Monday, January 20, 2014

Protect Yourself From Cyber Attack

Today I am going to alert you how to protect yourself from cyber attach.viruses and identity theft are not new issues, but recently, individuals and companies are at a much greater risk as a result of the unanticipated increase in internet and technology use. Follow these tips to protect yourself from such an attack so that you won’t be the next victim.
Foe example, you receive an email promising a great joke if you open the attachment. You're not sure who sent it but you feel like a laugh and open it anyway. Big mistake.
Attackers can break into your computer by sending you an email attachment with malware (malicious software) or downloading malware on to your computer when you open a link on a webpage.
They want to use personal and financial details on your computer to steal money, buy things on your credit card or open up bank accounts in your name.

Anyone who uses the internet needs to be aware of basic computer security:

######################
1. Don't click the link

If you don't know who sent the email, or if it's not a trusted website, then don't click the link.

Beware: there is always an increase in email phishing scams around Christmas, whereby scammers have a fake retail store website and capture your credit card details when you buy online.

2. Install Antivirus software

Always have up-to-date antivirus protection and get regular updates, Don't press 'do it later' and update six weeks later.

3. Use strong passwords

Most of the population is still using '1234567' or their first name and last name,

The problem is that there are about 20 different things that require passwords. The strategy now is to write them down it is a complete U-turn and put them in your wallet [which is usually in a safe place]. If you lose your wallet, you stop your credit cards and can also reset all your online passwords.

* Never click 'remember my password'.

* Use capitals, lower case, numbers and symbols in passwords. Don't use words in the dictionary.

* Change passwords regularly.

* Password software is good at generating strong passwords but the human brain is the best tool of all.

4. Keep software up to date

This will ensure your software has the latest security upgrades. Attackers are always thinking up new ways to penetrate security. Don't ignore update notifications.

5. Reconfigure wireless routers

Buy a router with secure wireless encryption, otherwise your information is unprotected and can be stolen: for example, when banking or shopping online.

When you get a new modem from a network provider, it may not be secured to encrypt traffic. People should go to the administration panel and configure their wireless network to WPA (Wi-Fi Protected Access) or WPA2 encryption.

Reconfiguring routers is easy and something people don't do properly.

Change the name of the router to something obscure, otherwise it gives attackers information on how best to attack that router. Also, change the default login to a unique password.

6. Encrypt email

Learn to use email encryption for sensitive documents.

Don't send emails such as a child's health resume using Gmail or Hotmail. "There was [the recent case] where a Gmail employee started going through people's email accounts."

7. Use a secure web browser

Firefox or Opera are secure web browsers

"Internet Explorer is highly targeted by attackers because it is on so many machines. IE generally takes longer to patch or fix vulnerabilities."

Eliminating internet and computer use from your life is impossible, so be sure to practice safe computing habits to protect yourself from cyber attacks.

thanks all :)

Tutorial Malware Description and Removal Guide

Hello all this a long Tutorial  but it has so much impotent info for you.Hope you guys gonna like it.Yes it does worth to read whole post.


Purpose of the Thread

Computer/Network Protection.
This Guide is dedicated to every reader of this thread!


Whats included in this thread?

Well it will include descriptions, and how to remove part outsource.

What else?
In this thread I will quote some other threads , comments , and side notes to make this thread much more useful. So if I somehow forget to mention source writer please ignore it.

What are the things/ Apps causing damage to the system?


Virus

Adware

Trojan

Worm

Spyware

Malware

Types of Computer Viruses




What is a Computer Virus?


A potentially damaging computer program capable of reproducing itself causing great harm to files or other programs without permission or knowledge of the user.


Types of viruses :-

The different types of viruses are as follows.

1)
Boot Sector Virus :- Boot sector viruses infect either the master boot record of the hard disk or the floppy drive. The boot record program responsible for the booting of operating system is replaced by the virus. The virus either copies the master boot program to another part of the hard disk or overwrites it. They infect a computer when it boots up or when it accesses the infected floppy disk in the floppy drive. i.e. Once a system is infected with a boot-sector virus, any non-write-protected disk accessed by this system will become infected.

Examples of boot- sector viruses are Michelangelo and Stoned.


2)
File or Program Viruses :- Some files/programs, when executed, load the virus in the memory and perform predefined functions to infect the system. They infect program files with extensions like .EXE, .COM, .BIN, .DRV and .SYS .

Some common file viruses are Sunday, Cascade.


3)
Multipartite Viruses :- A multipartite virus is a computer virus that infects multiple different target platforms, and remains recursively infective in each target. It attempts to attack both the boot sector and the executable, or programs, files at the same time. When the virus attaches to the boot sector, it will in turn affect the system’s files, and when the virus attaches to the files, it will in turn infect the boot sector.
This type of virus can re-infect a system over and over again if all parts of the virus are not eradicated.

Ghostball was the first multipartite virus, discovered by Fridrik Skulason in October 1989.

Other examples are Invader, Flip, etc.

4)
Stealth Viruses :- These viruses are stealthy in nature means it uses various methods for hiding themselves to avoid detection. They sometimes remove themselves from the memory temporarily to avoid detection by antivirus. They are somewhat difficult to detect. When an antivirus program tries to detect the virus, the stealth virus feeds the antivirus program a clean image of the file or boot sector.

