Sunday, September 16, 2012

Check your password—is it strong?



Check your password—is it strong? Check your password Your online accounts, computer files, and personal information are more secure when you use strong passwords to help protect them.

Test the strength of your passwords: Type a password into the box. Password: Strength: Weak Not ratedMedium Strong Best

password-checker
Note: This does not guarantee the security of the password.
This is for your personal reference only.
What is a strong password? The strength of a password depends on the different types of characters that you use, the overall length of the password, and whether the password can be found in a dictionary.
It should be 8 or more characters long. For tips about how to create passwords that are easy for you to remember but difficult for others to guess, read Create strong passwords.
About this password strength checker Microsoft does not retain information entered into this password checker. The password you enter is checked and validated on your computer. It is not sent over the Internet.

Tutorial of: How to create strong password?

Create strong passwords

Create strong passwords

A strong password is an important protection to help you have safer online transactions. Here are steps you can take to create a strong password. Some or all might help protect your online transactions:
  • Length. Make your passwords long with eight or more characters.
  • Complexity. Include letters, punctuation, symbols, and numbers. Use the entire keyboard, not just the letters and characters you use or see most often. The greater the variety of characters in your password, the better. However, password hacking software automatically checks for common letter-to-symbol conversions, such as changing "and" to "&" or "to" to "2."
  • Variation. To keep strong passwords effective, change them often. Set an automatic reminder for yourself to change your passwords on your email, banking, and credit card websites about every three months.
  • Variety. Don't use the same password for everything. Cybercriminals steal passwords on websites that have very little security, and then they use that same password and user name in more secure environments, such as banking websites.
There are many ways to create a long, complex password. Here are some suggestions that might help you remember it easily:
What to doExample
Start with a sentence or two.Complex passwords are safer.
Remove the spaces between the words in the sentence.Complexpasswordsaresafer.
Turn words into shorthand or intentionally misspell a word.ComplekspasswordsRsafer.
Add length with numbers. Put numbers that are meaningful to you after the sentence.ComplekspasswordsRsafer2011.

More strategies for strong passwords

Test your password with a password checker

A password checker evaluates your password's strength automatically. Try our secure password checker.

Avoid common password pitfalls

Cyber criminals use sophisticated tools that can rapidly decipher passwords.
Avoid creating passwords that use:
  • Dictionary words in any language.
  • Words spelled backwards, common misspellings, and abbreviations.
  • Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
  • Personal information. Your name, birthday, driver's license, passport number, or similar information.

How I protect my computer against Hackers, Spyware and Viruses



1. Install Anti-Virus Software 

-This should not even have to be listed, if you don’t have anti-virus software installed, you’re asking for trouble! And if your reason for not installing anti-virus software is because it’s too expensive, then that can reason can be shot down because there are several free anti-virus programs out there that are considered better than commercial software packages. Here are two of the most popular ones:

AVG Anti-Virus – Very good and completely free.
Avast Anti-Virus – Almost on par with AVG.
Kaspersky Anti-Virus – Not free, but one of the best detection rates.

2. Update All Software
- Installing an anti-virus program by itself is not enough. There are hundreds of new threats that are found daily and the anti-virus programs release updates regularly to combat the new threats. Make sure you anti-virus program is set to update automatically so that you don’t have to rely on your memory to do it.
 Also, this goes for all the software on your computer. The most important software to keep up to date is your Windows operating system. It is essential to have Automatic Updates turned on and set to download and install updates automatically.

3. Install only Trusted Software
 - If you’re not sure what a piece of software does from it’s name, then don’t install it. Also, don’t install anything you didn’t intend to install in the first place. Sometimes programs will ask you to install other programs during the install of the first application. Be careful of that because it’s usually spyware. Install software from big names sites only, such as Microsoft or Adobe.

