Thursday, March 29, 2012

Downloading And Installing Windows 8

Finally the wait is over. The beta version of Windows 8, also known as the “consumer preview version” of Windows 8 is now available for download. The good news is that the system requirements for the installation is very much similar to that of Windows 7, this means that Windows 8 Consumer Preview works great on the same hardware that powers Windows 7.
System Requirements:
  • Processor: 1 GHz or faster
  • RAM: 1 GB (32-bit) or 2GB (64-bit)
  • Hard disk space: 16 GB (32-bit) or 20 GB (64-bit)
  • Graphics card: Microsoft DirectX 9 graphics device or higher
Windows 8 is also a touch-based operating system and primarily aims to power a new wave of tablets and PCs designed to counter Apple’s iPads and other tablets in the market. It is obvious that to use this feature, you need a tablet or a monitor that supports multitouch.
Installing Windows 8 Consumer preview version (Beta version)
Windows 8 doesn’t have the traditional “Start” menu, and applications are spread across a mosaic of tiles in a design Microsoft calls “Metro”. The tiles, which resemble road signs, can be navigated with a finger swipe on the screen or with a keyboard and a mouse.
I know you are excited and want to know more about this OS. So before you begin with the installation, you can quickly know more about Windows 8 below:
Watch this video: http://www.youtube.com/watch?v=yD7UHLfmj-A

Download Windows 8 beta:

To get Windows 8, you will first need to download Windows Setup which includes an optimized download and built-in tools for creating an ISO or bootable flash drive. Alternatively, you can also directly download an ISO image of windows 8 here.

Official Download Page: http://windows.microsoft.com/en-US/windows-8/download

Windows 8 Installation:

There are 2 ways, you can install windows 8 on your System:
  1. Installing as a Upgrade to your previous Windows version
  2. Installing as a fresh copy of windows alongside older version of Windows (Dual boot)
Though “Installing as a Upgrade” option is quite simple and straight forward, It is advisable that you Install it alongside your previous version of Windows. i.e install it on a different partition or Drive.
If you are a XP or Vista user and your planning to upgrade to Windows 8 on top of Windows XP or Vista then please note: only the user files will be preserved but not the software programs that you may have installed on the disk. So the obvious choice for XP or vista users is to install Windows 8 on a different partition (Dual boot).
Installation:
  1. Run the Windows 8 Consumer Preview Setup program.
  2. Setup will automatically check your PC to see if it is running a 32-bit or 64-bit version of Windows and provides you with the correct download.
  3. With built-in download manager you start, stop, and resume the download at any time.
  4. Once Windows 8 is downloaded, you can now choose how and when to install it.
  5. You can install on the current drive or you can even make an ISO bootable DVD or bootable flash drive of Windows 8 for installing on another partition or another PC.
It is highly recommended that you choose to install it on another partition by using the built-in tools for converting an ISO image into installation media, such as a DVD or USB bootable flash drive.

What Is A Zombie

-What is zombie?

 

zombie is a type of computer virus that infects your PC and causes it to send out spam emails, for a spammer. The spammer controls and uses your pc without you knowing it. Spammers may be using your computer to send unsolicited — and possibly offensive — email offers for products and services. Spammers are using home computers to send bulk emails by the millions. The Zombie is planted on hundreds of computers belonging to unsuspecting third parties and then used to spread E-mail spam and because of this it becomes very difficult to Trace the zombie’s creator. Zombies can also be used to launch mass attack on any company or website.

-How do I prevent my computer becoming a zombie?

 

Control What you Share: Spammers collect e-mail addresses from chatrooms, websites, and nowadays especially Social Networking websites. So you got to be very careful about what you share, whom you add as friend, and what you explore on Facebook. Never Scrap your Phone number or home address on facebook, this gives rise yet another big thing “Identity theft”.

Never open unknown emails: Be cautious about opening any attachment or downloading any files from emails you receive. Don’t open an email attachment — even if it looks like it’s from a friend unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what it is.

Use a Good Antivirus software: and keep it up to date. Look for anti-virus software that recognizes current viruses, as well as older ones. I always Recommend use AVG Free edition or Avast

Facebook users Beware of Hot Girls around wanting to date you! – Facebook Stalker


Last week i received a ‘Friend Request’ from an UNKNOWN hot Girl and being Stupid i quickly added her. and guess what, this Girl turns out to be a Professional Spammer. After i added her the girl started messaging me frequently saying hi! hello! and i also started responding her casually. and then one day she messaged me saying, she wants to send me her private pictures and for this she needed my email address. the thing is she could have easily got my email from my profile but instead she wanted to make sure that i am active on that email ie she wanted my primary email.
I have also seen some people commenting on her photos and scraping cell numbers and even their home addresses,.. people are crazy. You can read the full message below. Ofcourse i didn’t respond her Back but if at all i had responded her with my email, lets see what would have happened. No doubt the Girl is doing this for her own Benefit.
Facebook users Beware of Hot Girls around wanting to date you Facebook Stalker
Once i send her my email address, she will email me with a virus program or a link containing virus. at this moment i will think that this is something of my interest and i would click that link or install that program. Since i installed the program, My computer will now act as a Zombie and in turn i will mail a copy of this email to all my Contacts automatically. In Short the girl just used me to spread E-mail

NSA Building the World's Biggest Spy Center ever


Forget NASA, CIA, FBI or any other agency that can intercept your calls,emails and internet connections.In Bluffdale ,USA National security Agency is busy building the largest Spy center in the history of the world.The immensely secretive and high-priority project is to be completed in 2013.This will make NSA the largest, most covert, and potentially most intrusive intelligence agency ever.



The center will serve the purposes of NSA which are related to communications between humans as well as machines.It will have the power to intercept,decipher,analyze and store mammoth data collected from satellites,optical fibres and local and international networks.The under construction $2 billion center will be capable of storing contents of private emails,cell phone calls and messages,Google searches and activities on social networks.Besides these it will have all sorts of personal data-trails parking receipts,bookstore purchases and other digital “pocket litter.”

 Accoding to a senior security official,who until recently was involved with the program “this is more than just a data center.It is also critical for breaking codes”.He went on to say , code-breaking is crucial, because much of the data that the center will handle—financial information, stock transactions, business deals, foreign military and diplomatic secrets, legal documents—will be heavily encrypted. According to another top, the agency made a huge breakthrough several years ago in its ability to cryptanalyze, or break, unfathomably complex encryption systems .

Is It Possible To Crack A Facebook Account?

We have discussed alot about popular password cracking methods such as Bruteforce, Dictionary attack and Rainbow tables. However a question I get asked frequently is if it's possible to crack a Facebook account. So I wish to clear concepts related to Hacking/Cracking Facebook accounts. First of all "Hacking a Facebook account" and "Cracking a facebook account" are both different terminologies.

Hacking a facebook account refers to foolproof methods such as Phishing, keylogging, Social engineering etc.
However the terminology cracking refers to the methods such as Bruteforce, Dictionary attacks etc.

Brute Force Attacks


Bruteforce is one of the most common and most reliable password cracking methodologies. A bruteforce attack tries all possible combinations against the medium, until the correct password is found. However the problem with a bruteforce attack is that as the password complexity increases, the time taken to crack a password also increases.

