Showing posts with label internet tweak. Show all posts
Showing posts with label internet tweak. Show all posts

Wednesday, February 3, 2010

Keep Protect Your FaceBook and Twitter Privacy

Surfing the web no longer a solo activity. Facebook, Twitter, and other social networks have quickly become an integral part of the online culture, and with them comes an array of serious threats to your privacy. In this article, I’ll identify some of the key dangers of social networking and offer a few easy steps that you can take to stay safe online. Social networking is built on the idea of sharing information openly and fostering a sense of community. Unfortunately, an online network of individuals who actively share their experiences and seek connections with other like-minded people can be easy prey for hackers engaged in social engineering and phishing attacks. It’s important to be aware of the threats and to use discretion in all of your online interactions.




Take Care Before You Share Online
For starters, even in an open community of sharing, you should observe commonsense boundaries. As President Obama warned students in his September address to schools, “be careful what you post on Facebook. Whatever you do, it will be pulled up again later somewhere in your life.” The core truth of that statement can be applied to any social networking site, and possibly to the Internet as a whole. As a general rule, refrain from posting things online that you will regret later. The odds are good that someone, someday, will stumble across it, and it may come back to haunt you— especially if you are planning to run for public office. If you think that abstaining from posting embarrassing or inflammatory comments online ruins the fun, you’re playing a dangerous game. Remember who your friends are, and know that a friend of a friend can be an enemy.



Don’t Lose Sight of Who Your Friends Are
When you write a Twitter tweet or post a Facebook status update, you have to keep your audience in mind. More and more these days, we hear stories about people who forgot that their boss was part of their network and then said things online that resulted in their being reprimanded or even fired. The adverse consequences of posting inappropriate on line comments have become so commonplace—at least anecdotally—that they have earned an entry in the Urban Dictionary: Facebook fired. Even announcing something as seemingly innocuous as “I’m bored” in a status up - date during work hours can have dire consequences if the wrong people see it. With services like Twitter, and with the recent changes to Facebook that permit any interested party to view and search your updates, you really have no way to hide.


Recognize the Visibility of Your Posts
You’ve thought it through, and you want to shout to the world how you feel about having to work overtime and during a weekend that you had earmarked for recreational activities. You have checked and double checked, and you’ve determined that your boss is not in your network, so you let loose on the keyboard and speak your mind. Unfortunately, you’re not home free (figuratively speaking) just yet. Being outside of your network, your boss can’t see your post directly, but if a Facebook friend who is connected with your boss comments on your status update—even just to say “I sympathize”— your boss may be able to click on the link through the friend and see your post. Go ahead, be social. Share your trials and tribulations with your growing network of adoring followers. But for your own safety, keep one essential rule in mind: Never post anything online that you wouldn’t be comfortable having everyone you know see—because eventually they probably will see it.


Define the Parameters of Your Privacy
Marrying privacy and social networking may seem terribly unintuitive. How can you be social and open, and yet protect your privacy? Well, just because you are choosing to share some information with a select group of people does not necessarily mean that you want to share everything with everyone, or that you are indifferent about whether the information you share is visible to all. Facebook, in particular, has drawn unwanted attention in connection with various privacy concerns. If you have used Facebook for a while, you may have noticed advertisements that incorporate your friends’ names or photos associated with them. Facebook does provide privacy controls for you to customize the types of information available to thirdparty applications. If you look at the Facebook Ads tab of the privacy controls, though, you’ll notice that it doesn’t give you any way to opt out of the internal Facebook Ads. Instead, it states (alarmingly) that “Facebook strives to create relevant and interesting advertisements to you and your friends.”



Approach Tattletale Quizzes With Caution
For many users, one of the primary attractions of Facebook is the virtually endless selection of games and quizzes. And part of their allure is their social aspect. In the advergames, you compete against your friends; through the quizzes, you learn more about them while being briefl y entertained. The ACLU exposed problems with how much information these quizzes and games share, however. Typically, when a Facebook user initiates a game or quiz, a notice pops up to declare that interacting with the application requires opening access to information; the notice also provides the user the opportunity to opt out and cancel, or to allow the access to continue. The permission page clearly informs the user up front that allowing “access will let [the application] pull your profile information, photos, your friends’ info, and other content that it requires to work.” Under the circumstances, you may wonder (as the ACLU has) why a game or quiz application would “require” access to your friends’ information in order to work.


