Saturday, August 22, 2009

GTALK AND ITS IMPORTANT SHORTCUT

Gtalk is the Widley Used Messenger all over the Internet ,People are now switching to  Gtalk slowly and slowly leaving yahoo messenger due to some enhanced feature.So its necessary for new gtalk users to know more about  Gtalk ,for this we have created a short Gtalk Tutorials that will help users while surfing gtalk .
Send Bold Text: Text embedded between two * characters is displayed as bold text. Example: This is a *bold* statement. 

Send Italics Text: Text embedded between two _(underscore) characters is displayed as italics text. Example: This is an _italics_ statement
Insert Line Breaks: If you want to have a message that spans multiple paragraphs, just hold shift and hit enter
Send mail: Press F9 to send a mail to the contact with whom you are chatting
Restore Google Talk Window: Press windows key + Esc to restore Google Talk
window from system tray.
Call a Contact: Press F11 to start a voice call with the chat contact and F12 to end the voice call

Switch Windows – Hitting tab will cycle through open windows. It will select minimized conversations, to expand them just hit enter. If you just want to cycle through IM’s and don’t care about the buddy list, control-tab will do that and will automatically expand a minimized conversation if you settle on one.
Length Of A Single Message – A message can be max 32767 characters long.
Use Keyboard shortcuts while talking in Gtalk ,It will make yours work fast and talk Easy ,Below are some keyboard shortks for Gtalk User.

  • Ctrl + 5 (KeyPad) - Selects all the text typed.
  • Ctrl + 1 (NumPad) - It goes at the end of the last line.
  • Ctrl + 7 (NumPad) - It goes at the begin of the last line.
  • Ctrl + F4 – It closes the current window.
  • Alt + F4 - It closes the current window.
  • Alt + Esc – It Minimize the current open window.
  • Windows + ESC – Open Google Talk (if it’s minimized, or in the tray).
  • F9 - Open Gmail to send an email to the current contact.
Nickname  Status Message:You can’t change your nickname in a way that other people will see it change. Every nickname in the Google Talk contactlist is the part that is before gmail.com (only the alphabetical characters are used) or the name you chosen for your GMail account. To change the nickname need to go to your Gmail account and change the name there. Choose Settings, Accounts, and then Edit info. Click on the second radio button, and enter your custom name. As a result all of your emails will have that nick as well, there is no way to seperate the two. You can add a website in your custom message, it will be clickable when someone opens a conversation window with you.
  • F11 – It initiates a telephonic call with your friend.
  • F12 – It cancels a telephonic call.
  • Esc – It closes the current window
How To Make Conference Calls:To have conference calls in Gtalk: Open up a copy of Google Talk on all computers with which you wish to conference. After one copy is opened make a new shortcut for Google Talk but at the end of the target add /nomutex. If you installed it to the default folder then your shortcut should read
C:\Program Files\Google\Google Talk\googletalk.exe/nomutex.
Open Second instance of the software on every user’s computer.After this start a chain: User 1 should connect on one instance to user 2. User 2 will connect on his second instance to user 3. User 3 will connect using his second instance back to user 1. With this chain everyone is connected to everyone.
Login to multiple Google Talk accounts simultaneously with a very easy hack. Follow these steps
  1. Create a shortcut of Google Talk messenger on your desktop or any other preferred location .(To create a shortcut, right click on your Google Talk messenger application and select Send To–>Desktop(create shortcut) )
  2. Right click on the Google Talk messenger icon and select Properties option
  3. Modify target location text “c:\program files\google\google talk\googletalk.exe” /startmenu to
“c:\program files\google\google talk\googletalk.exe” /nomutex
  1. Click Ok and you are done with this .
Contacts: Don’t need to say yes or no when someone wants to add you as a friend; you can simply ignore it, the request will go away. (On the other hand, someone with whom you chat often will automatically turn to be your friend, unless you disable this).

Friday, August 21, 2009

HOW DOES WORM WORKS

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.


How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl. But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next. The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.

WINDOWS 7

Windows 7 includes a number of new features, such as advances in touch, speech, and handwriting recognition, support for virtual hard disks, improved performance on multicore processors, improved boot performance, and kernel improvements.

Windows 7 adds support for systems using multiple heterogeneous graphics cards from different vendors, a new version of Windows Media Center, Gadgets being integrated into Windows Explorer, a Gadget for Windows Media Center, the ability to visually pin and unpin items from the Start Menu and Taskbar, improved media features, the XPS Essentials Pack being integrated, Windows PowerShell Integrated Scripting Environment (ISE), and a redesigned Calculator with multiline capabilities including Programmer and Statistics modes along with unit conversion.

