Sunday, November 24, 2013

Facebook shortcuts for Mozilla Firefox and Google Chrome

Here are 12 amazing Facebook shortcuts that you might not know.

1. To create new message:


In Google Chrome: Alt+m 
In Mozilla Firefox: Shift+Alt+m

2. To view Help Center

In Google Chrome: Alt+0 
In Mozilla Firefox: Shift+Alt+0 

3. To visit the home page:

In Google Chrome: Alt+1 
In Mozilla Firefox: Shift+Alt+1

4. To visit the Profile Page

In Google Chrome: Alt+2 
In Mozilla Firefox: Shift+Alt+2 

5. To Manage Friend List

In Google Chrome: Alt+3 
In Mozilla Firefox: Shift+Alt+3 

6. To view message list

In Google Chrome: Alt+4 
In Mozilla Firefox: Shift+Alt+4 

7. To view the notification page

In Google Chrome: Alt+5 
In Mozilla Firefox: Shift+Alt+5 

8. To view the account settings

In Google Chrome: Alt+6 
In Mozilla Firefox: Shift+Alt+6 

9. To view privacy settings

In Google Chrome: Alt+7 
In Mozilla Firefox: Shift+Alt+7

10. To view the Facebook fan page

In Google Chrome: Alt+8
In Mozilla Firefox: Shift+Alt+8 

11. To view Facebook Terms

In Google Chrome: Alt+9 
In Mozilla Firefox: Shift+Alt+9 

12. To go to the search box

In Google Chrome: Alt+? 
In Mozilla Firefox: Shift+Alt+? 

Wednesday, November 20, 2013

Hyper-V

  • Hyper-V is a server application that enables users to run a broad range of operating systems simultaneously on a single physical server. Hyper-V is included with some versions of Windows Server 2008. Hyper-V can be run only on a 64-bit version of Windows Server 2008 that is running on 64-bit hardware. 

Monday, November 18, 2013

Spam

Spam generally refers to unwanted commercial e-mail that is typically sent in bulk to thousands or even millions of recipients. There are some gray areas that we hope won’t trip you up: Some people may include the e-mail produced by mass-mailing viruses or Trojan horses as spam. Similarly, some people may include e-mail from a company they have done business with as spam. Also, if you subscribe to some e-mail list and at some time in the future you no longer want it, that might be spam. 

Friday, November 15, 2013

Use Keyboard as Mouse

If your mouse is not working and you don't wish to wait till you get a new mouse, you would definitely like to know how you can use your keyboard as your mouse. It is easy to use your mouse as keyboard in windows using the On Screen Keyboard utility, but it is also possible to do the reverse.

All you need to do is Windows 8, Windows 7 or Vista

1. Open Ease of Access Center by clicking the Start button , clicking Control Panel, clicking Ease of Access, and then clicking Ease of Access Center.
2. Click Make the mouse easier to use.
3. Under Control the mouse with the keyboard, select the Turn on Mouse Keys check box. You can also increase the acceleration and speed of your mouse movements according to your needs. You can alternately press the Alt+Shift+Num Lock combination to instantly activate the mouse keys.
For laptops, this will only work if your laptop keyboard has a numeric keypad or alternative keys which you can enable by pressing the Number Lock Key or the Function key. On my laptop number 6 key of the numeric keypad moves the mouse pointer left, number 4 key moves the mouse pointer right, number 2 key moves it down, number 8 key moves the mouse pointer up, number 5 and + key serve as right click while the number 0 key works as left click.

How to Avoid Malware

Here are some tips to ensure malware is not given access to your computer:

  • Keep your computer up to date.

  • Keep your browser up to date.

  • Install good antimalware.

  • Download free software only from sites you know and trust.

  • Avoid clicking links inside pop-up windows. 

    Keep Your Computer up to Date

    To keep Windows up to date, Microsoft uses Windows Update. Windows Update should run automatically on your PC. However, you should check if your PC is up to date. To check for Windows updates:

    1. Click Start, Run, and type:

    a. WindowsXP:wupdmgr

    b. Windows Vista/7: wuapp 

    2. PressEnter.

    3. Click Install Updates

    You may need to download the Windows Genuine Advantage (WGA) tool, which checks to see if your copy of Windows is genuine.

    Windows may need to reboot your machine several times as new updates are installed.

    Your computer is now up to date.

    Keep Your Browser up to Date

    Browsers are a common source of computer vulnerabilities because they use so many plugins and programs that create loop holes that malware can exploit. To update your browser:

    Internet Explorer

    If you are using Internet Explorer (IE) as your browser, use Windows Update—explained above—to keep it up to date.

