Friday 28 December 2012

Facebook 2013 Demo

Be The First To Comment
New way of phishing...........




Internet users are advised to follow best practices to avoid phishing attacks:
  • Do not click on suspicious links in email messages
  • Do not provide any personal information when answering an email
  • Do not enter personal information in a pop-up page or screen
  • Ensure the website is encrypted with an SSL certificate by looking for the padlock, ‘https’, or the green address bar when entering personal or financial information
  • Update your security software (such as Norton Internet Security 2012) frequently which protects you from online phishing
  • Report fake websites and email (for Facebook, send phishing complaints to phish@fb.com)

Source

Sunday 16 December 2012

Very hard puzzle

Be The First To Comment
98% of the people are incapable of solving this


Variations of this riddle appear on the net from time to time. It is sometimes attributed to Albert Einstein and it is claimed that 98% of the people are incapable of solving it. Some commentators suggest that Einstein created such puzzles not to test out intelligence but to get rid of all the students who wanted him as an advisor. It is not likely that there is any truth to these stories. Whereever this comes from, it is a nice riddle.
Let us assume that there are five houses of different colors next to each other on the same road. In each house lives a man of a different nationality. Every man has his favorite drink, his favorite brand of cigarettes, and keeps pets of a particular kind.
  • The Englishman lives in the red house.
  • The Swede keeps dogs.
  • The Dane drinks tea.
  • The green house is just to the left of the white one.
  • The owner of the green house drinks coffee.
  • The Pall Mall smoker keeps birds.
  • The owner of the yellow house smokes Dunhills.
  • The man in the center house drinks milk.
  • The Norwegian lives in the first house.
  • The Blend smoker has a neighbor who keeps cats.
  • The man who smokes Blue Masters drinks bier.
  • The man who keeps horses lives next to the Dunhill smoker.
  • The German smokes Prince.
  • The Norwegian lives next to the blue house.
  • The Blend smoker has a neighbor who drinks water.

The question to be answered is: Who keeps fish?
This is a simple constraint satisfaction problem. Let us start by defining a regular language that consists of all the possible solutions for the puzzle. We need five basic variables: Color of the house, Nationality of the owner, and his favorite Drink, Cigarette, and Pet. We define each variable as the language of the possible values of the variable.

  • define Color [blue | green | red | white | yellow];
  • define Nationality [Dane | Englishman | German | Swede | Norwegian];
  • define Drink [bier | coffee | milk |tea | water];
  • define Cigarette [Blend | BlueMaster | Dunhill | PallMall | Prince];
  • define Pet [birds | cats | dogs | fish | horses];

The next concept to define is that of a House. Let us construe it as a concatenation of the five terms defined above:

define House [Color Nationality Drink Cigarette Pet];

With five variables each taking one of five possible values, this gives quite a number of possible households, 5x5x5x5x5 = 3125, to be exact. A road with five houses next to each other, House^5, provides an astronomical number of possible combinations of colors, nationalities, drinks, cigarettes and pets.

To solve Einstein’s puzzle, we represent each of the fifteen constraints as a regular language and intersect these languages with the initial set of all possibilities. If all goes well, at the end we will know who keeps fish. For example, we can interpret The Englishman lives in the red house. as $[red Englishman]. This constraint is trivial to encode because in our representation of a house, the color and the nationality are adjacent. The second costraint, The Swede keeps dogs could be represented as $[Swede Drink Cigarette dogs] but we will choose a less verbose formulation, $[Swede ~$Pet dogs], that does not explicitly list the variables that separate Nationality and Pet. The fifteen constraints are shown below.


define C1 $[red Englishman];
    # The Englishman lives in the red house. 
define C2 $[Swede ~$Pet dogs];
    # The Swede keeps dogs. 
define C3 $[Dane tea];
    # The Dane drinks tea. 
define C4 $[green ~$Color white];
    # The green house is just to the left of the white one. 
define C5 $[green ~$Drink coffee];
    # The owner of the green house drinks coffee. 
define C6 $[PallMall birds];
    # The Pall Mall smoker keeps birds. 
define C7 $[yellow ~$Cigarette Dunhill];
    # The owner of the yellow house smokes Dunhills. 
define C8 [House^2 ~$Drink milk ~$Drink House^2];
    # The man in the center house drinks milk. 
define C9 [? Norwegian ?*];
    # The Norwegian lives in the first house. 
define C10 $[Blend ? ~$Pet cats | cats ~$Cigarette Blend];
    # The Blend smoker has a neighbor who keeps cats. 
define C11 $[horses ~$Cigarette Dunhill | Dunhill ? ~$Pet horses];
    # The man who keeps horses lives next to the Dunhill smoker. 
define C12 $[bier BlueMaster];
    # The man who smokes Blue Masters drinks bier. 
define C13 $[German ~$Cigarette Prince];
    # The German smokes Prince. 
define C14 $[Norwegian ~$Color blue | blue ? ~$Nationality Norwegian];
    # The Norwegian lives next to the blue house. 
define C15 $[Blend ~$Drink water | water ? ~$Cigarette Blend];
    # The Blend smoker has a neighbor who drinks water.

All that we need to do to solve the problem is to impose the constraints on the row of five houses by intersection. The solution below is almost correct.

define Solution [House^5 & C1 & C2 & C3 &C4 & C5 &
C6 & C7 & C8 & C9 & C10 &
C11 & C12 & C13 & C14 & C15];

The result is a network with five paths. In four of the solutions nobody keeps fish and the German keeps the
same kind of pet as someone else. We need one final constraint, presupposed by the question Who keeps fish?:

define C16 $fish;
    # There is someone who keeps fish.

