Saturday, February 18

Protect your Facebook account from getting Hacked

Hi friend, Here I'm posting  some ways to Protect your Facebook account from getting Hacked.
Protect your Facebook account from getting Hacked:
1.Use Strong Passwords:In order to keep your Facebook account From Getting Cracked with a Brute force,Dictionary or Rainbow tables you need to keep Strong password usually more than 10 letters or else it will be damn easy for the Hacker to Hack a Facbebook password..

2.
Use Phishing filter:Phishing filter is a sheild which protects you from Fake login pages,These fake login pages are made to steal your passwords and Phishing filter will prevent you from logging into these kinds of pages..

3.
Use a good Antivirus and Antispyware: Yes,this is the most crucial step in all the above mentioned,It is highly recommended that you use a Good antivirus and antispyware program,I would recommend Kaspersky as an antivirus and as an spyware spyware cease and dont forget to update them regularly,Remember one trojan takes it all..


4.
Use a Good antiloggerAntilogger is a program which lets you know if a keylogger is present on your computer,Keylogger is a spyware program which helps you track of what is happening on your Computer..

5.
Use a Good Firewall:
If you want to prevent a Hacker to enter in your Computer and Hack your Facebook password than you must use a good firewall,I personally Recommend Zonealaram firewall.Firewall is a Hindrance in Hacking,A hacker may bypass antivirus but its very difficult for a Hacker to bypass a Firewall..



Hope Methods will help you to prevent your Facebook account from getting hacked,It is highly recommended that you must follow all the above Methods to ensure maximum security.. :)



‎Four ways to hack the fb id..


1. Facebook phishing
2. Keylogging
3. Social engineering
4. Primary email address hack


1 Facebook phishing:


I have taken this method first because i think this is the most popular method/way of hackingfacebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebookPhishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose..


2 Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password..


3. Social engineering:


This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on orkut and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engg is. For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic..


4.Primary email address hack


If Facebook hacker, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this Facebook hacker can easily hack your Facebook password using "Forgot password" trick. He will simply ask Facebook to send password reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and orkut account hacked.. !!!

There has some other metods for hacking..
Stealers
Session Hijacking
Sidejacking With Firesheep
Mobile Phone Hacking
DNS Spoofing
USB Hacking
Man In the Middle Attacks
Botnets

etc..


Assume  your Facebook Account  is Hacked!!! What to do now..??
It would be a Nightmare for anyone whose Facebook account gets Hacked,He would wonder How to get back his Hacked Facebook account,In this article i will tell you some methods through which you can Regain your Hacked Facebook account..

Steps to take when your Facebook account gets Hacked:

1.Reset Facebook Password with Secondary email address:When ever you sign up for a Facebook account,they ask for your Secondary email address,In case if you loose your Password you can reset it with your Secondary email address..


2.Secret Answer:
Yes you can also reset a Facebook password with a Secret Answer which you provided to the Facebook while Signing up For a Facebook account..

3.Contacting Facebook:
Lastly if Hacker has changed your Secondary Email address and Secret Question then you have only one way left i.e. Contacting Facebook team for the issue..!!!!! :)



HOPE THIS POST WAS HELPFUL TO YOU..
POST YOUR COMMENTS HERE..!!!!!



Friday, January 27

Results- SSC CHSL - Combined Higher Secondary Examination


Hello,

SSC (STAFF SELECTION COMMISSION ) has announced the results for Combined Higher Secondary Examination (CHSL) held on 4th&11thDecember 2011 for recruitment to the post of Data Entry Operators and Lower Division Clerks at various centers all over the country.

To see the results for LDC category  CLICK HERE..!!!

To see the results for DEO category  CLICK HERE..!!!


If you have any doubts or queries, feel free to comment it here.!!!
Anyway, all the important details regarding results are provided below.


 Totally, 20168 candidates qualified provisionally for typing test for LDC and 10639 candidates for skill test for DEO in the written part of the examination and are thus eligible to be called for Type Test/ Data Entry Tests subject to their fulfilling all eligibility conditions and also correctness of the information furnished by them in their application.


1. Candidates qualified for Typing Test for LDC


Note: The number of UR candidates shown in above table, 3494 OBC, 447 SC and 69 ST candidates are provisionally qualifying at cut-off fixed for UR candidates subject to fulfilling the age limit for UR candidates.


2. Candidates qualified for Skill Test for Data Entry Operator


Note: The number of UR candidates shown in above table, 2253 OBC, 275 SC and 40 ST candidates are provisionally qualifying at cut-off fixed for UR candidates subject to fulfilling the age limit for UR candidates.

3. The above said lists are purely provisional and subject to the recommended candidates fulfilling all the eligibility conditions prescribed for the respective post in the Notice of Examination and also subject to thorough verification of their identity with reference to their photographs, signatures, hand writings, etc., on the application forms, admission certificates, etc. The candidature of the candidates are liable to the canceled by respective Regional Directors in case candidates are found not fulfilling the eligibility conditions or any other genuine reasons including but not limited to resorting to unfair means.

