This Blog is not fully developed.Visit again. Thank you

This Blog is not fully developed.Visit again. Thank you


Translate it

Welcome visitor! Please wait till blog loads...

Info

Top 10 Tricks To avoid Getting Adware

10 Tips to Avoid Getting Adware

Adware 
Adware, malware, spyware and viruses can bring your system to its knees. They are detrimental, lowering the performance of your computer. You might need to replace data. You might lose unique files. Keep the nasties away from your computer using these ten simple tips.
1. Use Firefox: Internet Explorer is the most popular browser on the market, controlling over 50% of the market share. The virus and adware creators specifically look for exploitable vulnerabilities within IE because they know that they will receive the best return on investment. Your switch to Firefox prevents some adware from infecting your machine.
2. Scan your PC once a week: Sometimes adware programmers take a sneaky approach. They will set up their programs to run quietly in the background to spy upon your activities. This once a week scan is necessary to remove any of those sneaky bugs.
3. Download from known sites: New sites for installing adware are popping up all the time. If you find something that you want to download, make sure that it is from a known site. A company like Amazon will not steer you wrong, but Bob’s House of Wares might be a little less trustable. If you are not sure whether you can trust a site, perform a quick search.
4. Install Adaware: Ad-Aware is the most popular free adware removal program on the market. It detects, quarantines and removes adware. It searches for other programs which may have been installed, highlighting them in an easy to use interface. This program does not have an anti-virus attached.
5. Do not click on unsolicited email: You are constantly receiving offers to increase this or improve that through unsolicited email. Your curiosity may be killing you, but don’t click on these emails. They accept your click as permission to install adware, spyware and malware on your PC.
6. Install Antivirus software: Installing two programs for virus and adware protection is a smart idea. It caters to the strengths of each program, increasing the overall strength of your antiadware and antiviral campaign. Some of the best antivirus software is free, providing real time protection. Programs to look at would be Avast Antivir and AVG.
7. Don’t install toolbars: Even some reputable sites install custom toolbars. They slow your system down and collect information about your surfing habits. While a toolbar might offer some perks, it may also diminish your experience by dragging your system to a halt. Toolbars from less reputable places install adware and sometimes infect your system outright.
8. Look at your task manager: If anything seems out of place with your computer, take a look at your task manager. This tells you about all of the programs and processes which are running on your computer. Examine the processes tab for anything which you don’t immediately recognize. Perform a web search for unfamiliar processes.
9. Do not click on popups: Clicking on a popup usually spells certain doom for your computer. It opens the door for the viruses and adware that want to infect your machine, telling these malicious applications to make themselves at home. Stay away from those constantly advertised screensavers and icons.
10. Trust your gut: If you don’t feel right about a site, don’t go there. If you are receiving warnings from the antivirus and antiadware programs which you’ve installed, don’t go there. If you don’t like the layout of a site, don’t go there. Trust your instincts about sites.
With proper vigilance, you can keep aggravating adware, spyware and malware from your machine. Trust your instincts. Install Ad-Aware and an antivirus program. Play it safe. The care you spend in preventing adware from infecting your machine can save money and time.

Best ways to Identify SAFE website on INTERNET!

Safe Websites
This Post was not mine friends it was one of my friends.
Anyway sorry for the gap in posts i've been busy these days friends! 
                                                                                                             Here are the Best ways to identify safe websites on the internet.

WOT is a great place to test the reputation of your favorite website. WOT gives real-time ratings for every website based on the feedback that it gets from millions of trustworthy users across the globe and trusted sources, such as phishing and malware blacklists. Each domain name is evaluated based on this data and ratings are applied to them accordingly. For the rating list just visit www.mywot.com . 

2. McCafee SiteAdvisor:

McCafee SiteAdvisor is a free tool that is available as a browser add-on. It adds safety ratings to your browser and search engine results. You can download it fromwww.siteadvisor.com.
3. StopBadware:

Using this tool, you can check whether a given site is said to have involved in malware activity in the past. To check this, gotohttp://www.stopbadware.org/home/reportsearch and enter the URL or domain name of a website and click on “Search Clearinghouse ”. If the search does not return any result, that means the site was never involved in any of the malware activity in the past.

4. Google Pagerank:
Google PageRank is another great tool to check the reputation and popularity of a website. The PageRank tool rates every webpage on a scale of 1 to 10 which indicates Google’s view of importance of the page. If a given website has a PageRank of less than 3, then it is said to be less popular among the other sites on the Internet.
However, PageRank will only tell you how much popular a given website is and has nothing to do with the safety level of a website. So, this tool alone cannot be used to evaluate a website’s safety and other factors.
PageRank feature is available as a part of Google Toolbar. You can install Google Toolbar from http://www.google.com/intl/en_uk/toolbar/ie/index.html.

Ezetop: Top-up Friends & Family



Recharge friends and family around the world! Send mobile top up back home at www.ezetop.com. You can send recharge to over 60 countries around the world to more than 150 carriers! Check back for regular promotions

ezetop enables people living or working abroad to instantly top-up mobile phones of family and friends almost anywhere in the world. Today ezetop offers direct connections to more than 150 international mobile operators across Asia Pacific, Africa, the Caribbean, Central/Latin America and Eastern Europe and is continually adding new operators each month.



