affiliate marketing

Saturday, March 16, 2013

What is phishing?


What is phishing?

Online phishing (pronounced like the word fishing) is a way to trick computer users into revealing personal or financial information through a fraudulent e‑mail message or website. A common online phishing scam starts with an e‑mail message that looks like an official notice from a trusted source, such as a bank, credit card company, or reputable online merchant. In the e‑mail message, recipients are directed to a fraudulent website where they are asked to provide personal information, such as an account number or password. This information is then usually used for identity theft.

Thursday, March 14, 2013

Multiple monitors


 How does Windows manage multiple displays?

Windows detects and identifies each monitor and projector that you connect, and applies the video settings that are best suited to each display. When you connect an additional monitor for the first time, you can choose how you want your desktop to appear on the display. In addition, Windows collects information about the additional display's video capabilities, including screen size, screen resolution, and color depth.
The next time that you connect that monitor, the display settings that you selected the first time you connected it are automatically applied. When you disconnect the monitor, the original display settings are restored.
Windows can save and restore display settings for any number of monitors and projectors.


 Why is my desktop automatically duplicated on alldisplays?


A mirrored desktop is the default display setting for multiple displays. If you don't choose how you want your desktop to appear in the New Display Detected dialog box, your desktop is automatically duplicated in each display.

 What options do I have for how my desktop appears oneach display?

In the New Display Detected dialog box, you can choose the appearance of your desktop on each display.
·         Mirrored.  Mirrors, or duplicates, your desktop on each display that you connect. Mirrored is the default display option. This option is useful if you plan to use your mobile PC to give a presentation on a projector or a fixed display in a conference room, such as a wall-mounted plasma display or TV-type monitor.
·         Extended.  Extends your desktop across all displays. You can move program windows between the displays, which increases your desktop area.
·         External display only.  Shows your desktop on each display that you connect, but not on your mobile PC display. This option is useful when you play a DVD on a mobile PC that supports full-screen video playback on a single display. It can also save battery power by turning off the mobile PC display and using only the external display.
When you select an option, you can preview the display in the New Display Detected dialog box. Click Apply to preview the display on the monitor or projector. Click OK to confirm your settings. If you click Cancel, Windows applies the default setting (mirrored).

Note

·         The New Display Detected dialog box appears only when you're using two displays. If you connect three or more displays, you must manually designate your primary display, arrange your desktop, and apply display settings in Display Settings in Control Panel

 How can I change the display settings of theadditional monitors that I connect?

Windows automatically applies the video settings that are best suited to each monitor that you connect.

To select different display settings for one or more displays

·         At the bottom of the New Display Detected dialog box, click Display.
The Display Settings dialog box opens, where you can change screen resolution, refresh rate, and color depth.

 How does Windows automatically detect an additionaldisplay?

Windows periodically checks for additional displays.
Most newer monitors and projectors support Extended Display Identification Data (EDID), a standard video data format that contains basic information about a display's capabilities, including maximum screen size, screen resolution, refresh rate, color depth, and orientation.
If a display is EDID-enabled, Windows automatically identifies the display and applies the appropriate display settings.

 What can I do if Windows can't identify the additionaldisplay?

If Windows can't identify the additional display, you can manually open the New Display Detected dialog box by using one of the following methods:
Press the keyboard shortcut on your mobile PC that turns on an additional display. The FN+F5 keyboard shortcut is used for this purpose on many mobile PCs. To determine which keyboard shortcut turns on an additional display, check the information that came with your mobile PC, or go to the manufacturer's website.
  What is the keyboard shortcut on my mobile PC that turns on an additional display?
The keyboard shortcut that turns on an additional display varies depending on your mobile PC manufacturer. It typically involves a keyboard shortcut, such as FN+F4 or FN+F5. To determine which keyboard shortcut turns on an additional display, check the information that came with your mobile PC, or go to the manufacturer's website.



Wednesday, March 13, 2013

We help to find best colleges in BANGALORE. »

We help to find best colleges in BANGALORE. »
We help to find best colleges in BANGALORE. We provide the proper educational planning. Proper guidance for the students to choose the best course, which they desire. We help to get direct admission a...

