<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-6047519856100305697</id><updated>2024-10-24T10:54:46.290+03:00</updated><category term="Security Term"/><category term="Security News"/><category term="Giveaway"/><category term="Hacking News"/><category term="PCAnywhere"/><category term="symantec"/><category term="Security Articles"/><category term="Security Tips and Tricks"/><category term="YamaTough"/><category term="firewall"/><category term="ransomware"/><category term="File Transfer"/><category term="Megaupload"/><category term="Microsoft"/><category term="Norton Antivirus"/><category term="System Tuning"/><category term="Tuneup Utilities"/><category term="botnet"/><category term="data breach"/><category term="hacker"/><category term="malwarebytes"/><category term="security bulletin"/><category term="winners"/><category term="worm"/><category term="2013"/><category term="AV Reviews and Tests"/><category term="AV-Comparatives"/><category term="Android"/><category term="Beta"/><category term="BetterAtSecurity"/><category term="DDoS"/><category term="DomainKeys Identified Mail"/><category term="Dreamhost hacked"/><category term="Freedom"/><category term="Gator"/><category term="Glary Utilities Pro"/><category term="HTTPS Everywhere"/><category term="HiddenFilesFraud"/><category term="Internet Banking"/><category term="Kaspersky Internet Security"/><category term="Kaspersky Lab"/><category term="Kelihos"/><category term="Mark Zuckerberg"/><category term="Norton DNS"/><category term="Proxy Server"/><category term="RoboForm Everywhere"/><category term="Rootkit"/><category term="SQL Injection"/><category term="Secunia PSI"/><category term="Security Downloads"/><category term="SonicWall"/><category term="Titanium AntiVirus Plus"/><category term="Verisign"/><category term="Webroot"/><category term="XSS"/><category term="activeX"/><category term="adobe flash player"/><category term="adware"/><category term="behavior analysis"/><category term="black hat"/><category term="blended threat"/><category term="bot"/><category term="buffer overflow"/><category term="bug"/><category term="computer virus"/><category term="conficker"/><category term="cookie"/><category term="cracker"/><category term="cross-site scripting"/><category term="defragmentation"/><category term="dialer"/><category term="exploit"/><category term="faster pc"/><category term="fragmentation"/><category term="google"/><category term="hijacker"/><category term="hijackware"/><category term="honeypot"/><category term="keylogger"/><category term="macro virus"/><category term="malware"/><category term="malware analysis"/><category term="malware creators"/><category term="mobile phones"/><category term="monthly update"/><category term="mousetrapping"/><category term="online virus scan"/><category term="password cracker"/><category term="patch"/><category term="patches"/><category term="phishing"/><category term="privacy policy"/><category term="sandbox"/><category term="scam"/><category term="server"/><category term="smartphones security"/><category term="spam"/><category term="spyware"/><category term="storm"/><category term="svchost.exe"/><category term="toolbars"/><category term="trojan horse"/><category term="update checker"/><category term="virus"/><category term="virus hoaxes"/><category term="virustotal"/><category term="white hat"/><category term="windows"/><category term="zappos"/><category term="zero-day exploit"/><category term="zombie computer"/><title type='text'>Better at Security</title><subtitle type='html'>A blog covering computer and internet security: including information about security terms, offering the latest security trends and up-to-date news about worms, viruses, trojans, adware and other internet threats. Plus security tips and recommendations to help you secure and protect your system from harm.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>ipucudefterim</name><uri>http://www.blogger.com/profile/12673792990776195983</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>91</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-3450146065080601564</id><published>2012-05-15T11:02:00.000+03:00</published><updated>2012-05-15T11:02:19.457+03:00</updated><title type='text'>I&#39;m back, ready to blog</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;Dear readers;&lt;br /&gt;
&lt;span lang=&quot;TR&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Cause of my intensive business, &lt;/span&gt;&lt;span style=&quot;font-family: Calibri; font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Calibri; font-size: small;&quot;&gt;&lt;span lang=&quot;EN&quot;&gt;I  stop blogging&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span lang=&quot;TR&quot;&gt; without telling anyone. I love the blog... Now, I want you to know I come back to blog. I might not updating this blog regularly but I&#39;m always putting new shares in this blog almost every month.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Thank you all, my dear friends, for the wonderful comments! Thank you for your concern, care, and attention...&lt;br /&gt;
&lt;br /&gt;
Enjoy my blog and don’t forget to comment after you read. ;)&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/3450146065080601564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/05/im-back-ready-to-blog.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3450146065080601564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3450146065080601564'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/05/im-back-ready-to-blog.html' title='I&#39;m back, ready to blog'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-6828911064382020159</id><published>2012-03-21T13:12:00.000+02:00</published><updated>2012-03-21T13:12:24.953+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="defragmentation"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is disk defragmentation? - Security Term</title><content type='html'>Disk defragmentation describes the process of consolidating fragmented files on your computer&amp;#39;s hard disk. &lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/what-is-disk-defragmentation-security.