What is phishing


In cyber security term phishing happens when hacker tricked you into fake website then you will be prompted to fill in your personal details in exchange for gift, mystery gift or for huge sum of money. Examples of personal details they want is your full name, IC number (malaysian identitiy card), full address, phone number, credit card details, bank account and the pin number.

Phisher's method of attack is usually by copying design of popular websites, such as social sites (Facebook), famous online banking websites (Maybank2u.com.my), well known shopping sites (such as Lelong.com.my, eBay) and fake digital products sales page (ebooks, fake anti virus, fake software).

Those fake sites will look and feel like the real one, except for it's domain name and lack of secure server initial in its web address (the fake site usually uses http://, not https://). These phishers will sent out emails or instant messsaging message telling you to update your banking details or to give in your personal details so they can send you money you've won.

The word 'phishing' originally derived from the word 'fishing' where bad guys uses money or free gift as bait for them to get your your financial details and your real identity via the internet so they can steal your money from your bank account.

What is malware

Malware original word derived from "malicious code software", malware is a computer program with internal code designed to do harmful job - to destroy system files in installed in your computer. Malware is general word used to describe any harmful programs found be the threat to your computer because this kind of program can alter computer's system code, slows down computer speed, can damage your stored document, spy on your computing activity, copy your personal data and send it outside to hackers, produce unwanted flashy ads on your screen and most of all, it makes you get angry with your computer because you dont know what's gone wrong. There are many types of malware, to differentiate them cyber security experts need to analyze infection method and behavior. Maybe you also got one malware in your computer while you didnt know about it. Please run your anti virus scan frequently.

Rootkit - what is rootkit?

Rootkit is a special designed computer programs with unique code created by hacker to conceal their cyber crime activity. Another word to describe rootkit is, a rootkit is computer stealth program created to hide hacker's unauthorized access to a computer. Hacker uses network to gain hidden access to any computer they want, and to cover and to conceal their action, hackers needed rootkit. When a rootkit being installed into a computer, rootkit would be invisible to computer user's eye. Many rootkit were left unquarantined by anti virus programs because these anti virus 'sees' rootkit as clean program.

Computer anti virus


Computer anti virus is a program or software written and to handle virus attacks.

Modern anti virus software designed to prevent virus from installing itself in your computer, to quarantine possible virus infected files, and to defend your internal registry from being changed without your control.

If you are using Windows operating system in your computers (such as Windows Xp, Windows Vista or Windows 7) you must have computer anti virus installed.

If not, any malicious code program, virus, worm or trojan will easily infects your computer's file and doing harmful effects, making the computer just like a digital zombie.

The recommended computer anti virus were AVG anti virus, Kaspersky anti virus, Norton anti virus or Avira anti virus. Some powerful anti virus can be downloaded for free from the internet, such as AVG anti virus.

Acer laptops - Acer SignalUp technology for better wireless coverage

Acer laptops - Acer SignalUp technology for better wireless coverage
Acer SignalUp technology created to help Acer laptop user to get stable wireless internet connectivity anyware they go. This technology helps the user to locate available wireless connection thus provides good connectivity without contnious interruption. SignalUp technology works within an internal antenna built within Acer laptops, located on top of laptop's frontal LCD panel.

Acer laptops - Acer Aspire One 532

Acer laptops - Acer Aspire One 532
Acer introduces their new netbook (a small laptop) called Acer Aspire One 532. This cute little laptop has long battery life, up to 10 hours.

Acer Aspire One 532 installed with Windows 7 (starter pack) operating system, which the disadvantage is the OS does not allow you to change background image. I recommend you change the operating systom to Windows Xp (service pack 3) for more customization and for more speed.

Acer Aspire One 532 processor chip is Intel Atom N450, its has WiFi wireless internet detector to enable you get connected into the internet anywhre you go. More, this laptop has optional 3G configuration, an added feature just like I saw in Nokia Booklet 3G.

If you are a small laptop user who prefers style and colorful design, Acer Aspire One 532 has three optional body color for you to choose - black, silver and red. I prefer the black color.