    Mozilla Firefox

    To check for updates for Mozilla Firefox:

    1. Open Firefox.

    2. Click Help > Check for Updates.

    3. If updates are available, follow the on-screen instructions. 

Antimalware / Antivirus / Antispyware

Software designed to remove or block malware (e.g. AVG Internet Security, Avast, ESET Smart Security etc.) 

Real-time Scanning

Good antimalware programs scan files in real time; as you download, copy, and install files on to your computer, your antimalware program will scan these files for infections and malicious code. You should only have one real- time scanner installed at any time—otherwise they will conflict as they compete to scan the same files

Windows Firewall

 Comes bundled with Windows XP, Vista, and 7. This is a great solution; however, due to a lack of comprehensive definition updates, Windows Firewall is not completely effective in blocking threats and allowing safe connections.


Firewall

A firewall both permits and blocks access to a network or PC. Firewalls are included with popular security software (e.g. AVG Internet Security and ESET Smart Security) and limit communication between your PC and devices that are not authorized to communicate with you.


Key logger

Key loggers are used to monitor keyboard activity on a PC. These can be software-based (bundled with Trojan horses, adware, and spyware) or hardware-based (between the keyboard cable and the PC, acoustic etc.) Usually this information is retrieved across a local network, the internet, or from the physical device connected to the keyboard. 

Backdoor

A backdoor is a point of access to a computer that does not require authentication. An unlocked house back door gives access to an otherwise secure home; a computer backdoor allows access to your PC without your knowledge or permission. 

Adware

Like spyware, adware is software that may track visited websites and act as a key logger. Adware tracks this information to automatically display downloaded or installed adverts to a user. You may wonder why you are being offered “PC Super Anti Spyware 2011” when using your PC; this is adware at work. AIM, FlashGet, Deamon Tools, and RealPlayer are all examples of adware. 

Spyware

Spyware tracks a user’s activity by monitoring browsing habits and keyboard activity and can even take screenshots while you use your PC. This information is sent back to the creator or beneficiary of the spyware. Signs of spyware include: modified browser homepages, slow internet, and suspicious looking sites in place of legitimate sites (for example: banking sites.) 

Privacy-invasive software

A formal term used to describe software that invades your privacy. This software comes in different forms including spyware and adware. 

Wednesday, November 13, 2013

Which of the following activities will NOT be considered as passive footprinting?

A. Go through the rubbish to find out any information that might have been discarded. 

B. Search on financial site such as Yahoo Financial to identify assets.

C. Scan the range of IP address found in the target DNS database.

D. Perform multiples queries using a search engine.

Answer: C

Explanation: Passive footprinting is a method in which the attacker never makes contact with the target systems. Scanning the range of IP addresses found in the target DNS is considered making contact to the systems behind the IP addresses that is targeted by the scan. 

Tuesday, November 12, 2013

Here some common PC errors and the solutions for them... Do have a look...................!!

1. MONITOR LED IS BLINKING

Check all the connections like Monitor Cable, Data
cables,RAM, Display Card , CPU connections.

2. CONTINUOS THREE BEEPS

Problem in RAM Connection.

3. THREE BEEPS ( 1 Long 2 Short)

Problem in Display Card Connection

4. THREE LONG BEEPS PERIOD WISE

Problem in BIOS or RAM (Basic Input Output System)

5. CONTINUOS NON-STOP BEEPING

Key Board Problem (I.e.; Some Key is pressed for
Longer time)

6. FDD LED IS GLOWING CONTINUOSLY

Data cable to be connected properly (twisted cable).

7. NO DISPLAY ON THE SCREEN AT ALL

Hard Disk cable connected wrongly. Connect rightly
seeing the Red mark (Faces power supply) and then
Restart.

8. POWER LED IS OFF

a. Check main power cord
b. Check S.M.P.S.
c. Check Mother Board connection
9. SHOWING CMOS ERROR
Replace 3 Volt battery of Mother Board . Set Original
Settings Manually.(Refer CMOS Setup chart)
Enter your search termsSubmit search form

10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT
WORKING PROPERLY

Check Power cord of FDD , Data Cables , set CMOS &
Finally the Check drive.

11. SHOWING HDD ERROR OR HARD DISK FAILURE

a. Check Power Cord
b. Check connection of HDD
c. Check Data cable
d. Check Hard Disk parameters in CMOS or Auto
detecting Setting Partitions by Fdisk Command, then
format it to set track 0.

12. MOTHER BOARD HANGS DUE TO UNSTABILIZED
POWER SUPPLY

a. Check S.M.P.S
b. RAM not functioning properly.
c. Software problem (due to using pirated software)
d. CPU fan not functioning properly.