4. For candidates belonging to reserved categories for whom certain percentage of vacancies are reserved as per Government Policy, the category status is indicated against their Roll Numbers. It is important to note that some of these candidates have been declared qualified only for the category mentioned against their Roll Numbers. If any candidate does not actually belong to the category mentioned against his/her name, he/she may not be eligible to be included in the list. It is, therefore, in the interest of the candidates concerned to immediately contact the respective Regional Office of the Commission in all such cases where they do not belong to the category shown against their Roll Numbers. Candidates whose names and Roll No. do not match should also bring such mismatch to the notice of the concerned regional offices for detailed examination.

5. Schedule for holding the Type Test/Data Entry Skill Test on computers will available on Commission’s website shortly. In this connection, the following points are brought to the notice of the candidates.

Skill Test for Data Entry Operator :

a) The Skill Test will be taken on computers.

b) The ‘Data Entry Speed’ Skill Test would be qualifying in nature. Candidates allowed to take this test, will have to qualify the test at the prescribed speed on computer, to be provided by the Commission or the agency authorized by the Commission to conduct such skill test at the centre/ venue so notified.

c) None of the candidates including PH candidates who qualify in the written part of the examination will be exempted from the skill test as passing of the skill test is pre-condition and one of the essential qualification for appointment to the post of Data Entry Operator.

d) Only such candidates who qualify in the skill test at a speed of not less than 8,000 key depressions per hour will be eligible for being recommended for appointment as per their position in the merit list.

e) The duration of the said skill test will be 15 (fifteen) minutes and printed matter in English containing about 2,000 – 2,200 strokes/ key depressions would be given to each candidate who would enter the same in the computer.


Skill Test of LDC

a) The Skill Test will be taken on computers.

b) Typing test will be qualifying in nature and will be conducted only in English or in Hindi.
English Typing @ 35 w.p.m. (Time allowed 10 minutes) (30 minutes for VH candidates)
Hindi Typing @ 30 w.p.m. (Time allowed 10 minutes) 30 minutes for VH candidates).
(35 w.p.m. and 30 w.p.m. corresponds to 10500 Key Depressions Per Hour/ 9000 Key Depressions Per Hour on an average of 5 Key Depressions for each word).

6. Representations received from candidates about incorrect Question and their Answer in the question papers used by the Commission in this examination have been carefully examined and marks moderated suitably.

7. Regional Offices will verify the options of the candidates in the two lists with reference to their applications. Before calling them for the skill tests candidates who have not exercised options for any posts have been considered for all posts. This, however, will not confer any right on them for selection, as the Commission follows the policy of considering candidates who have exercised option for inclusion in the select list and if any surplus vacancies are available, reserve list is prepared for considering candidates who had failed to exercise options.




If you have any doubts or queries, feel free to comment it here.!!!

Sunday, January 22

Get a search engine in your own name..!!!!


Hi friend,


In this post I will tell you about a facebook application that can generate a search engine in your own name. Just imagine, a search engine that can respond to all your queries , with google outlook, and with your cute name.. Wow.. great.. isn't it???






You too can make a search engine like this in simple steps.
But,you need a facebook account as it is a facebook application.


Go to   http://apps.facebook.com/mynamesearch/
Follow a few steps.
That's it..!!!!!!!  :)




Did you like this trick??
Comment your response here..


Thanking you!!!!!

Saturday, January 21

Convert Decimal Number to Binary Equivalent Using Linked list - C




Hi friends,


          In this post I'll explain "how  to convert a decimal number to binary equivalent using Linked list". Usually, we use array for this purpose, but arrays are created statically and memory wastage  may occur. Linked list is a  perfect solution for this as it is created dynamically and no there is no wastage of memory also.!!!!






Algorithm




  1. Initialize PREV_NODE and NODE as NULL.
  2. Input a number 'num'.
  3. if num<=0 go to step 9
  4. PREV_NODE=NODE
  5. add (num%2) to NODE->number
  6. NODE->next=PREV_NODE
  7. num=num/2
  8. go to step 3
  9. if NODE is NULL go to 13
  10. print NODE->number
  11. NODE=NODE->next 
  12. go to step 9
  13. End






The complete code in C is given here:




#include<stdio.h>


struct binary {
       int num;
       struct binary *next;
       };


struct binary* add( struct binary **curr, int n)
 {
  
   struct binary *temp;
   temp=(struct binary *)malloc(sizeof(struct binary));
   temp->num=n;
   temp->next=*curr;
   return temp;
      
 }
       


int main()
{
     int number, binary_num;
     struct binary *head= NULL;
     printf("ENTER A DECIMAL NUMBER  :   ");
     scanf("%d",&number);
     
     while(number>0)
     {
     binary_num=number%2;
     head =add(&head,binary_num);
     number/=2;
     }
  printf("EQUIVALENT BINRY NUMBER IS   :   ");  
  for(;head!=NULL;head=head->next)
     printf("%d",head->num);


}










Friends, I hope this post will be useful to you..!!!
Your valuable suggestions are always welcomed..!!!!Comment it here.!!