Facebook Policy Concerns in Canada
Facebook’s privacy policies have run afoul of the Canadian government, too. Canada’s Privacy Commissioner has determined that those policies and practices violate Canadian privacy regulations, and has recommended various changes Facebook should make to comply with them. One of the commissioner’s biggest concerns involves the permanence of accounts and account data. Facebook offers users a way to disable or deactivate an account, but it doesn’t seem to provide a method for completely deleting an account. Photos and status updates might be available long after a user has shut down a Facebook profile. And like the ACLU, the Canadian government is unhappy about the amount of user information that Facebook shares with thirdparty application providers.

Facebook Marketing For Dummies

Exercise the Privacy Controls You Have
Although the concerns of the ACLU and the Canadian government run a little deeper, Facebook does offer privacy controls for restricting or denying access to information. Since Facebook is a social networking site designed for sharing information, many of the settings are open by default. It is up to you to access the Privacy Settings and configure the options as you see fit. For each available setting, you can choose to share information with Everyone, with My Networks and Friends, with Friends of Friends, or with Only Friends; if you prefer, you can customize the settings to finetune access further.


Phishing: Cutting the Identity Theft Line


Beware of Hijacking and Phishing Scams
By its very nature, social networking is all about socializing, which means that users are more than usually disposed to let their guard down and share information. They come to the network to expand their professional connections, reestablish contact with old friends, and communicate in real time with pals and peers. And for predatory bad guys, launching social-engineering and phishing attacks in this convivial environment is like shooting fish in a barrel. Most people know not to respond to e-mail requests from exiled Nigerian royalty promising millions of dollars in return for help smuggling the money out of the country. (Anyone who doesn’t know better probably shouldn’t be on the Internet; such people are a danger to themselves and to others.) But what if a good friend from high school whom you haven’t seen in 18 years sends you a message on Facebook explaining how her wallet was stolen and her car broke down, and asks you to wire money to help her get home? You might be less suspicious than you should be. Attackers have figured out that family and friends are easy prey for sob stories of this type. Using other attacks or methods, they gain access to a Facebook account and hijack it. They change the password so that the legitimate owner can’t get back in, and then they proceed to reach out to the friends of the hijacked account and attempt to extort money such a Facebook message or e-mail plea, pick up the phone and call the person directly to confirm its legitimacy.


Don’t Let a Tiny URL Fool You
Another threat that has emerged recently as a result of social networking is the tiny-URL attack. Some URLs are very long and don’t work well in e-mail or in blog posts, creating a need for URLshortening services. In particular, Twitter, with its 140-character limit, has made the use of URL shortening services such as Bit.ly a virtual necessity. Unfortunately, attackers can exploit a shortened URL to lure users into accessing malicious Web sites. Since the shortened URL consists of a random collection of characters that are unrelated to the actual URL, users cannot easily determine whether it is legitimate or phony. TweetDeck, a very popular application for sending messages in Twitter, provides a ‘Show preview information for short URLs’ option, which offers some protection.
The preview window supplies details about the shortened URL, including the actual long URL that the link leads to. If you aren’t using TweetDeck for Twitter, or if you need to deal with shortened URLs on other sites and services, maintain a healthy dose of skepticism about what might lie behind the obfuscated address that a message points to.


Source:
PC World


Saturday, October 18, 2008

Portable Google Chrome

Google Chrome is a browser that combines a minimal design with sophisticated technology to make the web faster, safer, and easier. It has one box for everything: Type in the address bar and get suggestions for both search and web pages. Will give you thumbnails of your top sites; Access your favorite pages instantly with lightning speed from any new tab.


