Friday, 27 March 2015

Google Dashboard shows you every device accessing your account

google
Google Dashboard shows you every device accessing your account
Email hacking is a problem that won't be going away anytime soon. But if you're diligent and take the proper precautions, you can significantly minimise the chances someone bad will be able to get into your account. Google wants to help too. The company has a new tool that lets you easily check when and where your account has been accessed over the last month to make sure nothing unusual is happening.
The Devices and Activity Dashboard lists what devices are connected to your Google Account, along with when and where they've been accessed. The list stays up to date for the past 28 days. If a new device recently began accessing your account, "New" is stationed in all caps next to the product listing. The device you're currently using with your Google account is listed at the top.
If you notice something suspicious, like a new Mac accessing your account when you only own PCs, you can click "Secure your account" to change your password, update your recovery information, check app passwords and account permissions, or check your two-step verification settings. (If you don't have two-step verification set up, now is a very good time to do so.)
In Gmail, you can also check recent account activity the old fashioned way. At the bottom right of your inbox or any open email, beneath "Last account activity" you can click "Details" to see when and where your account has been accessed. There, you can also sign out other active sessions besides the one you're currently using.

Wednesday, 18 March 2015

Send money through Facebook

facebook
Send money through Facebook
Facebook's Messenger app will soon let you send your friends money, the latest in a crowded field of services aimed at an increasingly wireless and cashless generation.
Services including PayPal, its Venmo unit and the disappearing-photo app Snap chat let you beam money to friends and family using smartphones linked to bank accounts or credit cards.
Facebook's entry, announced on March 17, is free, works with debit cards and is available on Apple and Android mobile devices and on desktop computers.
The world's largest social network will process the payments and emphasized the service's security features.
Facebook will likely expand internationally after the service becomes available to US users over the coming months.
To send money, Messenger users can tap a new "$" icon that's next to the buttons that let you send photos, stickers or a thumbs up sign. Then, enter the amount you want to send, tap "pay" on the top right corner and enter your debit card number. To receive money for the first time, enter the card number.
Once you add your card number, you can create a pin code that you will need to enter the next time you want to send money. On Apple devices that have Touch ID, you can enable this instead and authorize transactions using your fingerprint.
To help allay concerns about security, Facebook noted that it handles more than a million payments transactions on its site every day for its advertisers and game players.

Monday, 16 March 2015

Blog different from a Regular website

website-vs-blog.1
Blog different from a Regular website

How is a Blog different from a Regular website ?

Many people are confused about the difference between a blog and a website. There isn’t any difference, a blog resides on a website. A business website includes their aim or mission, their contact details, information about products or services. This information isn't updated very often and this is what we call a website is. A company might have a blog on the website that talks about the latest news, job openings, special events or other items of interest. This part of the site might be updated daily or weekly, though it’s a blog, it’s part of the rest of the website.
  • A blog is a way to publish to the Internet frequently like sending an email. But a website require technical skills.
  • A blog is updated frequently, with chronologically-ordered, dated posts.  A website is frequently static information, and the order and sequence depends on the purpose of the site.
  • A blog is written in a personal voice A website's text has the whole teams in the marketing department analyzing every word and link on the home page altogether technical.
  • A blog allows the audience to interact - so they can post comments to your individual posts, and link from their blog to your posts.  This allows a conversation to occur between the writer and the audience.
  • With a blog the content is distributed much more broadly than on a website.  In a blog, the content is separate from the formatting it means it decouples the “content from the “presentation”. A blog is encapsulated in its own message envelope (extension of XML called RSS “Really Simple Syndication”) that can be read by other sites on the Internet.  When I publish something on Internet using a tool that supports RSS, and anyone searching for the related article can automatically receive my release on their site.
  • In a website the content and presentation would be coded all together. A website requires Google promotion which will take...2-3 weeks to come on top!  On a blog, it's a few minutes.
  • You tend to get better search engine results with a blog because of “content syndication, frequent posts, linking from other sites” which the Google's algorithm require for better listings.
  • You can keep up with hundreds of blogs much more efficiently than hundreds of websites.  Because of the RSS feature, you can monitor many blogs by syndicating them, and automatically receive updates whenever their website changes on your PC.

