Thursday, 14 March 2013

TIPS FOR BLOGGERS


Tips regarding blogging for shopping:
1. Choose a theme for which you have to write about:
The content writer needs to determine a theme for the shopping blog. While he or she is free to blog about any kind of shopping under the sun, it is good if the author selects a particular class. The categories may vary from buying for apparel to buying for electronics. Zeroing in on a specific subject will help in attracting a niche audience who will be involved in most of your blog applications. Informative content will not suffice. The topic desires to percussion instrument up the interest of the people.
2. Select a catchy name for blog:
Choose a memorable name for your shopping blog. A blog with a catchy name like “The Fashion Diva” is more expected to draw readers than a blog called “I like clothes”. Glimpse to it that your blog name reflects the shopping theme that forms the aim of your blog.
Browse the websites for blogs similar to the blog you desire to compose. Proceed through these blogs and find out their strengths and flaws. The content author desires to find out whether there is a specific shopping related theme that is popular and evokes an allotment of consideration. Such topics can include the cyclic latest trend tendencies. You can furthermore select a topic that has not been much highlighted and thus, has the scope of being farther explored.
3. Do some research
This kind of blog writing may furthermore need you to visit trade displays and other events associated to your area of shopping know-how. For instance, fabric shows will help you get well known with the newest fabric tendencies in newest trend. You can use a combine of informative content and images from these displays to drag in your readers and rivet their vigilance.
4. Use of images
Use illustration and photographs to back your shopping considerations. Using images not only apprehensions the vigilance of your readers but also assists you get your issue over.
5. Knowledge
Study is a must for any content writer and should pattern the basis of all informative content. Locate a few shopping-related causes which you can confer on a regular cornerstone for fresh ideas. Fashion publications, for instance, can be a good source for particular types of shopping blogs.
6. Revise your blog content
Revise your blog at normal gaps. Check and cross ascertain your blogs before posting them. Update your blog on the identical day each week so that readers know in accelerate when to visit your blog.

Wednesday, 13 March 2013

How To Protect Your VPS From Hacker Attacks ?


Virtual Private Server
A VPS server is run on a server that is hosted by another computer. The software that is used allows the computer to perform as if it is on a dedicated server. In actuality, many different virtual private server users are on the same server. By sharing a server, users will have the dedicated server options without the price associated with dedicated servers. Protection software needs to be run on the virtual server so hackers cannot attack your web site.
Control of Your Web Site
People are now aware that they want more control over both the front and back ends of their web site. Web owners want to be able to run their own programs and set up everything the way they want. The only way to have full control over the server is to run a VPS solution. Renting out a server box gives you an unmanaged dedicated server in which everything that happens is up to you. You choose the operating system and the security that goes onto the server.
Linux based VPS Protection
Hackers can attack a virtual server the same way they attack a normal server, so protective software must be run the same as if it were a real machine. Before you make your server public, you will want to set up a couple of things for protection. Do not use root access when making changes on the server. With a Linux system you would use sudo, if you are using Ubuntu, then you must use su. Some people also feel safer just to eliminate the root access altogether. Check the security of your folders. Make sure that the public can only see those folders that are intended for their viewing. The only folder that the public should see is the one that contains your web site.
Passwords
User accounts on the Linux server should have strong and intricate passwords. Never use simple words, family or pets names, street addresses or basic words directly out of the dictionary for a password. Using a strong password with a combination of numbers, upper and lower case letters and even special characters will be harder for hackers to break. Your password should also be a minimum of eight characters.
Firewall Protection
Firewalls should be run on the machine to keep your ports protected. Ports are the easiest way for hackers to get into your information. Make sure that all your software including your operating system is upgraded constantly. When your software and operating system is upgraded, your security will also upgrade, giving you the maximum protection on your server. Virtual Private Servers will give the user the power and flexibility that are in dedicated server but cost a lot less. Maintaining the security of your VPS is the most important function that needs to be handled.
Disabling any unneeded services, ports will be closed making it harder for hackers to gain access. The user will also get better performance out of the server when unnecessary programs are closed.