The chart above illustrates the time the estimated time taken by a computer in order to bruteforce a password, assuming that if it's capable of trying 10,000 passwords per second. However, the time taken can be reduced by adding the number of processors to the task. Therefore the only flaw with the attack is that it requires lots of potential. 



Dictionary Attacks

The only difference with a bruteforce attack and Dictionary attack is that "A Dictionary attack tries the passwords which we want it to try". Confusing?. In a dictionary attack we have the freedom to choose a huge list of words that people commonly use in their password (Depending upon the situation). The following video will help you understand more about Dictionary attacks.



Is It Possible To Crack A Facebook Account?


Coming back to the main topic of this article. A few hours back while I was watching hacking related videos on securitytube.net, I came across to a video in which the hacker claimed that one can use "Hydra To Crack A Facebook Password". However here is why a bruteforce attack won't work against a facebeook account.




Facebook and all other popular social networking websites lock an email account, after few unsuccessful login attempts. They either have introduced an "Account Lockout Feature" or they either have introduced an "Account Lockout" feature, which prevents an automated password cracking method to work. However, even if you get it working, A minimum facebook password length is about 6-characters. kindly refer to the chart and find out your success rate.

Likewise, if you have any questions, Feel free to ask.

Hacker Arrested For leaking 6 Million Passwords

The Chinese Police has arrested a suspect, nicknamed Zeng, who was nabbed in Wenzhou east China's Zhejiang Province, on February 4 after an investigation into the case. He is reported to have stolen around 6 million passwords from China's software developer network. He is in police custody on charges of illegal data acquisition. According to the officials the leaked information contained ids, passwords and other personal information in plain text.

Looking at the hacked information the police officials were sure that the data was hacked before July 2010. Zeng got caught because he himself had once posted that he has gained the control of the CSDN database and wanted to contribute for the website. He has accepted that he entered the database through a system loophole.

After the arrest, the Beijing Police has punished CSDN for keeping poor security of the database. CSDN has announced that its database has been completely secured since September 2010 and the customers need not fear of another security breach.

Make money with Google Adsense fast Tips and Tricks

One of the foremost popular ads publishing programs on the web Google Adsense.

Almost any site which opens nowadays with the "Ads by Google" on the left or the proper or bottom of the page.

Sometimes, it's right in the middle. every time you click on the announcement, are paid a nominal fee official web site of the advertiser, through the Google AdSense.

Every day, countless bucks that acquire clicks from the AdSense program through billions of pages viewed.

This makes Google AdSense is that the most well liked pay per click (PPC) in the world nowadays.

Can be got every click varies from many cents up to ten or twenty bucks.

Can be relevant specialised content for bound specialised words to pay is very high.

But merely creating a website with these words and place AdSense ads pay rise which will not work.

Must embody a site with valuable information for this is often the reader.

Only then will generate enough traffic and ad clicks true. If you click your own ads or raise your friends on your behalf or deliberately knock the supervisor of the AdSense ads to your web site before you'll be able to say "click fraud!

Therefore, you need to create a website or blog on the topic you wish, which is additionally commercially viable - there must be some advertisers who need to put ads on your pages.

Adsense bots realize sites on the web on a daily basis, and then place ads relevant to the content.



You can grab the domain with Godaddy is cheaper, get a site for a year solely $ 6.99.

Then all you would like is hosting, and you'll be able to get this Webhostingpad, which are cheaper on the web and supply the most effective services.

you'll be able to create simple|a straightforward} blog in three easy steps.

Then read on this subject and write original content. there is little question to remind the relevant keywords for your content.

Next, generate traffic to your web site email your blog link to your friends and raise them to forward it.

Sites to link to their friends, in addition as participation in relevant forums.

The use of traffic control on the web, as www.Sitemeter.com to verify the number of pages and visits you get on a daily basis.

On your account page in AdSense also tell you ways several clicks you have done a lot, and the way they earn.

You can get to pay through various means, as described in the pages of your account.

AdSense program is additionally good advice regarding how to place ads for maximum profitability.

Start up your blog or site, and the power that Google AdSense!

Top five tips to follow to form money with Google Adsense quick

There are some blogs have been published on the internet, but we've got to understand some tips and tricks on this subject. and will write simply and watching for the arrival of traffic alone doesn't work if you're extremely interested in creating money with Adsense.



The problem is that just about all areas during which we tend to write within the blog we've got better content and a lot of helpful elsewhere on the internet, and most of the traffic comes through the AdSense revenue that you simply receive traffic from search engines. ought to develop an idea to increase their ability to earn income. you can follow these five simple steps to increase your AdSense revenue ...



1) the utilization of social bookmarking sites to spread the blog and your post. you can realize several of them in socialmarker.com. This produce traffic to come to their jobs and increase search engine indexing of their own.

2) research word for their content. so that you can solely use the tool from Google AdWords, KeywordSearchExternal. simply type "Adwords KeywordToolExternal" in Google search and find the link.

3) put in the maximum amount as words (the highly competitive pay, and low) on the content. but use caution so that its contents appear authentic. Use keywords are also some ways not feasible may be a problem for you and search engines will create your content as spam.

4) choose the world of ​​research lots of attention as it should, and an inventory of topics you would like to put in writing.

5) this can be in all probability the toughest thing you can do. However, i feel that if you follow the steps listed on top of shouldn't be too difficult to try to to thus and that i have used these steps and already found a big boost in revenue from AdSense to my account.

Sunday, March 25, 2012

Facebook founder Mark Zuckerberg's facebook fanpage hacked

Facebook founder Mark Zuckerberg's facebook fanpage www.facebook.com/markzuckerberg gets hacked.

Hackers post on page "Let the hacking begin: If Facebook needs money, instead of going to the banks, why doesn't Facebook let its users invest in Facebook in a social way? Why not transform Facebook into a ‘social business’ the way Nobel Price winner Muhammad Yunus described it? http://bit.ly/fs6rT3 What do you think? #hackercup2011

The #hackercup2011 references to Facebook's Hacker Cup, an hacking competition that award prizes to people who compete in algorithmic programming exercises centered around Facebook's services. Thehttp://bit.ly/fs6rT3 link points to the Wikipedia page for "social business,"

this post got more than 1,800 likes and 500 comments before it was deleted. Facebook has now taken the entire page offline. You will not be able to access to page. but here is the screenshot.


Saturday, March 24, 2012

Cool Instroduction To Web Proxy Servers

Web Proxy Servers: Web Proxy Servers are those Proxy servers which only serves the HTTP traffic. These are mostly used in Schools, organizations and corporate world to block websites on the base of URLs. All the proxy websites which we used to access some other websites in order to hide out IP address are called web proxy servers.But Web Proxies are some thing wider than we think. It can be the combination of some other type of proxy servers. A web proxy can also do the job of a cache proxy server to cache the recently requested pages to serve those pages next time from the cache.


Transparent Proxy: These are the simpler type of proxy servers which keeps every thing transparent identifies itself as a proxy server . It reveals the IP address of the Proxy server and the IP address of the client who is using the proxy. These proxies are used to get around the simple IP ban but it do not provide the anonymity.


Anonymous Proxy: These type of Proxy servers identifies itself as a proxy server and reveals the ip only of the the server. This hides the IP of the client who is using the server. This type of proxy server is detectable, but provides reasonable anonymity for most users.