Saturday, 14 March 2015

WhatsApp Voice Calling

whats-app-call
WhatsApp Voice Calling

How to enable WhatsApp Voice Calling ?

One of the big new features that WhatsApp has been working on lately is voice calling (VoIP), similar to Skype, Viber, and several other major players in the game. Both the iOS and Android apps are currently in a transitional period, at the end of which, they’ll each support free VoIP calls, but with Android version slightly ahead of its iOS counterpart in terms of development progress, Droid users can now enable the new feature in just a couple of easy steps. Below, we've got the full details in a how-to tutorial.
VoIP (voice over IP) hasn't been officially rolled out to the masses on Whats App for Android, but it is buried within the very latest build, and if you’d like to check it out then the steps are below.
Before you dive in, there are a couple of things to consider. First and foremost, since WhatsApp hasn't officially offered this out to everyone, it could, and probably will, have its fair share of bugs and imperfections. As VoIP is made available to all WhatsApp users, it’ll surely improve, but at this stage, don’t rely on it.
Also, as we have heard from beta testers, call quality is apparently not the best, so again, it’s not a service that you’ll want to rely on right now. Some early users have reported grainy coverage, but with time, things should get better.
Before you start, you will also require the assistance of another Whats App user.

So, with that out if the way, here’s what you need to do:

Step 1: Grab the latest version of Whats App for Android (2.11.561) from the Play Store.
WhatsAp
Whats App Voice Calling
Step 2: Ask a user who has the feature call you through Whats App. You might have to ask friends of friends or associates, but as it spreads, more and more people will be able to get in on the act.
voice-call
WhatsApp Voice Calling
Step 3: After receiving your call, shut Whats App down and then re-open it.
Step 4: Check out the new tab for calls. From here, you can call your buddies over VoIP, and the more people you call, the more it will spread.
whatsapp-new-tab
WhatsApp Voice Calling

How to enable WhatsApp voice calls (with root):

In case none of this is still working for you, there is another way for rooted users to force the feature onto their phones, but it is a bit of a pain, as you’ll need to be connected to your PC and open a terminal every time you want to Whats App call someone (until it is enabled permanently for you).
Just open a terminal emulator and enter the following command:
su -c am start -n com.whatsapp/com.whatsapp.HomeActivity
Terminal-Emulator
Enable Whats App voice calls (with root

Friday, 13 March 2015

Basic Security for Computers and Other Electronic Devices

security
Basic Security for Computers and Other Electronic Devices
The software on computers and other electronic devices must be set up and maintained to help protect the data and the computer. Basic Security for Computers and Other Electronic Devices requires:
  • Authentication (Password, Pass phrase or other strong authentication)
  • Configuration
  • Firewall
  • Use of Flash drives
  • Anti-Virus Protection
  • Security Patches

Authentication (Password, Pass phrase, M Key or other strong authentication):

  • Password or pass phrase must be used for all devices and software supporting authentication, unless using a higher level of authentication (e.g. M Key).
  • Must be eight or more characters long. Longer passwords are better.
  • Must be periodically changed as required by each system, but at least annually.
  • Must contain a minimum of three types of characters (lower case, upper case letters, numbers, special characters).
  • Unique user accounts and  passwords must be managed to a security level appropriate for the system, based on the data stored or accessed through them.
  • A password is required upon resuming use from an inactive state (Hibernation, Sleep, Screen Saver) to prevent unauthorized access when unattended.
  • Password protected Screen Saver must activate within a maximum of 30 minutes of inactivity.
  • The desktop/laptop computers must be logged off when not in use during non-work hours.

Configuration:

There should be restrictions in accessing the computer. The account should be divided with the user and the administrative rights.
  • Access to an account with administrative level privileges for desktop/laptops must only be provided to the senior level. Such administrative access must be approved annually in writing by the supervisor. Use of the administrative level account must be limited to those actions which require administrative access.
  • A separate standard user level account must be used for daily tasks such as email and web surfing.

