The Best of The Best

Posted by admin on Jan 7, 2012

Taken from PC World Magazine, January 2012 Edition

A survey of more than 63,000 people produced the following results…

The top five laptops – based on reliability –¬†are Apple, Samsung, Toshiba, Asus and MSI
The top five things that go wrong with laptops are operating system, hard drive, power supply, video, and keyboard
Tops in customer support… Apple, Dell, Toshiba, Asus, Lenovo
The worst brands overall are Acer, and Dell

The top five desktops – based on satisfaction – are Apple, Asus, Dell, Lenovo, HP
The worst brands overall are Compaq, eMachines and Gateway

The top five tablets – based on reliability – are Apple, Asus, Motorola, Toshiba and Acer
The easiest to use… by far… is Apple
The worst brands overall are Acer and Dell

The top five phones – based on user satisfaction – are Apple, HTC, Motorola, Palm and Samsung
The top five things that go wrong are operating system, battery, touch screen, mic/speaker, and bluetooth
Tops in customer support… Apple, LG, HTC, Nokia and Motorola
The worst brand overall is Blackberry.

The top five TVs are LG, Samsung and Panasonic
The worst brands overall are Philips, Westinghouse, JVC and Philips

The best were Brother, Canon, Samsung, Epson and HP
The worst were Lexmark, Kodak, Ricoh and Dell
Canon and Lexmark were the best for support.

The best are Nikon, Panasonic and Canon
The worst are Kodak, GE, and Fijifilm


Do You Speak Securitese?

Posted by admin on Jan 4, 2012

Taken from PC World Magazine, January 2012 Edition

Like many other topics we cover here, security has a language all its own. Listening to a group of security experts carry on a conversation, for instance, can be a frustrating experience for mere mortals. And sometimes, technical jargon seeps into everyday security news. Knowing what the following five key security terms mean, however, can help you stay better informed about the threats around you.

ZERO DAY = The expression refers to anyt newly discovered software security flaw that has yet to be fixed by the software’s maker.

REMOTE CODE EXECUTION = This is a fancy way of saying that a cybercriminal could use a vulnerability to gain access to your computer from afar and run malware on it.

SANDBOXING = This technique isolates apps and other software processes in such a way that, even if attackers figure out a security hole in a piece of software, they can’t exploit it to install malware on your computer.

SSL = Stands for Secure Socket Layer, is a way of securing the information being passed between you and the site you’re visiting.

CERTIFICATES = A digital document – or ID badge – that verifies a site’s identity… issued by organizations known as “certificate authorities”.