Google Chrome is an open source web browser developed by Google. Its software architecture was engineered from scratch (using components from other open source software including WebKit and Mozilla Firefox) to cater for the changing needs of users and acknowledging that today most web sites aren't web pages but web applications. Design goals include stability, speed, security and a clean, simple and efficient user interface.

Download this portable browser at Here.

mIRC v6.34 With Server Patch

mIRC is a popular Internet Relay Chat client used by millions of people, and thousands of organizations, to communicate, share, play and work with each other on IRC networks around the world. Serving the Internet community for over a decade, mIRC has evolved into a powerful, reliable and fun piece of technology.



It has a clean, practical interface that is highly configurable and supports features such as buddy lists, file transfers, multi-server connections, SSL encryption, proxy support, UTF-8 display, customizable sounds, spoken messages, tray notifications, message logging, and more.

This version of mIRC (v6.34) is a small though important update to the previous version and has been released primarily to resolve an important issue with ‘if’ statements being processed incorrectly in the scripting language. Several other small issues have also been fixed in this release. Although this is a minor update, it includes important changes and is a highly recommended download.

Download this nice net app at Here.

Windows XP SP3 TCP/IP Patcher

This patch is designed only for all versions of WIndows XP SP3. By increasing the number of TCP/IP connections allowed at one time, your internet speeds up, especially when you are downloading stuff or playing online games.


I recommend you to set the limitation to 500 to 600. Before applying the patcher, remember to unplug internet connections and restart computer to make sure the TCP/IP file is not in use.

Download this patcher at Here.

Sunday, August 24, 2008

Make Internet Explorer 7 Faster

Internet Explorer has been in a features arms race with Firefox for a while. More and more people are switching to Firefox because of its speed and stability. A big reason people still use Internet Explorer is it is the first browser that a new user will see so they become familiar with it.. If Internet Explorer did not ship with Windows it would not have the amount of users it does.


If that new user wants to use Internet Explorer but wants to give their browsing a speed boost. Here are a few tips.

If you Don't Need a Proxy Don't Use One.
A proxy server is used if you have a slow connection. If you have a high speed connection you usually don't need it. Here is how you remove it. Go to tools and select Internet Options. In the Internet Options click on the Connections tab and press the LAN settings. Just remove all of the check marks, click on OK.

Get Rid of 3rd Party Toolbars
Some software companies have learned that there is money to be made by installing their software branded toolbar. The problem with these toolbars is when installed they take up bandwidth and computer resources while you browse the internet. To remove the toolbars you don't need, just identify the toolbar and remove it for add/remove programs. If it is not listed in add/remove programs it may be spyware. You will then need to scan your computer with your favorite spyware/malware software.

Increase the Amount of Connections Internet Explorer uses.
By default Internet Explorer only uses 10 simultaneous connections to download content from a webpage. Here is how you can increase the amount of connections. Open notepad and paste the code below in it.

Windows Registry Editor Version 5.00

[HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionInternet Settings]

"MaxConnectionsPerServer"=dword:00000020

"MaxConnectionsPer1_0Server"=dword:0000020

Save the file by clicking save as, change Save as type to All Files, name the file IEfaster.reg.
Now, merge that registry setting to registry by double clicking file IEfaster.reg and Click Yes on the dialog that appear. Restart your computer and done.

So there you have it. With these few changes you can really change the performance of Internet Explorer. If you want a completely better experience give Firefox a try. You won't be disappointed.

Monday, June 9, 2008

Tweak Your Firefox for Super Fast Web Browsing

Fast loading web pages while surfing the Internet may have more to do with your web browser settings and preferences than your Internet connection speed.


Try these easy Firefox tweaks and you’ll see that you’re surfing the Internet from 3 to 30 times faster!

