**,,,Oucvh,,Link Men-download/Update Antivirus,,,**

 Software Antivirus for free and paid antivirus is needed in installed on the computer to secure your computer from virus attacks, worms, spyware, malware, adware and other malicious scripts and can damage windows or linux system.

In order for the antivirus can recognize the latest viruses and can clean it from the computer, then you should always update your antivirus with the virus database file (definition file updates). some antivirus that you can use for free or 30-day trial is Avast! Antivirus, AVG Antivirus, Avira Antivirus, BitDefender, ESET NOD 32, F-Secure, Kaspersky, McAfee Antivirus, Norton Anti Virus, Trend Micro Antivirus, Norman Antivirus, bullguard, Panda antivirus and various other antivirus.

Here is a link to download the latest antivirus updates


1. Avast! Antivirus Update

2. AVG Antivirus Update

3. Avira Antivirus Update

4. BitDefender Update

5. ESET NOD 32 Antivirus Updates

6. Kaspersky Antivirus Update

7. F-Secure Update

8. McAfee Antivirus Update

9. Norton Anti Virus Update

10. Trend Micro Antivirus Update

11. Norman Antivirus Update

In addition to the above import antiviral powerful to protect computers from viruses overseas, the following is a local anti-virus (Antivirus Indonesia) which is an antiviral made by Indonesian children a powerful nation to protect and clean up a local computer from virus attacks. Each local antivirus has its advantages and disadvantages, please try. These local antivirus antivirus juxtaposed with foreign countries can be more secure from virus attacks.

1. PCMedia Antivirus | Antivirus PCMAV


2. SmadAV | Antivirus Local


3. ANSAV | Antivirus Local support Linux


^$^ How to Download Youtube Video to flv Format-mp3-mp4-3gp Using The Add on Firefox ^$^

Download video from youtube-flv 3gp format - mp3 - mp4 can be done by using the add-on Firefox Easy YouTube Downloader. This firefox add on can be used free of charge, simply by opening the page add on Easy YouTube Downloader and then install the firefox browser, firefox browser restart later, then when you open a youtube video automatically in the lower right part youtube video appeared on the "Download FLV As- 3GP-MP4-MP3 "

One advantage of utilizing the add-on firefox to download youtube video is an add-on file sizes are small so to download and install onto your computer does not take long, and not too much of my computer memory. And how to download youtube video very easy because the download button to appear automatically in the right position the bottom of each open youtube video.

To more easily do the following procedure:

Note: if the computer has not installed the addon greasemonkey, it must first enable greasemonkey, we can see a guide here to install greasemonkey in firefox

How to download youtube videos can be viewed on the following steps:

1. Open the firefox addon pages, can click here Easy YouTube Downloader
after open Easy YouTube Downloader page as below
Click the "Add to Firefox"

 
Wait until the install is complete.
Restart the Firefox browser

2. Open a video on youtube that you want to download
At the bottom right of the video will appear on the "Download As-3GP FLV-MP4-MP3"



Click one of the formatting options are available, it is automatically downloaded youtube videos


Some other ways to download videos on youtube can dilhat here download videos from youtube
Please try the above can hopefully help to download youtube videos easily.

"Neko Animation Cursor For Windowz XP and Windowz 7"

 Make friends who've used Windows 95 and Windows 98, may not be familiar with the animated desktop "Neko Animation Cursor" made by programmers from Japan, in the transition from Windows 3 to Windows 95 applications very populer.Aplikasi Neko neko cursors have resemblance to a desktop application that I've discussed here animated desktop applications and application flash animated wallpapers . Neko application featured a white cat that will move or run mengukuti movement of the mouse on the desktop computer. Cats "Neko" will behave uniquely when the mouse is idle, or are busy typing in the word.

If you want to try to run this application in windows xp and windows 7, please download the application here Neko Desktop

To activate it pretty easy, just extract or unzip the downloaded file neko
In Windows Explorer double-click Neko98


 

Display neko desktop in windows xp

Display neko desktop in windows 7

Please try, good luck

^&^ Free download Windows 8 Developer Preview ^&^

After the release of Windows 7 last year, Microsoft is now developing a next generation operating system Windows 7 is Windows 8 . Since the month of September 2011 Microsoft has provided a download link Windows 8 Developer Preview on his official website. However, because the installer windows 8 is still in pre-beta version then chances are the operating system is still not stable when installed on the computer. If you want to try installing Windows 8 on a computer can be downloaded directly from microsoft site.