5)
Polymorphic Viruses :- Polymorphic viruses have the ability to mutate implying that they change the viral code known as the signature each time they spread or infect. Thus an antivirus program which is scanning for specific virus codes unable to detect it's presence.

6)
Macro Viruses :- A macro virus is a computer virus that "infects" a Microsoft Word or similar application and causes a sequence of actions to be performed automatically when the application is started or something else triggers it. Macro viruses tend to be surprising but relatively harmless.A macro virus is often spread as an e-mail virus. Well-known examples are Concept Virus and Melissa Worm.



Adware


the programs which delivers ads to your computer most in POP-UP's form.

also software that is given to the user with advertisements embedded in the application


Spyware

The programs which are used to monitor/Log the activity performed on a computer. These are used to spy on some one either for legal or illegal purpose. Example: Keylogger applications.

 
                                                                         Worm

Computer worms are programs which reproduce and function independently after jumping through different computer networks. Unlike a computer virus, which depends on a host file or a boot sector, rely on its own programming.

Email Worms

Infects computers through attachments or an HTML link that will navigate readers to an infected website. If either are opened, the worm will be downloaded and infect the computer.

Instant Message Worms

Appear in IM(Instant messenger) applications and send links of infected websites / Files to your contacts
Such as Omelga Spreading


Internet Worms

An Internet worm will scan network resources using a local operating system service to find vulnerable machines, then try to connect and gain full access to those machines. They also scan for systems that have usable exploits, some of which allow the worms to send data packets or requests to install itself.

IRC Worms

Targets chat channels by either sending infected files or links to infected web pages to users. Unlike other worm types, this one is usually less effective, as IRC recipients must confirm the file request, save the file then open it before the worm can infect their computer.


File-Sharing Network Worms

These worms copy themselves into a shared folder and appear as a harmless name. Once the file begins to spread in the file-sharing network, so will the worm, which will continue to infect other systems in the same fashion


Source for the Worms From WikiHow

 

 
Trojan
Trojan is a program which is used to gain access to a computer by installing a program on infected PC to open some backdoor. Trojans are also known as Backdoors.

Types of Trojan


Software Detection Killers(Botkillers/ AV killers)


As the title states this kind of trojan is used to Kill , Delete , Stop the Anti-Virus Software that is installed in your system

Password Sending Trojan / Stealers


Stealing your details such as , User logging , address lists, credit card or banking information and send to the hacker who made the trojan.


Destructive trojan


Destructive Trojans delete files. They can be instructed to automatically delete all of the core system files in an operating system, including DLL, EXE or INI files, on the host PC


Denial Of Service(DoS) Attack Trojans


Multiple PCs are infected with a zombie that is scheduled to attack specific websites simultaneously so that the heavy traffic volume will overload the site's bandwidth

Remote Access Trojans(RAT's)


Remote Access Trojans are simply every one knows in the Hacking Community i guess ,

Which can Control Almost every activity on your PC like TV but without knowing the User

Server Trojan(Proxy, FTP , IRC, Email, HTTP/HTTPS, etc.)


This Server Trojan is a Sub Title for Trojan as well , it include


FTP (File Transfer Protocol) Trojan


If you know , your computer have port to connect to the network.
this trojan open the port 21 which Transfer the FTP Datas and it can Upload or Download from it

Downloader


Downloader Trojan downloads Trojan from another system or host

Proxy/ Wingate Trojans

Proxy Trojans transform a computer into a proxy server, either making it available to all Internet users or just to the hacker. This type of Trojan is developed to create "economizers" that are then used to provide complete anonymity for illegal actions, including buying merchandise with stolen credit cards and initiating Denial of Service attacks. If the hacker's actions are tracked, they are then traced to the victim's host PC rather than the actual hacker. Legally, the computer where the attack is launched is responsible for any damage the attack causes.


^wikihow




Malware


Malware is another name for virus software which is designed to delete, block, modify or copy data, or disrupt the performance of computers or computer networks


Generally, malware includes any virus software used to automatically conduct malicious activity, such as:


  • A computer virus
  • A worm virus
  • Adware, scareware and crimeware
  • Malicious tools such as spyware and rootkits
  • A trojan virus or trojan horse virus


Thats all for those and i much appreciate if Someone have better thought modify the thread



So After that what cause Critical issue to our system ?


Software Vulnerability

if you are aware of Daily Hacker News and Security News sure you do not belong to here

like Internet Explorer 7,8
, Java Vulnerbility - an attacker could use the exploit to run arbitrary code on, and remotely compromise, a vulnerable system.

Drive-by's


Commonly known to Java Drive-by most of . This is Perform a Action to User download a Infected file

Silently ,
Asking for Updates , More Video player , plugin is specified for this

freeware / file sharing site/Fake Apps / USB Stealers


Like Some People Posting on the Site saying, Auto Clicker , Crypter , such thing ,


no-longer going to give information about Spreading , since you can find more .





