ADS

.

Most Common Password used in Internet

Most Common Password used in Internet

Human brain can only remember 9-10 different password.But a large number of people use very easy password & also it is very easy to remember.Here I give you the most common password list.Check out that.......

1)123456
2)password
3)abc123
4)monkey
5)(your first name)
6)(your phone number)
7)dragon
8)baseball
9)myspace1
10)password1
11)liverpool
12)123
13)12345678
14)12345
15)qwerty

Even the most popular password choice represents only 0.22 percent of users, according to security expert Bruce Schneier. But since hackers automate most of their scams, two out of every 1000 people is great odds for them.
Taking an aggregate sample of passwords (primarily from the UK), we take a look at the most commonly occurring. If you spot your own password listed - it might just be time for a change!

What is the best way to clean a keyboard?

What is the best way to clean a keyboard?

1. Gather your supplies. There are commercial kits available, but a can of compressed air, a lint-free cloth or wipes, mild dishwashing liquid, and a vacuum cleaner with a soft brush are all you really need for a basic cleaning.

2. After turning off your computer and unplugging your keyboard, gently shake the keyboard upside down over some newspaper to dislodge loose crumbs and particles.

3. Use the can of compressed air to blow a stream of air between the keys. Repeat Step 2.

4. Dampen a lint-free cloth with a diluted solution of dishwashing liquid and water to wipe down the keys.

5. Use the vacuum cleaner brush attachment to suck away any remaining dirt or debris.

How DoYou Clean Your Flat Screen or LCD Screen?

How DoYou Clean Your Flat Screen or LCD Screen?


Flat screen also better known as LCD (liquid crystal display) screens, definitely require care to be cleaned. But although it is not very possible to clean it thoroughly you can always follow certain guidelines.

1)Do not turn your monitor off, since the marks can be very visible for you to see.
2)You can always wash your screen with a soft, cotton cloth or try a can of compressed air or even a rag or paper towel. It is not advisable to use Windex, ethyl alcohol and ammonia-based cleaners, since they can turn your screens yellow into colour. Simple water can work best.
3)Apply the solution to the cloth and wipe the screen from top to bottom.
4)Never touch your screen with you finger because this in turn can source the pixels to burn out.
5)Use any good LCD Cleaner that does not contain alcohol or ammonia.

How to Detect a Hacker Attack?

How to Detect a Hacker Attack?

Toady everyone know about attack & feared for hacking attempt.But preventing hacking is not a easy task. I will give you some tips to avoid hacking.


Windows machines:

* Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
* Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
* Large number of packets which come from a single address being stopped by a personal firewall. After locating a target (eg. a company's IP range or a pool of home cable users) hackers usually run automated probing tools which try to use various exploits to break into the system. If you run a personal firewall (a fundamental element in protecting against hacker attacks) and notice an unusually high number of stopped packets coming from the same address then this is a good indication that your machine is under attack. The good news is that if your personal firewall is reporting these attacks, you are probably safe. However, depending on how many services you expose to the Internet, the personal firewall may fail to protect you against an attack directed at a specific FTP service running on your system which has been made accessible to all. In this case, the solution is to block the offending IP temporarily until the connection attempts stop. Many personal firewalls and IDSs have such a feature built in.
* Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.


Unix machines:

* Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
* Modified system binaries such as 'login', 'telnet', 'ftp', 'finger' or more complex daemons, 'sshd', 'ftpd' and the like. After breaking into a system, a hacker usually attempts to secure access by planting a backdoor in one of the daemons with direct access from the Internet, or by modifying standard system utilities which are used to connect to other systems. The modified binaries are usually part of a rootkit and generally, are 'stealthed' against direct simple inspection. In all cases, it is a good idea to maintain a database of checksums for every system utility and periodically verify them with the system offline, in single user mode.
* Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
* Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.conf. Closely monitor these two files for any additions which may indicate a backdoor bound to an unused or suspicious port.