  • To get started, open your Firefox web browser. In the address/location bar type about:config and then press your Enter key.
  • In the Filter bar type network.http.pipelining. Then, double-click on this line under Preference Name in order to change the value from False to True.
  • In the Filter bar type network.http.pipelining.maxrequests. Then, double-click on this line under Preference Name and change the value from 4 to a higher number anywhere from 10 to 30. I set mine to 30.
  • In the Filter bar type network.http.proxy.pipelining. Then, double-click on this line under Preference Name in order to change the value from False to True.
  • In the Filter bar type network.dns.disableIPv6. Then, double-click on this line under Preference Name in order to change the value from False to True.
  • In the Filter bar type plugin.expose_full_path. Then, double-click on this line under Preference Name in order to change the value from False to True.
  • In the Filter bar type network.protocol-handler.external.ms-help. Now, you are going to create a new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in nglayout.initialpaint.delay and click OK. Then in the Enter Integer value box type 0 (that’s a zero) and click OK.
  • In the Filter bar again type network.protocol-handler.external.ms-help. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in content.notify.backoffcount and click OK. Then in the Enter Integer value box type 5 and click OK.
  • In the Filter bar again type network.protocol-handler.external.ms-help. Now, you are going to create another new Preference Name with an Integer Value. To do this, right-click on this line under Preference Name and select New, then Integer. In the New Integer value box type in ui.submenuDelay and click OK. Then in the Enter Integer value box type 0 (that’s a zero) and click OK.
Now, close your web browser and restart it. You’ll see how much faster web pages are loading. I sure did.



Monday, June 2, 2008

How To Block a Website

There are many reason why you need to know how to block a website. Some of the most common reasons are you have been targeted by spammers who use adware and popups to attack your PC. Other reasons may be to prevent your children from having access to certain site content such as porn and gambling.

Depending on the level of security you wish, learning how to block a website may require a adjustments of your web browser, the use of internet filtering software or editing of your host file. At any rate you can try all methods to see which works best for you.

Block a Website using Internet Explorer:
Internet Explorer version 5 and later offer the ability for heighten security and privacy. You can block a site by following the directions below:
  • Load your Internet explorer
  • Click Tools
  • Click Internet Options
  • Click the Privacy tab
  • Under the Privacy window, Click Sites
  • Type in the site address that you want to Block and Click OK.
Remember this technique only blocks on one site at a time. Parental control software will allow you to block multiple sites and categories.


Other way to block a website using Internet Explorer:
Click Tools ->Internet Options->Security->Restricted sites->Sites->Type in the site address and Click ADD then click OK.


Block A Website in All Web Browsers:
This action will require you to edit your Host file. Your host file is a computer file used to store information on where to find a node on a computer network.


Here are the steps in Windows XP:
  • Click Start->All Programs->Accessories->Command Prompt2.
  • Click Command Prompt This will open a DOS command window.
  • Type: notepad C:/Windows/System32/drivers/etc/hosts
  • Locate the line 127.0.0.1 localhost
  • To block the website google.com for example, just add this text under 127.0.0.1 localhost:
127.0.0.1 google.com
127.0.0.1 www.google.com
  • You can add as many sites any site, However you will need to prefix it with "127.0.0.1".
  • Save the file
Google will now be blocked in all web browser. This is an advanced but easy method on how to block a website.

Friday, January 25, 2008

AirTalkr: Single Messenger for Yahoo!, Google Talk and MSN

Like Meebo, AirTalkr offers a web based instant messenger that lets you stay connected with your buddies on Google Talk, Yahoo! Messenger, Windows Live and other popular IM services.

But there’re a couple of reasons why you may want to give AirTalkr a shot.


Unlike Meebo which is available only for the browser, you can also install AirTalkr IM on your desktop using Adobe AIR runtime. AirTalkr can run on Windows and Mac.

The other useful feature in AirTalkr is something called AirCards. You can view the latest photos that your buddies have uploaded on Flickr, read their most recent blog entries and Twitter tweets right inside AirTalkr.

More Info can be got at here.




Saturday, November 24, 2007

13 Quick Expert Tips for Searching Google

1. Explicit Phrase: Lets say you are looking for content about internet marketing. Instead of just typing internet marketing into the Google search box, you will likely be better off searching explicitly for the phrase. To do this, simply enclose the search phrase within double quotes.

