Monthly Archives: February 2011

Get Access Into Registration-Required Sites Without Need To Register

Hi friends, today i will share the trick to Get Access to Registration Required Sites Without Need To Register.
Are you annoying of having to register on a free Web site just to read some news or view some information? Rather than registering on such Web sites (and risking your email of annoying spam).

There is a simple method to get access to protected content without need to endure the annoyance of signing up for an account. Just visit BugMeNot to bypass most of these annoyance. BugMeNot is a free Web site that stored registered user account logins and passwords of most of the websites so you don’t have to provide your personal info.

Open BugMeNot front page, just type in the URL of the website that you’d like access. BugMeNot then will return a list of user names and passwords along with their accuracy percentage.

For Firefox users, BugMeNot provide the extension(download here) that automates these process. Once you’ve installed the extension, you can easily access the website you like by right click on the username or email address text box.

What is a QR Code and How to use it?

Hello Friends, today I am going to share with you about the QR Code.

Have you ever seen this type of sign on any magazine or any product you bought at a shop?

The above is sign is called QR code (QR stands for Quick Response). These signs contain digits (encoded text, data, url) which can be scanned only with devices like Smartphones.

A typical barcode can only hold up to 20 digits where as a QR code can hold up to 7000 numeric characters, which makes it easier to pack more information inside a small QR code. But one thing has to be remembered is that if more information is packed inside it, a sign becomes more dense and hence will require a very sensitive device to scan the data accurately.

The advantages of a QR code is that it can contain a lot of information inside a small box. Which mean you can get a complete information about a product by scanning it’s QR code.

How to scan a QR Code:
To scan, you just need to put your mobile phone n front of this code. Obviously you need a QR code reader in your mobile phones. Download QR Code Reader Here or use the above QR code.

How to create a QR code:

You can create a QR code for your phone number, email address, website or even sms. and print it on a business card or a letter. To crate a QR code visit here

As Smart phones are going to be in the hands of every one within few years, this QR code is going to be more common and would be used for broadly.

New Cell Phone and Computer Attacks

Hello Friends, today i will explain the newest methods of attacks on computers and cell phones. These new attacks focus on bluetooth, SMS and even ipods! They are not only the usual trojans, malware, and phishing attacks. To learn more, read the definitions below;

Smishing or “SMS phishing”:
In computing, Smishing is a form of criminal activity using social engineering techniques similar to phishing.Similarly smishing targets cellular phones.Victim receive an SMS message with a hyperlink wherein a malware automatically finds its way to the cellular phone, or leads the victim to a phishing site formatted for cellular phones.
Example of a smishing message: “Notice – this is an automated message from (a local credit union), your ATM card has been suspended. To reactivate call urgent at 866-###-####.”
In many cases, the smishing message will show that it came from “5***” instead of displaying an actual phone number. This usually indicates the SMS message was sent via email to the cell phone, and not sent from another cell phone.
This information is then used to create duplicate credit/debit/ATM cards that was used halfway around the world, within 30 minutes.

Botnet:
A botnet is a collection of software agents, or robots, that run autonomously and automatically. A Botnet uses any number of internet connected computers that inconspicuously forward e-mails (which include spam, malware, or viruses) to other computers on the internet. These infected computers, also known as “zombies” deliver DoS attacks (Denial of Service) and often rely on thousands of zombie PCs.

Pod Slurping:
It is the act of using a portable data storage device such as an iPod digital audio player to illicitly download large amounts of confidential data by directly plugging it into a computer where the data is held. As these storage devices become smaller and their storage capacity becomes greater, they are becoming an increasing security risk to companies and government agencies. Access is gained while the computer is unattended.

BlueBugging:
It allows a skilled person to illegally access a cellular phone via Bluetooth wireless technology. More often than not, going unnoticed to the phone’s owner. A vulnerability such as this allows phone calls, and SMS messages to be read and sent, phonebook contacts to be erased, phone conversations to be tapped, and other malicious activities. Fortunately, widespread impact is minimized because of the range of bluethooth technology. Access is only attainable within a 10 meter range of the phone.

Ransomware:
It makes a computer unusable, then demands payment in order for the user to regain full access. Ransomware is also commonly referred to as a “cryptovirus” or “cryptotrojan.” First it will disable an essential system service or lock the display at system startup and encrypt some of the user’s personal files. Then prompts the user to enter a code obtainable only after wiring payment to the attacker or urging the user to buy a decryption or removal tool. Ransomware was originally with a trojan called PC Cyborg.

Scareware:
It is a software that tricks computer users into downloading or purchasing it, under the guise of fixing their computer. Scareware programs often run a fictitious virus and malware scan, and then present the user with a list of malicious programs or problems that must be corrected. The scareware informs the computer user that in order to fix these “problems” it will require the user to pay a fee for a “full” or “registered” version of the software. Examples of scareware include: System Security, Anti-Virus 2010, and Registry Cleaner XP.