13. DANCING SCREEN

a. Check Display card connection
b. Virus Problem
c. Video Memory Problem

14. SHAKING SCREEN

a. Earthing problem
b. Magnetic waves comes around.

15. CPU CABINET SHOCK

a. Check Earthing
b. Check main power cord.

16. NON-SYSTEM DISK ERROR

a. Floppy Drive having different disk (Non-Bootable
Disk) OR CMOS Parameters for Hard Disk may not be
set properly.
b. Hard Disk Partitions may not be created.
c. Hard Disk may not be formatted.

17. MISSING OPERATING SYSTEM

The System files missing namely Ie; command.com} -
User File IO.SYS & MS_DOS.SYS } - Hidden Files. These
above three files required for Start up of the system
that can be transferred by using SYS C: Command OR
While the time of formatting by using Format c:/u/s

18. MISSING COMMAND INTERPRETOR

May the file Command.com is corrupted OR Infected
by Virus OR Some one has Erased it.

19. SHOWING I/O ERROR

a. The type of Hard Disk in CMOS may not be set
properly.
b. Operating system used for formatting is not valid

20. SHOWING DIVIDE OVER- FLOW MESSAGE

a. May some Directories or Files crash with other files.
b. Use CHKDSK/F or SCANDISK Command to correct it.

21. HARD DISK MAKING NOISE WHILE PROCESSING

a. Unstabilized power supply.
b. Check for Loose Contact.
c. Do not use Y Connectors for Hard Disk.
d. It may create Bad Sector OR Weak Hard Disk.

22. HARD DISK HANGS WHILE PROCESSING

Check for Bad Sector by using CHKDSK or SCANDISK
Command. If found format the Hard Disk and set
Partition before that area.(This is the only procedure
to use Hard Disk with Bad Sector) OR (To avoid Bad
Sectors use Standard Power Supply)

23. HARD DISK NOT DETECTED

a. Check Power Connector
b. Check Data Cables
c. Check Jumpers

24. PARTITION NOT SHOWN

Operating System where the Hard Disk formatted is
not supported with present Mother Board. For Eg:
Hard Disk formatted with Pentium System will hide
their partitions for 486 System.

25. MMX/DLL FILE MISSING

May the above files may be corrupted due to power
failure or Virus. Make available above files from other
Computer. OR Reinstall Windows 98 Operating
System. (This procedure will not make any effect on
existing Data).

26. WINDOWS REGISTRY ERROR

This will happen due to sudden ON/OFF of the
system. Final solution is to Reinstall Operating System.

27. DISPLAY COLOUR DOES NOT MATCH

a. Configure Display Card properly with their CD.
b. The Standard setting for Windows is set it to
800x600 for better performance.

28. UNKNOWN DEVICE FOUND

May the Driver utility is not provided with operating
system . Insert Driver CD and install software for the
above Device...

Monday, November 11, 2013

Trojan horse (Trojan)

A Trojan horse is a seemingly harmless program that looks to provide value. However, just as in Greek mythology, a Trojan horse has a secret agenda and acts as a backdoor to your computer. This backdoor can be accessed by a hacker to compromise your PC. Trojan horses are not self-replicating and spread due to users installing them manually on their PC. 

Worm

A worm is much like a virus. The key difference is worms can spread between PCs without a host (free screensaver program, downloaded game etc.) These programs rely on computer networks and usually damage files and slow down networks in their path.

 

Virus

 A computer virus acts very much like a human virus. Human viruses are spread, via thumb drives, floppy discs, network connections etc., to other PCs. Viruses need a host (like a free screensaver program) to spread. By pure definition: a virus has the ability to spread itself, via a host, to other computers. 

Malware

The generic term used for all forms of software designed with malicious intent. Viruses, worms, spyware etc. are all forms of malware. The term virus is often used when malware should really be used as it describes all forms of malicious software. 

Friday, November 1, 2013

How would it be possible for you to retrieve information from the website that is outdated?

A. Visit google's search engine and view the cached copy.

B. Visit Archive.org web site to retrieve the Internet archive of the company's website. 

C. Crawl the entire website and store them into your computer.

D. Visit the company's partners and customers website for this information.

Answer: B

Explanation: Archive.org mirrors websites and categorizes them by date and month depending on the crawl time. Archive.org dates back to 1996, Google is incorrect because the cache is only as recent as the latest crawl, the cache is over-written on each subsequent crawl. Download the websiteis incorrect because that's the same as what you see online. Visiting customer partners websites is just bogus. The answer is then Firmly, C, archive.org