Wednesday, April 22, 2009

5 Myths about Internet Safety

 

Internet Safety” the term has been getting vague with the increasing virus outbreaks now days. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 5 Myths about safe surfing over internet.

Myth 1 - I don’t keep important things on my PC, so I don’t have to worry about security. Your PC can be infected over internet

Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is  stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 - I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.

Wrong. You are a target,If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks.

Myth 3 - I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail

Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 - I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

Myth 5 - My system came with an Anti-virus package, so I’m protected.

Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest  threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patches.

Continue Reading»

Saturday, April 11, 2009

download free softwares without paying a single penny

   download

Got hooked up looking up for softwares here and there and that also for free.Now you don't have to panic anymore looking up for the essential software you required urgently.

 Now..few clicks and the setup of your required software is in your hard disk and also for absolutely free.

Here are some of the free software provider links which surely will help you at times when none of your friends are ready to provide you the setup for free

www.soft32.com
www.filehippo.com
www.brothersoft.com
www.download3k.com


Enjoy downloading Continue Reading»

Wednesday, April 8, 2009

View Many Firefox Tabs at Once With Split Browser



Is your Firefox browser cramping your style? Split Browser just might be able to help. This free add-on lets you split the content area of your browser into as many windows as you'd like, allowing you to see more information at once.


Related link: View Many Firefox Tabs at Once With Split Browse

Continue Reading»

Fun With Google Suggest


Google tries to guess what you're searching for with Google Suggest, but some of its suggestions are downright weird.



Google Suggest is a
Google Search feature that automatically completes a search query with suggested phrases as you type in the Google search text field. Suggestions are meant to be helpful--but they can sometimes be funny, bizarre, or downright creepy.


Related links: Fun With Google Suggest Continue Reading»

View Admin At welcome screen




By default windows XP doesn't show the Administrator in the user list a the welcome screen.
here's the way to get around it.


Go to Start-->Run-->Type regedit , then enter


Now head up to HKEY_LOCAL_MACHINE\Software\Microsoft\windowsNT\Current Version\Winlogon\SpecialAccount\Userlist


Create a new DWORD entry and name it as administrator and change its value to 1.


Exit and reboot for the changes to take effect.

to change it back change its value to 0 or simply delete the key.


Continue Reading»

Tuesday, April 7, 2009

Now, a robot vacuum cleaner that senses human emotions



London, March 29 (ANI): University of Calgary researchers have announced the invention of a specially-equipped robot vacuum cleaner that can sense human emotions.

The scientists say that the Roomba robot vacuum cleaner uses a special headband to capture bioelectric signals from the forehead of a human user, and then infers stress from muscle tension readings.

The system involves a control software programme that reinterprets natural muscle tension as estimating the user's stress level, they add.

"Two distinct robotic behaviours corresponding to two extreme emotional states, either relaxed or stressed, are triggered when the stress reading reach a threshold. Robot actions are then influenced by these stress readings. When a person shows high stress (~levels 3 and 4), the robot enters its cleaning mode but moves away from the user so as not annoy them. When a person is relaxed (~level 1), the robot (if cleaning) approaches the person and then stops, simulating a pet sitting next to its owner. If the reading is in between these two levels, the robot continues operating in its current mode until the stress reading reaches a threshold," New Scientist magazine quoted the researchers as saying.

Telling about the unique feature of this system, the researchers said that the robot's behaviour is controlled by human emotion instead of any explicit commands.

The university team have described the new system in a paper titled 'Using Bio-electrical Signals to Influence the Social Behaviours of Domesticated Robots'. (ANI)



Continue Reading»

Phone With 30 Days Battery Standby @ Just Rs 2,499


Wednesday, April 01, 2009: Micromax has launched a phone with 30 days battery standby for the first time in India. Micromax X1i is a sleek handset with 13mm thickness. The phone also features music player, expandable memory upto 2GB, dust resistant keys, theft track with remote access, blacklist option, voice recorder, speed dial, and hands free support.


Rahul Sharma, chief operating officer, Micromax, said, "Mobile phone has become an indispensable part of our daily lives. Micromax X1i is truly mobile as it empowers the user to stay connected all through the day for seamless execution of his daily work. The consumer is freed from the hassle of frequent mobile battery charging."

Micromax X1i comes at an introductory price of Rs 2,499. It is also available with some irresistible deals.




