Sunday, November 6, 2011

Trick to Auto Shutdown PC in UBUNTU

Linux is a open source Operating system.It is free and more secure than windows.It uses Linux Kernel which was written by Linus Torvalds in 1991.Earlier I gave you the trick to automatically shutdown pc in windows Operating System.Similarly you can also automate the process of shutdown in UBUNTU.

* Open Terminal window [Ctrl+Alt+T].
* Run the following command to install Gnome Schedule.






After installing Gnome Scheduler, open Run Application [Alt+F2] and run the following command in it.
gksu gnome-schedule

Click New—>Recurrent Task









Now in the Description field give any display message that you want to show and in the Command field type.

/sbin/poweroff


















In the Time & Date field set the time when you want to shutdown your PC and click on Add button.

Now your pc will Automatically Shutdown at the scheduled time by displaying the message PC Shutdown at Midnight.





Convert Any Blog into an Ebook to Read Offline

Blogger and WordPress are most popular platforms among bloggers.There are blogs for every niche like health,technology,hacking,programming etc which are full of information.If you are a regular reader of some blogs and want to have access to their content even when you are not connected to internet than you can create a pdf version of the blog.The PDF version of blog doesn’t include any ads and is completely free to create.You can also store it in your smartphone and read it on the go.

# Open BookSmith Website
# Click on the Start Now button to initiate the process.










# Enter the URL of the blog and select its blog type (either WordPress or Blogger).Also select how you want to fetch post’s( by latest or Date range)















# After clicking on Get the Posts! button it will grab all the post.You can uncheck any post that you don’t want to include in your PDF
# In next step you can customize the PDF file.You can select not to include Images and publish date of posts.You can also add the title, subtitle, authors name and choose cover page.

















# Once you are done with customization click on Create my book! button.It will take some time depending upon the number of posts to be included.










# Now you can download PDF by clicking on Download Ebook! button or save it for later download.You need to register if you want to save ebook for later download.












Blog smith fetches posts from Feed of the blog.If webmaster have enabled only partial posts in their feed then the ebook will only have partial post.However if you are the owner of the blog than you can fetch complete post by providing your wordpress or blogger login credentials.

Friday, November 4, 2011

9 Best Ways to Secure Your Digital Life From Hackers 2011

1. Secure your WIFI connection



Home users are particularly prone to leaving their routers open without passwords, in order to make sure that you’re protected check your router settings to verify whether encryption is turned on or not. leaving access unencrypted can be just a minor issue of bandwidth being stolen by unauthorized users freeloading off your connection to more serious cybercrimes like credit card fraud or hacking taking place using your internet connection, which may be traced back to you.

The majority of routers support encrypted connections, support either WEP or WPA/WPA2, always opt for WPA/WPA2 as it’s far more secure. If you have the option hide SSID broadcast, turn that on as well, it basically allows you to make your wireless router invisible to outsiders and they need to know your SSID to access the network.

2.Encrypt your hard drive It’s important to keep your data secure in case of loss of hardware or even theft. An encrypted hard drive basically prevents its contents from being access without the password. It is obviously more important to encrypt thumb drives and laptop drives. Windows 7 Ultimate and Business editions come with a built in hard drive functionality using a software called BitLocker which will encrypt your entire hard drive, but users with Home Premium or Basic users shouldn’t feel left out as there is a free way to encrypt your hard drive using trucrypt.

Mac users can use FileVault to encrypt their folders, and OSX Lion will allow you to encrypt your entire hard drive as well.You can also get hardware encryption which will use fingerprint recognition to unlock data inside the drive like the Lacie Rugged Safe.


3.Keep your software updated



It’s a given that you need to keep your operating system, antivirus and web browser up to date in order to protect yourself from exploits, and if you haven’t got automatic update turned on for them, you should do it now.

However a lot of users often overlook other software such as Acrobat Reader, Flash, Java and iTunes when it comes to keeping software updated. It’s important to realize that many of these applications have direct access to the operating system, and an exploit in these applications can be used as a gateway into your system files. Flash and Acrobat are used heavily with web browsers which is the number one


4.Upgrade your antivirus suite.


It’s as important to keep your virus suite updated as much as it is to keep your virus definitions updated. The reason for this is because antivirus software evolve in the way they deal with malware, such as introducing heuristic technologies which identify common traits of viruses, the way they interact with the system and actively block these scripts. This is why having an outdated antivirus software, despite updated virus definitions may not provide the best possible protection. If you’re using an older version of antivirus software you may entitled to discounted upgrades to newer versions.

5.Secure your smartphones


Many people completely overlook this fact, but smartphones are essentially mini computers which hold swathes of personal information about you. They often hold logins to your facebook/twitter accounts which are set on auto login, online banking and other financial information as well as access to email. If someone gets hold of all these details it can cause a lot of stress and havoc to your life.