With C16 added, only one solution remains. To make it easier to see, we compose the solution with the transducer that adds some prose around the pieces along the one remaining path:

define Describe [House -> "In the " ... .o.
Color -> ... " house " .o.
Nationality -> "the " ... " " .o.
Drink -> "drinks "... ", " .o.
Cigarette -> "smokes "... "s,\n and " .o.
Pet -> "keeps " ... ".\n"] ;

We can now see the solution.
regex [Solution .o. Describe];
76 states, 75 arcs, 1 path.
xfst[2]: print lower-words
  •   In the yellow house the Norwegian drinks water, smokes Dunhills, and keeps cats. 
  •   In the blue house the Dane drinks tea, smokes Blends, and keeps horses. 
  •   In the red house the Englishman drinks milk, smokes PallMalls, and keeps birds. 
  •   In the green house the German drinks coffee, smokes Princes, and keeps fish. 
  •   In the white house the Swede drinks bier, smokes BlueMasters, and keeps dogs.



In short, it’s the German who keeps fish.

Monday 22 October 2012

Free Unlimited Calling Trick For Android and Iphone

1 Comment

Make free calls all over India via Android/Iphone.

Just Download application for free from Android market, install it and make free calls all over country.
It works in many countries including India.

The name of the application is CrowdCall.

Download the application from the below link

http://market.android.com/search?q=pname:com.socialdial.crowdcall.app
Step 1.Download and install the application (Crowdcall)

Step 2. After installing open the app and enter ur own phone number.

Step 3. After that open it and enter ur frend's number or any other u r goign to call

Step 4. After entering someones mobile number u will receive an unknown call. Pick up the call and listen to and press "1" when instructed.

Stwp 5. After that dont disconnect call..during that process the person u r calling will receive call and after receiving call that person also have to press 1

Step 6. Enjoy free calling

Sunday 21 October 2012

Whonix: Operating system

Be The First To Comment

Whonix is an anonymous general purpose operating system based on Virtual Box, Ubuntu GNU/Linux and Tor. By Whonix design, IP and DNS leaks are impossible. Not even malware with root rights can find out the user's real IP/location.

Whonix consists of two machines, which are connected through an isolated network. One machine acts as the client or Whonix-Workstation, the other as a proxy or Whonix-Gateway, which will route all of the Whonix-Workstation's traffic through Tor. This setup can be implemented either through virtualization and/or Physical Isolation.


Whonix advantages:
  • All applications, including those, which do not support proxy settings, will automatically be routed through Tor.
  • Installation of any software package possible.
  • Safe hosting of Hidden services possible.
  • Protection against side channel attacks, no IP or DNS leaks possible^3^ To test for leaks, see LeakTests.
  • Advantage over Live CD's: Tor's data directory is still available after reboot, due to persistent storage. Tor requires persistent storage to save it's Entry Guards.
  • Java / JavaScript / flash / Browser Plugins / misconfigured applications cannot leak your real external IP.
  • Whonix does even protect against root exploits (Malware with root rights) on the Workstation.
  • Uses only Free Software.
  • Building Whonix from source is easy.
  • Tor+Vidalia and Tor Browser are not running inside the same machine. That means that for example an exploit in the browser can't affect the integrity of the Tor process.
  • It is possible to use Whonix setup in conjunction with VPNs, ssh and other proxies. But see Tor plus VPN/proxies Warning. Everything possible, as first chain or last chain, or both.
  • Loads of Optional Configurations (additional features / Add-Ons) available.
  • Best possible Protocol-Leak-Protection and Fingerprinting-Protection.

Thursday 18 October 2012

Creative MP3 Player

Be The First To Comment

The MP3 Player like portable great that. But if, you haven't a bag will add it, in case that you wear it that your wrist
Brazilian designer Dinard da Mata has developed another wearable gadget that becomes a fashion accessory to complement the style of next-gen users. Hailed as "MP3 Player Creative," the portable music player features a flexible OLED screen that other than displaying the playlist also lets the user select the song or control volume with just a touch of a finger. Worn around the wrist like a bracelet, the MP3 concept gives easy access of the functions to the user. In addition, the sleek music player includes wireless headphones to offer clutter-free music on the go.

Tuesday 9 October 2012

Kaspersky Mobile Security helps Android users recover stolen smartphones

Be The First To Comment


Kaspersky Lab announced the addition of new features to Kaspersky Mobile Security designed to aid in the protection of data residing on lost or stolen smartphones and the recovery of missing devices.
Through its new web-based control center, users can now access all security features for their Android smartphone. The user-friendly interface can be managed from any computer and provides the ability to swiftly protect any banking information, contacts, photos or other personal information saved on the device.

Through the new web-based control center, users can access all of Kaspersky Lab’s mobile security features, allowing them to:
  • Remotely lock their missing smartphone to secure personal information
  • Remotely wipe sensitive information from their missing smartphone
  • Remotely locate their lost or stolen smartphone using GPS, GSM or Wi-Fi, and Google Maps
  • Review logs of recent activities, such as their status and the results of any commands sent to the phone, or the installation of a new SIM card.
Kaspersky Mobile Security’s ‘Mugshot’ enables owners of lost or stolen Android smartphones to visually identify the unauthorized use of their devices. With the click of a mouse in the web-based control center, users can remotely activate the front-facing camera on their missing smartphone, and the device will secretly begin taking photos.

These photos are then automatically emailed to a pre-determined address or can be viewed directly through the web-based control center. If the smartphone has been stolen, the Mugshot tool gives users the opportunity to identify the thief, or if the smartphone is simply missing, users can recognize the phone’s surroundings to track it down.

iPhone-controlled keyless lock

Be The First To Comment
Lockitron replaces keys with your phone. With Lockitron, you can instantly grant family, friends and guests access to your home or business from anywhere in the world using your internet enabled smartphone.


Any internet enabled smartphone can use Lockitron. For a small monthly fee, Lockitron owners can enable text-message access which turns any mobile phone into a virtual key.

