IE9 versus Chrome: which one blocks malware better?

Social engineering has become the dominant method of distribution for fake antivirus software. And most modern browsers, with one exception, do a terrible job of dealing with this type of threat. Current builds of Chrome display a
terrible flaw that puts you at greater risk than its competitors. In my testing, a malware author was able to exploit Chrome in four easy clicks. In stark contrast, Internet Explorer 9 used some new technology to flag the exact same
sites and files as suspicious, providing unmistakable warnings that have been shown to stop 95% of these attacks in their tracks. Ed Bott’s Microsoft Report

Welcome to New MEMBER in my family

Nissan Murano 2011 – My new member – joined yesterday

Features

  • VQ35DE – 3.5-liter DOHC 24-valve V6 engine Horsepower – 260 hp @ 6,000 rpm Torque – 240 lb-ft @ 4,400 rpm
  • Continuously Variable Valve Timing Control System (CVTCS) on intake valves
  • Nissan Direct Ignition System
  • Double-tipped iridium spark plugs
  • Electronic drive-by-wire throttle
  • Xtronic CVT® (Continuously Variable Transmission)
  • Electronic Brake force Distribution (EBD)
  • Nissan Hard Drive Navigation System with 7.0″VGA touch-screen monitor and voice recognition
  • Streaming audio via Bluetooth® wireless technology
  • AM/FM/in-dash 6-CD changer audio system
  • Digital Bose® audio system with AM/FM/CD 9 Speakers plus dual subwoofers
  • XM® Satellite Radio
  • MP3/WMA CD playback capability
  • Auxiliary audio input jack
  • USB connection port for iPod® interface and other compatible devices
  • Streaming audio via Bluetooth® wireless technology
  • Radio Data System (RDS)
  • Speed-sensitive volume
  • Illuminated steering-wheel-mounted audio controls

Still enjoying the ride…!!!!!

Good bye my dear Nissan Murano 2005

Its time to say a very good bye to my Nissan Murano 2005, after 6 years of sharing and caring.

Thank you so much for your caring

Websites under attack – Lizamoon Scareware

Scareware programme affected hundreds of thousands of websites, asked victims to download fake anti-virus software. Compromised sites were mostly small to mid-tier websites, some of which included astronomy groups, hospitals, social clubs, funeral homes and sports teams…Read more

This LizaMoon has also affected some websites related to Apple iTunes platform, but Apple iTunes is protected against these threats so there is no risk of your computer becoming infected if you use iTunes.

Microsoft has released this statement regarding the recent LizaMoon attack on computers.

“Microsoft is aware of reports of an ongoing SQL injection attack. Our investigation has determined these sites were exploited using a vulnerability in certain third-party content management systems. This is not a Microsoft vulnerability.” …read more

Security exports are categorizing  Liza Moon as a SQL injection attack in which web applications that are vulnerable are exploited in order to inject a wrong code into an affected website.

To guard against any type of attack on your computer like the one going on right now with LizaMoon, just do not download any suspect files into your computer.

Update on LizaMoon mass-injection and Q&A

Excellent Windows Phone 7 Development Tutorials

Here are 30+ cool Windows Phone Development articles for all developers interested in developing applications or games for the new Windows Phone 7 Platform. These tutorials covers the Windows Phone 7 Overview, the Developer and the Windows Phone 7 Marketplace, How to become a developer, Setting up your system, Intro to creating Windows Phone applications and many more.

To know more, click here

Enjoy!

Behind the Scenes in Japan, Windows Azure MVPs Help Drive Vital Communications

MVPs in Japan are among those working to shore up emergency communications on the heels of the Tohoku Earthquake and Tsunami. Please read this link, or pass on this link

Microsoft Security Update Guide, Second Edition

This Second Edition of the Microsoft Security Update Guide includes additional content describing how Microsoft tests security updates before they are released, revised advice and guidance on testing updates in your own environment, and an expanded and updated resources section. The Guide is organized according to the following stages of the security update process: Stage 1, Receive Microsoft Security Release Communications; Stage 2, Evaluate Risk; Stage 3, Evaluate Mitigation; Stage 4, Standard or Urgent Update Deployment Timeline; Stage 5, Monitor Systems, and; Ongoing Stage, Watch. To download this, Click here

Microsoft Volume Licensing Reference Guide

Software acquired through Microsoft Volume Licensing is a software license only that gives users the right to run a Microsoft software product. Customers can save above retail boxed software prices when they participate in a Microsoft Volume Licensing program. By acquiring software licenses through Volume Licensing, you pay for only the software license and not for additional materials. With some Microsoft Volume Licensing programs, you can also purchase Microsoft Software Assurance for Volume Licensing. This single, cost-effective program can help boost organizational productivity with 24 hours a day, seven days a week (24×7) support, deployment planning services, end-user and technical training, and the latest Microsoft software releases and unique technologies.

When you acquire software through a Microsoft Volume Licensing program, you can choose to acquire media (or supplemental media), documentation, and product support separately via download or physical media as needed. This guide is an overview of the key features of Microsoft Volume Licensing programs. The information is presented by organizational type and size—two of the most important keys to determining your best Volume Licensing option. In addition to traditional on-premise software licenses, Microsoft offers subscriptions to cloud services through the Microsoft Online Services Program (MOSP). How you add cloud services through your Volume Licensing agreement, download this reference guide and will help you.

The key chapters by organizational type are:

  • Commercial Business
  • Academic
  • Government
  • Charity
  • Software and Service Partners

To download the Microsoft Volume Licensing Reference Guide for a comprehensive review of each program, please click here .. The Microsoft Volume Licensing Reference Guide provides comprehensive guidance to help you select the best options for the size, type, and business needs of your organization. This 79-page document details each of the Microsoft Volume Licensing programs in addition to covering the basics of product licensing and Microsoft Software Assurance. Each chapter includes case studies, tips, and next steps to assist you with the decision-making process. An excellent resource for those who want an in-depth look at Microsoft Volume Licensing and the ability to easily compare programs.

Thanks to Microsoft for releasing this document, in order to understand the licensing program.

The Evils of Social Engineering

A good article from my friend Saurabh Mudgal. All of you should read this and this

Enjoy!!!