Check it out.. and Mail me at asithafine@gmail.com for any clarifications...
Cya.. 

Team Viewer: Share & control your desktop with friends


Hey guys today I will show you how to remotely connect our pc with your friends PC online. By using this trick you can get your friends monitor into your screen, you can access your friend’s computer by just sitting in front of your computer. Amazing huh? yeah it is… even I got amazed :) .Now how to make this possible all you need to do is to just use a software called teamviewer.It will help you to do this


What is TeamViewer ?
TeamViewer is a computer software package for remote control, desktop sharing, and file transfer between computers. The software operates with Microsoft Windows, Mac OS X, and Linux and is able to function while the computers are protected by firewalls and NAT proxy. It is also possible to access a machine running Teamviewer with a web browser. While the main focus of the application is to facilitate desktop support and remote control of computers, collaboration and presentation features are included within the package.
TeamViewer GmbH was founded in 2005 in Uhingen, Germany. According to the company’s press releases, TeamViewer has over 60 million users operating in 50 countries worldwide
TeamViewer establishes connections to any PC or server all around the world within just a few seconds. You can remote control your partner’s PC as if you were sitting right in front of it. Find out why more than 20.000.000 users trust TeamViewer!
The one-stop solution for desktop sharing


What does Teamviewer  do ?
TeamViewer is the fast, simple and friendly solution for remote access over the Internet – all applications in one single, very affordable module:
Remote access to PCs and servers via Internet
Instantly take control over a computer anywhere on the Internet, even through firewalls. No installation required, just use it fast and secure.
Training, sales and teamwork
TeamViewer can also be used to present your desktop to a partner on the Internet – great for team collaboration, trainings and sales presentations.
File transfer, chat and more
Share your files, chat, switch the direction during a teamwork session, and a lot more is included in TeamViewer.

Transfer Money From a Paypal to a Bank Account

hances are, if you work online, then you probably get paid through Paypal. Unless you want to spend all of your income online shopping, or wait for a check from Paypal in the mail, then you will need to know how to transfer money from your Paypal account to your bank account.
  1. Step 1
    Sign in to your Paypal account and wait for the 'My Account" page to load.
  2. Step 2
    Take note of the amount of money that you have in your Paypal account by locating it in the "My Paypal Balance" box below the heading, "My Account Overview." Decide how much of that balance you would like to transfer to your bank account.
  3. Step 3
    Locate the "Withdraw" link on the gray toolbar below the navy blue taps towards the top of the page, and click on the link.
  4. Step 4
    Select the "Withdraw funds to your bank account" option from the options list in the chart in the middle of the page.
  5. Step 5
    Type in the amount of money that you wish to transfer to your bank account from your current Paypal account balance in the amount box in the form XX.XX.
  6. Step 6
    Select the bank account that you wish to transfer the funds to from the drop down menu.
  7. Step 7
    Click the "Continue" button and review the information on the next page to make sure that everything is correct.
  8. Step 8
    Click the "Submit" button and wait for the confirmation page to load. Read the information on the confirmation page. It should let you know once more what bank account the money is going to and approximately how long it will take to be deposited, typically 3 or 4 days.

HACKING Facts


What is Hacking?

Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose.Hacking is the art of exploiting the flaws/loopholes in a software/module.Since the word “hack” has long been used to describe someone who is incompetent at his/her profession, some hackers claim this term is offensive and fails to give appropriate recognition to their skills.

Who is a Hacker?

A Hacker or White Hat Hacker, also known as Ethical Hacker, is a Computer Security expert, who specialise in penetration testing, and other testing methodologies, to ensure that a company’s information systems are secure. Such people are employed by companies where these professionals are sometimes called Sneaker.

Who is a Cracker?

Black Hat Hackers, who may also be known as Crackers, are Hackers, who specialise in unauthorized penetration of information systems. They may use computers to attack systems for profit, for fun, or for political motivations, as part of a social cause. Such penetration often involves modification and/or destruction of data, and is done without authorization. They also may distribute computer viruses, Internet Worms, and deliver spam through the use of bot nets.

Who is a Script Kiddy?

A script kiddy is a wannabe cracker. These individuals lack knowledge of how a computer really works but they use well-known easy-to-find techniques and programs or scripts to break into a computer to steal porn, music files, SPAM, etc.

What skills do I need to become a Hacker?

There is no magic to Hacking, but like anything else that is worthwhile it takes dedication, a willingness to learn.It is most important to have a good knowledge of topics such as Operating system and it’s working,Computer networks,Computer security and of course Programming.It’s not possible to become a hacker overnight.It’s the skill developed over a long time.

What is the best way to learn Hacking?

The best way to learn Hacking is to start learning about the basics of hacking right from now.There are many books about Hacking that are available today.But before you start learning about the details you must have a basic skills of Programming and knowledge of Computer network security.Internet is the best source to learn about hacking.

How do I secure my computer from being Hacked?


Having a basic knowledge of computer security and related topics such as virus,Trojans,spyware,phishing etc. is more than enough to secure your computer.Install a good antivirus and a firewall.



Free Online Storage



1) Windows Live SkyDrive : Windows Live SkyDrive which debuted as Windows Live Folders also offers a pretty good amount of 25GB storage space. It’s more reliable and secured. You have to sign up using your Windows Live Id or Hotmail Id. the best part of it is you can access files from your mobile device as well as you can compress and download all your files as a compressed archive. The files can also be specified as public or private with links for sharing as well.

