Friday, May 14, 2010

How to Stop Your Mom from Spying in Your Personal, Private Email Account

This is quite common in a lot of households. Your Mom trying to read your personal diary or poking nose in your privacy. First thing is that they do it out of concern. They are worried, but you still don't like it, so what are you going to do now? Here's what you can do.
spy mom!

Steps

1.First, make sure that your mom is actually spying on you. Make sure that she is really reading your personal account and all.
2.After that you try to find out "why?" Usually parents do it because they are worried of your particular behavior.
3.Try not to show your behavior changes in front of your Mom. Yeah, it's difficult, but the least you can do is try.
4.If your suspicion turns out to be true, sit down with your mother and have a heart-to-heart talk. Let her know that you are aware that she is intruding on your privacy and that you'd like her to stop. Your privacy is important but you still love her.
5.You can always do is change your password. Change to something difficult, something complicated.

Tips

* Change your password.

* Act normal around your mom.

Warnings

* Don't be harsh on your mom. Be polite!
* Don't make accusations.


Source: WIkihow

Free Download Games

Here is another free game for your Mobile Phone.

It is a very nice car speeding game, Download it here.

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Simply Install and Follow the Intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Tuesday, May 11, 2010

How to Use Your Mobile Broadband Connection Card for Your Wireless Router

o have you been wanting to use your Mobile Broadband USB stick or Laptop card connection for a router to have wireless in the home, but have no clue how to do it? connection. You have seen these $150-$200 routers coming out that you can put your USB or Laptop Broadband card in and use your mobile broadband connection for the wireless router. Well Here's a solution so you don't have to Waste $200.

Steps

1.Make sure you have an active mobile broadband connection from a cellular provider it could be from a USB or Laptop card device.


2.Log onto the administrator or host account of your computer.
3.Go to Start, then click on Control Panel.
4.Find Network and internet Connections and click on it.
5.Select Network Connections.
6.Select your type of internet connection, then click Properties.
7.Click on the Advanced tab.
8.Look under Internet Connection Sharing, there should be a check-off box that says Allow other network users to connect through this computer's Internet connection. Check off that box.
9.If you use dial-up for your internet connection, check off Establish a dial-up connection whenever a computer on my network attempts to access the Internet. Then click OK.
10.Click "Yes" when you receive this message;
* When Internet Connection Sharing is enabled, your LAN adapter will be set to use IP address 192.168.0.1. Your computer may lose connectivity with other computers on your network. If these other computers have static IP addresses, it is a good idea to set them to obtain their IP addresses automatically. Are you sure you want to enable Internet Connection Sharing?
11.Run a Cat 5 cable from your desktop or laptop with active Mobile broadband ICS connection from the computers LAN port to the Routers Internet In Port. And Voila !

Tips

* You might have to Plug in a laptop or desktop directly to one of the routers outgoing LAN ports on the back of the router and access the wireless settings to change those, then save them how you wish and you're good. Use your laptop to log onto the router and change the wireless security settings. The manual with your router describes how to do this.

Warnings

* Be careful when messing with the setting, you could do something wrong and nothing will work!

Things You'll Need

* A wireless Broadband Card or USB stick from a cellular provider
* Desktop or Laptop
* Wireless or Regular Router
* A little know how

Source: www.wikihow.com

Free Download Games

Like football? Download it here and install it to your mobile phone.

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Monday, May 10, 2010

Tooth Extraction - Prize of USD 1,500,000.00

This posting will not be related to all previous postings. I just simply want to share what I have experienced for a molar upper tooth extraction.
If you ever want to have your upper tooth extracted, do you think your dentist will inform you that this extraction could effect to your eye?
The answer is NO and they probably will say that you are nuts to believe this rumour. However, this isn't rumour because it is a fact and happens to me! My Right Eye went blind effectively 4 days after my 3rd upper molar tooth extracted.
In Indonesia, all doctors helps each other to protect those doctors that did malpractice due to their doctors' ethic codes. They always have their medical terms to say in front of a judge to protect themselves. This is why doctors in Indonesia always win in any cases in the court even if a patient has suffered and died due to doctors' wrong action.
I personally have brought text books that can explain the relationship between eye's and tooth's nerves to the dentist who did the extraction. However, he denied all theories I spoke which I got from those text books and planned to sue me back. So, I just can say sorry to him to prevent his sue.

