Friday, April 29, 2011

Easily create a Résumé


I don't need to tell you that today's job market is highly competitive. To land the job you want, you must be exceptionally qualified.
You also need to know how to present your skills in a professional manner. That's where your résumé comes into play.

You can spend hours working on your résumé in a word prohttp://www.blogger.com/img/blank.gifcessor. You can hire a professional to format it for you.

Why not take an easier approach? pdfCV is a free service that walks you through the process of creating your résumé or curriculum vitae, whichever you need.
Start by signing up for a free account. Then it guides you through entering personal information and work history.

Once you're done, you can download your résumé as a PDF file, which is perfect for sharing. You can edit and download your résumé as many times as you want.

Link: pdfcv.com

Wednesday, April 27, 2011

Convert PDF files to Word documents


PDF-to-Word is a free service from the Nitro PDF Software team, makers

of Nitro PDF Professional, the first true alternative to Adobe® Acrobat®.

PDF files are a popular way to share documents. That’s because document formatting doesn’t change from machine to machine. And, you can open the files with free PDF readers.

Unfortunately, it is much more difficult to edit PDF files. Adobe Acrobat will do the trick. But, many people don’t want to shell out hundreds of dollars for it.

That’s why I recommend the free PDF to Word. It will convert your PDF files to .DOC or .RTF formats. You can then edit the files in Word or another word processor.

PDF to Word is a snap to use. Start by uploading your file to PDF to Word’s Web site. Select the format you’d like. Then, specify your email address.

You’ll receive an email with your document! In most cases, the conversion is almost instantaneous. Other times, you may need to wait 10 minutes or so for your file.

www.pdftoword.com

What are cookies in computers?

Also known as browser cookies or tracking cookies, cookies are small, often encrypted text files, located in browser directories. They are used by web developers to help users navigate their websites efficiently and perform certain functions. Due to their core role of enhancing/enabling usability or site processes, disabling cookies may prevent users from using certain websites.

Cookies are created when a user's browser loads a particular website. The website sends information to the browser which then creates a text file. Every time the user goes back to the same website, the browser retrieves and sends this file to the website's server. Computer Cookies are created not just by the website the user is browsing but also by other websites that run ads, widgets, or other elements on the page being loaded. These cookies regulate how the ads appear or how the widgets and other elements function on the page.For Managing cookies for different browsers see here

Standard uses for browser cookies

Website servers set cookies to help authenticate the user if the user logs in to a secure area of the website. Login information is stored in a cookie so the user can enter and leave the website without having to re-enter the same authentication information over and over.More information

Session Cookies are also used by the server to store information about user page activities so users can easily pick up where they left off on the server's pages. By default, web pages really don't have any 'memory'. Cookies tell the server what pages to show the user so the user doesn't have to remember or start navigating the site all over again. Cookies act as a sort of “bookmark” within the site. Similarly, cookies can store ordering information needed to make shopping carts work instead of forcing the user to remember all the items the user put in the shopping cart.

Persistent or tracking Cookies are also employed to store user preferences. Many websites allow the user to customize how information is presented through site layouts or themes. These changes make the site easier to navigate and/or lets user leave a part of the user's “personality” at the site. For Information on session and persistent and tracking cookies, see here

Cookie security and privacy issues

Cookies are NOT viruses. Cookies use a plain text format. They are not compiled pieces of code so they cannot be executed nor are they self-executing. Accordingly, they cannot make copies of themselves and spread to other networks to execute and replicate again. Since they cannot perform these functions, they fall outside the standard virus definition.

Cookies CAN be used for malicious purposes though. Since they store information about a user's browsing preferences and history, both on a specific site and browsing among several sites, cookies can be used to act as a form of spyware. Many anti-spyware products are well aware of this problem and routinely flag cookies as candidates for deletion after standard virus and/or spyware scans.