Microsoft launch Bluetooth Notebook Mouse 5000

Microsoft’s most portable wireless notebook mouse is The model 5000. It
connects directly to a bluetooth PC without a transceiver & also freeing up
USB ports for other devices. Microsoft calls it a “high definition” laser
mouse which they say makes it more precise and responsive, and that it
delivers smoother tracking. The 5000 has an ambidextrous design which means
you can use it with either your left or right hand and it is comfortable
both ways. It also has a bit of an ergonomic design so it will help reduce
discomfort during long hours of work and will help prevent some serious
long-term conditions. It has four buttons including a Back button and the
scroll wheel. You can use the Back button to easily navigate between
folders and web pages, or you can press the scroll wheel to enable
auto-scroll. Auto-scroll saves time and effort since you can navigate
documents and websites without using the on-screen scroll bar. This mouse
also claims a 3+ month battery life which can be achieved by turning the
device off when not in use. When it finally does get close to running out
of power it has a red LED indicator light that illuminates to alert you
when the battery is almost dead. This mouse is a mix of light gray, dark
gray and black in color and the MSRP is $49.99.

Bloopers of Bare Essentials of Safety from Air New Zealand

Bloopers of Bare Essentials of Safety from Air New Zealand




Microsoft Launch BING !!

Bing, the name Microsoft gave to the new search service it unveiled Thursday, is its answer to Google — a noun that once meant little but has become part of the language as a verb that is a synonym for executing a Web search. After months of, uh, searching, Microsoft settled on Bing to replace the all-too-forgettable Live Search, which itself replaced MSN Search.
Microsoft invested billions of dollars in those services and failed to slow Google’s rise, so a new name certainly can’t hurt.Microsoft’s marketing gurus hope that Bing will evoke neither a type of cherry nor a strip club on “The Sopranos” but rather a sound — the ringing of a bell that signals the “aha” moment when a search leads to an answer.The name is meant to conjure “the sound of found” as Bing helps people with complex tasks like shopping for a camera, said Yusuf Mehdi, senior vice president of Microsoft’s online audience business group.And if Bing turns into a verb like, say, Xerox, TiVo or, well, Google, that would be nice too. Steven A. Ballmer, Microsoft’s chief executive, said Thursday that he liked Bing’s potential to “verb up.” Plus, he said, “it works globally, and doesn’t have negative, unusual connotations.”Some branding experts said choosing the name Bing was a good start, but also the easiest part of the challenge facing the company, since most people turn to Google without even thinking about it.

Yahoo! Messenger 10.0.0.331-us

Yahoo! Messenger 10.0.0.331-us


























Yahoo! Messenger is an advertisement-supported instant messaging client and associated protocol provided by Yahoo!. Yahoo! Messenger is provided free of charge and can be downloaded and used with a generic “Yahoo! ID” which also allows access to other Yahoo! services, such as Yahoo! Mail, where users can be automatically notified when they receive new email. Yahoo! also offers PC-PC, PC-Phone and Phone-to-PC service, file transfers, webcam hosting, text messaging service, and chat rooms in various categories.







Firefox 3.5: It's time for an upgrade

Mozilla today announced the official release of its open-source browser Firefox 3.5, featuring faster JavaScript performance speeds (reportedly twice as fast as Firefox 3), support for the new HTML5 video playback (which lets you watch select videos without plugins), and a new private browsing mode.

Specifically, Firefox 3.5 now boasts the following improvements:

Performance. Firefox 3.5 includes the powerful new TraceMonkey JavaScript engine, which delivers unprecedented performance with today’s complex Web applications. Firefox 3.5 is more than two times faster than Firefox 3 and 10 times faster than Firefox 2.

Open Video and Audio. Play video and audio content from within your browser, without the need for plug-ins. Firefox 3.5 delivers the first native integration of audio and video directly into the browser. Now everyone can easily watch open format Ogg Theora videos. Web developers can use these technologies to design pages that interact with video content in new ways, offering richer interactive experiences beyond controlling playback and volume.

Privacy Controls.
Firefox 3.5 includes features designed to protect your privacy online and provide greater control over your personal data. While using the new Private Browsing mode in Firefox 3.5, nothing you encounter on the Web will be stored from that moment on during your browsing session. Unique to Firefox 3.5, the new Forget this Site feature can remove every trace of a site from your browser. If you want to remove all private data or activity from the past few hours, Clear Recent History, another Firefox-only feature, gives you full control over what stays and what goes.

Location Aware Browsing. Location Aware Browsing saves you time by allowing Web sites to ask you where you are located. If you choose to share your location with a Web site, it can use that information to find nearby points of interest and return additional, useful data like maps of your area. It’s all optional — Firefox doesn’t share your location without your permission.