2) Google : Google’s various services like mail docs and Picasa together contribute to have a storage space of about 10 GB which is constantly increasing. By installing a simple extension we can use 7.5 GB Google’s email space as Hard Disk in our PC. Just install it and follow the instructions given and will show up as a separate hard disk in My Computer. very easy to use

3) Adrive : Adrive is another online file storage service with a whopping 50 GB of free storage and can extended to 10 TB with payment.

4) Dropbox Dropbox can be used as client side software on our PC which offers 2 GB of online storage. Just install the software and drag and drop files to upload. The software will automatically upload all of your files when the computer is idle. The transmission of file data occurs over an encrypted channel (SSL) and all files are encrypted which is an added bonus. It even works with all major mobile platforms. good one

5) Amazon cloud Drive : If you just want a virtual drive for uploading videos, music docs or photos, you can use the Amazon Cloud drive. Your files can be neatly classified into categories in pre-existing folder structures and the service offers 5 GB of free space. However, files above 2 GB in size cannot be uploaded.
6) Others : Although I have listed only the major services here there are plenty of others too like Mozy, 4shared, Esnips, SafeSync, etc.


How To Password Protect Microsoft Word 2007 Files


We all use Microsoft Word to create documents.But there are certain documents that you dont want other people to access specially when you are on a shared computer in your company and you may have your certain secret data stored in your word document that should not be accessed by your boss or other employee’s.To deal with such a situation Microsoft word 2007 integrated a security feature in Microsoft word so that you can password protect your files.The procedure is quite simple .
In this tutorial I will explain you the step by step procedure with screenshots Of How To Password Protect Microsoft Word 2007 Files
  1. Click on the Microsoft Office Button present on the top left corner of the window.
  2. Now Click on the Save As option
  3. image7vy How To Password Protect Microsoft Word 2007 Files
  4. Now a new window will pop up.Click on Tools option at the bottom of the window.
  5. image8d How To Password Protect Microsoft Word 2007 Files
  6. Now you will have two options.You can select either one or both options
  7. One is Password To Open it will ask for the password every time the document is opened.So to view the document you have to enter the password first.
  8. Second is Password To Modify it will ask for the password every time somebody tries to modify the document.
  9. image9n How To Password Protect Microsoft Word 2007 Files
  10. And thats it.


Virus,Worms,Trojan and Spyware


We all have heard the terms Virus,Worms,trojans and spyware but only a few of us know the difference between them.We genreally consider everything that is detected by an antivirus as virus but this is not the case.The antivirus not only provides protection against viruses but it also protects us from trojans,worms and spywares.All these can be harmful to your computer hardware and software.Today I will differentiate all these terms from each other .

Ok lets start from the introduction of viruses
Virus:-A virus is a self replicating program that attaches itself to an executable file.When  the file is executed the virus automatically gets executed and enters into system memory .Once it enters into system memory it either searches for other files that can be infected or stays in the background and infect the files that are uses the virus infected program.
Worms:Worms are very similar to viruses but differ in way that they donot bind themselves to executable files instead  to replicate themselves they uses the network.If you find excessive use of your network bandwidth then you may be infected by a worm.So,a worm donot require a user to execute any file for its execution it can work without user intervention.
Trojan Horse:-A trojan horse is harmful program which may seem harmless to the user before its installation but instead it is programmed or reverse engineered to  facilitate unauthorised remote access to the computer.Trojan’s donot replicate themselves.
Spyware:-A spyware is a program that secretly monitors and collects pieces of information.They usually run in stealth mode and cannot be detected easily.Keyloggers is a great example of spyware software.There are not limited to just spying but can also send data to remote computers

Tips And Tricks To Speed up windows 7


With the launch of windows 7 we have witnessed one of the fastest operating system by Microsoft.But still there are people who want more and more!.This article is for all those people who want to increase the performance/speed of their windows 7 operating system. We are not providing here any softwares for this purpose we are just giving you tips and tricks to tweak your windows 7 according to your needs and you will certainly get your desired performance from your windows 7 operating system.Here is the step by step tutorial with screenshots on how to increase your windows 7 speed .
1.Disable Startup Services
Windows startup services can be found by clicking on start and the and typing “ msconfig ” and pressing enter.Now click on services tab.Now you can disable the unwanted services by checking them and clicking on disable.While this should be done according to your requirements.Services like “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search. “Offline Files,” “Tablet PC Input Services,” Terminal Services,” “Fax” and “Windows Search have a large impact on windows 7 speed/performance.
2.Utilize Readyboast
Microsoft introduced readyboast service with the launch of windows vista and continued the service in windows 7.In ready boast service whenever you plugin your pendrive into your computer you will get an option to use your pendrive to speed up your windows 7 or windows vista.It will increase your windows memory.By using ready boast you can also specify how much memory of the pendrive should be used to speed up your windows 7.
3.Disable Windows transparency
Disabling the windows 7 transparency option will certainty give a good speed to your windows 7 speed/performance.Disabling transparency is very easy in windows 7.Simply right-click on your desktop, select “Personalize,” choose the active theme and then navigate to “Windows Color.” Finally, uncheck the “Enable Transparency” option.
4.Remove Unwanted Programs from Startup
Disabling unwanted programs such as messengers or other programs from startup will not only increase speed of your windows 7 it will also decrease the startup time of windows 7.
5.Disable Unwanted Features Of Windows 7
To disable unwanted features from windows 7 click on “ Start “ then on control panel.Now click on “ Programs “ then on “Turn Windows features on or off”.Now disable the features you think you dont want.We recommend you to disable the “ Indexing Service “ it will have a noticeable effect on the speed.
6.Defragment Your Windows Regularly
Adding and deleting files from drives will make your drives fragmented and it will take longer to access files so defragmenting the drive will decrease file access time.To start defragmentation click on “ Start “ and type “ Disk Defragmenter “ And press enter.Now start the defragmentation.

