Tag Archives: 電腦智識

保護網上密碼安全的方法

保護網上密碼安全的方法

用網銀的人多了,網銀被盜的人也就自然多了。網上也有很多很多介紹保護網銀密碼安全的方法,無外乎什麼把密碼設置得複雜點啊,安裝殺毒軟體啊,很多方法都是殺毒軟體廠商的促銷手段,要知道殺毒都在病毒出現後,網銀都被盜了,裝再好的殺毒軟體有什麼用,給大家傳授幾招簡單實用的,絕對管用。

先講講密碼是如何被盜的,現在99%都 是因為電腦中了木馬盜號程式。你在進入網銀支付頁面的時候,會看到輸入帳號密碼的介面,不用說,一般人都是老老實實的按照從上而下的順序,先輸入卡號,然後輸入密碼,然後附加碼,在輸入的過程中,還特別認真,擔心輸錯,木馬程式在判斷出你進入銀行網站後,就記錄下你的鍵盤輸入的數位,然後發送郵件給盜號 者,你輸入得越好,帳號越容易被盜,密碼再複雜也沒用,你就等著哪天哭吧。針對這種木馬盜號方式,採用二招就可以輕鬆破解了:

招式一:隨機輸入。

做人也不能太老實了,沒人規定要按照順序從上往下輸入,也不要輸完一個框框後,再輸入另外一個框框,以上圖舉例,假設帳號是」12345678″,密碼是」abcdef」,在輸入的過程中,可以在密碼框先輸入」abc」,然後跳到帳號框輸入」1234″,然後再到密碼框」def」,再到帳號框」5678″,不怕麻煩的,可以多跳幾次,次數越多越安全

招式二:故意在輸入的過程中輸錯。

可以故意輸錯幾個數位,然後再修改過來就可以了,而木馬程式就沒有辦法進行判斷了,哪個是正確的,哪個是錯誤的,只有把這個不可能解答的問題留給盜號者了,如要輸入」12345678″,我先輸入」15678″,然後刪除掉」5678″然後再輸入正確的數字,同樣道理,故意輸錯的次數越多,越安全。

通過以上2招,盜號者收到的木馬記錄的郵件,就像天書一樣的,無法被破解。

3 keys to a killer network

It’s no secret that small and midsize businesses are rapidly adopting mobile technology to enable their employees to work effectively outside the office. The average user now carries two-three mobile devices for work (PC, smartphone, and tablet), with 68 percent of employee-owned devices used to access business applications.1 Mobile usage is becoming rapidly more data intensive as well. In the next five years it is estimated that more than 50 percent of mobile traffic will be from video2 and the number of application downloads is expected to increase to nearly 268 billion downloads by 2017.3

With this exponential increase in use of mobile devices for business—and the data heavy usage that accompanies it—comes the need for networks that support ever-increasing bandwidth at faster rates.

To effectively design flexible, scalable networks for today’s mobile workforce, focus on these three key areas:
1. Reduce complexity
2. Improve mobile productivity
3. Protect and secure the business

1. Reduce complexity
With an increasing mobile workforce, businesses need to support a myriad of both wired and wireless devices. To reduce complexity, the best approach is a unified platform that enables “single pane of glass” management of the wired and wireless infrastructure. This approach can significantly reduce complexity, improve availability, simplify security and device configuration, and improve productivity.

2. Improve productivity
Most business WLANs simply can’t handle the increasing demand for mobile access and higher bandwidth on their networks. Many businesses see disappointing results for their existing wireless LAN deployments because of poor experience and a network that does not scale to meet mobile needs. In more technical terms, 802.11n may no longer be sufficient to meet today’s bandwidth requirements. This is where the increased network bandwidth and gigabit AP capacity of 802.11ac can really help satisfy user demands.

3. Protect and secure the business
Cyber attackers know that midsize businesses are usually less secure than enterprise customers, making them an easy target. A comprehensive approach that protects against threats from inside and outside the network perimeter is the best defense. A simple firewall is no longer enough. Threats are more sophisticated, persistent and unpredictable than ever before. Most businesses need an integrated, multi-layer security strategy that is centralized that protects the entire network, including mobile apps and identities, the cloud, virtualized apps data, and storage.