Currently Microsoft provides Windows 8 iso files Developer Preview Classic, 64-bit (x64) berikuran 3.6 GB and Windows 8 Developer Preview Classic, 32-bit (x86) size 2.8 GB. Which can be downloaded and diburning to be a CD installer CD for Windows 8.


To download windows 8 can use the following link download windows 8

Minimum requirements of Windows 8

Processor: 1 gigahertz (GHz) 32-bit (x86) or 64-bit (x64)
RAM: 1 gigabyte (GB) of RAM (32-bit) or 2 GB of RAM (64-bit)
Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
DirectX 9 graphics device with WDDM 1.0 or higher driver
Requires mendukukung touch screen monitors (supports multi-touch screen)
To run the Metro style apps, it takes a minimum screen resolution of 1024 X 768 pixels

^#^ Facebook vs Twitter, Siapa Lebih Populer di 2011,,? ^#^

Jakarta - Ranah media sosial semakin menegaskan eksistensi dan pengaruhnya sepanjang tahun 2011 ini. Dimana dua layanan pilihan sepertinya patut dialamatkan kepada Facebook dan Twitter. Namun jika diminta untuk memilih, siapa kira-kira yang lebih populer?

Menurut laporan yang dikeluarkan HighBeam Research dan dilansir ZdNet, jika patokannya dari sisi media coverage maka Twitter adalah jawaranya. Situs mikro blogging itu tercatat mendapat coverage sebesar 50%, sedangkan Facebook menguntit dengan 45%.

Dominasi Twitter ini disebutkan terjadi hampir sepanjang tahun, kecuali pada bulan Februari dan April. Twitter begitu sering disebut-sebut ketika media mengulas tentang ranah media sosial.

Namun itu baru dari satu sisi. Jika berbicara tentang penilaian lain, seperti jumlah pengguna, Facebook masih unggul jauh dari Twitter. Situs besutan Mark Zuckerberg itu telah disesaki dengan lebih dari 800 juta pengguna per September 2011, sedangkan Twitter 'hanya' memiliki 100 juta pengguna aktif.

Dominasi Facebook berlanjut pada sisi 'beragam hal' yang diposting penggunanya. Dimana ada sekitar 4 miliar 'hal' yang disharing Facebooker setiap harinya pada pencatatan Juli 2011. Sementara Twitter disesaki sekitar 250 juta tweet per harinya pada Oktober 2011.

Facebook disebutkan memiliki sifat lebih privat. Sementara Twitter lebih terbuka, khususnya terkait penyebaran informasi via layanan online ini yang dapat berkicau sebegitu cepatnya, meski terbatas jumlah karakter.

Hingga pada akhirnya, sulit untuk membandingkan kedua layanan ini apple to apple. Yang pasti keduanya termasuk layanan media sosial yang tengah digemari saat ini. Tinggal tergantung pilihan pengguna, ingin lebih menghabiskan waktu di mana?

Laporan ini juga menyebutkan bahwa media sosial lainnya di belakang Facebook dan Twitter yang paling digemari adalah LinkedIn, MySpace, dan MySpace. Entah kenapa Google+ tidak masuk dalam laporan tersebut.

^*^Pemahaman Bagaimana Jutaan Pengguna Berikutnya Akan Mengubah Dunia Maya (Versi Bahasa Indonesia & English Version)^*^

