Monday, December 19, 2011

How to remove facebook virus posting on your friends profiles

If you’re facing the problem with automatic (nude) video posts on your friends walls, it is being done through the extension installed on your browser.

So the solution to remove this facebook virus is to remove / uninstall the extension. Extension is named “YouTube Premium“.

Google Chrome: Goto Tools > Extensions and remove the extension youtube premium from there

Mozilla Firefox: Goto Tools > Addons > Extensions and remove the addon “youtube premium”

Hopefully this will resolve the issue of facebook virus posting nude video link on your friends walls from your name!

and yes next time think twice before clicking on such links.

Friday, December 9, 2011

Apple iOS 5 features & Download Links

Apple’s iOS 5 has been released, with owners of the iPhone 4, iPhone 3GS, iPad and iPad 2, along with the third- and fourth-gen iPod touch all getting the latest version of the mobile platform as a free update. Available to download for existing devices via iTunes


iOS 5 also brings with it iCloud, Apple’s new synchronization and backup system that promises to deliver your music and documents across all devices, as well as replace iTunes on the desktop as the hub of the digital ecosystem. All iOS 5 users – as well as those running OS X Lion on their Macs – will get 5GB of free iCloud storage, with more available at a fee. You can access the iCloud web-based login at icloud.com.


iOS 5 is compatible with the iPhone 3GS, 4, and 4S; the third- and fourth-generation iPod touch; and any iPad. To install it, you’ll just connect your iOS device to iTunes and—if not prompted to upgrade straight away—click on the Check For Updates button.
iOS 5 For iPhone, iPad And iPod Touch Download Links:




Thursday, June 16, 2011

How to Type in Marathi or other languages in any website

Many times we want to reply a message in our own language but we can do. But now by using Google Transliteration Bookmarklet we can type our message in any language in any website like Facebook, orkut
To do this follow these steps





For Firefox
  • Drag and drop this link [अ Type in Marathi] in your browser’s bookmark bar.
  • When you want to type in Marathi then click on that bookmark
  • Translation will be enabled and you will see the in Typing bar.
  • If you want to disable this then again click on that bookmark.
For Internet Explorer
  •  Write click on [अ Type in Marathi] then make a bookmark of it.
  • To enable it click on that bookmark
  • If you want to disable it then again click on that bookmark
For Google Chrome
  • Press Ctrl+B so that Bookmark toolbar will appear
  • Now drag and drop this link in that toolbar [अ Type in Marathi]
  • To enable it click on that bookmark
  • If you want to disable it then again click on that bookmark
 For other language

Friday, April 22, 2011

How to avoid facebook spam

The rise of social media has unsurprisingly brought with it a number of different online scams. Nowadays the scams are much more sophisticated than the famous Nigerian scams and can be quite hard to detect as well. What makes these types of scams even more damaging than the traditional email based techniques is that people tend to trust the links they receive from their friends. Additionally, social media makes the hackers’ job easier by providing a convenient means to spread the infection virally, instead of having to rely on lists of email addresses.


This post  covers some of the more common scams in use on Facebook today.



Click-Jacking - is a type of scam where a clickable button in your web browser performs some other function than the one intended, such as installing malware on your pc.

Like-Jacking - is commonly being linked with a fake video of a “teacher” wearing an outfit that has her back-end exposed. When you follow the link to watch the video, clicking anywhere on the video will cause you to “Like” it, posting a link to the fake webpage onto your Facebook wall. If you’ve fallen victim to this type of hoax you can click on the “x” at the top of the post and select “Remove and Unlike”.

Status-Jacking - is more malicious, it is when your account is compromised and a hacker has gained access to your login credentials. This can arise from a Click-Jacking scheme, but there are other ways in which hackers can gain access to your account.

Free Gold for Games / Free Facebook Credits- Often these types of scams will have you “Like” a Facebook profile that has been compromised. There are literally hundreds of these types of pages on Facebook, and the risk runs anywhere from simple tracking malware to full blown Status-Jacking. Like everything else on the internet, if something is being advertised as being free, chances are it’s a scam.

There are several important measures you can take to protect yourself from this type of attack :

1) Don’t click on any links from friends that seem uncharacteristic of them. If grandma is gushing over ranbir kapoor’s newest haircut, chances are her account has been compromised and the link contains malware. Unless of course your grandmother happens to like ranbir kapoor.
2) Pay attention to the source of the post. If it was posted from the web, you will see “via Facebook” text at the bottom of the post. If that text says something that sounds fishy, chances are it’s a scam.
3) Don’t trust external websites that invite you to download something. If you’re unsure whether something is a hoax or legit, just play it safe and don’t click on it.
4) Maintain up-to-date Antivirus software on your computer.
5) Make sure that your home network is secured, especially if it is wireless.
6) Maintain tight privacy settings in Facebook and regularly check that they are up-to-date.
7) Log out of Facebook after you are done if you are using a shared computer.
8) Don’t add friends that you don’t know.