Continue Reading»

Monday, April 6, 2009

Installing a Keylogger on a Remote Machine


I will show you how to install a Keylogger on a Remote PC without the knowledge of the owner and you will get all the keystroke information through Email.

Note: This article is for educational purpose only and the author won’t be responsible for any kind of damage caused by following the information given in this article.

Now to install a Keylogger on a Remote Computer you have to follow the steps given below:

1. First of all download Winspy keylogger software from link given below:


2. After downloading this software, run the .exe. You will be asked to register yourself where you will be asked to enter a Userid and Password. Remember this password as it will be required in uninstalling the software.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software




4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.



5. Now, Winspy’s main screen will be displayed as shown in image below:



6. Select Remote at top, then Remote install.

7. On doing this, you will get a popup box as shown in image. Now, fill in the following information given in bullets below.



  • User - type in the victim’s name
  • File name - Name the file to be sent. Use the name such that victim will love to accept it.
  • File icon - Keep it the same
  • Picture - select the picture you want to apply to the keylogger.
  • Email keylog to - Enter your Email address. Hotmail and Yahoo doesnot accept Keylog Files so enter other email address.
Thats it. This much is enough. If you want, can change other settings also.


8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Myspace account password.

So guys, I hope you have got the trick on how to hack any email account passwords from this article. If you have any comment or views about article, feel free to mention it in comments section.



Continue Reading»

How To Blog: A Beginner's Blog Publishing Guide




How to blog
is something that a lot of us old hands take for granted, but for the beginner it can seem like a daunting tangle of questions and issues to be resolved. In this guide, I have gathered all of the essential resources you'll need to get started.
Here's how:

Related link: A Beginner's Blog Publishing Guide
Continue Reading»

Five Best Image Editing Tools



Long gone are the days where snapshots came back from the photo lab and disappeared into albums and shoe boxes. Now, digital photos are tweaked, adjusted, and remixed in ways their analog counterparts couldn't imagine.

So to give the digital images a good make up..the best five image editing tools according to the polls are....

1)Picasa (Windows/Mac/Linux)

2)GIMP (Windows/Mac/*nix)

3)Adobe Photoshop (Windows/Mac)

4)Paint.net (Windows)

5)Adobe Lightroom (Windows/Mac)




related link: best five image editing tools Continue Reading»

Sunday, April 5, 2009

Hacking windows SEND TO menu.


How often do you copy songs from a CD? or some photos from a CD?

What do you do?You select the required files and do a CTRL-C. Open the destination folder and do a CTRL-V.

Here is something you can benefit form.Customize your SEND TO menu.

This is very simple as eating a piece of cake and you can create your own BASKET.


1)First you'll need to access to Hidden Files.So you change your view setting to make all hidden files visible Tools-->Folder option-->View(tab)and select the show hidden files and folders.

2)Go to C drive:/documents and settings/(user name)/send to

3)Open up My computer and locate your most used folders.

4)Create a shortcut of the most used folders in SEND TO folder.You can do this in a number of ways.
Right click-->send to desktop(create shortcut) and move the shortcut from the desktop to the SEND TO folder.

Copy the most used folder and go to SEND TO folder and click Right click-->paste shortcut.

5)Done.
Continue Reading»

Multiple login in yahoo without any software



You can login with multiple id's on the same yahoo messenger without any download or patch.
Just follow the easy steps given:


1)Go to Start-->Run..Type regedit , then enter

2)Navigate to HKEY_CURRENT_USER--->Software-->yahoo-->pager-->test

3)On the right page,right click and choose new dword value.

4)Rename it to plural

5)Double click and assign a decimal value to 1.


Its Done!!!
Now close registry and restart yahoo messenger and try multiple login. Continue Reading»

Make Autorun file for your CD/DVD



If you wanna make a autorun file for that CD you are ready to burn just read this...

1) You open notepad

2) now you write: [autorun]
OPEN=INSTALL\Setup_filename.EXE
ICON=INSTALL\Setup_filename.EXE

Now save it but not as a .txt file but as a .inf file.

But remember! The "Setup_filename.EXE" MUST be replaced with the name of the setup file. And you also need to remember that it is not all of the setup files there are called '.exe but some are called '.msi

3) Now burn your CD with the autorun .inf file included.

4) Now set the CD in you CD drive and wait for the autorun to begin or if nothing happens just double-click on the CD drive in "This Computer" Continue Reading»

ShareThis