Most Common Password used in Internet
Human brain can only remember 9-10 different password.But a large number of people use very easy password & also it is very easy to remember.Here I give you the most common password list.Check out that.......
1)123456
2)password
3)abc123
4)monkey
5)(your first name)
6)(your phone number)
7)dragon
8)baseball
9)myspace1
10)password1
11)liverpool
12)123
13)12345678
14)12345
15)qwerty
Even the most popular password choice represents only 0.22 percent of users, according to security expert Bruce Schneier. But since hackers automate most of their scams, two out of every 1000 people is great odds for them.
Taking an aggregate sample of passwords (primarily from the UK), we take a look at the most commonly occurring. If you spot your own password listed - it might just be time for a change!
ADS
.
What is the best way to clean a keyboard?
What is the best way to clean a keyboard?
1. Gather your supplies. There are commercial kits available, but a can of compressed air, a lint-free cloth or wipes, mild dishwashing liquid, and a vacuum cleaner with a soft brush are all you really need for a basic cleaning.
2. After turning off your computer and unplugging your keyboard, gently shake the keyboard upside down over some newspaper to dislodge loose crumbs and particles.
3. Use the can of compressed air to blow a stream of air between the keys. Repeat Step 2.
4. Dampen a lint-free cloth with a diluted solution of dishwashing liquid and water to wipe down the keys.
5. Use the vacuum cleaner brush attachment to suck away any remaining dirt or debris.
1. Gather your supplies. There are commercial kits available, but a can of compressed air, a lint-free cloth or wipes, mild dishwashing liquid, and a vacuum cleaner with a soft brush are all you really need for a basic cleaning.
2. After turning off your computer and unplugging your keyboard, gently shake the keyboard upside down over some newspaper to dislodge loose crumbs and particles.
3. Use the can of compressed air to blow a stream of air between the keys. Repeat Step 2.
4. Dampen a lint-free cloth with a diluted solution of dishwashing liquid and water to wipe down the keys.
5. Use the vacuum cleaner brush attachment to suck away any remaining dirt or debris.
How DoYou Clean Your Flat Screen or LCD Screen?
How DoYou Clean Your Flat Screen or LCD Screen?
Flat screen also better known as LCD (liquid crystal display) screens, definitely require care to be cleaned. But although it is not very possible to clean it thoroughly you can always follow certain guidelines.
1)Do not turn your monitor off, since the marks can be very visible for you to see.
2)You can always wash your screen with a soft, cotton cloth or try a can of compressed air or even a rag or paper towel. It is not advisable to use Windex, ethyl alcohol and ammonia-based cleaners, since they can turn your screens yellow into colour. Simple water can work best.
3)Apply the solution to the cloth and wipe the screen from top to bottom.
4)Never touch your screen with you finger because this in turn can source the pixels to burn out.
5)Use any good LCD Cleaner that does not contain alcohol or ammonia.
Flat screen also better known as LCD (liquid crystal display) screens, definitely require care to be cleaned. But although it is not very possible to clean it thoroughly you can always follow certain guidelines.
1)Do not turn your monitor off, since the marks can be very visible for you to see.
2)You can always wash your screen with a soft, cotton cloth or try a can of compressed air or even a rag or paper towel. It is not advisable to use Windex, ethyl alcohol and ammonia-based cleaners, since they can turn your screens yellow into colour. Simple water can work best.
3)Apply the solution to the cloth and wipe the screen from top to bottom.
4)Never touch your screen with you finger because this in turn can source the pixels to burn out.
5)Use any good LCD Cleaner that does not contain alcohol or ammonia.
How to Detect a Hacker Attack?
How to Detect a Hacker Attack?
Toady everyone know about attack & feared for hacking attempt.But preventing hacking is not a easy task. I will give you some tips to avoid hacking.
Windows machines:
* Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
* Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
* Large number of packets which come from a single address being stopped by a personal firewall. After locating a target (eg. a company's IP range or a pool of home cable users) hackers usually run automated probing tools which try to use various exploits to break into the system. If you run a personal firewall (a fundamental element in protecting against hacker attacks) and notice an unusually high number of stopped packets coming from the same address then this is a good indication that your machine is under attack. The good news is that if your personal firewall is reporting these attacks, you are probably safe. However, depending on how many services you expose to the Internet, the personal firewall may fail to protect you against an attack directed at a specific FTP service running on your system which has been made accessible to all. In this case, the solution is to block the offending IP temporarily until the connection attempts stop. Many personal firewalls and IDSs have such a feature built in.
* Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.
Unix machines:
* Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
* Modified system binaries such as 'login', 'telnet', 'ftp', 'finger' or more complex daemons, 'sshd', 'ftpd' and the like. After breaking into a system, a hacker usually attempts to secure access by planting a backdoor in one of the daemons with direct access from the Internet, or by modifying standard system utilities which are used to connect to other systems. The modified binaries are usually part of a rootkit and generally, are 'stealthed' against direct simple inspection. In all cases, it is a good idea to maintain a database of checksums for every system utility and periodically verify them with the system offline, in single user mode.
* Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
* Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.conf. Closely monitor these two files for any additions which may indicate a backdoor bound to an unused or suspicious port.
Toady everyone know about attack & feared for hacking attempt.But preventing hacking is not a easy task. I will give you some tips to avoid hacking.
Windows machines:
* Suspiciously high outgoing network traffic. If you are on a dial-up account or using ADSL and notice an unusually high volume of outgoing network (traffic especially when you computer is idle or not necessarily uploading data), then it is possible that your computer has been compromised. Your computer may be being used either to send spam or by a network worm which is replicating and sending copies of itself. For cable connections, this is less relevant - it is quite common to have the same amount of outgoing traffic as incoming traffic even if you are doing nothing more than browsing sites or downloading data from the Internet.
* Increased disk activity or suspicious looking files in the root directories of any drives. After hacking into a system, many hackers run a massive scan for any interesting documents or files containing passwords or logins for bank or epayment accounts such as PayPal. Similarly, some worms search the disk for files containing email addresses to use for propagation. If you notice major disk activity even when the system is idle in conjunction with suspiciously named files in common folders, this may be an indication of a system hack or malware infection.
* Large number of packets which come from a single address being stopped by a personal firewall. After locating a target (eg. a company's IP range or a pool of home cable users) hackers usually run automated probing tools which try to use various exploits to break into the system. If you run a personal firewall (a fundamental element in protecting against hacker attacks) and notice an unusually high number of stopped packets coming from the same address then this is a good indication that your machine is under attack. The good news is that if your personal firewall is reporting these attacks, you are probably safe. However, depending on how many services you expose to the Internet, the personal firewall may fail to protect you against an attack directed at a specific FTP service running on your system which has been made accessible to all. In this case, the solution is to block the offending IP temporarily until the connection attempts stop. Many personal firewalls and IDSs have such a feature built in.
* Your resident antivirus suddenly starts reporting that backdoors or trojans have been detected, even if you have not done anything out of the ordinary. Although hacker attacks can be complex and innovative, many rely on known trojans or backdoors to gain full access to a compromised system. If the resident component of your antivirus is detecting and reporting such malware, this may be an indication that your system can be accessed from outside.
Unix machines:
* Suspiciously named files in the /tmp folder. Many exploits in the Unix world rely on creating temporary files in the /tmp standard folder which are not always deleted after the system hack. The same is true for some worms known to infect Unix systems; they recompile themselves in the /tmp folder and use it as 'home'.
* Modified system binaries such as 'login', 'telnet', 'ftp', 'finger' or more complex daemons, 'sshd', 'ftpd' and the like. After breaking into a system, a hacker usually attempts to secure access by planting a backdoor in one of the daemons with direct access from the Internet, or by modifying standard system utilities which are used to connect to other systems. The modified binaries are usually part of a rootkit and generally, are 'stealthed' against direct simple inspection. In all cases, it is a good idea to maintain a database of checksums for every system utility and periodically verify them with the system offline, in single user mode.
* Modified /etc/passwd, /etc/shadow, or other system files in the /etc folder. Sometimes hacker attacks may add a new user in /etc/passwd which can be remotely logged in a later date. Look for any suspicious usernames in the password file and monitor all additions, especially on a multi-user system.
* Suspicious services added to /etc/services. Opening a backdoor in a Unix system is sometimes a matter of adding two text lines. This is accomplished by modifying /etc/services as well as /etc/ined.conf. Closely monitor these two files for any additions which may indicate a backdoor bound to an unused or suspicious port.