:-)

Monday, February 21, 2011

How to protect yourself from phishing attacks


Phishing is an increasingly common type of spam that can lead to theft of your personal details such as credit card numbers or online banking passwords.

Phishing attacks work by the scam artist sending "spoofed" emails that appear to come from a legitimate website that you have online dealings with such as a bank, credit card company or ISP - any site which requires users to have a personal identity or account. The email may ask you to reply with your account details in order to "update security" or for some other reason.
The phishing email may also direct you to a spoofed website or pop-up window which looks exactly like the real site, but has been set up for the sole purpose of stealing personal information. Unsuspecting people are then often fooled into handing over credit card numbers, passwords or other details.
How to protect yourself:

Never respond to emails that request personal financial information
Banks or e-commerce companies generally personalise emails, while phishers do not. Phishers often include false but sensational messages ("urgent - your account details may have been stolen") in order to get an immediate reaction. Reputable companies don't ask their customers for passwords or account details in an email. Even if you think the email may be legitimate, don't respond - contact the company by phone or by visiting their website. Be cautious about opening attachments and downloading files from emails, no matter who they are from.

Visit banks' websites by typing the URL into the address bar
Phishers often use links within emails to direct their victims to a spoofed site, usually to a similar address such as mybankonline.com instead of mybank.com. When clicked on, the URL shown in the address bar may look genuine, but there are several ways it can be faked, taking you to the spoofed site. If you suspect an email from your bank or online company is false, do not follow any links embedded within it.

Keep a regular check on your accounts
Regularly log into your online accounts, and check your statements. If you see any suspicous transactions report them to your bank or credit card provider.

Check the website you are visiting is secure
Before submitting your bank details or other sensitive information there are a couple of checks you can do to help ensure the site uses encryption to protect your personal data:Check the web address in the address bar. If the website you are visiting is on a secure server it should start with "https://" ("s" for security) rather than the usual "http://".
Also look for a lock icon on the browser's status bar. You can check the level of encryption, expressed in bits, by hovering over the icon with your cursor.

Note that the fact that the website is using encryption doesn't necessarily mean that the website is legitimate. It only tells you that data is being sent in encrypted form.

Be cautious with emails and personal data
Most banks have a security page on their website with information on carrying out safe transactions, as well as the usual advice relating to personal data: never let anyone know your PINS or passwords, do not write them down, and do not use the same password for all your online accounts. Avoid opening or replying to spam emails as this will give the sender confirmation they have reached a live address.

Saturday, February 12, 2011

Microsoft Nokia Partnership




Nokia and Microsoft announced a “broad strategic partnership” feb 11 2011, as both companies try to claw their way back into the smartphone market. Nokia will now produce a host of new Windows 7 phones that CEO Stephen Elop promises will make the segment a “three horse race” between Google, Apple, and the new Nokia-Microsoft partnership. Microsoft’s Steve Ballmer, meanwhile, said the move would “dramatically accelerate” Windows Mobile 7 adoption.

This pioneering partnership has been kindled to soon equip Nokia’s Symbian devices with smarter and more advanced features for working on the move. Heaps of Nokia smartphones are primed to benefit over time, with Eseries on the frontline leading the charge and set to showcase the first breed of business services and apps. Dedicated teams from inside Nokia and Microsoft are now working together to bring this new era of mobile productivity to life on Symbian handsets. This isn’t just conceptual stuff, as both companies are closely collaborating to ensure the software and services are fully co-created, from the design and development of their creations to the marketing to ensure the best possible product ends up proudly in our palms

Microsoft/Nokia Partnership Enough to Challenge Apple?

App Gap

The app gap is oft-cited as a prime reason behind Apple’s success, but it bears repeating. iOS currently has almost 350,000 active apps available to consumers through the App Store. Windows Phone 7 has about 8,000 apps. Even with a growth rate of 125 apps each day, Apple’s advantage at this point may be insurmountable. Each Apple iOS device averages more than 60 downloaded apps, and the App Store remains the top destination by a huge margin in terms of time spent browsing app marketplaces by consumers.
 Apple has the added advantage of offering multiple, non-phone platforms that also use and encourage the sale of apps (iPod touch and iPad), which adds to the perceived value of software purchases for consumers. Try as it might, Windows can’t gain purchase in the personal media player market, and WP7 doesn’t seem poised to make the jump to tablets anytime soon.

The Holistic Approach

Under the new arrangement between the two companies, Nokia builds hardware, and Microsoft builds software. Apple builds both. The advantage of having both hardware and software teams constantly working together to deliver the best possible consumer experience as a total product cannot be overemphasized. Any partnership between two companies, no matter how closely it may resemble an actual merger, isn’t one. Corporate cultures, offices and ultimate goals remain distinct. In this case, that’s especially true, since Microsoft announced this was a non-exclusive deal, and it would still be working with other hardware partners .
Apple’s ability to pair the hardware and software development sides of making a smartphone not only allow it to win the UX game, but also advantageously affects cost and the pace of breakthroughs and advances, and downplays the importance of internal specifications. It’s why an iPhone that’s almost a year old can still compete with just-released hardware from competitors in terms of real-world performance, and it’s a big part of why Apple enjoys the high margins that it does on the sale of each piece of hardware it makes.
Because Nokia and Microsoft aren’t starting from scratch, it’s most likely that the partnership will bear all the earmarks of success, at least from the outset. If they do it right, we’ll see the simultaneous release of a bunch of shiny new handsets sporting WP7, and these will be decently well-received by Nokia’s existing customer base. But without significant changes from either camp in the way they think about how to make phones and software, Apple doesn’t have to worry about being knocked off its rock just yet.

