Wednesday, September 15, 2010

How to hack facebook password



hack facebook password

Learn to hack facebook passwords!

Are you curious to "hack facebook password" well then this post is just for you,Most people ask me to tell us the easiest way to hack facebook password, so here are some ways to hack facebook password:

1.Facebook phishing
2.Keylogging
3.Facebook new features
4.virus
See my article on 4 ways on how to hack a facebook password for information on the above methods
But today we will focus on a method which has a high success rate celled Phishing and keylogging,so first of all:


What is phishing?

Phishing is the most commonly used method to hack Facebook. The most widely used technique in phishing is the use of Fake Login Pages, also known as spoofed pages. These fake login pages resemble the original login pages of sites likeYahoo , Gmail, MySpace etc. The victim is fooled to believe the fake facebook page to be the real one and enter his/her password. But once the user attempts to login through these pages, his/her facebook login details are stolen away. Howeverphishing requires specialized knowledge and high level skills to implement. So I recommend the use of Phishing to hack facebook account since it is the easiest one.

Phishing Procedure:

First of all download Facebook fake login page
(Complete the survey to unlock Facebook fake login page)


1.once you have downloded facebook fake login page now extract contents in a folder

2.Now open pass.php and find (CTRL+F) 'http://rafayhackingarticles.blogspot.com' then change it to your to is the 'http://www.google.com.pk'

Note:'http://www.google.com' is the redirection url,When victim will enter his/her email and password he will redirected to'http://www.google.com' instead of "http://rafayhackingarticles.blogspot.com"

Now Save it .

3.Now open facebook fake page in a wordpad

4.Now in the fake page press Ctrl+F and search for the term "action=" now change its value to pass.php i.e. action=pass.php

Hack facebook

5.Create an id in www.110mb.com,www.ripway.com or t35.com.

Note:Lots of people have complaint that they get banned from 110mb.com.ripway.com and t35.com so as an alternative you can use ooowebhost.

6.Then upload all the files Facebook.htm,Pass.php in 110mb directory or an other and just test it by going to http://yoursite.110mb.com/Facebook.htm for the fake login page.Just type some info into the text box and then you will see in your file manager that a file called "Facebook.txt" is created, In which the password is stored

7.Go to http://yoursite.110mb.com/Facebookpassword.htm for the stored passwords !

How it works?

When a user types a Username Password in the the text box,The info is sent to "login.php" which acts as a password logger and redirects the page to "LoginFrame2.htm" which shows "There has been a temporary error Please Try Again" in it .So when the person clicks on try again it redirects to the actual URL so that the victim does not know that yoursite is a fake site and gets hisFacebook.com password hacked

Keylogging - Easy way:


The easiest way and best way to hack Facebook is by using a keylogger(Spy Software). It doesn’t matter whether or not you have physical access to the target computer. To use a keylogger it doesn’t need any technicalknowledge. Anyone with a basic knowledge of computers can use keyloggers,below i will show you on How to hack facebook passwords with winspy and sniperspy

1. Sniper Spy (Remote Install Supported)



Remote password hacking softwareSniperSpy is the industry leading Remote password hacking software combined with the Remote Install and Remote Viewing feature.
Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s! This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!
Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest, SniperSpy allows you to remotely spy any PC like a television! Watch what happens on the screen LIVE! The only remote PCspy software with a SECURE control panel!
This Remote PC Spy software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands.

Click here to read the review of sniperspy


2.Winspy Keylogger

First of all free download Winspy keylogger software from link given below:

Download Winspy Keylogger

2. After downloading winspy keylogger to hack Facebook account password, run the application. On running, a dialog box will be prompted. Now, create an user-id and password on first run and hit apply password. Remember this password as it is required each time you start Winspy and even while uninstalling.

3. Now, another box will come, explaining you the hot keys(Ctrl + Shift + F12) to start the Winspy keylogger software.
Winspy keylogger to hack gmail account password

4. Now, on pressing hot keys, a login box will come asking userid and password. Enter them and click OK.



Winspy keylogger to hack gmail passwsord

5. Now, Winspy’s main screen will be displayed as shown in image below:




6. Select Remote at top, then Remote install.

7. On doing this, you will get a popup box as shown in image. Now, fill in the following information in this box.


hack gmail password


.user - type in the victim’s name
.file name - Name the file to be sent. Use the name such that victim will love to accept it.
.file icon - keep it the same
.picture - select the picture you want to apply to the keylogger.
In the textfield of “Email keylog to”, enter your email address. Hotmail accounts do not accept keylog files, so use another emailaccount id,my sugession is using a Gmail id
Thats it. This much is enough. If you want, can change other settings also.