ENGLISH VERSION:
The product of human ingenuity and innovation, cyberspace now delivers a range of critical services to more citizens around the world
than ever before. Yet, the online world as we know it stands at the threshold of unprecedented change. 
Being invited to speak at the EastWest Institute’s Worldwide Security Conference in Brussels this
week provided an opportunity to examine the needs faced by the global security
community as we prepare to meet the needs of the Internet’s next billion users.
The International Telecommunication Union (ITU) reported that the number
of Internet users reached the two billion threshold in March of this year and according
to a Boston Consulting Group report, another billion are expected to come online in the next
four years, bringing the total number of Internet users worldwide to about
three billion by 2015.
Planning to ensure that our online world—cyberspace—is
trustworthy, resilient and secure as we move into this uncertain future, policy
leaders need to consider the fundamental changes that are occurring in
cyberspace, and the policy issues that these changes will likely present and
that will need to be addressed. Looking toward the future of three billion
users, four factors will fundamentally change the future of cyberspace security:
people, devices, data, and cloud services.
People: The Global Online Population Expands, Diversifies, and Grows More Internet-Dependent
The emergence of the next billion Internet users will impact security in two ways.  Most important will be the impact of the
demographic characteristics of these users.  Consider that the next billion users will (1) be younger, (2) spend more time online, (3) be more mobile, (4) see the world
through social media and apps, and (5) make greater use of natural interfaces. These five factors could hasten the onset of
totally digital lifestyles making connectivity seemingly as essential as oxygen. The next billion could also help foster new innovation in the development and application of technology.
Separately,however, this emerging user population also represents a greatly expanded “target rich” environment for cybercriminals that want to exploit their data,
social networks, and devices via botnets or other means.
Devices:
From the Internet of Things to Immersive Computing
These new users will require new devices.  According to The Boston Consulting Group, the
number of Internet-connected devices is predicted to exceed 15 billion—twice
the world's population – by 2015, and to soar to 50 billion devices by 2020.  “Devices” of course refers to more than smart
phones, netbooks and tablets.  It also systems such as smart grids, intelligent transportation, healthcare monitoring,
smart manufacturing, and environmental sensors.
The advent of powerful wireless devices that both run infrastructure and deliver
infrastructure services, including providing access to cloud services, means
that cybercriminals and other threat actors need not merely target traditional,
and increasingly protected, commercial software and consumer applications to
execute attacks with significant consequences.  Attackers may well target the embedded
software, firmware and hardware in these devices to attack the infrastructure
or seize control of the devices and turn them into sensors that can report
status, collect personally identifiable information, or conduct other espionage.
Data: Rapid increases in Understanding, Traffic and Opportunity
The striking growth in the number of users and devices will also produce an
exponential growth in the amount of data that is being generated, stored,
analyzed and transformed into innovation and knowledge.  Analyzing large data sets—so-called big
data—will become a key basis of competition, underpinning new waves of
productivity growth, innovation, and consumer surplus, according to research by
MGI and McKinsey's Business Technology Office.  However, such data sets also represent
attractive targets for organized cyber criminals and other threat actors.  From a security standpoint, safeguarding
these huge data sets, protecting privacy and integrity, will require concerted global
effort requiring collaboration among governments, the private sector, and users.
Cloud Computing: The Information Society Enabler
With an exponentially growing community of increasingly mobile users, cloud computing will
commensurately grow in importance.  It
will fundamentally change how businesses operate, how every manner of services
are delivered, and even how lives are lived.  On the positive side, the security best
practices implemented by an effective cloud provider may rival or surpass the
measures that cloud customers might themselves be able to provide, resulting in
enhanced security.  Yet there are global issues that will need to be addressed in terms of transparency and jurisdiction
to enable cloud services that are both secure and scalable to service the needs
of this expanded user community across multiple countries.
Preparing for the Future Now
So what does all of this mean for policy makers? Policy makers need to focus on three
key areas: Improving global collaboration for cybersecurity, reducing the
cyber-attack surface, and improving Internet health.
Improving global collaboration for cybersecurity is moving forward, with the
EastWest Institute taking a leading role in in promoting increased dialogue
about normative behavior among nation states in cyberspace. By defining
acceptable behavior, norms help to promote stability and reduce the risk of
conflict internationally by reducing uncertainty and fostering predictability.  Important work in this area began in 2010
with the UN sponsored Group of Governmental Experts process and has been taken up in
the Organization for Security and Cooperation in Europe.  Recently, China, Russia, Tajikistan and
Uzbekistan offered a contribution for consideration, and the United Kingdom
will hold a conference on the issue next month. Countries should continue to work together on the important issue of