The point is that I am offering USD 1,500,000.- prize for doctors or dentists who are willing to come to Indonesia and help me to sue the dentist that caused me to lose my right eye sight. The prize and all expenses such as air plane tickets and hotel will be paid immediately after both of us wins the lawsuit. However, if we lose the case then it is at your own risk and you must be ready and responsible if the dentist sue us back. Fair enough? I think it's fair enough considering to the prize I am offering to you.

E-mail me at hidajat.jackson@gmail.com or jacksonhidajat@yahoo.com

Free Download Games

This is an interesting game for your mobile phone because this game can give you both choices, either you want to have daily brain exercise or just single exercise.
It's fun because you can play it in the morning before going to work or school.
Get it here.

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile Phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Sunday, May 9, 2010

Free Download Games

Get Ready for your new adventure. While your are waiting for something for quite a long time then just play this game instead of getting bored.
Download is available here

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Mobile phone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Free Download Games

Do you like a strategy game? If yes, then this game probably suits to you. However, this game is also for your mobile phone only.
Do not worry to download it here because it is free of virus.

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Saturday, May 8, 2010

Air Force Missions

Ready to do some missions for the air force in 3D game with fantastic graphics and wonderful sound effect? Play and destroy your enemy.

Get more informations and download the game at www.myplaycity.com

Bible in Indonesian

Are you a Indonesian Catholic? So, download this application in Indonesian language here for your Mobile Phone (Nokia) and always remember to pray to our lord Jesus Christ.

Instructions:

1. Download the apllication by PC
2. Transfer the downloaded file from PC into your external memory of your Cellphone
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This application I got it from my friend as well. It's for none commercial use only too. I do not allow anyone to redistribute it for making cash because this is a free application.

Free Download Games

Race again? Here is another game for your Nokia N95. It is always better to play a game and race by using your cellphone in stead of racing on the street and get caught by police.

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Math Scientific Calculator

Do you need a complete calculator for your PC? Here it is!
Math Mechanixs will provide you a complete function for calculator, starting from the regular function to the scientific function.

Explore this application for its other functions by downloading it at http://www.mathmechanixs.com

Brain Education

If you feel that you are stupid and may have low IQ then you should give a try to download this application at http://brainworkshop.sourceforge.net/

It probably helps a little bit especially for those who are insane.

This application will give you a test by letting you play a game that can stimulate your stupid brain.

Comic Downloader

Online comic is probably the most suitable words for this application.
There are few categories provided by this comic application that is located on the left page of its window.
These available comics are interesting to be read.
You may download it at http://software.bootblock.co.uk/

Friday, May 7, 2010

Free Download Games

Ready to race? Download this game here for your Nokia N95 and RACE!

Instructions:

1. Download the game by PC
2. Transfer the downloaded file from PC into your external memory of your Nokia N95
3. Choose File Manager from your Cellphone's menu and find the file you put from your external memory.
4. Install and simply follow the intructions


Note: This game I got it from my friend. It's for none commercial use only. I do not allow anyone to redistribute it for making cash because this is a free game.

Free Download Yahoo! Messenger 10.0.0.1264

Keep friends at your fingertips with the new Yahoo! Messenger:

  • Easier ways to stay up to date - See more updates from your friends in the detailed Messenger list
  • Show off your status - Easily add links and emoticons to your status messages
  • Watch videos together - Share videos from popular sites and watch them with friends right in your IM window

Other features include:

  1. Instant message with one friend, or conference in a bunch
  2. Send text messages (SMS) to friends' mobile phones
  3. Join a chat room to meet new friends while you discuss your favorite topics
  4. Make free PC-to-PC calls and PC-to-phone calls for as low as 1¢ a minute (plus free voicemail!)
  5. Use the built-in media player to watch web videos and view photos with friends
  6. Show your style with emoticons, Avatars, audibles and IMVironments
  7. Share securely with automatic file scanning for users of Norton AntiVirus or Internet Security 2007/2008
Source: Yahoo!
Click here to Download

How to Do the Google Tricks

Have you ever wanted to make the o's in Google disappear but didn't know how? Well here is an article that will show you how to do just that.