Tuesday, March 12, 2013

How Does a Proxy Server Work While Browsing the Internet?


How Does a Proxy Server Work While Browsing the Internet?



While browsing the internet from a home PC, there are a number of elements that make the entire process possible. On one end, we have the home PC. This PC is connected via its modem to the ISP’s server, which in turn is interconnected to servers around the world that host the specific web sites that we are requesting. From a network browser, we send a request to access a particular website by typing the site’s address. When we punch Enter, this request is sent to our ISP’s server, which identifies the request. If the ISP has a proxy server with cached requests, when retrieving our request it will check out the information in its cache to verify if the proxy can act in accordance with or not. This means that the proxy server saves all requests made from users to its cache, so that the next time another user makes an identical request, it does not have to retrieve that same information from the original server. Hence the proxy server responds by sending the information to our PC from its cache.
On the other hand, if the proxy server does not meet the terms, it will send the request to the actual server that hosts that particular website that we are requesting. The host server sends the information to the proxy server, which can then cache the response for upcoming requests, and then sends the information to our PC. Sometimes, more than one proxy servers can be drawn in, as some sites, like AOL, MSN, and YAHOO have several proxy servers that act in response to requests from their cache, thus dropping the amount of petitions to the main server and reducing response times. Online proxies can also be used for anonymous surfing, hiding the user’s IP to put a stop to sites from retrieving personal information from network users.
Once you have discovered the benefits of having an anonymous proxy server, you would probably like to purchase it. You can download it or purchase it from the internet. There are numerous sites, which provide you with the best selection of anonymous proxy servers available on internet. You can view the detailed features of various servers and even compare the prices. Next step is you can place your order, and it would be delivered to you. Benefit from the experience of a complete risk free surfing through anonymous proxy servers.

Proxy Browsing...


Utilize Proxy for Unidentified Browsing


You have almost certainly by now come to the position where you required visiting various websites however not from your own CPU. There are several grounds why you would like to look through the internet secretly. The chief motive is to conceal your IP address. Whilst you stopover any website you endow with a set of information regarding you as well as your CPU to facilitate that website. As of the IP address it is probable to find out not only your country however in addition further the exact place. Even though it is not simple to fix the IP address with meticulous human being, at times it is only not required to picture your place otherwise assets of your browser.
There is an extremely straightforward technique to keep away from exposing your information to the targeted page. You can utilize a proxy facility to evade your straight connection with whichever website. This is a facility that performs as a midway computer which allows your web addresses also returns asked for web pages. As a result the aimed website glimpses the proxy computer moreover not your computer otherwise your browser. In this manner you are not entering the websites openly plus your IP address as well as erstwhile data is not out in the open to the world however just to a single computer. The single drawback of browsing in this method is that the contact is a slightly sluggish because of the added “component” amid your computer along with the web server. This added component is a PC which downloads pages in addition to forwards them to your browser. However this is the single penalty you will have to give for inscrutability.
In the majority cases you know how to browse in a straight line for the reason that there is negative want to put out of sight yourself. However in a number of cases it is well again to browse in secret in addition to not make known your spot on personality. You know how to what’s more use proxy websites to way in your website as of other countries in turn to make sure if spot on ads for that particular country are put on show. It is simply up to you to make a decision as to when to browse in this manner. In any case, proxies make possible for us to in actual fact hide out the place as well as computer data.

Sunday, March 10, 2013

How To Speed Up Internet Connection Using TCP


How To Speed Up Internet Connection Using TCP

Transmission Control Protocol, or better know by the acronym TCP, is one of basics of the IP protocol. TCP is used by almost all applications that we use inside the operating system such as: World Wide Web, File Transfer (Download/Upload), Email ... If we can optimize TCP then we can really have a Faster Internet Speed by 200% (Tested). TCP can be customized by some registry hacks that can provide better connection with the Internet. But we are going to use a simpler way, this trick that we are sharing is to use a 3rd Party software that can interfere and change the TCP registry configuration to accelerate the Internet speed by around X2 more Faster. This method works perfectly for Game Lags and helpful for Latency and Ping.