Hacker Have some favorite tools also otherwise above mentioned Malwares

  • Binders
  • Crypters


What is Binder


A tool that combines two or more files into a single file, usually for the purpose of hiding one of them. Commonly associated with Trojan horses, where the Trojan is bound to a real file, such as a text file that opens with Notepad or other program. The users believe they are opening a safe file, and that is what appears on the screen, but at the same time the file is running, the Trojan is also running, usually undetected by the user.


What is Crypter


A crypter is used to make well known hacker's viruses (Malware) undetectable by anti-virus software by changing the virus program signatures that anti virus programs have in their databases to make them easier to spread




So Now you have good Amount knowledge about how you getting infects from malware .

Let's do some clean

Lets starts with the Anti-Virus guard protection


  • #1 Bit Defender Anti Virus
  • #2 Kaspersky Anti-Virus
  • #3 Panda Antivirus Pro
  • #4 F-Secure Anti-Virus
  • #5 AVG Anti-Virus
  • #6 Avast! Pro Antivirus
  • #7 G Data AntiVirus
  • #8 BullGuard Antivirus
  • #9 Avira AntiVir Premium
  • #10 ESET NOD32 Antivirus


Above List has listed with 2012 Vote ratings is

Best of 2012 Antivirus
site .

if you can find / buy a Key it is great , but also free versions are good with the situation ,

Note that : Don't ever Use any cracked software which saying , "Close your FF , AV before crack" or else.

and Okay , we have the virus , is it enough ? if you read above Malware description Clearly figure out Only AV is not enough


Threat Fire




Simply it is doing When you are pressing key board key it is Crypting the key stroke so key-logger function useless with this


Goto Site and see more: Click Here



Also Key Scramble Doing the Same Job


KeyScrambler Personal promises to encrypt your keystrokes at the level of your keyboard driver and decrypt them when they reach your browser so they're visible to you


Click here to Download


Installing Anti-Malware


I have 2 suggestions Malware Byte or Super Antispyware , Just download One Application as your Opinion ,

Most users Rate Malware Byte is good ,

Click On Image to Download and more info




Note : if you need MalwareByte Pro Premium Key Post here or , Just Send me a PM






Lets goto Next Step : Installing Firewall


In the Windows , inbuilt Firewall / Windows Defender pre installed into your PC , it also a good one .


But in case we need some times much protection,

So my suggestions are Comodo Firewall

Click on the image to Download :





Last Not least : Tweaking up your PC after All .


Install Good System utilities Tool Such As Advance System Care Pro , Tune Up or CCleaner ,


and Make a Scan for your System Perform Increase , Registry Cleaning , Old Files Deleting , Etc



This image has been resized. Click this bar to view the full image. The original image is sized 804x534.



Note : if you need Advance System Care Pro Premium Key Post here or , Just Send me a PM (Out of Stock , Use google)




This image has been resized. Click this bar to view the full image. The original image is sized 700x500.


And When you are running Specious File Always run it inside SandiBox Or VM (Virtual Machine)


I Will Quote
The 7th Sages This SandiBox Thread

This image has been resized. Click this bar to view the full image. The original image is sized 648x252.

Introducing Sandboxie


Sandboxie runs your programs in an isolated space which prevents them from making permanent changes to other programs and data in your computer.




The red arrows indicate changes flowing from a running program into your computer. The box labeled Hard disk (no sandbox) shows changes by a program running normally. The box labeled Hard disk (with sandbox) shows changes by a program running under Sandboxie. The animation illustrates that Sandboxie is able to intercept the changes and isolate them within a sandbox, depicted as a yellow rectangle. It also illustrates that grouping the changes together makes it easy to delete all of them at once.


Benefits of the Isolated Sandbox

Secure Web Browsing: Running your Web browser under the protection of Sandboxie means that all malicious software downloaded by the browser is trapped in the sandbox and can be discarded trivially.
Enhanced Privacy: Browsing history, cookies, and cached temporary files collected while Web browsing stay in the sandbox and don't leak into Windows.
Secure E-mail: Viruses and other malicious software that might be hiding in your email can't break out of the sandbox and can't infect your real system.
Windows Stays Lean: Prevent wear-and-tear in Windows by installing software into an isolated sandbox.

Download:

http://www.sandboxie.com/SandboxieInstall.exe
Have a NICE day!

Chat/Shout Box For Your Blog

Adding a chat box or shout box to your blog is just another way to make your blog more social. It makes you connect with your visitors even more and makes your blog engaging. A simple chatbox might make your blog visitor stay longer than normal. A chatbox / shoutbox can also serve as a guestbook where visitors can leave comments and suggestions easily without the need to create a separate page for that. If you have an entertainment blog, then you definitely must have this.Adding a chatbox to blogger is quite easy and you don’t need to know much HTML, just a little copy and paste procedure and you’re done with it.


http://cbox.ws/getone.php

just go adobe link and give your information.
then they will provide you a html code.
simply copy the code and paste on a new “HTML/JavaScript” Gadget.

Delete administrator Password” without any software in windows 8

Step 1. Put your hard disk of your computer in any other pc .
Step 2. Boot that computer and use your hard disk as a secondary hard disk (D’nt boot as primary hard disk ).
Step 3. Then open that drive in which the victim’s window(or your window) is installed.
Step 4. Go to location windows->system32->config

Step 5. And delete SAM.exe and SAM.log
Step 6. Now remove hard disk and put in your computer.
Step 7. And boot your computer
Thats it.