state-level norms; however, with a burgeoning population of citizen users, we
must not lose sight of the need for a broader dialogue on norms to guide the
activities of enterprises and individuals on the Internet; this dialogue must
involve not just governments but the private sector and other Internet community
stakeholders as well.
Reducing the cyber-attack surface
Reducing the cyber-attack surface can be achieved by industry and government working in
partnership to make the ICT infrastructure less susceptible to attack and
compromise. One important way to achieve this is through concerted action to address risks in
the supply chain for information and communications technology products and
services. Vendors and service providers need to build and maintain world-class
approaches to secure software and hardware development methodologies. Microsoft
began this journey over 10 years ago and has openly shared its Security Development Lifecycle.
The nonprofit alliance SAFECode provides a platform for companies to
share, both within the software development community and more broadly,
information on secure software development techniques that have proven to be
effective as well as those that have not. Industry needs to do more.
For their part, governments need to understand the nature of ICT supply chain risk more clearly and work collaboratively with
one another and with vendors to develop a common risk management framework
rooted in core principles that both address supply chain integrity concerns and
preserve the fruits of global free trade. Such a system should be risk-based,
transparent, flexible, and should recognize the realities of reciprocal
treatment in the global economic environment.
Improving Internet Health
Improving Internet health requires a global, collaborative approach to protecting people
from the potential dangers of the Internet. Despite the best efforts at
education and protection, many consumer computers host malware and may be part
of a "botnet," unbeknownst to their legitimate owners. There is
currently no concerted mechanism to shield users from or help them mitigate
these risks. Such infected computers do not simply expose their owners’
valuable information and data; they place others at risk too. This threat to
greater society makes it is essential that the technology ecosystem take
collective action to combat it.
Work has been underway in industry circles to build cooperation among various
stakeholder groups including ISPs, software vendors, and others; to leverage
investments made in key regions of the world; and to create a future roadmap
for an Internet health system. The active discussions of cybersecurity policy and legislation now underway
in many nations afford a ripe opportunity to promote this Internet health
model. As part of this discussion, it is important to focus on building a
socially acceptable model. While the security benefits may be clear, it is
important to achieve those benefits in a way that does not erode privacy or
otherwise raise concern.
At its Second World Wide Cybersecurity Conference this past June, EWI launched an
important effort to leverage investments made in key regions and to create a future
roadmap for an internet health system
to protect people, devices and data.
Conclusion
The good news is that as more people from around the world come online, the cultural
fabric of the Internet is enriched.  Working together, the global security community can help ensure that the Internet
becomes an ever safer environment supporting communication, collaboration, and
commerce.
VERSI BAHASA INDONESIA:
Produk kecerdikan manusia dan inovasi, dunia maya sekarang memberikan berbagai layanan yang kritis kepada lebih banyak warga negara di seluruh dunia
daripada sebelumnya. Namun, online dunia seperti yang kita tahu itu berdiri di ambang perubahan yang belum pernah terjadi sebelumnya.
Diundang untuk berbicara di konferensi keamanan di seluruh dunia di Institut EastWest di Brussels ini
Minggu memberikan kesempatan untuk memeriksa kebutuhan yang dihadapi oleh keamanan global
masyarakat saat kami bersiap untuk memenuhi kebutuhan Internet miliar pengguna berikutnya.
International Telecommunication Union (ITU) melaporkan bahwa nomor
pengguna Internet mencapai ambang dua miliar pada bulan Maret tahun ini dan menurut
laporan Boston Consulting Group, lain miliar diharapkan untuk datang online berikutnya
empat tahun, membawa jumlah pengguna Internet di seluruh dunia untuk tentang
tiga miliar pada tahun 2015.
Perencanaan untuk memastikan bahwa kami online dunia-dunia maya — adalah
dapat dipercaya, ulet dan aman ketika kita pindah ke kebijakan masa depan, ini pasti
pemimpin perlu mempertimbangkan perubahan mendasar yang terjadi di
dunia maya, dan isu-isu kebijakan yang perubahan ini kemungkinan akan hadir dan
yang perlu ditangani. Memandang ke arah masa depan tiga miliar
pengguna, empat faktor fundamental akan mengubah masa depan dunia maya keamanan:
orang-orang, perangkat, data, dan awan layanan.
Orang: Populasi Online Global mengembang, diversifikasi, dan tumbuh lebih Internet-bergantung
Munculnya miliar berikutnya pengguna Internet akan mempengaruhi keamanan dalam dua cara. Paling penting akan dampak
karakteristik demografis pengguna ini. Mempertimbangkan bahwa miliar pengguna berikutnya (1) akan lebih muda, (2) menghabiskan lebih banyak waktu online, (3) lebih mobile, (4) melihat dunia
melalui media sosial dan aplikasi, dan (5) membuat lebih besar penggunaan antarmuka alami. Faktor-faktor ini lima bisa mempercepat terjadinya
gaya hidup digital benar-benar membuat konektivitas tampaknya sama pentingnya dengan oksigen. Miliar berikutnya dapat juga membantu mendorong inovasi baru dalam pengembangan dan penerapan teknologi.
Secara terpisah, namun, populasi pengguna ini muncul juga mewakili lingkungan "target kaya" sangat diperluas untuk cybercriminals yang ingin memanfaatkan data mereka,
jaringan sosial, dan perangkat melalui botnets atau cara lain.
Perangkat:
Dari Internet hal-hal yang mendalam komputasi