It’s vital to keep your devices with password lock activated, additionally you should take some precautionary measures in case you lose your device.

Apple has a very cool security software called Find my iPhone which is a free app by Apple, which lets you track your phone by GPS, lock and remotely delete data from it. You can even use it just to locate your iPhone if you misplace it, causing it to sound an alarm.

For Android users it’s important to stay protected, smartphones are just as vulnerable to viruses as a PC, although the android platform is more prone to them than apple due to the open platform nature of the former. Android phones require antivirus protection, all the popular desktop antivirus brands offer android support as well.

The app store is less prone to malware due to the fact that all apps are vetted by Apple before publishing, although if you’ve jail broken your iPhone, antivirus protection may be something you need to look at.

6. Vet web page links using a link checkerCyber criminals are using sophisticated strategies to drive users onto their web pages, increasingly innocent websites are being targeted using exploits to find security holes to hack and implant code on them which can launch JavaScript applications and infect computers when users visit the infected site. Link checkers scan links on your search results and optionally other websites and indicate whether links are safe, websites are scanned by their own servers so it does not impair your computer performance. Link checkers are available with most anti malware security suites such as with AVG, McAfee and Symantec.

7. HTTPS encryption for websites


Most people are well informed with the necessity of using https secure connections with online shopping when entering sensitive personal information. However, it can be argued that websites like facebook, twitter, gmail and others hold equally sensitive information about you.

Did you know you can elect to use https secure connections on these websites? For case by case uses, you can insert a ‘s’ after the http on the web address, if there isn’t one already to access the site securely. However if you want to access the sites securely every time you visit, you can login select the option to always use https in the profile

8.Use online backup to keep an offsite storage of your files


A great way for mobile workers to keep data kept safe and secure while on the move is to use online backup, this provides great peace of mind if your computer gets lost, as it allows you to recover your files from the cloud. Online backup services like Sugar Sync also provide users with high level synchronization features which can be used as a great time management tool as well, as it keeps data across all your computers consistent and up to date. You can look up variousOnline backup servicesto compare their features and read up user reviews.

9.Avoid public wifi and public computers


Using public computers can be incredibly risky as malware and key loggers can be installed to track your keystrokes and cached files in order to gain access to your private information.

secure your digital life from hackersAdditionally, public wifi connections can be risky as the servers can be breached with malware additionally phantom hotspots can be set up which appear like legitimate hotspots, but are actually other ordinary laptops which act as a middleman eavesdropping into the connection.

An example on how cached data can be hijacked to login to your web accounts can be demonstrated using FireSheep.

Thankfully mobile 3G internet connections are becoming more affordable, and are often faster than public wifi hotspots. 3G connections are far more secure, additionally you may be able to tether your Smartphone internet connection to work on your laptop. I hope this article helped you all for sure

Thursday, November 3, 2011

5 Best Troubleshooting Free Software’s for Your Windows

1) Process Explorer :

In short Process explorer helps in sorting out problems that has unique capabilities making life easier by allowing the tracking of DLL problems and handling leaks by providing greater insights into the way a file is being handled by Windows and applications work. This program consists of two windows one showing the list of currently active processes, which also includes the names of the owning accounts, while the bottom window depends on the mode the program is working.Download :Process Explorer
2) SIW :

SIW stands for system information for windows. This is an advanced tool that analyzes computer and gathers detailed information about system properties and settings, displaying in an extremely comprehensible manner. This program has the capacity to create a report file in CSV, HTML, TXT or XML format and is capable of running the program in batch mode. The program is categorized into major categories like software information, hardware information, network information, network tools, miscellaneous tools and real time monitors. This standalone utility can help you resolve and handle any troubleshooting problems in Windows. Download :SIW
3) Blue Screen View :

This is a windows utility tool that gathers information regarding all kind of crashes under on single roof and enables to identify the problem and rectify with the needed solution. The tool records the time and date of crash besides other vital information like the nature and the reason for the crash, the type and kind of crash, the details of the device driver causing the crash. Using this tool you can identify the nature of the crash and the device driver involved. Download:BlueScreenView
4) Autoruns :

This is another product from Sysinternals for sorting the common troubleshooting problems in Windows, which includes the comprehensive knowledge of autostarting the locations of any start up monitor and shows you what programs are configured to run during system boot up or login. They also show the entries in the order that Windows process them. Download:Autoruns
5) Windirstat :

This is a tool that monitors as the name suggests Windows Directory Statistics giving you three useful views of the information gathered – directory list view, tree map view and extension list view. Of all these the most useful information could be gathered from the tree map view. The tree map view has each file colored with a different color and contains all information about their files and directories. The size of the rectangle in the tree map is an equivalent representative of type and size of the file. Download:Windirstat

