Showing posts with label Important Tricks. Show all posts
Showing posts with label Important Tricks. Show all posts

Thursday, 19 June 2014

Download torrent file with IDM

As we all know most popular download manager software Internet Download Manager that all user use to download stuff from internet. Internet Download Manager boots your internet speed 5 times and make you to download your stuff faster.

On ther hand torrent is the most easy to share file [video, movie, software, applications and lots more stuff] on internet. You can get all the things you want on torrents. Almost 99.9% of the stuff that you want is on torrent.

Most popular torrent site are

http://thepiratebay.se/
http://extratorrent.com/
http://www.torrentz.eu/
http://kat.ph/

These are the most popular torrent sites.

To downlaod anything from torrents takes much times compare to IDM..
So here I will tell you how you can download your favourite stuff, which is in torrents file from Internet Download Manager.
These all you can do by a site name www.zbigz.comto download torrent

Just you have to follow these simple steps.

Go and Signup here. Its free to sign up.
Search your torrent file and download it. As it is just of some Kb.
Now go to www.zbigz.com , as you have signed up. There At the top you find a bar and a option to upload your torrent file.

Upload you torrent file and and wait for some minutes.
After Some minutes server will send you the link to to download that file/stuff.
Click on that link and that link will work with your IDM.

Now download your torrent file from IDM with 5 times faster.

Wednesday, 19 March 2014

Hide The Files In Image

1. Gather the file you wish to bind, and the image file, and place them in a folder. I will be using C:\New Folder

-The image will hereby be referred to in all examples as xyz.jpg
-The file will hereby be referred to in all examples as New Text Document.txt

2. Add the file/files you will be injecting into the image into a WinRar .rar or .zip. From here on this will be referred to as (secret.rar)

3. Open command prompt by going to Start > Run > cmd

4. In Command Prompt, navigate to the folder where your two files are by typing
cd location [ex: cd C:\New Folder]

5. Type [copy /b xyz.jpg + secret.rar xyz.jpg] (remove the brackets)

Congrats, as far as anyone viewing is concerned, this file looks like a JPEG, acts like a JPEG, and is a JPEG, yet it now contains your file.

In order to view/extract your file, there are two options that you can take

a) Change the file extension from xyz.jpg to xyz.rar, then open and your file is there
b) Leave the file extension as is, right click, open with WinRar and your file is there 

Sunday, 9 March 2014

Type of Cyber Crimes


Type of Cyber Crimes & Applicable Law In India

1. Email Hacking :

Case 1
1. Victim’s password has stolen & obscene emails are sent to his/her friends from address book.
2. Section 43,66,67 of IT ACT,2000 & section 509 of IPC.
3. Person who is hacking email account as well as person who is misusing it is responsible for this crime.

Case 2
1. Victim’s password has stolen & hacker tried to threaten victim to extort money from him
2. Section 43,66,of IT ACT,2000 & section 384 of IPC.
3. Person who is hacking email account as well as person who is misusing it is responsible for this crime.

Case 3
1. Victim’s password has stolen & hacker is sending virus, worms or either 419 scam mails from his/her account
2. Section 43,66,of IT ACT,2000
3. Person who is hacking email account as well as person who is misusing it is responsible for this crime.

2. Virus Dissemination

Viruses are programs which affect available files on the computer & spread over networks using internet.

Case 1
1. Virus is targeting individual or specific organization which is not detected by antivirus softwares.
2. Section 43,66 of IT Act,2000 and section 426 of IPC.
3. The virus writer as well as the person who is spreading virus is responsible for this crime.

Case 2
1. The person pirates softwares & send Pirated Cds
2. Section 43,66 of IT Act,2000 & 63 of Copyrighted act.
3. The person who pirates as well as person who buy & use those softwares are responsible.

3. Cyber Pornography Crimes

As per IT act,2000, publishing, transmitting & causing to be published any porn material in electronic format is considered as cyber crime. There are millions of websites which includes pornography material online.

Case 1
1. Suspect abuse specific person by publishing his/her nude/naked pictures, clips & sell it online.
2. Section 67 of IT Act,2000
3. The person who creates & maintain such websites are liable for such crimes.
4. Sometimes cyber café owners are also liable as they are allowing their customers to view such websites.