8. After you have completed changing settings, click on “Create Remote file”. Now just add your picture to a winrar archive. Now, what you have to do is only send this keylog file to your victim. When victim will open this file, all keystrokes typed by victim will be sent to your email inbox. Thus, you will get all his passwords and thus will be able to hack his email accounts and even Facebook account password.

See more about best keyloggers availible:
Which spyware keylogger software to choose

Subscribe to our blog and get Facebook Hacking updates,To subscribe click on the button below,dont forgot to click the activation link in your email box

Thursday, September 9, 2010

How to promote your blog - tips


Team Blogger highlighted their help page listing their accumulated wisdom on things to do to promote and publicize your blog, and how to add your blog feed to your Facebook profile.

The tips are small but perfectly formed, and many are quite general and don’t just apply to Blogger blogs – so go check ‘em out!

(I confess to violating some of their “rules” – my posts are often too long, and these days I rarely have time to reply to comments on this blog let alone comment on others’!)

If this topic interests you, you may also be interested in "Six Sayings for SEO Success".

2. Draft posts published with the correct date, at last!

One of the biggest flaws with Blogger: if you create a draft post on day 1, then tinker with it a bit over the next few days, and finally publish it on day 8 – the post will actually bear the date of day 1, i.e. the date you first created the draft post; not day 8, the date you published it, which is the date it should really bear.

That’s why I and many others resorted to Greasemonkey scripts like Keep Current Date and Time which Jasper produced and Aditya updated (and Kirk has tweaked!).

The good news? Team Blogger have finally fixed this niggle, with what they call “automatic date and time”.

However, it only works in Blogger in Draft at the moment. (How to use Blogger in Draft.)

It’s hidden there under Post Options (that’s another of my Blogger bugbears, that Post Options is no longer permanently open – in my view it should be):

Click the Post Options link to expand it and you’ll see the new feature on the right, “Automatic” is ticked by default which is fine (Blogger Scheduled posts most already know about):

In order to use this feature, these are the steps:

  1. Disable Keep Current Time if you have it (Tools, Greasemonkey, Manage User Scripts, leftclick once on “Blogger Keep Current Date” to select it, UNtick “Enabled” in the bottom left hand corner, then click Close). You won’t need it if you use Blogger in Draft, and keeping it stops the new Blogger in Draft feature working

  2. Login via Blogger in Draft (instead of via the usual Blogger site).

  3. Create your post there in the usual way.

  4. If you do any intermediate edits of your post, the best way is to do it by logging in via Blogger in Draft – not “non-draft” Blogger.

    (Note: If you login to non-draft Blogger and edit the post there while Keep Current Time is enabled, the interaction between the two seems to mess things up and then when you try to publish it, even from within Blogger in Draft, it may revert to just showing the date of creation. You have been warned! That’s why step 1 is to disable KCT. If you temporarily disable it before opening the post for editing, then save and leave the Edit post page, then re-enable KCT again, it may be OK – but the safest course is just to disable it altogether. Of course when this feature is rolled out you can permanently get rid of KCT so this will no longer be an issue.)

  5. When you’re ready to publish the post, again do not login to Blogger, make sure you sign in via Blogger in Draft, then publish it from there. Otherwise, it won’t work – the post will still bear the date of its original creation, not the date of publication.

Monday, September 6, 2010

EARN MONEY FROM YOUR WEBSITE
Turn your valuable webpage traffic into money. Join our affiliate program. We offer the most commission rate to help increase your revenue stream.

Join our revenue making program absolutely no charge and 100% risk free.
Sign up



Get paid after you not working
Set up multiple new profit incomes each and every hour. Get revenue after you not working or even retire at an young age with a broad money stream. Do this once and get cash over and over again. This is best time to create amazing new levels of cash and success on the Internet.


MONEY WHILE YOU SLEEP
Earn $1,000... $2,000... $5,000...
Turn your blog visitors into cash!
You get paid for every visitor that clicks on our banner. Our wish is to enable you to receive as much as possible from your webpage. We pay monthly, either by bank cheque, or using PayPal.



Start collecting steady partner income
Our system really can make you money on the same day. Begin receiving serious partner income with almost no investments at all. This is a profitable business
opportunity, the chance for you to create a steady, reliable, long-time profitable business.

Saturday, September 4, 2010

ABOUT AUSTRALIA VISA

If you want to start a new life in another country,
If you are not eligible for an American Green Card,
If you are looking for the easiest and fastest way to
relocate to an English-speaking country -

Australia is the perfect solution for you!

can help you in the process of
applying for an Australian Visa
with the assistance of a
professional migration consultant
from an experienced migration
law firm. If you receive a visa
through the skilled migration
program you and your family will
be authorized to live and work
permanently in Australia!
https://www.ausfis.org/RegisterApplicantInfo.aspx
Australia is a prosperous, multicultural country with an excellent health care, life expectancy, quality of life, human development, public education, economic freedom, and protection of civil liberties and political rights.
Now, with the intentions of boosting the Australian economy, the Australian government has opened 108,000 job positions, for young, English speaking professionals who have skills in particular occupations needed in Australia.
Australian Immigration Online Application Services is a private entity and is not a governmental agency and is owned and operated by ausfis.org.