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/6828911064382020159/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-disk-defragmentation-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6828911064382020159'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6828911064382020159'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-disk-defragmentation-security.html' title='What is disk defragmentation? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-988580512240507320</id><published>2012-03-20T12:07:00.000+02:00</published><updated>2012-03-20T12:07:37.027+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="fragmentation"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is fragmentation? - Security Term</title><content type='html'>&lt;strong&gt;&lt;span style=&quot;font-size: large;&quot;&gt;(1)&lt;/span&gt;&lt;/strong&gt; Refers to the condition of a disk in which files are divided into pieces scattered around the disk. Fragmentation occurs naturally when you use a disk frequently, creating, deleting, and modifying files. At some point, the operating system needs to store parts of a file in noncontiguous clusters. This is entirely invisible to users, but it can slow down the speed at which data is accessed because the disk drive must search through different parts of the disk to put together a single file.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/what-is-fragmentation-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/988580512240507320/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-fragmentation-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/988580512240507320'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/988580512240507320'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-fragmentation-security-term.html' title='What is fragmentation? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-3308418171772310883</id><published>2012-03-18T20:47:00.000+02:00</published><updated>2012-03-18T20:47:53.260+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="RoboForm Everywhere"/><title type='text'>RoboForm Everywhere 6 Month License</title><content type='html'>&lt;div style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;RoboForm Everywhere&quot; border=&quot;0&quot; src=&quot;http://img696.imageshack.us/img696/9505/roboformeverywherebette.jpg&quot; title=&quot;RoboForm Everywhere 6 Month License&quot;&gt;&lt;/div&gt;&lt;br&gt;
&lt;span lang=&quot;EN&quot;&gt;Manage and Sync Passwords Across All Devices&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: Calibri; font-size: small;&quot;&gt;&lt;span style=&quot;font-family: Calibri; font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span lang=&quot;EN&quot;&gt;&lt;br&gt;
How many logins is your brain struggling to juggle at any given moment? Five? Ten? Twenty? Between your email accounts, banking sites, credit card sites, and more, it&amp;#39;s not difficult to envision having a dozen or more different secure logins to manage. Short of writing your passwords down and compromising your security, what can you do? For starters, you can get a copy of today&amp;#39;s discount software promotion - RoboForm Everywhere!&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/roboform-everywhere-6-month-license.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/3308418171772310883/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/roboform-everywhere-6-month-license.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3308418171772310883'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3308418171772310883'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/roboform-everywhere-6-month-license.html' title='RoboForm Everywhere 6 Month License'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-681275790371856005</id><published>2012-03-16T00:58:00.000+02:00</published><updated>2012-03-16T00:58:42.827+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Proxy Server"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is Proxy Server? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;I&lt;/strong&gt;&lt;/span&gt;n an enterprise that uses the Internet, a proxy server is a server that acts as an intermediary between a workstation user and the Internet so that the enterprise can ensure security, administrative control, and caching service. A proxy server is associated with or part of a gateway server that separates the enterprise network from the outside network and a firewall server that protects the enterprise network from outside intrusion.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/what-is-proxy-server-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/681275790371856005/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-proxy-server-security-term.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/681275790371856005'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/681275790371856005'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-proxy-server-security-term.html' title='What is Proxy Server? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-4569563165962257180</id><published>2012-03-15T02:18:00.002+02:00</published><updated>2012-03-15T02:42:37.032+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="2013"/><category scheme="http://www.blogger.com/atom/ns#" term="Beta"/><category scheme="http://www.blogger.com/atom/ns#" term="Kaspersky Internet Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Downloads"/><title type='text'>Kaspersky Internet Security 2013 Beta [download now]</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img18.imageshack.us/img18/3532/kasperskyinternetsecurim.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; title=&quot;Kaspersky Internet Security 2013&quot; alt=&quot;Kaspersky Internet Security 2013 Beta &quot; src=&quot;http://img18.imageshack.us/img18/3532/kasperskyinternetsecurim.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;K&lt;/strong&gt;&lt;/span&gt;aspersky Lab is the clear victor, as today they’ve released the first beta of Kaspersky Internet Security 2013.&lt;br&gt;