4. Social Networking (Facebook/Orkut) Fake Profile Impersonation Cases

Case 1
1. Fake profile of female is created & photograph, phone number & address has been posted on the profile.
2. The profile also describes female as prostitute.
3. Section 67 of IT Act,2000 & 509 of IPC.

Case 2
1. Fake Community has been created & wrong information about individual/organization has been posted.
2. Section 153A & 153B of IPC.

5. Web Defacements

1. Crackers/Hackers found loopholes in website. Hacker then replaces the index page with some other page. Hacker can even delete data available of websites.
2. Section 43,66 of IT Act,India & in some cases 67 also.

6. Email Scams

1. Suspect/nigerian sends thousands of emails & convinences victim to get out of lot of money. Suspect can also give lucrative offers like job offers,lottery & investment offers.
2. Section 420 of IPC.
3. Sender of an email, sometimes bank account are liable for this crime.

7. Source Code Theft

Program source code is most important asset of any organization. Source code theft is common in software/IT companies.

Case 1
1. The person theft the code & sell it to the other party after making modification in the source code.
2. Section 43,65,66 of IT Act,2000 & 63 of copyright act.
3. The person who has stolen the code is liable.

Case 2
1. The person theft the code & sell it to the company competitors.
2. Section 43,65,66 of IT Act,2000 & 63 of copyright act.
3. The person who has stolen the code as well as the person who buy such code are liable.

8. Theft of confidential information

Case 1
1. Employee steals confidential information of company & mail to competitors & also post it on to websites & forums.
2. Section 43,66 of IT Act,2000 & 426 of IPC.

Case 2
1. Employee steals confidential information of company & threaten company to make it public unless company pay him money
2. Section 43,66 of IT Act,2000 & 384 of IPC.
3. The person who has stolen information as well as person who threaten victim are liable.

Case 3
1. Business rivals obtains information using hacking,social engineering & use it for their benefits.
2. Section 43,66 of IT Act,2000 & 426 of IPC.
3. The person who has stolen information as well as person who misuse information, both are liable.

9. Online Sale of illegal articles

Sale & Purchase through net There are web site which offer sale and shipment off contrabands drugs They may use the techniques of stenography for hiding the messages. Depending upon illegal iteams,provisions of narcotic drugs,psycotropic substance act,arms act,wild life related laws can also be applied.

10. Credit Card Frauds

Case 1
1. Victim’s Credit cards have been misued on airline websites, online gambling websites, pornography websites.
2. Section 43,66 of IT Act,2000 & 420 of IPC.
3. All persons who have stolen information to who have misused information online are liable.

11. Mobile Crimes

Mobile Phones have become popular means of communications. SMS forging is method to spoof identity of SMS. Call Forging is method to spoof caller ID of Call.

Case 1
1. Suspect has misused victim’s no to send SMS or make call to other person/ competitors.
2. Section 65,66 of IT Act,2000.
3. The person who is misusing the victim’s no as well as company who allows user to change identity of SMS or Call are liable

Thursday, 6 March 2014

Most Important Question for a post in Software Company

What is the Difference between C and C++?
C
1. C is Procedural Language.
2. No virtual Functions are present in C
3. In C, Polymorphism is not possible.
4. Operator overloading is not possible in C.
5. Top down approach is used in Program Design.
6. No namespace Feature is present in C Language.
7. Multiple Declaration of global variables are allowed.
8. In C
• scanf() Function used for Input.
• printf() Function used for output.
9. Mapping between Data and Function is difficult and complicated.
10. In C, we can call main() Function through other Functions
11. C requires all the variables to be defined at the starting of a scope.
12. No inheritance is possible in C.
13. In C, malloc() and calloc() Functions are used for Memory Allocation and free() function for memory Deallocating.
14. It supports built-in and primitive data types.
15. In C, Exception Handling is not present.

