Monday, February 20, 2012

FBI May Shut Down Your Internet Access on March 8th 2012

The Internet could go dark for millions of users as early as March 8 because of a virus that has corrupted computers in more than 100 countries. Last year, authorities in Estonia apprehended six men believed responsible for creating a malicious computer script called the DNSChanger Trojan. Once set loose on the Web, the worm corrupted computers in upwards of 100 countries, including an estimated 500,000 in America alone.
The primary impact of this infection is that it caused web surfers to be sent to fraudulent websites by changing what is called the DNS settings on compromised computers.The Domain Name System (DNS) is the backbone of the Internet's address scheme and DNS servers are special computers around the world that act as Internet traffic cops providing directions to websites that you wish to visit.
Though the FBI has shut down the DNSChanger network and put up surrogate servers, they warned the solution was only temporary - and the court-ordered deadline is March 8. When the FBI pinched this group, if they had shut down the rogue DNS servers, everyone that was infected would have instantly been cut off from the Internet so the FBI chose a different strategy.They decided to get a court order allowing them to replace the rogue DNS servers with legitimate stand-ins so that all the infected computers wouldn't get cut off without warning giving them time to get the word out.

Both Windows and MacOS users are at risk for this infection because it exploits your browser, not your operating system. If you are somewhat technical, you can do a self-check of your computer to make sure you're not infected by comparing your computer's DNS setting to the list of rogue DNS servers:

85.255.112.0 through 85.255.127.255
67.210.0.0 through 67.210.15.255
93.188.160.0 through 93.188.167.255
77.67.83.0 through 77.67.83.255
213.109.64.0 through 213.109.79.255
64.28.176.0 through 64.28.191.25

The FBI has published a pretty decent guide to performing the self-check here. If you are infected by the DNSChanger Trojan, the FBI reminds us that this malware also disables security updates which could have further exposed you to other malware. 

Monday, December 19, 2011

How to remove facebook virus posting on your friends profiles

If you’re facing the problem with automatic (nude) video posts on your friends walls, it is being done through the extension installed on your browser.

So the solution to remove this facebook virus is to remove / uninstall the extension. Extension is named “YouTube Premium“.

Google Chrome: Goto Tools > Extensions and remove the extension youtube premium from there

Mozilla Firefox: Goto Tools > Addons > Extensions and remove the addon “youtube premium”

Hopefully this will resolve the issue of facebook virus posting nude video link on your friends walls from your name!

and yes next time think twice before clicking on such links.

Friday, December 9, 2011

Apple iOS 5 features & Download Links

Apple’s iOS 5 has been released, with owners of the iPhone 4, iPhone 3GS, iPad and iPad 2, along with the third- and fourth-gen iPod touch all getting the latest version of the mobile platform as a free update. Available to download for existing devices via iTunes


iOS 5 also brings with it iCloud, Apple’s new synchronization and backup system that promises to deliver your music and documents across all devices, as well as replace iTunes on the desktop as the hub of the digital ecosystem. All iOS 5 users – as well as those running OS X Lion on their Macs – will get 5GB of free iCloud storage, with more available at a fee. You can access the iCloud web-based login at icloud.com.


iOS 5 is compatible with the iPhone 3GS, 4, and 4S; the third- and fourth-generation iPod touch; and any iPad. To install it, you’ll just connect your iOS device to iTunes and—if not prompted to upgrade straight away—click on the Check For Updates button.
iOS 5 For iPhone, iPad And iPod Touch Download Links:




Thursday, June 16, 2011

How to Type in Marathi or other languages in any website

Many times we want to reply a message in our own language but we can do. But now by using Google Transliteration Bookmarklet we can type our message in any language in any website like Facebook, orkut
To do this follow these steps