4 Killer Tips That Increasing Visits(Traffic) your Website or Blog

4 Killer Tips That Increasing Visits(Traffic) your Website or Blog

4 Killer Tips,Increasing, Visits,Traffic,Website, Blog,way
It is the time of competition so drive Traffic or visitor is in our blog or website is now challenging work.If we work plan fully and regularly we must get smart Traffic, it's no a matter .Increasing your online business your must go to right way & use right Traffic Tools.Top Affiliated Blogger use those tools or technique.4 Killer Tips for increasing Traffic your blogs or website are give blog:
4 Killer Tips For Drive Traffic:
01. Article Marketing:
Now this present time article marketing is the way to drive huge visitor to your blog.
For good Article Marketing what you do?
a) 1st write 700/1000 words article.
b) 2nd you use primary keyword 3 times,other use relevant Keywords.
c) Write a article same subject.
d) Original written article only published your own website or blog.
e) Now Use Article rewriting tools and rewrite your blog article .
f) After that published your rewritten article High page rank Article publisher site.

02. Social Media:
There is no way to avoid Social Media.It's not only drive traffic visitor but also help to get strong backlinks for your blog or website.
Some Important Social Media Site List are give below:
Facebook.com
Digg.com
Twitter.com
Stumbleupon.com
Propella.com
Youtube.com
Twitter.com etc

03. Blog Comment:
Blog comment is the great way to drive tariff.Blog Comment give huge traffic beside give strong visitor your blog.You must relevant blog comment because Google like relevant blog comment other wise it be spamming.you can get 50-100 visitor by 1 blog comment.

04. Forum Posting:
Forum Posting is another great way to drive visitor and strong backlinks,Un relevent Forum marketing,Spamming Forum Site is look as a Black hat way to SEO.So just create profile on Forum site give your website or blog link on your profile.(such as :Add Website,blog,Signature..etc)

Huge E-mail List [500]

I bought you today 500 real peoples email list of USA you can use them for email marketing and other reasons

Download it

Get Domain For Free( 1 year)

Get a free domain for 1 year....How? check bellow and u will find ur answer :)

1. go to this site>> http://gybo.com/
2. now follow one by one image step

#


#


#


#


#


#



#


#


#



#


#


#

note: uncheck "Domain Privacy"

#

note: they are not going to charge fom u dit card so don't worry
*you can use VCC too*

Thats it (Y)

You will get ur domain in 24 hours :)

thanks all for reading

More than 100 Keyboard Shortcuts

Keyboard Shortcuts (Microsoft Windows)
 

1. CTRL+C (Copy)
2. CTRL+X (Cut)
3. CTRL+V (Paste)
4. CTRL+Z
(Restore)
5. DE
E্
6. SHIFT+DELETE (delet item sirectly,will not be store in
Recycle bine)
7. CTRL while dragging an item
(Select all of the items to be copied)
8. CTRL+SHIFT while dragging an item
(made shortcut of Selected items)
9. F2 key
(Rename the selected item)10. CTRL+RIGHT ARROW (Move the insertion point to the beginning of the next word)
11. CTRL+LEFT ARROW (Move the insertion point to the beginning of the previous word)
12. CTRL+DOWN ARROW (Move the insertion point to the beginning of the next paragraph)
13. CTRL+UP ARROW (Move the insertion point to the beginning of the previous paragraph)
14. CTRL+SHIFT with any of the arrow keys (Highlight a block of text)
SHIFT with any of the arrow keys (Select more than one item in a window or on the desktop, or select text in a document)
15. CTRL+A (Select all)
16. F3 key (Search for a file or a folder)
17. ALT+ENTER (View the properties for the selected item)
18. ALT+F4 (Close the active item, or quit the active program)
19. ALT+ENTER (Display the properties of the selected object)
20. ALT+SPACEBAR (Open the shortcut menu for the active window)
21. CTRL+F4 (Close the active document in programs that enable you to have multiple documents opensimultaneously)
22. ALT+TAB (Switch between the open items)
23. ALT+ESC (Cycle through items in the order that they had been opened)
24. F6 key (Cycle through the screen elements in a window or on the desktop)
25. F4 key (Display the Address bar list in My Computer or Windows Explorer)
26. SHIFT+F10 (Display the shortcut menu for the selected item)
27. ALT+SPACEBAR (Display the System menu for the active window)
28. CTRL+ESC (Display the Start menu)
29. ALT+Underlined letter in a menu name (Display the corresponding menu) Underlined letter in a command name on an open menu (Perform the corresponding command)
30. F10 key (Activate the menu bar in the active program)
31. RIGHT ARROW (Open the next menu to the right, or open a submenu)
32. LEFT ARROW (Open the next menu to the left, or close a submenu)
33. F5 key (Update the active window)
34. BACKSPACE (View the folder onelevel up in My Computer or Windows Explorer)
35. ESC (Cancel the current task)
36. SHIFT when you insert a CD-ROMinto the CD-ROM drive (Prevent the CD-ROM from automatically playing)
Dialog Box – Keyboard Shortcuts
1. CTRL+TAB (Move forward through the tabs)
2. CTRL+SHIFT+TAB (Move backward through the tabs)
3. TAB (Move forward through the options)
4. SHIFT+TAB (Move backward through the options)
5. ALT+Underlined letter (Perform the corresponding command or select the corresponding option)
6. ENTER (Perform the command for the active option or button)
7. SPACEBAR (Select or clear the check box if the active option is a check box)
8. Arrow keys (Select a button if the active option is a group of option buttons)
9. F1 key (Display Help)
10. F4 key (Display the items in the active list)
11. BACKSPACE (Open a folder one level up if a folder is selected in the Save As or Open dialog box)