Elite Proxy: These are the most advanced proxy servers which do not identifies iself as a proxy server. So it is hard to detece whether the request is coming from the proxy server of coming from the original users. It provides an advance level of anonymity. These servers are usually paid and available only after paying. Hackers used this type of proxy servers for high profile hacking. These are also called High Anonymity Proxy servers

10 Ways To Speed Up XP

1. Disable Indexing Services

Indexing Services is a small little program that uses large amounts of RAM and can often make a computer endlessly loud and noisy. This system process indexes and updates lists of all the files that are on your computer. It does this so that when you do a search for something on your computer, it will search faster by scanning the index lists. If you don't search your computer often, or even if you do search often, this system service is completely unnecessary. To disable do the following:

1. Go to Start
2. Click Settings
3. Click Control Panel
4. Double-click Add/Remove Programs
5. Click the Add/Remove Window Components
6. Uncheck the Indexing services
7. Click Next

2. Optimise Display Settings

Windows XP can look sexy but displaying all the visual items can waste system resources. To optimise:

1.Go to Start
2. Click Settings
3. Click Control Panel
4. Click System
5. Click Advanced tab
6. In the Performance tab click Settings
7. Leave only the following ticked:
- Show shadows under menus
- Show shadows under mouse pointer
- Show translucent selection rectangle
- Use drop shadows for icons labels on the desktop
- Use visual styles on windows and buttons

3. Disable Performance Counters

Windows XP has a performance monitor utility which monitors several areas of your PC's performance. These utilities take up system resources so disabling is a good idea.

To disable:

1. download and install the Extensible Performance Counter List
2.Then select each counter in turn in the 'Extensible performance counters' window and clear the 'performance counters enabled' checkbox at the bottom.button below.

4. Speedup Folder Browsing

You may have noticed that everytime you open my computer to browse folders that there is a slight delay. This is because Windows XP automatically searches for network files and printers everytime you open Windows Explorer. To fix this and to increase browsing significantly:

1. Open My Computer
2. Click on Tools menu
3. Click on Folder Options
4. Click on the View tab.
5. Uncheck the Automatically search for network folders and printers check box
6. Click Apply
7. Click Ok
8. Reboot your computer

5. Improve Memory Usage

Cacheman Improves the performance of your computer by optimizing the disk cache, memory and a number of other settings.

Once Installed:

1. Go to Show Wizard and select All
2. Run all the wizards by selecting Next or Finished until you are back to the main menu. Use the defaults unless you know exactly what you are doing.
3.Exit and Save Cacheman
4.Restart Windows

6. Optimise your internet connection

There are lots of ways to do this but by far the easiest is to run TCP/IP Optimizer.

1. Download and install
2. Click the General Settings tab and select your Connection Speed (Kbps)
3. Click Network Adapter and choose the interface you use to connect to the Internet
4. Check Optimal Settings then Apply
5. Reboot

7. Optimise Your Pagefile

If you give your pagefile a fixed size it saves the operating system from needing to resize the page file.

1. Right click on My Computer and select Properties
2. Select the Advanced tab
3. Under Performance choose the Settings button
4. Select the Advanced tab again and under Virtual Memory select Change
5. Highlight the drive containing your page file and make the initial Size of the file the same as the Maximum Size of the file.

Windows XP sizes the page file to about 1.5X the amount of actual physical memory by default. While this is good for systems with smaller amounts of memory (under 512MB) it is unlikely that a typical XP desktop system will ever need 1.5 X 512MB or more of virtual memory. If you have less than 512MB of memory, leave the page file at its default size. If you have 512MB or more, change the ratio to 1:1 page file size to physical memory size.

8. Run BootVis - Improve Boot Times

BootVis will significantly improve boot times

1. Download and Run
2. Select Trace
3. Select Next Boot and Driver Trace
4. A Trace Repetitions screen will appear, select Ok and Reboot
5. Upon reboot, BootVis will automatically start, analyze and log your system's boot process. When it's done, in the menu go to Trace and select Optimize System
6. Reboot.
7. When your machine has rebooted wait until you see the Optimizing System box appear. Be patient and wait for the process to complete

9. Remove the Desktop Picture

Your desktop background consumes a fair amount of memory and can slow the loading time of your system. Removing it will improve performance.

1. Right click on Desktop and select Properties
2. Select the Desktop tab
3. In the Background window select None
4. Click Ok

10. Remove Fonts for Speed

Fonts, specially True Type fonts, use quite a bit of system resources. For optimal performance, trim your fonts down to just those that you need to use on a daily basis and fonts that applications may require.

1. Open Control Panel
2. Open Fonts folder
3. Move fonts you don't need to a temporary directory (e.g. C:\FONTBKUP\) just in case you need or want to bring a few of them back. The more fonts you uninstall, the more system resources you will gain.

Easy Stuff To Get Serial Numbers You Need

* Go to Google.

* In the search field type: "Product name" 94FBR

* Where, "Product Name" is the name of the item you want to find the serial number for.

* And voila - there you go - the serial number you needed.

HOW DOES THIS WORK?

Quite simple really. 94FBR is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro. By searching for the product name and 94fbr, you guarantee two things. 1) The pages that are returned are pages dealing specifically with the product you need a serial for. 2) Because 94FBR is part of a serial number, and only part of a serial number, you guarantee that any page being returned is a serial number list page.

See these example searches:

"Photoshop 7" 94FBR
"Age of Mythology" 94FBR
"Nero Burning Rom 5.5" 94FBR

How To Speedup Startup In Wndows xp !

Stopping Unneeded Startup Services

Along with the core operating system and programs that Windows XP runs when it starts, there is also a host of services involved. Many of these services are necessary for Windows XP to operate correctly. However, many of them are for features in Windows XP that you may not use at all. You can peruse the services and disable any service that you do not want to run. The fewer services that run, the more quickly Windows XP will boot.

Caution:

Exercise caution when stopping services. If you do not know what a service does or are unsure of the ramifications of stopping the service, leave it alone. Some services are critical to Windows XP's operations, so make sure you understand what the service is before you disable it.

To reduce the number of services that start on bootup, you can access two different areas of Windows XP. The first is the System Configuration Utility. The Services tab shows you the services that start when the computer boots.

You can stop a service from starting by simply clearing the check box next to the service and clicking OK. However, before you do so, there is another way to disable services that you may prefer because the interface gives you more information about the service in question.

Open Control Panel/Administrative ToolsServices or else select Start/Run, type services.msc, and click OK. Either way, you see the Services console.

I prefer to use the Services console instead of the System Configuration Utility because it describes what the service does. Additionally, you can double-click a service and examine its properties.

Notice the Startup Type column in Figure 4-2. This information lists whether the service is automatic or manual. Manual services are only started in Windows XP when you start a process that requires the service. Some other process may require the service that has a "dependency" relationship with it; in this case, the dependency service will start, as well. Because these services do not start automatically when you boot Windows XP, you do not need to do anything with manual services.

However, all services listed as automatic start when Windows XP boots. These are the services that increase boot time. As I have mentioned, many of them are necessary and important, so you should not stop automatic services from booting unless you are sure of the ramifications. You can get this information by looking at the Description column. Here's a quick look at common services you may want to live without:

Automatic Updates: This service enables Windows XP to check the Web automatically for updates. If you don't want to use Automatic Updates, you can disable the service. You can always check for updates manually at the Windows Update Web site.