Sunday, 10 March 2013

FACT

OVERFact : 
                   Studies show that Music with a strong beat can stimulate brain waves which improve concentration, even after you’ve stopped listening.

Monday, 4 March 2013

COPY PEN DRIVE TO SYSTEM IN HIDDEN FORM


PEN DRIVE TO SYSTEM

                   We sometime wish that if someone insert his/her pendrive or Dvd Into your pc then its data automatically copy in to your system in hidden Form. There is no need of software in this. we will make it possible with the help of some Dos commands.
lets get started, Follow the below steps.

1. open cmd
3. type copy con filename.bat
3. now type "xcopy 
i: f:\copied /h /s /c /q /i" remove " "
4. type Exit
4. press f6
5. now it will create a batch file named filename.bat


here
xcopy is a command which is used to copy file and folder
i: is the name of your pen-drive drive name replace with your drive name
f:\copied is the name of folder where you wish to copied data is to be placed replace
with your own folder or path
/h is used to copy hidden files also

now copy this file into desktop now whenever someone insert his/her pendrive into your system then click on this file his data is automatically copied into the folder specified by you.

Sunday, 3 March 2013

Get an Email Alert (with Picture) When Someone Tries to Log into your Computer...?


You have a feeling that someone else used your computer (or at least made an attempt to login) while you were out for a quick coffee break. Maybe that colleague with whom you share the cubicle knows your password or he made a few guesses before finally giving up.
How do you get notified when such an attempt is made to intrude into your computer?
Email alert with a webcam picture of the intruder.
A new website (made in Turkey) called MouseLock.co may have a simple solution here. They will send you an email alert as well as a picture of the intruder as soon as someone tries to use your computer.
Here’s how Mouse Lock works.
You sign-in with your Google Account (they’ll send the alert to your Gmail address) and then select a secret pin on the screen. Next, put your mouse cursor in a designated area on the Mouse Lock website and leave the machine.
Now when someone moves the mouse, they will also have to enter the original pin. If they fail to do that in the first few seconds, Mouse Lock will send you an email and, if the computer has a webcam, it will use that to also snap a picture of the intruder.
Mouse Lock won’t prevent the intrusion but will at least notify you the minute it happens. And best of all, this a web app and thus requires no installation.
Internally, the site uses jQuery (mouseLeaveEvent) to detect mouse movements while the webcam photographs are captured using the getUserMedia() API currently supported in Chrome and Firefox. The alerts, possibly due to a bug, are triggered even when any of the keys are pressed and that makes it a little less useful since there’s no way to lock the computer after setting up the monitor.

You Can Accept Your Failure But not Accept Not doing...!


Use gmail via offline

Use Gma¡l ¡n offline connection :
~Login your gmail & follow this steps below~


1. Click Settings and click the Labs tab.
2. Select Enable next to Offline Gmail.
3. Click Save Changes.
4. After your browser reloads,you’ll see a new “Offline0.1″ link in the upper right hand corner of your account, next to your username. 

#Click this link to start the offline set up process and download Gears if you don’t already have it.
When you hit save, Gmail will synchronize new messages you didn’t have downloadedbefore and remove the ones you’re not planning to read from your hard drive.
Thats it, now you can browse your gmail in offline connection!!

Saturday, 2 March 2013

THis is how an Email works?


Top 5 Parental Time Control Softwares


What Does Parental Time Control Software Do?
Protect your child from online dangers and strangers. Internet is very risky for kids to get attracted to games and chats. It’s highly essential for parents to keep an eye on their kids to keep them at right path. Parental time control software will keep kids safe, on task and out of trouble.Parental time control software performs two functions. It controls the amount of time on computers, the internet or games. And it control what users are allowed to do. Parents, libraries, internet cafés, schools and offices can all benefit from parental control software.
Time Control
You can set time limit of computer usage. Example: You can allow your kid to play games in specific hours and rest of the time he/she can continue with their homework.
Program Control
Parents can restrict Adult and Games website. They can even block chat, games, Facebook and other social networking websites.Specific programs like Yahoo Messanger, gtalk and games can be blocked with the use of Parental control softwares.
Top 5 Parental Time Control Softwares
We look at the variety of features available as well as their helpfulness. The top products not only monitor access and time, but also support restrictions on additional items such as programs, games, chat and downloads and provide reporting.