Microsoft Natural Keyboard Shortcuts
1. Windows Logo (Display or hide the Start menu)
2. Windows Logo+BREAK (Display the System Properties dialog box)
3. Windows Logo+D (Display the desktop)
4. Windows Logo+M (Minimize all of the windows)
5. Windows Logo+SHIFT+M (Restorethe minimized windows)
6. Windows Logo+E (Open My Computer)
7. Windows Logo+F (Search for a file or a folder)
8. CTRL+Windows Logo+F (Search for computers)
9. Windows Logo+F1 (Display Windows Help)
10. Windows Logo+ L (Lock the keyboard)
11. Windows Logo+R (Open the Run dialog box)
12. Windows Logo+U (Open Utility Manager)
13. Accessibility Keyboard Shortcuts
14. Right SHIFT for eight seconds (Switch FilterKeys either on or off)
15. Left ALT+left SHIFT+PRINT SCREEN (Switch High Contrast either on or off)
16. Left ALT+left SHIFT+NUM LOCK (Switch the MouseKeys either on or off)
17. SHIFT five times (Switch the StickyKeys either on or off)
18. NUM LOCK for five seconds (Switch the ToggleKeys either on or off)
19. Windows Logo +U (Open Utility Manager)
20. Windows Explorer Keyboard Shortcuts
21. END (Display the bottom of the active window)
22. HOME (Display the top of the active window)
23. NUM LOCK+Asterisk sign (*) (Display all of the subfolders that are under the selected folder)
24. NUM LOCK+Plus sign (+) (Display the contents of the selected folder)
25. NUM LOCK+Minus sign (-) (Collapse the selected folder)
26. LEFT ARROW (Collapse the current selection if it is expanded, or select the parent folder)
27. RIGHT ARROW (Display the current selection if it is collapsed, or select the first subfolder)
Shortcut Keys for Character Map
After you double-click a character on the grid of characters, you can move through the grid by using the keyboard shortcuts:
1. RIGHT ARROW (Move to the rightor to the beginning of the next line)
2. LEFT ARROW (Move to the left orto the end of the previous line)
3. UP ARROW (Move up one row)
4. DOWN ARROW (Move down one row)
5. PAGE UP (Move up one screen at a time)
6. PAGE DOWN (Move down one screen at a time)
7. HOME (Move to the beginning of the line)
8. END (Move to the end of the line)
9. CTRL+HOME (Move to the first character)
10. CTRL+END (Move to the last character)
11. SPACEBAR (Switch between Enlarged and Normal mode when a character is selected)
Microsoft Management Console (MMC)
Main Window Keyboard Shortcuts
1. CTRL+O (Open a saved console)
2. CTRL+N (Open a new console)
3. CTRL+S (Save the open console)
4. CTRL+M (Add or remove a console item)
5. CTRL+W (Open a new window)
6. F5 key (Update the content of all console windows)
7. ALT+SPACEBAR (Display the MMC window menu)
8. ALT+F4 (Close the console)
9. ALT+A (Display the Action menu)
10. ALT+V (Display the View menu)
11. ALT+F (Display the File menu)
12. ALT+O (Display the Favorites menu)
MMC Console Window Keyboard Shortcuts
1. CTRL+P (Print the current page or active pane)
2. ALT+Minus sign (-) (Display the window menu for the active console window)
3. SHIFT+F10 (Display the Action shortcut menu for the selected item)
4. F1 key (Open the Help topic, if any, for the selected item)
5. F5 key (Update the content of all console windows)
6. CTRL+F10 (Maximize the active console window)
7. CTRL+F5 (Restore the active console window)
8. ALT+ENTER (Display the Properties dialog box, if any, for theselected item)
9. F2 key (Rename the selected item)
10. CTRL+F4 (Close the active console window. When a console has only one console window, this shortcut closes the console)
Remote Desktop Connection Navigation
1. CTRL+ALT+END (Open the Microsoft Windows NT Security dialog box)
2. ALT+PAGE UP (Switch between programs from left to right)
3. ALT+PAGE DOWN (Switch between programs from right to left)
4. ALT+INSERT (Cycle through the programs in most recently used order)
5. ALT+HOME (Display the Start menu)
6. CTRL+ALT+BREAK (Switch the client computer between a window and a full screen)
7. ALT+DELETE (Display the Windows menu)
8. CTRL+ALT+Minus sign (-) (Place a snapshot of the active window in the client on the Terminal server clipboard and provide the same functionality as pressing PRINT SCREEN on a local computer.)
9. CTRL+ALT+Plus sign (+) (Place asnapshot of the entire client window area on the Terminal server clipboardand provide the same functionality aspressing ALT+PRINT SCREEN on a local computer.)
Microsoft Internet Explorer Keyboard Shortcuts
1. CTRL+B (Open the Organize Favorites dialog box)
2. CTRL+E (Open the Search bar)
3. CTRL+F (Start the Find utility)
4. CTRL+H (Open the History bar)
5. CTRL+I (Open the Favorites bar)
6. CTRL+L (Open the Open dialog box)
7. CTRL+N (Start another instance of the browser with the same Web address)
8. CTRL+O (Open the Open dialog box,the same as CTRL+L)
9. CTRL+P (Open the Print dialog box)
10. CTRL+R (Update the current Web page)
11. CTRL+W (Close the current window)