 Use of Firewall:

  • A firewall puts a protective barrier between your computer and the Internet. Turning it off for even a minute increases the risk that your PC will be infected with malware.
  • A software firewall, hardware firewall or other network filtering (e.g. port or IP address filtering) technology must be used to help protect the computer/device while on the network.
  • Desktops and laptops should use the operating systems built-in or other software firewall.

 Use flash drives cautiously:

Minimize the chance that you'll infect your computer with malware:
  • Don't put an unknown flash (or thumb) drive into your PC.
  • Hold down the SHIFT key when you insert the drive into your computer. If you forget to do this, click   in the upper-right corner to close any flash drive-related pop-up windows.
  • Don't open any files on your drive that you have not expected to see.

 Anti-Virus Protection:

Computers are required to maintain and use an up-to-date version of anti-virus software (or virus filtering software for Unix). Other electronic devices are required to use anti-virus protection, if available.
Minimum Configuration for Anti-Virus Software should be:
  • Live Update should be enabled
  • Live Update Schedule Frequency should be on daily basis.
  • File System Real Time Protection is enabled 

Security Patches:

Operating systems and application programs have periodic security patches released by the vendor that need to be installed. Installation of newer versions of the operating system or application program may be needed.
  • Software applications, whether installed by a user with access to the administrative level privileges or technical support staff, must be maintained.
  • Patching for designated high risk software applications is required as soon as possible but not more than 30 days after availability from vendor.
  • All other operating system and application program security patches/updates must be installed as soon as possible but not more than 30 days after release by the vendor.
  • Desktop and laptop computers must have automatic updates enabled  for the operating system.

Some free protections are available to secure your computer against malware:

Build up your computer's defenses:

Install antivirus and anti spyware programs from a trusted source.
  • Never download anything in response to a warning from a program you didn't install or don't recognize that claims it will protect your PC or offers to remove viruses. It is highly likely to do the opposite.
  • Get reputable anti-malware programs from a vendor you trust.
  • Windows 8 includes antivirus protection called Windows Defender. It’s turned on by default.
  • If your computer is not running Windows 8, download Microsoft Security Essentials for free.
  • Choose security software that is compatible with Windows 7.

Update software regularly:

Cyber criminals are endlessly inventive in their efforts to exploit vulnerabilities in software, and many software companies work tirelessly to combat these threats. That is why you should:
  • Regularly install updates for all your software—antivirus and anti spyware programs, browsers (like Windows Internet Explorer), operating systems (like Windows), and word processing and other programs.
  • Subscribe to automatic software updates whenever they are offered—for example, you can automatically update all Microsoft software. Windows 8 and Windows 7 turn on automatic updating during installation.
  • Uninstall software that you don't use. You can remove it using Windows Control Panel.

Use strong passwords and keep them secret:

  • Strong passwords are at least 14 characters long and include a combination of letters, numbers, and symbols. Learn more about how to create them.
  • Don't share passwords with anyone.
  • Don’t use the same password on all sites. If it is stolen, all the information it protects is at risk.
  • Create different strong passwords for the router and the wireless key of your wireless connection at home. Find out how from the company that provides your router.
  • Use our password checker.

Don't be tricked into downloading malware:

  • Be cautious in  opening an attachment or clicking a link in an email, instant message, or post on social networks (like Facebook)—even if you know the sender. Call to ask if a friend sent it; if not, delete it or close the IM window.
  • Avoid clicking Agree, OK, or I accept in banner ads, in unexpected pop-up windows with warnings or offers to remove spyware or viruses, or on websites that may not seem legitimate.
  • Instead, press CTRL + F4 on your keyboard to close the window.
  • If the window doesn't close, press ALT + F4 on your keyboard to close the browser. If asked, close all tabs and don’t save any tabs for the next time you start the browser.
  • Only download software from websites you trust. Be cautious of "free" offers of music, games, videos, and the like. They are notorious for including malware in the download.
  • Take advantage of technology—such as Windows Smart Screen in Windows 8—designed to help protect you from new virus.