The Lockitron Android app features NFC capabilities that allows users to unlock or lock their door just by swiping it in front of a Lockitron NFC tag.

Thursday 27 September 2012

iPhone 5 and iOS 6: Benefits for Business

3 Comments

Apple unveiled a variety of new products and features at its media event this week. While a veritable rainbow of iPod Touch options, or re-engineered headphones might be exciting news for some, they're irrelevant to businesses or business users.

Fear not, though. Apple also revealed some good news for business users. There are aspects of the new iPhone 5, and features in the new iOS 6 that will make iOS devices more useful and effective as mobile productivity tools.

If you already use iOS devices for business, or you're considering deploying iOS mobile devices or implementing a BYOD policy that allows users to bring their own devices to work, here are seven benefits of the new iPhone and iOS that you should be aware of:

1. Better, faster connectivity
The iPhone 4S remains the only flagship smartphone of any of the major platforms that lacks 4G. Apple introduced 4G/LTE cellular with the new iPad back in the spring, and now the iPhone 5 is also getting bumped up to LTE.

This may not be Earth-shattering news for AT&T iPhone users. The HSPA+ cellular that iOS detects as 4G delivers reasonably fast data speeds. However, I have a Verizon 3G iPhone 4S and a Verizon 4G/LTE iPad sitting in front of me. They both have the same three bars of signal, but the SpeedTest.net app reports a download speed of only 0.83Mbps on the Verizon 3G compared to 11.04Mbps on the Verizon LTE. That means that my Verizon LTE is more than 13 times faster than the 3G--and that's just sitting in my home office. I've gotten speeds approaching 30Mbps on the iPad while out and about.

It's more than just the 4G cellular, though. The new iPhone also has vastly improved Wi-Fi technology. The iPhone 5 has dual-band 802.11n which means it can take advantage of both 2.4GHz and 5GHz wireless networks. Apple claims the iPhone 5 can deliver a theoretical top speed of 150Mbps over Wi-Fi.

2. Branded, locked down iPads
Business users may not be too excited about this one, but some businesses will love it. According to a blog post from Zenprise--a mobile device management company--Apple is introducing new enterprise features in iOS 6 that will enable IT to brand and lock down iPads.

Businesses that want to employ iPads without exposing their data or networks to undue risk can basically turn the device into a one-trick pony that only runs the app designated by IT. A business could deploy iPads as mobile sales or cash register tools, dedicated kiosk consoles, or other unique purposes where it makes sense to prevent users from downloading and playing Angry Birds. IT can also assign an image--like a company or product logo--as the background of the iPad, and lock it to prevent anyone from changing it.

3. New maps and navigation
Road warriors might appreciate the new mapping and navigation features of iOS 6. The current iOS has a Maps app already, but it doesn't provide voice-guided, turn-by-turn navigation. There are other apps available that do that--like Garmin StreetPilot--but there's no way to designate a third-party app as the default mapping or navigation app, and there's no way to integrate a third-party maps app with Siri.

On top of having cool 3D maps and a cool fly-by feature, the new Maps app will allow users to simply ask Siri to find the nearest gas station or coffee shop. Rather than pulling up navigation directions on a map that you have to actually look at and manually step through each direction, Siri will guide you there, turn-by-turn.

When Apple initially introduced iOS 6 and developers started working with the early beta release the mapping feature got mixed reviews. However, the demonstration Apple showed at the iPhone 5 unveiling seemed much more polished and impressive. We'll have to see how the new Apple maps compare in the real world when iOS 6 comes out next week.

4. FaceTime over cellular networks
FaceTime is great. Many traveling workers use it to keep in touch with spouses, or chat with the kids and tell them goodnight before they head off to bed while they're out of town. It can also be a simple and useful tool for impromptu video conference calls with other iOS or Mac OS X users.

The major downside to FaceTime has been that it only works over Wi-Fi connections, which greatly limits when and where it can actually be used. With iOS 6, users will be able to connect and chat over FaceTime anywhere they can connect with either Wi-Fi or over the cellular network.

5. Passbook
This is another feature that will appeal primarily to the travelers. Passbook is a central repository for store loyalty cards, rewards cards, movie or event tickets, airline boarding passes and more. Passbook can replace a wide variety of cards and printouts, and greatly simplify managing and finding them when you need them.

One of the coolest things about Passbook is that it's time and location aware. It would be nice enough to have your movie tickets or airline boarding passes stored in Passbook where you can easily find them, but Passbook also actually recognizes when you've arrived at the theater or airport and can automatically pop up the necessary "paperwork".

6. Improved Mail app
Business users will appreciate two new features of the iOS 6 Mail app--VIP and Flagged. Contacts can be designated as VIP, and any messages from them will be uniquely flagged in the main Inbox, as well as accessible in a separate VIP folder. The VIP feature should make it much easier to make sure you don't miss important emails from your boss, spouse, co-workers, or key customers.

The Flagged feature allows you to mark received messages as "flagged" so they're easier to find and address. Items marked as Flagged appear in a separate Flagged smart mailbox, so you can quickly and easily find them again without having to scroll through the entire Inbox.



7. Do Not Disturb and SMS replies to incoming calls
If you're in an important meeting, or trying to sleep at night you don't want your iPhone buzzing or playing annoying noises. The Do Not Disturb feature lets you block incoming calls and notifications for a designated period of time. Alerts and notifications are queued up and delivered once the Do Not Disturb period expires. There's also an option to allow calls from designated people through even when Do Not Disturb is activated, so you can eliminate frivolous calls while making sure you don't miss a call from your boss or spouse.

If you are in a meeting, and you get an incoming call, you may want to respond without answering it. iOS 6 has a new Reply with Message feature that allows you to send the call to voicemail, but also sends a text message to the caller so they at least know that you're aware they called, and that you'll contact them later. Alternately, you can tap the Remind Me Later option which will alert you an hour later or when you leave your current location to remind you to return the call.