Monday, August 30, 2010

5 Ways To Improve Adsense Earnings




If webmasters want to monetize their websites, the great way to do it is through Adsense. There are lots of webmasters struggling hard to earn some good money a day through their sites. But then some of the “geniuses” of them are enjoying hundreds of dollars a day from Adsense ads on their websites. What makes these webmasters different from the other kind is that they are different and they think out of the box.

The ones who have been there and done it have quite some useful tips to help those who would want to venture into this field. Some of these tips have boosted quite a lot of earnings in the past and is continuously doing so.

Here are some 5 proven ways on how best to improve your Adsense earnings.

1. Concentrating on one format of Adsense ad. The one format that worked well for the majority is the Large Rectangle (336X280). This same format have the tendency to result in higher CTR, or the click-through rates. Why choose this format out of the many you can use? Basically because the ads will look like normal web links, and people, being used to clicking on them, click these types of links. They may or may not know they are clicking on your Adsense but as long as there are clicks, then it will all be for your advantage.

2. Create a custom palette for your ads. Choose a color that will go well with the background of your site. If your site has a white background, try to use white as the color of your ad border and background. The idea to patterning the colors is to make the Adsense look like it is part of the web pages. Again, This will result to more clicks from people visiting your site.

3. Remove the Adsense from the bottom pages of your site and put them at the top. Do not try to hide your Adsense. Put them in the place where people can see them quickly. You will be amazed how the difference between Adsense locations can make when you see your earnings.

4. Maintain links to relevant websites. If you think some sites are better off than the others, put your ads there and try to maintaining and managing them. If there is already lots of Adsense put into that certain site, put yours on top of all of them. That way visitor will see your ads first upon browsing into that site.

5. Try to automate the insertion of your Adsense code into the webpages using SSI (or server side included). Ask your web administrator if your server supports SSI or not. How do you do it? Just save your Adsense code in a text file, save it as “adsense text”, and upload it to the root directory of the web server. Then using SSI, call the code on other pages. This tip is a time saver especially for those who are using automatic page generators to generate pages on their website.

These are some of the tips that have worked well for some who want to generate hundreds and even thousands on their websites. It is important to know though that ads are displayed because it fits the interest of the people viewing them. So focusing on a specific topic should be your primary purpose because the displays will be especially targeted on a topic that persons will be viewing already.

Note also that there are many other Adsense sharing the same topic as you. It is best to think of making a good ad that will be somewhat different and unique than the ones already done. Every clickthrough that visitors make is a point for you so make every click count by making your Adsense something that people will definitely click on.

Tips given by those who have boosted their earnings are just guidelines they want to share with others. If they have somehow worked wonders to some, maybe it can work wonders for you too. Try them out into your ads and see the result it will bring.

If others have done it, there is nothing wrong trying it out for yourself. HERE

Sunday, August 29, 2010


SEO Starter Guide by Google Webmaster Central Blog



Image Credit

As a blogger, we always try to be knowledgeable on Google SEO tips and tricks. Thus, thousands of SEO related blogs have been appeared to fulfill the market needs.

For me, I’ve spent some times on Google’s SEO when I just started this blog. It’s a huge knowledge and SEO is always a mystery for webmasters as Google has never really disclose its search engine algorithm.

Undeniable, SEO is a hot key on Web as everyone is hoping to get better placement on Search Engine Result Page (SERP). Google actually understands that either.

In order to help webmasters to improve website’s performance, Google has released a "Search Engine Optimization Starter Guide" which covers some common areas where webmasters might consider optimizing such as improving title and description meta tags, URL structure, site navigation, content creation, anchor text, and more.

Saturday, August 28, 2010

Verysign Company Information

  1. VeriSign® SSL Certificate Services enable secure commerce, communications, and interactions by providing encryption and authentication services to Web sites, intranets, and extranets.
  • VeriSign® Identity and Authentication Services strengthen and protect digital identities with a network approach to strong authentication and online fraud detection services.
  • VeriSign® Domain Name Services globalize access to the Internet, and VeriSign is the authoritative registry of all .com, .net, .cc, and .tv domain names.
  • ur global registries, data centers, and networks provide the security, scalability, and reliability to support digital interactions today and tomorrow. And VeriSign continues to play a central role in the dramatic expansion and protection of the Internet itself, with well over $500 million invested in Project Titan, a global initiative to exponentially increase the core infrastructure capacity and heighten security systems. By 2010, these enhancements will allow VeriSign to increase daily DNS query capacity tenfold from 400 billion queries a day currently to 4 trillion queries a day. Scaling our proprietary systems will increase bandwidth capacity ten times from more than 20 gigabits per second (Gbps) to greater than 200 Gbps.