C++
1. C++ is non Procedural i.e Object oriented Language.
2. The concept of virtual Functions are used in C++.
3. The concept of polymorphism is used in C++.
Polymorphism is the most Important Feature of OOPS.
4. Operator overloading is one of the greatest Feature of C++.
5. Bottom up approach adopted in Program Design.
6. Namespace Feature is present in C++ for avoiding Name collision.
7. Multiple Declaration of global varioables are not allowed.
8. In C++
• Cin>> Function used for Input.
• Cout<< Function used for output.
9. Mapping between Data and Function can be used using "Objects"
10. In C++, we cannot call main() Function through other functions.
11. C++ allows the declaration of variable anywhere in the scope i.e at time of its First use.
12. Inheritance is possible in C++
13.In C++, new and delete operators are used for Memory Allocating and Deallocating.
14. It support both built-in and user define data types.
15. In C++, Exception Handling is done with Try and Catch block.

Monday, 3 March 2014

Trace IP using email


Track IP address of anyone using email.
Using This method you can get the IP address,location, timing of victim.

How to track IP address?

step 1: Know what is your victim email id.

For eg: victimid[@]gmail.com

step 2: Register an account here: http://www.readnotify.com/

step 3: Send mail to victim using your readnotify.com mail account. Before sending mail append ".readnotify.com" at end of victim mail ID.

For eg: victimid[@]gmail.com.readnotify.com

step 4:If victim opens the mail, his info will be tracked(IP address) and mailed to your account.

Saturday, 1 March 2014

Computer Crash Reasons

10 reasons why Computer Crash you must know:)

Fatal error: the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."

You have just been struck by the Blue Screen of Death. Anyone who uses Microsoft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?

1 Hardware conflict

The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.

For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.

If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:

* Start-Settings-Control Panel-System-Device Manager.

Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.

Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.

Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource iswww.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).

When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.

To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.

2 Bad Ram

Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.

But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.

One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.

Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.

EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.

3 BIOS settings

Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.

Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.

A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.

Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).

4 Hard disk drives

After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to

* Start-Programs-Accessories-System Tools-Disk Defragmenter

This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.

The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).

Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to

* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.

Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.

Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to

* Start-Programs-Accessories-System Tools-ScanDisk

Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.

5 Fatal OE exceptions and VXD errors

Fatal OE exception errors and VXD errors are often caused by video card problems.

These can often be resolved easily by reducing the resolution of the video display. Go to

* Start-Settings-Control Panel-Display-Settings

Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.

If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to

* Start-Settings-Control Panel-System-Device Manager

Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.

If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.

The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.

Another useful way to resolve video problems is to go to

* Start-Settings-Control Panel-System-Performance-Graphics

Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).

Look up your video card's manufacturer on the internet and search for the most recent drivers for it.

6 Viruses

Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to

* Start-Settings-Control Panel-Add/Remove Programs

Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.

A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.

An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).

7 Printers

The action of sending a document to print creates a bigger file, often called a postscript file.

Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.

If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.

8 Software

A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.

The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.

Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org

Often a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.

Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.

Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.

Remember to restore all the BIOS settings back to their former settings following installation.

9 Overheating

Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.

One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available fromwww.computernerd.com or www.coolit.com

CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.

10 Power supply problems

With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.

If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.

It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.