Computer Browser: If your computer is not on a network, you don't need this service. If you are on a network, leave it alone.

DHCP Client: If you are not on a network, you do not need this service. If you are on a small workgroup, you can still increase boot time by configuring manual IP addresses (which I explore later in this chapter).

DNS Client: If you are not on a network, you do not need this service. If you are, leave it alone.

Error Reporting and Event Log: You don't have to use these services but they can be very helpful, so I would leave them configured as automatic.

Fax: If you don't use your computer for fax services, you can disable this one.

Help and Support: If you never use the Windows XP Help and Support Center (found on the Start menu), you can disable this service.

IMAPI CD-Burning COM: This service enables you to burn CDs on your computer. If you never burn CDs, you can disable the service.

Indexing Service: Your computer keeps an index of files but if you rarely search for files, the service is just a resource hog. You can stop it and turn the service to manual.

Windows Firewall/Internet Connection Sharing: If you do not use these features, you can disable them.

Infrared Monitor: If you do not use infrared devices, you can disable this service.

Messenger: This service sends alert messages on a local area network (it is not the same as Windows Messenger). If you are not on a network, you can disable this service.

Print Spooler: If you do not do any printing from the computer, you can disable this service. If you print, make sure you leave it as automatic.

Remote Registry: This service allows remote users to modify the Registry on your computer. If you are not on a network, you can disable this service.

System Restore Service: This service allows you to use System Restore. If you have turned off System Restore anyway, you do not need to turn off the service. If you do, you turn off System Restore.

Themes: If you do not use themes, you can disable this service.

Windows Image Acquisition: If you do not use scanners or digital cameras, you can disable this service.

Wireless Zero Configuration: If do not use wireless networking devices, you can disable this service.

Part2

You may have a number of other automatic services, depending on software and other configurations on your computer. So it's a good idea to look through the services and learn more about them. If you double-click a service, a Properties dialog box appears

Notice that on the General tab, you see a Startup Type drop-down menu. If you want to change an automatic service to manual, select Manual here and click OK. As a general rule, don't disable a service unless you are sure you will never use it. However, manual configuration allows the service to be started when you find it necessary, thus speeding up your boot time.

However, before you change a service to manual, look at the Dependencies tab (see Figure 4-4). This tab shows you which other services depend upon the service you are considering changing.

Keep in mind that services are necessary for the vast functionality you get with Windows XP. Change only those services that you understand and do not use. How you use your Windows XP computer should be the best guide in terms of optional startup services.

Tip:

The Indexing service and the System Restore service take up a lot of disk space and system resources across the board. You can live without the Indexing service but I suggest that you keep using System Restore. It works great when you are in a bind and this is one case where the loss of speed may not be worth the ramifications of not using System Restore.

Speed Tips and Tricks for Windows XP Startup

Aside from startup programs, services, and the Prefetch folder, there are a number of other startup procedures and issues you can modify to help Windows XP start faster. The following sections explore those tips and tricks.

Manual IP Addressing on Small Office/Home Networks

Windows XP is configured to help you take care of networking. It uses the TCP/IP protocol for networking in workgroups, or what you might call small office or home networks that do not use a dedicated server.

The problem is that automatic IP addressing can be slow. When your computer boots, it has to query the network to see what IP addresses are already in use and then assign itself one. If you want to speed up the boot time a bit, consider manually assigning IP addresses to all computers on the network. This way, the network computers do not have to worry about locating an automatic IP address. Because one is manually configured, the operating system doesn't have to spend time solving this problem.

This isn't a networking book, however, so I won't delve into the implications of using a manual IP address, but if you are using a computer that functions as a host computer to the Internet (using Internet Connection Sharing [ICS]), you can get into connectivity problems if you change the configuration of the IP address. However, you can still work around this problem by starting with the ICS host computer.

Select Start/Connect To/Show All Connections. Right-click your network adapter card and click Properties. On the General tab, select TCP/IP in the list of services and click the Properties button.

In the TCP/IP properties, you can see if you use an automatic or manual IP address. In the example in Figure 4-5, I have configured a manual IP address of 90.0.0.1 and a default subnet mask. The other computers on my office network each use a different IP address in the same class, such as 90.0.0.2, 90.0.0.3, 90.0.0.4, and so on. This way, each computer has a permanent IP address, which helps increase boot time. Note that if you change the IP addresses of your computers, they must all use the same subnet mask. A default subject mask of 255.255.255.0 will keep you in good shape.

Make sure you understand the implications of changing IP addresses on your network. If you have no networking experience at all, you may be wiser to leave the automatic IP addressing as is and try to gain some speed using the additional suggestions in this chapter.

Disabling Recent Documents History

Windows XP includes a feature that keeps track of all recent documents you have opened or used. The idea is that you can select Start/Recent Documents History and quickly reopen any document you have recently used. I use many documents each day and never use the feature myself. In my opinion, I can keep up with what I want to use without Windows XP doing it for me.

The bad thing about Recent Documents History is that Windows XP has to calculate what should be put there each time you boot Windows, which can slow things down. So, if you never use the Recent Documents History, it's a good idea to disable it. Here's how:

1) Open the Registry Editor (select Start/Run, type regedit, and click OK).
2) Navigate to HKEY_CURRENT_USER\Software\Mcft\Windows\ CurrentVersion\Policies\Explorer.
3) Create a NoRecentDocsHistory D_WORD key. Double-click the value to open it once it is created.
4) Set the Data Value to 1 to enable the restriction.
5) Click OK and close the Registry Editor. You'll need to restart the computer for the change to take effect.

Disabling the Boot Logo

You can remove the boot logo that appears when you start Windows XP. This little tweak probably shaves only a few seconds off your boot time but seconds count if you are serious about trying to get Windows XP up and running as quickly as possible. The only negative is that if you remove the boot logo, you will also not see any boot messages, such as check disk. (But if you are not having problems with your computer, this isn't such a big deal.)

To remove the boot logo, follow these steps:
1) Select Start/Run, type msconfig, and click OK.
2) In the System Configuration Utility, click the BOOT.INI tab.
3) On the BOOT.INI tab, click the NOGUIBOOT check box option. Click OK.

Removing Unwanted Fonts

One trick that increases your boot time a bit is to lose any fonts in the Fonts folder in Control Panel that you never use. The more fonts you have, the more processing Windows XP has to do to prep all of those fonts for use. You must be a bit careful here to not remove fonts that you might want, but there is a good chance that you can live without many of them. For instance, you may have foreign language fonts and other symbol fonts (such as Wingdings) that you never use.

To delete unneeded fonts, follow these steps:
1) Open the Fonts folder in Control Panel.
2) Select Edit/Select All and then Edit/Copy.
3) Create a new folder on your desktop, open it, and select Edit/Paste.
4) In this new folder, delete any of the fonts you do not want.
5) Return to the Fonts folder in Control Panel. Right-click the selected fonts and click Delete.
6) Go back to your new desktop folder and click Edit/Select All.
7) Return to your Fonts folder and click Edit/Paste. You now have only the desired fonts in the Fonts folder.