  • Why VeriSign

    VeriSign is the trusted provider of Internet infrastructure services for the networked world. The ability to know and trust the parties with which you do business and communicate has become critical in the networked world.

  • VeriSign facilitates as many as 50 billion authoritative Domain Name System (DNS) queries a day, and has been providing this service since 1998 with 100% availability.
  • VeriSign plans to increase capacity of the .com and .net DNS by 10 times by 2010 to provide the security and stability required for global Internet-based transactions.
  • VeriSign is the SSL Certificate provider of choice for over 95% of the Fortune 500 and 96 of the world’s 100 largest banks .
  • The VeriSign Secured® Seal, the most recognized symbol of trust on the Internet (Synovate/GMI Research, September 2008), is served over 150 million times a day.
  • VeriSign has issued over 2 million VeriSign® Identity Protection (VIP) credentials to consumers for strong authentication on a network of leading Web sites.
  • We welcome you to learn more by visiting our Executive Briefing Center or viewing our Fact Sheet.

Forex VPS hosting

The Forex VPS hosting service supports Metatrader on all major operating systems, including Linux, Mac and Windows, unlike some hosting companies which only provide support to Window clients. It will also give you real time support, should you encounter any problems on the server side.

Forex VPS Hosting has robust security arrangements at its facility, and provides a secure and remote access to your MetaTrader broker account.

Hosting your Metatrader EA’s with Forex VPS gives you real time access to your individual trading account. It enables you the ability to view, manage and trade in real time through your broker. It is also possible to host several MetaTrader EAs without having to worry about your laptop crashing, power outages, or a failed internet connection. With the Forex VPS hosting service, you are able to host multiple Expert Advisers on a single account.

Forex VPS has grown to become one of the most popular and robust trading platforms on the market. And with the Forex VPS virtual private server, it takes less time to install an Expert Advisor on MetaTrader, than it is when MT is running on your own desktop. Forex VPS was one of the first companies to spot an opportunity in this market, and have, over th years, built an innovative and cutting edge product which forex traders can utilise to maximise their trading endeavours.

Tuesday, June 29, 2010

Get More Visitors, Get More Revenue!!!


Get More Shoppers

Get More Visitors, Get More Revenue!!!

With no day-to-day current of visitors you cannot have stable around the clock revenue.
It's not possible to get income if no one visits your website. You have to have shoppers to see your products, every day, 24 hours!
Our company helps more than 30,000 clients get more shoppers from Internet.
You can increase your revenue by receiving thousands of real interested shoppers to see your website.
More Customers...

Increase search engine rankings

Increase your web-site search engine rank

Showing up on search engines is one of the most important ways to increase web-site traffic and show your business or service to customers that might be looking for your product.
Most of the major search engines use an algorithm to determine your web-site ranks.
Search engines know the number of sites are linking to your web-site; more links and visitors higher rank for your website.
Get Higher Rank...

Millions of Shoppers

Millions of Shoppers

Reach millions of shoppers searching for products and services.
Our auditory is day by day increasing and now it's over 25 million unique visitors each month. We send traffic from high-quality local and international promotion webpages, which bring potential visitors from North America, Western Europe and upcoming markets.

Saturday, May 22, 2010

Dear Online Marketing Professional:

Google's job is to THIN the herd.

My job is to fatten it.

Which is why I have totally re-engineered the Bobsled Run for Spring of 2010.

This is what we are doing to help YOU prevail in even the most adverse conditions. This is my top-level, 12 week intensive personal AdWords coaching program. We start you at just before the first click and run you through the online marketing and sales process until you can successfully find traffic, get people on your list, sell them something, make a profit, and up-sell your customers well into the future.

That's the Bobsled Run. It's your 12 week secret weapon to exploding your business. When I started the Bobsled Run nearly 5 years ago, there was nothing like it. We took my exclusive "Google Code Cracking Matrix", combined it with my personal coaching, and ran advertisers and marketers through a 12 week, focused success gauntlet.

The aim was to double, triple or even quadruple my customers' businesses in just 12 short weeks. It worked. And I've got hundreds of stories and testimonials to prove it as you'll see in a minute. Every Bobsled Run has been unique, shifting as the market changes and molding itself around the custom needs of each group.