Saturday, 15 February 2014

20 Method Speed Up Windows 7

1. Use a Solid State Drive
(SSD)
Installing Windows 7 onto a solid
state hard drive (SSD) instead of a
normal SATA or IDE hard drive will
dramatically increase your
computer's performance.
2. Install the Latest BIOS
and Device Drivers
Make sure that you have the latest
available drivers installed for all of
your devices and BIOS version for
your motherboard. Check at the
device's website for them. Be sure
to have the correct versions for
your 32 bit or 64 bit Windows 7. If
you do not have Windows 7 drivers
available, then you can often times
use Vista drivers instead with
sometimes having to use
Compatibility Mode on the driver
installation file with Vista selected.
3. Install More RAM
The more you have the better your
performance can be up to a point.
Usually 3 GB (32-bit) or 4 GB (64-
bit) will be the most that you will
need though unless you do
memory intensive actions such as
video editing.
4. Turn Transparency Off
The glass transparency effect uses
the most resources from the Aero
feature. You can disable it without
disabling Aero.
5. Turn Off Unneeded
Visual Effects
Uncheck the visual effect options
that you do not want or need, or
select the Adjust for best
performance option, to increase
the speed. You can optimize
performance by changing how
menus and windows appear. The
most common visual effects to
uncheck are:
* Animate windows when
minimizing and maximizing
* Animations in the taskbar and
Start Menu
* Enable transparent glass
* Fade or slide menus into view
* Fade or slide ToolTips into view
* Fade out menu items after
clicking
* Show shadows under windows
* Slide open combo boxes
6. Enable Write Caching
for Storage Devices
This option is usually the best
choice for storage devices that
must provide the highest possible
performance and that you intend
to not remove from the system
frequently, such as internal hard
disk drives.
7. Disable or Remove
Unwanted or Unneeded
Startup Programs
Double check through your startup
programs and disable or remove
the ones you do not want to have
start when Windows 7 starts. It is
a good idea to check these every
once in awhile to help make sure
that some unknown program or
malware has not placed itself to
startup with Windows 7.
8. Disable Unused
Services
Services use processes that run in
the background using part of your
computer's resources. Check
through your services with the help
of the guide provided in this link,
and disable the services that you
do not use or need.
9. Turn Off Unneeded
Windows Features
Windows 7 includes many features.
You can review the list of features
and turn off the ones that you do
not want or need.
10. Turn Off Disk
Defragmenter Schedule
By default Disk Defragmenter is
scheduled to run in the
background automatically every so
often in Windows 7. Having this
running in the background can
cause a slight slow down and extra
hard drive activity. You should
either set the schedule to run at a
time when you are not using the
computer while it is on, or turn it
off and run Disk Defragmenter
manually when it is convenient for
you instead.

11. Defragment Your Hard
Disk
Fragmentation makes your hard
disk do extra work that can slow
down your computer. This will
show you how to open and use
Disk Defragmenter to manually
analyze and defragment your disks
and drives in Windows 7.
12. Disable Hibernate
If you do not use hibernate, then
disabling it will save you a GB size
file from being saved on your hard
drive when you put the computer
into hibernation mode.
13. Turn Off System
Protection
If hard drive space is at a high
premium for you, then turning
System Restore off will save you a
good bit of hard drive space. When
disabled it will also not run in the
background anymore while it
creates restore points. However,
disabling System Restore will mean
that there will be no restore points
available to go back to in the event
of a problem with your Windows 7
system files. You will need to
create backups or system images if
you disable System Restore instead
incase you need to reinstall.
14. Speed Up the Menu
Show Time
This will allow you to reduce the
amount of time it takes for a menu
in Windows 7 to pop, fade, or slide
open when you run the mouse
pointer over it.
15. Enable High
Performance in the Power
Plan
This power plan maximizes system
performance and responsiveness.
However, if you use a mobile PC
running on battery power, then
you will notice that your battery
doesn't last as long when using
this plan.
16. Speed Up Mouse
Hover Time
This will show you how to change
the delay time, in milliseconds,
that the mouse pointer has to stay
hovered on a item before it is
selected or opens a pop-up in
Windows 7.
17. Reduce Time to
Display Operating
Systems at Boot
This will show you how to change
the amount of time to display a
list of operating systems in the
Windows Boot Manager screen at
boot and wait for you to select a
OS to start before the default OS
starts automatically. If you do not
dual boot with another operating
sytem on your computer, then you
can uncheck, or reduce the time as
low as it will go, to save on how
long it takes to boot your
computer.
18. Add or Remove
Gadgets
Gadgets can be handy to offer
information at a glance and
provide easy access to frequently
used tools from your dekstop.
However, since each gadget added
will take up some of your system
resources. You can see how much
memory is being used by the
gadgets in Task Manager (Ctrl+Shift
+Esc) under the Processes tab with
the sidebar.exe process.
19. Run Disk Cleanup
Running Disk Cleanup every so
often will help find and remove
unnecessary files on your hard disk
to free up disk space and help your
computer run faster.
20. Speed Up Shut Down
Time
This will allow you how to set the
Wait to Kill time Windows 7 waits
for programs to save data and close
before shutting down.