I hope it will help u

Speed Up Internet [Working Trick]

Speed Up Internet [Working Trick]
Hello guys, here's a tutorial how to speed up your internet connection with command prompt!
Note: Already worked on Windows 7 but I didn't test it on Windows XP or Vista.

Here it is:
#First go on: speedtest.net and check how faster is your connection internet! (And save an screenshot after you did the test!)Just to see the difference!


#Second: Go Start > CMD (
Run as administrator)

#Third: netsh interface tcp set global autotuning=disabled write this on command prompt window and press enter!
Screenshot:

SEO Tips For Beginners

Now a days SEO is one of the important parts of a site. It will help you to get a better traffic every day. It will also increase your site’s ranking. Although, SEO is the most essential but it is the most difficult work. Let know few SEO tricks to make it easy.

What I should know?
Before Search engine optimization you have to know that, SEO is a slowly method. Please never try to make it in a day. Try to make it slowly and gradually. Try to be create your back-links from high PR sites/blogs. Do not try to create more than 30 back links in a day.. It appears spam.
Tips To Know??
  • At first choose your keyword, use “Google Adwords”, or any other tools (See Tips For Picking out The Right Keyword).
  • When you go to make a comment in another site, fill your name space with your keyword. Then put email and your site url.(See Comment Making Fantastic Process).
  • You should always try to make a comment from high page rank site, if you want to check it manually it is really to hard. So that you can install Alexa toolbar in your browser. You also can download Google Page Rank ads-on on Firefox. They will automatically show the PR when you visit any site.
  • Then Select 3-5 forum site that relate your keywords. You can also do it by search ; such as this format “High page rank (your keyword) forum” in any search engine.
  • Then Select 3-5 forum site that relate your keywords. You can also do it by search ; such as this format “High page rank (your keyword) forum” in any search engine. Then make your signature in the forum with your keyword. Create 5 post in each forum site regularly and make comment in other article. By these method you can build 30 high quality backlinks everyday.
  • Never use any software or plugin to make backlinks. Software generally make comment in other site with weak comment text. The Website owner of that site, make these types of comments spam. So, Be careful.

It is just tips for Beginners,so if u r new to SEO then i hope it is going to help u
thanks

Is you antivirus working perfect ?

This trick will let you detect whether your antivirus software is working or is just a waste. it will create a file which every antivirus sofware will detect as virus but dont worry it is harmless and will not harm your computer.

First open Notepad and copy below code into it:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
  • Save the file as virus.exe.
  • As soon as you will run this file you antivirus will detect it as software. If not then you need to change your program.
Enjoy !!! Overjoy

Some Tips To Keep Your PC Faster

Follow Below Steps


Audio- and video-based computers thrive on speed, so who doesn’t want a faster computer? But you might not need to buy a faster machine if you follow these tips. Most are for Windows XP, but also apply to Windows Vista™.

Turn off the programs that load into RAM on startup. Go Start > Run, type MSCONFIG in the “Open” field, then click on OK. Click on the Startup tab, and uncheck anything that’s not essential. Do you really need “iTunes Helper”? Don’t be afraid to uncheck functions, as Windows will open anything it really needs.

Optimize USB and FireWire external hard drives for performance. Go Start > Settings > Control Panel. Double-click on System, click on the Hardware tab, and click on Device Manager. Click on the + symbol next to Disk Drives, right-click on your external drive, and select Properties. Click on the Policies tab, and choose “Optimize for Performance” (Fig. 1) There is a tradeoff, though; to avoid potential data loss, use the “Safely Remove Hardware” option in the system tray (the button with the green arrow) when disconnecting the drive.

Optimize internal drives for performance. Follow the same steps as above, but right-click on an internal drive instead of an external one. Select Properties, click on the Policies tab, and choose “Enable Write Caching on the Disk.”


Enabling write caching on external drives can improve performance.

Use ReadyBoost. This is the only tip that isn’t free, but with Windows Vista you can insert a USB thumb drive (up to 4GB) and when you do, you’ll be prompted as to whether you want to enable ReadyBoost (Fig. 2). This adds more memory to your system; it isn’t the same as adding more system RAM, but is more like having a really good disk cache. The improvement in speed is noticeable for just about anything other than continuous streaming of data. You do need a fast USB drive; if it isn’t fast enough, Windows Vista will notify you that it’s not suitable.