Bobsled Run: Re-engineered for you, right now. Dramatically Re-Engineered for 2010, including my brand new "Swiss Army Knife" formula for Bionic Google Ads.

But this session, I've decided to totally re-engineer things because Google, the market, and the economy have so radically changed the landscape that a more targeted, more refined, more precision matrix is needed to help you win. If you are planning on success using AdWords, you must understand the new lay-of-the-land and how to dominate. Here's what I've done to help you…

  • 12 week program starts at 8am Tuesday April 6th and runs through June 29. Each week we cover ONE major topic which you then implement. I've made it color by numbers, step by step. Targeted. Simplified.
    • Each week, the format alternates between large group calls, Team Action Group calls (you'll be assigned to a small "Team" of like-minded, compatible participants to get more hands on time and develop synergy), and private 1-on-1 consultations with my coaches.
  • Guarantee #1: If you complete the weekly assignments and don’t recoup your investment (from decreased click cost and increased sales) by the end of the 12 week course, you can contact our office get your money back.
  • Guarantee #2: If you do the weekly assignments and don’t increase your income by a bare minimum of $25,000, then one year from today let us know and we’ll give you your money back.
    • NOTE THIS: I have offered this guarantee for several years because it works. The recession has not changed my guarantee. A small percentage of students invoke the guarantee but not many. Because advertisers who take this course and follow the simple steps I teach predictably make major gains.
  • I am heart-attack serious about delivering principled information, customized to your needs and your business. Stop living in fear. I want to help you PREVAIL, especially in the present uncertainty.
  • We start at the beginning of your sales funnel – BEFORE the first Google click – and work our way down to the final sale and beyond. Personal AdWords coaching covers market research, AdWords for both Search and Content Network, Landing Pages, Sales Pages, Emails, Autoresponders, Upsells, Cross-Sells, Pricing Strategies and my list of "Key Economic Factors" that determine your ultimate success.
  • I will give you a set of guidelines on how I manage my time, my opportunities and my email box and how you can do the same. This 12 weeks will become a "protected zone" for high productivity and major progress – even if it's long eluded you.
  • Two Membership Levels to Choose From…
    • Membership Option #1 – BLUE Team: Group coaching with me (including open Q&A/Hot-seat time), personal coaching with Sunny Hills, Bryan Todd and my hand-picked staff and experts
    • Membership Option #2 – Bobsled Run PLUS the 4-Man Intensive: All the intense results of Bobsled Run, PLUS a two-day personal coaching session at my home in Chicago, that I call the "4-Man Intensive" (details on the 4-Man Intensive are below…). All of your coaching and 1-1 calls are with me, and none other. FAIR WARNING: Qualifications to be accepted into this level are higher and assignments are more rigorous. This is not for the timid. But, you're also guaranteed much higher results and returns. (One year sales increase guarantee is $50,000, as compared to $25,000 with the Blue Team Level)
  • Unlimited Access to the Bobsled Run Success Library. The "Library" includes "The Definitive Guide to Google Adwords" All-new, updated 2010 Edition, "Ultra-Advanced AdWords Strategies", "AdWords Beginner Basic Conference Calls" by Bryan Todd, "100 Unique Angles on Increasing Your CTR", "Power Leverage With the 95/5 Rule" by Bryan Todd, "How to Diagnose Quality Score Problems", and more…

Digital IDs

What's in your wallet? Chances are you have at least two or three items which identify you in some way: a driver's license, registration, ATM cards, credit cards, Medicare card.

We're used to carrying around ID, it's no big deal. But how do you identify yourself on the Net?

Assumed identities

Anyone who's spent any time in a chat room, MUD or newsgroup will know that the Internet is full of people who are faking it. You've probably done it yourself: assumed an identity, or given incomplete or inaccurate information, when forced to fill in a form to qualify for a software download or access to a site.

Even more importantly, how do you identify companies on the Net? When you're about to whip out your credit card and order that new Tina Arena CD through an online music store, how do you know who you're dealing with on the other end of this supposedly 'secure' transaction?

Checking real-world bona fides

In the 'real world' we identify and judge companies we deal with by a combination of name, reputation and physical appearance.

If you see an advertisement in the paper for a brand new computer system with the works and the price seems too good to be true, you're likely to do some checking up on the advertiser. If it's a familiar name or a company that others vouch for, you'll be encouraged to think about buying. If the company's name is unfamiliar, you might still decide to go to the store and suss them out: does the store look rundown or well maintained, do the staff look professional, do they answer your questions knowledgeably and clearly, how long has the company been in business, who else appears to be shopping there?

None of these things will guarantee you a 'safe' buy, but they all contribute to your decision whether to entrust your business to the company.

Checking virtual bona fides

On the Net, there's no way to give a retailer the once over; all you have to go by is the company's name, the look of their Web site, and things you've heard from other customers.