Steps

  1. Type the following link in your address box:http://darkartsmedia.com/google.html # Make sure all of the letters are in lowercase.
  2. Then place your fingers on the o's in Google. Click any where and ta-da, it has vanished.
  3. Then place your fingers back on the o's and again click anywhere.
  4. It has come back again! But don't do this again or else it will take u to the real Google site because this is a fake one. So if u want to do it again go back and then do it.
  5. ENJOY!

Tips
  • This is especially fun to do if you have a spectator.

Warnings

  • Don't repeat it in front of the same audience or else they'll know the secret!

Things You'll Need

  • A computer
  • An Internet connection
Source: www.wikihow.com

Monday, May 3, 2010

How to Trace an IP Address

Whenever you get online, your computer is assigned an IP address. If you connect through the router, all of the computers on that network will share a similar Internet Protocol address; though each computer on the network will have a unique INTRAnet address. An IP address is the Internet Protocol (IP) address given to every computer connected to the Internet. An IP address is needed to send information, much like a street address or P.O. box is needed to receive regular mail. Tracing an IP address is actually pretty straightforward, and even though it's not always possible to track down a specific individual, you can get enough information to take action and file a complaint.

For example, if there was some guy claiming to be Chuck Norris, and tried to get personal information from your Gmail account, you could view his IP address, and then track him. Here's how:

Steps

  1. Find the IP number you wish to check. The format of an IP address is numeric, written as four numbers separated by periods. Each number can be zero to 255.Use ping or tracert in the command prompt to find IP address'.
  • To find the IP of an e-mail sent to you, investigate the message's "headers" by using your e-mail program's "details" or "properties" function. For example, in Outlook Express, select "Properties" from the "File" Menu, or just press ALT+Enter. Next, select the "Details" tab. In Yahoo, click "Full headers" on the upper right hand corner while you see the message. In Hotmail, go to "Mail Display Settings" and set "Message Headers" to "Full" or "Advanced". See this website for more information on viewing headers.
  1. Go to a website that will allow you to look up IP address information. See External Links below. Type the IP number in the input box and submit.
  2. Understand that in many situations you will learn a few things about the IP address:
    • Which internet service provider (ISP) the user is using. In some cases this may be the user's company (e.g. Ford.com). In other cases it may be just one of the large ISPs such as ATT or Comcast.
    • The approximate physical location of the user (e.g. Palo Alto, California.)
  3. Recognize that usually you will not learn the actual name of the person doing at that IP address (e.g. Joe Smith). ISPs will typically only release such information under a court order.

Tips

  • Another way--if you are using a Windows computer--to find out some information about someone is to go to Command Prompt (if you do not know how to do that, go to the Start menu, Run, and type "cmd" and press OK) and type in tracert . On UNIX (including Linux and OS X), open a shell and use the command traceroute

Warnings

  • It is not always possible to find out someone's exact address from this. People can take extreme measures to remain anonymous (even forging e-mails). Your search may just result in knowing the company that the person gets their Internet connection from. You can report abuse to that company, but it's not likely they'll divulge contact information for the individual without a court order.
  • If you are being harassed or you are concerned about your safety, file a complaint with your local police authorities. If you traced the IP address through an e-mail, give them a copy of the e-mail with detailed headers showing.

Things You'll Need

  • A computer
  • Internet
  • A Knowledge Of Dos commands
Source: www.wikihow.com

How to Remember a Forgotten Password

Forgetting a password can be a stressful and embarrassing experience. Here are some tips for remembering a forgotten password.

    • Ask yourself the following questions:
  • What are the passwords I normally use for other things?
  • What was I obsessed with when I created the password?
  • What are some "key words" in what I are trying to get into? (For example, if you forgot the password to a document, it might be something like "homework" or "essay".)
  • What are some of my favorite colors, animals, foods, sports?
  • What are some of my nicknames?
  • What was I thinking about when I created the password? (For example, you might have used "I am hungry" or "I am bored".)
    • Think back to the day you created the password and walk yourself through the process.
    • Try "Confidential," "Do Not Read," or something along those lines.
    • The standard password is just that: "password."
    • You would be surprised how many teen's passwords have to do with siblings! Normally an adult's passwords will not, but often with youth "Robert Is So Annoying" or others are way more popular than you would think!
  • If you still have your surfing history (or any other similar information) that could give you a clue as to what you were doing on the computer right before you changed your password, look through it trying to identify what was on your mind at the moment.