Tip:

You can directly delete fonts from the Fonts folder without creating the secondary folder. However, I recommend the preceding steps to help ensure that you do not make a mistake in the deletion process.

Stopping Remote Assistance and Remote Desktop Sharing

In Windows XP Professional, you have two remote networking features called Remote Assistance and Remote Desktop Sharing. These remote networking features are very helpful in a variety of situations but if you don't use them, it is good idea to disable them to save boot time. You can always enable them later if you want to use them.

Note:
If you are interested in using Remote Desktop or Remote Assistance, see my book Windows XP for Power Users: Power Pack published by John Wiley & Sons.

1) Open the Start menu, right-click My Computer, and choose Properties.
2) Click the Remote Tab.
3) Clear both check boxes to disable Remote Assistance and Remote Desktop.

Part3

Speeding Up the Dual-Boot Timeout

If you dual-boot your computer with Windows XP and another operating system, you see an operating system selection menu on startup. If you typically boot into Windows XP and not the other operating system, you can speed up the dual-boot timeout value so that you do not wait so long for the boot process to select your default operating system and continue with the boot process. The default timeout value is 30 seconds but you can change this setting to 10. This gives you enough time to select the alternate operating system if you want but also speeds up the boot process. You can skip this section if you do not use a dual-boot configuration.

Follow these steps:
1) Locate the boot.ini file on your computer. It is a hidden file by default; mine is located in C:\boot.ini.
2) Open the file with Notepad (which is what opens it by default).
3) Change the Timeout value to 10 (see Figure 4-11).
4) Select File/Save and close Notepad.

Speeding Up Your PPPoE Connection

If you use a Point-to-Point Protocol connection over Ethernet (PPPoE), you may notice a delay in using the PPPoE connection after startup. By default, there is a 120 second delay but you can stop this behavior by manually configuring an IP address for the network adapter card. If you do not use a PPPoE connection, you can skip this section.

1) Select Start/Connect to/Show All Connections.
2) Open the TCP/IP properties for your LAN network interface card.
3) Manually set the IP address on the TCP/IP properties to an appropriate IP address and subnet mask for your network.

Reducing the Wait Time

When you start to shut down Windows XP, it has to quit, or "kill," any live applications or processes that are currently running. So close all applications first. However, some applications and processes are always running in the background. You can reduce the amount of time that Windows XP waits for those applications and processes to close before Windows XP kills them. Edit three different Registry settings to change this:

1) Open the Registry Editor.
2) Navigate to HKEY_CURRENT_USER\Control Panel\Desktop. Select WaitToKillAppTimeout and set the value to 1000.
3) Select the HungAppTimeout value and set it to 1000 as well.
4) Navigate to HKEY_USERS\.DEFAULT\Control Panel\Desktop. Set the WaitToKillAppTimeout and set the value to 1000. Select the HungAppTimeout \newline value and set it to 1000 as well.
5) Navigate to HKEY_LOCAL_MACHINE\System\CurrentControlSet\Contro l. Select the WaitToKillServiceTimeout value and set it to 1000.
6) Close the Registry Editor.

Automatically Killing Tasks on Shutdown

You know the drill. You start to shut down the computer, you wait a few moments, and then you see a dialog box asking if you want to kill an application or service that is running. Instead of prompting you, you can make Windows XP take care of the kill task automatically. Here's how:

1) Open the Registry Editor. ( simply go to run and regedit )
2) Navigate to HKEY_CURRENT_USER\Control Panel\Desktop.
3) Highlight the value AutoEndTasks and change the value to 1.
4) Close the Registry Editor.

Take Care,

How To Lock A Folder Without Any Software Works On XP

To lock a folder ::: Simplest WaY !!!


first select a folder for example i'll use a folder name movies in D drive D:\movies\

in the same drive create a text file and type .{21EC2020-3AEA-1069-A2DD-08002B30309D} movies

and save it as loc.bat

again type in a notepad as {21EC2020-3AEA-1069-A2DD-08002B30309D} movies

and save it as key.bat

now in D drive you can see two batch files loc and key.. when u double click loc the movie folder will change to control panel and when you double click key the control panel will change to normal folder..

Try this out .....

How To Allow Network Access with Blank Passwords

Allowing Network Access with Blank Passwords


Although you can log in locally without a password, by default, WindowsXP Pro does not allow network users to access the computer without a password. Typically you will receive an Unknown error 31 if this is the case.

To change this setting:

1. Run gpedit.msc

2. Go to Computer Configuration / Windows Settings / Security Settings / Local Policies / Security Options

3. Double click on Accounts: Limit local account use of blank passwords to console login only

4. Disable that option

How To Get The IP Address Of Your E-mail Sender

Yahoo !

Log into your Yahoo! mail with your username and password.

Click on Inbox or whichever folder you have stored your mail.
Open the mail.

If you do not see the headers above the mail message, your headers are not displayed . To display the headers,
Click on Options on the top-right corner
In the Mail Options page, click on General Preferences
Scroll down to Messages where you have the Headers option
Make sure that Show all headers on incoming messages is selected
Click on the Save button
Go back to the mails and open that mail.
You should see similar headers like this:
Yahoo! headers : Daniel.
Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
That is be the IP address of the sender!

Gmail


When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender.


Log into your Gmail account with your username and password.
Open the mail.
To display the headers,
Click on More options corresponding to that thread. You should get a bunch of links. Click on Show original

You should get headers like this:
Gmail headers : Daniel
Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is 65.119.112.245.

That is be the IP address of the sender!!
NOTE:=
This will not work if the sender uses anonymous proxy servers.

Hotmail


Log into your Hotmail account with your username and password.

Click on the Mail tab on the top.
Open the mail.

If you do not see the headers above the mail message, your headers are not displayed . To display the headers,
Click on Options on the top-right corner
In the Mail Options page, click on Mail Display Settings
In Message Headers, make sure Advanced option is checked.
Click on Ok button

Go back to the mails and open that mail.
If you find a header with X-Originating-IP: followed by an IP address, that is the sender's IP address
Hotmail headers : Delano ,In this case the IP address of the sender is [68.34.60.59]. This is be the IP address of the sender.
If you find a header with Received: from followed by a Gmail proxy like this
Hotmail headers : Delano
Look for Received: from followed by IP address within square brackets[]. In this case, the IP address of the sender is [69.140.7.58].
Or else if you have headers like this
Hotmail headers : Delano

Look for Received: from followed by IP address within square brackets[].
In this case, the IP address of the sender is [61.83.145.129] .
If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.

Friday, March 23, 2012

Lets say you have a blog post you want to promote.

1 Make a research before, and find two good searched long keywords appropriate to your blog post story.(if you want your traffic to convert)

2 Go to digg and submit your post and in the title put your first long keyword and in the description your other l. keyword

3.Thats it.No need to share your story with friends (even this is better for long term and to reciev traffic from digg to).

After one hour search you keyword and you should see it in the first page of google (if it’s a competitiv long keyword probably on second page, or third)
You should see in your g analytics traffic from digg but basicly is from google

Triple Your AdSense Earnings Or More!