I’ve just loaded The release version of Firefox 3.5 onto my browser test bed in order to do some benchmarking. How does Mozilla’s latest browser compare to the rest?.

As usual I’m running two two tests:

* SunSpider JavaScript benchmark
* V8 Benchmark Suite

I expected Firefox 3.5 to be fast, but I didn’t expect it to beat Google Chrome, and I was right. It’s odd to think that it’s been nearly a year since the last major Firefox upgrade, but in that time the browser faces stiff competition from both Google Chrome and Apple’s Safari.

Risk with mobile phone

The GSMA recognises that there is public concern about the siting of antennas and the use of mobile phones. These are low powered radio services and it is the GSMA opinion based on expert scientific reviews that there are no established health risks from exposures to radio frequency signals from wireless communications up to the levels recommended by the WHO.

We encourage a harmonised approach to national exposure and compliance policies based on the human exposure recommendations of the WHO and compliance methods developed by the IEC, ITU, CENELEC and IEEE.

The mobile industry is a relatively low energy intensity industry, contributing much more to the economy than its proportion of national energy usage. Technology evolution has reduced the carbon impacts per subscriber and work continues to increase efficiency and improve recycling. 

How to detect Conficker PC virus?

Researchers have discovered the first easy way to detect the presence of the Conficker computer worm on networked computers, just days before the worm is scheduled to morph into a new form that could seriously compromise millions of computers, PC magazine reported.

Approximately 10 million computers are believed to be infected by the Conficker virus, which is programmed to contact its creators April 1 and receive new instructions that could create a massive spam-spewing botnet, or other actions that could compromise millions more machines.

The deadline has prompted fears of a Y2K-like occurrence, though most experts say that similar to the meltdown fears at the turn of the century, Conficker's April 1 deadline will hardly be noticed by most computer users.

The virus can infect PC's running Microsoft's Windows operating system, but Microsoft issued a patch to fix the vulnerability last October.

However millions of computers that are running pirated versions of Windows are unpatched. Computers on corporate networks are also thought to be vulnerable, because of the difficulties faced by system administrators in identifying and neutralizing the Conficker worm.

According to PC magazine, researchers have now found a way to identify infected computers on the network. The technique works by identifying unusual error messages that are generated when infected computers are contacted over a network.

The report said that major enterprise security software systems such as those from McAfee and nCircle have been updated with the new information.

Mobile Hack Tips & Tricks

Mobile Security tips:

1)To check Mobile name and date of manufacture: *#0000#

2)To check Serial Number: *#06#

3)To Format the cell phone(Restore all original setting): *#7370#

Check Mobile Quality:

You can easily check your mobile is original or not,to know this ,do the following:

1)Find the serial number of your mobile by pressing: *#06#
2)Check the 7th and 8th digit of the serial number.

1 2 3 4 5 6 7 8 9 10 11 12 13 14
A) IF the Seventh & Eighth digits are 02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality.
B) IF the Seventh & Eighth digits are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality.
C) IF the Seventh & Eighth digits are 01 or 10 this means your cell phone was manufactured in Finland which is very Good.
D) IF the Seventh & Eighth digits are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality.
E) IF the Seventh & Eighth digits are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Alert from Mobile Phone Virus - How to Protect yourself

A mobile phone virus or mobile malware - malicious mobile software - is a computer virus specifically adapted for the mobile phone environment and designed to spread from one vulnerable phone to another.

A virus is a program code that replicates by being copied to another program. Viruses can be transmitted as attachments to an email or in a download file. Some viruses take effect as soon as their code is executed; other viruses can lie dormant. A virus that replicates by resending itself as an email attachment or as a part of a network message is known as a worm.

Viruses can range from benign to quite harmful; they can erase data from the infected phone or send fake messages purporting to be from the phones owner. How prevalent are mobile phone viruses? The current security risk from mobile phone viruses and worms is low.

Until many more smart phones or PDAs are in use, and users of these phones are regularly exchanging executable files, the risk will remain low. The mobile industry takes the threat of viruses very seriously and is continually monitoring its networks and working to protect users from any future risk from mobile phone viruses. There are also some simple measures that individual users can implement to protect themselves. 

What can I do to protect my phone?