Pengguna baru ini akan memerlukan perangkat baru. Menurut Boston Consulting Group,
jumlah perangkat yang terhubung Internet diperkirakan akan melebihi 15 milyar-dua kali
populasi dunia-2015, dan melambung ke perangkat 50 miliar pada tahun 2020. "Perangkat" tentu merujuk lebih cerdas
telepon, netbook dan tablet. Itu juga sistem seperti smart grid, cerdas transportasi, monitoring, kesehatan
Smart manufaktur, dan sensor lingkungan.
Munculnya kuat perangkat nirkabel yang menjalankan infrastruktur dan memberikan
infrastruktur layanan, termasuk menyediakan akses ke awan layanan, berarti
cybercriminals itu dan aktor-aktor ancaman lain perlu tidak hanya menargetkan tradisional,
dan semakin dilindungi, komersial perangkat lunak dan konsumen aplikasi untuk
melaksanakan serangan dengan konsekuensi yang signifikan. Penyerang mungkin target tertanam
perangkat lunak, firmware dan perangkat keras perangkat ini untuk menyerang infrastruktur
menguasai perangkat dan mengubahnya menjadi sensor yang dapat melaporkan
status, mengumpulkan informasi pribadi, atau melakukan spionase lain.
Data: Cepat peningkatan pemahaman, lalu lintas dan kesempatan
Juga akan menghasilkan pertumbuhan mencolok jumlah pengguna dan perangkat
pertumbuhan eksponensial dalam jumlah data yang sedang dihasilkan, disimpan,
dianalisis dan berubah menjadi inovasi dan pengetahuan. Menganalisis kumpulan data besar-sehingga disebut besar
data-akan menjadi dasar kunci kompetisi, mendukung gelombang baru
produktivitas pertumbuhan, inovasi, dan konsumen surplus, menurut penelitian oleh
MGI dan kantor McKinsey's bisnis teknologi. Namun, seperti data set juga mewakili
menarik target untuk penjahat cyber terorganisir dan aktor-aktor ancaman lain. Dari sudut pandang keamanan, menjaga
data ini besar set, melindungi privasi dan integritas, akan memerlukan terpadu global
usaha yang memerlukan kolaborasi antar pemerintah, sektor swasta, dan pengguna.
Cloud Computing: Informasi masyarakat Enabler
Dengan komunitas pengguna ponsel semakin tumbuh secara eksponensial, awan akan komputasi
commensurately berkembang. Itu
secara fundamental akan mengubah bagaimana bisnis beroperasi, bagaimana cara setiap layanan
disampaikan, dan bahkan bagaimana kehidupan yang hidup. Di sisi positif, keamanan terbaik
praktek-praktek yang dilaksanakan oleh penyedia awan yang efektif dapat menyaingi atau melampaui
langkah-langkah yang awan pelanggan sendiri mungkin mampu menyediakan, mengakibatkan
keamanan yang meningkat. Namun ada masalah-masalah global yang perlu diatasi dalam hal transparansi dan yurisdiksi
untuk mengaktifkan layanan awan yang aman dan terukur untuk melayani kebutuhan
ini diperluas komunitas pengguna di beberapa negara.
Bersiap-siap untuk masa depan sekarang
Jadi apa artinya semua ini bagi para pembuat kebijakan? Para pembuat kebijakan harus fokus pada tiga
kunci daerah: meningkatkan kerjasama global cybersecurity, mengurangi
Cyber-serangan, dan meningkatkan kesehatan Internet.
Meningkatkan kerjasama global cybersecurity bergerak maju, dengan
EastWest Institute mengambil peran utama dalam mempromosikan peningkatan dialog
perilaku normatif di antara negara di dunia maya. Dengan mendefinisikan
perilaku yang dapat diterima, norma-norma yang membantu untuk mempromosikan stabilitas dan mengurangi risiko
konflik internasional dengan mengurangi ketidakpastian mendorong prediktabilitas. Pekerjaan penting di daerah ini mulai pada tahun 2010
dengan proses UN disponsori kelompok ahli pemerintah dan telah mengambil
Organization for Security and Cooperation in Europe. Baru-baru ini, Cina, Rusia, Tajikistan dan
Uzbekistan ditawarkan kontribusi untuk pertimbangan, dan Britania Raya
akan mengadakan sebuah konferensi pada edisi bulan depan. Negara-negara harus terus bekerja sama dalam masalah penting
norma-norma tingkat negara bagian; Namun, dengan populasi yang berkembang dari warga negara pengguna, kami