&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;Stay ahead of the threats with Kaspersky Internet Security 2013.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/kaspersky-internet-security-2013-beta.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/4569563165962257180/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/kaspersky-internet-security-2013-beta.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4569563165962257180'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4569563165962257180'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/kaspersky-internet-security-2013-beta.html' title='Kaspersky Internet Security 2013 Beta [download now]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-8551349163648629231</id><published>2012-03-13T14:34:00.000+02:00</published><updated>2012-03-13T14:34:41.989+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><category scheme="http://www.blogger.com/atom/ns#" term="server"/><title type='text'>What is Server? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;1)&lt;/strong&gt;&lt;/span&gt; In information technology, a server is a computer program that provides services to other computer programs (and their users) in the same or other computers.&lt;br&gt;
&lt;br&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;2)&lt;/strong&gt;&lt;/span&gt; The computer that a server program runs in is also frequently referred to as a server (though it may be used for other purposes as well).&lt;br&gt;
&lt;br&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;strong&gt;3)&lt;/strong&gt;&lt;/span&gt; In the client/server programming model, a server is a program that awaits and fulfills requests from client programs in the same or other computers. A given application in a computer may function as a client with requests for services from other programs and also as a server of requests from other programs.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/what-is-server-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/8551349163648629231/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-server-security-term.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8551349163648629231'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8551349163648629231'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/what-is-server-security-term.html' title='What is Server? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-5210552310761411983</id><published>2012-03-09T23:05:00.000+02:00</published><updated>2012-03-09T23:05:12.900+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="security bulletin"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Microsoft Security Bulletin Releases Advance Notification for March Security</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;Microsoft has issued a &lt;a href=&quot;http://technet.microsoft.com/en-us/security/bulletin/ms12-mar&quot;&gt;Security Bulletin Advance Notification&lt;/a&gt; indicating that the March release cycle will contain six bulletins, one of which will have a severity rating of Critical. The notification states that this Critical bulletin is for Microsoft Windows. There will also be four important bulletins for Microsoft Windows, Visual Studio, and Expression Design. Release of these bulletins is scheduled for Tuesday, March 13, 2012.&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;source and the full story at &lt;a href=&quot;http://technet.microsoft.com/en-us/security/bulletin/ms12-mar&quot;&gt;technet.microsoft.com&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/5210552310761411983/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/microsoft-security-bulletin-releases.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5210552310761411983'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5210552310761411983'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/microsoft-security-bulletin-releases.html' title='Microsoft Security Bulletin Releases Advance Notification for March Security'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-7008447071344195845</id><published>2012-03-08T13:28:00.000+02:00</published><updated>2012-03-08T13:28:09.601+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HiddenFilesFraud"/><category scheme="http://www.blogger.com/atom/ns#" term="ransomware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Scareware Demands Ransom After Making Files and Folders Invisible</title><content type='html'>Scareware or &lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/01/what-is-ransomware-security-term.html&quot;&gt;ransomware&lt;/a&gt; is not uncommon, many security solutions providers releasing advisories on how to handle threats which pose as law enforcement agencies that demand the payment of fines, accusing the user of copyright infringement.&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/scareware-demands-ransom-after-making.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/7008447071344195845/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/scareware-demands-ransom-after-making.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/7008447071344195845'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/7008447071344195845'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/scareware-demands-ransom-after-making.html' title='Scareware Demands Ransom After Making Files and Folders Invisible'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-5730823900684184412</id><published>2012-03-07T18:33:00.001+02:00</published><updated>2012-03-07T18:56:31.236+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="adobe flash player"/><category scheme="http://www.blogger.com/atom/ns#" term="security bulletin"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>Adobe Releases Security Update for Adobe Flash Player</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img254.imageshack.us/img254/3308/adobeflashplayerbatsec.