Sidejacking:
Sidejacking is a hacking technique used to gain access to your website specific accounts. Websites typically encrypt your password so it cannot be stolen, but then send you an unencrypted “session-id”. The session-id is either some random data in the URL, or more often, random data in a HTTP cookie. A hacker who finds the session-id can then use it to gain access to the respective account. Thus enabling the hacker ability to read your email, look at what you’ve bought online, or control your social network account, and so on.

Firefox super speed browsing tricks

Hi friends, today i will share with you the tricks to increase Firefox browsing speed 10 to 30 times. These are 100% tested hacks and improves the browsing speed of Firefox at least 10 times. These tricks are basically the latest tweaks found by several computer experts.

1. Type about:config in the address bar and then press Enter.

2. In the filter search bar type network.http.pipelining. Be sure the value field is set true,if not double-click to set true. HTTP is the application-layer protocol that most web pages are transferred with. In HTTP 1.1, multiple requests can be sent before any responses are received. This is known as pipelining. Pipelining reduces page loading times, but not all servers support it.

<a href=”http://www.bidvertiser.com”>pay per click advertising</a>

3. Go back to the filter search bar and type network.http.pipelining.maxrequests. Double-click this option and set its value to 8.

4. In the filter search bar and type network.http.proxy.pipelining. Once opened doubleclick on it and set it to true.

5. In IPv6-capable DNS servers, an IPv4 address may be returned when an IPv6 address is requested. It is possible for Mozilla to recover from this misinformation, but a significant delay is introduced.
Type network.dns.disableIPv6 in the filter search bar and set this option to true by double clicking on it.

6. CONTENT INTERRUPT PARSING
This preference controls if the application will interrupt parsing a page to respond to UI events. It does not exist by default. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Boolean from the pop-up menu. Then:
A. Enter content.interrupt.parsing in the New boolean value pop-up window and click OK
B. When prompted to choose the value for the new boolean, select true and click OK.

7. Rather than wait until a page has completely downloaded to display it to the user, Mozilla applications will regularly render what has been received to that point. This option controls the maximum amount of time the application will be unresponsive while rendering pages. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Enter content.max.tokenizing.time in the New integer value pop-up window and click OK
B. You will be prompted to enter a value. Enter 2250000 and click OK.

8. CONTENT NOTIFY INTERVAL
This option sets the minimum amount of time to wait between re flows. Right-click (Apple users ctrl-click) anywhere in the about:config window, select New and then Integer from the pop-up menu.
A. Type content.notify.interval in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.

9. CONTENT NOTIFY ON TIMER
A. This option sets if to re-flow pages at an interval any higher than that specified by content.notify.interval. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Boolean from the pop-up menu.
B. Type content.notify.ontimer in the New boolean value pop-up window and click OK.
C. You will be prompted to choose the value for the new boolean. Select true and click OK.

10. Notify Backoffcount
This option controls the maximum number of times the content will do timer-based reflows. After this number has been reached, the page will only reflow once it is finished downloading. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.notify.backoffcount in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 5 and click OK.

11. CONTENT SWITCH THRESHOLD
You can interact with a loading page when content.interrupt.parsing is set to true. When a page is loading, the application has two modes: a high frequency interrupt mode and a low frequency interrupt mode. The first one interrupts the parser more frequently to allow for greater UI responsiveness during page load.
The low frequency interrupt mode interrupts the parser less frequently to allow for quicker page load. The application enters high frequency interrupt mode when you move the mouse or type on the keyboard and switch back to low frequency mode when you had no activity for a certain amount of time. This preference controls that amount of time. Right-click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter content.switch.threshold in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 750000 and click OK.

12. NGLAYOUT INITIALPAINT DELAY
Mozilla applications render web pages incrementally, they display what’s been received
of a page before the entire page has been downloaded. Since the start of a web page
normally doesn’t have much useful information to display, Mozilla applications will wait
a short interval before first rendering a page. This preference controls that interval. Right click (Apple users ctrl-click) anywhere in the about:config window and select New and then Integer from the pop-up menu.
A. Enter nglayout.initialpaint.delay in the New integer value pop-up window and click OK.
B. You will be prompted to enter a value. Enter 0 and click OK.

These simple tweaks will make your web browsing with Mozilla Firefox faster and easier. And I think they are fairly easy to apply. Enjoy!

Watch YouTube videos without breaks on a slower Internet connection

If you’re on a slower internet connection, then watching YouTube videos can be a pain. Frustration and more frustration. In fact, YouTube realizes that this could be a problem, and have alternate methods for you. YouTube has a Feather tool click here that lets you watch YouTube videos on slower connections. It doesn’t include those items that eat up bandwidth and make YouTube videos slower.