Monday, November 21, 2011

Top Ten Antivirus 2012

Antivirus software companies are working round the clock to improve their software to combat with virus and malicious codes over the internet. It is about time when antivirus firms are about to roll out their latest 2012 version of antivirus software. We are already testing the beta software to come up with our latest article on top ten antivirus 2012 so that you can install the best software and protect your computer. Since the numbers of viruses and malicious codes is increasing with a high pace, we will be testing all the leading antivirus and internet security programs aggressively to come up with our list of the top 10 antivirus software. In our top ten antivirus 2012 r

McAfee AntiVirus Plus 2011 3-User
eview we will be showing the test results of 20 different security software. By mid of 2011, most security software providers will launch their 2012 version of antivirus and security software. These are the antivirus programs we have short-listed for our review.

Top Ten Antivirus 2012

Here is the list of the best antivirus and security software of all times. Among the top are BitDefender, ESET, Norton, F-Secure, Kaspersky, TrendMicro, AVG, Avira, Zonealarm, Panda security and more. We will be running comparisons between different versions of the same security software, for eg., 2
011 version vs 2012 version. We will be also comparing between the capabilities of different security software, for eg., BitDefender vs Norton. Based on the performance of various different antivirus security software, we will give them scoring. The factors on which we will score antivirus software: Speed, stealth, detection, link scanning, removing virus, updates, blocking bad websites
, blocking phishing attempts, technical support and lots more factors. These are the antivirus programs we will be testing to come up with our top ten antivirus list:


Top Ten Antivirus 2012

  1. BitDefender Antivirus 2012
  2. McAfee Antivirus 2012
  3. Kaspersky Antivirus 2012
  4. ESET Antivirus 2012
  5. Norton Antivirus 2012
  6. F-Secure Antivirus 2012
  7. Vipre Antivirus 2012
  8. TrendMicro Antivirus 2012
  9. ZoneAlarm Antivirus 2012
  10. Panda Antivirus 2012

Other Antivirus Programs

  1. Avira Antivirus 2012
  2. Avast Antivirus 2012
  3. Avanquest Antivirus 2012
  4. G Data Antivirus 2012
  5. Webroot Antivirus 2012
  6. PC Tools Antivirus 2012
  7. Comodo Antivirus 2012
  8. CA Antivirus 2012
  9. Norman Antivirus 2012
  10. AVG Antivirus 2012
  11. Sophos Endpoint Security 2012
  12. Quick Heal Antivirus 2012
  13. Microsoft Security Essentials 2012

Top Ten Antivirus Ratings

Most of these antivirus software have been tested extensively for their performance. The old versions have received ratings based on the performance to quickly detect viruses from infected systems and stop new viruses from infecting the computers. There is a very strong criteria that will be used to provide points to various antivirus software 2012. Another interesting factor that we are considering is the antivirus coupons, we will give scores to antivirus software companies that offer discount coupons from time to time. Although this is not a major factor, but many users value coupons because it is a good way to save money on security software. Although this factor will not inflate the original ratings, we are including it only to help people save money. These are the factors that will contribute to the scoring:
  • Speed: When it comes to computing, speed is an important aspect that we can’t neglect. It has been reported that some antivirus software are much slower in comparison to other antivirus software. Which means, some antivirus programs slow down a computer. Computer users (specially gamers) like using antivirus software that does not degrade the performance of a computer system. They enjoy using the fastest antivirus software.
  • Stealth: Many viruses and spyware are designed to deactivate antivirus programs so that they are not detected. Antivirus software should quickly detect such a threat and stop the virus from harming the system files. Those antivirus software will receive higher score that can not only defend against known viruses but also protect a computer system from new and unknown virus and spyware.
  • Detection: A good antivirus program will quickly detect infection and will take the necessary steps to quarantine the infected files in order to stop the virus from spreading to other system files. Only if security software has the capabilities of detecting infection, it can stop a virus/spyware. So this is a major aspect of security software. Many poorly designed security software cannot detect all forms of threat. However, only those antivirus software will be included in our top ten antivirus 2012 list that are capable of detecting all sorts of threats.
  • Technical Support: We will also provide scores depending upon the type of technical support and customer service provided by the antivirus software manufacturer. Only those programs will receive higher ratings that are bundled with quality support. We will also count on the type of support available: phone, chat, email, etc. When your computer system is infected with virus, spyware or other forms of malware, you need quick assistance. That’s when you need to contact someone who is technically equipped to assist you. Based on the quality of technical support, scores will be provided to various security software and hence will win a rank in our top ten antivirus 2012 list.
  • Price: Antivirus software should not be too costly, it should be reasonably priced. We will be comparing the price of antivirus software and will be providing scores based upon how cheap is the antivirus software. The cheapest and the best antivirus 2012 will receive higher rankings. People love saving money, so the cheapest antivirus software will receive higher scores.
These are some of the major factors we will be using to rate the best antivirus software of 2012. We will also include other factors like real-time scanning, frequency of updates, blocking phishing attempts, link scanning, IM protection, parental lock and lots more factors. However, we will majorly focus on the 5 key-points mentioned above. Based on these factors, we will provide our lab test reports that will show you which antivirus software is best for your computer in the year 2012. Most antivirus manufacturers will release their 2012 antivirus software sometime in May or June this year. If you have any questions or suggestions about this report of top ten antivirus 2012, please leave your review below by leaving a comment.