harus tidak melupakan kebutuhan untuk sebuah dialog yang lebih luas pada norma-norma untuk panduan
kegiatan perusahaan dan individu di Internet; dialog ini harus
melibatkan tidak hanya pemerintah tetapi sektor swasta dan komunitas Internet lain
pemegang saham juga.
Mengurangi permukaan serangan cyber
Mengurangi permukaan serangan cyber dapat dicapai oleh industri dan pemerintah bekerja di
kemitraan untuk membuat infrastruktur ICT kurang rentan untuk menyerang dan
kompromi. Salah satu cara penting untuk mencapai hal ini adalah melalui tindakan terpadu untuk alamat resiko di
rantai pasokan produk teknologi informasi dan komunikasi dan
layanan. Vendor dan penyedia layanan yang perlu untuk membangun dan memelihara kelas dunia
pendekatan untuk mengamankan metodologi pengembangan perangkat lunak dan perangkat keras. Microsoft
mulai perjalanan ini lebih dari 10 tahun yang lalu dan telah secara terbuka berbagi dengan Security Development Lifecycle.
Aliansi nirlaba SAFECode menyediakan platform bagi perusahaan untuk
berbagi, baik di dalam komunitas pengembangan perangkat lunak dan lebih luas,
informasi tentang teknik-teknik pengembangan perangkat lunak yang aman yang telah terbukti
efektif serta orang-orang yang belum. Kebutuhan industri untuk berbuat lebih banyak.
Bagi mereka, pemerintah perlu memahami sifat ICT risiko rantai pasokan lebih jelas dan bekerja bersama-sama dengan
salah satu yang lain dan dengan vendor untuk mengembangkan kerangka manajemen risiko umum
berakar pada prinsip-prinsip inti bahwa keduanya mengatasi masalah integritas rantai pasokan dan
melestarikan buah-buahan perdagangan bebas global. Seperti sistem harus berbasis risiko,
transparan, fleksibel, dan harus mengakui realitas timbal balik
perawatan di lingkungan ekonomi global.
Meningkatkan kesehatan Internet
Meningkatkan kesehatan Internet membutuhkan pendekatan global, kolaboratif untuk melindungi orang-orang
dari potensi bahaya dari Internet. Meskipun upaya terbaik di
pendidikan dan perlindungan, banyak konsumen komputer host malware dan mungkin menjadi bagian
dari "botnet," tanpa sepengetahuan pemiliknya yang sah. Ada
saat ini tidak ada mekanisme terpadu untuk melindungi pengguna dari atau membantu mereka mengurangi
risiko ini. Seperti komputer yang terinfeksi tidak hanya mengekspos pemiliknya'
informasi berharga dan data; mereka menempatkan orang lain pada risiko juga. Ancaman ini untuk
membuat masyarakat yang lebih besar sangat penting bahwa teknologi ekosistem mengambil
tindakan kolektif untuk memerangi hal itu.
Kerja telah berlangsung di kalangan industri untuk membangun kerja sama di antara berbagai
kelompok stakeholder yang termasuk ISP, vendor perangkat lunak, dan lain-lain; untuk memanfaatkan
investasi yang dilakukan di daerah kunci dunia; dan untuk membuat roadmap masa depan
untuk sistem kesehatan Internet. Diskusi aktif cybersecurity kebijakan dan undang-undang sekarang berlangsung
di banyak negara mampu kesempatan yang matang untuk mempromosikan kesehatan Internet ini
model. Sebagai bagian dari diskusi ini, sangat penting untuk fokus pada bangunan
model yang dapat diterima secara sosial. Sementara manfaat keamanan mungkin jelas,
penting untuk mencapai manfaat tersebut dengan cara yang tidak mengikis privasi atau
Jika tidak mengangkat keprihatinan.
Yang kedua dunia lebar Cybersecurity konferensi Juni lalu, EWI diluncurkan
usaha yang penting untuk meningkatkan investasi yang dilakukan di daerah kunci dan membuat masa depan
peta jalan untuk sistem kesehatan internet
untuk melindungi orang-orang, perangkat dan data.
Kesimpulan
Kabar baiknya adalah bahwa sebagai lebih banyak orang dari seluruh dunia datang online, budaya
kain Internet diperkaya. Bekerja bersama-sama, masyarakat keamanan global dapat membantu memastikan bahwa Internet
menjadi lingkungan pernah aman yang mendukung komunikasi, kolaborasi, dan
perdagangan.