How to Remove Shortcut Arrow on Desktop Icons in Windows 7




Howdy guys,

It is true that sometimes the arrow present in shortcut icons seem irritating, especially when they are on your cute desktop.  In this post, I'll explain how to Hide and Remove Shortcut Arrow from Desktop Icons and Other Icons.

1.Run Registry Editor (RegEdit).
2.Navigate to the following registry key:  HKEY_CLASSES_ROOT\lnkfile

3.Delete the IsShortcut registry value in the right pane. 
  Tip: It’s also workable to just rename the IsShortcut registry entry to another name, such as IsNotShortcut.

4.Some other type of documents and files may be shortcut arrow on their icons too. To remove the shortcut arrow overlay image on these icons, navigate to each of the following registry keys, and then repeat step 2 and step 3 above to deactivate the shortcut arrow: 
HKEY_CLASSES_ROOT\piffile
HKEY_CLASSES_ROOT\ConferenceLink
HKEY_CLASSES_ROOT\DocShortCut
HKEY_CLASSES_ROOT\InternetShortcut
HKEY_CLASSES_ROOT\WSHFile

5.Exit from Registry Editor.

6.Logout and login again or restart Explorer for the change to take effect.


Note : Please note that in some cases deactivating the arrow for *.LNK files might lead to duplicate items in the Explorer context menu, as in essence, removing the “IsShortcut” effectively forces Windows to treat the shortcut as real hard file. In Windows 7, it may also cause error such as unable to pin shortcut to Taskbar or Start Menu. To avoid these issue, use another workaround to remove shortcut arrow.


Do you know, every SIM CARD has a name ?? Try this !! 1st step : from your number take the last ... 3 numbers, ex :: 050995567, take "567"only 2nd step: do this @*[567:0] 3rd step : remove the sign * And press enter in the comment box! :P



Do you know, every SIM CARD has a
name ??
Try this !!

1st step : from your number take the last
... 3 numbers, ex :: 050995567, take
"567"only

2nd step: do this @*[567:0]

3rd step : remove the sign *

And press enter in the comment box! :P



Hi friend, 

This is one of the widespreading rumour in facebook that every sim card 
has its own name. Is it true??? How on doing this cute name appears? Dude, I will explain in this post what is actually  behind this magic.



First of all, your SIM card has no name at all..!!!!!! Then, how this magic happens? 

Lets have look.

1. For every facebook account, there will be a unique number associated it as identification number.  (Mark Zuckerberg was the first person to open a facebook account  and he chose profile id number as 4..!!! Why he didnt chose 1 as starting number?? 
still a mystery..!! )

2.Using this unique number anyone can directly point to respective account. If you want to display any profile name just use as
@[id_number:0]

eg: My facebook account has the id - 100001420198548
So, @[100001420198548:0] will show up my name Vipin Narayan..!!!!

or type  @[4:0] in comment box and press enter..!!! 



Thats the game.!!Whenever you put your sim number in this body@[xxx:0] , it will 

point to the name associated with that account..!!! The rumor spreads it as 

your SIM card's name. :P


There is nothing wrong with this trick. Neither it has security threat nor has spam . 

But do not misunderstand that your SIM has a "name".!!!!! 








Monday, January 16

COMPRESS A FILE INTO .gz FILE ~ COMPLETE JAVA CODE






Hello friends,

In this post I’m presenting a java code to compress a file into -.gz format.
Hope this will be useful to you..!!!

Algorithm
1.      1.Input the name of the file to be zipped.
2.      Create an OutputStream in the name of given _file.gz.
3.      Point it to the GZIPOutputStream.
4.       Read from the file to be zipped, bytewise, and write it into GZIPOutputStream.



import java.io.*;
import java.util.zip.*;
public class CompressFile {
public static void compresser(String temp) {
try {
File file = new File(temp);
FileOutputStream fout = new FileOutputStream(file + ".gz");
GZIPOutputStream gout = new GZIPOutputStream(fout);
FileInputStream fin = new FileInputStream(file);
BufferedInputStream in = new BufferedInputStream(fin);
byte[] buffer = new byte[1024];
int i;
while ((i = in.read(buffer)) >= 0) {
gout.write(buffer, 0, i);
}
System.out.println(" successfully compressed");
in.close();
gout.close();
}
catch (IOException e) {
System.out.println("Exception is" + e);
}
}
public static void main(String args[]) {
if (args.length != 1) {
System.out.println("Please enter the file name which needs to be compressed ");
} else {
compresser(args[0]);
}
}
}





For compiling::
javac CompressFile.java




For running::
java CompressFile any_file_name_present_in_current_directory