How to Speed up Internet Connection using TCP/IP Optimization 


1) Download SG TCP Optimizer

2) Launch it.


3) Now it's time to customize it.


Under Network Adapter selection, select the adapter that you are using.
Under Choose Settings, select Custom
In Connection Speed section, scroll to the max (100+Mbps)
Set MTU value to 1500
Set Time To Live (TTL) value to 64
Check the two options under TCP 1323 (Windows Scaling, Timestamps) 
4) Click Apply Changes to apply all settings to the network adapter.

5) Restart your Computer. Now your Internet speed will go up to 200%

How To Create Shutdown Shortcut In Windows 8


How To Create Shutdown Shortcut In Windows 8




Hi techie.. Today we will Learn how to Create Shutdown Shortcut In windows 8, This shortcut will help you to shutdown your Computer Really very fast. As window 8 Users must know it takes a fair bit of time to shutdown, becoz you have to take your Cursor to the right corner then Start then bla bla bla.

With this Trick you can create a shutdown shortcut on you desktop and when ever you want to shutdown you pc just Click on that icon and thats it.


CREATING SHUTDOWN SHORTCUT:


Step 1 : To create a Shutdown shortcut in windows 8, Rightclick on clear spot of Desktop then navigate to New And then click On Shortcut.
step 2 : Now type the following Command, Its a command to shutdown windows PC. Where "t 00" is Seconds which windows will take to shutdown
Type this : 

shutdown.exe -s -t 00



Step 3 : After entering the Command , click on next. Now it will ask you to give a name to the shortcut.
It will automatically name it as Shortcut but you can change the name.

Step 4: Click on Finish. now you will see a shortcut ready on you desktop.

Step 5 : You can change the Icon of the shutdown shortcut That you created and choose any icon, this can Turn out to be a nice Prank with you friends.
 

CHANGING THE ICON :


To Change the icon, Right Click on the Shortcut That you created and select Properties, Then Click on Shortcut Tab then click on change icon,
After you Click on Change icon. you may be asked to Choose an icon from the list or Specify a different file, Just click OK.

Now you will see the a box with Icons to choose.

Choose any icon of you choice, i chose the arrowed one. Click on that icon , then click on Ok and then finally click on Apply.
Thats it friends you just created your Shutdown shortcut with icon.
Now whenever you want to shutdown your computer just Double Click on that icon.
keep visitng, Stay updated.
:)

Saturday, March 9, 2013

USE ANY SIM IN ANY MODEM WITHOUT UNLOCKING IT


USE ANY SIM IN ANY MODEM WITHOUT UNLOCKING IT.




Hey techies.., Today we will see how to use Any SIM card in any MODEM withou unlocking it.
As you must be knowing that we cannot use any simcard in any modem unless you unlock the modem. but in this article we will see how to use Any SIM in any MODEM without unlocking it.
You will need Nokia PC suite for this Trick.

follow the below steps:
         1  Insert the sim card in the modem which you want to and connect it to your PC.
2          2    IT will show you invalid sim, but don't worry just ignore that message and open Nokia PC suite.
              3  You will find connect to internet option in Pc suite, click on it.
4.         4   Now you have to configure so select configure, select your data card modem and do all operator                   apn setting which you use in nokia mobile connection.
5.          5  Finally finish the setup and connect to internet  through PC suite.
6.         6     Now your net is connected without unlocking.

Laptop Over Heating.....?




Now a days Major problem we face is Laptop Over heating. Laptop users Are always worried of  Laptop Overheating, Laptops require A great care from our side so that it keep on running for years and years.

Almost 90% laptops users face the problem of overheating. This overheating can cause the laptop to misbehave thereby causing internal machine failure.

Today we will see some tips to avoid overheating and keep your laptop as cool as possible.

1. Power Settings : Normally while working on laptops we keep it for charging and set the mode as "High performance". Due to this setting it consumes more power which cause your laptop to overheat.
Remedy to this is to set you laptop in the balanced or Power saver mode.what it will do is it will consume only that amount of power that is required.