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; title=&quot;Adobe Releases Security Update for Adobe Flash Player&quot; alt=&quot;Adobe Flash Player&quot; src=&quot;http://img254.imageshack.us/img254/3308/adobeflashplayerbatsec.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;Adobe has released a security bulletin for Adobe Flash Player to address multiple vulnerabilities affecting the following software versions:&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/03/adobe-releases-security-update-for.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/5730823900684184412/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/adobe-releases-security-update-for.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5730823900684184412'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5730823900684184412'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/03/adobe-releases-security-update-for.html' title='Adobe Releases Security Update for Adobe Flash Player'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-3360457314955900003</id><published>2012-02-29T02:31:00.000+02:00</published><updated>2012-02-29T02:31:52.096+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="HTTPS Everywhere"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><title type='text'>HTTPS Everywhere Update: Decentralized SSL Observatory</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img844.imageshack.us/img844/1620/httpseverywherebetterat.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; title=&quot;HTTPS Everywhere&quot; alt=&quot;Decentralized SSL Observatory&quot; src=&quot;http://img844.imageshack.us/img844/1620/httpseverywherebetterat.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;The new optional feature, called the &amp;quot;Decentralized SSL Observatory,&amp;quot; detects encryption weaknesses in websites and notifies users about said weaknesses. Such weaknesses can be used by hackers to snoop on users&amp;#39; web activity or pose &amp;quot;man in the middle&amp;quot; attacks against the browser.&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;br&gt;
&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/https-everywhere-update-decentralized.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/3360457314955900003/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/https-everywhere-update-decentralized.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3360457314955900003'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/3360457314955900003'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/https-everywhere-update-decentralized.html' title='HTTPS Everywhere Update: Decentralized SSL Observatory'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-757241273473531311</id><published>2012-02-27T11:53:00.001+02:00</published><updated>2012-02-27T23:30:36.003+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Freedom"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="Verisign"/><category scheme="http://www.blogger.com/atom/ns#" term="XSS"/><title type='text'>XSS security holes Found in “Verisign Trusted” Online Stores</title><content type='html'>The worrying thing is that all of the sites bare Verisign Trusted, Internet Shopping is Safe, Internet Delivery is Safe, Verified by Visa, and MasterCard SecureCode logos.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/xss-security-holes-found-in-verisign.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/757241273473531311/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/xss-security-holes-found-in-verisign.html#comment-form' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/757241273473531311'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/757241273473531311'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/xss-security-holes-found-in-verisign.html' title='XSS security holes Found in “Verisign Trusted” Online Stores'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-428711843504173861</id><published>2012-02-24T12:03:00.000+02:00</published><updated>2012-02-24T12:03:12.775+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="firewall"/><category scheme="http://www.blogger.com/atom/ns#" term="Kaspersky Lab"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="SonicWall"/><title type='text'>SonicWall integrates Kaspersky into firewalls</title><content type='html'>SonicWALL, Inc., the leading provider of intelligent network security and data protection solutions, today announced it has expanded its suite of firewall security services with the addition of Kaspersky Anti-Virus to its Enforced Client Anti-Virus and Anti-Spyware solution. SonicWALL® Firewalls ensure easy deployment, provisioning and enforcement of the client on endpoint devices through a unique policy-driven engine.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/sonicwall-integrates-kaspersky-into.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/428711843504173861/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/sonicwall-integrates-kaspersky-into.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/428711843504173861'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/428711843504173861'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/sonicwall-integrates-kaspersky-into.html' title='SonicWall integrates Kaspersky into firewalls'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-8715210756248150755</id><published>2012-02-23T02:21:00.000+02:00</published><updated>2012-02-23T02:21:57.951+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><category scheme="http://www.blogger.com/atom/ns#" term="storm"/><title type='text'>What is Storm? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;The&lt;/span&gt; &lt;b&gt;Storm Botnet&lt;/b&gt; is a distributed computer network consisting of computers remotely controlled without their owner&amp;#39;s knowledge. Computers in the Storm Botnet are home and small office machines running the Microsoft Windows operating system which have been infected by the Storm worm. Storm got it&amp;#39;s name as the worm was first spread though spam email with the subject &amp;quot;230 dead as storm batters Europe.