Thursday, March 31, 2011

Appeal from IIIT-Allahabad Students: Appeal from IIIT-A students about atrocities of ad...

Appeal from IIIT-Allahabad Students: Appeal from IIIT-A students about atrocities of ad...: "Appeal from IIIT-A students about atrocities of administration including Institute Director We the students of IIIT Allahabad are in ..."

Friday, March 11, 2011

Microsoft Windows Hidden Program


1- Private Character Editor

This program is for designing icons and Characters(Alphapet)
Click :start
Then :run
type :EUDCEDIT
.................................................. ..................................................

2- iExpress
This Program is for conerting your files to EXCUTABLE files
Click : start
Then : run
type : iexpress
.................................................. ..................................................

3-Disk Cleanup
This program used for cleaning harddisk to offer space
Click : start
Then : run
type : cleanmgr

.................................................. ..................................................

Program ............. CODE
__________ __________

Character Map = charmap

DirectX diagnosis = dxdiag

Remote Access phone book = rasphone

Registry Editor = regedit

File siganture verification tool = sigverif

Volume Contro = sndvol

System Configuration Editor = sysedit

Syskey = syskey

Thursday, March 10, 2011

Free download Bit Defender 12.0.12.1 with serial key


BitDefender Internet Security 12.0.12.1  keeps your Internet-connected family safe, without slowing down their PCs. It locks out viruses, hackers & spam, while providing parental control and firewall protection.

Features and Benefits

Confidently download, share and open files from friends, family, co-workers - and even total strangers
  • Protects against viruses and other malware using industry-leading technologyNEW
  • Scans all Web, e-mail and instant messaging traffic in real-time
  • Provides an unmatched detection rate of new threats based on two different proactive technologies
  • Blocks spyware programs that track your online activities
Protect your identity: shop, bank, listen and watch, privately and securely
  • Blocks web pages that attempt to steal your credit card data
  • Prevents personal information from leaking via e-mail, Web or instant messagingNEW
Guard your files and conversations with top-of-the line encryption
  • Instant Messaging Encryption keeps your conversations private on Yahoo! and MSN Messenger
  • File Vault securely stores personal information or sensitive files
Connect securely to any network at home, at the office, or away
  • The two-way firewall automatically secures your Internet connection wherever you are
  • Wi-Fi monitor helps prevent unauthorized access to your Wi-Fi network
Protect your family and their computers
  • Parental Control blocks access to inappropriate websites and e-mail
  • Limits kids’ access the Internet, games, etc. to specific times
  • Makes it easy for you to manage the security of your network from a single location
Play safely, play seamlessly
  • Reduces the system load and avoids requesting user interaction during game play
Get fine-tuned performance from your computer
  • Optimized scanning technology skips safe files for better scan speed and lower system load
  • Antispam stops unwanted e-mail from reaching your Inbox
  • Laptop Mode prolongs battery life
Let professionals solve any security issues
  • Assistance with common issues built directly into the product
  • Free technical support for the entire duration of the product license
Here is the link:

http://thepiratebay.org/torrent/4444901/BitDefender_Antivirus_2009_Build_12.0.10_Final_with_Keygen

But for the same, u need to have a torrent client like utorrent, bit comet, etc.

As per my experience, i do sugget Bit torrent ..

Wednesday, March 9, 2011

Trick Viruses by Renaming Your Anti-Virus Program to Explorer.exe


There are a lot of viruses out there, but many of them follow the same pattern: they lock you out of your system and only let you visit their site, pretending to be anti-virus software. Here's a trick to squash them.

There's more than one way to kill a virus, but if something's locking you out of computer, the How-To Geek has a great way to trick it into letting your Anti-Malware tool run a scan:
Since most of the fake anti-virus malware needs you to be able to slightly use your PC, the one executable that it won't ever block is "explorer.exe", since they want you to be able to get online and go to their site and pay them-not so easy if you have no Start Menu.
So just rename your favorite anti-malware application to explorer.exe, and you should be able to use it.
They recommend using the free, portable SUPERAntiSpyware to sneak in there and destroy that nasty virus

Tuesday, March 8, 2011

How to Get Facebook Email Address

Facebook has just new features in which it will give email addresses to users ,at this time facebook email id is not open to everyone ,you have to request invittation.In order to get a invite to this new service you need to visit following  link where in you would be asked to click on the ‘Request Invite’ button.
http://www.facebook.com/about/messages/

Facebook-email-address-Invite
Facebook-email-Invite
if you are lucky you will get the yourname@facebook.com email id as soon as possible .Please note that Your email address will match your public username, for example:
Profile: facebook.com/username
Then your email address will be
Email: username@facebook.com
If you don’t have a username you can go here facebook.com/username/ to get or click below
http://www.facebook.com/username/

Block Websites on your system!