Many new items have been added to the Control Panel including: ClearType Text Tuner, Display Color Calibration Wizard, Gadgets, Recovery, Troubleshooting, Workspaces Center, Location and Other Sensors, Credential Manager, Biometric Devices, System Icons, Action Center, and Display. Windows Security Center has been renamed the Windows Action Center (Windows Health Center and Windows Solution Center in earlier builds) which encompasses both security and maintenance of the computer.

The taskbar has seen the biggest visual changes, where the Quick Launch toolbar has been merged with the task buttons to create an enhanced taskbar or what Microsoft internally refers to as the "Superbar". This enhanced taskbar also enables the Jump Lists feature to allow easy access to common tasks.The revamped taskbar also allows the reordering of taskbar buttons.

Screenshots have appeared demonstrating a new feature called 'Peek'. Peek is a quick way of making all visible windows transparent for a quick look at the desktop. A Microsoft spokesman said that "this will be useful for users who want a quick look at the news" in reference to RSS gadgets on the desktop.

For developers, Windows 7 includes a new networking API with support for building SOAP based web services in native code (as opposed to .NET based WCF web services),new features to shorten application install times, reduced UAC prompts, simplified development of installation packages, and improved globalization support through a new Extended Linguistic Services API.

OS: Microsoft Windows 7 Original
Type of File: WinRaR
Size: 2.14 GB AFTER EXTRACTING!

How to Install:
1. Extract the rar archive....
2. Burn on a DVD
3. Now Boot and Install Just like Vista

Minimum recommended specs call for:
1. 1 GHz 32-bit or 64-bit processor
2. 1 GB of system memory
3. 16 GB of available disk space
4. Support for DirectX 9 graphics with 128 MB memory (to enable the Aero theme)
5. DVD-R/W Drive
6. Internet access to get updates

Features of Windows 7
Easier
Windows 7 will make it easier for users to find and use information. Local, network and Internet search functionality will converge.
More Secure
Windows 7 will include improved security and legislative compliance functionality.
Better Connected
Windows 7 will further enable the mobile workforce. It will deliver anywhere, anytime, any device access to data and applications
Lower Cost
Windows 7 will help businesses optimize their desktop infrastructure. It will enable seamless OS, application and data migration, and simplified PC provisioning and upgrading.


Download Window 7 Part 1

Download Window 7 Part 2

Download Window 7 Part 3

WINDOWS 7 CHEAT SHEET

From Desktop

  1. Windows Key + Tab : Aero [press Tab to cycle between Windows]
  2. Windows Key + E : Windows Explorer is launched.
  3. Windows Key + R : Run Command is launched.
  4. Windows Key + F : Search (which is there in previous Windows versions too)
  5. Windows Key + X : Mobility Center
  6. Windows Key + L : Lock Computer (It is there from the earlier versions as well)
  7. Windows Key + U : Launches Ease of Access
  8. Windows Key + P : Projector
  9. Windows Key + T : Cycle Super Taskbar Items
  10. Windows Key + S : OneNote Screen Clipping Tool [requires OneNote]
  11. Windows Key + M : Minimize All Windows
  12. Windows Key + D : Show/Hide Desktop
  13. Windows Key + Up : Maximize Current Window
  14. Windows Key + Down : Restore Down / Minimize Current Windows
  15. Windows Key + Left : Tile Current Window to the Left
  16. Windows Key + Right : Tile Current Windows to the Right
    [Continue pressing the Left and Right keys to rotate the window as well]
  17. Windows Key + # (# is any number) : Quickly Launch a new instance of the application in the Nth slot on the taskbar. Example Win+1 launches first pinned app, Win+2 launches second, etc.
  18. Windows Key + = : Launches the Magnifier
  19. Windows Key + Plus : Zoom in
  20. Windows Key + Minus : Zooms out
  21. Windows Key + Space : Peek at the desktop

From Windows Explorer

22. Alt + Up : Go up one level
23. Alt + Left/ Right : Back/ Forward
24. Alt + P : Show/hide Preview Pane

Taskbar modifiers

25. Shift + Click on icon : Open a new instance
26. Middle click on icon : Open a new instance
27. Ctrl + Shift + Click on icon : Open a new instance with Admin privileges
28. Shift + Right-click on icon : Show window menu (Restore / Minimize / Move / etc). Note: Normally you can just right-click on the window thumbnail to get this menu.
29. Shift + Right-click on grouped icon : Menu with Restore All / Minimize All / Close All, etc.
30. Ctrl + Click on grouped icon : Cycle between the windows (or tabs) in the group
Though some of them are there in previous versions of Windows, Windows 7 has incorporated many of them and have started many afresh.