&amp;quot; Today, the Storm Botnet is considered to be the largest botnet in the world, with as many as 5 million computers under it&amp;#39;s control. Efforts to combat Storm have been met with targeted resistance, suggesting that artificial intelligence and automated adaptive defense techniques are being utilized.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-storm-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/8715210756248150755/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-storm-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8715210756248150755'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8715210756248150755'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-storm-security-term.html' title='What is Storm? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-6705776995890703028</id><published>2012-02-22T01:01:00.000+02:00</published><updated>2012-02-22T01:01:45.991+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="data breach"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is data breach? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;A&lt;/span&gt; &lt;b&gt;data breach&lt;/b&gt; is an incident in which sensitive, protected or confidential data has potentially been viewed, stolen or used by an individual unauthorized to do so. Data breaches may involve personal health information (PHI), personally identifiable information (PII), trade secrets or intellectual property.&lt;br&gt;
The most common concept of a data breach is an attacker hacking into a corporate network to steal sensitive data. However, not all data breaches are so dramatic. If an unauthorized hospital employee views a patient&amp;#39;s health information on a computer screen over the shoulder of an authorized employee, that also constitutes a data breach.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-data-breach-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/6705776995890703028/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-data-breach-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6705776995890703028'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6705776995890703028'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-data-breach-security-term.html' title='What is data breach? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-5379139563089208874</id><published>2012-02-21T01:42:00.000+02:00</published><updated>2012-02-21T01:42:10.749+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="hijackware"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is browser hijacker (hijackware)? - Security Term</title><content type='html'>A browser hijacker (sometimes called hijackware) is a type of malware program that alters your computer&amp;#39;s browser settings so that you are redirected to Web sites that you had no intention of visiting. Most browser hijackers alter default home pages and search pages to those of their customers, who pay for that service because of the traffic it generates.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-browser-hijacker-hijackware.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/5379139563089208874/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-browser-hijacker-hijackware.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5379139563089208874'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/5379139563089208874'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-browser-hijacker-hijackware.html' title='What is browser hijacker (hijackware)? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-6837554995887495947</id><published>2012-02-20T20:49:00.000+02:00</published><updated>2012-02-20T20:49:20.088+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="Tuneup Utilities"/><category scheme="http://www.blogger.com/atom/ns#" term="winners"/><title type='text'>Tuneup Utilities 2012 Contest Winners Announcement</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Hi&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Here I am happy to announce 5 Genuine License giveaway of Tuneup Utilities 2012 for the readers of my blog. Now, it is the time for me to announce the winners.&lt;br&gt;
&lt;br&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;/div&gt;&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-contest-winners.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/6837554995887495947/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-contest-winners.html#comment-form' title='5 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6837554995887495947'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6837554995887495947'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-contest-winners.html' title='Tuneup Utilities 2012 Contest Winners Announcement'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>5</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-7846770629578393286</id><published>2012-02-20T00:55:00.000+02:00</published><updated>2012-02-20T00:55:34.010+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><category scheme="http://www.blogger.com/atom/ns#" term="svchost.exe"/><title type='text'>What is svchost.exe? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;What is the svchost.exe file? Why do I have multiple svchost.exe processes running in Task Manager? Is svchost.exe a virus or trojan? These are the most frequently asked questions about this process.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt; &lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-svchostexe-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/7846770629578393286/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-svchostexe-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/7846770629578393286'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/7846770629578393286'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-svchostexe-security-term.html' title='What is svchost.exe? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-6542074090691284685</id><published>2012-02-18T21:36:00.000+02:00</published><updated>2012-02-18T21:36:45.145+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><category scheme="http://www.blogger.com/atom/ns#" term="SQL Injection"/><title type='text'>What is SQL Injection? - Security Term</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;SQL&lt;/span&gt; injection&lt;/b&gt; is a type of computer security exploit in which an attacker can gain access to remote database systems. Using a carefully-constructed value for a form field, such as a name or email address, an attacker can fool the application into requesting data from a database which he would otherwise not have access to. SQL injection attacks are similar to XSS attacks in that the attacker is exploiting an application&amp;#39;s regular input vectors. Also in common with XSS attacks, SQL injection attacks can be prevented by simple input filtering and validation before the data is passed on for storage or processing.&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-sql-injection-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/6542074090691284685/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-sql-injection-security-term.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6542074090691284685'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/6542074090691284685'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-sql-injection-security-term.html' title='What is SQL Injection? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-4385376796716863864</id><published>2012-02-17T00:53:00.000+02:00</published><updated>2012-02-17T00:53:26.002+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><category scheme="http://www.blogger.com/atom/ns#" term="spam"/><title type='text'>What is spam? - Security Term</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;S&lt;/span&gt;pam&lt;/b&gt; refers to both the process of sending unsolicited messages via the Internet, and to the messages themselves. However, the term &amp;quot;unsolicited messages&amp;quot; is open to debate, and as such what is considered spam varies widely. In the strictest sense, spam is any email advertisement, other than those specifically requested by the receiver. However, even this strict definition is debatable, as very often EULA&amp;#39;s and service agreements contain clauses for the sending of advertisements. And few users read all twelve pages of every EULA that they accept.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-spam-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/4385376796716863864/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-spam-security-term.html#comment-form' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4385376796716863864'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4385376796716863864'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-spam-security-term.html' title='What is spam? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>2</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-8149131721980023287</id><published>2012-02-14T22:45:00.001+02:00</published><updated>2012-02-14T23:00:32.853+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Microsoft"/><category scheme="http://www.blogger.com/atom/ns#" term="monthly update"/><category scheme="http://www.blogger.com/atom/ns#" term="patches"/><category scheme="http://www.blogger.com/atom/ns#" term="Security News"/><category scheme="http://www.blogger.com/atom/ns#" term="windows"/><title type='text'>Microsoft Has Released 9 Security Bulletins</title><content type='html'>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img689.imageshack.us/img689/5684/microsoftbetteratsecuri.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://img689.imageshack.us/img689/5684/microsoftbetteratsecuri.png&quot;&gt;&lt;/a&gt;&lt;/div&gt;Today, Microsoft has  made available its Monthly security patches for the Windows platform and various other products on it .&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
The bulletins address vulnerabilities in Microsoft Windows and Microsoft Developer Tools And Software.  Most updates will require a restart to complete the installation.&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/microsoft-has-released-9-security.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/8149131721980023287/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/microsoft-has-released-9-security.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8149131721980023287'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8149131721980023287'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/microsoft-has-released-9-security.html' title='Microsoft Has Released 9 Security Bulletins'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-4206024395046743884</id><published>2012-02-13T02:13:00.005+02:00</published><updated>2012-02-20T21:04:12.072+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Giveaway"/><category scheme="http://www.blogger.com/atom/ns#" term="Tuneup Utilities"/><title type='text'>Betteratsecurity.blogspot.com Giveaway:Tuneup Utilities 2012 - 5 License [GIVEAWAY OVER]</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;About Tuneup Utilities&lt;/span&gt;&lt;/b&gt;&lt;br&gt;
&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://img221.imageshack.us/img221/1954/tuneuputilities2012bettpbc.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://img221.imageshack.us/img221/1954/tuneuputilities2012bettpbc.png&quot;&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;br&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;b&gt;The Most Powerful TuneUp Utilities of All Time!&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both;&quot;&gt;&lt;/div&gt;&lt;ul&gt;&lt;li&gt;Boosts PC speed by up to 50%, all thanks to Program Deactivator™ 2012&lt;/li&gt;
&lt;li&gt;Extends battery life with an all-new TuneUp Economy Mode&lt;/li&gt;
&lt;li&gt;Saves power by up to 30% and upgrades PCs with an enhanced power management&lt;/li&gt;
&lt;li&gt;Over 30 tools in 1: more speed, better stability, less problems&lt;/li&gt;