Some times it becomes necessary to block a website on our Computers for one or other reason. You can easily and effectivily block access to a website by adding it to your Windows HOSTS file. Once the website is blocked in the HOSTS file, it will not appear in any of the browsers. That is, the website becomes completely unavailable.





1. Go to your HOSTS file which is located at:
C:\WINDOWS\SYSTEM32\DRIVERS\ETC for Vista and XP
C:\WINNT\SYSTEM32\DRIVERS\ETC for Win 2000
C:\WINDOWS for Windows 98 and ME

2. Open HOSTS with Notepad.

The default Windows HOSTS looks like this:
______________________

# Copyright © 1993-1999 Microsoft Corp.
#
# This is a sample HOSTS file used by Microsoft TCP/IP for Windows.
#
# This file contains the mappings of IP addresses to host names. Each
# entry should be kept on an individual line. The IP address should
# be placed in the first column followed by the corresponding host name.
# The IP address and the host name should be separated by at least one
# space.
#
# Additionally, comments (such as these) may be inserted on individual
# lines or following the machine name denoted by a “#” symbol.
#
# For example:
#
# 102.54.94.97 rhino.acme.com # source server
# 38.25.63.10 x.acme.com # x client host
#
127.0.0.1 localhost
_____________________________

3. Directly under the line that says 127.0.0.1 Localhost, you will want to type:

127.0.0.1 name of the URL you want to block

For example to block the website MySpace.com, simply type:
127.0.0.1 myspace.com
127.0.0.1 www.myspace.com

Other parts of MySpace could be blocked in a similar way:
127.0.0.1 search.myspace.com
127.0.0.1 profile.myspace.com
etc etc etc…

It is necessary to add a website with and without the “www.”. You can add any number of websites to this list.

4. Close Notepad and answer “Yes” when prompted.

5. After blocking the website, test it in any of the browser. If every thing is done as said above,the website must not appear in any of the web browsers. You should see a Cannot find server or DNS Error saying: “The page cannot be displayed”. I have also created a virus to block a website which automatically blocks a list of websites as specified in the source program.

Some people suggest that your add a website to the Internet Explorer ‘Privacy’ settings. This does not block a site. It only stops that site from using cookies.

Starting Page Makes Your Google Searches Completely Anyonymous


Google's a great search engine, but search privacy has long been a concern for some. If you want to search privately without leaving Google, Start Page is a simple webapp that can act as a proxy for your searches.


Starting Page operates just like any search: you enter terms, press search, and get results. In this case, however, you're still searching Google but Starting Page goes out and performs the search for you. This way Starting Page is tracked for performing the search and you're not, keeping your search private.

Wednesday, March 2, 2011

More than 50 Android apps found infected with rootkit malware

Google acts to remove apps after developer finds 'DroidDream' malware can take over phone and send personal details to remote server (updated)
More than 50 applications on Google's Android Market have been discovered to be infected with malware called "DroidDream" which can compromise personal data by taking over the user's device,
and have been "suspended" from the store.
Google removed the apps from the Market immediately on being alerted, but it is not clear whether it has removed them from devices to which they have been downloaded. As many as 200,000 Android devices could have been infected.
The revelation comes from Android Police, a news site on Google's operating system, which calls it "the mother of all Android malware", noting that its examination had found that it "steals nearly everything it can: product ID, model, partner (provider?), language, country, and userID. But that's all child's play; the true pièce de résistance is that it has the ability to download more code. In other words, there's no way to know what the app does after it's installed, and the possibilities are nearly endless."
Lookout, a security company, which in a blogpost lists the 50-plus apps discovered to be infected. (The list is also below, via Lookout.)
Smartphones running Google's Android software have become enormously popular and are reckoned to be close to taking over worldwide as the fastest-selling smartphone platform, ahead of Finland's Nokia. Its growth has been fuelled by the fact that the software is free to license, and for developers there is no charge or checks to putting apps on the Market – unlike Apple's iPhone App Store, which checks every app against a suite of tests for suitability before allowing it on its store.
That has led the Market to grow rapidly, but also makes situations like the latest one – which is not the first case of malware found on the Market – harder to avoid.
The malware was first discovered by a Reddit user, Lompolo, who spotted that the developer of one of the malware apps had also posted pirated versions of legit apps, using the developer name "Myournet". But two other developers' products have also been found to include DroidReam.
Lompolo noted that "Myournet" had "taken 21 popular free apps from the Market, injected root exploit [code] into them and republished". More worryingly, those had seen between 50,000 and 200,000 downloads altogether in just four days.
DroidDream contains code which can "root" – take complete control of – a user's decice, and send detailed information such as the phone's IMEI (International Mobile Equipment Identity) and IMSI (International Mobile Subscriber Identity) numbers and send them to remote servers. But as Android Police's team found, the code can go much further in rooting through a phone.
Update: details of how the root code works are here. Note that this is a "privilege escalation" attack - once the app starts it uses the fact that it has user privileges to jump out of its sandbox and root the phone.
It's a rather brutal reminder of the fact that Android's openness is both a strength and, at times like this, a weakness – though Google's rapid action, in which it pulled the apps from the Android Market within just five minutes of being alerted, is encouraging.
It now looks likely that security companies will begin to compete to offer antivirus and anti-malware products for Android devices – which, given its rapid growth, could prove a fertile area for them with PC sales flat.
If you have downloaded any of the apps below, you should contact your phone company.
Full list of infected applications published by "Myournet": • Falling Down • Super Guitar Solo • Super History Eraser • Photo Editor • Super Ringtone Maker • Super Sex Positions • Hot Sexy Videos • Chess • 下坠滚球_Falldown • Hilton Sex Sound • Screaming Sexy Japanese Girls • Falling Ball Dodge • Scientific Calculator • Dice Roller • 躲避弹球 • Advanced Currency Converter • App Uninstaller • 几何战机_PewPew • Funny Paint • Spider Man • 蜘蛛侠
Full list of infected applications published by "Kingmall2010″: • Bowling Time • Advanced Barcode Scanner • Supre Bluetooth Transfer • Task Killer Pro • Music Box • Sexy Girls: Japanese • Sexy Legs • Advanced File Manager • Magic Strobe Light • 致命绝色美腿 • 墨水坦克Panzer Panic • 裸奔先生Mr. Runner • 软件强力卸载 • Advanced App to SD • Super Stopwatch & Timer • Advanced Compass Leveler • Best password safe • 掷骰子 • 多彩绘画
Full list of infected apps under the developer name "we20090202″: • • Finger Race • Piano • Bubble Shoot • Advanced Sound Manager • Magic Hypnotic Spiral • Funny Face • Color Blindness Test • Tie a Tie • Quick Notes • Basketball Shot Now • Quick Delete Contacts • Omok Five in a Row • Super Sexy Ringtones • 大家来找茬 • 桌上曲棍球 • 投篮高手