ReadyBoost is a great way for Windows Vista users to speed up data transfers.

Be careful about automatic updates. Windows Automatic Update is worth leaving on, as security patches for Internet Explorer are relatively frequent. But some automatic updates essentially take over your computer while they do their job, which can interfere with your work. Most automatic updates have an option where you can ask to be notified of updates, which lets you decide whether to install them immediately or wait. Another option is to schedule updates for when you’re not using your computer.

For your audio interface, use ASIO instead of MME or WDM drivers with Sony Creative Software applications. Most interfaces have drivers for all three, but MME and WDM are much slower. And never use any driver that’s “emulated.”

With ASIO, give priority to Background Services. Sony’s programs support the low-latency ASIO protocol, but for best results, go Start >Settings > Control Panel. Double-click on System, click on the Advanced tab, and under Performance, click on Settings (Fig. 3). When the Performance Options window opens, click on the Advanced tab and for Processor Scheduling, choose “Background Services.”

Giving priority to background services helps ASIO work more efficiently.

Check periodically for new drivers for hardware. New drivers often result in better performance. And don’t forget your graphics card; graphics performance often affects audio.

Defragment your drives periodically. This isn’t as important as it once was, but a really fragmented drive can slow things down.

Don’t disable System Restore. Some people claim disabling System Restore improves performance, but it’s worth taking the teeny (if any) performance hit in exchange for being able to return to a restore point when needed.

Enjoy :)

Block Youtube Ads

Bored to seen ads when playing youtube videos ?
Now, Its Time to say “GOOD BYE” to those boring ads.Block Youtube Ads For Free.
1st download below software called “Youtube Ads Blocker”
Size = 0.6 mb only
Install downloaded software and just restart your browser.
Now you can successfully Blocked Booooooring Ads.
Enjoy !!!

Update Your Facebook Status Via Anything

want to update your status via anything like this > iphone ,or via anything.,,,,
just click on below names for update your status via anything


update your facebook status via this things and give surprize to your friend.

Why Do I Need A Web Site? What is Web Hosting?

Everyone is on facebook and twitter, does my business really need a web site? Isn’t facebook really my web site these days?
These questions are common for businesses that have been starting up the last couple of years – especially businesses that focus on a non-online basis (say a local retail store). Facebook and other social mediums like LinkedIn, MySpace, and Twitter – all give you a little space to publish your message. Think of it as a small bill board that you get for free with facebook and other social media sites. But if you want to provide a branded and interactive experience that drives business to you – then having your owb web site is crucial.
Think you don’t need a web site – because you just have local clients who come to your shop? You can get more local clients aware of your buisness by having a web site, combined with using the social media tools. But having your own web site lets you setup email news letters (so you can re-announce to your current clients to come back in during promotional periods), as well as sell direct to people outside your region. Any business can use more business – opening your self up to the world for client with a strong web site can only help (it never hurts!). Even if you are a local retailer, focused on walk in sales only – a web site won’t hurt you, it will only help promote more people to come in and check you out!


First, we need to define what is web hosting.
A web hosting service is a type of Internet hosting service that
allows individuals or organizations to make their website visible on
the Internet. This can very greatly from a simple Static web page to
a trully interactive video rich experience that drives sales through an online e-commerce shopping cart. Web hosting companies provide
space on a server owned or leased for use by clients that typically
includes internet connectivity housed in a datacenter. Web hosts can
also provide data center space and connectivity for other advanced needs beyond just web site hosting, such as an office’s central file server, mail server, or even virtual desk tops. Web Hosting is the most common and basic form of what commonly today is refered to as “Cloud Hosting”, or “The Cloud” since your web site resides out on the internet, allowing anyone to access the information you want publicized.

How do you get your own web site and start web hosting?
You would contact a hosting provider such as TOS HOST. You
would then decide on whether you’re looking for a quick and easy web site to build, or perhaps something more involved that might include your own shopping cart to sell products online, an email newsletter to promote recurring businesses, and even your own blog to publish content to attract new visitors.
If you’re looking to start up your own hosting company, reseller hosting is the way to go. However, if you’re like most people, you’re attempting to host your website so that you can
bring traffic to your business. You could accomplish your goals by
purchasing a cPanel web hosting account. A cPanel account allows you to have a
location where you store your files, setup email along with a myriad
of tools.

Delete Undeletable File Or Virus

Sometimes some of our pc files are become undeletable that means when you want to delete those file it shows many errors.
Follow below steps for Delete This type files.
  1. Open Notepad From Program Files.
  2. Click File>>Save As >>
  3. You should see a popup box.
  4. Now locate the folder where ur undeletable file is.
  5. Choose ‘All files’ from the file type box .
  6. click once on the file u wanna delete so its name appears in the ‘filename’ box .
  7. put a ” at the start and end of the filename
    (the filename should have the extension of the undeletable file so it will overwrite it).
  8. Click save and Save file (It should ask u to overwrite the existing file, choose yes and u can delete it as normal) .
  9. Now Delete This File.
  10. Enjoy !!!

