Twitter

Follow YashSachein on Twitter

Saturday, February 18, 2012

The Official Windows 8 Logo: It’s a Window, Not a Flag




Microsoft said Friday that it dramatically redesigned the Windows 8 logo to make it more like, well, a window.
 
When the Windows 8 team was working to create a logo that would sum up the Windows 8 product and the Metro design experience, designer Paula Scher of the Pentagram design firm turned to the Windows executives in the room and asked them: 

"Your name is Windows. Why are you a flag?" 
And thus the new logo was born.
 


Windows 8 Logo

 
 
Windows 1.0 Logo

 
"'Windows' really is a beautiful metaphor for computing and with the new logo we wanted to celebrate the idea of a window, in perspective," Moreau wrote. "Microsoft and Windows are all about putting technology in people's hands to empower them to find their own perspectives. And that is what the new logo was meant to be. We did less of a re-design and more to return it to its original meaning and bringing Windows back to its roots – reimagining the Windows logo as just that – a window."
 
It really is a dramatic redesign. What do you think of it? Let us know in the comments.
 
Microsoft is expected to unveil a consumer preview of Windows 8 at Mobile World Congress later this month. 

Source: Thinkdigit and Gizmodo.

Monday, February 13, 2012

10 Tips to Protect Your Personal Information and Identity


When you go online for emailing, instant messaging (IM), shopping, and banking, you often communicate personal information such as addresses, phone numbers, account numbers, usernames, and passwords. Unfortunately, you risk having this personal information and possibly even your identity stolen, or having your PC used as a launching pad for hackers to attack others.
                       

Follow these top ten tips to protect yourself and your computer:
  1. Invest in trusted, multi-faceted security software. Look for comprehensive, multi-faceted PC security software that protects you from viruses, spyware, adware, hackers, unwanted emails, phishing scams, and identity theft.
  2. Always access the Internet from behind a firewall. A firewall adds a security layer between your PC and the Internet, and helps stop hackers from stealing your identity, destroying your files, or using your PC to attack others.
  3. Use a PC you know is secure. Hackers can easily retrieve sensitive data that is sent over an unsecured Internet connection. If you need to send sensitive information or make an online transaction, use a PC that you know is secure and remember that there are many flavors of security.
  4. Watch out for phishing scams. Phishing scams use fraudulent emails and web sites, masquerading as legitimate businesses, to lure unsuspecting consumers into revealing private account or login information. Even if you have PC security, you still might visit a malicious web site without knowing it. Legitimate businesses will never ask you to update your personal information via email. Always verify web addresses before submitting your personal information.
  5. Secure your wireless network. You are at risk if you access the Internet from a Wi-Fi network. Since your wireless network’s radio waves travel through walls, a hacker with a simple antenna could attack you from miles away to steal your information and use your wireless network for their own communication. Always use additional Wi-Fi security protection.
  6. Never install potentially unwanted programs (PUPs) like spyware or adware on your PC. Many free programs that you download via the Internet, while appearing to be harmless, are specifically designed to be malicious and monitor your keystrokes, track your Internet logins, transmit your confidential information, or redirect your browser to fake sites. Some of these programs can also be installed on your machine simply by clicking on an advertisement link on the Internet.
    With security software, you can stop these programs from installing. Never willingly install programs unless you are familiar with the web site and program and have read the end-user license agreement thoroughly.
  7. Do not answer chain email. Even with PC security, some chain email forwarded by your friends might ask for personal information. Do not download files from friends and family unless you know the content of the file and know that it is secure.
  8. Monitor your credit reports and be aware. At least once a year, check your credit history. This is one of the best ways to find out if someone is using your personal finance information without your knowledge.
  9. Monitor your children’s online activity. Limit your children’s time spent online. Install and use parental controls software that allows you to monitor your children’s online activity as well as prevent them from accessing undesirable web sites and sharing personal information via online communications.
  10. Make regular backups of critical data. Keep a copy of important files on removable media such as Zip disks or recordable CD-ROM disks (CD-R or CD-RW disks). Use software backup tools if available, and store the backup disks in case of an emergency.
Source : McAfee