SET MOBILE PASSWORD THAT WILL AUTOMATICALLY CHANGE EVERY TIME | LOCK YOUR PHONE WITH AUTO CHANGE PASSWORD


SET A MOBILE PASSWORD THAT WILL AUTOMATICALLY CHANGE EVERY TIME | LOCK YOUR PHONE WITH AUTO CHANGE PASSWORD

HOW TO MAKE A FAKE WHATSAPP ACCOUNT IN HINDI

Effective Home remedies that actually work without any side effect



घरेलू उपचार जो बिना साइड इफ़ेक्ट के वास्तव में प्रभावी हैं।

घरेलू उपचार अक्सर चिकित्सकों द्वारा किये गए उपचार से अधिक काम करते हैं। उनमें से अधिकांश के पीछे वास्तव में वैज्ञानिक एवं प्रमाणित आधार है। कभी कभी वे अपने पारंपरिक चिकित्सा समकक्षों(alopathy, होमियोपैथी,आयुर्वेद इत्यादि)  की तुलना में बेहतर परिणाम देते हैं। घरेलू उपचार शहरी क्षेत्र की तुलना में ग्रामीण क्षेत्रों में अधिक इस्तेमाल, अधिक लोकप्रिय और प्रभावी रूप में उपयोग में लाए जा रहे हैं । नीचे ऐसे ही कुछ घरेलू उपचारों  का विवरण दिया गया है जो वास्तव में प्रभावी साबित हो रहे हैं-
 
Effective Home remedies
Effective Home remedies

Facebook tagging scam फेसबुक टैगिंग स्कैम malware automatically expands through tagging



Facebook tagging scam – the malware automatically expands through tagging फेसबुक टैगिंग स्कैम-मैलवेयर टैगिंग के माध्यम से स्वत: फैलता है ।
कैसा लगेगा जब आप अपना फेसबुक खाता खोलें और आपकी टाइम लाइन पर एक पोर्न तस्वीर या पोर्न वीडियो की लिंक दिखाई दे। आपको यह भी पता चले कि यह काम आपके ही किसी फेसबुक मित्र का है जो बहुत ही सभ्य और जिम्मेदार किस्म का है। अवश्य ही आपके दिमाग में आपके उस फेसबुक मित्र की छवि मलिन होजायेगी। और अगर आपने अपना फेसबुक खाता कई दिनों से खोला ही नहीं है परन्तु आपके पास परिचितों और मित्रों के फोन आएं कि आपने पोर्न पिक्चर या वीडियो पोस्ट किया तो किया परन्तु आपने हमें टैग क्यों किया।
Facebook tagging scam
Facebook tagging scam

(UPI) upiunified-payments-interface एकीकृत भुगतान इंटरफेस क्या है और यह आपके लिए कितना उपयोगी है



(UPI) upiunified-payments-interface एकीकृत भुगतान इंटरफेस क्या है और यह आपके लिए कितना उपयोगी है - भारतीय राष्ट्रीय भुगतान निगम (एनपीसीआई) ने बहुप्रतीक्षित (UPI) एकीकृत भुगतान इंटरफ़ेस का शुभारंभ कर दिया है यह देश के वित्तीय क्षेत्र में एक बड़ा क्रांतिकारी परिवर्तन माना जा रहा है। यह अवधारणा कोई नई नहीं है तथा पहले से ही दुनिया भर में बैंकों की एक बड़ी संख्या और PayPal, Payza जैसे  प्रख्यात निजी भुगतान प्रोसेसरों (Payment Processors) द्वारा अपनाया जा चुका है, और सफलता पूर्वक चल रहा है।  (UPI) एकीकृत भुगतान इंटरफ़ेस की महत्वपूर्ण सुविधाओं और विशेषताओं को नीचे सूचीबद्ध करने का प्रयास किया गया है– 
upiunified-payments-interface
upiunified-payments-interface

Protect Android device from online threats and virus malware removing

अपने एंड्राइड उपकरण को वायरस से कैसे बचाएं

साइबर अपराधी हमेशा इंटरनेट से जुड़े उपकरणों पर हमले के नित नए तरीके की खोज में  रहते हैं। एंड्रॉयड, सबसे लोकप्रिय ऑपरेटिंग सिस्टम होने के कारण यह हमेशा अपराधियों के निशाने पर रहता है। आने वाले दिनों में साइबर अपराधियों द्वारा एंड्रॉयड उपकरणों को और अधिक निशाना बनाया जा सकता है, लेकिन कुछ सावधानियों आपके उपकरण को बचाने में सहायक सिद्ध हो सकती हैं और अगर आपका उपकरण  (डिवाइस) संक्रमित(infected) है तो भी आप मैलवेयर मैन्युअली हटा सकते है –
Protect android device from malware
Protect android device from malware