Tuesday, 11 February 2014

Google 10 Most Interesting Works

Here Are Google's 10 Most Interesting Works In Progress!
Even if some of these technologies eventually make their way to the market, the world will be an entirely different
one!

Global search giant, Google has been silently working on becoming far more than just a search and advertising company. So much so that in the coming years Google might be known for projects that normally don't go with its portfolio. These projects could well in time change substantially our lives and our mindsets towards it. Here are 10 of the most awe inspiring projects the company has up its sleeves:
1. Google Invests Heavily in Robots

-In just the past year, Google has made nearly 10 robotics-related acquisitions (including DeepMind) and has invested heavily in places like Japan known for rapidly growing robotics.

2. Google Experimenting With Taxi Services

-Google recently acquired a patent on a technology that would allow consumers to get free taxi rides. Through the same, Google might bring its digital-advertising strategy to the real world!

3. Google Joins Automakers in Developing Driverless Cars

-Google's interest in developing a 'driverless' car is not new. However, it's still years from actually getting on the road in large numbers and gaining regulatory approval.

4. Google Aims for the Moon

-Google's Lunar X Prize rewards companies, organisations, groups, institutions and others interested in going to the moon for the progress they make toward getting there. Up for grabs is $40 million in prizes.

5. Google Fiber Growing Slowly

-Google Fiber is expanding each day (offering extremely fast Internet speeds). It's up and running in Kansas City.

6. Project Loon Floats Trial Balloons

-Google will float balloons over designated areas (preferably areas where Internet is not avaialble) and provide an Internet signal to those living there.

7. Smart Contact Lens Do More Than Sharpen Vision

-The contact lens will be worn on a person's eye and will measure glucose levels every second: particularly helpful in case of diabetes.

8. Calico Tackling Health, Wellness Issues

-Google has formed a subsidiary, known as Calico, that will tackle health and well-being.

9. Google Expands Renewable Wind Energy Resources

-Google relies heavily on wind farms to power its data centers.

10. Google X Envisions Space Elevators

-Last year, Google X announced that it was looking into developing a space elevator to lift people and payloads into orbit.

Securing Wireless Networks

Wireless networks are becoming increasingly popular, but they introduce additional security risks. If you have a wireless network, make sure to take appropriate precautions to protect your information.

How do wireless networks work?

As the name suggests, wireless networks, sometimes called WiFi, allow you to connect to the internet without relying on wires. If your home, office, airport, or even local coffee shop has a wireless connection, you can access the network from anywhere that is within that wireless area. Wireless networks rely on radio waves rather than wires to connect computers to the internet. A transmitter, known as a wireless access point or gateway, is wired into an internet connection. This provides a "hotspot" that transmits the connectivity over radio waves. Hotspots have identifying information, including an item called an SSID (service set identifier), that allow computers to locate them. Computers that have a wireless card and have permission to access the wireless frequency can take advantage of the network connection. Some computers may automatically identify open wireless networks in a given area, while others may require that you locate and manually enter information such as the SSID. 
What security threats are associated with wireless networks?

Because wireless networks do not require a wire between a computer and the internet connection, it is possible for attackers who are within range to hijack or intercept an unprotected connection. A practice known as wardriving involves individuals equipped with a computer, a wireless card, and a GPS device driving through areas in search of wireless networks and identifying the specific coordinates of a network location. This information is then usually posted online. Some individuals who participate in or take advantage of wardriving have malicious intent and could use this information to hijack your home wireless network or intercept the connection between your computer and a particular hotspot.

What can you do to minimize the risks to your wireless network?

Change default passwords - Most network devices, including wireless access points, are pre-configured with default administrator passwords to simplify setup. These default passwords are easily found online, so they don't provide any protection. Changing default passwords makes it harder for attackers to take control of the device (see Choosing and Protecting Passwords for more information).

Restrict access - Only allow authorized users to access your network. Each piece of hardware connected to a network has a MAC (media access control) address. You can restrict or allow access to your network by filtering MAC addresses. Consult your user documentation to get specific information about enabling these features. There are also several technologies available that require wireless users to authenticate before accessing the network.