These are just some of the interesting features of iOS 6 and/or the iPhone 5. There's also tighter Facebook integration, improvements to PhotoStream, and more. But, these are the features that businesses and business users should consider when deciding whether or not to deploy iPhones and iPads in the workplace, or if it's worthwhile to upgrade existing iPhones or other smartphones to the new iPhone 5.

Sunday 9 September 2012

ANDROID 4.1 JELLY BEAN

2 Comments

ANDROID 4.1 JELLY BEAN

Android Phones
Android 4.1 jelly bean is the latest mobile operating system which shows desirable performance and have great improvement in features for users and developers. This latest operating system provide lowest touch latency and increases screen experience.
Android 4.1 make everything feel fast, fluid, and smooth. With buttery graphics and silky transitions, moving between home screens and switching between apps is effortless, like turning pages in a book.It has more reactive and uniform touch responses which means that you can almost feel the pixels beneath as your finger moves across the screen. Jelly Bean makes your Android device even more responsive by boosting your device’s CPU instantly when you touch the screen, and turns it down when you don’t need it to improve battery life
Few of the Notable Features of Android4.1 Jelly Bean are:
  • BI-DIRECTIONAL TEXT AND LANGUAGE SUPPORT is a wonderful feature which help you to communicate with any person in the world. The bi-directional text in edit text and text view make the device user friendly. Additional languages like Kannada, Telugu, and Malayalam as well as other emotions are text features.
    • USER-INSTALLED KEYBOARD MAPS, such as for additional international keyboards and special layout type are helpful to highlight any keyword in any manner andANDROID 4.1 JELLY BEAN have 27 international keymaps.

  • Ø ANDROID 4.1 JELLY BEAN is a very wonderful user interface have very attractive way to show notifications. Useful notification depending upon time as well as user are highlighted forLarger and richer notification.
It`s now even easier to personalize your home screen. As you place widgets on the screen, everything else automatically moves to make room. When they’re too big, widgets resize on their own. Interacting with your favorite apps and customizing your home screen has never been easier.

Ø SMARTER KEYBOARD

Android’s dictionaries are now more accurate, more relevant. The language model in Jelly Bean adapts over time, and the keyboard even guesses what the next word will be before you’ve started typing it. With improved text-to-speech capabilities, voice typing on Android is even better; it works even when you don’t have a data connection, so you can type with your voice everywhere you go.

Ø SEAMLESSLY TAKE AND SHARE PHOTO

Jelly Bean made snapping and viewing photos super fast . Just swipe over from camera to filmstrip view to instantly view the photos you just took, and quickly swipe away the ones you don’t like. Now sharing — and bragging — are a breeze.

  • Android 4.1 retrieve contact information along with contact photo at 72by720 pixels making contact more proper and attractive.


CAPABILITIES
Android 4.1 is very much clever that it can detect any type of new input in device and for the operation of new input it is to be registered first. for ex., input devices like USB, Bluetooth etc.. Android 4.1 supports APIs for all apps by which user can take advantage of games and other features completely .The Device Manager look after about the new capabilities. Vibration controlon apps can be easily done on apps.

ANDROID BEAM on Jelly Bean a very famous and useful technology based on NFC, for instant sharing of data just by touching two NFC devices. By enabling BLUETOOTH images,videos and any data can be share. The Android beam is just a boom feature for instant users.

MEDIA CAPABILITIES: ANDROID 4.1 supports Media codec access, USB audio, Audio recording triggering, Multichannel audio, audio preprocessing, Audio chaining and media router for MEDIA

SMARTER KEYBOARD
Android’s dictionaries are now more accurate, more relevant. The language model in Jelly Bean adapts over time, and the keyboard even guesses what the next word will be before you’ve started typing it. With improved text-to-speech capabilities, voice typing on Android is even better; it works even when you don’t have a data connection, so you can type with your voice everywhere you go.

OTHER FEATURES

Other features like Android browsing, Cloud messaging, app Encryption, Automatic smart App update, and Google play services are inbuilt in JELLY BEAN.

Overall it is a wonderful packet having all vital as well as required properties for a good device.
Android 4.1, Jelly Bean, is the fastest and smoothest version of Android yet. Jelly Bean improves on the simplicity and beauty of Android 4.0,
Google is just amazing in mobile operating system.

Facebook Confirms Fake Accounts

Be The First To Comment

Facebook Confirms 83 Million Fake Accounts


Through company filings, Facebook Inc has revealed that it can peg a number of 83 million, or more with regard to fake users registered on the website. This number represents close to 8.7 percent of the 955 million active Facebook users.
Facebook’s latest figures showing growth in global users also suggest as many as 83 million may come from dubious sources — duplicate accounts, pages for pets and those designed to send spam.
Facebook members grew to 955 million at the end of the second quarter, but some 8.7 percent may be dodgy, the company said in its quarterly filing with the US Securities and Exchange Commission.
Facebook Inc went on to classify the fake users under three broad groups, the majority falling under the duplicate group.The other two categories were ‘user misclassified’ and ‘undesirable accounts’

It said duplicate accounts — when a same user maintains more than one account — may represent some 4.8 percent of active users.
Another 2.4 percent may be for a business, group or “non-human entity such as a pet” and 1.5 percent are likely “undesirable” accounts that use the accounts for spam or other malicious activity.
“We believe the percentage of accounts that are duplicate or false is meaningfully lower in developed markets such as the United States or Australia and higher in developing markets such as Indonesia and Turkey,” Facebook said in its filing.

