Saturday 16 June 2012

How To Check Mobile Balance of Your Friends

Be The First To Comment
How To Check Mobile Balance of Your Friends.

With this Tips you can check the mobile balance of your Friends in Airtel, Docomo, Idea and Bsnl.

Just Dial below Given Number forChecking you Friends Balance :

Airtel – 09810198101

Docomo – 09040012345 or 07737012345

Idea – 09824012345

Bsnl – 9415100123 (only for up).

After Dialing Select language > Already Operator user > Enter Your Friends Number .
Done !

If in Airtel it will ask for Pin then use 1234 as Pin Number .

Docomo Number is Toll Free but in other numbers Charges are apply as Std Call Rates .
This Trick is tested many times and 100 % Working .

Sunday 10 June 2012

How to Change Windows 7 Password without Knowing Current Password

Be The First To Comment
There are various methods to bypass windows 7 password protection.In case you forgot windows passsword,you can reset it using windows 7 Dvd or OfflineNT Password and Registry Editor.However if you have access to any windows account then you can change the password without knowing current password.



How to Change Window 7 Password without Knowing Current Password:

Method 1:



Go to Control Panel and click on the Administrative Tools.

Under this section double click on Computer Management.

Select System Tools from right window pane.





Under this, just double click on Local Users and Groups and then on Users

Now you will see all the login accounts of your computer. Right click on any the account whose password you want to change and then click on Set Password.





A warning message will popup on your screen just click on Proceed button.





Now enter your New Password and click on OK button.








That’s it! your windows 7 password is changed without knowing current password. The only limitation of this method is that your current account should have Administrative privileges.



Method 2:



If you love to be work on Command Line then this method is for you.



Open command prompt by typing with administrative privileges .( Type CMD in start, right click on it and select Run as Administrative )





In the CMD window type the following command and hit Enter

net user Account Name Your New Password



In this command replace Account Name by the account name (Account Name is case sensitive) whose password you want to change and replace Your New Password by the password that you want to set.







Now if everything goes alright you will see “The command completed successfully” on your screen, now type exit command and hit Enter

This will reset your current windows password.

USB Memory Watch

Be The First To Comment
A concept LED time piece with integrated USB flash memory for data storage. Just take the watch off and connect to the USB key on the end of the strap to the USB port on your computer to upload or download your data. Perfect for keeping your data in a secure place.




The watch has a rubber wrist band and stainless steel case and the interface features rings of LEDs to display the time; hours on the outside, groups of five minutes in the upper circle, four single minutes in the lower circle. The remaining ring indicates the used/remaining storage capacity on the flash memory. The design is also rechargeable via USB.




LOK-IT Secure Flash Drive

Be The First To Comment

After a couple of years of research and development, LOK-IT was announced at the RSA Conference 2011 in San Francisco. The product boasted a unique concept of PIN-based hardware authentication. Later that year, at the FOSE 2011, LOK-IT was proclaimed to be the most innovative product at the show.

LOK-IT comes in two versions - SDG005M and SDG003FM. From my understanding, these two are practically the same, except for the latter (FM) holding a FIPS 140-2 Level 3 certification. From the storage space perspective, LOK-IT currently comes in three sizes - 4GB, 8GB and 16 GB.

When the device is used for the first time, the PIN code must be set up. Inside the packaging you'll get a small cheat sheet that enumerates and explains the appropriate steps required to do so. A strong PIN policy is enforced - the user must setup a code consisting of at least seven digits (the maximum is 15), with repeating and consecutive numbers not allowed.

To authenticate to the device, you'll first need to hit the key button on the bottom of the keyboard. Green and red flashlights (in other cases used for identifying a locked or unlocked device) will blink, you enter the PIN, re-hit the key button and the device can be plugged into the computer as a normal flash drive.

From that moment on, every time you type in your code, you'll have about 15-20 seconds to plug the device in. If you fail to do that, it will automatically lock itself. The same thing happens when you unplug LOK-IT from the computer.

The device itself has an integrated 3.7 V polymer battery which makes the authentication process much smoother - by incorporating the rechargeable battery in the casing, we can first enter the PIN and afterwards connect the device to the USB port. Without the battery, it would be a bit unpractical to key in the codes when the device is already connected to your computer.

As the authentication process is executed on the device, LOK-IT is completely platform-independent, so you can use it on different computer systems, as well as other devices such as printers, Blu-ray players, etc.

LOK-IT employs 256-bit AES encryption, which is handled within the internal hardware-based encryption controller. As the authentication is done physically on the device, it is immune to keyloggers. The device is IP57 rated, which means it features limited dust ingress protection and it's waterproof to a certain degree.

Overall, LOK-IT is a fast and secure flash drive that stands out from the competition because of its hardware authentication feature.

Thursday 7 June 2012

What to Do When Your Email Account is Hacked?

Be The First To Comment
How to Recover Hacked Email Accounts?


It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.

Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link

Gmail Password Reset Link

If you cannot find success from the Step-1 then proceed to Step-2.


Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like

1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…

You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

Account Recovery Form

For Yahoo and Hotmail:


Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option.

To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

I hope this post will help you recover the lost account.

What are Private and Public IP Addresses

Be The First To Comment
Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.


What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.

You can check your public IP address by visiting www.whatismyip.com

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks):

10.0.0.0 – 10.255.255.255 (Total Addresses: 16,777,216)
172.16.0.0 – 172.31.255.255 (Total Addresses: 1,048,576)
192.168.0.0 – 192.168.255.255 (Total Addresses: 65,536)


Private IP addresses are used for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from 192.168.1.1 to 192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).

Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.

If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.

You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be 192.168.1.1 or 192.168.1.2. Unlike the public IP, private IP addresses are always static in nature.

Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transparency.

How to Create a CON folder in Windows?

Be The First To Comment

Can you create a folder named “con”, “prn”, “nul” “com1″ “com2″ “lpt1″ etc. in windows ?

The answer is NO and YES!

NO because when create a new folder and try to rename it to any one of the above specified names, you know what happens! In Windows XP the folder name automatically changes back to “New Folder” no matter you try any number of times. Where as in Windows Vista/7 when you try to rename the file you get an error message “The specified device name is invalid”.

What is the reason for this? Simple, these names represent the internal devices and hence we cannot create folders with the above names.


YES because it is still possible to create these folders using the command prompt. Here’s the instructions to create it.


1. Go to command prompt

2. Type in prompt (FOR EG. TO CREATE CON FOLDER IN E: DRIVE)

C:\>md \\.\e:\con

NOTE: “con” can be replaced by any other names such as “prn”, “nul” “com1″ “com2″ “lpt1″ etc.


3. To delete the folder use the following command

C:\>rd \\.\e:\con

NOTE: The folder can only be deleted from the command prompt.You cannot remove it by right-click delete.

Saturday 2 June 2012

What is CAPTCHA and How it Works?

Be The First To Comment
CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.


Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.

Designing a CAPTCHA System



CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.

Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer.

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.
 

© 2011 Web Chiller - Designed by Surender and Ramesh | ToS | Privacy Policy | Sitemap

About Us | Contact Us | Write For Us