IP Address

Every device connected to the public Internet is assigned a unique number known as an Internet Protocol (IP) address. IP addresses consist of four numbers separated by periods (also called a 'dotted-quad') and look something like 127.0.0.1.
Since these numbers are usually assigned to internet service providers within region-based blocks, an IP address can often be used to identify the region or country from which a computer is connecting to the Internet. An IP address can sometimes be used to show the user's general location.
Because the numbers may be tedious to deal with, an IP address may also be assigned to a Host name, which is sometimes easier to remember. Hostnames may be looked up to find IP addresses, and vice-versa. At one time ISPs issued one IP address to each user. These are called static IP addresses. Because there is a limited number of IP addresses and with increased usage of the internet ISPs now issue IP addresses in a dynamic fashion out of a pool of IP addresses (Using DHCP). These are referred to as dynamic IP addresses. This also limits the ability of the user to host websites, mail servers, ftp servers, etc. In addition to users connecting to the internet, with virtual hosting, a single machine can act like multiple machines (with multiple domain names and IP addresses).
Two versions of the Internet Protocol (IP) are in use: IP Version 4 and IP Version 6. Each version defines an IP address differently. Because of its prevalence, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in version sequence between IPv4 and IPv6 resulted from the assignment of number 5 to the experimental Internet Stream Protocol in 1979, which however was never referred to as IPv5.

IP version 4 addresses


Decomposition of an IPv4 address from dot-decimal notation to its binary value.
In IPv4 an address consists of 32 bits which limits the address space to 4294967296 (232) possible unique addresses. IPv4 reserves some addresses for special purposes such as private networks (~18 million addresses) or multicast addresses (~270 million addresses).
IPv4 addresses are canonically represented in dot-decimal notation, which consists of four decimal numbers, each ranging from 0 to 255, separated by dots, e.g., 172.16.254.1. Each part represents a group of 8 bits (octet) of the address. In some cases of technical writing, IPv4 addresses may be presented in various hexadecimal, octal, or binary representations.

IPv4 subnetting

In the early stages of development of the Internet Protocol, network administrators interpreted an IP address in two parts: network number portion and host number portion. The highest order octet (most significant eight bits) in an address was designated as the network number and the remaining bits were called the rest field or host identifier and were used for host numbering within a network.
This early method soon proved inadequate as additional networks developed that were independent of the existing networks already designated by a network number. In 1981, the Internet addressing specification was revised with the introduction of classful network architecture.
Classful network design allowed for a larger number of individual network assignments and fine-grained subnetwork design. The first three bits of the most significant octet of an IP address were defined as the class of the address. Three classes (A, B, and C) were defined for universal unicast addressing. Depending on the class derived, the network identification was based on octet boundary segments of the entire address. Each class used successively additional octets in the network identifier, thus reducing the possible number of hosts in the higher order classes (B and C). The following table gives an overview of this now obsolete system.