The way responsible and ethical web developers deal with privacy issues caused by cookie tracking is by including clear descriptions of how cookies are deployed on their site. If you are a web developer and need advice on implentation of cookies and a privacy policy, we suggest you contact marketing specialists who offer search engine optimisation services These privacy policies should explain what kind of information is collected and how the information is used. Organizations using the cookies initiative started by IAB Europe include: Runescape.com : Networkadvertising.org : andAntor

Most browsers have built in privacy settings that provide differing levels of cookie acceptance, expiration time, and disposal after a user has visited a particular site. Backing up your computer with a company like IronMountain.com can give you the peace of mind that your files are safe.

Other cookie-based threats

Since identity protection is highly valued and is every internet users right , it pays to be aware of what threat cookies can pose.

As cookies are transmitted back and forth between a browser and website, if an attacker or unauthorized person gets in between the data transmission, the sensitive cookie information can be intercepted. Although relatively rare, this can happen if the browser is connecting to the server using an unencrypted network like an non-secured WiFi channel.

Other cookie-based attacks involve exploiting faulty cookie-setting systems on servers. If a website doesn't require browsers to use encrypted channels only, attackers can use this vulnerability to trick browsers into sending sensitive information over insecure channels. The attackers then siphon off the sensitive data for unauthorized access purposes. It is important to choose the right fraud theft protection services to protect you personal information.

Key tips for safe and responsible cookie-based Web browsing

Due to their flexibility and the fact that many of the largest and most-visited websites use cookies by default, cookies are almost unavoidable. Disabling cookies will lock a user out of many of the most widely-used sites on the Internet like Youtube, Gmail, Yahoo mail, and others. Even search settings require cookies for language settings. Here are some tips you can use to ensure worry-free cookie-based browsing:

Customize your browser's cookie settings to reflect your comfort level with cookie security or use the cookie cleaner included in Abine's free Privacy Suite.

If you are very comfortable with cookies and you are the only person using your computer, you may want to set long expiration time frames for storing your personal access information and browsing history.

If you share access on your computer, you may want to set your browser to clear private browsing data every time you close your browser. While not as secure as rejecting cookies outright, this option lets you access cookie-based websites while deleting any sensitive information after your browsing session.

Install and keep antispyware applications updated

Many spyware detection, cleanup applications, and spyware removers include attack site detection. They block your browser from accessing websites designed to exploit browser vulnerabilities or download malicious software.

Make sure your browser is updated

If you haven't already, set your browser to update automatically. This eliminates security vulnerabilities caused by outdated browsers. Many cookie-based exploits are based on exploiting older browsers' security shortcomings.

Cookies are everywhere and can't really be avoided if you wish to enjoy the biggest and best websites out there. With a clear understanding of how they operate and how they help your browsing experience, you can take the necessary security measures to ensure that you browse the Net confidently.

http://www.allaboutcookies.org

Online Privacy

Online advertising companies personalize your web browsing experience by being able to offer more targeted ads on the pages you view. Using a number of tools to determine your interests - your search keywords, browsing history, or even social-networking data - they can place the most relevant ads on the pages you view. Most companies do a great job preventing any personal information from being stored or used in any way, but some people still prefer to opt out of their services and avoid being tracked online through the use of "cookies".

Below you will find a list of online tracking companies.

24/7 Real Media

33Across

aCerno

Acxiom (Relevance-X)

Adara Media

AdBrite

AdBuyer

AdChemy

adConductor

Adconion

AdGear

Adify Media

AdInterax

AdJuggler

AdMeld

AdMotion

adnetik

Adnologies

Adperium

Adroit Interactive

AdShuffle

AdSpeed

AdTech

Advertising.com (AOL)

AggregateKnowledge

AlmondNet

AppNexus

Atlas Technology (Microsoft)

BeenCounter

Bizo

BlueKai

BlueStreak

brand.net

BrightRoll

Brilig

BTBuckets

BuySight

BuzzLogic

BV! Media

Casale Media

Choice Stream

CPX Interactive

Crimson Tangerine

Criteo

Dapper

DataLogix

DataXu

Datran Media

Demdex

Dotomi

Double Verify

echoSearch

Efficient Frontier

eXelate Media

Facilitate Digital

FetchBack

Freewheel.tv

Full Circle Studies

Google (DoubleClick)