&lt;/ul&gt;&lt;br&gt;
&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-5-license.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/4206024395046743884/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-5-license.html#comment-form' title='65 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4206024395046743884'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/4206024395046743884'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/tuneup-utilities-2012-5-license.html' title='Betteratsecurity.blogspot.com Giveaway:Tuneup Utilities 2012 - 5 License [GIVEAWAY OVER]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>65</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-569467245470855473</id><published>2012-02-13T02:05:00.000+02:00</published><updated>2012-02-13T02:05:29.480+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Rootkit"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is a Rootkit? - Security Term</title><content type='html'>&lt;span style=&quot;font-size: large;&quot;&gt;A&lt;/span&gt; &lt;b&gt;rootkit&lt;/b&gt; is a type of computer program that hides its presence from the administrator of the machine. Usually installed as malware, rootkits are very difficult to detect and remove because they erase all evidence of their presence. Often, the only visible symptoms of a rootkit may be an unexplainably busy CPU or unusual network traffic. With today&amp;#39;s high-speed CPU&amp;#39;s and high bandwidth network connections, rootkits are almost impossible to identify. Typically, rootkits are used to cloak keyloggers and other spyware, distribute spam, or to provide privileged access to an unauthorised entity. The term is named for the Unix privileged user account, root, although today rootkits are available for most major operating systems including Linux, Mac OS-X, and Microsoft Windows.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-rootkit-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/569467245470855473/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-rootkit-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/569467245470855473'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/569467245470855473'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-rootkit-security-term.html' title='What is a Rootkit? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-2940488028455495056</id><published>2012-02-12T00:54:00.000+02:00</published><updated>2012-02-12T00:54:43.213+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Gator"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is Gator? - Security Term</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;G&lt;/span&gt;ator&lt;/b&gt; was a computer program by Claria Corporation. Notorious as one of the first widespread spyware applications, Gator had inadvertently created a revolution in consumer backlash against irresponsible computer program design and malware proliferation. While various computer security vulnerabilities, such as viruses, had been familiar to security experts for years, Gator was the first program to cause widespread concern among nontechnical home computer users. Although most installations of Gator were performed with full disclosure regarding the nature of the program, many users who did not read it&amp;#39;s EULA were unaware of the program&amp;#39;s activity. While this fact had saved Claria Corporation from several lawsuits, unfortunately it had not stimulated an increase in consumer awareness regarding the need to read EULAs and to understand them. Additionally, Gator could not be removed via standard software removal procedures.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-gator-security-term.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/2940488028455495056/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-gator-security-term.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/2940488028455495056'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/2940488028455495056'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-gator-security-term.html' title='What is Gator? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-6047519856100305697.post-8330339872946354821</id><published>2012-02-11T00:44:00.000+02:00</published><updated>2012-02-11T00:44:43.175+02:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="DomainKeys Identified Mail"/><category scheme="http://www.blogger.com/atom/ns#" term="Security Term"/><title type='text'>What is DomainKeys Identified Mail? - Security Term</title><content type='html'>&lt;b&gt;&lt;span style=&quot;font-size: large;&quot;&gt;D&lt;/span&gt;omainKeys Identified Mail&lt;/b&gt; is a an email authentication method designed to control spam and phishing. Developed by Yahoo, DKIM is now endorsed by major Internet and email related organizations such as the PGP Corporation, Cisco Systems, and the developers of Sendmail. While other competing email authentication methods have been proposed, such as SenderID and Sender Policy Framework, only DomainKeys Identified Mail is being evaluated as a possible Internet Engineering Task Force standard. Currently, several large email service providers such as Yahoo, Gmail, and AOL utilize DKIM technology in emails sent from their systems.&lt;br&gt;
&lt;br&gt;
&lt;a href=&quot;http://betteratsecurity.blogspot.com/2012/02/what-is-domainkeys-identified-mail.html#more&quot;&gt;Continue Reading »»»&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://betteratsecurity.blogspot.com/feeds/8330339872946354821/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-domainkeys-identified-mail.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8330339872946354821'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/6047519856100305697/posts/default/8330339872946354821'/><link rel='alternate' type='text/html' href='http://betteratsecurity.blogspot.com/2012/02/what-is-domainkeys-identified-mail.html' title='What is DomainKeys Identified Mail? - Security Term'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>