IPv4 private addresses

Early network design, when global end-to-end connectivity was envisioned for communications with all Internet hosts, intended that IP addresses be uniquely assigned to a particular computer or device. However, it was found that this was not always necessary as private networks developed and public address space needed to be conserved.
Computers not connected to the Internet, such as factory machines that communicate only with each other via TCP/IP, need not have globally unique IP addresses. Three ranges of IPv4 addresses for private networks were reserved in RFC 1918. These addresses are not routed on the Internet and thus their use need not be coordinated with an IP address registry.
Today, when needed, such private networks typically connect to the Internet through network address translation (NAT).
IANA-reserved private IPv4 network ranges

Start End No. of addresses
24-bit Block (/8 prefix, 1 × A) 10.0.0.0 10.255.255.255 16777216
20-bit Block (/12 prefix, 16 × B) 172.16.0.0 172.31.255.255 1048576
16-bit Block (/16 prefix, 256 × C) 192.168.0.0 192.168.255.255 65536
Any user may use any of the reserved blocks. Typically, a network administrator will divide a block into subnets; for example, many home routers automatically use a default address range of 192.168.0.0 - 192.168.0.255 (192.168.0.0/24).

IPv4 address exhaustion

IPv4 address exhaustion is the decreasing supply of unallocated Internet Protocol Version 4 (IPv4) addresses available at the Internet Assigned Numbers Authority (IANA) and the regional Internet registries (RIRs) for assignment to end users and local Internet registries, such as Internet service providers. IANA's primary address pool was exhausted on February 3, 2011 when the last 5 blocks were allocated to the 5 RIRs. APNIC was the first RIR to exhaust its regional pool on 15 April 2011, except for a small amount of address space reserved for the transition to IPv6, intended be allocated in a restricted process



IP version 6 addresses


Decomposition of an IPv6 address from hexadecimal representation to its binary value.
The rapid exhaustion of IPv4 address space, despite conservation techniques, prompted the Internet Engineering Task Force (IETF) to explore new technologies to expand the Internet's addressing capability. The permanent solution was deemed to be a redesign of the Internet Protocol itself. This next generation of the Internet Protocol, intended to replace IPv4 on the Internet, was eventually named Internet Protocol Version 6 (IPv6) in 1995. The address size was increased from 32 to 128 bits or 16 octets. This, even with a generous assignment of network blocks, is deemed sufficient for the foreseeable future. Mathematically, the new address space provides the potential for a maximum of 2128, or about 3.403×1038 unique addresses.
The new design is not intended to provide a sufficient quantity of addresses on its own, but rather to allow efficient aggregation of subnet routing prefixes to occur at routing nodes. As a result, routing table sizes are smaller, and the smallest possible individual allocation is a subnet for 264 hosts, which is the square of the size of the entire IPv4 Internet. At these levels, actual address utilization rates will be small on any IPv6 network segment. The new design also provides the opportunity to separate the addressing infrastructure of a network segment — that is the local administration of the segment's available space — from the addressing prefix used to route external traffic for a network. IPv6 has facilities that automatically change the routing prefix of entire networks, should the global connectivity or the routing policy change, without requiring internal redesign or renumbering.
The large number of IPv6 addresses allows large blocks to be assigned for specific purposes and, where appropriate, to be aggregated for efficient routing. With a large address space, there is not the need to have complex address conservation methods as used in Classless Inter-Domain Routing (CIDR).
Many modern desktop and enterprise server operating systems include native support for the IPv6 protocol, but it is not yet widely deployed in other devices, such as home networking routers, voice over IP (VoIP) and multimedia equipment, and network peripherals.