Microsoft launch Bluetooth Notebook Mouse 5000
Microsoft’s most portable wireless notebook mouse is The model 5000. It
connects directly to a bluetooth PC without a transceiver & also freeing up
USB ports for other devices. Microsoft calls it a “high definition” laser
mouse which they say makes it more precise and responsive, and that it
delivers smoother tracking. The 5000 has an ambidextrous design which means
you can use it with either your left or right hand and it is comfortable
both ways. It also has a bit of an ergonomic design so it will help reduce
discomfort during long hours of work and will help prevent some serious
long-term conditions. It has four buttons including a Back button and the
scroll wheel. You can use the Back button to easily navigate between
folders and web pages, or you can press the scroll wheel to enable
auto-scroll. Auto-scroll saves time and effort since you can navigate
documents and websites without using the on-screen scroll bar. This mouse
also claims a 3+ month battery life which can be achieved by turning the
device off when not in use. When it finally does get close to running out
of power it has a red LED indicator light that illuminates to alert you
when the battery is almost dead. This mouse is a mix of light gray, dark
gray and black in color and the MSRP is $49.99.
connects directly to a bluetooth PC without a transceiver & also freeing up
USB ports for other devices. Microsoft calls it a “high definition” laser
mouse which they say makes it more precise and responsive, and that it
delivers smoother tracking. The 5000 has an ambidextrous design which means
you can use it with either your left or right hand and it is comfortable
both ways. It also has a bit of an ergonomic design so it will help reduce
discomfort during long hours of work and will help prevent some serious
long-term conditions. It has four buttons including a Back button and the
scroll wheel. You can use the Back button to easily navigate between
folders and web pages, or you can press the scroll wheel to enable
auto-scroll. Auto-scroll saves time and effort since you can navigate
documents and websites without using the on-screen scroll bar. This mouse
also claims a 3+ month battery life which can be achieved by turning the
device off when not in use. When it finally does get close to running out
of power it has a red LED indicator light that illuminates to alert you
when the battery is almost dead. This mouse is a mix of light gray, dark
gray and black in color and the MSRP is $49.99.
Bloopers of Bare Essentials of Safety from Air New Zealand
Bloopers of Bare Essentials of Safety from Air New Zealand
Microsoft Launch BING !!
Bing, the name Microsoft gave to the new search service it unveiled Thursday, is its answer to Google — a noun that once meant little but has become part of the language as a verb that is a synonym for executing a Web search. After months of, uh, searching, Microsoft settled on Bing to replace the all-too-forgettable Live Search, which itself replaced MSN Search.
Microsoft invested billions of dollars in those services and failed to slow Google’s rise, so a new name certainly can’t hurt.Microsoft’s marketing gurus hope that Bing will evoke neither a type of cherry nor a strip club on “The Sopranos” but rather a sound — the ringing of a bell that signals the “aha” moment when a search leads to an answer.The name is meant to conjure “the sound of found” as Bing helps people with complex tasks like shopping for a camera, said Yusuf Mehdi, senior vice president of Microsoft’s online audience business group.And if Bing turns into a verb like, say, Xerox, TiVo or, well, Google, that would be nice too. Steven A. Ballmer, Microsoft’s chief executive, said Thursday that he liked Bing’s potential to “verb up.” Plus, he said, “it works globally, and doesn’t have negative, unusual connotations.”Some branding experts said choosing the name Bing was a good start, but also the easiest part of the challenge facing the company, since most people turn to Google without even thinking about it.
Microsoft invested billions of dollars in those services and failed to slow Google’s rise, so a new name certainly can’t hurt.Microsoft’s marketing gurus hope that Bing will evoke neither a type of cherry nor a strip club on “The Sopranos” but rather a sound — the ringing of a bell that signals the “aha” moment when a search leads to an answer.The name is meant to conjure “the sound of found” as Bing helps people with complex tasks like shopping for a camera, said Yusuf Mehdi, senior vice president of Microsoft’s online audience business group.And if Bing turns into a verb like, say, Xerox, TiVo or, well, Google, that would be nice too. Steven A. Ballmer, Microsoft’s chief executive, said Thursday that he liked Bing’s potential to “verb up.” Plus, he said, “it works globally, and doesn’t have negative, unusual connotations.”Some branding experts said choosing the name Bing was a good start, but also the easiest part of the challenge facing the company, since most people turn to Google without even thinking about it.