Wednesday, 11 March 2015

Hide and convert exe into jpeg

How to hide and convert exe into jpeg ?

  1. Firstly, create a new folder and make sure that the options ‘show hidden files’ is checked and ‘hide extensions for known file types’ is unchecked. Basically what u need is to see hidden files and see the extension of all your files on your pc.
  2. Paste a copy of your server on the new created folder. let’s say it’s called server.exe (that’s why you need the extension of files showing, cause you need to see it to change it).
  3. Now you’re going to rename this server.exe to whatever you want, let’s say for example picture.jpeg
  4. Windows is going to warn you if you really want to change this extension from exe to jpeg, click YES.
  5. Now create a shortcut of this picture.jpeg in the same folder.
  6. Now that you have a shortcut, rename it to whatever you want, for example, me.jpeg.
  7. Go to properties (on file me.jpeg) and now you need to do some changes there.
  8. First of all delete all the text on field START IN and leave it empty.
  9. Then on field TARGET you need to write the path to open the other file (the server renamed picture.jpeg) so u
    have to write this: C:WINDOWSsystem32cmd.exe /c picture.jpeg
  10. The last field, c picture.jpeg is always the name of the first file. If you called the first file soccer.avi you gotta write C:WINDOWSsystem32cmd.exe /c soccer.avi got it?
  11. So what you’re doing is when someone clicks on me.jpeg, a cmd will execute the other file picture.jpeg and the
  12. server will run.
  13. On that file me.jpeg (shortcut), go to properties and you have an option to change the icon. click that and a
    new window will pop up and u have to write this: %SystemRoot%system32SHELL32.dll . Then press OK.
  14. You can set the properties HIDDEN for the first file (picture.jpeg) if you think it’s better to get a connection
    from someone.
  15. But don’t forget one thing, these 2 files must always be together in the same folder and to get connected
    to someone they must click on the shortcut created not on the first file. So rename the files to whatever you want considering the person and the knowledge they have on this matter.
  16. For me for example I always want the shortcut showing first so can be the first file to be opened.
    So I rename the server to picture2.jpeg and the shortcut to picture 1.jpeg. This way the shortcut will show up first.
  17. If you set hidden properties to the server (picture.jpeg) then u don’t have to bother with this detail but I’m warning you, the hidden file will always show up inside of a zip file or rar. So the best way to send these files together to someone is compress them into zip or rar. I
  18. Inside the RAR or ZIP file you can see the files properties and even after all this work you can see that the
    shortcut is recognized like a shortcut but hopefully the person you sent this too doesn’t know that and is going to open it.
 
 

Monday, 9 March 2015

Hide File Behind Image

Hide-file
Hide File Behind Image

How To Hide File Behind Image ?

  1. Select an image to be used for hiding file behind the image.
  2. Now select a file to hide behind the image and make it in .RAR format. With the help of the WinRAR.
  3. And most important is that paste both the files on desktop. You may do this anywhere instead of desktop if you have some basic understanding of command line.
  4. Now open cmd by going to Start > Accessories > Command Prompt and type following commands in it.
cd-desktop
Hide File Behind Image








5. CD stands for change directory by typing above command you change your directory to desktop. After that type command given below.
 Copy /b imagename.jpg + filename.rar finalimage.jpg
change-directory
Hide File Behind Image









  • Replace imagename.jpg with the name of image you want your file to be hidden behind. Don't forget to add image format (Eg: .jpg,.png,.gif)
  • Replace file name with name of your file you want to hide. It must be in .rar format.
  • Finally Replace finalimage.jpg with whatever name you want your finalimage with hidden files should be. This is the image where your file will be hidden.
6. Now when you will try to open this newly created image it will open as normal image, but to open you hidden file you need follow steps given below.

How To Access Hidden File ?

To access your hidden file you need to open the newly created image in winrar. Just follow simple steps given below to do that.
 
    1. Open 
winrar
winrar
    2. Now locate your image and open it or simply drag your image in winrar.
    3. Extract the file and done.
winrar-Extract-File
Extract the file