Tips

  • Sometimes it is possible to hack into computers or reset a password by other means by going to the control panel.

Warnings

  • Use this information to figure out your own passwords, not someone else's.
  • If you lost the password to a Microsoft Word document, you will not be able to recover it. There will be no way to hack into the document and it has no "I forgot my password" option.
Source: www.wikihow.com

How to Add Your Site to the Google Index

Do you ever dream of having more visitors come to your site? Did you know that more than 25 million users search Google every day? Google lets you add your site to its index for "sites to crawl", and if your page happens to be relevant to a query, you may get ranked first!

Go to Google Add URL.
  1. Enter the URL (Web Address) of your site.
  2. Enter the verification code, (to prove you're human and not a bot).
  3. Click the "Add URL" button at the bottom of the page.
    • Your site will be added to the Google index.
    • It may take a while for the crawler to get to your site (there are more than a billion pages on Google).
  4. Google also has other webmaster tools, you should check them out.

Tips

  • If the site is already in Google, there is no need to add it again.
  • You must add the http:// prefix when submitting your site.
  • Add very relevant material to a certain topic (Don't get off track) and Google will most likely rank you first, depending on the query.

Warnings

  • Google says that there is no guarantee that their web spider will definitely index your site.

Source: www.wikihow.com

Wednesday, April 28, 2010

How to Know if Your Computer Has Been Tracked

There is no surefire way to know if your computer is being hacked or rootkitted by some cracker out there, short of keeping it cleanroom by never, ever connecting it to the Internet. However, there are many ways to distinctly reduce the chances of it being compromised.

Steps

  1. Go into control panel, and choose add/remove programs. Uninstall any antivirus software you have currently installed (obviously, if you have antivirus software which you are happy with, then leave it installed). This is to avoid antivirus clashes which may render your computer unusable.
  2. Secure your computer. If you already have a full antivirus suite, that is up to date and includes all of the following three components, then skip to step 8. Otherwise, for your computer to be secure you will need to download all of the following which you do not already have;
  3. Install a firewall to replace the weak windows firewall; ZoneAlarm works great.
  4. Consider using intrusion detection software.
  5. Install all of the required programs. Connect your computer to the Internet again, and allow them to update fully.
  6. Run the antivirus scanner and anti-spyware scanners. If anyone has hacked your computer, the malware should be detected, and hopefully the software can remove it. Now your computer should be secure
  7. Make sure to update your software frequently, at least once a week and you should be able to prevent nearly all attacks on your computer, provided you use your computer in a sensible manner.

Tips

  • Use an alternative browser. Using Firefox or Opera as your web browser (or any browser other than Internet Explorer, which is infamously known as "Internet Exploder" because of its common malfunctions and vunerabilty to viruses) would result being targeted much less by viruses, as many are directed at Internet Explorer.

Warnings

  • Never install something you have downloaded without fully reading the license agreement. Many newer malware programs are effectively legal as they are hidden or packaged with the desirable software and have a license agreement detailing their effects. If you see anything dubious in the license agreement, don't install. Pay attention to the "Agree" boxes when installing software. Blindly agreeing to everything presented can make cleaning out "added bonus" applications difficult, when it could have been much easier to "decline" when installing instead.
  • Don't go to dodgy websites. If you search on google for something, and the description for one of the sites has a lengthy list of irrelevant and unconnected words in it, it's probably a sham site.
  • Don't install activeX controls from a site you don't trust.
  • Don't open E-mail "attachments" unless you have spoken to the trusted sender and they have verified that they included the attachment. Just because an E-mail originates from a friend, does not mean his / her computer hasn't been infected. The virus can spread by sending itself to everyone in the E-mail program contact list, often without the owner even knowing it is happening.
  • Don't run applications or copy content from disks, thumbdrives, CDs, etc. that have been provided by others (including friends); or belong to you if they have previously been connected to another computer, unless scanned with your anti-virus program first. If an infected computer has accessed the data on the media, the data is likely to be infected as well.
Source: www.wikihow.com

How to Avoid False Information on the Internet

Using the internet to make decisions can be risky. To avoid these follow these simple steps:

Steps

  1. Use "common" sense. This simple tool will allow you to filter information that is not correct from the correct.
  2. Cross-check. Reading from more one source allows for the correction of mistakes, errors and malicious intent.
  3. Go to the source. Using a real library, real people and your legs can be positive steps in gathering information that is free from errors.