5 Ways to Make Your Computer Faster (General Tips)

This is a guest post by John Edget. If you wish to write one kindly email me @ asithafine@gmail.com
There are times when your computer could perform slower than normal, while there are times you could just get frustrated and pissed off. Slow computer performance can also alter your productivity output and leave you performing lesser than you would on a normal day.

Your computer isn’t running at the same speed it was when you got it new because a lot of changes have happened between that space of time and now. The more applications, files and folders and even the new documents you create everyday have their impact in making your computer running slow. Following are some ways to quickly recover the normal speed of your computer.

Remove Spyware and Protect your Computer against Viruses

The first thing you should diagnose your slow computer for is virus infection. Viruses can come into your computer so far there is a contact between your computer and other computers – this can also be through the internet.
To battle virus infection, you must have a reliable antivirus program installed on your computer. This antivirus program must be kept up to date, regularly. The most important thing in having an antivirus program is keeping it updated regularly. With my computer which I use for my blog that talks about discounts for weight watchers and bistro md coupon, I have made it a point of duty to see that my antivirus program is of the latest version and I don’t miss an update.

Make access to data easy for your computer

When accessing data on your computer’s hard disk becomes difficult for your system it will result in your computer performing slow. The data on your computer’s hard drive may become cluttered and result in causing your computer to become slow in performance.
In essence, your data are getting cluttered because your hard disk is fragmenting them. To make accessing data on your computer’s hard drive easy for your computer you’ll have to run disk defragmenter on your system regularly. If you use your computer every day, you should defragment your hard disk once every week.

Free up disk space

Another thing you should do to make your computer perform faster is to free up disk space. Over time, you must have saved a lot of files on your hard drive and if you do not remove the ones that are no-longer useful to you, your system will continue to perform slowly.
Start sorting out the important files on your computer from the files you no longer need. Keep you important documents in specified folders to save them from mixing up with old and unused files so that you can easily remove the ones you no longer need from your computer.

Clear up Temporary Internet Files

Temporary internet files are, perhaps, the major elements that contribute to your computer being slow in performance. Clear the temporary internet files your web browsers must have saved on your computer’s hard disk to save more disk space.
You can also limit the amount of your hard disk space your cache will be using to a very minimal amount. This will eradicate every possibility of your temporary internet files taking up too much of your hard disk space. As you can see in the image below, I limit the amount of space my internet cache will be using to 1024MB or 1gb which is still far from the 175MB my cache has used.


Tips to Create a Good Password






One of important problems with passwords is that because we have the tendency of forgetting them, we land up creating some easy password which are prone to be hacked. Its important that our password has enough security as well as its easy to remember.


Here are few simple tips for creating a good password;
Never use your personal information as password- Most of the people have the tendency of using the personal information like date of birth, name, telephone numbers, pet name etc as passwords. Its easy for hackers to get your personal information.


Do not use actual words- Never use actual or real words as passwords, because they are the ones prone to be hacked. In internet world there are lots of tools and softwares for hackers to get the passwords, so its always better to have a combination of words, unless the word itself is long.
Use combination of words and characters- Using a combination of words and characters is the best way to make a good password. Combination of words can be usage of lower case and upper case alphabets, numerics and special characters like ‘_’, ‘&’, ‘.’ etc.


Do not use same passwords for all- Most of us have the tendency of using the same passwords for all the sites for ease of remembering. This is again a wrong concept. Having different passwords gives more security as even if at all one of your password is hacked, other remain safe.
Change your password frequently- Developing the habit of changing your passwords once in a month or two is again a good way to secure passwords. Do not use the passwords again and again, make new passwords while changing old ones.


Use password managers- Password managers are handy tools for remembering and securing passwords. Shankar has reviewed few online password managers.
Use passphrases- Using passphrases, you can create a password which is hard to crack, but easy to remember. Eg: “My Password is not easy to crack”, you can make a password out of this sentence- mpine2c. You can replace ‘to’ with ’2′ and also use a combination of lower case and upper case.


Hope you enjoyed reading these tips, comments welcome.


Boost Your Wi-Fi Signal Using a Beer Can





Boost Your Wi-Fi Signal Using a Beer CanSo internet is used by everyone and if you are @ home you will always want that your whole house is covered by Wi-Fi so that anytime, anywhere you can access it so internet speed is must @ long distance well now you can get some nice Wi-Fi Boosting using a simple and efficient Beer Can well I grabbed this amazing trick from Discovery Channel’s Website and I am posting it on my website.