IPv6 private addresses

Just as IPv4 reserves addresses for private or internal networks, blocks of addresses are set aside in IPv6 for private addresses. In IPv6, these are referred to as unique local addresses (ULA). RFC 4193 sets aside the routing prefix fc00::/7 for this block which is divided into two /8 blocks with different implied policies The addresses include a 40-bit pseudorandom number that minimizes the risk of address collisions if sites merge or packets are misrouted.
Early designs used a different block for this purpose (fec0::), dubbed site-local addresses. However, the definition of what constituted sites remained unclear and the poorly defined addressing policy created ambiguities for routing. This address range specification was abandoned and must not be used in new systems.
Addresses starting with fe80:, called link-local addresses, are assigned to interfaces for communication on the link only. The addresses are automatically generated by the operating system for each network interface. This provides instant and automatic network connectivity for any IPv6 host and means that if several hosts connect to a common hub or switch, they have a communication path via their link-local IPv6 address. This feature is used in the lower layers of IPv6 network administration (e.g. Neighbor Discovery Protocol).
None of the private address prefixes may be routed on the public Internet.

IP subnetworks

IP networks may be divided into subnetworks in both IPv4 and IPv6. For this purpose, an IP address is logically recognized as consisting of two parts: the network prefix and the host identifier, or interface identifier (IPv6). The subnet mask or the CIDR prefix determines how the IP address is divided into network and host parts.
The term subnet mask is only used within IPv4. Both IP versions however use the Classless Inter-Domain Routing (CIDR) concept and notation. In this, the IP address is followed by a slash and the number (in decimal) of bits used for the network part, also called the routing prefix. For example, an IPv4 address and its subnet mask may be 192.0.2.1 and 255.255.255.0, respectively. The CIDR notation for the same IP address and subnet is 192.0.2.1/24, because the first 24 bits of the IP address indicate the network and subnet.

IP address assignment

Internet Protocol addresses are assigned to a host either anew at the time of booting, or permanently by fixed configuration of its hardware or software. Persistent configuration is also known as using a static IP address. In contrast, in situations when the computer's IP address is assigned newly each time, this is known as using a dynamic IP address.

Methods

Static IP addresses are manually assigned to a computer by an administrator. The exact procedure varies according to platform. This contrasts with dynamic IP addresses, which are assigned either by the computer interface or host software itself, as in Zeroconf, or assigned by a server using Dynamic Host Configuration Protocol (DHCP). Even though IP addresses assigned using DHCP may stay the same for long periods of time, they can generally change. In some cases, a network administrator may implement dynamically assigned static IP addresses. In this case, a DHCP server is used, but it is specifically configured to always assign the same IP address to a particular computer. This allows static IP addresses to be configured centrally, without having to specifically configure each computer on the network in a manual procedure.
In the absence or failure of static or stateful (DHCP) address configurations, an operating system may assign an IP address to a network interface using state-less auto-configuration methods, such as Zeroconf.

Uses of dynamic addressing

Dynamic IP addresses are most frequently assigned on LANs and broadband networks by Dynamic Host Configuration Protocol (DHCP) servers. They are used because it avoids the administrative burden of assigning specific static addresses to each device on a network. It also allows many devices to share limited address space on a network if only some of them will be online at a particular time. In most current desktop operating systems, dynamic IP configuration is enabled by default so that a user does not need to manually enter any settings to connect to a network with a DHCP server. DHCP is not the only technology used to assign dynamic IP addresses. Dialup and some broadband networks use dynamic address features of the Point-to-Point Protocol.

Sticky dynamic IP address

A sticky dynamic IP address is an informal term used by cable and DSL Internet access subscribers to describe a dynamically assigned IP address that seldom changes. The addresses are usually assigned with the DHCP protocol. Since the modems are usually powered-on for extended periods of time, the address leases are usually set to long periods and simply renewed upon expiration. If a modem is turned off and powered up again before the next expiration of the address lease, it will most likely receive the same IP address.

Address autoconfiguration

RFC 3330 defines an address block, 169.254.0.0/16, for the special use in link-local addressing for IPv4 networks. In IPv6, every interface, whether using static or dynamic address assignments, also receives a local-link address automatically in the block fe80::/10.
These addresses are only valid on the link, such as a local network segment or point-to-point connection, that a host is connected to. These addresses are not routable and like private addresses cannot be the source or destination of packets traversing the Internet.
When the link-local IPv4 address block was reserved, no standards existed for mechanisms of address autoconfiguration. Filling the void, Microsoft created an implementation that is called Automatic Private IP Addressing (APIPA). Due to Microsoft's market power, APIPA has been deployed on millions of machines and has, thus, become a de facto standard in the industry. Many years later, the IETF defined a formal standard for this functionality, RFC 3927, entitled Dynamic Configuration of IPv4 Link-Local Addresses.