2. Compressed Air : while Working on laptops in dusty conditions may lead to Dust gets deposited on the Cooling vents, Hence Choking them.This will cause the fan to get over worked and the Fan will work at high Temperatures.
In Order to Avoid This problem, Buy a can of Compressed air, and Spray it on the vents of your laptop.
This will remove all the dust and will keep your laptop much cool.


3. Surface: Normally we place our laptops on pillows or blankets,which is very comfortable to us while working.But many might not know that such surfaces Chokes the vents of you laptop and it cause it to overheat.
The Soft surface will not allow the heat to Escape and will be reflected back to internal machinery.
I recommend the best surface on which you should keep your laptops are the flat ones. Such as tables.
This will allow proper Flow of air and heat to Escape.


4.Cooling Pad : Cooling pad is another remedy to overheating of your laptops. Obviously it will cost you some Money, But Trust me its worth Investing, if you face overheating Problems.

5.Power Off Your Laptops : When you are not working on you laptop then you should switch it off rather then keeping it on standby, I suggest not you use "Hibernate" Option as it will take a toll on your RAM. Power Off Your Laptops when not needed, Its as simple as that.

Friday, March 8, 2013

Blue Screen Error- How To Fix It.


Blue Screen Error- How To Fix It.



Blue Screen = The Most Irritating Error Face by Windows Users. Did you ever got stuck with this type of Error ?
Most of will answer it YES.

What is Blue Screen of Death (BSOD) ?

Blue screen of death is nothing but an error Shown in Microsoft Windows Operating Systems which Stops Further Operations.

Why BSOD Error is Caused ?

This error is Generally Hardware or Drivers Related.causing the Computer To stop Responding And prevents Damage to the Hardware And data.
BSOD Looks Like the Below Picture. Manny Windows Users Must be Familiar With This.




How To Fix BSOD :
As I said There are several Reasons For BSOD, Unfortunately There is no Particular solution but The Following Tips And tricks Can Help you To get Rid Of it.


1. Remove Startup Programs That Starts Will System Booting.

What happens is when you System Boots, Many Other apps try To load at the same time whill may result in to BSOD. so Remove Unwanted Programs On startup.

How To Remove :
Press Windows Key +R
Run Box will appear. Type "msconfig" and Hit Enter,

Click on Startup Tab and remove all Unwanted Programs and click on apply.
It may ask you to restart your syste, So restart it .


Removing programs at startup will fix your problem.

2.Uninstall Softwares:
Many Times while installing a softare A blue screen occors with a message that says, The Software that you are installing is Culprit . Verify all the changes that you made to your system and reset Them. Uninstall the installed Application it will help you to a great extent.

3. Resetting your Hardwares And Drivers :In some cases Due to Faulty Hardware connection it show the blue error screen. You can prevent this by ensuring you all hardware connection such as external ports,motherboard pins are set correctly.Bad drivers may also cause the same problem.Keep your drivers up to date.

 Above tips will definately help you to get rid of Bluescreens.


Windows 8 users May have Experienced a New Blue screen:
In windows 8 it will Tell you About the error and sad Emoticon At the top of the text .
Same as below pic.


stop violence against women's..

she is mother...
respect u r mother,,


stop violence against women's...

Stop Violence Against Women's..
Respect Her ...

Thursday, March 7, 2013


"World's Sexiest Computer Hacker" To Be Sentenced In April
























Bangalore: Kristina Svechinskaya, dubbed as the ‘worlds sexiest hacker’ for her raunchy, but casual appearance who was the “money mule” in stealing $3 million from U.S. banks and approximately $9 million from British banks has had her sentencing postponed to April, reports BI.


Svechinskaya, along with 37 others is alleged of using fake passports, dummy accounts and a Trojan virus, which monitored key strokes in order to steal passwords. The group then used the passwords to steal at least $2 million a month, said an FBI report.


According to the original FBI report, “Svechinskaya has allegedly opened at least five accounts under her own name and under the aliases "Anastasia Opokina" and "Svetlana Makarova" at Bank of America and Wachovia, into which over $35,000 was fraudulently deposited, affecting three victims, and from which approximately $11,000 was successfully withdrawn.”


However, according to the reports, Svechinskaya was not a key player in the fraud. A student of New York University, she entered the group following her ability to get hold of fake passports and connections to hacker/techie culture, and obviously, the charisma, that helped her to perform operations under alias.