Groupon

i-Behavior

Infectious Media

interCLICK

Invite Media

Lijit

Lotame

Lucid Media

Magnetic

Maxpoint Interactive

Media6degrees

MediaMath

MediaMind

Mediaplex

Microsoft Advertising

Mindset Media

Navegg

Netmining

NexTag

OpenX

Outbrain

PeerSet

PointRoll

PrecisionClick

PrecisionClick Ads

PredictAd

Proximic

Pubmatic

Quantcast

QuinStreet

Quisma

RapLeaf

Red Aril

Reedge

richrelevance

Rocket Fuel

Safecount

Smart AdServer

Specific Media LLC

SpongeCell Ads

Tatto Media

TellApart

Traffic Marketplace

Travel Ad Network

Tribal Fusion

Triggit

Tumri

Turn

Undertone Networks

ValueClick Media

Vibrant Media

Vindico

Wall Street on Demand

[x+1]

XGraph

Xtend Media

YuMe




Thursday, April 21, 2011

Opt-out of online tracking

It's no secret that advertisers are tracking you online. You can see ads following you from site to site.

It can be very creepy.

There is a lot of buzz about opt-out systems. Most major browsers have anti-tracking technology built in.

However, it will take a while for that to become mainstream.

Today's Cool Site helps you opt-out of tracking now. You can see a list of the tracking cookies on your computer. Plus, you can see what companies haven't started tracking you yet.

You can choose to opt-out of every advertiser. You can also select specific advertisers to opt-out of. Clicking an advertiser link tells you more about it.

The system places an opt-out cookie for each advertiser you select. Those cookies are good for several years. They should keep your activities from being tracked.

Note that this doesn't cover every advertiser out there. Some don't have easy opt-out systems. Additionally, clearing your browser's cookies clears the opt-out cookies as well. You will want to bookmark this site and check back occasionally.

Link: selectout.org

Wednesday, April 13, 2011

Google Apps for Business

TAKE A TOUR

Proven cost savings

Google's web-based messaging and collaboration apps require no hardware or software and need minimal administration, creating tremendous time and cost savings for businesses.

End users can use the familiar Microsoft Outlook interface for email, contacts and calendar as they transition to Gmail and Google Calendar.

A leading research firm found that Google Apps is as little as 1/3 the total cost of competing solutions.

Want to see how much you could save with Google Apps compared to Microsoft Exchange 2007? Estimate your savings

50 times more storage than the industry average

Each employee gets 25 GB for email storage, so they can keep important messages and find them instantly with built-in Google search.

Gmail is designed so employees can spend less time managing their inboxes, and more time being productive. Time-saving features like message threading, message labels, fast message search and powerful spam filtering help employees work efficiently with high volumes of email.

Mobile email, calendar and IM access

With several options for accessing their information while on the go, employees can be productive with Google Apps even when they're not at their desks.

At no extra charge, Google Apps supports over-the-air mobile access on BlackBerry devices, the iPhone, Windows Mobile, Android and many less powerful phones. Learn more

99.9% uptime reliability guarantee with synchronous replication

We guarantee that Google Apps will be available at least 99.9% of the time, so your employees are more productive and so you can worry less about system downtime.**

With synchronous replication, your data and activity in Gmail, Google Calendar, Google Docs and Google Sites is simultaneously preserved in multiple secure data centers. If one data center is unable to serve your requests, the system is designed to instantly fall back to another data center that can serve your account with no interruption in service.

The Radicati Group found that Microsoft Exchange typically has 60 minutes of unplanned downtime per month. Google Apps customers typically experience less than 15 minutes of downtime per month. Read more

Information security and compliance

When you trust your company's information to Google, you can be confident that your critical information is safe and secure.

Google's information security team, including some of the world’s foremost experts in information, application and network security, are focused on keeping your information safe. Google and many other customers trust this system with highly sensitive corporate data. Learn more

Businesses get these customizable security features with Google Apps:

  • Custom spam and inbound mail filtering tools, powered by Postini, to complement powerful spam filters that automatically work with no up-front configuration.
  • Custom outbound mail filtering tools to prevent sensitive information from being distributed, powered by Postini.
  • Custom information sharing rules to determine how broadly employees are allowed to share with Google Docs, Google Calendar and Google Sites.
  • Custom password length requirements and visual strength indicators to help employees pick secure passwords.
  • Enforced SSL connections with Google Apps to ensure secure HTTPS access.
  • Optional email archiving, up to 10 years of retention.