Tips

  • Face value is never face value. The only facts you should accept at face value are ones you have requested and paid for, i.e., an education. That said, check the teacher or professor's source. You'd be surprised how many are incompetent or have their facts clouded by a conflicting agenda.

Warnings

  • Media outlets should be treated with the same caution.
Source: www.wikihow.com

How to Add Google AdSense to Feedburner

Finally, Google has fully integrated Feedburner as one of their services. Google Adsense has merged Feedburner into its arsenal also.

Steps

1. Sign-up for a Google Adsense account.
  • If a publisher already has a Google Adsense account, he/she simply needs to log into it.
  • On your reports overview page under the “Adsense for Mobile Content” line, you will notice “Adsense for Feeds”, click the “Get Started” link.
  • The “Get Started” page will look similar to the “Activate FeedBurner Ad Network and/or Google AdSense for Content” feedburner.com page discussed above.
  • Near the bottom of the page, you will see an inviting link to gaining help and support for migrating your feed into adsense….or, visa versa.
  • The process is quite 20th century-like from here on out, because the publisher must then email, adsense-support-aff@google.com his/her Feedburner account username, and Google Account email address used to sign in to Adsense.
  • Google will respond via email with a lovely note similar to the following:
    • “Hello FabulousAndTechfilled.com,
    • Success!
    • Effective immediately, you can access your feeds by signing into your Google Account when you visit http://feedburner.google.com. You will no longer be able to sign in to feedburner.com, but that's okay: from now on, there is no reason to do so.
2.All of your feeds have been moved into this new account, and an initial batch of your most recent 30 days' traffic stats has been loaded up. (Your entire stats history, should it go beyond the last 30 days, will be added at a future date.)

3.To repeat: visit http://feedburner.google.com from this point forward to view and manage your feeds.
  • If you want to use AdSense for feeds, you may now do so. Visit http://www.google.com/adsense and click "AdSense for Feeds" under the Get Ads section to get started.
  • Sincerely,
  • The Google AdSense Team”

Source: www.wikihow.com


Friday, April 23, 2010

How to Add Google Analytics to Blogger

Do you know which websites refer the most visitors to your site? Or the most common keywords used to find your site? Google Analytics can provide the valuable answers to these questions, and many more.

Steps

  1. Open a Gmail account if you don’t already have one.
  2. Create a Google Analytics Account.
  3. Click on: 'Add Website Profile.' Installing Google Analytics does not require knowledge of HTML, but there is a piece of HTML code that must be copied onto your blog.
  4. In the box, enter your URL. (For example: www.yourwebsite.com or yourblog.blogspt.com.)
  5. Set your Country and Time zone, and hit Continue.
  6. Highlight the tracking code displayed in the large box and 'Copy'.
  7. Sign into Blogger. Click on the 'Layout' Tab, then click on 'Edit HTML'
  8. Click on 'Download Full Template' to back up your template onto your computer. It's always a good idea to back up your template before you make any changes.
  9. Scroll down to the bottom and paste the tracking code just before the closing 'body' tag.
  10. Press 'Save Template' to save the changes.
  11. Back in Google Analytics, click on 'Check Status' or 'Verify Tracking Code' under the Status column. Once your tracking code has been verified, the status will change to: 'Receiving Data.'
Tips
  • Installing Google Analytics is a huge step towards taking control of your online marketing. It will open your eyes to valuable information about your website visitors and display the data in an easy to read, easy to understand format. Over time you will see trends that you could not have discovered any other way.
  • The longer you have have Google Analytics installed, the more interesting and valuable the data will be.
  • To remind yourself what the code you have added to the template is for, add a comment above it like this

Warnings

  • It will take about 24 hours or so after you install Google Analytics before you start seeing any data. Check back the next day to familiarize yourself the various reports.
Source: www.wikihow.com

How to Preserve Your Privacy in an Internet Cafe

This how-to will tell you about preserving privacy in an internet cafe, especially on your computer.