The same goes for software publishers. The Web is overflowing with software downloads, and you'll frequently come across sites which offer to download a Java applet or Arctics control to let you experience the latest gee-whiz effects. How can you know these 'freebies' are safe to unleash on your PC?

Digital certificates

Enter digital certificates. A digital certificate, or digital ID, is used to prove who you are on the Internet.

Digital IDs can be issued to Web sites, software developers and individuals. You can be pretty sure that anyone who produces a valid digital ID is who they claim to be. Of course, while a digital ID verifies someone's identity, it says nothing about their character – something you need to establish for yourself.

Nevertheless, the requirements for getting a digital ID as an organisation engaged in electronic commerce are stringent enough that they give some assurance of the certificate holder being an established business. For software publishers, a combination of a digital ID and an Authenticode certificate not only verifies identity but also states the equivalent of "this code has not been tampered with and should not wreak havoc on your computer".

The basic personal digital ID requires nothing more than having a verifiable e-mail address. If people you deal with on the Net are finicky about who they're dealing with, you can get different classes of personal IDs, requiring either third-party proof of your name, address and other information right up to IDs which can only be obtained by appearing in person or presenting registered credentials.

What is a digital ID?

What, exactly, is a digital certificate? Technically, it's an electronic document which conforms to the International Telecommunications Union's (the international body that determines communications standards) X.509 specification.

In everyday terms, it's a document which typically contains the owner's name and public key, the expiration date of the public key, the serial number of the certificate, and the name and digital signature of the organisation which issued the certificate. The digital certificate binds together the owner's name and a pair of electronic keys (a public key and a private key) that can be used to encrypt and sign documents. (If you'd
like to know how public key encryption works, see What is public key encryption?.)

Verifying certificates

What's to stop you from forging a digital certificate by combining your public key with someone else's identifying information? For instance, what prevents you from creating a bogus certificate in the name of the Australian Taxation Office?

This is the role of certificate authorities (CAs). These organisations are responsible for issuing, validating and revoking digital IDs. When you apply for a digital certificate, the CA checks your credentials and issues a certificate which they encode using their own private key. Anyone who wants to check the validity of your digital certificate can do so by decoding your certificate using the CA's public key, and then checking it against the certificate you've given them.

Of course, this means you need to be able to trust the CA, and that trust is based on the stringent requirements involved in becoming a CA. The most prominent CA at the moment is Verisign (www.verisign.com), although it is only one of a number of such authorities.

umber of such authorities.

Do I need one?

Currently, there's no pressing need for you, as an individual, to have a digital ID. But that's due to change.

Recently, a group of the major financial players in the world of online commerce, including Visa (www.visa.com) and Mastercard(www.mastercard.com) , have published a new protocol for SET – Secure Electronic Transactions. SET is designed to make online credit card transactions as secure as offline transactions and, once it's in place, many online merchants will insist you produce your digital ID before they'll do business with you. In fact, you'll need a separate digital ID for each credit card you use online.

It's not likely to stop there, either. Once online shopping makes digital IDs more commonplace, we'll probably see more Web sites using such certificates simply to check your ID. For instance, a single personal digital ID can be used instead of multiple user name/password combinations required to access different Web sites.

You'll also find more and more software developers, online shops and other sites providing their own digital IDs as surfers and consumers demand greater security on the Net.

While there's no need to rush out and get yourself a digital ID today, six months down the track you're likely to have a couple stored on your hard disk.

How do I get one?

You can get a digital ID from any of the CA's which provide personal digital certificates.

Usually the easiest way to get one is by using an application which supports digital signatures and encryption. For example, the latest versions of both Netscape Navigator (and Communicator) and Microsoft's Internet Explorer provide support for encryption and digital signatures, and each program offers an option to sign you up for a digital ID.

Safety's a chimera

No-one is making iron-clad guarantees about the privacy and security of online interactions. But with the introduction of new technology such as digital certificates, standards for e-mail encryption (such as S/MIME – Secure Multipurpose Internet Mail Extensions), and SET for electronic commerce, exchanging sensitive information online is becoming considerably less dicey.


Wednesday, May 12, 2010

How to Read Allow Your Blog to Only Blog Author

You can read allow your blog to your self and you can restrict your blog to only readers you choose.
These readers will need to log in before reading your blog.

1. First Go to the Blogger.com.

2. Log in and go to the Dashboard.

3. Go to the Settings and click on the Permissions


4. Now you can see there are showing clicks on Anybody means now anybody can read your blog.

5. You will need to change the click on Only Blog Authors then only author can read the blog.

6. when you click on only blog authors then you will allow to author.