4. Avoid P2P File Sharing Software
– If used with great caution, P2P software is quite useful for movies, songs and software, but if you’re not very technically savvy, you might end up downloading a song that has a keystroke logger attached to it that will send anything you type to some other computer over the Internet. It’s almost impossible to tell that this is occurring unless your anti-virus or anti-spyware programs pick it up in their scans.

5. Delete Unknown Emails
– If you receive emails from random people’s names, do not bother to open the email, just delete it. If you have any doubts after reading the name and the subject, it’s probably not someone you know. Never download or open attachments unless you are sure it’s from someone you know. Give the person a call quickly and ask them if you’re not sure. Most large companies that you create online accounts with will not send you attachments unless you specifically ask for them through their web site. Also, be wary of any emails from sites pretending to be banks, auction sites, etc asking for you to verify bank account info or address info. No bank ever does that.

6. Do not click on Ads
- Avoid clicking on ads if you can. Especially those ads where something is flying around and if you shoot the duck, you win some prize! Ads have become more sophisticated in that they try to make the ad interactive so that you’ll be tempted to play it like a game.

7. Run Virus Scans Regularly
– If you’re not in the mood to scan every day, at least run a scan once a week. Actually, setup a schedule for your computer in your anti-virus software to run a scan late at night or whenever you don’t use your computer and that way you won’t be bothered with a slow computer.

8. Be careful what you attach to your computer
– This is a more common way to transfer viruses than you might think. Everyone now has a USB flash stick that they carry around on their key chains, ready to snap into any computer. But who knows what your viruses are on your friends computers and what accidentally got transferred to their USB stick. A lot of virus programs will auto launch right when the USB stick is put into the computer, so you don’t even have to open or download any of the files to be infected.

9. Avoid Shady Web Sites
– If you need to look at porn, then make sure you do it in a virtual environment. You are DEFINITELY going to get some virus or spyware if you browse porn sites on your computer. Virtualization basically allows you to run programs like Internet Explorer in a virtual environment that does not effect your current operating system. If you want to find out more, search for “Virtual PC” or “VM Ware” in Google. Otherwise, simply avoid going to shady web sites!

10. Turn On or Install a Firewall
- If you’re running Windows XP, make sure Windows Firewall is turned on. A firewall prevents hackers from gaining access to your computer by limiting the number of ports that are open to the public. Also, when buying a wireless router, make sure it has a built in firewall. Having a software and hardware firewall is better than just having one or the other.

11. Secure Your Wireless Network
– Most wireless routers are set to no security when you install them. Be sure to log into the router and at least set the basic security that requires a password. There are stronger encryption options, but if you don’t understand those, then simply set a password on the router, otherwise anyone can connect to your home network and access everything.

12. Use a Complex Password for Login
– This means that you should already have a password to login to your computer. Not having a password at all is not a good idea. Create a password for all user accounts and make sure it’s complex. Complex means it should have numbers, upper case characters, lower case characters, and symbols. This makes it way more difficult for a hacker to get into your computer.

------------------------------------------------------------------------------
How to boost your malware defense and protect your PC Free computer protection to help secure your computer against malware:

Build up your computer's defenses Do not be tricked into downloading malware Build up your malware defenses Install antivirus and antispyware programs from a trusted source Never download anything in response to a warning from a program you didn't install or don't recognize that claims to protect your PC or offers to remove viruses. It is highly likely to do the opposite.

Get reputable anti-malware programs from a vendor you trust. Microsoft Security Essentials offers free real-time protection against malicious software for your PC.

Or, choose from a list of Microsoft partners who provide anti-malware software.

Update software regularly Cybercriminals are endlessly inventive in their efforts to exploit vulnerabilities in software, and many software companies work tirelessly to combat these threats.
That is why you should: Regularly install updates for all your software—antivirus and antispyware programs, browsers (like Windows Internet Explorer), operating systems (like Windows), and word processing and other programs.

Subscribe to automatic software updates whenever they are offered—for example, you can automatically update all Microsoft software. Uninstall software that you don't use. You can remove it using Windows Control Panel.