Steps

  1. Use Tor.
  2. When logging in to webmail such as Hotmail, Gmail or Yahoo Mail on a public computer; look for any check boxes that say "Remember my password" or "Remember my email address." Make sure they are UNCHECKED.
  3. Because the security status of a public computer is unknown, it may be infected with keystroke logging spyware for example, never log into any site that manages your sensitive or financial information such as your stock broker site.
  4. Many browsers will offer to store your user name and password when you log in, be sure not to allow it.
  5. Make sure that you log out of every site you've logged in to. This can include web browsers, instant messaging clients and ftp sites.
  6. Clear the browser history and cache when you are finished using the computer. In Firefox, go to the Tools menu at the top and choose "Clear Private Data." In Internet Explorer go the Tools menu at the top and choose "Delete Browsing History."
  7. Be certain that when you leave the computer you have deleted everything you saved to the desktop. If you scanned in an image, saved pictures from your vacation or edited your resume make sure you permanently delete all personal files from the computer.
  8. Never borrow a neighbor's free WiFi connection. Your neighbor might be running a packet sniffer and intercepting your network traffic.
  9. Do not open email attachments with a .exe file extension or coming from someone you don't know.
  10. Store personal data on a USB flash drive using FreeOTFE and FreeOTFE Explorer to secure it.

Tips

  • If you're in a public cafe, ask the barista to verify that you have deleted all personal data from the computer.
  • If you don't want other customers in the cafe to see what you are doing, ask for a computer near the back or make sure the computers near yours are unoccupied.
  • It's also possible to download a web browser to install on a flash drive. Versions of Mozilla can be downloaded from http://www.lupopensuite.com/ which leaves all the temporary files on the flash drive and not on the cafe's computer.
  • Using a live boot CD will help preserve your privacy on a computer, use a search engine to find a list of live boot CDs, booting from a live CD will leave no trace of your activities.

Warnings

  • Never post any personal information in a public place like Myspace, Facebook or Craigslist.
Source: www.wikihow.com

Thursday, April 22, 2010

How to Know if You've Been Hacked

There are many ways to find out if your hacked but some ways hackers get in are surprising.

Symptoms of being hacked are

 *If programs and files wont work or open
*Deleted files that you didnt delete
*Password changes
*You find information on the net, that you haven't let out.
*You find some program that shouldn't exist on your system
*Your computer is connecting to the net frequently while you are not doing anything.
*The contents of files change and you didn't change it

Steps

  1. If suspected that the hacker is still in the computer, IMMEDIATELY disconnect from the Internet.
  2. Check if there aren't any "new programs" (eg. Anti-virus, Anti-spyware, etc.)OR if programs and files won't work or open.
  3. Do a sweep of your computer with a Anti-virus/spyware scanner you trust. It is stressed on what you trust(eg.AVG Free edition, Avira AntiVir)
  4. If that turns up Nada, backup IMPORTANT files and do a system restore and update the computer.

Tips

  • The best method is to prevent it before hand
  • Backup important files (eg.Family pictures,Documents,e.t.c) onto a encrypted USB drive and store it in a vault
  • To keep the Operating system use a backup program

Warnings

  • If left unchecked, the computer could become completely useless, and you might have to reinstall the operating system or buy a new computer.
  • Worse yet, your computer could be turned into a zombie that the hacker may use to attack other computers/networks and commit illegal activities.
  • If programs and files won't work or open, you are looking at a light show or a electronic picture, the computer will need a new operating system or a restore if the hacker didn't mess with the backups.
Source: www.wikihow.com

How to Change your IP Address (Windows)

No matter what your reason, changing your IP address is quick and easy.

Steps

Windows XP

  1. Click on "Start" in the bottom left hand corner of screen.
  2. Click on "Run".
  3. Type in "command" and hit Okay. You should now be at an MSDOS prompt screen.
  4. Type "ipconfig /release" and hit "Enter". This will disable your internet connection. To undo it, type "ipconfig /renew".
  5. Type "exit" and leave the prompt.
  6. Right-click on "Network Places" or "My Network Places" on your desktop.
  7. Click on "Properties". You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.
  8. Right-click on "Local Area Connection" and click "Properties".
  9. Double-click on the "Internet Protocol (TCP/IP)" from the list under the "General" tab.
  10. Click on "Use the following IP address" under the "General" tab.
  11. Create an IP address. (It doesn't matter what it is.)
  12. Press "Tab" and it should automatically fill in the "Subnet Mask" section with default numbers.
  13. Click the "Ok" button.
  14. Click the "Ok" button. You should now be back to the "Local Area Connection" screen.
  15. Right-click back on "Local Area Connection" and go to properties again.
  16. Go back to the "TCP/IP" settings.
  17. Select "Obtain an IP address automatically".
  18. Click the "Ok" button.
  19. Click the "Ok" button.
  20. You now have a new IP address