1. KidsWatch Time Control

KidsWatch™ is much more than the best-rated Parental Controls and Parental Control Software solution. It is loaded and preloaded with many optional benefits and features that improve the security and the quality of the Internet your children see. Installing KidsWatch™ on your computer is customizing the Internet, by child, the way you want your kids to experience and use it.

2. iNet Protector

With iNet Protector you can easily restrict internet access at specified times or on demand. You can allow and block websites and limit which programs and features have access to the internet. For example, you can allow only e-mail and and work or study related websites. You can also simply password protect internet connection or set it to be automatically disabled after a specified amount of time.

3. ENUFF PC         

ENUFF PC was the first computer timer of its kind to be developed and introduced 12 years ago. It was constantly updated and it remained the world’s best for over 8 years.

4. ComputerTime

ComputerTime was designed specifically to reduce the aggravation and concern that parents have having over their children’s computer use.

5. iProtectYou

Internet filtering and parental control software, gives you the ability to control and monitor your child’s use of the Internet, irrespective of where you are: in the neighboring room, at work, or even on vacation, thus enabling you to protect your child from the dangers of the Internet.
Keep your kids protected from Internet treats

UNLOCK MODEM TO USE OTHER SIM CARDS


UNLOCK MODEM TO USE OTHER SIM CARDS



As you must be knowing that we cannot use any simcard in any modem unless you unlock the modem. but in this article we will see how to use Any SIM in any MODEM without unlocking it.


You will need Nokia PC suite for this Trick.
follow the below steps:
1.  Insert the sim card in the modem which you want to and connect it to your PC.
2. IT will show you invalid sim, but dont worry just ignore that message
3. Open Nokia PC suite
4. You will find connect to internet option in Pc suite, click on it.
5. Now you have to configure so select configure, select your data card
     modem and do all operator apn setting which you use in nokia mobile connection.
6. Finally finish the setup and connect to internet  through PC suite.


Now 

your net is connected without unlocking

Friday, 1 March 2013

HOW TO REMOVE VIRUSES IN PENDRIVE WITHOUT ANTI-VIRUS SOFTWARE

Here are some simple steps to tackle a situation where you have pen drive infected with virus and you are afraid to insert it into a clean PC. This works in a situation where your antivirus is not updated and does not have ability to tackle latest virus that may infect. This is a way to avoid infection from virus as we are stopping the virus from executing itself.

1.      First of all, we should modify files and folders setting to show hidden files.
2.      Now uncheck the "Hide extension for known files" option to show the extension of files, so that we can decide which type of we are dealing with.
3.      Uncheck the ‘hide protected operating system files' option. This is because most of the virus scripts will be configured to hide and are created as system files.
4.      Do not open the pen drive by double clicking on the "removable drive" icon, as the script will be written in such a way that the virus is executed by opening the drive by double clicking it. Even the "right click and open" option can execute virus, so alternatively you can open the drive by using the drop down menu from the address bar of your explorer.
5.      After entering into the drive, delete the "autorun.inf" file if present, and delete files you suspect to be viruses that are not added by you, identifying them is easy as they will be having negligible file size (usually in kbs) and have extensions as .com, .bat, .exe.
6.      At last, remove your pen drive and reconnect it.
Most of the viruses are .exe (executable files), .bat (batch files). They are set to execute using shell script which is written in "autorun.inf" present in infected pen drives. We can even see the shell script code by opening this "autorun.inf" file.