Use strong passwords and keep them secret Strong passwords are at least 14 characters long and include a combination of letters, numbers, and symbols. Find out how to create them.
Don't share passwords with anyone. Don’t use the same password on all sites. If it is stolen, all the information it protects is at risk.
Create different strong passwords for the router and the wireless key of your wireless connection at home.
 Find out how from the company that provides your router. Never turn off your firewall A firewall puts a protective barrier between your computer and the Internet.
Turning it off for even a minute increases the risk that your PC will be infected with malware.
Use flash drives cautiously Minimize the chance that you'll infect your computer with malware: Don't put an unknown flash (or thumb) drive into your PC.

Hold down the SHIFT key when you insert the drive into your computer.

 If you forget to do this, click in the upper-right corner to close any flash drive-related pop-up windows. Don't open files on your drive that you're not expecting.

Don't be tricked into downloading malware Instead, follow this advice: Be very cautious about opening attachments or clicking links in email or IM, or in posts on social networks (like Facebook)—even if you know the sender. Call to ask if a friend sent it; if not, delete it or close the IM window.

Avoid clicking Agree, OK, or I accept in banner ads, in unexpected pop-up windows or warnings, on websites that may not seem legitimate, or in offers to remove spyware or viruses.
Instead, press CTRL + F4 on your keyboard. If that doesn’t close the window, press ALT + F4 on your keyboard to close the browser. If asked, close all tabs and don’t save any tabs for the next time you start the browser.
Only download software from websites you trust. Be cautious of "free" offers of music, games, videos, and the like. They are notorious for including malware in the download.

Saturday, April 28, 2012

How to boost my PC in the start up

First of all you need to understand use the msconfig and this tutorial will tour you throught the process of how to boost your pc
How to use MSCONFIG in Windows XP and Vista










If you have ever had a tech support call regarding what programs start, when you boot up Windows XP, you may have heard the term MSCONFIG. Perhaps you were instructed by a technician where to go and what to do with this tool. Granted, this is not necessarily something that one would use on a daily basis. However, there are occasions when MSCONFIG is quite useful, providing there is practical information on how to utilize it.



Before we get into what MSCONFIG is used for, we need to know how to access it. This is accomplished by left-click on Start, then Run. While in the Run dialog box, type in MSCONFIG (it is not case-sensitive) in white space, then left-click on Ok. It is important to note, before proceeding, that any changes made in MSCONFIG require a reboot before they are permanent.















A medium-sized window will pop-up on your screen, with a selection of six tabs. The first tab, which is selected by default, is the General tab. Is this view, you will see three selectable radio buttons under the Startup Selection heading. Normal Startup will be selected if you have never used MSCONFIG. Diagnostic Startup will start Windows XP up in a “stripped down” functionality mode, akin to a Safe Mode startup. If you choose this option, remember to change it back when you are done troubleshooting, or Windows will keep starting up in this manner.









If one does not encounter the Normal Startup being selected in MSCONFIG, they will see the Selective Startup having the dot next to it. This means that something has been altered with Windows, and only the active items will start. Not to panic though, it may have been as simple as a startup item being removed from its list. Maybe the BOOT.INI file was modified to allow different boot option with Windows.



While I do not intend to get too deep into the nuts and bolts of the SYSTEM.INI, WIN.INI, and BOOT.INI tabs, I do want to show an example of what a typical BOOT.INI screen looks like. In this screen shot, we see some standard boot commands with a Windows XP Professional setup on a single hard drive.









One of the reasons is that I would not want a computer user to venture boldly into the WIN and SYSTEM settings, is that any small change may cause Windows to break and sink faster than the Titanic. I do not believe there is enough room in this post for all the documentation. I recommend consulting your local computertechnician or the Microsoft Knowledgebase.