Warnings

  • This will only work if both your computer, and the network it is directly connected to, use Dynamic Host Configuration Protocol (DHCP). If you are using a router, and DHCP is enabled, the steps above will only affect the IP address your computer is using on the Local Area Network (LAN) between your computer and the first router "en route" to the Internet. To change the public IP you are using to connect to your service provider, you must instead change the IP address used by last IP address using (OSI Layer 3) device seperating the Internet from your computer.
  • Manually assigning your IP address is also possible, but you run a very high risk of your ISP(Internet Service Provider) banning you from connecting to the internet. To manually change your IP, follow the steps above for your Operating System. In step 9 or 10, depending on your O/S, enter an IP similar to the one displayed in the command prompt window. For example, if the IP displayed in the command prompt window is 75.1.2.3, change yours to 75.1.2.4. You’ll also need to manually enter the Subnet, Gateway and DNS Server IP addresses as well. If the new IP you give your computer doesn’t work, chances are someone else on the ISP network has already been assigned that IP. You’ll need to move on to the next one and keep trying until you find an open one. However, some ISPs match up your MAC or modem data to the IP that’s been assigned. If those 2 things don’t match up, you won’t be able to connect no matter what. If your router gets the IP and not your computer, you’ll need to http in to your routers interface and manually assign the IP there. It’s pretty much the same method as assigning the IP to your computer. The method that varies is how you reach your router's interface. You can get those instructions from your manufacturer’s website.
Source: www.wikihow.com

How to Ping an IP Address

The PING command is used to test the connection and latency between two network connections. These connections can be either in a local area network or a wide area network or the internet as a whole. The PING command sends packets of information to a specified IP Address and then measures the time it takes to get a response from the specified computer or device.

Steps

Windows XP or Vista

  1. Open the command window by clicking START, then RUN. Type CMD, and hit Enter or click OK.
  2. Type "ping" in the Command Window.
  3. Hit the space bar once.
  4. Type the IP or website address that you want to ping. For example, if you want to ping eBay, type "www.ebay.com" after the space. If you want to ping your Router, it might be "192.168.1.1"
  5. Hit "Enter." If the website is up and actively responding, you receive replies back from the server that you pinged with the following information:
    • The IP address
    • The number of Bytes sent
    • The time it took in milliseconds
    • The TTL is Time to Live (This indicated the number of "hops" back from the computer pinged from that computers initial TTL value.)
  6. Analyze the information. The lower the round trip number in milliseconds, the better. The higher the round trip number in milliseconds, the higher the latency, which may indicate a network problem between your computer and the server you pinged.

Tips

  • You can also run a remote PING[1]. This allows you to ping an IP address or computer from a computer other than yours to see if the problem may be associated with your local connection rather than the IP Address you are trying to connect to.
  • There are a number of options when running PING to give different results and outcomes. Type them after the IP address. **-c Count. Send count packets and then stop. The other way to stop is type CNTL-C. This option is convenient for scripts that periodically check network behavior.
  • -f Flood ping. Send packets as fast as the receiving host can handle them, at least one hundred per second. This is most useful to stress a production network being tested during its down-time. Fast machines with fast Ethernet interfaces (like SPARCs) can basically shutdown a network with flood ping, so use this with caution.
  • -l Preload. Send preload packets as fast as possible, then fall into a normal mode of behavior. Good for finding out how many packets your routers can quickly handle, which is in turn good for diagnosing problems that only appear with large TCP window sizes.
  • -n Numeric output only. Use this when, in addition to everything else, you've got nameserver problems and ping is hanging trying to give you a nice symbolic name for the IP addresses. When pinging locally, the -n option is used specify a number of repeats. 'ping [2]
Source: www.wikihow.com

Tuesday, April 20, 2010

My first words

Hello to you all,

These are my first words...