Tuesday, March 1, 2011

5 Myths about Internet Safety



“Internet Safety” the term has been getting vague with the increasing virus outbreaks nowdays. PC Magazine once conducted a survey in which they asked the participants to rate their broadband ISP services and the results were astonishing. Most of users didn’t completely understand the seriousness of potential threats or how to protect their PCs. Here are the top 5 Myths about safe surfing over internet.

Myth 1 – I don’t keep important things on my PC, so I don’t have to worry about security. Your PC can be infected over internet

Long time ago,this was partially true… but the hybrid worms and viruses of today like Blaster, hidrag and others blindly spread across internet to thousands or millions of PCs in a matter of hours, without regard for who owns them, what is  stored there, or the value of the information they hold for the sole purpose of wreaking havoc. Even if your computer is not attacked directly, it can be used as a zombie to launch a denial-of-service or other attack on a network or to send spam or pornography to other PCs without being traced. Therefore, your civic responsibility is to protect your PC so that others are protected.

Myth 2 – I can protect my PC if I disconnect from the Internet or turn it off when I’m not using it.

Wrong. You are a target, If you connect to the Internet at all. You could download a virus when you connect to internet and it may not be activated immediately, not until you read your email offline days after. Viruses nowadays spread wildly through USB/Pen drives, pirated cd’s or torrents or file from networks. But now you can protect your business from internet threats with the top web security software

Myth 3 – I can protect myself from viruses by not opening suspicious e-mail attachments. Some viruses simply get activated by reading or previewing an e-mail

Wrong again. The next virus you get may come from your best friend’s or boss’ computer if his e-mail address book was compromised for simulating an attack. Hybrid worms can enter through the Web browser through loopholes and it is possible to activate some viruses simply by reading or previewing an e-mail. You simply must have a PC-based antivirus package or a firewall.

Myth 4 – I have a Macintosh (or a Linux-based system), not a Windows system, so I don’t have to worry about being attacked.

It is true that most attacks target Microsoft Windows–based PCs, but there have been attacks against Mac OS and Linux systems as well. Some experts have predicted that the Mac virus problem will get worse, because Mac OS X uses a version of Unix. And although these systems have some useful security features, they can still be attacked.

Myth 5 – My system came with an Anti-virus package, so I’m protected.

Not quite. Firstly, if you haven’t activated your antivirus to scan incoming web traffic automatically, you don’t have a good Anti-virus and malware protection software. Secondly, new threats appear daily, so an antivirus package is only as good as its last update so its a must to activate the auto-update features to keep your guard up against the latest  threats. Thirdly, an antivirus package can’t protect you from every threat. Malwares, spywares are running in the wild out there and every now and then malicious code penetrate weak systems. You need a combination of solutions, including, at minimum, antivirus, a personal firewall ,an anti spyware/malware package and a plan for keeping your operating system and software up to date with security patches.