Example: “internet marketing”

2. Exclude Words: Lets say you want to search for content about internet marketing, but you want to exclude any results that contain the term advertising. To do this, simply use the “-“ sign in front of the word you want to exclude.

Example Search: internet marketing -advertising

3. Site Specific Search: Often, you want to search a specific website for content that matches a certain phrase. Even if the site doesn’t support a built-in search feature, you can use Google to search the site for your term. Simply use the “site:somesite.com” modifier.

Example: “internet marketing” site:www.smallbusinesshub.com

4. Similar Words and Synonyms: Let’s say you are want to include a word in your search, but want to include results that contain similar words or synonyms. To do this, use the “~” in front of the word.

Example: “internet marketing” ~professional

5. Specific Document Types: If you’re looking to find results that are of a specific type, you can use the modifier “filetype:”. For example, you might want to find only PowerPoint presentations related to internet marketing.

Example: “internet marketing” filetype: ppt

6. This OR That: By default, when you do a search, Google will include all the terms specified in the search. If you are looking for any one of one or more terms to match, then you can use the OR operator. (Note: The OR has to be capitalized).

Example: internet marketing OR advertising

7. Phone Listing: Let’s say someone calls you on your mobile number and you don’t know how it is. If all you have is a phone number, you can look it up on Google using the phonebook feature.

Example: phonebook:617-555-1212 (note: the provided number does not work – you’ll have to use a real number to get any results).

8. Area Code Lookup: If all you need to do is to look-up the area code for a phone number, just enter the 3-digit area code and Google will tell you where it’s from.

Example: 617

9. Numeric Ranges: This is a rarely used, but highly useful tip. Let’s say you want to find results that contain any of a range of numbers. You can do this by using the X..Y modifier (in case this is hard to read, what’s between the X and Y are two periods. This type of search is useful for years (as shown below), prices or anywhere where you want to provide a series of numbers.

Example: president 1940..1950

10. Stock (Ticker Symbol): Just enter a valid ticker symbol as your search term and Google will give you the current financials and a quick thumb-nail chart for the stock.

Example: GOOG

11. Calculator: The next time you need to do a quick calculation, instead of bringing up the Calculator applet, you can just type your expression in to Google.

Example: 48512 * 1.02

12. Word Definitions: If you need to quickly look up the definition of a word or phrase, simply use the “define:” command.

Example: define: plethora

13. Searching for URLs containing certain words. Use the "inurl:word" modifier.

Example PCHacks- inurl:software


Monday, October 15, 2007

Remove the limit on TCP connection attempts: P2P Hack

Windows XP SP2 introduces a few new twists to TCP/IP in order to babysit users and "reduce the threat" of worms spreading fast without control. In one such attempt, the devs seem to have limited the number of possible TCP connection attempts per second to 10 (from unlimited in SP1). This argumentative feature can possibly affect server and P2P programs that need to open many outbound connections at the same time.

Rant: The forward thinking of Microsoft developers here is that you can only infect 10 new systems per second via TCP/IP ?!?... If you also consider that each of those infected computers will infect 10 others at the same rate:
second 1: 1+10 computers
second 2: 10+10*10 computers (110 new ones)
second 3: 10+100*10 computers ( 1110 new ones)
second 4: 10+1000*10 computers (11110 new ones)
....

all the way to 10*60 + 10^60 computers in a single minute (that's a number with 60 digits, or it would far exceed Earth's population). Even if we consider that 90% of those computers are unreachable/protected, one would still reach ALL of them within a minute.

In other words, even though it is not going to stop worm spreading, it's going to delay it a few seconds, limit possible network congestion a bit, and limit the use of your PC to 10 connection attempts per second in the process ! I have no problem with the new default setting limiting outbound connection attempts.

Still, users should have the option to easily disable or change this setting. I might be going out on a limb here, but ever since the introduction of Windows XP I can't help thinking that I dislike all the bult-in Windows "wisardry" in a sense that the system also limits user access. That irritating trend to ease the mental load on end users is somewhat insulting, considering that Windows is to make the more "intelligent" choice instead of the end user, as well as limit their access to tuning such settings...
End of rant.

