Top 10 films of all time great Hijacked
According to research published by TorrentFreak, the pirated movie of all time director James Cameron "Avatar" is. The film was downloaded 21millions times since it was published in 2009.
And Ultimate 10 most expensive cars in the world
This is the most expensive cars on the market today. This is the fastest car with a speed of 0-60 km in 2.6 seconds. This is supposed to be the fastest car with a top speed of 253 mph +. However, is the title of the fastest cars in the SSC Ultimate Aero which exceed 253 hours miles push the car on the second Place for the fastest car.
The unique plants in the world 10
These few large interest received considerable attention in the world. Imagine the size of the flowers, the 1-meter range and can, up to 8 kg to 12 kg. But the smell fragrant Ndak problem, even closer to rotten meat. Therefore, this flower called the corpse flower is in our country, which is the natural habitat of this flower.
Selasa, 13 Desember 2011
Top 10 films of all time great Hijacked
Senin, 12 Desember 2011
Top 5 Haunted World
He is considered one of the deadliest roads in the world, the streets of Tuen Mun many sacrifices over the years. This way is the way The largest and one of the most used roads in Hong Kong, making it almost impossible to avoid. Tuen Mun Road, from those who were killed on the road going to say that they are in the bloodstream, causing the driver turned off the road and in a serious or fatal accident. The victim then come back to track and traffic accidents.
10 dolls and mysterious world of Ceram
While hackers are now easier
Symantec: 80% of the world's spam e-mail
If the global economy, the BRIC acronym meaning mrupakan Brazil, Russia, India and China knows. Four countries are also a leader in the growing market. The same was true for the trend growth of spam. A report Spam & Phishing last report, the four states that there is also a market leader.
"We know the BRIC is a leading provider of development and testifies to the great economic growth," said a spokesman for Symantec, quoted by Info Security Magazine, 28 March, 2011. "The country will also show rapid growth of broadband Internet," he said.
The growth of broadband usage makes these countries vulnerable to a botnet, a network of infected computers.
"Of course, determined during the month of February, Symantec, that has an average daily volume of spam rose to 8.7 percent," said a spokesman for Symantec. "The increase in average daily e-mail was the first place since August 2010," he said.
A total of Symantec found spam accounted for 80.65 percent of all e-mails in February. Compare with the previous month, reaching 79.55 percent. However, this trend has been estimated earlier. Besides increasing the amount of spam, months ago there was also an increase in phishing, only reached 38.56 percent. "The rise of phishing is particularly true in areas such as the use of automated tools and unique areas," said Symantec. For more information, the number of phishing site (fraud) with the toolkit automatically creates around 50.33 percent. Phishing website with unique URLs increased 33.73 percent. The malicious website uses the IP-domain (figures) fell by 47.22 percent. Because the report also showed that there was a significant spike in the amount of phishing sites to use the language outside of the United Kingdom. The figure is 76.51 percent. Among the non-phishing sites in English, the website in Portuguese, French and Spanish is the most.
The transition to IPv6 has cyber-threats
8th June 2011 is a historic day for the Internet world. That day began a series of major global companies Internet service to the old standard Internet addressing (IPv4) to IPv6, the next generation.
IPv6 City of the World Day, 9 June 2011, companies like Google, Facebook, Yahoo, YouTube, Meebo, Plurk, Bing, a vast virtual world, who are willing to deliver their services over IPv6. There are a total of 434 institutions that conduct the tests for 24 hours.
After Darric Hor, CEO of Symantec is to motivate PT Indonesia in his written statement, one of the goals of the experience of transition to other organizations in the industry.
As we know, have Internet service provider (ISP) to prepare computer hardware manufacturer, the manufacturer of the operating system and Web companies for IPv6 services. This ensures a successful transition from IPv4 addresses that have been used since 1983, has run around 2012.
As an example, using the old IP address (IPv4), it can not 4,294,967,296 IP addresses that can be used anywhere in the world. If IPv6 (implemented as of 1999) offer 340,282,366,920,938,463,463,374,607,431,768,211,456 IP address.
"The problem is, the transition from IPv4 to IPv6 is a huge opportunity for manufacturers of malware and other cyber-criminals is vulnerable," said Darric. "The introduction of IPv6 is also possibly to other problems," he said.
Firewall software and hardware, said Darric can participate if they fail to recognize the situation and come to check IPv6 traffic. "During the transition to IPv6 protocol, we are working with a situation where we need to create a new threat that is not currently facing learning look real," he said.
To this end consult each Darric offenders and users in the Internet industry to always update their security applications, including Firewall, to ensure that the threat will be present to diminmalisir.
Dance performances in Madrid Dairakudakan