Thursday, 24 October 2013

Differences Between Win 8 and Win 7

Major Differences Between Windows 7 and Windows 8

  •     Boot time: win7 48 sec. win8 10 sec.
  •     Desktop : Microsoft has replaced the normal shortcut icons with dynamic tiles. You can change their size and place similar applications around each other- or anything else that my suit you.
  •     Mounting iso images: Windows 7 could only burn an ISO image to a DVD but Windows 8 actually betters this by offering you the option to mount the image too. In Windows 7, you didn’t have the option to make virtual drives to use the ISO image’s content but Windows 8 allows you to create a virtual drive to mount the ISO image so that you can easily use it just like a normal DVD.
  •     Built-in Antivirus(bad news for hackers): Windows 8 has an antivirus present inside the kernel of the operating system. This means that your system won’t boot if a corrupt USB device is plugged in. It sounds impressive though I don’t know whether it would pass the test of time…. and viruses! All in all, I do expect Windows 8 to be a serious upgrade on Windows 7 and with Microsoft working on the things that require some tweaking; I genuinely believe that Microsoft is finally ready to launch an OS which will take the world by storm.
  •     Multiple monitors support in Windows : Microsoft announced that customers can use more than one monitor to connect with Windows 8 operating system. Windows 8 PC management allows customers to use multiple monitors at same time. It means Windows 8 offers flexibility by allowing start screen at one monitor and desktop in another. Customer can also choose taskbar on both screens with different icons on each monitor. Moreover, you can play with background images as well by changing it separate on each monitor. Such support is not available with Windows 7 operating system.
  • Windows based apps store Windows 8 operating system introduces new app store in which different apps is implemented for various devices and settings on right of the screen. The settings section includes contextual apps like volume, brightness, restart and power options. You can share content, links, app reviews, contacts, metro apps, Facebook and twitter applications with your friends or colleagues. Windows 8 store offers both desktop apps and ecosystem for developers. On the other hand, Windows 7 OS is missing all these features.
  • Inbuilt Windows Touch features: The main difference between Windows 7 and Windows 8 comes with its metro style interface that provides live title of rectangle shape which has replaced the icon pattern in Windows.
  •  In Windows 7 operating system, software shortcuts are in the form of icons. As far as the touch interface is concerned then Windows.
  • supports touch interface but not that much, what was expected. So, Windows 8 comes with true touch interface for Metro style apps. It is fast way of accessing data by using an improved on-screen keyboard and handwriting recognition

How to convert 2g sims to 3g without any cost

                  How to convert 2g sims to 3g without any cost




BSNL-To convert Bsnl 2G Prepaid to 3G Prepaid Send SMS M3G120 to 53733
Then you will get Confirmation SMS Confirm your SMS Send SMS M3G120Y to 53733.
If you realy want to get high speed net with your BSNL SIM.convert it in 3G and recharge ur sim with 100 Rs.you will get 30 days validity 300mb of 3G data

VODAFONE 3G -You have to send a message  ACT 3G to 111 now just wait for the conformation message now your 3G will be activated and select the WCDMA or UMTS mode for 3G usage and high speed surfing


AIRTEL 3G-Send message  3G to 121 and wait for the conformation  .It will be activated in about one hour and after activation select 3G mode i.e. UMTS OR WCDMA for high speed surfing

IDEA-For converting idea 2G to 3G just send a message ACT3G to 12345 OR 3G TO 54777 simply wait for the conformation then choose 3G gode in phone or data card and start surfing

MTNL 3G-Send a sms  ACT3G to 444 after receiving conformation just switch to 3G mode and start surfing 

TATA DOCOMO 3G-Send a message ACT3G to 53333 OR 3GLIFE TO 53333 after reciving conformation just use 3G sim  in 3g device

AIRCEL 3G - For aircel 3G just send a message START 3G to 121on reciving conformation messsage just insert the sim in the 3G device and ejoy the 3G network

Airtel 3G resumable proxy trick 2013

               Airtel 3G resumable proxy trick 2013


HI, Guys after long time posting a trick of Airtel 3G  (Airtel 3G Proxy Trick Working @ Null Balance July 2013)
 

1.     Account Name: alltricks.co.in
2.     APN (Access point)  : airtelgprs.com
3.     Proxy: 63.141.241.221
4.     port:  80
That’s it! after entering a working home page of your state, just save the settings and you are done.



Some free home pages for airtel :-

m.airtellive.com
airtellive.com
live.airtelworld.com
203.115.112.27/
203.115.112.5/

Vodafone Dhamaka Unlimited 3G Octuber 2013

                  Vodafone Dhamaka Unlimited 3G Octuber 2013


In this Vodafone 3G tricks, you are not required to recharge any BBM or even 3G pack to get work this trick. In case after connecting if you are not getting 3G speed then you will require to recharge with small or low price Vodafone 3G Pack.
The one and only working Vodafone trick in August/September 2013 is Vodafone 3G Twitter trick which is been confirmed working till November 2013 as Vodafone free twitter service is official launched till 30th November 2013.