“We are continually seeking to improve our ability to identify duplicate or false accounts and estimate the total number of such accounts, and such estimates may be affected by improvements or changes in our methodology.”
The number of real users is critical for Facebook as it seeks to secure advertising revenues from the world’s biggest social network. Some analysts have expressed doubts that the company can boost revenues.
Graham Cluley of the British security firm Sophos said fake accounts are a fact of life but could affect Facebook’s bottom line.
“Clearly all Facebook users are interested in the site becoming a safer place, and the level of spam and malicious links being minimized,” Cluley said in a blog post.
“But more than that, companies who are considering advertising on the social network want to be sure that any ‘likes’ they receive are from genuine users, not bogus accounts.”
Facebook shares closed down more than four percent at $20.04, a sharp 47 percent decrease from May’s offering price of $38.

Data Card (Dc) Unlocker

Be The First To Comment

“Data Card”, is basically a PCMCIA or expresscard broadband modem that uses a mobile broadband telecommunication system to link a notebook (but also a personal computer, using a specific adapter, or some special routers) to the internet.
DC unlocker is a program specialized for data card unlocking. It is the first universal data card unlocking product worldwide.
It is fast (takes 5 – 60 seconds to unlock), handily to use and functional program with clear interface.
It doesn`t need any cables or adapters for unlocking. The data card can be simply unlocked in a same notebook where a PCMCIA or Express socket exist’s.
DC-Unlocker lets you unlock your 3G modem/dongle instantly so you can use it with any service provider SIM card. It supports all the major modems and also gives you the ability to upgrade the firmware and dashboard software of your dongle too.

Changing ANY user password without having to know the existing password

1 Comment

This tweak gives a user the opportunity to use it for good or bad. It enables the user to re-password any account
without having to know the existing password and also shows you every account that exists on the machine
(even the ones that are hidden). This is a good tool to use if you forgot a password to say your administrator account
and you needed to be logged into the admin account for any reason.

To view all of the user accounts:

1) While logged onto the computer, click on Start>Run>and type in CMD.
2) From the command prompt window, type in net users. This will show you every account that is made onto the computer

whether it is hidden or not.
To change an account password:

1) While logged onto the computer to an account that has administrative rights, click on Start>Run>and type in CMD.
2) Type in net user then the name of the account then * and press enter. heres an example: net user administrator * or
net user “Joe Smith” * . Put the name in quotes if it contains spaces.

3) From there it should ask for a new password. Type in your new password (type very carefully – the command window won’t
display what you type) and once more to confirm it. If you get the message that the command succeeded successfully you’re all set!!

Tuesday 4 September 2012

What is Web Crawler?

Be The First To Comment
What is a web crawler? Web crawlers are software designed to scan web sites open to everyone on the internet to find accessible e-mail addresses. Spammers use this to target and send unsolicited e-mails.
A Web crawler is a computer program that browses the World Wide Web in a methodical, automated manner or in an orderly fashion.
Other terms for Web crawlers are ants, automatic indexers, bots,Web spiders,Web robots, or—especially in the FOAF community—Web scutters.This process is called Web crawling or spidering. Many sites, in particular search engines, use spidering as a means of providing up-to-date data. Web crawlers are mainly used to create a copy of all the visited pages for later processing by a search engine that will index the downloaded pages to provide fast searches. Crawlers can also be used for automating maintenance tasks on a Web site, such as checking links or validating HTML code. Also, crawlers can be used to gather specific types of information from Web pages, such as harvesting e-mail addresses (usually for sending spam).
A Web crawler is one type of bot, or software agent. In general, it starts with a list of URLs to visit, called the seeds. As the crawler visits these URLs, it identifies all the hyperlinks in the page and adds them to the list of URLs to visit, called the crawl frontier. URLs from the frontier are recursively visited according to a set of policies.
The large volume implies that the crawler can only download a limited number of the Web pages within a given time, so it needs to prioritize its downloads. The high rate of change implies that the pages might have already been updated or even deleted.
The number of possible crawlable URLs being generated by server-side software has also made it difficult for web crawlers to avoid retrieving duplicate content. Endless combinations of HTTP GET (URL-based) parameters exist, of which only a small selection will actually return unique content. For example, a simple online photo gallery may offer three options to users, as specified through HTTP GET parameters in the URL. If there exist four ways to sort images, three choices of thumbnail size, two file formats, and an option to disable user-provided content, then the same set of content can be accessed with 48 different URLs, all of which may be linked on the site. This mathematical combination creates a problem for crawlers, as they must sort through endless combinations of relatively minor scripted changes in order to retrieve unique content.

Saturday 16 June 2012

How To Check Mobile Balance of Your Friends

Be The First To Comment
How To Check Mobile Balance of Your Friends.

With this Tips you can check the mobile balance of your Friends in Airtel, Docomo, Idea and Bsnl.

Just Dial below Given Number forChecking you Friends Balance :

Airtel – 09810198101

Docomo – 09040012345 or 07737012345

Idea – 09824012345

Bsnl – 9415100123 (only for up).

After Dialing Select language > Already Operator user > Enter Your Friends Number .
Done !

If in Airtel it will ask for Pin then use 1234 as Pin Number .

Docomo Number is Toll Free but in other numbers Charges are apply as Std Call Rates .
This Trick is tested many times and 100 % Working .

Sunday 10 June 2012

How to Change Windows 7 Password without Knowing Current Password

Be The First To Comment
There are various methods to bypass windows 7 password protection.In case you forgot windows passsword,you can reset it using windows 7 Dvd or OfflineNT Password and Registry Editor.However if you have access to any windows account then you can change the password without knowing current password.



How to Change Window 7 Password without Knowing Current Password:

Method 1:



Go to Control Panel and click on the Administrative Tools.

Under this section double click on Computer Management.

Select System Tools from right window pane.





Under this, just double click on Local Users and Groups and then on Users

Now you will see all the login accounts of your computer. Right click on any the account whose password you want to change and then click on Set Password.





A warning message will popup on your screen just click on Proceed button.





Now enter your New Password and click on OK button.