Well, I have done this to some of my micro niche sites before, they seemed to make some profits and so I decided to do it to my forum, it works like magic. I know this method may be obvious, but some people don’t do it as I see sites all over the internet not doing this so maybe it really isn’t all that obvious. It is really simple, I use photoshop for this. So just open your site, copy your site with the ad showing (prt sc/print screen) and then paste in photoshop. Take the eye dropper and get the color around the ad. Click on the primary color palette and it should give you the color hex code (#xxxxxx) its 6 digits. Name just go and edit your Adsense Ad in the CP under Manage Ads and make the background and the border that color. This will blend in the ad making people think they are clicking to another part of your site.

100% Free Unique Content – For all Websites

Ok. Maybe some of you already know this. For those of you who haven’t heard about it yet, here is the thing.

By using google-translator (http://www.google.com/translate ) you can have free unique content for your website regardless what your site is about.
Steps to Follow

1- Find an article about your topic. Just search on google according to your needs.

2- Open the google-translator webpage. Copy and past the article that you’ve found into google-translator.

3- Assuming it is in english. First translate it from english to spanish. Then Spanish to english again. Then from English to French. Then from French to German. Then from German to English.

4- Finally you get unique content for free. The meaning of sentences is very good.
Also it passes the copy*scape check. TESTED. You get free content and you don’t need to pay any money for content creator softwares. It is instant. It is FREE.

Google Adsense Tricks for Webmasters

Google Adsense Tricks for Webmasters

Since its creation, Google Adsense has presented a new and easy opportunity for many webmasters to earn money from their sites. There are many webmasters who make a living from Adsense alone, but there are also many who spend a lot of time trying to figure out the magic Google Adsense trick to earn more from their ads. Finding these Google Adsense tricks might seem difficult but it is definitely not impossible.

Just placing Adsense code on your site is not enough if you are looking at Adsense as your only source of income. One of the most important Google Adsense tricks is to experiment with a lot of different ad formats, placement and choice of keywords.
Whatever topic your site deals with, you should take care to build pages around this specific topic and include your keywords in the content as many times as possible without it becoming redundant. This is perhaps the best Google Adsense trick to ensure that the ads placed on your page, are relevant and useful to the visitors wanting to know more on the topic, and these visitors will eventually end up clicking the Adsense ad.

You should also take care when placing your Adsense ads. If you read through Google help on Adsense, you will find many tested Google Adsense tricks one of which is the heat maps suggesting the best locations for your adverts. It is a proven fact that, one place the visitors look first on the site is the top left position. Since this is the place that will have the visitor’s attention, it definitely helps to place your Adsense ads there.

Another great Google Adsense trick is to place the ads on high traffic pages. You will be able to identify the most visited pages on your site by looking at the logs or even your Google Analytics account, which provides you page by page details of visitors.

You should also use the Adsense formats to make sure your Adsense ads blend with your web pages. Google provides you different palettes to try font colors, backgrounds and borders. There is no point in placing an ad on the page which does not blend with your site and will effectively not be clicked by any visitor.
Another important Google Adsense trick that is often ignored by most webmasters is the Adsense preview tool. Google provides an excellent tool to help you preview the ads that appear on your page. This tool allows you to see the sample ads and formats, preview colors on your page, check the destination of the ads and even see how people in other countries will see your ads.

Besides using the above Google Adsense tricks, it is also important to have a definite focus on what you want to achieve. No matter how busy you are, you should always spare some time to experiment with the Adsense ads to improve the CTR. Whatever experts say, just following the basics, is really the magic of making more from Adsense.

In the last two years John Robert, through much trial and error has finally uncovered the hidden Google Adsense tricks. Learn how you can become a successful Adsense webmaster and get your free Adsense Income Blueprint by visiting www.explosiveonlineprofits.com

Sunday, March 18, 2012

Indian Web Needs Asylum - 112 Indian Websites Hacked in Just 3 Months

According to a report by the Indian news website The Hindu, a staggering one hundred and twelve (112) Indian Government websites were hacked in only three months of time. The report stated that the Government websites have proven to be soft targets for hackers.

“During the period December 2011 to February 2012, a total number of 112 government websites were hacked,” said their Minister of State for Communications and IT Sachin Pilot addressing their Lok Sabha on Wednesday.

Various hacker groups like “H4tr!ck’ have hacked and vandalized websites of their Finance, Health, Human Resource Development ministries and Planning Commission.

The Department of Information Technology and the National Informatics Centre (NIC) that host and control the majority of government websites in India, have claimed to start upgrading their skills to tackle these humiliating attacks from hackers.

It was only last year, when a notorious Pakistani hacker group known as “Pakistan Cyber Army” took down India’s Central Bureau of Investigation (CBI) website and kept vandalizing it for weeks on. This attack was in retaliation of attacks on Pakistani Government and Army websites in late 2010. However, this attack was just another move in this cyber war between the two countries which has been going on for quite a while now.

In this growing age of information both countries face challenges in evolving and coping with the ways of this new way of life.

Saturday, March 17, 2012

BBC Persian TV hacked by Iranian government

According to BBC News, today Iran hacked BBC Persian TV (http://www.bbc.co.uk/persian/) . This is not the first time the Iranian government has tampered with the BBC’s Persian service, Zdnet Report. The Reason behind this attack is part of a broader attempt by the government to disrupt the BBC’s Persian service. This attack follows various tactics by the Iranian government, such as harassment, arrests, and threats against the relatives of BBC Persia correspondents who still live in Iran, in an effort to force the journalists to quit the Persian news service.

In Addition to this, The BBC’s London office was inundated with automatic phone calls and the company’s satellite feeds into Iran were also jammed, while this only affected owners of illegal satellite dishes, these are of course the only ones that can receive the BBC signal in Iran.

The BBC has previously accused Iran of attempting to jam its broadcasts by eliminating VPN networks for example, as well as intimidating its staff.

Google Chrome gets hacked at Pwn2Own



Vupen Security and Sergey Glazunov independently managed to penetrate Google Chrome’s security defenses at the Pwn2Own and 'Pwnium' contests respectively. The annual competition, which invites ethical hackers from around the world to attempt hacking into the most popular web browsers and in the process expose vulnerabilities and loopholes in the browser's security, while grabbing a handsome reward.

At this year's competition, the co-founder and head of research of Vupen, Chaouki Bekrar and his team managed to break into Google Chrome in less than 5 minutes, in the process quashing talks about the browser's unquestionable security. They used "a pair of zero-day vulnerabilities to take complete control of a fully patched 64-bit Windows 7 (SP1) machine." For the successful break-in, Vupen has won itself 32 points.

Google Chrome security knew that the Flash Player plugin sandbox is significantly weaker and that an exploit against Chrome’s Flash Player would have to go through a certain path.Having figured out that Vupen used that technique (from the May video), Google decided to add a specific protection for Flash. The hack qualifies him for one of the top $60,000 prizes that are part of Google’s $1 million Pwnium challenge, and could be the launch of a new security career.

VUPEN co-founder Chaouki Bekrar, an outspoken exploit writer who insisted the team deliberately targeted Chrome to prove a point, was uncharacteristically coy when asked if the faulty Chrome code came from Adobe.”It was a use-after-free vulnerability in the default installation of Chrome,” he said. “Our exploit worked against the default installation so it really doesn’t matter if it’s third-party code anyway.” Bekrar told, Zdnet reports.