Features of Vodafone unlimited 3G tricks 2013 :

  • Not require to recharge with any 3G or Paid pack
  • This trick works in high balance also, but I recommend you to keep balance zero
  • Important : You must activate Vodafone free twitter pack
  • This trick is based on TCP protocol and having awesome 3G speed
  • Trick is confirmed working in most states of India
  • IDM, Torrents and other client are also supported with this trick
  • No disconnection   
  • Steps for getting Vodafone unlimited 3G GPRS hack :

    • First of all you are required to call Vodafone Customer care and say them to start Vodafone free twitter service in your number
    • Vodafone free twitter service will activate instantly on your number
    • Now download and install NMD VPN : Download NMD VPN    link1    link2
    • Now, Download Vodafone 3G Config from this link
    • After downloading, extract this zip file and paste it into NMD VPN config folder
    • Now connect with apn Portalnmms or www
    • Run NMD VPN software with Administrator privilligies
    • Connect with the config you have pasted in NMD VPN Config
    • Now you have done with this trick, your connection will now be established successfully.
    • Enjoy Vodafone twitter tricks with awesome 3G Speed.
                                                                                                                                                                             

Thursday, 3 October 2013

How to Protect an Email Account from being Hacked

Today in this post I’ll teach you how to protect your email account from being hacked. Nowadays I get a lot of emails where most of the people say “My Email account is hacked please help…”. Now one question which arises in our mind is: “Is it so easy to hack an email accountOR Is it so difficult to protect an email account from being hacked?”. The single answer to these two questions is “Absolutely NOT!”. It is neither easy to hack an email nor difficult to protect an email account from bieng hacked.

If this is the case, then what is the reason for many people to lose their accounts?
The answer is very simple. They don’t know how to protect themselves from being hacked! In fact most of the people who lose their email accounts are not the victims of hacking but the victims of Trapping. They lose their passwords not because they are hacked by some expert hackers but they are fooled to such an extent that they themselves give away their password.
Are you confused? If so continue reading and you’ll come to know…
Now I’ll mention some of the most commonly used online scams which fool people and make them lose their passwords. I’ll also mention how to protect your email account from these scams.

1. WEBSITE SPOOFING
Website spoofing is the act of creating a website, with the intention of misleading the readers. The website will be created by a different person or organisation (Other than the original) especially for the purposes of cheating. Normally, the website will adopt the design of the target website and sometimes has a similar URL.
For example a Spoofed Website of Yahoo.com appears exactly same as Yahoo Website. So most of the people believe that it is the original site and lose their passwords. The main intention of spoofed websites is to fool users and take away their passwords. For this,the spoofed sites offer fake login pages. These fake login pages resemble the original login pages of sites like Yahoo,Gmail,Orkut etc. Since it resemble’s the original login page people beleive that it is true and give away their username and passwordsby trying to login to their accounts.
Solution:
§  Never try to login/access your email account from the sites other than the original site.
§  Always type the URL of the site in the address bar to get into the site. Never click on the hyperlink to enter the site.
2. BY USING KEYLOGGERS

The other commonly used method to steal password is by using a Keylogger. A Keylogger is nothing but a spyware. The detailed description of keylogger and it’s usage is discussed in the post Hacking an email account. If you read this post you’ll come to know that it is too easy to steal the password using a keylogger program. If you just access your email account from a computer installed with keylogger, you definitely lose your password. This is because the keylogger records each and every keystroke that you type.
Solution:
Protecting yourselves from a keylogger scam is very easy.Just install a good anti-spyware program and update it regularly. This keeps your PC secure from a keylogger. Also there is a program called Anti-keylogger which is specially designed to detect and remove keyloggers. You can use this program to detect some stealth keyloggers which remain undetected by many anti-spyware programs.
3. ACCESSING YOUR EMAIL ACCOUNT FROM CYBER CAFES

Do you access your email from cyber cafes?  Then definitely you are under the risk of loosing your password.In fact many people lose their email account in cyber cafes. For the owner of the cyber cafe it’s just a cakewalk to steal your password. For this he just need’s to install a keylogger on his computers. So when you login to your email account from this PC, you give away your password to the cafe owner. Also there are many Remote Administration Tools (RATs) which can be used to monitor your browsing activities in real time.
This doesn’t mean that you should never use cyber cafes for browsing the internet. I know, not all the cyber cafe owners will be so wicked but it is recommended not to use cafes for accessing confidential information. If it comes to the matter of security never trust anyone, not even your friend. I always use my own PC to login to my accounts to ensure safety.
So with this I conclude my post and assume that I have helped my readers to protect their email accounts from being hacked. Please pass your comments…


Monday, 30 September 2013

How To Test Your Antivirus is Working or Not...


Test Your Antivirus

No, we’re not going to recommend downloading a virus to test your antivirus program – that’s a recipe for disaster. If you ever want to test your antivirus software, you can use the EICAR test file. The EICAR test file isn’t an actual virus – it’s just a text file containing a string of harmless code that prints the text “EICAR-STANDARD-ANTIVIRUS-TEST-FILE!” if you run it in DOS. However, antivirus programs are all trained to recognize the EICAR file as a virus and respond to it just as they would respond to an actual virus.
You can use the EICAR file to test your real-time antivirus scanner and ensure it’s going to catch new viruses, but it can also be used to test other types of antivirus protection. For example, if you’re running antivirus software on a Linux mail server and you want to test that it’s working properly, you can email the EICAR file through the mail server and ensure it’s caught and quarantined.
Note: it’s important to test and make sure all your defenses are correctly configured and working properly, but this can’t guarantee your anti-virus will catch every new virus. Since there are new viruses every day, it pays to still be vigilant about what you download.
You can download an EICAR test file from the EICAR website. However, you could also create your own EICAR test file by opening a text editor (such as Notepad), copy-pasting the following text into the file, and then saving it:
X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*
Your antivirus program should react as though you had just created an actual virus.
scan the file if the antivirus program detect its then your antivirus is in perfect condition