Source

Become a great presenter

Presentations are one of the most common ways we communicate our ideas to our colleagues and prospective clients.

The challenge is making them stand out while avoiding the worst crime of all — being boring. And with reports showing that we’re spending more time in meetings than ever before, making the most of them is increasingly important. They are, literally, how we do business. And that means you need to make yours engaging, lucid, persuasive, and entertaining.

Thankfully, there is a way to breathe new life into your presentations and wow your audience with special effects and features that’ll keep them sitting on the edge of their seats. Introducing Prezi!

While best for non-linear presentations, Prezi is a cloud-based alternative to traditional presentation software, such as PowerPoint and Keynote, which enables you to utilise a large ‘canvas’ to dynamically ‘zoom’ to relevant content. Prezi is all about creating a story from images, text, videos, graphics, and more. It’s not about going from slide to slide but from one story element to another ‒ your audience will feel more like they’re at the movies than in a boardroom.

One great feature is that it’s specifically designed with touch navigation in mind. So whether you’re using a touchscreen or a tablet, you’ll have complete hands-on control.

It’s this ability to zoom in and out that really gives a wow factor to your presentations. Rather than clicking from one slide to the next you can now explore a ‘canvas’ that lets you focus on the details while zooming out to see the big picture — ultimately highlighting how (and where) concepts are interconnected. All from one screen.

It’s also a great tool to encourage collaboration. Stored in the cloud your presentation can be viewed by people at their leisure no matter where they are. And if you’re working on a group project, up to ten people can cooperate in real time and build your presentation on a single, shared canvas.

If you’ve already started working on your presentation in PowerPoint, don’t fret. Prezi comes with a convenient import feature so you can easily transfer what you’re already created.

So now we know the basics, let’s get started in setting up your first presentation.

6 steps to wowing your audience

Step one:
Visit www.prezi.com and sign up (for free). Then click on “Create New Prezi” to get started.

Step two:
You now need to decide on a metaphor for your message (for example, stairs leading to an open door can represent progress towards a goal). Once done, you need to find that image (using either Prezi’s own free templates, checking online, your organisations image-bank, or a stock-image website, etc.). This image will become your background canvas.

Note: With the right visual metaphor you’ll capture your audience’s attention and make your overall message far easier to understand. Your presentation is as much about that message as it is trying to convey an interesting story. You want it to be unique and interesting; and this is best accomplished through a combination of words and visual choices that let your presentation pop.

Step three:
After you select an image/template you can start designing your presentation. Simply click on the canvas, create a text field, and start typing.

Note: You can start typing right away but text fields make it easier to zoom in and out.

Step four:
Start making it your own by personalising your text. Choose the font, its size and colour. From there you can scale, rotate and move the text to get the most impact from your message.

Step five:
Now’s the time to start inserting additional pictures, some diagrams, a video or two, even sound effects. Anything and everything to best convey the message you want to communicate.

Step six:
With all the infrastructure in place you can start editing the zooming path (using the left-hand menu) to fully animate your presentation. Go from ‘location to location’ on your canvas, zoom in and out, turn elements upside down, and more. A truly dynamic way to explore connecting relationships within your message. It’s also a great way to rehearse everything before saving and exporting.

Sharing is caring
Now it’s time to save and export your presentation so that you can share your brilliance with the world. There are quite a few options to choose from:

Export as a Portable Prezi
Find the Prezi you wish to save as a Portable Prezi and click on the Share thumbnail. Select ‘Export to portable prezi』.

Give your Portable Prezi file a name and chose the location you want to save it to. The file will be saved as a zip file that you can unzip and use (start Prezi.exe (for PC) or the Prezi file (for Mac) to load your Portable Prezi). You can also attach the zip file to your email and send it to those you want to share it with. A Portable Prezi is especially handy in situations where you don’t have access to the Internet, or to send to conference organizers before you present. It contains a non-editable version of your Prezi, as well as software that will play your Prezi on both Windows and Mac PCs. However, if you need to play embedded You Tube videos you will still need to have internet access.

