Tuesday, October 18, 2011

Knowing IP address of who accessed your Gmail Account

In this tut i am gonna discuss about finding the IP address of who accessed your gmail accounts

Follow the below procedure

  1. Login Into your gmail account
  2. Scroll Down till the end of the page
  3. At the bottom right corner you will find Details

  4. Click on That and you will get a window like the one below where you can know the IP addresses of who accessed your gmail account

Any doubts regarding this please comment below

Wednesday, October 12, 2011

Hide Your IP And Browse Anonymous

In this tut i am gonna explain how to hide your IP. Before that lets discuss what is IP

Internet Protocol(IP)

Protocol is nothing but a system to transfer data.Internet Protocol is a system through which data is transfered in network esepcially internet. The data is transfered in the form of packets. Every network connection has an unique IP address to transfer data through internet protocol.

Why to hide your IP address?

Using IP address anyone can trace out your location. There are many tools available to trace. A hacker can exploit your system too. So its very important to hide your IP address

How to hide IP address?

There are many softwares which provide the feature to hide your IP address. The two best softwares are listed below check it out

  1. Hide IP

    ( Downlod Link : http://hotfile.com/dl/132177414/0aaeabe/Hide_IP_Easy_v5.0.4.2crack.rar.html )
  2. Resl Hide

    ( Downlod Link : http://hotfile.com/dl/132177652/60ebf00/Real_Hide_IP_4.1.5.6_-nikolas.rar.html )

After installing the software just click hide IP and your real ip address will be hidden and in that place a fake ip address is generated. So now you can browse the internet as anonymous

Any doubts regarding this topic post your comments below

Monday, October 10, 2011

How Antivirus detect Viruses


Many of us are aware of antivirus . All of us know that antivirus is used to detect viruses. But many of dont know how antivirus detects viruses.

So i thought of educating people about it.

There are 5 techniques in which an antivirus detects viruses

  1. Signature Based Scan
  2. Heuristic Based Scan
  3. Threat Sense Technology
  4. Proactive Defense
  5. Artificial Intelligence

Signature Based Scan

Maximum of antivirus programs search the antivirus by signature scan. In signature based scanning anti virus program searches within given files for the presence of certain strings (also only in certain regions).If these predefined strings are found, then antivirus report A Threat has been detected.

Heuristic Based Scan

The first heuristic engines were introduced to detect DOS viruses in 1989.Heuristic (hyu-ˈris-tik) is an adjective for methods that help in problem solving. A heuristic scan is used to detect new, unknown viruses in your systems that have not yet been identified. Only some anti viruses can do this type of scan, the majority are only able to detect known viruses.

In this scanning, anti virus program searches instructions or commands within a file that are not found in typical good application programs. As a result, a heuristic engine is able to detect potentially malicious files and report them as a virus.

Threat Sense Technology

In this technology , when a certain files does malicious activity in computer. Next, when you update your anti virus these files are send to security experts of that anti virus that you are using. They analyze the file, if it is a virus then they make it's signatures

Proactive Defense

One more technology is "Proactive Defense". It was first used by Kaspersky .When a program or process gets executed, "Proactive Defense" tells the user about the activity of the program and asks it to allow or Block. The Most advanced Proactive Defense is provided by Comodo Internet Security.

Artificial Intelligence

These programs monitor you computer activities. If any dangerous or specious activity occurred by a file, they inform user and give some option to perform certain action. Now user has to take decision that is it a virus file or helpful file. Some times, if user takes wrong decision then the software which is reported by anti virus get corrupted and antivirus quarantined.

Any doubts please comment below

Saturday, October 8, 2011

How To Make Adobe Reader to Read For You

Using Adobe reader we can make your PDF files speak to you

To make it speak follow the steps below

  1. First of all Install Adobe Reader , if you haven't already
  2. Ok So first you go to View->Read out Loud-> Activate Read Out Loud. as shown below

  3. Again go to View->Read out Loud->Read to End of Document as shown below

  4. Thats it the adobe reader reads for you

Any doubts please comment below

CAPTCHA

Untitled Document

Did you see images like the one below.

I think you might have seen while creating a new account in Gmail,yahoo or in any registration. All of us just see and fill in the box below but many of them dont know what it is. In this post i am gonna discuss about what is that image and why is it mandatory.

The image which i described above is called as CAPTCHA

What is CAPTCHA and why is it mandatory?

CAPTCHA stands for "Completely Automated Public Turing test to tell Computers and Humans Apart". From the abbrevation you could get a overview of what captcha is. CAPTCHA is a type of challenge-response test to ensure that the response(here filling a registration form)is generated by a human and not by any bots. To avoid filling of registration forms by bots or a computer CAPTCHA is made mandatory.

How CAPTCHA can avoid bots

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. It really hard to teach a bot or computer to process information as human does. In this way CAPTCHA can avoid bots

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to hack the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.

Any doubts regarding this post comment below

Friday, October 7, 2011

Snow Transformation Pack

Many of us like the MAC operating system user interface. So for all those MAC lovers there is a transformation pack which transforms windows based operating system to have MAC user interface which is snow transformation pack

Download Link :

http://hotfile.com/dl/131709601/c95f57b/STP15.zip.html

Note : To install this transformation pack you should disable UAC(user account control)

Follow the steps to disable UAC

  1. Go to control panel
  2. Go to user accounts and family safety
  3. In that go to user accounts
  4. Select change user account control settings

  5. In the window change the scroll bar as shown below

  6. Click ok
  7. If still installation gives error run the software as administrator. To run it as administrator right click on installation package and select run as administrator

If you have any doubts comment it below

Multiple Gtalk Accounts

In this tut we will discuss how to open multiple gtalk accounts at once

We all know that we cant access more than one gtalk accounts at once. But there a small hack which enables us to log in to multiple gtalk accounts at once.

Follow the below instructions

  1. Install Gtalk
  2. We have to create a shorcut for gtalk for that go to Run
  3. In run paste the following appdata\roaming\google\google talk
  4. Right Click on googletalk and select create shortcut.
  5. Cut and paste the shortcut on Desktop
  6. Right Click on shortcut and select properties.
  7. In the properties windows you will find "target" and in that box you find some path. Just add /nomutex to the path as shown below and click ok
  8. Now click on the shortcut to get multiple windows(for example if you click the shortcut 2 times you will get 2 windows of gtalk through which you can logon to two different windows)
  9. Any doubts regarding this post comment below

Twitter Delicious Facebook Digg Stumbleupon Favorites More

 
Design by Free WordPress Themes | Bloggerized by Lasantha - Premium Blogger Themes | Affiliate Network Reviews