Security TIPS for PC users

Do's
*** Unplug your PC if you are not using it for extended periods of time. Be aware of the fact that even if your computer is turned off, a hacker may have access to your information if your network card has WON ( Wake-On-Lan).
*** Password protect your computer.
*** Use passwords that are not easy detectable.
*** Regularly change your passwords (at least once in 6 months). Keep in mind that in some computer systems (Linux, for instance) once you use a password , you have to regularly change it as it expires anyway.
*** Back up your information (on CDs, DVDs). It is the only way you can avoid loosing it for good.
*** Keep your backup information in a different and secure location from your PC system. Take safety measures for your sensitive data. For instance, in case something unexpected should happen where your PC is located, such as a fire, you have the certainty that your information is safe and sound somewhere else.
*** Use antivirus software.
*** Use a firewall.
*** Use email filtering or attachment blocking software.
*** Always use a delete software.
*** Regularly update your software.

Don't's
*** Do not download files or programs from sites you don't know or trust.
*** Do not use easily detectable passwords on your computer, such as name, date of birth, mother's maiden name, etc.
*** Do not use the same passwords for all your files.
*** Do not keep your backup information in the same place with your PC. In case an unforeseen situation may appear where your computer is located, you have the certainty that your backup data is safe in a different location.

Rapidshare downloads

Rapidshare is NO.1 FILE SHARING service on the web today. But it isn’t free. You will have to pay subscription charges to get a Premium Account. Most of us don’t like to wasting money to buy a premium account. So here are some simple tricks to fool Rapidshare.

*JAVASCRIPT Method:

1>Goto the page you want to download,hit the FREE button
2>Include the following in your address bar: javascript:alert(c=0)
3>Click OK to the pop-up box and enter the captcha code
4>Download Your File

*Request new IP address from ISP (for dynamic IP address Internet users only)

1>Click Start -> Run
2>Type cmd in the Open box, then click OK.
3>At the command prompt, run the following commands one by one:
ipconfig /flushdns
ipconfig /release
ipconfig /renew
exit
4>Try to download from RapidShare again.

*Using Bookmarklet in IE:

1>Open IE
2>Right Click On This Link
3>Select Add to Favorites
4>Select Yes to the warning that the bookmark may be unsafe.
5>Name it “RapidShare No Wait”
6>Click on the Links folder (if you want to display it in your IE toolbar)
7>Click OK, (You may need to close and reopen IE to see it )
8>Goto rapidshare and click the bookmarklet when you are forced to wait.

Hide Yourself From Network Users!, And give access to only specific users!

Don't want your XP computer to show up in the network browse list (Network Neighborhood/My Network Places) to other users on your network? One way to accomplish that is to disable file sharing. To do this, click Start, right click My Network Places and select Properties. Right click your local area connection and click Properties. Uncheck the box that says File and Printer Sharing for Microsoft Networks. Click OK.

But what if you want to be able to share folders with some users; you just don't want everyone on the network to see your computer's shares? There's a way:

Click Start and select Run.
In the Run box, type net config server /hidden:yes
Click OK.
Now others who know the UNC path (\\computer name\share name) can connect to your computer's shares from the Run box, but it won't show up in the network browse list.

How to find a remote IP

Method 1

To view someone's IP# when they send you hotmail email do this:
1) Click "Options" on the upper right side of the page.
2) On the left side of the page, Click "Mail"
3) Click "Mail Display Settings"
4) Under "Message Headers" select "Full" or "Advanced"
5) Click ok

Method 2
reg a dydns account and install the ip pointer, so each time you ping the host name you regestored

for example:
you regestor the host name myhost.dydns.com, then you keep a little software running on the target host. The little software will keep update your IP to dydns.com server.

so at your pc just start cmd, and ping myhost.dydns.com, it will give you the most updated ip address.

Method 3
neverender, what doesn't work for you? Simply type in nc -vvv -l -p 80 on your box, which will set it to listen in verbose mode on port 80. Then give them a link to your IP address (for example: 111.111.111.11) and tell them to type it in their browser. The browser should resolve the address as well as append port 80 automatically. Just make sure that your friend is not very computer literate.

Method 4
Just download a very simple server such as this one and install it on your comp. Then run it and give your ip to the person you want and tell them to connect to it through a browser. Your server will log their connection and you will get their IP.

link:http://www.download.com/Abyss-Web-Server/3000-2165-10283992.html?tag=lst-0-6


Other Ways
-www.imchaos.com and make a "spy poll" to put in ur profile, this will tell u the IP of anybody who answers ur poll
-originalicons.com there is a page for doin it (i dont like it, but it works)
-or irc