Yahoo! Messenger 10.0.0.331-us

Yahoo! Messenger is an advertisement-supported instant messaging client and associated protocol provided by Yahoo!. Yahoo! Messenger is provided free of charge and can be downloaded and used with a generic “Yahoo! ID” which also allows access to other Yahoo! services, such as Yahoo! Mail, where users can be automatically notified when they receive new email. Yahoo! also offers PC-PC, PC-Phone and Phone-to-PC service, file transfers, webcam hosting, text messaging service, and chat rooms in various categories.
Firefox 3.5: It's time for an upgrade
Mozilla today announced the official release of its open-source browser Firefox 3.5, featuring faster JavaScript performance speeds (reportedly twice as fast as Firefox 3), support for the new HTML5 video playback (which lets you watch select videos without plugins), and a new private browsing mode.
Specifically, Firefox 3.5 now boasts the following improvements:
Performance. Firefox 3.5 includes the powerful new TraceMonkey JavaScript engine, which delivers unprecedented performance with today’s complex Web applications. Firefox 3.5 is more than two times faster than Firefox 3 and 10 times faster than Firefox 2.
Open Video and Audio. Play video and audio content from within your browser, without the need for plug-ins. Firefox 3.5 delivers the first native integration of audio and video directly into the browser. Now everyone can easily watch open format Ogg Theora videos. Web developers can use these technologies to design pages that interact with video content in new ways, offering richer interactive experiences beyond controlling playback and volume.
Privacy Controls. Firefox 3.5 includes features designed to protect your privacy online and provide greater control over your personal data. While using the new Private Browsing mode in Firefox 3.5, nothing you encounter on the Web will be stored from that moment on during your browsing session. Unique to Firefox 3.5, the new Forget this Site feature can remove every trace of a site from your browser. If you want to remove all private data or activity from the past few hours, Clear Recent History, another Firefox-only feature, gives you full control over what stays and what goes.
Location Aware Browsing. Location Aware Browsing saves you time by allowing Web sites to ask you where you are located. If you choose to share your location with a Web site, it can use that information to find nearby points of interest and return additional, useful data like maps of your area. It’s all optional — Firefox doesn’t share your location without your permission.
Specifically, Firefox 3.5 now boasts the following improvements:
Performance. Firefox 3.5 includes the powerful new TraceMonkey JavaScript engine, which delivers unprecedented performance with today’s complex Web applications. Firefox 3.5 is more than two times faster than Firefox 3 and 10 times faster than Firefox 2.
Open Video and Audio. Play video and audio content from within your browser, without the need for plug-ins. Firefox 3.5 delivers the first native integration of audio and video directly into the browser. Now everyone can easily watch open format Ogg Theora videos. Web developers can use these technologies to design pages that interact with video content in new ways, offering richer interactive experiences beyond controlling playback and volume.
Privacy Controls. Firefox 3.5 includes features designed to protect your privacy online and provide greater control over your personal data. While using the new Private Browsing mode in Firefox 3.5, nothing you encounter on the Web will be stored from that moment on during your browsing session. Unique to Firefox 3.5, the new Forget this Site feature can remove every trace of a site from your browser. If you want to remove all private data or activity from the past few hours, Clear Recent History, another Firefox-only feature, gives you full control over what stays and what goes.
Location Aware Browsing. Location Aware Browsing saves you time by allowing Web sites to ask you where you are located. If you choose to share your location with a Web site, it can use that information to find nearby points of interest and return additional, useful data like maps of your area. It’s all optional — Firefox doesn’t share your location without your permission.
I’ve just loaded The release version of Firefox 3.5 onto my browser test bed in order to do some benchmarking. How does Mozilla’s latest browser compare to the rest?.
As usual I’m running two two tests:
* SunSpider JavaScript benchmark
* V8 Benchmark Suite
I expected Firefox 3.5 to be fast, but I didn’t expect it to beat Google Chrome, and I was right. It’s odd to think that it’s been nearly a year since the last major Firefox upgrade, but in that time the browser faces stiff competition from both Google Chrome and Apple’s Safari.
As usual I’m running two two tests:
* SunSpider JavaScript benchmark
* V8 Benchmark Suite
I expected Firefox 3.5 to be fast, but I didn’t expect it to beat Google Chrome, and I was right. It’s odd to think that it’s been nearly a year since the last major Firefox upgrade, but in that time the browser faces stiff competition from both Google Chrome and Apple’s Safari.
Subscribe to:
Posts (Atom)