Follow the below steps to boost your Wi-Fi Network .:

Boost Your Wi-Fi Signal Using a Beer Can1. Empty a Beer can obliviously after drinking that and than you have to make sure that its washed thoroughly so that there is no smell or anything left by that liquid Beer, because if anything's is left than it will be a problem and smell will be there in your whole room.

Boost Your Wi-Fi Signal Using a Beer Can2. Now after washing that Beer Can thoroughly you have to remove that small can opening piece you can see that in the image on the right hand side.

3. Now after you have removed the small can openingBoost Your Wi-Fi Signal Using a Beer Canpiece you can to cut the can in the round diameter like in the image on the right hand side, we are doing this because we have to open that can and make a shape like small antenna.

4. So now you have to repeat the same step on the other corner but Boost Your Wi-Fi Signal Using a Beer Canthis time you have to leave small space between the cuts so that the can remains attached to the bottom and we will have a look of antenna for our modem - router for boosting purpose. So remember this step is really important to follow else your antenna will not look like how it should be.Boost Your Wi-Fi Signal Using a Beer Can
5. So now the main steps are completed, now you have to cut the can vertically from between like in the image on the right hand side. and your antenna will take looks like how it should be and now you only have to attach this antenna to your modem so that we can se its effect.

Boost Your Wi-Fi Signal Using a Beer Can
6. Now last step is too attach this antenna to your modem - router, you can use any adhesive or M-Seal which has really a good hold, so in this step you can change directions of your antenna suiting your will, like in which direction you want it too boost the signal.

7. Now your antenna is ready for boosting purpose and it will look something like below you can check the image below.Boost Your Wi-Fi Signal Using a Beer Can

Charge mobile with Peepal leaves

Its very Strange But True Very True.Now, you do not require any mobile charger to charge your mobiles. Only there is need to use green leaf of peepal tree and after some time your mobile will get charged.

No soon the people came to learn this development, they tested it and found encouraging results. If your mobile has been discharged and you are inside a jungle then you need not to use any charger. You Should pluck two peepal leaves and your workwould be done.

It is very good idea and easy to charge your mobile. You would have to open your mobile battery and connect it with peepal leaf. After that without shaking mobile set you should set the battery in your mobile set. After some time your mobile would be charged.

Though it is unbelievable but as soon as the residents of Chitrakoot came to know about the discovery they could not believe the news. But when they saw it practically then the incident proved true.
Now hundreds of mobile holders are using this technique and charging their mobiles. 

Step by Step guide to charge your mobile battery using Peepal leaf:

1- Open your mobile cover
2- Take out your battery
3- Take two to three fresh leaves of Peepal/Pipal/Ashwattha tree
4- Touch the stub of these leaves on your mobile battery terminal for a minute
5- Clean the mobile battery terminal with the soft cloth
6- Put your battery again in your mobile and switch it on
7- Now you can see the result
8- If required repeat the process with fresh leaves


Phishing "Protect urself" Know What Hackers Do



Phishing continues to be one of the most significant security threats facing Internet users. During 2007, scammers distributed millions of phishing scam emails that targeted many different entities. Phishing attacks are sure to continue in 2008 and scammers will use such attacks to steal money and identities from many new victims around the world. Armed with a little knowledge about how phishing scams work, however, you can ensure that you do not become one of these victims. 
Phishing Scammer
Phishing scammers continue to find new victims all around the world



A phishing scam is one in which victims are tricked into providing personal information such as account numbers, passwords and credit card details to what they believe to be a legitimate company or organization. In order to carry out this trick, the scammers often create a "look-a-like" webpage that is designed to resemble the target company's official website. Typically, emails are used as "bait" in order to get the potential victim to visit the bogus website. The emails use various devious ruses to trick readers into clicking on the included links, thereby opening the bogus website. Information submitted on these bogus websites is harvested by the scammers and may then be used to steal funds from the user's accounts and/or steal the victim's identity.

Phishing scam emails are created to give the illusion that they have been sent by a legitimate institution. Emails may arrive in HTML format and include logos, styling, contact and copyright information virtually identical to those used by the targeted institution. To further create the illusion of legitimacy, some of the secondary links in these bogus emails may lead to the institution's genuine website. However, one or more of the hyperlinks featured in the body of the email will point to the fraudulent website.

Links in phishing scam messages are often disguised to make it appear that they lead to the genuine institution site. The sender address of the email may also be disguised in such a way that it appears to have originated from the targeted company. Because they are sent in bulk to many recipients, scam emails use generic greetings such as "Dear account holder" or "Dear [targeted institution] customer". If an institution needed to contact a customer about some aspect of his or her account, the contact email would address the customer by name.

Phishing scam emails use a variety of ruses to explain why it is necessary for recipients to provide the requested information. Often, the messages imply that urgent action on the part of the recipient is required. Some of the most common ruses are listed below. The scam emails may claim that: 

  • The customer's account details need to be updated due to a software or security upgrade.

  • The customer's account may be terminated if account details are not provided within a specified time frame.

  • Suspect or fraudulent activity involving the user's account has been detected and the user must therefore provide information urgently.