The following tips can help prevent problems with viruses on your phone:

1. Switch to Bluetooth hidden mode. If your phone has Bluetooth capability, ensure that the Bluetooth capability is switched to hidden or invisible mode unless you specifically need it to be visible. This will help prevent other Bluetooth-enabled devices from finding your phone (unless you grant them the necessary permission) and will therefore help protect your phone from worms that spread using the Bluetooth wireless technology.

2. Exercise caution before opening attachments. When accepting applications sent via Bluetooth, or opening MMS attachments, exercise caution, just as you would when opening an email attachment on your PC, because they may include harmful software. Ensure the application or attachment comes from a known source, and is wary of opening files that have unfamiliar text attached to them, even if they come from someone you know.

3. Only download content from a trusted source. Trusted sources may include operator portals and other well-known brands that offer adequate protection against viruses and other harmful software. Be aware though that, as with emails, malicious or fraudulent users may be able to fake the appearance of a trusted source. 

4. Consider anti-virus software. Some software is available to prevent phone viruses. You may wish to consider downloading this software.

5. Contact your phone manufacturer if concerned. If you think you have a virus, call the phone manufacturer’s care line. They can assist you confirm if it is a virus, and help fix the problem.

Bharti Airtel Launches Mobile Payment Services

Bharti Airtel has partnered with leading banks such as ICICI Bank, HDFC Bank, SBI, Corporation Bank and VISA to launch M-commerce solutions like Mobile Money Transfer(MMT), post-paid bill payment and prepaid recharge on the mobile phone. Customers having a VISA credit or debit card issued by ICICI, HDFC, SBI, or Corporation Bank, can now send money to another VISA credit/debit card holder.

The M-commerce solutions have been developed by  mChek provides a safe and secure way to use your mobile phone to make credit and debit card payments including over-the-counter and Internet purchases, and person to person payments. The M-commerce solutions are totally secure and had been certified by the Payment Card Industry Data Security Standard (PCI DSS).

Airtel subscribers can avail the service by simply sending a text message AIRTEL to 543219 from your Airtel cell phone.

Google SMS Channel - Receive Free SMS

Google SMS Channels is Google’s solution to SMS groups message broadcasting and subscription. This service enables you to get content from Google, Google partners, and all other websites and blogs with RSS support.

You can create your own channel and publish content that other users can subscribe to. You can also create groups over SMS to communicate with your friends, family, and co-workers, just like the other sms service.

This is a free service. You don’t pay anything to send or receive messages using Google SMS Channels website. When you post a message to your channel, all the members of your channel get the message forwarded for free. Any Indian mobile number will work with this service.

Google SMS Channel uses the normal number 9870807070, and not the premium short codes. So any SMS charge you incur is as low as you sending an SMS to your friend. There is no charge for receiving the updates.

SMS tariff charges may apply when you configure the service or publish to a channel using a mobile phone. Most of you don’t do this unless you want to start a new channel.

You can use the service on the website or via your mobile phone.

Gmail - Inbox Preview

Gmail.com bring a new feature for slow internet connection. It is not big deal, really. But now imagine that you access Gmail on a super slow connection from a remote place in Ethopia where it might take minutes to completely load your inbox. The disappointment is larger when you find out that there is nothing new to read and you could have saved all that time.

To ease this pain a bit, we created a new feature in Gmail Labs called Inbox Preview. While Gmail is loading, a simple, static preview of your inbox with your ten most recent messages is displayed. Turn it on from the Labs tab under Settings, and if you're on a slow connection you'll know from the start if it's worth the wait.

Gmail New Feature - Automatic Message Translation


Back in the early days of human existence, before language had fully developed, our caveman ancestors probably did a lot of grunting. Language, and thus life, were pretty simple: watch out for that saber-toothed tiger ("Blorg! AIYA!!!"); stop riding the wooly mammoth and help me pick some berries ("Argh. Zagle zorg!"); man, it's cold in this Ice Age ("Brrrr.").



Somewhere along the line, all those grunts diverged into thousands of distinct languages, and life became both richer and more complicated. And for the last few eons or so, we've struggled to communicate in a multilingual world. Which brings us to today. Since the heart and soul of Gmail is about helping people communicate, I'm proud to announce the integration of Google's automatic translation technology directly into Gmail.
Simply enable "Message Translation" from the Labs tab under Settings, and when you receive an email in a language other than your own, Gmail will help you translate it into alanguage you can understand. In one click.