Svechinskaya’s sentencing was first set to January 11, which got postponed to March 1 and now to April 11. She faces upto 40 years in prison.

How to blunt spear phishing attacks

Hackers need only a single malicious link or email to crack your corporate security. These simple steps help keep phishing attacks at bay


According to Allen Paller, director of research at the SANS Institute, 95 percent of all attacks on enterprise networks are the result of successful spear phishing. In other words, somebody received an email and either clicked on a link or opened a file that they weren't supposed to.
For example, Chinese hackers successfully broke into computers at The New York Times through spear phishing. So what are the steps that IT execs can take to protect enterprise networks from spear phishing?

Five technology trends to watch in 2013

Sony_4K_TV_Kebichiro_Hibi.jpg
Each year in an effort to keep its finger on the pulse of emerging technologies, the Consumer Electronics Association (CEA), comprising over 2,000 tech companies, releases a list of trends for the upcoming calendar year.The latest list released this week gives tech enthusiasts a preview of what trends experts say will become mainstream in 2013.
Three-dimensional printing, also known as additive manufacturing, is heading straight for the mainstream, CEA analysts say. Common products created via 3D printing include jewelry, figurines and cell phone cases.
Rather than creating a detailed object by sculpting it from materials, computer savvy consumers can create designs online and download them turning them into physical objects, creating them layer by layer.
While the technology has been around for decades, prices are dropping and the CEA predicts the technology will become commonplace in consumers' homes.
There is a potential for future concerns surrounding the creation of counterfeit goods. Current intellectual property laws do not cover items created with a 3D printer, so there may be a grey area for 3D printing and physical replication analysts say.
When it comes to the future of televisions, picture quality is everything. The CEA says TVs offering double the picture quality we see today are just months away from hitting stores, and are just a hint of what is possible in the future.
One option for the future is 4k TV, something John Taylor of LG Electronics describes as "the HDTV experience on steroids". And with four times the resolution of your current set, the CEA predicts the technology will begin to catch on in 2013.
Another popular option is the Organic Light-Emitting Diode, or OLED TV. It has significantly better picture quality than HD sets today plus lower energy consumption.
The challenge facing both of these new, crisper, options lies in getting consumers to switch.
"Most people are going to look at their TVs and say, 'It looks really good and crisp to me. Why do I need four times as many pixels?'" said Chris Chinnock, president of Insight Media, a market research company focused on emerging display technologies.
Thanks in part to the invention of the iPod, the CEA says MP3 players and ear buds created a new standard of how American's listen to music.
The same is now true with premium headphones, championed by the success of rapper Andre "Dr. Dre". Dr. Dre brand headphones promises to deliver studio sound quality to anyone willing to pay the $199-$399 price tag.
Marrying convenient digital music with professional sound quality in a home audio system is just one audio trend CEA sees going mainstream in 2013. But this is not just about the sound; it is also about functionality.
"Modern consumers put a priority on products that are both connected and portable," wrote CEA's Sean Murphy.
For the past 20 years, Africa has lagged behind the rest of the globe when it comes to internet connectivity. Mobile phones have single-handedly leveled out the playing field, a trend the CEA predicts will continue next year.
"Mobile phones (in Africa) are used for absolutely everything and used to the extreme by everyone," says Bruce Krogh, professor of electrical and computer engineering at Carnegie Mellon University.
In the areas of banking, business, and social networking mobile phones have been a game changer for the continent.
"Today, social networking in Africa is used for everything from connecting people with ex-pat family and friends to helping farmers track corn harvests and trade exchange rates," writes CEA's Rachel Horn.
"While the West experiences its own mobile revolution, it must look to Africa for ideas, opportunities and inspiration."
Schoolchildren today have traded their paper notebooks and tablets for electronic versions, and that is only the beginning.
When it comes to technology in the classroom, analysts say it facilitates individualized teaching, where students can learn in the way that best suits them.
"In addition to classroom webpages and online lectures, social media is now heavily utilized by students as well.
"While social media is not a new concept, its usage within the school system is still in the preliminary stages, with fewer than half of adults reporting that their children's schools use this technology," the CEA reports.
Challenges facing technology stem primarily from funding and debates over how much is too much technology in the classroom.