Saturday, May 8, 2010

norton internet security

Most of us have a love-hate relationship with our security software. Though we love the protection from online and other threats,
but hate the way the software drags down our daily activities and slows down our computers. Recently, symantec,one of the best hands at antivirus software made an all-out effort to reduce the suite,s impact on performance.And, what do you know-it
worked,Norton internet security 2009 affects performance less than any suite we,ve tested. And there,s more good news: The user interface is streamlined and simplified. most security tasks happenn in the back ground during idle time, eentireely with out user intervention.
even the installlation process is streamlined. the onlly thing you need do is click one big boutton that says you agree to the license-after that the software is fast and a half when i timed it ; activation took another minute ; and the initial livee update of malware difinationns required one more minute. fromm zero to 100 percent ready in under 4 minute? that's amazing!


Performence
surprisingle, when compared to past norton suites this editions is all about performence . the utility is designed from the botton up both to stay out of your way and to demonstrate that it's staying out of your way. the main windows includes a big CPU usage meter thatseparately tracks syestem-wide usage and usage specific to Norton when the syestem seems bogged down, you can see at a glance what's to blame.
Tasks like downloading new virus definitions or scanning for malware can take processing power away from user applications, so the product perform these duties only when the syestem has been idle fora while-10 minutes, by defult. a link above the CPU meter opeans a huge chart of CPU and memory usage over the last 90 minutes. typically you 'll see a spike in norten-specific CPUuse during times marked on the chart as idle the software also supplies a table showing when various background tasks last.
a link below the CPUmeter launches another performence tool, norten insight which speeds malware scanning by indentifying files that don't have to be scanned. it checks all executables on the computer against a data base of trusted programs and displays a big meter showing just how ,any files it has exempted. A full scan is proportionally faster after insight completes its analysis. if you dont't force this full syestem check by activaly lunching the tool, it will completes its analysis during idle time.
Norten's liveupdate runs every 8 hours to get new malware difinitions and any other needed updates. But in the fight against rogue software,8 hours is a long time-a modern threat can spread woorld wide in that times . so norten 's "pulse updates " feature checks for newmalware signatures every few minutes and streams in any that are available.

The Test


We installed norton on a syestem infested with malicious software of many type, among them adware, spyware, rootkits, Trogans, worms, and rogue antispyware. its speedy installatiion was a great boon, as was the fact that it doesn't require a reboot after installation. that post-install reboot is a stumbling block for many suites.. if the programes's real- time protection partially disables a kernal-mode malware sample the syestem may crash on reboot before there's any chance to run a full scan. norton's installation went smothly on all of the infested test syestem, though there were a couple of hiccups during the cleanup process.
scanning a standerd clean test syestem took the suite 50 minutes, quite a bit longer than most. usually 30 minutes is about. usually 30 minutes is about averag. However, that was before norten insight had finished processing. after norten insight indentified 90 percent of the files as trusted, a rescan took just 5 minutes.
Norten quarantines most threats automatically during the scan process. Other threats get removed at the end of the scan, after the user has had a change to close any open programs. in a number of cases, the scan reported that full cleanup would occur after reboot, but as long as the malware was completely deacitivated it did not insist on rebooting immediately. your machine wouldn't find the port close to attack ; he wouldn't find them at all because norten puts them in stealth mode. that's a good thing , but windows firewall can do the same.
The flips side of personal firewall protection is program control-keeping programs on your syestem from abusing access to the internet or network. early personal firewalls asked a million questions. every time a program attempted internet access for the first time, they'd ask the user wheather to permit it or not often in confusing terms. the user just isn't really qualified to make that decision, so norton handles handles program control completely on its own . it destroys known bad programs on sight and grants access to knowns and block them only if their actions appear malicious to be fair, ZoneAlarm (the original too-many-questions fire wall) has all but aliminated those confusing querise in its latest editi.

Network control
Norton's Network security map aerves a number of purpose. it shows all the devices connected to your network and report wheather your wireless network is secure;that is wheather it's encrypted . if other computers on the network are also rurunning norton, you can easily configure remote monitoring just turn on each using the same password, and they'll quickly find each other. by default norten protects your computer from attacks and unexpected traffic even within your own network . theb setting should be finr forcomputer, but it could conceivabely cause trouble for other type of devices. if it does and onely if it does, you can set that devices's trust level to "full trust." you can also lock out specific devices by setting their trust level to restricted, in the rare event that you've allowed an untrustworthey devices into your network

parantal control
many user dont't need perantal - control software, so symantec doesn't include it in the suites 's standerd installation package if you do need this feature, it's easy enough to install-just clicks a link and follow the instructions. the parental control pack is about a 20MDlive update . but do keep in mind that norten's parental-control solutions is limited in scope. it doesn't offer the internet time- control feature found in kaspersky, F-secure, and bitdefender. but atlest it does its on e task well; its categroy-based site blocking is browser-indeprndent, and the kids can't tamper with it.

