Powerful and Efficient Software For Retail Businesses

Point of sale systems are a deceptively simple looking type of computer system. What may appear as nothing but a cash drawer with a scanner attached to it is actually a complex combination of hardware and software. Customers see a cash drawer, scanner, receipt printer, and a display. Employees see an easy to use interface …

Wireless security

When you're using wireless, youare sending data from your computer to an accesspoint through the internet to a server.

The security of a data streamis only as good as the security of the weakestsegment.

Often the weakest link is thewireless link from your computer to the access point.

While your traffic is in transitbetween your computer and the access point, it issusceptible to being sniffed by anyone who is within rangeof the wireless signal.

There are two commonly usedwireless encryption protocols: WPA and WEP.

If you're managing an accesspoint, then you should set it up to use WPA or WPA2 to encryptthe traffic between your computer and theaccess point.

WPA stands for Wi-FiProtected Access.

If you're connecting to anaccess point, then you will also want one that usesand supports WPA.

WPA encrypts the traffic so thatanyone who happens to be able to sniff or intercept yourtraffic will still not be able to understand the contentsof the packets they are seeing.

Unfortunately, whether aparticular network uses WPA or not is determined by the accesspoint owner and not by the person connecting to it.

If the access point promptsfor a password, then it is probably using encryptionof some sort.

If it is open and does notprompt for a password, then your traffic is vulnerableto being sniffed.

Often your device will displaythe information about which security scheme is being used.

If there is a little padlockicon next to the network name, this indicates an encryptednetwork.

Additionally, even if you'reusing WPA, you still need to think about the security of yourtraffic once it reaches the access point.

WPA only encrypts the trafficbetween your device and the access point.

If the access point is nottrusted, then the owner of the access point can view any ofyour traffic that is not encrypted by other means.

To learn about encrypting morethan just your wireless packets, watch our tutorialson HTTPS and VPN.

Source: Youtube

How to fix unknown error – Security Software (Win XP)

Security software can cause unwanted conflictswith iTunes on a windows pc security software does not always recogniseitunes as a friendly application, and may block it from restoring or updating this article explains how to disable securitysoftware, even if you don't know what you have on your computer.

The first step is to click on the start menu,and choose run.

What we want to type in is msconfig, whichstands for microsoft configuration.

We need to change this first part to selectivestartup And then uncheck load startup items Next we want to move to the sevices tab And tick the box next to hide all microsoftservices Once that is ticked, you can click disableall And we will move onto the startup tab.

What we want to find in here is iTunes helper,and tick the box next to that one.

Once done, hit the apply button.

You may encounter a message saying an accessdenied error was returned.

If you encounter that message it is perfectly ok, just hitthe OK message and then ok again to get out of there.

now you can restart the computer Now that your computer has rebooted, you shouldsee this message.

Click ok.

Then have a look at the startuptab.

Some security software will prevent itselffrom being disabled.

As you can see from my example, zone alarmand norton security are both still running even after we've disabled them as a startupitem Once we've identified what is still running,we will need to delete those.

We can do this by clicking the start menu,and selecting control panel.

Inside the control pane we need to find theicon "add remove programs".

Now your view may actually look a little different thanmy control panel.

But regardless of which way it looks, it will still have that icon Once the program list loads, it will looksomething like this.

Select the security software that was notdisabled earlier, and click to uninstall.

Source: Youtube

How to fix unknown error – Security Software (Win 7)

Security software can cause unwanted conflictswith iTunes on a windows pc.

security software does not always recogniseitunes as a friendly application, and may block it from restoring or updating.

this video explains how to disable securitysoftware, even if you do not know what you have on your computer.

the first thing to do is click on the startmenu and in the search box at the bottom type in msconfig.

once the window comes up, we want to go toselective startup, and un-tick load startup items.

we'll then go across to the servicestab, hide all microsoft services, and then disable all.

we'll go across to the startuptab.

and we want to look for anything that represents itunes or apple and enable those.

once your done you can click apply and thenok.

and it should prompt you then to restart the computer.

now that the computer is restarted, we'regoing to go back down to the start menu and type in msconfig one more time.

once the windowcomes up we'll go across to the startup tab.

and we're going to look for anything thatwas unticked previously and has now re-ticked itself.

in my example it is kaspersky anti-virus once we've identified what we need to getrid of we'll go to the control panel.

It's probably simpler if you change the view fromsmall icons in the top right corner to category view, that way we can go down to uninstalla program and once a list of programs loads we'll findthe security software that had re-ticked itself as we just saw.

in my example that was kasperskyanti virus once we uninstall this software, you'll befree to use itunes without any risk of the security software blocking that connection simply follow the prompts provided to uninstallthe software and if you have any questions or queries regarding how to do that, referto the software's website.

Source: Youtube

Chrome Packaged Apps – Security Model

Hello! My name is Adam Barth and I work onthe Chrome team’s packaged apps effort.

I am here to talk to you about the securitymodel of packaged apps.

Packaged apps have access to features andservices that a normal web app would never have access to.

Users need to be confidentthat the apps they install will not behave in unexpected ways that endanger their system.

Chrome has a variety of defenses and protections that make it easier for you to create saferapps.

The first is process and storage isolation.

One of the foundations of the web security model is that a web app or site on one domainis not allowed to affect the data held in another.

This same principle is upheld forpackaged apps too.

 Even though an app is installed, actions inside it should not beable to directly affect data in another.

Each packaged app runs in its own process,so if something goes awry it will not directly affect apps running on the user’s system.

The data stored in each app is also sandboxed and isolated from other packaged applicationsinstalled on the user’s system.

This means that a file saved in the app will only bevisible to the app and the user that created it.

Secondly, Chrome makes use of a technology called Content Security Policy, commonly knownas CSP.

This technology helps protect users and developers from common cross-site scriptingattacks that can be found on the web.

 In fact CSP is enforced by default for everypackaged app.

Because packaged apps have access to evenmore features than a web app, CSP has disabled some features that you might expect as a developersuch as: Inline scripts like click handlers and <script>tags with code inside and ‘eval’ and the ‘new function’methods We know that sometimes you need to use thesefeatures so we’ve introduced a feature called “sandboxed pages”.

 These are pages inyour app that use all the features of the current web such as eval, new Function andinline script tags, but importantly have no direct access to advanced packaged app features.

The third protection in apps is the permissions model.

Apps can’t just use any feature theywant.

The user needs to have granted access to this feature.

 You can easily declareyour apps intent by configuring the permissions that you need in the manifest file.

For exampleyou can declare that your app needs access to the user’s video camera, or access toraw sockets.

Finally another security measure is the <browser>tag for web content.

Imagine you are building an RSS feed readerthat will show news articles in the app experience.

Adding web content directly is dangerous,as you have no control over what external authors are adding to their content.

Howeverthe user experience demands that you show the content.

The <browser> tag is like aniframe in that it will allow you to embed web content into your app from an externalresource but it is entirely isolated from your app.

This was just a quick overview of the security model for packaged apps.

To learn more on how to develop packaged apps visit developer.



Source: Youtube