For Firefox
  • Drag and drop this link [अ Type in Marathi] in your browser’s bookmark bar.
  • When you want to type in Marathi then click on that bookmark
  • Translation will be enabled and you will see the in Typing bar.
  • If you want to disable this then again click on that bookmark.
For Internet Explorer
  •  Write click on [अ Type in Marathi] then make a bookmark of it.
  • To enable it click on that bookmark
  • If you want to disable it then again click on that bookmark
For Google Chrome
  • Press Ctrl+B so that Bookmark toolbar will appear
  • Now drag and drop this link in that toolbar [अ Type in Marathi]
  • To enable it click on that bookmark
  • If you want to disable it then again click on that bookmark
 For other language

Friday, April 22, 2011

How to avoid facebook spam

The rise of social media has unsurprisingly brought with it a number of different online scams. Nowadays the scams are much more sophisticated than the famous Nigerian scams and can be quite hard to detect as well. What makes these types of scams even more damaging than the traditional email based techniques is that people tend to trust the links they receive from their friends. Additionally, social media makes the hackers’ job easier by providing a convenient means to spread the infection virally, instead of having to rely on lists of email addresses.


This post  covers some of the more common scams in use on Facebook today.



Click-Jacking - is a type of scam where a clickable button in your web browser performs some other function than the one intended, such as installing malware on your pc.

Like-Jacking - is commonly being linked with a fake video of a “teacher” wearing an outfit that has her back-end exposed. When you follow the link to watch the video, clicking anywhere on the video will cause you to “Like” it, posting a link to the fake webpage onto your Facebook wall. If you’ve fallen victim to this type of hoax you can click on the “x” at the top of the post and select “Remove and Unlike”.

Status-Jacking - is more malicious, it is when your account is compromised and a hacker has gained access to your login credentials. This can arise from a Click-Jacking scheme, but there are other ways in which hackers can gain access to your account.

Free Gold for Games / Free Facebook Credits- Often these types of scams will have you “Like” a Facebook profile that has been compromised. There are literally hundreds of these types of pages on Facebook, and the risk runs anywhere from simple tracking malware to full blown Status-Jacking. Like everything else on the internet, if something is being advertised as being free, chances are it’s a scam.

There are several important measures you can take to protect yourself from this type of attack :

1) Don’t click on any links from friends that seem uncharacteristic of them. If grandma is gushing over ranbir kapoor’s newest haircut, chances are her account has been compromised and the link contains malware. Unless of course your grandmother happens to like ranbir kapoor.
2) Pay attention to the source of the post. If it was posted from the web, you will see “via Facebook” text at the bottom of the post. If that text says something that sounds fishy, chances are it’s a scam.
3) Don’t trust external websites that invite you to download something. If you’re unsure whether something is a hoax or legit, just play it safe and don’t click on it.
4) Maintain up-to-date Antivirus software on your computer.
5) Make sure that your home network is secured, especially if it is wireless.
6) Maintain tight privacy settings in Facebook and regularly check that they are up-to-date.
7) Log out of Facebook after you are done if you are using a shared computer.
8) Don’t add friends that you don’t know.

:-)

Monday, February 21, 2011

How to protect yourself from phishing attacks


Phishing is an increasingly common type of spam that can lead to theft of your personal details such as credit card numbers or online banking passwords.

Phishing attacks work by the scam artist sending "spoofed" emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP - any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to "update security" or for some other reason.
The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.
How to protect yourself:

Never respond to emails that request personal financial information
Banks or e-commerce companies generally personalise emails, while phishers do not. Phishers often include false but sensational messages ("urgent - your account details may have been stolen") in order to get an immediate reaction. Reputable companies don't ask their customers for passwords or account details in an email. Even if you think the email may be legitimate, don't respond - contact the company by phone or by visiting their website. Be cautious about opening attachments and downloading files from emails, no matter who they are from.

Visit banks' websites by typing the URL into the address bar
Phishers often use links within emails to direct their victims to a spoofed site, usually to a similar address such as mybankonline.com instead of mybank.com. When clicked on, the URL shown in the address bar may look genuine, but there are several ways it can be faked, taking you to the spoofed site. If you suspect an email from your bank or online company is false, do not follow any links embedded within it.

Keep a regular check on your accounts
Regularly log into your online accounts, and check your statements. If you see any suspicous transactions report them to your bank or credit card provider.