*Entertainmentz*

Mark Zuckerberg Vacations in Vietnam


For more photos of Mark Zuckerberg on vacation, click here.
For more photos of Mark Zuckerberg on vacation, click here.
Mark Zuckerberg
may be welcome in Vietnam, even if his brainchild Facebook is not.
The Facebook founder is vacationing in the communist country that blocks its citizen from using his social networking site.
According to The Associated Press, Zuckerberg, his longtime girlfriend Priscilla Chan and a group of friends arrived in Vietnam Dec. 22. They spent Christmas Eve in popular tourist spot Ha Long Bay and Christmas Day at an ecolodge in the northern mountain town of Sapa, where Zuckerberg rode a buffalo.
Vietnamese website Tuoitre News reported that Zuckerberg, 27, and Chan have already spent about $6,000 on travelling by private helicopter.
The pair have been dating since Zuckerberg's sophomore year at Harvard, where they met at a Friday night party for Jewish fraternity Alpha Epsilon Pi. Chan, a Chinese-American from the Boston suburbs. struck up a conversation with Zuckerberg while waiting in line for the bathroom.
"He was this nerdy guy who was just a little bit out there," Chan told the New Yorker last year.
When Zuckerberg left Harvard in 2005 to focus on Facebook full time, he recruited classmates, including Chan, who, according to The Harvard Crimson newspaper, told him, "I'd love a job at facebook," before offering him a Twizzler.
These days, Chan identifies Zuckerberg as her partner on her Facebook page and, according to tech writer Sarah Lacy, she has imposed a set of rules on her steady, including, " One date per week, a minimum of a hundred minutes of alone time, not in his apartment, and definitely not at Facebook."
While the couple seem to be enjoying their vacation, it's likely, given Zuckerberg's insatiable work ethic, that he's finding some time for business, namely expanding Facebook to Vietnam, where social media is growing. Though Facebook is blocked by the government's censors, locals can still access the site with relative ease, but it seems they would rather choose local offering Zing Me.
Zuckerberg, whose net worth is measured in the billions, doesn't need the money. Rather he seems motivated by his obsession to bring Facebook to one billion users worldwide.

Global Var

Cari Blog Ini