• Do not get into net through internet

    ALLAHABAD: Three fresh cases of internet fraudwere registered in Colonelganj and Civil Lines police stations in last five days.  With an increase in the number of cyber crime cases, police have asked net lovers to be cautious, while accessing their mails, especially if they get a...
  • How to become a hacker

    Certainly there are many sources of information available that can give you computer hacking basics. There is actually some misconception about who a real hacker is. Hacking computers is performed by one who knows computers very well - even the extra tricks of a computer and electronics....
  • 10 tips to succeed in IT

    Everyone seems to agree that IT is a tough field. But what does it take to overcome the adversities and become a successful IT pro? These qualities may be the key. I recently wrote a string of articles discussing various reasons to leave IT — and various alternative careers for dissatisfied IT...
  • Sql Commands

    ABORT -- abort the current transaction ALTER DATABASE -- change a database ALTER GROUP -- add users to a group or remove users from a group ALTER TABLE -- change the definition of a table ALTER TRIGGER -- change the definition of a trigger ALTER USER -- change a database user account ANALYZE --...
  • How to know ur friends IP while chatting

    Hi guys many of us want to hack our friend pc. so we need to get their IP adress in order to hack him.once if we got his IP adress we can easily hack his pc.so in this post i am telling how to get the IP adress of friend while chatting. IP is an address used by a person to connect to the internet....
  • Start Recieving Checks Weekly!!!!

    Yeah its true !!!! You can start recieving checks weekly . Simply join us and start your earnigs!!!! U CAN JOIN US:* If u are student* If u are graduate* If u are jobless* If u are profetional* If u are web developer* If u want to start your buissness. No basic skill or knowledge is...

Friday, February 25, 2011

Bullies are now taking advantage of technology to intimidate and harass their victims. Dealing with cyberbullying can be difficult, but there are steps you can take.  What is cyberbullying?Cyberbullying refers to the new, and growing, practice of using technology to harass, or bully, someone else. Bullies used to be restricted to methods such as physical intimidation, postal mail, or the telephone....
Remember that the internet is a public resource. Avoid putting anything online that you don't want the public to see or that you may want to retract.  Why is it important to remember that the internet is public?Because the internet is so accessible and contains a wealth of information, it has become a popular resource for communicating, for researching topics, and for finding information about...
In order to study the comparison the between the hackers and crackers, it is important to understand the respective definitions. While apparently the words hacking and cracking seems synonymous, yet there exist certain points of distinctions between the two and the meaning of the words will always be heated topics of debate. Since the very dawn of the civilization, man's hunger to attain the unattainable...
Many of the warning phrases you probably heard from your parents and teachers are also applicable to using computers and the internet.  Why are these warnings important?Like the real world, technology and the internet present dangers as well as benefits. Equipment fails, attackers may target you, and mistakes and poor judgment happen. Just as you take precautions to protect yourself in the real...
When there are multiple people using your computer and/or you store sensitive personal and work-related data on your computer, it is especially important to take extra security precautions.  Why isn't "more" better?Maybe there is an extra software program included with a program you bought. Or perhaps you found a free download online. You may be tempted to install the programs just because you...
There are some simple habits you can adopt that, if performed consistently, may dramatically reduce the chances that the information on your computer will be lost or corrupted.  How can you minimize the access other people have to your information?You may be able to easily identify people who could, legitimately or not, gain physical access to your computer—family members, roommates, co-workers,...
There are some common myths that may influence your online security practices. Knowing the truth will allow you to make better decisions about how to protect yourself.  How are these myths established?There is no one cause for these myths. They may have been formed because of a lack of information, an assumption, knowledge of a specific case that was then generalized, or some other source. As...
Many people browse the Internet without much thought to what is happening behind the scenes. Active content and cookies are common elements that may pose hidden risks when viewed in a browser or email client.  What is active content?To increase functionality or add design embellishments, web sites often rely on scripts that execute programs within the web browser. This active content can...
Recognizing and Avoiding Spyware Because of its popularity, the internet has become an ideal target for advertising. As a result, spyware, or adware, has become increasingly prevalent. When troubleshooting problems with your computer, you may discover that the source of the problem is spyware software that has been installed on your machine without your knowledge. What is spyware?Despite its name,...
Using anti-virus and anti-spyware software is an important part of cyber security. But in an attempt to protect yourself, you may unintentionally cause problems.  Isn't it better to have more protection?Spyware and viruses can interfere with your computer's ability to process information or can modify or destroy data. You may feel that the more anti-virus and anti-spyware programs you install...
What is an ISP?An ISP, or internet service provider, is a company that provides its customers access to the internet and other web services. In addition to maintaining a direct line to the internet, the company usually maintains web servers. By supplying necessary software, a password-protected user account, and a way to connect to the internet (e.g., modem, phone number), ISPs offer their customers...
Passwords are a common form of authentication and are often the only barrier between a user and your personal information. There are several programs attackers can use to help guess or "crack" passwords, but by choosing good passwords and keeping them confidential, you can make it more difficult for an unauthorized person to access your information.  Why do you need a password?Think about the...
Attackers are continually finding new ways to access computer systems. The use of hidden methods such as rootkits and botnets has increased, and you may be a victim without even realizing it.  What are rootkits and botnets?A rootkit is a piece of software that can be installed and hidden on your computer without your knowledge. It may be included in a larger software package or installed by...
Normal 0 MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times...
Normal 0 MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times...
Normal 0 MicrosoftInternetExplorer4 /* Style Definitions */ table.MsoNormalTable {mso-style-name:"Table Normal"; mso-tstyle-rowband-size:0; mso-tstyle-colband-size:0; mso-style-noshow:yes; mso-style-parent:""; mso-padding-alt:0in 5.4pt 0in 5.4pt; mso-para-margin:0in; mso-para-margin-bottom:.0001pt; mso-pagination:widow-orphan; font-size:10.0pt; font-family:"Times...
The popularity of social networking sites continues to increase, especially among teenagers and young adults. The nature of these sites introduces security risks, so you should take certain precautions.  What are social networking sites?Social networking sites, sometimes referred to as "friend-of-a-friend" sites, build upon the concept of traditional social networks where you are connected to...
Spam is a common, and often frustrating, side effect to having an email account. Although you will probably not be able to eliminate it, there are ways to reduce it.  What is spam?Spam is the electronic version of "junk mail." The term spam refers to unsolicited, often unwanted, email messages. Spam does not necessarily contain viruses—valid messages from legitimate sources could fall into this...