IE 9 on Windows 7 was also hacked, again through a complicated hack that had to circumvent the browser’s sandbox. Microsoft, however, may not respond so rapidly, as its quality testing procedure usually takes a few months to fix bugs like these.Safari on Mac OS X Snow Leopard, along with Firefox and IE 8 on Windows XP, was also hacked.

Dutch News Site Spread Malware On Over 10000 Computers

Dutch popular news site NU.nl appears to be serving Java exploit (drive-by malware) to users of IE. Nu.nl has approximately one hour long served the Javascript code that attempted to provide visitors to the news site with a trojan to infect. The attackers made use of servers in India which an exploit kit was placed.

The Ministry of Security and Justice issue a warning for malware yesterday by Nu.nl estimated to have infected 100,000 computers. Erik Loman, developer at security firm SurfRight, made ​​known on Twitter on the front page of the news javascript code 'g.js' was blocked. The code triggered by Loman a nuclear exploit pack on a web server in India was placed.

The exploit script checked the browser and common plugins like Flash and Adobe Reader security hole. If an exploit was found, the server sent the Sinowal-malware, a trojan of Russian origin, which is continuously updated and attempts to steal bank details.

Officials at Nu.nl said that an account for the content management system Wednesday 'has fallen into the wrong hands. They confirm that the malware has been deleted now, Also new login information was distributed to managers and editors.

Friday, March 16, 2012

3 types of popular online attackers

Mikko Hyppönen is a famous cyber security expert and columnist.He is currently working at F-Secure as Chief Research Officer .Hypponen has delivered several high profile talks on various platforms including TED .In one of his TEDx talks he pointed out three types online attacks and why we should worry about them.


 According to Mike Hypponen,the volume of online crime is increasing day by day ,and in future, majority of crime will be in cyber world rather than real world.Online crime is carried out by computer geniuses not dumb thieves of real world.These attacks are organized and planned by smartest people.Security institutions are far behind in this race.


He pointed out three types of online attacks :

1)Online criminals


The first category is online criminals .These are the guys operating with a very clear objective of making money.They use trojans and keyloggers to steal money from banks ,credit cards and websites.

Their presence is grossly underestimated ,no one can estimate how many of them are operating these days.But one thing is for sure,they make millions out of  internet.Few months ago,US intelligence agencies froze a bank account of such criminal name Sam Jain.The authorities found out that his account in Switzerland had $14.9 m already and money  was added to it time to time.The account is freezed now ,but Mr. Sam Jain himself is on the loose.

2)Hackivists -Hacking Activists


This term sprang on blogging  and IRC networks after the rise of groups like Anonymous and LulzSec .These groups are not motivated by money ,they are driven by an opinion or protest.They usually attack state owned properties and institutions and get their protests visibility in the press.

3)Nation States-Governments


Last category is quite unanticipated .Today Governments are involved in launching attacks against other Governments.Most surprisingly they are also using technology against their own people. Hypponen described how a laser printer can be used to track what content citizens are printing .

Apparently printer is not connected to any sort of network ,and it seems that when you buy one,there is no connection between you and company.But the truth is ,every printer is unique and hence identifiable

Whenever a printer prints a page,it leaves an exclusive pattern of tiny yellow dots which are specific for that printer.These dots are barely visible by naked eye.This pattern can be used by experts to tell  from which printer a paper is printed.Hence a printer can tracked ,so can be the user.



6 Tips to Avoid Facebook Virus

Facebook, the biggest social network over 500 million users, provides an interface to hit an unsuspecting crowd with malware and viruses. These viruses aren’t very difficult to detect  if you are cautious enough. These Facebook viruses appear on your wall in forms of a bizarre or eye-catching stories and videos and once the user has clicked/liked the link, it is already late. The next step will be getting rid of your Facebook virus which is a time-consuming  process.  Its better to avoid spam messages and trojan viruses in the first place.


1. Think before you Act.

 Viruses on Facebook are sneaky. The hackers and cybercriminals who want your information know that Facebook users will often click on an interesting post without a moment’s thought. If a post sounds a bit over-the-top like a headline out of a tabloid, this is your first warning sign.

2. Try to avoid Links and videos with Catchy words like  “funniest ever,” “most hilarious video on Facebook,” or “you’ve got to see this.”

 Do some keyword research to see if the post in question comes up in a search engine with information about a current virus or trojan.

3. Check the poster of the Suspicious content.

 If you receive a message from someone you do not know, this is an obvious red flag. Facebook video viruses also tend to pop up in your news feed or on your wall from friends you haven’t talked to in a while. Unfortunately, it’s likely this friend has already fallen victim to the latest virus on Facebook. After clicking on the story themselves, the message was sent out to all of their friends as well.

4 Avoid messages that have been posted by multiple users

as the virus spreads among your friends who were not so cautious. If a link with title such as “Sexiest video ever” shows up all over your feed from all kinds of people (perhaps friends you would not expect to make such a post), this is another warning sign. Similar direct messages are a likely variant of the notorious Facebook Koobface virus which has used this approach in the past.

5. Do not fall for the “typical” money-transfer schemes.

  Chat messages from friends needing funds will usually sound suspicious. Everything can’t be screened before posting, so money transfer scams and hoax applications still find their way on to Facebook. You should also avoid applications that claim to do a full “Error check” or fix security problems related to your profile.

6. Update your anti-virus software frequently.

 If you do accidentally click on a post before realizing it is a hoax, do not click on any further links or downloads. If it’s too late and you have already been infected, the Facebook virus removal process may be effortless if you have a good anti-virus program to catch the virus, trojan or other malware early on.

 



How to secure your network from trojans

A Trojan, sometimes referred to as a Trojan horse, is non-self-replicating malware that appears to perform a desirable function for the user but instead facilitates unauthorized access to the user's computer system. 

Is trojan virus Dangerous?
The short answer is yes, and the long answer is sometimes No, because there are near a thousand different trojan horse viruses and they all will most likely alter your computer in some way or another.  

Working of Trojans!

Types of Trojans:

  

1.Remote Access Trojans

2.Password Sending Trojans

3.Keyloggers

4.Destructive Trojans

5.Denial of Service (DoS) Attack Trojans

6.Proxy/Wingate Trojans

7.FTP Trojans

8.Software Detection Killers
  
How to Get Rid of Trojans:
Here are some practical tips to avoid getting infected (again). For more general security information, please see our main security help page. 
  1. NEVER download blindly from people or sites which you aren't 100% sure about. In other words, as the old saying goes, don't accept candy from strangers. If you do a lot of file downloading, it's often just a matter of time before you fall victim to a trojan.
  2. Even if the file comes from a friend, you still must be sure what the file is before opening it, because many trojans will automatically try to spread themselves to friends in an email address book or on an IRC channel. There is seldom reason for a friend to send you a file that you didn't ask for. When in doubt, ask them first, and scan the attachment with a fully updated anti-virus program.
  3. Beware of hidden file extensions! Windows by default hides the last extension of a file, so that innocuous-looking "susie.jpg" might really be "susie.jpg.exe" - an executable trojan! To reduce the chances of being tricked, unhide those pesky extensions.
  4. NEVER use features in your programs that automatically get or preview files. Those features may seem convenient, but they let anybody send you anything which is extremely reckless. For example, never turn on "auto DCC get" in mIRC, instead ALWAYS screen every single file you get manually. Likewise, disable the preview mode in Outlook and other email programs.
  5. Never blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts (not even popular ones). If you do so, you are potentially trusting a stranger with control over your computer, which can lead to trojan infection or other serious harm.
  6. Don't be lulled into a false sense of security just because you run anti-virus programs. Those do not protect perfectly against many viruses and trojans, even when fully up to date. Anti-virus programs should not be your front line of security, but instead they serve as a backup in case something sneaks onto your computer.
  7. Finally, don't download an executable program just to "check it out" - if it's a trojan, the first time you run it, you're already infected!