That’s it! your windows 7 password is changed without knowing current password. The only limitation of this method is that your current account should have Administrative privileges.



Method 2:



If you love to be work on Command Line then this method is for you.



Open command prompt by typing with administrative privileges .( Type CMD in start, right click on it and select Run as Administrative )





In the CMD window type the following command and hit Enter

net user Account Name Your New Password



In this command replace Account Name by the account name (Account Name is case sensitive) whose password you want to change and replace Your New Password by the password that you want to set.







Now if everything goes alright you will see “The command completed successfully” on your screen, now type exit command and hit Enter

This will reset your current windows password.

USB Memory Watch

Be The First To Comment
A concept LED time piece with integrated USB flash memory for data storage. Just take the watch off and connect to the USB key on the end of the strap to the USB port on your computer to upload or download your data. Perfect for keeping your data in a secure place.




The watch has a rubber wrist band and stainless steel case and the interface features rings of LEDs to display the time; hours on the outside, groups of five minutes in the upper circle, four single minutes in the lower circle. The remaining ring indicates the used/remaining storage capacity on the flash memory. The design is also rechargeable via USB.




LOK-IT Secure Flash Drive

Be The First To Comment

After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based hardware authentication. Later that year, at the FOSE 2011, LOK-IT was proclaimed to be the most innovative product at the show.

LOK-IT comes in two versions - SDG005M and SDG003FM. From my understanding, these two are practically the same, except for the latter (FM) holding a FIPS 140-2 Level 3 certification. From the storage space perspective, LOK-IT currently comes in three sizes - 4GB, 8GB and 16 GB.

When the device is used for the first time, the PIN code must be set up. Inside the packaging you'll get a small cheat sheet that enumerates and explains the appropriate steps required to do so. A strong PIN policy is enforced - the user must setup a code consisting of at least seven digits (the maximum is 15), with repeating and consecutive numbers not allowed.

To authenticate to the device, you'll first need to hit the key button on the bottom of the keyboard. Green and red flashlights (in other cases used for identifying a locked or unlocked device) will blink, you enter the PIN, re-hit the key button and the device can be plugged into the computer as a normal flash drive.

From that moment on, every time you type in your code, you'll have about 15-20 seconds to plug the device in. If you fail to do that, it will automatically lock itself. The same thing happens when you unplug LOK-IT from the computer.

The device itself has an integrated 3.7 V polymer battery which makes the authentication process much smoother - by incorporating the rechargeable battery in the casing, we can first enter the PIN and afterwards connect the device to the USB port. Without the battery, it would be a bit unpractical to key in the codes when the device is already connected to your computer.

As the authentication process is executed on the device, LOK-IT is completely platform-independent, so you can use it on different computer systems, as well as other devices such as printers, Blu-ray players, etc.

LOK-IT employs 256-bit AES encryption, which is handled within the internal hardware-based encryption controller. As the authentication is done physically on the device, it is immune to keyloggers. The device is IP57 rated, which means it features limited dust ingress protection and it's waterproof to a certain degree.

Overall, LOK-IT is a fast and secure flash drive that stands out from the competition because of its hardware authentication feature.

Thursday 7 June 2012

What to Do When Your Email Account is Hacked?

Be The First To Comment
How to Recover Hacked Email Accounts?


It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link

Gmail Password Reset Link

If you cannot find success from the Step-1 then proceed to Step-2.


Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like

1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…

You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

Account Recovery Form

For Yahoo and Hotmail:


Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.

To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

I hope this post will help you recover the lost account.

What are Private and Public IP Addresses

Be The First To Comment
Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.


What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

You can check your public IP address by visiting www.whatismyip.com

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)


Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).

Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.

If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.

You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.

Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transparency.

How to Create a CON folder in Windows?

Be The First To Comment

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

The answer is NO and YES!

NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.

What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.


YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.


1. Go to command prompt

2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con

NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.


3. To delete the folder use the following command

C:\>rd \\.\e:\con

NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.

Saturday 2 June 2012

What is CAPTCHA and How it Works?

Be The First To Comment
CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.


Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.

Designing a CAPTCHA System



CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.

Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.

Wednesday 30 May 2012

Why Facebook Bought Instagram?

Be The First To Comment
With the recent purchase of Instagram by social media giant Facebook, speculation is at an all time high. The question on everyone’s mind is why Facebook would spend $1 billion to acquire the photo-sharing application Instagram. One of the more obvious answers to that question is the massive following Instagram has.

Instagram has a following of over 30 million users and, with the recent move to the Android market, the number is still rising. However, members are not something Facebook would ever need. With a fan-base of over 850 million users worldwide, the social media mogul may be looking at a way to monetize the increased user base.


With Instagram’s recent move to the Android market, the mobile segment Instagram is sure to gain is likely one of the largest reasons for Facebook’s acquisition. Although Facebook has a mobile application and many mobile users, most feel it is lacking compared to the desktop variant. Facebook’s main concern with mobile users may be they simply do not know how to make money off of them. With no ads in the mobile version and more users checking their accounts on their mobile devices instead of a laptop or computer, revenue is lost.



The following quote is proof of their revenue generation through the mobile platform:-

“Although the substantial majority of our mobile users also access and engage with Facebook on personal computers where we display advertising, our users could decide to increasingly access our products primarily through mobile devices. We do not currently directly generate any meaningful revenue from the use of Facebook mobile products, and our ability to do so successfully is unproven.”

This will leave many with one question in their mind. Why purchase a mobile app that does not currently make money for their user base? With no ads in their application and no other means of revenue, Instagram has a very large user base to support with minimal resources. Instagram has state their goal has always been to build a large user base and then begin serving them ads. Even still, $1 billion dollars is a lot of money to make up for.

