Tuesday, 25 December 2012

What are Captchas?


Whenever we create an account on any website or comment on any blog we see scrambled words
which we have to type and continue these are CAPTCHAs .

What are CAPTCHAs and what they do?
It stands for Completely Automated Public Turing-test to tell Computers and Humans Apart.These tries to test that you are a person and not a auto filling software.

Why CAPTCHAs are necessary?
These are used to prevent hackers from avoiding misuse of online services.
There are some examples of activities which are undertaken by hackers are given below :-
-Opening someone's account  by attempting different  password again and again.
-Creating  hundreds of  free accounts
-Swaying an online poll by robotically submitting hundreds of false responses.
-Spamimng blogs by posting dozens of bogus comments.

These CAPTCHAs test prevent about 90% of hackers attacks.



What is a logic behind this CAPTCHAs?
 Commonly, these CAPTCHA phrases are .gif pictures of scrambled words, but can also be .mp3 voice recordings. These pictures and recordings are very hard for conventional software programs to understand, and hence, robots are usually unable to type the phrase in response to the picture or recording.

Keyboard basic shortcuts you should know

Using Keyboard shortcuts save time by allowing you to never take your hands off the keyboard to use the mouse. So here is the list:-




Win                                Press windows key to open start menu
Win+R                           Opens Run dialog box
Win+M                          Minimize all opened windows
Win+S                            maximize all opened windows
Win+L                            locks keyboard in windows XP

Win+E                            opens My Computer
Win+F                            opens search options
Win+U                            opens Utility Manager
Win+D                            view desktop/minimize all windows
Win+F1                           view the detail windows help page
Win+P                              Pause view the System Properties dialog box
Win+Tab                          Move through open windows
Win+F+Ctrl                     open search Window
Alt+Tab                           Move through opened windows programs
Alt+F4                             close active window
Alt+Enter                         open properties of selected item
Alt+SPACEBAR             Open the system menu of active window
Alt+SPACEBAR+N       minimize the active program
Alt+SPACEBAR+R        keys to restore the active program
Alt+SPACEBAR+C        keys to close the active program
Alt+SPACEBAR+X        keys to maximize the active program
Alt+SPACEBAR+M       keys to move the active program
Ctrl+Alt+Delete               options to shutdown or open task manager
Ctrl+Shift+Esc                open windows task manager
Ctrl+Esc                           keys to open start menu
Shift+Delete                     delete items permanently
Ctrl+A                             Selects all items in Folder
Ctrl+C                              Copy function
Ctrl+v                              Paste Option
Ctrl+home                        Move to the top of the page
Ctrl+End                          Move to the bottom of the page

Download the world's fastest download manager


Internet Download Manager (idm) is the world's fastest download manager with many extra great features.

It helps to download multiple files in a single time. It also provides the resume capability if sometimes we shutdown our computer with incomplete download we can resume the download. With this new version we can also control the download speed. It is fully integrated with almost all browsers like google chrome, Firefox, internet explorer, opera etc. It also has the capability to download videos from youtube. To download full version of idm. Click the download button below.

Dropbox - Simpify your life


What is Dropbox?
It is a website which provides online storage (free-2gb) and also makes file sharing easy.We can keep our files where ever we go or we can say we can have access to all your data from anywhere in the world.It can also be used for online backup.


Features  of dropbox:-
1)One of the great feature of dropbox is automatic uploading . We just need to copy the file to the dropbox folder to upload it. There is no need to log on to the dropbox account whenever we need to upload the file.

2)One another feature is suppose we are have more than one computer. One in home and another in office and we want some files(which are in home or office's computer) on both of the computers. So we can directly copy the file to the dropbox folder. And on another computer it will be automatically downloaded.
If we want to download the file on computer on which dropbox is not installed. We can download it by logging to the dropbox account by visiting dropbox website.
3)Dropbox app also available for smartphones(blackberry, apple, android etc.). We can access files on the smartphone too.  
4)Dropbox can be used for the online backup.

What we need for using drop box?
-A Dropbox account(Click here to create it)
Dropbox application  (Click here to download it)
-A Personal computer

How to use it?
First create an account on  Dropbox's website.
And Install the   Dropbox software.
 Copy the file which we want to share or send  to the Dropbox folder which is created automatically when we install Dropbox software. 

Sunday, 9 December 2012

Hackers


Who accesses a computer system by circumventing its security system. who makes innovative customization's or combinations of retail electronic and computer equipment. who shares an anti-authoritarian approach to software development now associated with the free software movement .

Ethical Hacking

Ethical Hacker has obtained a certification in how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a hacker.

How to Protect Your Computer

Below are some key steps to protecting your computer from intrusion:

Keep Your Firewall Turned On: A firewall helps protect your computer from hackers who might try to gain access to crash it, delete information, or even steal passwords or other sensitive information. Software firewalls are widely recommended for single computers. The software is prepackaged on some operating systems or can be purchased for individual computers. For multiple networked computers, hardware routers typically provide firewall protection.

Install or Update Your Antivirus SoftwareAntivirus software is designed to prevent malicious software programs from embedding on your computer. If it detects malicious code, like a virus or a worm, it works to disarm or remove it. Viruses can infect computers without users' knowledge. Most types of antivirus software can be set up to update automatically.

Install or Update Your Anti spyware Technology: Spyware is just what it sounds like—software that is surreptitiously installed on your computer to let others peer into your activities on the computer. Some spyware collects information about you without your consent or produces unwanted pop-up ads on your web browser. Some operating systems offer free spyware protection, and inexpensive software is readily available for download on the Internet or at your local computer store. Be wary of ads on the Internet offering downloadable antispyware—in some cases these products may be fake and may actually contain spyware or other malicious code. It's like buying groceries—shop where you trust.

Keep Your Operating System Up to Date: Computer operating systems are periodically updated to stay in tune with technology requirements and to fix security holes. Be sure to install the updates to ensure your computer has the latest protection.

Be Careful What You Download: Carelessly downloading e-mail attachments can circumvent even the most vigilant anti-virus software. Never open an e-mail attachment from someone you don't know, and be wary of forwarded attachments from people you do know. They may have unwittingly advanced malicious code.

Turn Off Your Computer: With the growth of high-speed Internet connections, many opt to leave theircomputers on and ready for action. The downside is that being "always on" renders computers more susceptible. Beyond firewall protection, which is designed to fend off unwanted attacks, turning thecomputer off effectively severs an attacker's connection—be it spyware or a botnet that employs yourcomputer's resources to reach out to other unwitting users