Check the website you are visiting is secure
Before submitting your bank details or other sensitive information there are a couple of checks you can do to help ensure the site uses encryption to protect your personal data:Check the web address in the address bar. If the website you are visiting is on a secure server it should start with "https://" ("s" for security) rather than the usual "http://".
Also look for a lock icon on the browser's status bar. You can check the level of encryption, expressed in bits, by hovering over the icon with your cursor.

Note that the fact that the website is using encryption doesn't necessarily mean that the website is legitimate. It only tells you that data is being sent in encrypted form.

Be cautious with emails and personal data
Most banks have a security page on their website with information on carrying out safe transactions, as well as the usual advice relating to personal data: never let anyone know your PINS or passwords, do not write them down, and do not use the same password for all your online accounts. Avoid opening or replying to spam emails as this will give the sender confirmation they have reached a live address.

Saturday, February 12, 2011

Microsoft Nokia Partnership




Nokia and Microsoft announced a “broad strategic partnership” feb 11 2011, as both companies try to claw their way back into the smartphone market. Nokia will now produce a host of new Windows 7 phones that CEO Stephen Elop promises will make the segment a “three horse race” between Google, Apple, and the new Nokia-Microsoft partnership. Microsoft’s Steve Ballmer, meanwhile, said the move would “dramatically accelerate” Windows Mobile 7 adoption.

This pioneering partnership has been kindled to soon equip Nokia’s Symbian devices with smarter and more advanced features for working on the move. Heaps of Nokia smartphones are primed to benefit over time, with Eseries on the frontline leading the charge and set to showcase the first breed of business services and apps. Dedicated teams from inside Nokia and Microsoft are now working together to bring this new era of mobile productivity to life on Symbian handsets. This isn’t just conceptual stuff, as both companies are closely collaborating to ensure the software and services are fully co-created, from the design and development of their creations to the marketing to ensure the best possible product ends up proudly in our palms

Microsoft/Nokia Partnership Enough to Challenge Apple?

App Gap

The app gap is oft-cited as a prime reason behind Apple’s success, but it bears repeating. iOS currently has almost 350,000 active apps available to consumers through the App Store. Windows Phone 7 has about 8,000 apps. Even with a growth rate of 125 apps each day, Apple’s advantage at this point may be insurmountable. Each Apple iOS device averages more than 60 downloaded apps, and the App Store remains the top destination by a huge margin in terms of time spent browsing app marketplaces by consumers.
 Apple has the added advantage of offering multiple, non-phone platforms that also use and encourage the sale of apps (iPod touch and iPad), which adds to the perceived value of software purchases for consumers. Try as it might, Windows can’t gain purchase in the personal media player market, and WP7 doesn’t seem poised to make the jump to tablets anytime soon.

The Holistic Approach

Under the new arrangement between the two companies, Nokia builds hardware, and Microsoft builds software. Apple builds both. The advantage of having both hardware and software teams constantly working together to deliver the best possible consumer experience as a total product cannot be overemphasized. Any partnership between two companies, no matter how closely it may resemble an actual merger, isn’t one. Corporate cultures, offices and ultimate goals remain distinct. In this case, that’s especially true, since Microsoft announced this was a non-exclusive deal, and it would still be working with other hardware partners .
Apple’s ability to pair the hardware and software development sides of making a smartphone not only allow it to win the UX game, but also advantageously affects cost and the pace of breakthroughs and advances, and downplays the importance of internal specifications. It’s why an iPhone that’s almost a year old can still compete with just-released hardware from competitors in terms of real-world performance, and it’s a big part of why Apple enjoys the high margins that it does on the sale of each piece of hardware it makes.
Because Nokia and Microsoft aren’t starting from scratch, it’s most likely that the partnership will bear all the earmarks of success, at least from the outset. If they do it right, we’ll see the simultaneous release of a bunch of shiny new handsets sporting WP7, and these will be decently well-received by Nokia’s existing customer base. But without significant changes from either camp in the way they think about how to make phones and software, Apple doesn’t have to worry about being knocked off its rock just yet.