Instagram As Competition To Facebook

Instagram CEO Systrom made a statement that they wished to “help every user on the earth share their lives and discover the world through a series of beautiful images.” If Facebook felt Instagram could pull it off, they very well could feel their model would be threatened by it.

The biggest issue seen here is that Instagram only offers it’s users the ability to take a photo, use one of many filters built in to the application to alter it, and then post it for their friends and family to view. That would hardly seem to be a threat to Facebook given it is only a photo sharing application. There are already many filtering applications available to mobile users and Instagram would be just another sharing network to sign up for.


Is Facebook After Data?

The strongest arguement for Facebook’s aquisition would be the bottom line, data. With Instagram users having uploaded over 100 million photos which are geo-tagged and personal, Facebook could be looking to use this data to further their ad targeting. Facebook already has a massive amount of personal data on most of it’s users and there are 100 million photos uploaded to the social site every day. The tagging of these photos also include business locations and other people who also have their information on the site. With this massive amount of user data, Facebook could be making strides to further their ad targeting.


Keeping Instagram Away From Competition

The aquisition of Instagram could also have simply served as a means to keep it away from Google and Twitter, two of Facebook’s largest competitors. This also brings Instagram’s engineering team to Facebook. The addition of these key members could be what is needed to vastly improve on their mobile application and realize true gains through a restructuring of both their mobile and web interface. One thing is for certain, Facebook is deeply rooted and will do what they must to stay in the game.

Tuesday 29 May 2012

Smart Phone by Facebook

Be The First To Comment

After the recent Facebook IPO at Nasdaq, so many news are coming up from Facebook. Lately we heard about the Facebook browser, that Facebook is going to buy Opera! & now yesterday, BITS reported that Facebook is going to launch a smart phone by the next year.

In 2010, Facebook had already given a try to build a smart phone but due to several complexities, it then gave up the plan. Hugo Fiennes, a hardware manager from Apple who has started his own company said that, “Building isn’t something you can just jump into, you change the smallest thing on a smart phone and you can completely change how all the antennas work. You don’t learn this unless you’ve been doing it for a while.” Fiennes who was with Apple till the launch of 1st 4 iPhones further said that, “Going into the phone business is incredibly complex.”


Zuckerberg has already hired several software and hardware engineers of Apple who have worked on iPhone & iPad. But building a smart phone is indeed a work of complexity. The giants like Hewlett Packard & Dell have also struggled a lot in building smart phone but they dint succeed.

BIT has added in its report that “One engineer who formerly worked at Apple and worked on the iPhone said he had met with Mark Zuckerberg, Facebook’s chief executive, who then peppered him with questions about the inner workings of smart phones. It did not sound like idle intellectual curiosity, the engineer said; Mr. Zuckerberg asked about intricate details, including the types of chips used, he said. Another former Apple hardware engineer was recruited by a Facebook executive and was told about the company’s hardware explorations.” Asking such questions doesn’t seem to be the qualities of a market leader!

Facebook hasn’t confirmed or denied about its project to build a smart phone but a statement was been pointed which said that, “We’re working across the entire mobile industry; with operators, hardware manufacturers, OS providers, and application developers.”

One of the Facebook employees stated that, “Mark is worried that if he doesn’t create a mobile phone in the near future that Facebook will simply become an app on other mobile platforms.”


For all the above points, I feel that Facebook is currently having billions of dollars with itself, which it can invest in any revenue generating project. But Facebook should consider that its earnings per share don’t fall down. The share price of Facebook has already fallen down at Nasdaq. On Friday, the share was closed at $31.91 (the IPO price being $38).

I just hope that Facebook is not just blindly trying to capture Google’s market. Yesterday we heard that Facebook is going to buy Opera which would lead to fall in market share of Google Chrome. Now that Google has acquired Motorola ($12.5 billion), we are hearing the news that Facebook is going to build a smart phone! Zuckerberg shouldn’t make plans just to gain more leverage from its competitors.


Facebook Browser

Be The First To Comment
Browser war is going on. The companies are coming up with new browsers & trying to compete with the old ones in the market. Recently, Yahoo launched its own browser, Yahoo Axis, to compete with the giants like Google Chrome, Mozilla Firefox, Internet Explorer, Opera, Safari etc…

After considering this competitive market, the social network giant, Facebook, is been heard of coming up with a browser which will help you to stay updated with your social life, with the help of inbuilt plug-ins and features.

Recently Facebook bought Instagram for $1 billion & yesterday Pocket-lint reported that according to its trusted sources, the social network giant is going to either buy Opera browser which has around 200 million users across the globe. But Facebook hasn’t yet commented anything on this, so this may be a rumor too.



After the Facebook IPO (Initial Public Offering) at Nasdaq, which has brought them billions of dollars, Facebook will surely be having excess cash which it needs to invest & earn out of it, so as to meet the expectations of it shareholders. Thus it could be quite possible that Facebook could take over Opera. Zuckerberg will surely consider the potential growth of Opera browser, especially in the mobile world.

If Facebook won’t buy Opera, then I personally feel that there would be some other big new that would come from Facebook. The simple reason behind this statement is for considering the idle cash with it, which would make no good if not invested!

So do you think after hearing this news, will Google take any step to preserve its market share of Google Chrome..?? Will 900 million users on Facebook cause harm to other browsers, if Facebook would buy Opera..?? Will Facebook be benefited if it takes this step..??

Monday 28 May 2012

HOW TO MAKE KEYBOARD LIGHTS DANCING

Be The First To Comment

As we know keyboards having 3 LEDs
1. NUM LOCK
2.KAPS LOCK
3.SCROLL LOCK
Here is a trick to use the lights of your keyboard in a more creative manner in Windows.
This trick uses a simple Visual basic script which when
activated makes your scroll lock, caps lock and num locks LED's flash in a cool rhythmic way which gives the perception of a live disco on your keyboard.