SCAN FILE OR WEBSITE FOR VIRUS WITHOUT DOWNLOADING IT

This is very help full website for those who want to  check the files for virus
with out downloading it to your own computer.Now a days most of the
hacking tools and also some of the files that our trusted friends sends may
contain key loggers or virus .
NoVirusThanks, a website that offers free service to analyze your file with
22 AntiVirus Engines and will report back the analysis result .It introduced
a new feature to scan the website contain any files with virus or any
miscellaneous software or any drive -by-download attacks.It can scan
php,.html.,js, sites.The main advantage is it saves your bandwidth and also
time but the main drawback is this can scan only files maximum of 20 mb.

9 SEO TIPS TO INCREASE GOOGLE SEARCH RANK

I have listed 9 onpage SEO optimization tips to help you improve your google rankings. Just implement these SEO tips and see your search engine rankings boosting and hence traffic increasing.
SEO Tips

Onpage optimization to increase Google ranking:

The 9 tips to improve google ranking are given as:
1. Keywords :
Keywords are the words used by users to search for results. So, use of right keywords in posts help in increasing google rank and thus attracting high traffic from search engines. You can use Google adwords or various keyword softwares to track proper keywords that suit your article.
2. Title :
It is title that is seen first by search engine spiders rather than article body. So, use of right keywords in article title helps in increasing site traffic from search engine.
3. Header tags :
This is very important part of onpage optimisation, which i was neglecting so long. These header tags h1, h2,h3,h4 are used to indicate title and subtitles according to their hierarchies.
4. Strong and em tags :
Use strong and em tags to highlight content. Also, what is more advantageous is , these strong and em tags are used to inform spiders “what the content is about”. So, use strong and em tags for keywords. But, dont overuse them.
5. Image alt tags :
Generally, while including image in post, we just enter image tag with its source (img src=””). Alongwith this, include alt tags which tell search engine spiders about what image is actually about. Try using keywords in alt tags.
6. Anchor text :
While using links in posts, it is general practice to use “here” or “site” as anchor text. For example, to provide a download link to software, one use “Download here” as anchor text. But, it would be better if you use “Download software here” as anchor text.
7. Title tags :
When anchor text is optimized, its time to look at title tags. Title tags come in role when you hover mouse over a link and content of title tags are displayed without user clicking link. This title tag is used to inform search engine spiders about site you are linking to. So, why not use this title tag to include keywords??? So, title tags with keywords help in SEO.
8. New unique content :
It is my general observation that search engine prefers new content than redundant copied content. So, try out your innovation to write on new topics or if you dont have new topic, just develop your own way of presenting the topic and remember “NEVER COPY”. Yes, you can use other articles to get ideas on subject but dont be a copycat. You are a BLOGGER and not a Copycat.
9. Start and end :
Usually, it is seen that stuffing keywords at start and end of article increases chances of getting high search engine rank. So, it is beneficial to use keywords at start and end of article.
Guys, just try out these tricks and you’ll find your google traffic increasing. These tips have helped me a lot in getting google hits. I hope they may help you. If you know any SEO tricks not mentioned in article, but has helped you in getting google traffic, please mention it in comments section.

Thursday, August 20, 2009

HIDE YOUR IP ADDRESS

IP address is same as your postal address in internet.But, while performing these hacking tricks you must be anonymous so that your IP address cannot be detected. Thus, it is necessary to hide IP address to maintain online privacy. Hence, I am writing this article on how to hide your ip address using Hide my ip to inform you the method used to hide IP address. I have also provided link for Hide my IP software download.

Hide my IP is proxy software used to hide IP address while internet browsing. It assigns its own proxy addresses so that you are able to mask or hide IP address.
1. Download Hide my IP software to hide IP address.
2. Unzip the file using Winzix (free download here) to obtain Hide My IP software.
3. Go to http://www.whatismyip.com and check your IP address.(show your ip)
4. Install software Hide my IP on your computer.
5. Now, open Hide my IP control panel by double clicking on Hide my IP icon in taskbar and hit “Hide my IP”. Hide my IP software will search for available fast proxy servers for you and will automatically hide IP address by changing it.
6. Now, go to http://www.whatismyip.com and again see your changed IP address.
Thus, you can now use Hide my IP software to hide IP address. Hide my IP is really useful as it provides you with fast proxy servers and also you are able to hide IP address.