Oddly enough, the next tab over, Services, has a feature that I personally believe should be available in the other dangerous areas. In the Services tab, you see all of your computer’s services relating to Windows, and any other program on your machine that is installed as a service. The nice item in this screen is the Essential column heading (screen shot annotation #1). This annotates that a listed service is necessary to run Windows. Should you deselect it, well, it goes without saying that things, not necessarily good ones, will happen.









While in the Services tab, you can look at any non-Windows service by left-clicking on the Hide All Microsoft Services checkbox (screen shot annotation #2). Doing this is not damaging to Windows, it is simply a toggle switch. You can also Disable All (screen shot annotation #3) services if you want to, enough said.



The last tab in MSCONFIG is one of the more frequently visited areas. The Startup tab controls what programs start with Windows. If you want a program to not start alongside Windows, simply uncheck the box on the left-hand side of the window, under Startup Items, and it will not start with Windows. Following the columns to the right, you will notice the program or command that runs with the start item, as well as the actual location in the Windows Registry where a reference is for that item.





There are exceptions to the MSCONFIG rule of stopping startup programs. Various computer viruses, Trojans, and Spyware programs insert themselves into the Startup list, and are capable of self-repair. If you uncheck a suspicious program from the Startup list, only to look at MSCONFIG after a reboot, and it is still checked, there is a possibility that you have a malicious program on your computer.



It is also possible that if you update certain programs, like Adobe Acrobat Reader, it will reinsert items into the startup list after updates are run. However, as shown in the screen shot above, programs like Adobe are easy to spot on the Startup list.



This is a guest post by Charles Brader, a tech enthusiast and blogger.



Technorati Tags: Msconfig,Windows Startup,Startup,Boot.ini file,Win.ini file,System.ini file,Boot Options



How to download FREE antivirus online


Free is better than pay so here is where I have brought to you resources where to get those antivirus free
I will add a tutorial video that I have found instructive and a link where to get them for free


Frequency of the diferent Nalimov EGTB 6 men





6-man EGTB collecting tip

by Cato the Younger » Thu Jan 05, 2006 4:37 pm

http://sites.google.com/site/chess2u/Nalimov-Endgame-Tablebases/frequency-of-the-diferent-nalimov-egtb-6-men

Collecting the entire set of 6-man EGTB is intimidating and impractical for most people who don't have the necessary 1.2 terabytes of free disk space on their hard drives. But there is a practical if imperfect solution to this problem: only collect the most important--that is to say, the most frequently occurring--combinations.



There are 365 possible 6-man combinations. If you collect just the top 20 of them, by my guess you will have over 56% of the 6-man situations that happen in engine vs. engine games. If you get ambitious and go for the top 50, you will have over 79%. But if you are super-inefficient and collect only the bottom 100 combinations you will have only 0.16% coverage! I mean really, what good is a KNNNNK tablebase to you unless you like horses?



Now there is one issue with this suggestion that I will let others elaborate: the "incomplete tablebases" problem. For example if you have a tablebase with pawns and don't have the one that it converts into following a pawn promotion, you could have some problems. But my general impression is that if you go for maximum coverage in statistical terms that's a better approach that getting all the pawnless combinations first, many of which hardly ever occur. KRRKBB for example happens less than once every 100,000 engine games!



According to my database, here are the top 100 most frequently occurring combinations, ranked in order. You really don't need much more than this, as these cover about 92% of all 6-man combinations that actually happen in engine games. (And for practical purposes you can toss out any 5+1 combinations I show here because if your engine can't solve those without help you need a new engine.)



