Speak ASIA: BUSTED Here is proof ?

The company name is: SpeakAsia Online Pte Ltd.formerly known as : Haren Technology Pte. Ltd.formerly known as: PAN Automotives Pte. Ltd.(Compliance rating for this company is Non Compliant currently)Prior to this name they were operating under:  HAREN VENTURES PTE. LTD. f.k.a HAREN AUTO PARTS PTE. LTD. f.k.a HAREN MULTICONSULT TRADE SERVICES PTE. LTD. Source: www.psi.gov.sg I asked one of my CA friend that how frequently a company change...

 Working on orkut security, I know that fraudulent sites sometimes try to take advantage of orkut users like you and me. To help make sure that everyone is able to have a fun and safe experience on the site, I thought I'd share a few quick tips that I've picked up during my time on the orkut team. A bunch of these might seem like no-brainers, but hopefully you'll learn something new here as well:Create a tough password: While "yourname123"...

Orkut Virus(BOM SABADO)

 Now a days orkut became a soft target of hackers and virus(like BOM SABADO) this is because orkut has huge network where he(virus(BOM SABADO),hackers) can spread easily.One more thing why orkut,this is because orkut members belongs to each section of society like professionals and non-professionals,young guys and child(from 8 to15).business man and technical expert behined this lot of guys dont know how set security and privacy on profile,some guys yet dint know why  they will set security level,they came on orkut for enjoyment...

Orkut Auto Scrap Virus Security

Orkut is getting targeted by a new Brazilian scrap virus, the virus infects users on clicking of the scrap message claiming to show some kind of video but it contain some exe file wich will be install  in your system on click.So Please dont Click simply delete this scrap.If you have clicked by mistake please follow following steps and uninstall this exe This virus that claimes to be a video is a .exe file which infects users computer and sends...

How to Get Rid of a Computer Virus

Computer viruses come in many forms and can cause various kinds of damage to your system. Fortunately, most viruses are easily dealt with and effective methods for eliminating them are often developed as soon as the viruses are discovered. If you think your computer may be infected, take any necessary steps to clear your system and avoid infecting other computers. Instructions 1.Visit your virus-scan software manufacturer's Web site and install any virus updates that are available. Then run the software. The software may not be able to delete the...

Mobile Physical Security: How Anti-theft Software Works- part II

Here is the another list of mobile physical security providers.  we had tried our best to provide the whole common list if any suggestion please post in comments  OVI Suite. The world's largest mobile phone maker company NOKIA Corporation also provide online data backup through its OVI suite. Through OVI synchronisation you can upload your contacts data in Nokia Server. To store your datain Nokia server you need to make a free OVI account...

Denial Of Service (DoS) Attacks

A denial of service (DoS) attack is an attack that clogs up so much memory on the target system that it can not serve it's users, or it causes the target system to crash, reboot, or otherwise deny services to legitimate users.There are several different kinds of dos attacks as discussed below:- 1) Ping Of Death :- The ping of death attack sends oversized ICMP datagrams (encapsulated in IP packets) to the victim.The Ping command makes use of the...

How Computer Viruses / Malware Attack?

Computer users are facing all sorts of security threats these days, computer viruses, computer worms, hackers, phishing, spyware.  Almost every computer is challenged by more than one type of malicious attack each day.  Knowing how these malicious programs spread and work can help you avoid potential damage to your computer. How Malware Attack Computer viruses, worms, and Trojan horses are collectively known as malware.  They spread on the internet via email, instant messages and file sharing.  Computer viruses need a host...

How to remove a computer virus and spyware.

Symptoms that may be the result of ordinary Windows functionsA computer virus infection may cause the following problems:     * Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.     * Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.     * The computer sometimes starts as expected. However, at other times, the computer...

Symptoms of a computer virus

A computer virus infection may cause the following problems:     * Windows does not start even though you have not made any system changes or even though you have not installed or removed any programs.     * Windows does not start because certain important system files are missing. Additionally, you receive an error message that lists the missing files.     * The computer sometimes starts as expected. However, at other times, the computer stops responding before the desktop icons and the taskbar appear.    ...

Mobile Physical Security: How Anti-theft Software Works

Mobile Physical Security In the presence of google and facebook , iphones and mobiles became more important component of life as these things are now widely accessed  by these gadgets. As its importance increased, mobile security concerns also increased and the people are more searching for better security products. They are using antiviruses and antispyware for the software security but the physical security is also importance because your...

Cross site scripting

Cross site script is most common web attack.it basically attacks on application layer of web. .its basically hits html and javascipt.   cross site scripting arises when web application take data from form of site and include in it web page without properly validating the data.XSS vulnerabilities allow an attackers to execute arbitrary commands and display arbitrary content in a victim users browsers. when XSS attacks became a successful attack it take control of victim browser or victim web application.  the potency of an XSS attack...