - the most recent and most advanced piece of malware hit apps and allowed product ID and userID of phone to be transmitted to remote server
Android - Market Security Tool - the update sent to wipe rogue Android apps has already been hacked and injected with malware. Being distributed via 3rd party app stores in China.
Zeus-in-the-mobile - a trojan working with the Windows virus Zeus, affecting Symbian and Blackberry handsets and aiming to steal online banking details.
Android - Geinimi - similar to the market app attack, it took official apps, added malware and released them via Asian app markets. Could send SMSs, harvest phone data and make phone calls.
Android - ADRD - another trojan that pirated official Android apps.
Source: BullGuard

"These hacks are often reported as a good thing but from a security point of view it is a nightmare," said Mr Fogg.

Several bugs have taken advantage of jail-broken phones.

A relatively harmless iPhone worm which changed the handset's wallpaper to a picture of Rick Astley was followed a few months later with a more serious bug that targeted people using their iPhones for internet banking with Dutch online bank ING.

Blackberry handsets and Symbian phones have been targeted by a mobile version of the Zeus trojan. Victims were directed to a fake website where they are invited to download an app which then steals their banking details.

Such phishing attacks are likely to become a huge problem for smartphones, thinks Alex Vaystikh a researcher from security firm RSA.

"You can't always see the whole screen and you might be more likely to click on things you wouldn't click on a computer screen," he said.

And when mobile banking reaches a critical mass, there will be a good reason for criminals to phish from mobiles.

"There needs to be a financial incentive and that incentive isn't there right now, but consumers definitely want more service on their mobiles, like electronic wallets and banking, so the potential is huge," said Mr Vaystikh.

There are various ways to attack a mobile phone but by far the most popular is through downloadable applications.

Some experts think that Android's Marketplace is especially vulnerable because it is more open than Apple and Microsoft's systems.
Continue reading the main story

Start Quote

We are going to have to see a re-engineering of the infrastructure of how apps are delivered”
Graham Titterington
Ovum analyst

"All have restrictions and guidelines and stipulate no pornography, no viruses and no spyware," explained Phillip Dall, from mobile security firm BullGuard.

"But with the iPhone and Ovi store, apps are sent for some pretty serious testing. At Android the process is different, there are far more self-signed applications," he said.

Others think that there are other aspects to Android which make it just as secure, such as its policy of letting users know what data and resources an app will have access to, giving more savvy users the chance to spot obvious malware.

Google has said that it has no current plans to start pre-screening apps on Android Market.

It said that the recent spate of malicious applications could only access device-specific data.

The company did take the step of remotely "killing" them on all affected phones, proving, if nothing else, that it does ultimately have control over its apps.

There is also a question about how long Apple and Microsoft can continue pre-screening their applications, according to Mr Fogg.

"It is becoming an app internet as they become the primary way people go online, but the sheer volume of them makes human moderation impossible," he said.

Apple does not discuss how it tests apps but it is believed to use both human moderation and automated systems.

Mr Titterington thinks that there needs to be an industry-wide sea-change in mobile security.

"There is a need for Apple and Google to put in place a quality framework - a series of standard tests that issue apps with a health certificate," he said.

And it needs to be made less easy for users to install rogue apps.

"We are going to have to see a re-engineering of the infrastructure of how apps are delivered," he added.

"We need a more proactive approach to installing apps. It isn't going to happen in current generation of phones but maybe in the next two to three years."

iPad vs. iPad 2

How To Jailbreak an iPad

Download the redsn0w software Redsnow b4
Upgrade to iTunes 10.1 if you haven't already.
Install the iOS 4.2.1 firmware via iTunes as usual.
Run the redsn0w software executable.
Redsn0w will ask you to select your IPSW file for your current firmware. Point it to one of the following, depending on your OS:
Mac OS X: /~/Library/iTunes/iPad Software Updates (or iPhone/iPod Software Updates, as the case may be)
Windows 7 or Vista: C:\[username]\AppData\Roaming\Apple Computer\iTunes\iPad Software Updates (or iPhone/iPod Software Updates)
Windows XP: C:\Documents and Settings\[username]\Application Data\Apple Computer\iTunes\iPad Software Updates (or iPhone/iPod Software Updates)

Redsn0w should now say that the IPSW file was successfully identified. On the following screen, check "Install Cydia" then click "Next."
With the iOS device powered off and plugged into the computer, click "Next" again.
Redsn0w will now provide instructions on how to put your device into DFU mode. This is a combination of key presses, that are as follows: Hold the Power button for 1 second, then without releasing it, hold the Home button for 10 seconds. Finally, release Power but keep holding Home for 15 seconds.
One in DFU mode, the jailbreak will proceed automatically.