  • Routine or random security procedures require that the user verify his or her account by providing the requested information.
The entire purpose of a typical phishing scam is to get the recipient to provide personal information. If you receive any unsolicited email that asks you to click a link and provide sensitive personal information, then you should view the message with the utmost suspicion. It is highly unlikely that a legitimate institution would request sensitive information in such a way. Do not click links or open attachments in such messages. Do not reply to the senders. If you have any doubts at all about the veracity of the email, contact the institution directly to check.


This article focuses primarily on email based phishing. However, it should be noted that phishing attacks on social networking sites are also becoming more common. Scam messages may be posted as comments or via personal message systems on social networking sites such as Facebook and MySpace. The messages often contain seemingly innocent invitations to click an included link to view images or read member profiles. However, clicking links in these bogus messages will open a fake version of the social networking site's login page. Victims who login to the fake page will be inadvertently sending their login details to scammers who will then have complete access to their accounts.

Generally speaking, people become victims of phishing scams simply because they do not know how such scams operate. You can help by ensuring that friends and colleagues are aware of such scams and what to do about them. The power of such "word-of-mouth" education is substantial. You CAN make a difference by sharing your knowledge of phishing scams with other Internet users.

20 Steps and Tips to Higher Gmail Security


Gmail is the main base or the main workstation for any newbie or oldies. This is used by billions of people all over the world forthe best email service and to protect it is the main reason for anyone to have a look @ this post.
20 Steps and Tips to Higher Gmail Security
Below I just grabbed 20 steps to higher Gmail Security, you might wanna check because Hackers next target can be you can to protect yourself is the main aim of your life. So just all the steps officially by Gmail for protecting your account.
This steps will give you the unbelievable security hence boost your Gmail Experience.

Check below 20 steps to higher Gmail Security .:

1. Check for Viruses and malwares : Well you would be having some good virus scanner but you cannot catch 100% infections with any scanner so to experiment and scan with different and online scanner is a good choice.
2. Operating system should be Up to Date : Updating to official updates may increase your windows security and remove all the holes in it as they release patches to fix vulnerabilities. So its really important to update your system to have more security.
3. Regular Software Updates : as you update windows you think that software's had been updated to but some software's are not updated but they need serious updates to be performed in order to maintain consistency in your system, software's like Adobe Flash, Java etc. need to be updated manually or sometimes they automatically update depends on settings.
4. Brower should be Up to Date : make sure your browser is Up to Date as some security patches are also released for browsers, so make sure to update your browser or set their settings to automatic update.
5. Check Browser Extensions and Plugins : many times there are few plugins or extensions like Gmail manager or something like that which helps you in making some tasks easier so Gmail does not take responsibility for any services like that, so if their service is compromises so is your Gmail Password.
6. Changing Password : if you account was recently hacked and you recovered it somehow the better option is to change your password to some mixed number and alphabets its really important and Gmail recommends changing your Gmail password after 6 months or so to maintain privacy and security.
7. Updating Account Recovery Options : whenever you forget your password you may need to recover it so this will help you in recovering.
  • Recovery Email Address : this send an email when you request a reset for the password on the address you have filled for the recovery.
  • SMS Notification : the another way for the recovery is by SMS you will get SMS containing your code.
  • Secret Question : this option will be enabled if you fail with the above options it will ask you the question what you will enter before your password was lost and you will be able to retrieve your password if you answer right.
8. Turn on 2 step verification : this is an extra layer for security it will send code on your mobile, so that you can sign into your account. This can be enabled in the Google Account Settings.
9. Check list of authorized websites : check the list for the trusted ones because it could happen that they may have stolen our account data to get your username and passwords.
To edit the list of authorized websites:
  • Sign in on the Google Accounts homepage.
  • Click the My Account link displayed at the top right of the page.
  • Click Authorizing applications & sites.This page will list all third-party sites you've granted access to.
  • Click the Revoke Access link to disable access for a site.
10. Use HTTPS Secure Connection : always use HTTPS this helps you from the stealers from stealing your information whenever you access Gmail from Cyber – Café or Hotel or other places.
20 Steps to Higher Gmail Security
11. Check strange recent activity : this can be really useful as Gmail tracks all the iP address on which Gmail was accessed or we say your account was accessed so if you think there was a suspicious activity then you can check that by clicking the Details link @ the bottom like below and click Sign out all the sessions and simply change your password.
20 Steps to Higher Gmail Security

12. Accuracy of Mail Settings : check that all the settings in your Gmail are good accurate like there is no vacation responder on which is automatically replying to all your mails or filters are correctly configured or they will be sending some mails to trash bin etc., so check the settings and correct for the errors.
13. Checking contacts errors : just go to the contacts tab and check all the contacts if you think that there is a problem in some of your contacts just restore them to an earlier time and you will get all the contacts back.
14. Username & Password Recovery Emails : sometimes you may have noticed that you get some emails asking you to enter your username and password so that your email address can be recovered that are all fake and should not be trusted so remember that Gmail will send you that kind of mail so beware of those emails.
15. Beware of Phishing : phishing is a kind of activity in which a fake page is created for the website in order to hack username and password of the victim. So don’t ever enter your username and password after following a link just go directly to Gmail.com in order to access your account.
16. Sharing Password : don’t try to share your password with third party services as Google does not guarantee for any kind of misbehave if done, so better to use different password for Gmail and different for all other services.
17. Friends can make prank : I said don’t share your passwords with friends, but the most important thing is that don’t share your passwords, secret questions with your friends as they can play a huge prank on you.
18. Clear Junk Files : clearing cache, cookies, forms data and passwords is the best way to protect your account fro the strangers hand the best way is to a free cleaner I recommend downloading CCleaner and cleaning all the offline and junk files.
19. Don’t user Stay Signed In : you all know that stay signed in means that until there is a cleaning process done on your computer your account will be accessible if anyone opens Gmail so its always recommended that not to choose Stay Signed In.
20. Signing out is the bets option : always sign out whenever you have completed viewing your emails, this is really important don’t think that you are @ home and o probes if you do not sign out its really important and must be done.
So that’s it I hope my tips are good for all the newbies and professionals these are officially by Google on their Security page I just made them simpler to be read and to be accessed so have Fun and please share this article so that all others can be safe and have a happy tech life.