Uses of static addressing

Some infrastructure situations have to use static addressing, such as when finding the Domain Name System (DNS) host that will translate domain names to IP addresses. Static addresses are also convenient, but not absolutely necessary, to locate servers inside an enterprise. An address obtained from a DNS server comes with a time to live, or caching time, after which it should be looked up to confirm that it has not changed. Even static IP addresses do change as a result of network administration (RFC 2072)

Public addresses

A public IP address in common parlance is synonymous with a, globally routable unicast IP address.[citation needed]
Both IPv4 and IPv6 define address ranges that are reserved for private networks and link-local addressing. The term public IP address often used exclude these types of addresses.

Modifications to IP addressing

IP blocking and firewalls

Firewalls perform Internet Protocol blocking to protect networks from unauthorized access. They are common on today's Internet. They control access to networks based on the IP address of a client computer. Whether using a blacklist or a whitelist, the IP address that is blocked is the perceived IP address of the client, meaning that if the client is using a proxy server or network address translation, blocking one IP address may block many individual computers.

IP address translation

Multiple client devices can appear to share IP addresses: either because they are part of a shared hosting web server environment or because an IPv4 network address translator (NAT) or proxy server acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. A common practice is to have a NAT hide a large number of IP addresses in a private network. Only the "outside" interface(s) of the NAT need to have Internet-routable addresses.
Most commonly, the NAT device maps TCP or UDP port numbers on the outside to individual private addresses on the inside. Just as a telephone number may have site-specific extensions, the port numbers are site-specific extensions to an IP address.
In small home networks, NAT functions usually take place in a residential gateway device, typically one marketed as a "router". In this scenario, the computers connected to the router would have 'private' IP addresses and the router would have a 'public' address to communicate with the Internet. This type of router allows several computers to share one public IP address.


Top Android Mobiles App for Social Networking

In the post I'm going to discuss about Top 5 Free Social Networking Apps for Android Mobiles, this apps will really helps you to stay close with your friends in online at anytime. One of the biggest online services - Social Networking is already a famous platform for many internet users to connect with their friends, families within few mouse clicks. There are different Social Media sites with which you can interact with your friends. To use Social Media sites features on your Android device the developers have created some best Social Networking apps which will help you to use your smartphone as a social media device.


1. Facebook App for Android
One of the fastest growing social networking sites is Facebook which is available in the form of an Android app for your smartphones. This app allows you to update your Facebook status directly from your Android device, chat with your friends, share pictures and watch videos, create events or join the events, read your news feed, check your Facebook message box, share the site links you like the most, etc. It is free of cost and can be downloaded from the Android market.


2. Google+ App for Android

Google+ which is a new comer in the social networking field has already gotten millions of users within a short span of time. Google+ Android app works just same as you use the Google+ web interface. It is used to control Google+ circles, choose the people with whom you want to share things, read the streams on your device. Huddles make messaging faster on our android device. Along with this you can also upload videos and photos into your own album.


3. Twitter App for Android-
Android app for Twitter allows you to use all the Twitter features right from your android mobile. It helps you to follow people, see the followers, search your interests and you can directly retweet using this app. What not it contains all the features of the Twitter.


4. Orkut App for Android- 
Though this is a social networking site created by Google, people are forgetting this site as Google launched Google+. But still some users surf this site to interact with their friends. With Orkut Android app you can use the Orkut features on your android device like reading scraps, sending messages, updating status and uploading pictures.



5. LinkedIn App for Android- 
LinkedIn is one of the biggest social networking site for both business and professionals peoples around the world. The main of aim of Linkedin is to create a small group to communicate with other people which are in the same interests like Industries, Gaming, Agriculture and Globalization. In that group we can discuss and interact with  other people about latest technology updates and you can also suggest new ideas that will help to grow your organization bigger in short time. LinkedIn App for Android provides simple features like you can read the latest news from the technology and share the content with all of your friends just with one mouse click.

Online Marketing Free Search Engines Submission