Encrypt the data on your network - WEP (Wired Equivalent Privacy) and WPA (Wi-Fi Protected Access) both encrypt information on wireless devices. However, WEP has a number of security issues that make it less effective than WPA, so you should specifically look for gear that supports encryption via WPA. Encrypting the data would prevent anyone who might be able to access your network from viewing your data (see Understanding Encryption for more information).

Protect your SSID - To avoid outsiders easily accessing your network, avoid publicizing your SSID. Consult your user documentation to see if you can change the default SSID to make it more difficult to guess.

Install a firewall - While it is a good security practice to install a firewall on your network, you should also install a firewall directly on your wireless devices (a host-based firewall). Attackers who can directly tap into your wireless network may be able to circumvent your network firewall--a host-based firewall will add a layer of protection to the data on your computer (see Understanding Firewalls for more information).

Maintain anti-virus software - You can reduce the damage attackers may be able to inflict on your network and wireless computer by installing anti-virus software and keeping your virus definitions up to date (see Understanding Anti-Virus Software for more information). Many of these programs also have additional features that may protect against or detect spyware and Trojan horses

Sunday, 9 February 2014

Best Ways to Download YouTube Videos

!! Download YouTube Videos with web apps

#KeepVid

KeepVid is a nice online app that allow users to download videos just by adding YouTube video URL. When you visit the website, you will see a big text box to enter the video URL. Copy the YouTube video URL and paste in the text box. Then click on big download button. In few seconds, you will get the download links in various file formats. Avoid Ads that say "Download Now or Play Now." Usually these are are below the text box and right side of the page. Keepvid supports various other video streaming websites.

#Savevid

Savevid is another nice website similar to Keepvid. Savevid also takes video URL and then generated the download links in various video formats. Click on the desired file format to start downloading video.

#DetURL

This is third similar kind of website that lets users download videos from YouTube. It also takes video URL and then lists video download URLs of various video formats. There is another method of downloading video offered by this service. You only need to change the URL. Add pwn before YouTube in URL. See example below

*Original URL: http: //www. youtube. com/watch?v=fjNTVS2cn4M
*Download URL: http: //www. pwnyoutube.com/watch ? v=fjNTVS2cn4M

#Savefrom.net

It is another nice website that gives download link just by video URL. It also supports all popular video streaming websites including YouTube. You can also download videos by modifying URL of YouTube video as we have seen in last method. Just add "savefrom .net/" or "sfrom .net/" before the URL.

*example: sfrom.net/http: //www. youtube. com/watch ?v=fjNTVS2cn4M 
and press Enter.
*It is also available as browser extension.

!!Desktop Tools to Download Videos from YouTube
There are also few nice tools that let users download YouTube videos. See few tools below.

#Fastest YouTube Downloader

Fastest YouTube Downloader is a nice tool to download YouTube videos. It is available for free and supports Windows and Mac. It also claims to be 100 time faster that any other available download methods. But you will have to pay for faster download option.

#YTD Video Downloader

YTD Video Downloader is a Windows only tool. It lets users download videos from more than 60 video websites including YouTube. Just enter the video URL in the tool and then select the video format to download the video.

!!Download YouTube Videos With Browsers Plugins
There are few nice browsers plugins are available that also lets users download videos from YouTube. While watching a video on YouTube, you can use any of these browser plugins to download video.

#FastTube

FastTube is a nice browser extension available for all popular browsers including Chrome, Safari, Firefox, Opera and Internet Explorer. Install this browser extension in your favorite browser. After installation, open the YouTube and play any video. You will see the download button just below the video player. Choose the preferred video format to download YouTube video.

#Video DownloadHelper

Video DownloadHelper is a popular add-on for Firefox browser. Install it in your browser and visit any video streaming website. It supports video downloading from YouTube, The search engine Videos, DailyMotion, and many more.

#Easy YouTube Video Downloader

Easy YouTube Video Downloader is another popular Firefox add-on to download videos. It also works with MySpace, Google videos, DailyMotion, Vimeo, Porkolt, iFilm, DreamHost and others.

#Video clip Download

Video clip Download is an Internet Explorer only extension. It can also provide download links of videos available on a web page. Grabbing video clip is available in the right click context menu.

There are many other browser extensions, web apps and tools are available.