Possible Ways to Hack Facebook Password



1. Keylogging – The Easiest Way!

Keylogging refers to simply recording each and every keystroke that is  typed on a specific computer’s keyboard. This is possible with the use of a small computer program called keylogger (also known as spy software). Once installed, this program will automatically load from the start-up, runs in the invisible mode and start capturing each and every keystroke that was typed on the computer. 
Some keyloggers with advanced features can also capture screenshots and monitor every activity of the computer. One doesn’t need to have any special knowledge in order to install and use a keylogger. That means, anyone with a basic knowledge of computer can install and use this software with ease. Hence for a novice computer user this method is the easiest way to hack Facebook password. I recommend the following keylogger as the best for gaining access to Facebook account.
Easily Access any Email
SniperSpy (TESTED) is a revolutionary product that will allow you to easily access *ANY* online account or password protected material such as MySpace, Facebook, Yahoo, Gmail or Hotmail. There are absolutely *NO* limitations to what accounts or websites this software can access!

Why SniperSpy is the best?

Today there exists hundreds of keyloggers on the market but most of them are no more than a crap. However, there are only a few that stand out of the crowd and SniperSpy is the best among them. I personally like SniperSpy for it’s REMOTE INSTALLATIONFEATURE. With this, you can install it on a remote computer without the need for having physical access to it. It operates in a complete stealth mode so that it remains undetected.
Here is a summary of benefits that you will receive with Sniperspy software:
1. Access ANY Password
With SniperSpy you can hack any password and gain access to Facebook or any other online account.
2. Monitor Every Activity
You can monitor every activity of the target computer, take screenshots and record chats & IM conversations.
3. Never Get Caught!
SniperSpy operates in a total stealth mode and thus remains undetectable. Therefore you need not have the fear of being traced or getting caught.
4. Remote Installation Feature
With the Remote Install feature, it is possible to install it even on computers for which you do not have physical access. However, it can also be installed on a local computer.
5. Extremely Easy to Use
Installing and using SniperSpy is simple and needs no extra skill to manage.
6. Completely Safe to Use
This software is 100% safe to use since it does not collect any personal information from your computer. SniperSpy is a reputed, trustworthy and reliable company which offers 100% privacy for it’s users.
7. Works on both Windows and Mac
Fully compatible with Windows 2000/XP/Vista/7 and Mac.
So what are you waiting for? If you are really serious to hack Facebook password then SniperSpy is for you. Go grab it now and expose the truth!

2. Phishing – The Difficult Way

The other common way to hack passwords or online accounts is via Phishing. This is the most widely used technique by many hackers to gain access to Facebook and other social networking websites. This method will make use of a fake login page (often called as spoofeed webpage) which will exactly resemble the original one. Say for example, a spoofed webpage of Facebook looks exactly same as that of the original page. This page is actually created by the hacker and is hosted on his own server. Once the victim enters his/her password in such a fake login page, the login details are stolen away by the hacker.
Most Internet users would easily fall prey to such online phishing scams. Thus phishing scams trick users in such a way that, they themselves give away their passwords. But phishing requires specialized knowledge and high level skills to implement. Hence it would not be possible for a noob user (perhaps like you) to attempt this trick. It is a punishable offense too. So, I would recommend that you stay away from phishing and make use of the keyloggers to hack Facebook password since it is the easiest and the safest way.

Facebook Hacking Methods that Do Not Work! 


Today, there are hundreds of scam websites out there that are waiting to rip off your pockets by making false promises. These websites claim to be the experts in the field of hacking and boast to instantly obtain any password for you. Most people fall victim to these websites and lose their hard earned money. Thus the idea behind this post is to expose the truth behind hacking the Facebook (or any email password) so that you can learn how to do it for yourself and stay away from all those scam websites. The following are some of the hacking methods that actually do not work:
1. Many scam websites claim to exploit a certain vulnerability of Facebook website as a means to crack the password. Unfortunately, there is no such vulnerability in Facebook (or any other online account) that can be exploited to crack the password. I advise you to stay away from such scam websites.
2. There is no ready-made software program that is available to hack Facebook password except the keylogger (spy software). In fact, keyloggers are pretty generic and meant to record the keystrokes of a computer which obviously includes the password also. Keep in mind that apart from the keylogger, there is no such program that is specifically designed to gain access to Facebook accounts. Stay away from any website that claim to sell such program.
3. Beware! On many websites and Internet forums you will often see fake articles about Facebook hacking. Most of them will tell you something like this: “you need to send an email to passwordretrieve@facebook.com along with your username and password” (or something similar). Never give away your password to anyone nor send it to any email address. If you do so, you will lose your password itself in attempt to hack somebody else’s password.