KRP KRP

KRPP KR

KPP KPP

KRP KPP

KBP KNP

KBP KPP

KRPP KP

KRP KBP

KPPP KP

KQPP KP

KBPP KP

KBP KBP

KRB KRP

KNP KPP

KQP KQP

KQP KPP

KRBP KR

KNP KRP

KQRP KR

KRN KRP

KBPP KB

KNP KNP

KNPP KP

KBPP KR

KQP KRP

KRNP KR

KRPP KB

KQPP KQ

KQRP KP

KBPP KN

KQBP KP

KPPP KR

KNPP KB

KNPP KN

KQR KRP

KNPP KR

KQPPP K

KRPP KN

KRB KRN

KQRPP K

KQP KBP

KRPP KQ

KRPPP K

KQQP KP

KQPP KR

KRR KRP

KRRP KR

KPPP KB

KRBP KP

KQBPP K

KQNP KP

KQP KNP

KPPP KN

KRP KBN

KQQPP K

KQR KPP

KRB KBP

KRB KRB

KRB KPP

KQBP KB

KPPP KQ

KRBP KB

KRNP KP

KRBPP K

KBPPP K

KRN KRN

KRB KNP

KQB KQP

KBNP KR

KQPP KB

KQNPP K

KQRBP K

KQRP KB

KQB KPP

KRBP KQ

KQP KRR

KRN KPP

KBPP KQ

KQBP KN

KRN KBP

KQPP KN

KQBP KR

KRN KNP

KBNP KP

KQP KRB

KQN KQP

KPPPP K

KQRB KR

KRBP KN

KBN KBP

KQNP KB

KNPPP K

KNPP KQ

KQR KBP

KRRP KP

KQBP KQ

KRNPP K

KBNP KB

KQQ KPP

KQR KQP



UPCOMING CHESS EVENTS IN SOUTH FLORIDA

UPCOMING CHESS EVENTS IN SOUTH FLORIDA


(FOR ADD'L INFORMATION ON ANY OF THESE CLICK HERE TO SEND ME AN E-MAIL)



Back To Home Page
http://sites.google.com/site/chess2u/home/tournaments-broadcasts


4/27-4/29 - 19TH SPACE COAST OPEN CHESS FESTIVAL - COCOA BEACH



4/27-4/29 - NATIONAL JUNIOR HIGH CHAMPIONSHIP - SAN DIEGO





4/28 - ELBRIDGE GALE SCHOLASTIC TOURNAMENT (UNRATED) - WELLINGTON





5/5-5/6 - ANNUAL HALLGARTEN TOURNAMENTS - COLLEGIATE NON-COLLEGIATE - DANIA BEACH





5/11-5/13 - NATIONAL ELEMENTARY CHAMPIONSHIP - NASHVILLE





5/19 - THE EPICURE GRAND PRIX AT MIAMI COUNTRY DAY (BUGHOUSE/BLITZ/YEAREND AWARDS)





5/25-5/27 - TALLAHASSEE OPEN





7/27-7/29 - 20TH ANNUAL SOUTHERN OPEN - ORLANDO





8/3-8/5 - FIRST ANNUAL OCALA OPEN





9/1-9/3 - ARNOLD DENKER FLORIDA STATE CHAMPIONSHIP - DAYTONA BEACH





10/6 - WEISS SCHOOL SCHOLASTIC TOURNAMENT - PALM BEACH GARDENS





10/12-10/14 - ORLANDO AUTUMN OPEN





10/24-10/28 - BAHAMAS INTERNATIONAL & AMATEUR - NASSAU





11/16-11/18 - 11TH ANNUAL TURKEY BOWL





11/30-12/2 - NATIONAL GRADE CHAMPIONSHIPS - ORLANDO









1/18/13-1/20/13 - CENTRAL FLORIDA CLASS CHAMPIONSHIP - ORLANDO





3/22-3/24 - SOUTHERN CLASS CHAMPIONSHIPS - ORLANDO





4/26-4/28 - 20TH SPACE COAST OPEN - COCOA BEACH





7/26-7/28 - 21ST SOUTHERN OPEN - ORLANDO





8/31-9/2 - ARNOLD DENKER FLORIDA STATE CHAMPIONSHIP - DAYTONA BEACH







1/17/14-1/19/14 - CENTRAL FLORIDA CLASS CHAMPIONSHIP - ORLANDO