Wednesday, February 2, 2011

How To Identify Fake E-mail ID

Hello friends, Daily we got almost 100's of face emails ,Like in spam folder. A php script can mail you from any email address...Even from your own email address..So How To Identify the Fake E-mail ID
At present it is difficult to identify the fake ID. With time more and more people are using the fake IDs which creates a bunch of trouble to thousands of people. So here detection of those fake IDs has become almost a necessity. It is also important because hackers are always looking to use the fake email IDs to get the personal information of victims.

There are several techniques to identify the fake e-mail IDs. The common method you can use is to send test mail to those IDs. If you got failure notification then its a fake email IDs. Alternatively there is couple of web service which identify the fake e-mail IDs for the users.
 
Email Address Checker:

Email Address Checker is well known email IDs checker which identify the the validity of any kind of emails IDs. All you need to do is type the email IDs in the box and press ‘Check’ button. Within a moment it displays the validity of email IDs.

IsValidEmail :
You can also try IsValidEmail as alternative web service to check for valid email IDs. If you got the answer is true then it is valid otherwise it is fake. All you need to add email IDs and click on ‘Invoke’.
is email id valid Easy Step To Identify the Fake E mail ID.



Stay Tuned,Stay Safe 









Monday, January 17, 2011

Google, Facebook and Yahoo Ready IPv6 Test


Several of the Internet's most popular Web sites - including Facebook, Google and Yahoo - have agreed to participate in the first global-scale trial of IPv6, the long-anticipated upgrade to the Internet's main communications protocol known as IPv4.

       The trial — dubbed "World IPv6 Day" — requires participants to support native IPv6 traffic on their main Web sites on June 8, 2011.
Leading content delivery networks Akamai and Limelight Networks also committed to the IPv6 trial, which is being sponsored by the Internet Society. IPv6 is a necessary upgrade because the Internet is running out of IP addresses using the 30-year-old IPv4 standard.


Less than 5% of IPv4 addresses are left unallocated to the regional Internet registries, which in turn dole them out to network operators. Experts say the free pool of IPv4 addresses will be depleted in a matter of weeks.
IPv4 uses 32-bit addresses and can support 4.3 billion devices connected directly to the Internet. IPv6, on the other hand, uses 128-bit addresses and supports a virtually unlimited number of devices - 2 to the 128th power.

The day-long IPv6 trial is a critical development for content providers such as Google and Facebook, which until now have been supporting IPv6 at separate, dedicated Web addresses rather than on their main traffic-heavy Web sites. Google, for example, says it will enable IPv6 on its main Web sites - including www.google.com and www.youtube.com - for World IPv6 Day.
The event is also a big deal for Yahoo, which has been reluctant to support IPv6 because of concerns about using a DNS whitelisting approach like Google's, which provides IPv6 content only to users with known end-to-end IPv6 connectivity.
"Participating in World IPv6 Day will allow us to obtain real-life data that we can use to ensure a seamless user experience as we transition to IPv6," said Adam Bechtel, vice president of Yahoo's Infrastructure Group, in a statement. "We welcome this opportunity to collaborate with the technical community and provide leadership in addressing the scaling challenges facing the Internet."

Monday, January 10, 2011

Facebook virus spreads via photo album chat messages

A new social networking worm in the vein of Koobface is currently doing the rounds.
This one actively infects your computer with malware instead of simply tricking you into taking surveys and passing on messages to other users.

The link in his Facebook chat from a friend pointed to an app.facebook.com/CENSORED link. Typically when you go to a Facebook app page it prompts you to add the application and grant it permission to post on your behalf or read your profile data. The scary part about this one is that it immediately prompts you to download a "FacebookPhotos#####.exe" file with no prompting or clicking required. The screen reads "Photo has been moved. This photo has been moved to other location. To view this photo click View Photo." If your computer has not already downloaded the malware, the "View Photo" button will download the virus for you.
It is really unfortunate that Facebook scams are moving back towards spreading malware. Fortunately, users of Sophos Anti-Virus had proactive protection from this threat with both our HIPS and suspicious file detection technologies; this particular strain is now identified by Sophos as W32/Palevo-BB.

The good news is that even as I was writing this article, Facebook removed the malicious application from its service. But there are probably many more applications like this one making the rounds, so, as always, beware of unusual messages from friends whether they are in email, on their walls, or in an instant  .