Privacy control

if you instell the add-on pack you also get norton's old privacy control like many other suites , norton lets you records private information and prevent its transmission and prevent its transmision out of your computer via web forms , outgoing smtp e-mail or specific instant-messaging client . it's nicely implemented with a sport forn each item to define a list of URLexception. the exception feautere lets you define a site's password as private yet allow it at the actual site, so you can use it but not lose it. the saved data is completely exposed to anybody who has the privacy/parent password. that seems like a big mistake . here the approach used by Zone Alarm is great ; it stores private data using one-way encryption . when privacy control dedects that private data is about to be transmitted, norton pops up an alert and asks whether to allow or block the tramnsmision. no password is required, so you can't use privacy control to keep your kids from sending out privaye information. if you do choose to block the data norton replaces it with asterisks.

Thursday, May 6, 2010

Technology from arom around the news world



MICROSOFFT
Microsoft ware gaint microsoft reecently up to one million users from its Xbox live syestem in order to weed out useers who have pirated their games. the bans will stop a user from playing any game on theirr Xbox 360 console, so affectid useers will be unable to play online against frienddd aven with a copy purchased legitimately. "All

X-BOX 360

consumerss should know that priacy is illagel and that modifing their Xbox 360console to play pirated disec viiolates theXbox live terms of use , will void their warrenty and result in a ban from Xbox live," microsoft said in the statement. " the health of thee video games business depends on costomers playing for the genuinee product and service they recive from manufacturers, ratailers, and the thid parties that supprot them ." the decision comes as a number of Xbox user have found their consoles unable to connect to Xbox liive after using a pirated version of the newly rreleased game call of Duty: modern warfare 2. it has been one of the most highly anticipated games of all time, with some reportindicating sales of up to seven milliion units in on eday. many Xbox users have complained about their inibality to play the new title after using a pirated copy, saying a large part of thee games requires online connectivity.

DOCTORS COLD SOON DIAGNOSE THE FLU OVER THE PHONE
A new type of softweere beeing developed in Queensland, Australia could lead to doctors dianosingpatient with the flu over the phone. the new technology, which is being develooooooped by both australian and US researchers, would see patiets cough into mobiles phone in order to recive a diagnoses. Udantha Abeyratne from the university of Queensland is working on methodes to fit smarts phone with tiny microphone that would alloww doctors to read the medical datta stored in a recording of a cough . He told that the neww technology was
"unorthodex ..the target is to buuild something that cannnn do screening in the faileed". abbbeyreatne , whhhho has previously worked on technology designed to analyze snoring in order to diagnose sleep apnea, was among a group of 76 researcheees to win a $UUUS 100,000 grant from the bill Gates" research foundatiion >thee technology works by analyzing the data contained in a recording of the last _ milisecond of a cough which regular contains sound that can help medical professionals diagnose illnesses> STAR analytical service < style="font-weight: bold;">massachusettes < style="font-weight: bold;">jaclyn smith saying thee technology is important >"it"s the mssymptom when a patient present< style="font-weight: bold;">ald btechnology from the 19th century." " there is no question that there is a lot of variabillity in the cough of people. but if theey can find certain parametrs to use cough to diagnose disease that could be fabulous. it could really improve diseasee diagnosis and help improve people's access to health care."

AUSTRALIAN DEVELOPER CREATES FIRST IPHONNE VIRUS

a 21-year -old australian student has created the world's first iPhone virus designed to infect phones that have not been protected by passwords. but the creator of the virus , Ashely Towns, has since retreated from the public eye after relasing the APP, blocking his Twitter account in order to prevent users from reading his updates. the virus will only affect phone thhhat are "jailbroken", where users digitally crack open the phone 's file syestem in order to install customized apps and user interface theme not approved by apply. the virus changes a user's wallpaper to a picture of 1980 pop star Rick astley, and display the world "ikee is never gonna give you up" - a referance to astley's hit song and towns'twitter account. but towns insists the virus is not malicious, will not affect a user's phone permaneently and can be easily arased. instead, he told that the virus was designed in order to exploitt "people' s laziness to change their passwordxd". " somebody with moreb malicious intent could have done any thing - read your SMSs, go thourgh your emailes, view your contact, photos - any thing ," he said . the virus comess after a number of seurity expert intheUS have flagged the ability for hackers to obtain personal information from iphones andd Macs, despite thee company 's marketing stratege that brands its prouducts as virus -free while some have doubted towns' ability to create an iphone virus as severalother hav4ee tried unsuccessfully, he maintain he can prove the authenticity of the virus by publishing its source code.