I hope this post will help you avoid scams and choose the right approach to accomplish your goal. 

What is CAPTCHA? & how it works



CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.

Captcha


Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.


Hacking Books


Most of us are very curious to learn Hacking and want to become a Hackerbut don’t know where to start. If you are in the same situation, then this is the right place for you.
Everyone can become a Hacker provided they learn it from the basics. So if you wanna become a hacker, then all you need is a good source that will teach you hacking from the basics. There exists tons of books on the market that teach you Hacking but unfortunately, it requires a set of pre-established skills and knowledge to understand the concepts explained in the book. Also these books are not meant the for beginners who doesn’t know anything about hacking. As a solution to this problem we have found two excellent books for the beginners to start their journey as a Hacker.
The good thing about these two books is, any one can understand the concepts presented in the book without the need for any prior knowledge.

I Arjit  recommends the following books for the beginners




1. The Hacker’s underground Handbook

hackers__hackbook
This book is designed for the absolute beginners who are willing to learn Hacking from the basics. This book does not demand any prior knowledge about Hacking. So if you are a newbie to the concept of hacking and want to master it from the basics, then this book is for you.
The information given in this underground handbook will put you into a hacker’s mindsetand teach you all of the hacker’s secret.
The following skills are uncovered in this book
1. You will learn all the hackers underground tricks and learn to apply them in the real world situations.
2. You will be put into a hackers mindset and learn to think like one.
hackers_nightmare3. By Learning how a hacker thinks and acts, you will be able to protect yourself from future hack attacks.
4. You will acquire knowledge nonexistant to 99.9% of the people in the world!
5. This Underground handbook may get you interested in pursuing a career as an Ethical Hacker.

For more information on this book and download details visit the following link

2. The Hacker’s Nightmare

This book is designed for those hacking enthusiasts who have a basic knowledge about hacking and computer security. If you already know a bit about hacking and want to take your knowledge to the next level, then I recommend this book for you. 
This book can also be followed easily by the beginners who have a basic knowledge of the computers and their working. If you are really serious about hacking and want to learn it, then go ahead and grab it.

With this book you’ll learn, in simple jargon-free terms, how to…
1. Root out malware that has already taken up residence in your PC
2. Securely block the pathways hackers can use to gain access to your data
3. Protect against future attacks and infestations
4. Recognize the tricks of the spammers, scammers and eavesdroppers
5. Keep prying eyes away from your sensitive documents
For more information on this book and download details visit the following link
The Hacker’s Nightmare


A Revolutionary Tablet PC by Microsoft


microsoft surface tablet
Surface is another kid in the tablets block currently introduced by Microsoft and will be released soon. developed on the platform of Windows 8 its going to be equipped with every single feature which normally comes in laptop or a bulky PC. So every single productive feature combined, compressed and bundled in a simple elegant and unique style. Its just a tablet and combined with a detachable keyboard you can use it as a laptop.

Features of Microsoft Surface Tablet :

With a Microsoft name joined with this tablet obviously you all are not going to get any inferior product specification else then some less techy features as you might get in iPad by Apple. But still a first step into the tablets market will surely give them some further futuristic knowledge for their upcoming tablets.

Camera : If we talk about the main and the most important feature needed in any tablet or phone or kindle its obviously the camera which people use to share there memories or keep them right for their children's blah blah, well surface obviously comes with a front and back camera which you can use for the recording or video chatting purpose and according to some concept testing carried on this device the quality was also noted as a fine one.

Display : Display is another main characteristic feature in any device which must be checked before purchasing it out and the best part is that this device is 10.6" in size and equipped with a HD technology. Now this will surely deliver some awesome video viewing and browsing experience.

Ports & Slots : Now talking about the tablets you will obviously not get much ports than surface comes with, the most important one is the USB port + SD Card port and both of them are right here available on the Surface. So now attach a USB to Surface and start transferring files right on the go.

Keypad : Working with a touch support you might get some easy working mode but still a need of a fully functional keypad is must, well Surface comes with a cool thin 3mm keypad with a trackpad which you use right attaching to it and it works like a charm.

Casing : Casing is another main thing noted in a tablet as if something misshaping happened than you might have to loose some money from your pocket for its repairing charges. Well Surface comes with a VaporMag casing which is built with a combination of metal and magnesium particles, so its awesomely strong and will surely protect your device out.

Kickstand : Now relaxing out sometime and watching some movies or YouTube video can be a huge problem as you have to hold it out and that can surely give you pain in your brain well but everything kept in mind Microsoft has added a kickstand right behind the tablet which you can open and keep it anywhere and watch movies on the go without any problem.
microsoft surface tablet

Microsoft Surface Tablet First Look :

High Definition Mixed Desktop Wallpapers Download

You can Download 99 Walls Package right to your PC and then apply them one by one and create some natural environment right on your desktop.
nature-rock-wallpaperred-ferrari-wallpaperwhite-cat-wallpaperpizza-wallpaper




Connect with us on Facebook :)

By. HackingUniversity Get this Widget :)