Bad effects of Smartphone Addiction Syndrome, how to get rid of them



Bad effects of Smartphone Addiction Syndrome, how to get rid of themस्मार्टफोन ऐडिक्शन सिंड्रोम, इसके दुष्प्रभाव और इस बुरी आदत से कैसे छुटकारा पाएं
अगर आप हमेशा अपने स्मार्ट फोन पर कुछ कुछ खोजते रहते हैं। आप हमेशा सर्फिंग या कॉल करने अथवा एसएमएस भेजने अथवा प्राप्त करने के अलावा अन्य गतिविधियों में व्यस्त रहते हैं और अनुत्पादक निरर्थक कार्यों में समय नष्ट करते रहते हैं तो आप निष्चय ही स्मार्टफोन ऐडिक्शन सिंड्रोम के शिकार हैं।
Addiction of smartphone
Addiction of smartphone

How to create sitemap on blogger blog



ब्लॉगर ब्लॉग पर साईटमैप(पोस्ट सूची) कैसे बनायेंHow to create sitemap on blogger blog

ब्लॉग पर साईटमैप(पोस्ट सूची) लगाना बहुत लाभप्रद तथा आसान है।  ब्लॉग पर साईटमैप होने से आपके पाठक आपके ब्लॉग की पूरी सामग्री की सूची एक क्लिक में देख सकते हैं। ब्लॉग देखना सुविधाजनक होने से आपके पाठकों के आपके ब्लॉग पर बार बार आने की सम्भावनाएं बढ़ जाती हैं। ब्लॉग पर साईटमैप(पोस्ट सूची) लगाने का बहुत ही आसान तरीका इस पोस्ट में दिया गया है -
Blogger Site Map
Blogger Site Map

Highly Dangerous Adware Virus Safeupdates.net, Symptoms, Protection, Removal

Highly Dangerous Adware Virus Safeupdates.net, Symptoms, Protection, RemovalCyber attackers and hackers develop threats, hard to be detected even by powerful anti malware software. Safeupdates.net is also a malware of such category and it is a very dangerous adware virus which may cause havoc inside your PC and may totally spoil your system. If you don’t have a good computer security software, your chances of getting this infection are very high. During your usual browsing sessions you may suddenly see a Safeupdates.net pop-up message you offering updates of some high quality software like adobe flash player, Java etc. Please close the window at once. This fake message often appears when you have landed to in illegal and infected page. It is so tricky that it actually look like quite reliable, quite appealing and useful update. In real it downloads  potentially unwanted program like AwesomeHP, Delta Search or Sweet-Page and many more dangerous program to your computer.
Highly Dangerous Adware Virus Safeupdates.net
You will see a popup like this

How to avoid and stay safe from tech support phone scams

How to avoid and stay safe from tech support phone scams-Some time you may receive a call on your phone/mobile phone. The caller may claim to be a service expert or a tech. representative from a prestigious software/hardware company and may offer various type of help and solutions. Please note that the big corporations like Microsoft, Apple etc. do not have any arrangements to initiate unsolicited phone calls known as cold calls. In fact such calls are always made by cyber criminals because the cybercriminals don't just send fraudulent email messages and set up fake websites, but they might also call you on your telephone/mobile phone and claim to be from a reputed corporation like Microsoft or other one. They might offer to help solve your computer problems or sell you a software license which will be fake.
 
The Telephone Tech. Support
Microsoft provides this service free and he is asking money....?????

Dangerous Trojan PWS:Win32/Zbot.gen!AP – Behaviour, Removal, How it comes

Dangerous Trojan PWS:Win32/Zbot.gen!AP – Behaviour, Removal, How it comes-Created by Zeus kits, Trojan  PWS:Win32/Zbot.gen!AP is a very dangerous malware infection. Experts rate it a malware of high vulnerability. The main goal of this rogue is to steal your financial information and other sensitive data like bank details and credit/debit card details and use these for illicit purpose. It is so dangerous malware that it can cause an irrecoverable damage to your system, if not removed timely. This password-stealing trojan can send the record of your keys hits to a remote malicious hacker including your online activity like visits to your banking websites.
Image Source - www.slideshare.net