With the new implementation, if a P2P or some other network program attempts to connect to 100 sites at once, it would only be able to connect to 10 per second, so it would take it 10 seconds to reach all 100. In addition, even though the setting was registry editable in XP SP1, it is now only possible to edit by changing it directly in the system file tcpip.sys. To make matters worse, that file is in use, so you also need to be in Safe mode in order to edit it.

You only need to worry about the number of connection attempts per second if you have noticed a slowdown in network programs requiring a number of connections opened at once. You can check if you're hitting this limit from the Event Viewer, under System - look for TCP/IP Warnings saying: "TCP/IP has reached the security limit imposed on the number of concurrent TCP connect attempts". Keep in mind this is a cap only on incomplete outbound connect attempts per second, not total connections. Still, running servers and P2P programs can definitely be affected by this new limitation. Use the fix as you see fit.

To change or remove the limit, you can use the following program.

- A patching program for removing or changing the limit imposed on connection attempts in SP2. The patcher has the ability to restore tcpip.sys back to the original... Still, you might want to back up tcpip.sys, use it at your own risk.
The author of this patch can be reached at the site.



Sunday, October 7, 2007

Search MegaUpload and Rapidshare Using Google: a Google Hack


We can search for anything we want fastly and accurately with a little tricks with Google.
Ok here’s the trick.

For MegaUpload, put the following in Google:


Video files:
avi|mpg|mpeg|wmv|rmvb site:megaupload.com
Music files:
mp3|ogg|wma site:megaupload.com
Programs/Applications files:
zip|rar|exe site:megaupload.com
eBooks files:
pdf|rar|zip|doc|lit site:megaupload.com
For Rapidshare, put the following in Google: Video files:
avi|mpg|mpeg|wmv|rmvb site:rapidshare.de
Music files:
mp3|ogg|wma site:rapidshare.de
Programs/Applications files:
zip|rar|exe site:rapidshare.de
eBooks files:
pdf|rar|zip|doc|lit site:rapidshare.de
Note: For MegaUpload and Rapidshare searching, narrow down you search for what you want by putting your query at the first part.

Say if you want to search for
Windows XP tutorials in Rapidshare use the query: Windows XP tutorials pdf|doc|lit|rar|zip site:rapidshare.de

Friday, September 21, 2007

Google Searching Secrets

Tired to search and got nothing ?
Here the secrets for searching in Google:

Method 1


Put this string in Google search:

"parent directory " /appz/ -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " DVDRip -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory "Xvid -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Gamez -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " MP3 -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

"parent directory " Name of Singer or album -xxx -html -htm -php -shtml -opendivx -md5 -md5sums

Notice that i am only changing the word after the parent directory, change it to what you want and you will get a lot of stuff.


Method 2

Put this string in Google search:

?intitle:index.of? mp3

You only need add the name of the song/artist/singer.

Example: ?intitle:index.of? mp3 britney




Change Your IP In Less Than 1 Minute

Do this steps :

  • Click on "Start" in the bottom left hand corner of screen
  • Click on "Run"
  • Type in "command" and hit ok

You should now be at an MSDOS prompt screen.

  • Type "ipconfig /release" just like that, and hit "enter"
  • Type "exit" and leave the prompt
  • Right-click on "Network Places" or "My Network Places" on your desktop.
  • Click on "properties"

You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.

  • Right click on "Local Area Connection" and click "properties"
  • Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab
  • Click on "Use the following IP address" under the "General" tab
  • Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).
  • Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  • Hit the "Ok" button here
  • Hit the "Ok" button again

You should now be back to the "Local Area Connection" screen.

  • Right-click back on "Local Area Connection" and go to properties again.
  • Go back to the "TCP/IP" settings
  • This time, select "Obtain an IP address automatically"
  • Hit "Ok"
  • Hit "Ok" again
  • You now have a new IP address

With a little practice, you can easily get this process down to 15 seconds.

Notes:
This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back