Full administrative and data control

Administrators can deeply customize Google Apps to meet their technical, branding and business requirements.

Integration options let you connect Google Apps to your existing IT infrastructure.

  • Single sign-on API connects Google Apps to your existing authentication system.
  • User provisioning utility and API connect Google Apps to your existing user directory system.
  • Email routing and email gateway support let you run Google Apps alongside an existing email solution.
  • Email migration utility and API let you bring mail from your existing email solution into Google Apps.

System branding and data ownership give Google Apps your look and feel, and ensures customer ownership of employee data.

  • Custom user accounts on your compay's internet domain.
  • Custom logo and colors in the applications.
  • Contractual customer ownership of employee data.

Helpful 24/7 customer support

Google Apps is highly reliable and easy to operate, but support is available for administrators should you need it.

Support options include:

  • Phone support for critical issues
  • Email support
  • Self-service online support
Google Apps also has a deep network of partners ready to help businesses with deployment, data migration, user training, system integration and custom application development. Learn more

Google Docs

TAKE A TOUR

Create documents, spreadsheets and presentations online

Create basic documents from scratch or start from a template.

You can easily do all the basics, including making bulleted lists, sorting by columns, adding tables, images, comments, formulas, changing fonts and more. And it's free.

Upload your existing files.
Google Docs accepts most popular file formats, including DOC, XLS, ODT, ODS, RTF, CSV, PPT, etc. So go ahead and upload your existing files.

Familiar desktop feel makes editing a breeze.
Just click the toolbar buttons to bold, underline, indent, change font or number format, change cell background color and so on.

Share and collaborate in real time


Choose who can access your documents.
Just enter the email addresses of the people with whom you want to share a given document and send them an invitation.

Share instantly.
Anyone you've invited to either edit or view your document, spreadsheet or presentation can access it as soon as they sign in.

Edit and present with others in real time.
Multiple people can view and make changes at the same time. There's an on-screen chat window for spreadsheets, and document revisions show you exactly who changed what, and when. Viewing a presentation together is a breeze, as anyone joined in a presentation can automatically follow along with the presenter.

Google Goggles





Google Goggles lets you use pictures taken with your mobile phone to search the web. It's ideal for things that aren't easy to describe in words. There's no need to type or speak your query - all you have to do is open the app, snap a picture, and wait for your search results.

Google Goggles works better with certain types of queries. Try taking pictures of books & DVDs, landmarks, barcodes & QR codes, logos, contact info, artwork, businesses, products, or text; it can recognize up to three items at a time. Currently, it's not so good when taking pictures of animals, plants, cars, furniture, or apparel.

For the best results when taking pictures, hold your phone in "left landscape" mode, as shown below, and press the on-screen shutter button with your right thumb.

Note: Google Goggles is currently available for Android devices running Android 1.6 and above. It's also available for iPhone 3GS and iPhone 4 devices through the Google Mobile App. To see which version of Android you're running, go to Settings > About phone > Firmware version.

Link: http://www.google.com/mobile/goggles/#text

Firesheep and Blacksheep

FireSheep – A Firefox extension that demonstrates HTTP session hijacking attacks.

Firesheep allowed any user to seamlessly hijack the web session of another user on the same local network. Although such attacks are not new, the ease of use presented by Firesheep brought session hijacking to the masses.

BlackSheep - A Tool to Detect Firesheep

BlackSheep is a Firefox plugin that is designed to combat Firesheep. BlackSheep does this by dropping ‘fake’ session ID information on the wire and then monitors traffic to see if it has been hijacked. While Firesheep is largely passive, once it identifies session information for a targeted domain, it then makes a subsequent request to that same domain, using the hijacked session information in order to obtain the name of the hijacked user along with an image of the person, if available. It is this request that BlackSheep identifies in order to detect the presence of Firesheep on the network. When identified, the user will be receive the following warning message:

http://www.zscaler.com/blacksheep.html