Trojan.Proxy.Koobface-causes, Systems and Removal Procedure

Trojan.Proxy.Koobface-causes, Systems and Removal Procedure-As the “Trojan” is the most harmful or dangerous category among the malcode, the same way  Trojan.Proxy.Koobface is also a very dangerous malware. If you are a social media addict this is an alert for you because the Trojan.Proxy.Koobface infiltrates your computer through Social media website like ‘Facebook’, ‘MySpace’ etc. Once entered in your PC this self replicating malcode will cause severe damage not only to your system but may also cause you financial loss by stealing your sensitive information. It will also deliver you fake alerts and notifications and random messages through your social networking accounts. Once you have noticed it’s presence in your computer system, your first job must be to remove Trojan.Proxy.Koobface immediately.


How to add Control Panel option in Desktop Right click in windows 7

How to add Control Panel option in Desktop Right click in windows 7-Many times we need to open the computer's control panel and to open the Control Panel normally we need to click the Start button, and then ‘Control Panel’. Though we can create an icon of control panel on our desk top, but how it will be if you get the ‘Control Panel’ option in your desk top right click. Yes it is possible. There are arrangements in our windows 7 it self. For it you have to follow a simple procedure. For this you will need to make small modifications in your windows 7 registry. The steps to follow are given below -


How to Set up a new broadband(PPPoE) DSL or cable connection in Windows 8

How to Set up a new broadband(PPPoE) DSL or cable connection in Windows 8-To use the broadband(PPPoE- Point to Point Protocol over ethernet) you will need to create a connection and to to create a Digital Subscriber Line (DSL) or cable connection, you first need an account with an Internet service provider (ISP). For DSL, the ISP is usually a landline phone or mobile phone service providing company and for a cable, it will usually be a cable operator or cable TV service provider. You will also need to have a modem and a router, or a combination the these two. Some of the ISPs provide you  these devices free or at cost but if your ISP doesn't, you'll need to buy them. When you have your modem, router, or combination device, either follow the instructions provided by your ISP, or follow the steps given below.
Image Source-www.vicomsoft.com 

How to manually delete duplicate files in windows 7

How to manually delete duplicate files in windows 7-You might occasionally discover that there are identical or seemingly identical files on your computer Hard Drive. This usually happens if you save copies of the same file in different locations or different directories on your computer. Identical files waste storage capacity and make it difficult to manage your files in addition, since it's more difficult to find the version you want when several files have the same name. Though a number of free software are available on the web for this purpose but in windows 7 you can easily manage it manually. It is very important to ensure that the file you are going to remove is really a duplicate copy and you have the original copy of it on your Hard Drive. As an additional safety you can open the files and view before the final deletion -



Why to prefer a Tablet instead of a Laptop

Why to prefer a Tablet instead of a Laptop-Tablet computer, or a tablet PC is a kind of mobile computer, usually having a touch screen or pen-enabled interface. It has almost all the features of a laptop. Tablet computer was Conceptualized in the mid-20th century but prototyped and developed in the last two decades of 20th  century. The tablet computers started to became more popular from the beginning of the year 2010. A tablets may include physical buttons such as speaker volume and power  and ports for network communications and power input to charge the battery. Some attractive features of a modern tablet which make people consider the tablet a better choice over a laptop -


TheTrojan Zlob -How it works and How to remove it

TheTrojan Zlob -How it works and How to remove it- The Zlob Trojan, is a Trojan horse which was first detected in by antivirus software vendors in 2005 and it was named by them as Trojan.Zlob, It drew attention of them in mid 2006 when computer infections were reported in a large number. This Trojan horse Masquerades itself as a needed video codec in the form of ActiveX. If you have a good antivirus software installed on your system, the chances of coming it to your PC are rare. This Trojan is very complicated and it is very difficult to remove it manually because it creates a large number of dll files and registry entries.


Symentech discovers new malicious software most sophisticated

Symentech discovers new malicious software most sophisticated
Symentech a leading computer security company, a leader in antivirus/antimalware development says that they have discovered a new malware. They named it ‘Regin’ and claim that it is one of the most sophisticated pieces of malicious code they have ever seen. The malicious code Regin is estimated to be in use approximately for six years or so. According to its characteristics it may have been developed by Government agencies to spy another Government agencies and big business houses and prominent personalities. In view of the experts computers in Russia, Saudi Arabia and Ireland may have been the most probable targets of this espionage.