Compatibility notes: This jailbreak works on all devices. On iPhone 4, iPod Touch 3 and 4, iPad and iPod Touch 2 (MC model) it will be tethered. On iPhone 3G, iPhone 3GS (older bootroom), and iPod Touch 2 (older model) it's not tethered. iPhone unlockers should NOT jailbreak!

As always, please proceed with jailbreaking at your own risk. Although relatively easy, it is a form of hacking and things can go wrong, break, crash or just not work at all. Back up your iOS device before jailbreaking in case you need to restore and make sure that critical data (contacts, notes, etc.) is also safely stored elsewhere than on your PC.

And after that don't forget to install the installous in your ipad so you can obtain game or apps on your ipad here are the steps:
1)Go to Cydia.
2)Go to Source.
3)Click add.
4)type cydia.hackulo.us
5)Click add.
6)Go to the Hackulo on the screen at the cydia.
7)Click the Installous and download it.

Thx...

Why People Jailbreak iPad

Why People Jailbreak

Jailbreaking is a term that refers to a type of hack which opens up the mobile device to allow for the installation of unapproved third-party programs. It has become well known over the years as a method which provides access to pirated iPhone applications - versions of paid applications available for free download from special programs that can be installed on a jailbroken device. However, that's not the only reason that people jailbreak their iPhones and iPod Touches.

The main reason, many would argue, is not for free apps but for more apps - the kinds Apple doesn't approve of. Thanks to a highly-regulated iTunes App Store and the restrictions it imposes on developers, some of the best applications are available outside Apple's domain. Want to turn your iPhone into a modem providing Internet access to your laptop (aka "tethering")? Want to download YouTube videos for offline viewing? Want to tweak hidden settings on your phone? Transfer files with Bluetooth? Enable Flash? Skin the phone with a custom theme and icons? Run apps in the background? Filter phone calls? The list goes on and on.

And yet, while these hacks have great appeal to users of the small mobile devices, some of them will no longer be necessary on the iPad, Apple's upcoming slate computer whose launch is days away.
Why Jailbreak the iPad?

The ability to tether your iPhone to your laptop is one of the most popular reasons why people people jailbreak. However, on the iPad, you either have Wi-Fi only or you have 3G built in. Would you really need to tether your iPad to your notebook computer? Probably not. If you're carrying the iPad around, you probably left the notebook at home.

Another favorite among jailbreakers is an application called Winterboard. This theming app lets you redesign your iPhone's UI from icons to the background and even the battery icon and the "side to unlock" bar itself. On the iPad, though, users can now use any image as the iPad's background image instead of just on the lock screen as is done on the iPhone. While the iPad feature is obviously still much more limited in functionality, it will likely placate some of those who feel the need for just a tad more customization than is available on the iPhone itself.

Similarly, many of the jailbreaking apps that let you perform or tweak phone-related functions will no longer be necessary since the iPad is not a phone. Same goes for the camera apps - the iPad doesn't have one of those either. And Flash? Well, more and more sites are adopting HTML5 technology and with this, videos can be rendered plug-in free, just in time for iPad web surfers to enjoy.

So although there may end up being plenty of reasons to jailbreak the iPad, there will be - at least at launch time - far fewer reasons than on the iPad's sister devices like the iPhone and iPod Touch. But we wouldn't be surprised to see an ecosystem of rejected but still incredible and useful apps spring up over time. If there's ever an unfilled niche the iPad doesn't address, there will almost certainly be "an app for that." You just might not be able to get it at the iTunes Store.