Monday, August 17, 2009

SEND ANONYMOUS EMAILS A GREAT TECHNIQUE.

Sometimes it is necessary to send an email anonymously.
There are several web based utilities that allow this, but each one registers the ip info in the headers which allows tracing. They also will not allow you to use a proxy and utilize their service. This is for security reasons.

Address you specify as well as no accurate record of your IP in the headers of the mail that could be traced back to you.
The method that follows supports my definition of anonymous.Amazingly, all you need to accomplish this is telnet and a SMTP server. Allow me to break it down.

My definition of anonymous includes the email addresses appearing as if they have been sent from whatever Telnet is a software application that connects one machine to another, allowing you to log on to that other machine as a user.
If you don't have telnet, you can easily download it for free from the web - do a search on "telnet" or "download telnet” in any search engine.
...and just for the sake of being thorough...
What is SMTP?
SMTP stands for "Simple Mail Transfer Protocol"
Basically just a protocol for sending e-mail.

Where do you get a SMTP server?
Heres a few links, but as always be aware that these sites may not be here forever or their content may change. Searching for "SMTP servers" or "SMTP server list" should produce effective results.

http://www.gr0w.com/help/email_help_smtp_servers.htm
http://www.uic.edu/depts/accc/ecomm/smtpmove/isps.html
http://www.thebestfree.net/free/freesmtp.htm
http://www.registerdirect.co.nz/help/smtp_servers.html
http://www.bu.edu/pcsc/email/remote/smtplist.html

Once you've selected a server, open the command prompt, and type:
telnet xxxxxx.com 25

(Obviously replace the x's with the SMTP server you've selected) now type the following:

HELO targetsmailserver.com
MAIL FROM: whoever@whatever.com
RCPT TO: target@address.com
DATA
from: whoever@whatever.com
to: target@address.com
subject: whatever
received: xxx.xxx.xxx.xxx
x-header: xxx.xxx.xxx.xxx
The body of the message goes here.

*Note 1: Remember to end with "." on a line by itself as directed.

*Note 2: Adding x-header and received allows you to alter the IP information found in the headers of the mail, making it untracable and totally anonymous**

*Note 3: There are ISPs that have port 25 (SMTP) blocked. Be sure your settings and ISP allow connections to port 25. If all else fails, get the SMTP sever address from your ISP

OPEN SOURCE SOFTWARES

http://openit.biteus.org/wp-content/uploads/2007/11/osi.pngOpen source software (OSS) began as a marketing campaign for free software.OSS can be defined as computer software for which the human-readable source code is made available under a copyright license (or arrangement such as the public domain) that meets the Open Source Definition. This permits users to use, change, and improve the software, and to redistribute it in modified or unmodified form. It is very often developed in a public, collaborative manner. Open source software is the most prominent example of open source development and often compared to user generated content.
Open Source Softwares have following main advantages:
#Users should be treated as co-developers
#Early releases
The first version of the software should be released as early as possible so as to increase one’s chances of finding co-developers early.
#Frequent integration
New code should be integrated as often as possible so as to avoid the overhead of fixing a large number of bugs at the end of the project life cycle. Some open source projects have nightly builds where integration is done automatically on a daily basis.
#Several versions
There should be at least two versions of the software. There should be a buggier version with more features and a more stable version with fewer features. The buggy version (also called the development version) is for users who want the immediate use of the latest features, and are willing to accept the risk of using code that is not yet thoroughly tested. The users can then act as co-developers, reporting bugs and providing bug fixes.
#High modularization
The general structure of the software should be modular allowing for parallel development.
#Dynamic decision making structure
There is a need for a decision making structure, whether formal or informal, that makes strategic decisions depending on changing user requirements and other factors. Cf. Extreme programming.
Most well known OSS products include projects such as Linux, Firefox, Apache, the GNU Compiler Collection, and Perl to mention a few.
Linux kernel comes up with many distributions so we can download it through the distribution’s site such as http://www.fedoraproject.org
PHP: PHP hypertext pre-processor can be downloaded from www.php.net/downloads.php
Apache: One of the most famous HTTP server http://httpd.apache.org/download.cgi
Mozilla Firefox, The most commonly used and best Explorer http://www.getfirefox.com
Pidgin: A multi-protocol instant messenger formerly known as GAIM http://www.pidgin.im/download/
MySQL: one of the leading database management program http://dev.mysql.com/downloads/