How to sent a trojan horse virus as txt file

Hello Friends Today I am Going to Explain you that How to Send Trojans as a Text Files that will execute your desired codes..
AS you all know that .exe is a Executable File and can run a Code .In this Guide I will teach you How to make a .txt executable that can run all of your codes binded or crypted behind it.



What is a trojan horse?

A Trojan horse, or trojan for short, is a term used to describe malware that appears, to the user, to perform a desirable function but, in fact, facilitates unauthorized access to the user's computer system. The term comes from the Trojan Horse story in Greek mythology. Trojan horses are not self-replicating which distinguishes them from viruses and worms. Additionally, they require interaction with a hacker to fulfill their purpose. 

Purpose of Trojan horses?

Trojan horses are designed to allow a hacker remote access to a target computer system. Once a Trojan horse has been installed on a target computer system it is possible for ahacker to access it remotely and perform various operations. The operations that a hacker can perform are limited by user privileges on the target computer system and the design of theTrojan horse.

Send Trojans as a Text Files - Method


1. First of all You have to download the TEXT ICON PACK .
You can Download It From Below:

Download

2. Extract the Icon Pack to Obtain the Text Icons.

3. Open a new file, Right click - New - Shortcut
Type the location of the item: "X:\WINDOWS\system32\cmd.exe /c file.txt" (where stands for "X"=Drive)


and name it "Readme.txt" (without quotes)

4. After creating the readme.txt file right click on it and choose - Properties
in the - "Start in" fill - "%currentdir%" , in the - "Run" choose - "Minimized".


5. Then change the icon with one of the TXT icons from the pack by right clicking the readme.txt file then -
Properties - Change Icon...

6. In order to execute a file you need one..
just change your Server/Virus extension to .TXT and name it - "file.txt"

Now you have a .TXT Shortcut and .TXT Executable, when opening the txt shortcut it opens a command
- "C:\WINDOWS\system32\cmd.exe /c test.txt" that executes the file you want.

7. Now the readme.txt executes a command window, in order to hide it Right click on the "readme.txt" and choose - Properties - Layout and reduced the size on the window to height=1 and width=1.
Now change the window position to height=999 and width=999.

8. Now you are ready to sent a trojan as a txt file..

Warning:This post How to sent a trojan virus in a txt file is for educational purposes

Wednesday, March 14, 2012

How To Get Facebook Credits For Free Without Hacking

I’m going to introduce a site for you to get free Facebook Credits. Before teaching you how to get free Facebook Credits in this way, I want to first tell you that you could only register ONCE in this site. Do NOT ever want to cheat in this site, or you’ll get banned! I suggest you to read the terms of the site carefully in order to familiar with the site. In addition, this way to get free Facebook Credits is only applicable for those in the US, UK and Canada. So, let’s start now:

1. Access The Site Here. You should see a SIGN UP box near the top/middle of the page. Enter your email address (*remember to use a VALID email) and click sign up. Fill in all other information to complete the process.

2. Confirm Your Email Address. Go to your email inbox which you’ve provided in the sign up process. You should see an email sent from the site (if not, just wait a while). Click the confirmation link in the email. After that, you should see 250 points bonus in your account! (if you do not confirm your email, you won’t receive the points!)

3. Go To The Site Section: Earn Points → Free Offers. (the navigation bar is at the top of the site) After clicking free offers, a list of offers will be shown up and each offer would have several details including: the amount of points you will earned after completion, approved times, approval rate, approval time and offer description.

You can choose all the offers which you’re interested in to complete, but I suggest you to choose offers which has the HIGHEST AMOUNT OF POINTS with HIGH or VERY HIGH approval rate and FAST approval time to complete first (just like the one I display here). You may need to take some time to complete these offers but it shouldn’t take long. After completing the offer, you should receive your points very quickly. You can continue to complete the next offer and earn more points!

4. Redeem Free Facebook Credits or Other Prizes. Go to the site section: Spend Points → Redeem Your Points. After you’ve earned enough points for free Facebook Credits or other prizes, simply go to the redeem section to redeem your prize. For Facebook Credits, it’s under the category ‘Gift Cards’. There are 3 different amounts of Facebook Credits you can redeem – $15, $25 or $50. After you’ve claimed your redemption, the free Facebook Credits should be emailed to you within minutes!

5. Visit the site frequently to earn more free rewards. Take some time to look around the site thoroughly. You’ll find there’re many rewards you could earn and there’re many simple and interesting tasks for you to complete! You could also chat and make friends with the members (or ask questions if needed) by typing in the shoutbox in the right hand side of the site or going to the Forum of the site.

Here’s the way I recommend. If you still have any doubt or do not believe that you can get Facebook Credits free in this site, simply check out my Proof Section. Remember to ask questions whenever you needed. So, enjoy earning free things in this site and get free Facebook Credits!
 

Tuesday, March 13, 2012

How To Set A Business Blog


It’s easy to build a blog that will improve customer relationships and generate goodwill for your business. A well-designed business blog keeps your current customers engaged while allowing new clients to get acquainted with your company. Following a few simple tips, you can set up a blog that will be a powerful marketing tool for your business.
Here’s how to set up a business blog that will serve your company well…
Put It In The Right Place
If your company already has a website, make the blog part of your existing website. It should be a menu choice that’s easy for any visitor to find.
If your company doesn’t have a website, choose a domain name for your blog that’s as close to your company name as possible or includes your industry’s primary keywords.
Start With A Simple Design
Most companies power their blogs with WordPress, a blogging platform that many hosting companies will set up for you. Thousands of pre-designed WordPress themes are available, and one of them will likely work for your blog.
Blogs linked to an existing website should echo the colors and design of the site, but stand-alone blogs usually benefit from starting with a simple design. Make changes as your readership grows and you need for more features.
Pack Your Business Blog With Value
Before you tell anyone about the blog, pack it with useful articles so visitors will find good content even on their first visit. Post perhaps a dozen articles before you promote your blog, then keep posting new content at least once a week. Many experts recommend two or three posts each week.
Be sure to include coupons, exclusive offers and other deals along with meaningful content that supports your business goals.
Promote Your Blog At Every Opportunity
If you pay attention to search engine optimization techniques, Google and other search engines will bring traffic to your site, but that doesn’t mean you can neglect other means of promotion.
To get current customers reading your blog, make sure you point out during every customer contact the special offers and unique content available only to blog readers.
To bring new customers to your blog, include a mention of it in all your print and online advertising. Every time a customer sees or hears your company’s name, make sure your blog address is there along with it.
Now that you know more about how to set up a business blog, there’s no reason to delay any longer.
Blogs are powerful promotional and informational tools. Every moment your company is without one, you’re potentially losing money.
Recommended Post Slide Out For Blogger