Samsung Galaxy S3 Camera Tricks and Tips

94 000023989 3659 s3fronts Samsung Galaxy S3 Camera Tricks and TipsThe Great Mobile Phone Samsung Galaxy S3 has Proved to be one of the most Sold Mobile Phone as per the Records in the UK. This seems to be due to its slick ICS equipped UI, Quad-Core Processor, Curved Contours and the HD 8-megapixel Camera.
By looking at the Samsung Galaxy S3 Review and Full Phone Specification, we were quite Impressed by the High Resolution Camera. The all new Samsung Galaxy S3 has the same Lens and Sensor as the Galaxy S2 but it seems that Samsung has Optimized the Software and has Improved the Picture Quality and added many New Features.
Looking forward to the great Camera of Samsung Galaxy S3, we here today provide you with some of the Tricks and Tips to get the Maximum Best possible out of your Samsung Galaxy S3′s Camera. So just read on.


Reduce the Resolution
Reduce the Resolution Samsung Galaxy S3 Camera Tricks and Tips
The Samsung Galaxy S3 let us Capture Photographs in Six Different resolutions, i.e. from 0.3 Mega-Pixels to 8 Mega-Pixels. As we all know that High Resolution Photograph are big in size and it takes longer to Process and Upload to any Service Like Facebook etc. So alternatively we can Drop down the Camera’s Resolution to 3.2 Mega-Pixels which will make our Uploading process fast.
Not only the Uplaoding goes Fast, but this Tip also takes and Occupy less space on our Internal Memory or the Micro-SD Card. The same Tip can be applied while shooting the Videos. As the Samsung Galaxy S3 can Shoot Videos and Movies at Full HD Resolution ( i.e. 1080p ), so we can drop its resolution to 720p instead and it will also look Fantastic while viewing and we can even send the 720p recorded movie via MMS.
Customize the interface
Customize the Interface Samsung Galaxy S3 Camera Tricks and Tips
We can use this Tip to Customize the Interface of our Galaxy Camera. There are the Four Icons Running Down the Side of the Screen in the Camera. Press and Hold any one of them. After that a Grid appears, simply Drag those you use most Frequently onto the Bar to Replace the Defaults.
Use the Flash
Galaxy S3 Flash Samsung Galaxy S3 Camera Tricks and Tips
The Samsung Galaxy S3 has an Impressive LED Flash, which we do not have to Reserve for Dim Light Conditions, it can also be used to great effect in Daylight to Counter Act Dark Shadows as a ” Fill Flash ” when you take Photographs and Videos.
The Samsung Galaxy S (like all modern cameraphones), doesn’t include an Optical Zoom so as to keep the Cost down, instead there is a Digital Zoom, but by using this, it enlarges the Pixels thus Reducing the Quality Significantly.
Use Scene Modes
Scene Modes Samsung Galaxy S3 Camera Tricks and Tips
The Galaxy S3 does not let us set the shutter manually like provided in some other Dedicated Cameras, but Slow and Fast Shutter Commands are Included as Scene Modes. We can select Sports for a Fast Shutter to Capture Fast Moving Action and Night Mode for Occasions when we want a Slower Shutter.
There is also a Metering Mode that determines the Exposure ( i.e. Brightness ) of the Photo. If the Metering is Wrong, Elements of Photo can be Too Dark or the Sky can look Bleached Out.
There are 3 options available in Galaxy S3 :
  1. Center Weighted : Where the Light is measured from the middle of the picture.
  2. Spot : Where the Light is measured from a Small Area.
  3. Matrix : Where the Light is measured at several different points and an average is used.
Experiment with them and if you are Unsure, then try to use Matrix Metering.
HDR
Samsung Galaxy S3 HDR Samsung Galaxy S3 Camera Tricks and Tips
HDR stands for High Definition Range and this option is located in the Camera Settings. It is Useful for Situations with High and Low Contrast areas. This works by taking a Series of Photographs at different Exposure Settings and combining them in Camera, Retaining Shadow and Highlighting the details.
Remember to keep the Camera as still as possible in HDR mode.
Photo Editor
Photo Editor Samsung Galaxy S3 Camera Tricks and TipsPhoto Editor is a Dedicated Camera Application available to Download from Samsung Apps. Not only Rotating, Cropping and Adjusting the Exposure of the photographs, we can also use it to add Effects such as Motion Blur, select using the Lasso Selection and Experiment with different Paint Brush Effects.
Photo Editor is a Best Application to tweak the Pictures, available for Free to Download.
Rule of Thirds
Rule Of Thirds Samsung Galaxy S3 Camera Tricks and Tips
This option, also known as Guidelines is located in the Camera Settings of the Galaxy S3. We can use to Compose our own Pictures. It replicates the Rule of Thirds Grid used in Photography, by overlaying a Grid on the Screen.
Auto Sync
This option is Turned ON by Default when we Set Up our Gmail Account on the Smasung Galaxy S3. This feature automatically Upload our Pictures to Google Plus.
We can Turn this OFF by going to :
  1. Settings
  2. Accounts and Sync
  3. Click on your Email Address
  4. Untick ” Sync Google Photos “.
These are the most useful Samsung Galaxy S3 Tricks and Tips that we can make use of to maximize our Experience with its Camera.


  Hope you find these Tricks and Tips useful.