Wednesday, March 6, 2013

entrence updates ,,,,,,,


Slot Booking 
The details of slot booking for VITEEE-2013 will be uploaded in VIT website by 20th March 2013. After 17th March user name & Password will be sent to all eligible candidates and those have given their valid e-mail id & mobile number in the application form.

In case if you have forgotton to specify the e-mail id in the application form please register immediately in www.vit.ac.in in the status of application.

Note : All the candidates are requested to visit www.vit.ac.in for all updates regarding slot booking. 

Tuesday, March 5, 2013

WAND A PART TIME JOB?


•  Data Entry jobs
http://www.axiondata.com/employment.htm
http://typist.youdictate.com/
http://www.cyphercontractors.com/
http://www.diversifiedreporting.com/
http://executivesecretaries.com/careers.htm
http://www.fantastictranscripts.com/workhome.htm
http://www.lighthousedocuments.com/contact.html
http://www.mountainwestprocessing.com/employment.htm
http://www.nettranscripts.com/index.asp?pageID=12
http://www.onss.com/careers.htm
http://www.ontherecordreporting.com/transcribe.html
http://www.productiontranscripts.com/jobs.php
http://www.rapidtext.com/employment.html
http://www.rtostat.com/transcriptionist_inquiry.htm
http://www.swordsmith.com/jobs.html
http://www.talk2type.net./transcriber.html
http://www.tigerfish.com/employment.html
http://www.transcription-services.org/support.html
http://www.transcripts.net/job-application.htm
http://typewp.com/index7.HTML

How to Unhide the Hidden Files of your Flash and or External Hard Drive (virus infected maybe)


how to unhide the hidden files on your flash and or external hard drive (virus infected maybe)

1. -normally we do - folder options-->> we activate Show hidden files, folders and drives.
If this does'nt work then take step no. 2

2. -Go to Start, then go to RUN click then type CMD then press enter

- change the directory ( directory of your hard drive) say F: then press enter.

-then type ATTRIB -S -H *.* /S /D press enter..

-wait for a minute if the directory appear, type Exit then open your flash drive.

Monday, March 4, 2013


How to Speedup Internet with Top 10 Public DNS Servers



Here I have listed you the top 10 high speed public DNS servers.

TOP 10 DNS SERVERS
 

Level3:
 
Preferred DNS server - 209.244.0.3
 
Alternate DNS server - 209.244.0.4

Google:
 
Preferred DNS server - 8.8.8.8
 
Alternate DNS server - 8.8.4.4

ScrubIT3:
 
Preferred DNS server - 67.138.54.120
 
Alternate DNS server - 207.225.209.77

OpenNIC4:
 
Preferred DNS server - 69.164.208.50
 
Alternate DNS server - 216.87.84.211

Public-Root5:
 
Preferred DNS server - 199.5.157.131
 
Alternate DNS server - 208.71.35.137

Comodo DNS:
 
Preferred DNS server - 8.26.56.26
 
Alternate DNS server - 8.20.247.20

OpenDNS:
 
Preferred DNS server - 208.67.222.222
 
Alternate DNS server - 208.67.220.220

DNS Advantage:
 
Preferred DNS server - 156.154.70.1
 
Alternate DNS server - 156.154.71.1

Norton DNS:
 
Preferred DNS server - 198.153.192.1
 
Alternate DNS server - 198.153.194.1

SmartViper:
 
Preferred DNS server - 208.76.50.50
 
Alternate DNS server - 208.76.51.51


How to Speedup Internet connection with Top 10 High Speed Public DNS Servers?

Go to
 Control Panel
Then go to
 Network and Sharing Center
Click on
 Local Area Connection
Then click on Properties
After that, Select Internet Protocol Version 4 (TCP/IPv4) and click on Properties 
OR Double Click on Internet Protocol Version 4 (TCP/IPv4) 
Now click on Use the following DNS addresses and change it as follows. Use any of above mentionedpublic DNS servers.
Then click on OK,
That's all you have done successfully !!