MAKE THE DISCO WITH 3 SIMPLE STEPS

Open Notepad Paste The below Code

  Set WEBCHILLER =wscript.CreateObject("WScript.Shell")
do
wscript.sleep 100
 WEBCHILLER.sendkeys "{CAPSLOCK}"
 WEBCHILLER.sendkeys "{NUMLOCK}"
 WEBCHILLER.sendkeys "{SCROLLLOCK}"
loop

Save file as dance.vbs or *.vbs
Double click on the Saved file to see the magic


How to stop the disco
1. Open task manager(cntrl+Shift+Esc)
2.process Tab
3.select wscript.exe
4. End Process

Wednesday 16 May 2012

Run Firefox inside Firefox

Be The First To Comment
Run Firefox inside Firefox

How to run Firefox inside Firefox.?

Yes you can run Firefox inside firefox just by typing following url.

How about Opening Firefox inside Firefox which is again in another Firefox..?

Not bad huh?
And its really easy too just type in this url in Firefox's address bar and there you go!
Firefox inside Firefox!

copy paste following url in a web browser (mozilla firefox).

chrome://browser/content/browser.xul

Increase Virtual RAM - To Make Your System Faster 100 percent works

Be The First To Comment
Follow the steps given below :-


1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.
Another way is Right-Clicking 'My Computer' and then Select 'Properties'.

2) Click on the 'Advanced' tab.

3) Under 'Performance', click 'Settings'.

4) Then click the 'Advanced' tab on the button that pops up.

5) Under 'Virtual Memory' at the bottom, click 'Change'.

6) Click the 'Custom Size' button.

7) For the initial size (depending on your HD space), type in anywhere from 1000-1500 (although I use 4000), and for the Maximum size type in anywhere from 2000-2500 (although I use 6000).

8) Click 'Set', and then exit out of all of the windows.

9) Finally, Restart your computer.

10) You now have a faster computer and 1-2GB of Virtual RAM..!

Google Hacking

Be The First To Comment
Google Hacking :-

Basic Operators:-
1) And (+) :- This operator is used to include multiple terms in a query which is to be searched in google.
example:- if we type "hacker+yahoo+science" in google search box and click search, it will reveal the results something which are related to all the three words simultaneously i.e. hacker, yahoo and science.

2 ) OR (|) :- The OR operator, represented by symbol( | ) or simply the word OR in uppercase letters, instructs google to locate either one term or another term in a query.

3) NOT :- It is opposite of AND operator, a NOT operator excludes a word from search.
example:- If we want to search websites containing the terms google and hacking but not security then we enter the query like "google+hacking" NOT "security".


Advanced Operators:-
1) Intitle :- This operator searches within the title tags.
examples:- intitle:hacking returns all pages that have the string "hacking" in their title.
intitle:"index of" returns all pages that have string "index of" in their title.
Companion operator:- "allintitle".

2) Inurl :- Returns all matches, where url of the pages contains given word.
example:- inurl:admin returns all matches, where url of searched pages must contains the word "admin".
Companion operator:- "allinurl".

3) Site :- This operator narrows search to specific website. It will search results only from given domain. Can be used to carry out information gathering on specific domain.
example:- site:www.microsoft.com will find results only from the domain www.microsoft.com

4) Link :- This operator allows you to search for pages that links to given website.
example:- link:www.microsoft.com
Here, each of the searched result contains asp links to www.microsoft.com

5) Info :- This operator shows summary information for a site and provides links to other google searches that might pertain to that site.
example:- info:www.yahoo.com

6) Define :- This operator shows definition for any term.
example:- define:security
It gives various definitions for the word "security" in different manner from all over the world.

7) Filetype :- This operator allows us to search specific files on the internet. The supported file types can be pdf, xls, ppt, doc, txt, asp, swf, rtf, etc..
example:- If you want to search for all text documents presented on domain www.microsoft.com then we enter the query something like following.
"inurl:www.microsoft.com filetype:txt"

Tuesday 15 May 2012

Nokia Mobile Secrate Code

Be The First To Comment
On the main screen on your Nokia Made mobile phone type in:
  • *#06# for checking the IMEI (International Mobile Equipment Identity).
  • *#7780# reset to factory settings.
  • *#67705646# This will clear the LCD display(operator logo).
  • *#0000# To view software version.
  • *#2820# To show Bluetooth device address.
  • *#746025625# Sim clock allowed status.
  • #pw+1234567890+1# Shows if sim have restrictions.
  • *#92702689# takes you to a secret menu where you may find some of the information below
                            1. Displays Serial Number.
                            2. Displays the Month and Year of Manufacture
                            3. Displays (if there) the date where the phone was purchased (MMYY)
                            4. Displays the date of the last repair – if found (0000)
                            5. Shows life timer of phone (time passes since last start)
  • *#3370# Enhanced Full Rate Codec (EFR) activation. Increase signal strength, better signal reception. It also help if u want to use GPRS and the service is not responding or too slow. Phone battery will drain faster though.
  • *#3370* (EFR) deactivation. Phone will automatically restart. Increase battery life by 30% because phone receives less signal from network.
  • *#4720# Half Rate Codec activation.
  • *#4720* Half Rate Codec deactivation. The phone will automatically restart
If you forgot wallet code for Nokia S60 phone, use this code reset:*#7370925538#
Note, your data in the wallet will be erased. Phone will ask you the lock code. Default lock code is: 12345
Press *#3925538# to delete the contents and code of wallet.
Unlock service provider: Insert sim, turn phone on and press vol up(arrow keys) for 3 seconds, should say pin code. Press C,then press * message should flash, press * again and 04*pin*pin*pin# \
  • *#7328748263373738# resets security code.
Default security code is 12345
 

© 2011 Web Chiller - Designed by Surender and Ramesh | ToS | Privacy Policy | Sitemap

About Us | Contact Us | Write For Us