Note: A Portable Prezi is entirely self-contained and requires no installation, at the same time it doesn’t install anything onto your computer either. So it’s the best and safest way to share your Prezi.

Export as PDF
You can also export your Prezi as a PDF, but chances are that you won’t be able to get the most out of your animations and embedded videos if you do. You’ll find the option to export as PFD under the Share thumbnail too.

Save as an open file
Alternatively, if you have a public Prezi account so that anybody with internet access can view your Prezi.

Time to get rid of boredom in the boardroom
And that’s it. Prezi really is an easy-to-use application that, in essence, lets you draw information to best convey a memorable and persuasive message that goes far beyond the bullet-point outlines of traditional presentation solutions.

While presentations and meetings may be a necessity, there’s no reason why they can’t actually be entertaining, useful and a productive use of everyone’s time.

Source

How to ensure your credit card payments

How to ensure your credit card payments are secure at the point-of-sale

Big data breaches from big businesses dominate the media headlines, and for good reason. 70 million consumers were affected by the Target hacks in late 2013 [1], and 53 million were affected by The Home Depot breach in 2014 [2].

But here’s a headline you probably haven’t read: Visa estimates that 95 percent of the credit-card data breaches it discovers happen to its smallest business customers [3]. And those breaches cost an estimated $201 per affected record for the small and medium businesses affected [4].

What’s a business to do? Not accepting payment for services rendered is clearly not an option. But you don’t have to leave yourself vulnerable, either. Here are four point-of-sale (POS) security tips you should be following to help keep your business—and your customers—safe.

1. Secure the OS
While it’s tempting to think of POS solutions as secure black boxes that never need to be touched, the reality is they’re just as vulnerable to threats as your PCs or notebooks. That means you need to take the same security precautions—such as installing antivirus software—that you do with your other network-connected devices.

Windows-based tablets like the HP ElitePad 1000 offer the added assurance of HP Client Security features like HP BIOS Protection [5] and Microsoft Defender [6] to automate data protection and help reduce down time for employees and IT.

2. Be compliant
More than just a good set of guidelines, the Payment Card Industry Data Security Standards (PCI DSS) are the rules every merchant must meet for credit card processing. If you aren’t in compliance, you could be on the hook for financial damages from leaked data. Yet more than one in five retailers (22 percent) are not PCI DSS compliant, and an additional 14 percent don’t know if they’re PCI compliant or not [7]. Find out if you are, and stay compliant to minimize your liability.

Before purchasing a POS system, it’s also important to ensure the POS hardware itself meets PCI standards for merchants. Solutions like the HP Retail Case offer universal PED (PIN Entry Device, or mobile payment terminal) attachment slots for plugging PCI-compliant devices into the HP ElitePad.

3. Keep up
Even after you’ve purchased a POS solution, PCI DSS standards, viruses, and emerging threats are constantly changing. To stay ahead of vulnerabilities, schedule regular audits of your systems to be sure you’re up-to-date. And before you upgrade, make sure your solution provider regularly updates the system.

HP has been serving retail customers for over 40 years, and remains at the forefront of security with software suites like HP Client Security. This suite of tools includes Security Manager, Credential Manager, and Drive Encryption modules to help keep your business secure.

4. Consider your options
There are a number of additional advanced security measures your business may want to consider:
· P2P encryption: Also called end-to-end encryption, this security measure addresses risk by encrypting all the payment card data before it even gets to the POS.
· 2-Factor authentication: HP ProtectTools with Multi-Factor Authentication allows any combination of password, smartcard, and biometrics to enhance multi-user pre-boot security.
· Active network monitoring: This tactic can help spot suspicious behavior before more user information is leaked by injecting test traffic onto a network and monitoring the flow of that traffic to detect leaks.
· Isolating networks: POS systems are often connected to many other systems, exposing them to unnecessary risk; you can decrease that risk by restricting connections to payment data flows.

The consequences of lax point-of-sale security, especially for smaller businesses, can be stark. Among businesses that experience a breach, 60 percent go out of business within six months [8]. But with a few simple steps—combined with secure solutions like the HP ElitePad Mobile Retail Solution—you can both avoid the cost of breaches, and provide your customers with the convenience and efficiency they want and you need.

Source