Saturday 19 July 2014

Secure a Wireless Wi-Fi Network (WI-FI TRICK)

How to Secure a Wireless Wi-Fi Network

With the world going wireless in every sphere of technology, the question of security has often been raised. The same is true for wireless internet networks or Wi-Fi networks with hackers and Wi-Fi intruders always looking for ways to gain access to unsecured networks. There are several reasons why you might want to protect your Wi-Fi network. Prominent among them include better privacy, reduced internet bills and faster internet speeds.This post contains few simple techniques you can use to make sure that your wireless network is as secure as it possible can be.

Protect your Wireless Internet Network

1) Encrypt your Wi-Fi Network: When you use a Wi-Fi network for accessing the internet, every piece of data you send and receive over the air can be easily snooped by anyone with the right set of tools. Packet sniffers can be used by even the most novice of users to sniff your data. This means that a hacker can not only see which websites are you accessing but also get the login details of your personal and professional accounts.

Encryption basically involves scrambling the data that is transmitted and received by you while using a wireless network. This means that even if a hacker intercepts your data transmission, (s)he will not be able to exploit the information contained within it.
Protect WiFi Internet Network

There are two encryption standards available that you can use: WEP (Wired Equivalent Privacy) and WPA (Wireless Protected Access). WEP is the older standard of encryption and can now be bypassed in a matter of minutes. WPA is relatively newer but it still has security holes. AirCrack and coWPAtty are two free tools that allow anyone to easily crack WEP and WPA encryption using bruteforce technique. WPA2 is the latest standard and is what you must use if you want the highest level of protection for your wireless network. The encryption keys used change each time a device accesses the network making WPA more difficult to hack.

The encryption used by all devices in the network must be the same for the network to work properly. Your network will only be as secure as its least secure device. Make sure all devices you use support WPA2 encryption. Use a strong encryption key. Make sure that it is longer than 10 characters and contains a mixture of capital and small letters, numbers and symbols. Do not use common words and stuff that people can guess about you as your password.

2) Replace default passwords on your router with strong passwords: The biggest mistake most wireless internet users make is not changing default passwords on their routers. Hackers utilize public databases that contain default passwords and usernames from virtually every manufacturer. This enables them to change the security settings of your router according to their needs. Using a strong password for your router ensures that hackers and miscreants cannot change your network's security settings. To change the password on your router, visit Administration settings on your router's settings page. Also, do not store passwords in browsers as they can be easily made visible.

3) Change default SSID
Your network's SSID or Service Set Identifier is the name of your wireless network. Usually, the SSID is the name of the router's manufacturer along with the model number of the router. Changing it to not display this information prevents you from giving additional information about your router to prospective hackers.

4) Do not broadcast your SSID
Hiding SSID prevents unsophisticated and inexperienced hackers and wifi intruders from determining that your network exists. Hiding your SSID is relatively easy and the option to do so is usually under basic wireless settings on your router's settings page. However, it is important to note that some devices, including those running newer versions of Windows, will show every network even if they cannot identify its name. Moreover, your network will still contain the SSID in data packets making unmasking ridiculously easy with tools likeinSSIDerKismet and Commview for WiFi.

5) Use scary names to discourage Wi-Fi theft: If your wireless network has a name like C:\virus.exe, most people who might otherwise access your network will not for the fear of getting their devices infected. You can use your creativity to find more dangerous names for your wireless network.

6) See Connected Devices List: Almost every new router will have a page which displays the list of every device that is connected to the network. You should check this page at regular intervals to see that unknown devices are not leeching your network. When you see an unknown device, you can be certain that someone has breached your network. You can try AirSnare, a free utility which scans your network for unexpected MAC addresses and also looks into DHCP requests.
Secure Wireless Network

7) Turn off Guest networking: While most routers will have guest networking disabled by default, it always pays to see that you may not have accidentally enabled it. Guest networking allows others to access your network.

8) Enable MAC address based filtering: Media Access Control or MAC address identifies each device connected to your network. MAC address is an alphanumeric key separated by colons. Enabling MAC address based filtering allows only devices having particular MAC addresses to access your network. You need to enter the MAC address of every device you wish to allow to connect to your network on your router's settings page. This prevents unknown devices from connecting to your network even if they know your password. To find the MAC address of your computer, open command prompt and execute “ipconfig /all” without quotes.

While it may prevent inexperienced users from getting access to your network, experienced hackers and advanced users can use a wireless network analyzer like Nmap and then change the MAC address of his computer with another free tool MAC Shift.

9) Keep your firmware up to date: Router vendors regularly release firmware updates and post them on their websites. You should occasionally check the manufacturer's website to see if a new firmware update has been released. Newer routers will automatically inform you when new firmware is available.

10) Reduce wireless signal range: If you reduce the range of your wireless network, common sense tells that it will prevent hackers located at a distance from detecting your network. This has the advantage that if hackers do not know that a wireless network exists, they will not try to break into it. You can place your router at places which would block the Wi-Fi signals. While this technique is advantageous, a hacker keen on hacking into your network will just have to use a larger antenna to pick up your router's signals. Moreover, reducing the range of your wireless network might cause troubles for genuine users.

11) When not using your internet network, turn it off: This is self explanatory. If you are not using your network, turning it off saves you from giving extra time to hackers to try and hack into your wireless network. While it may be impractical to turn every device on your network off every time you are not using the network, it still is advisable to do so during extended periods of non use.

If you follow all these techniques, your Wi-Fi network will be a lot more protected and hackers will have a tough time breaking into it.

Know if your PC is infected with Viruses or other Malware (COMPUTER TRICK)

Know if your PC is infected with Viruses, Trojans or other Malware

The reason why most computer malware are so deadly is because many users fail to recognize whether they have been infected or not. Had they detected the infection at an earlier stage, the damage caused could have been greatly reduced. As each virus is programmed differently, it becomes difficult to identify a virus outbreak. However, there are some general symptoms that make it easy to detect an infected computer. Here are some of them:-

1) Programs won't start or crash suddenly: If some system programs like the task manager or registry editor have suddenly stopped working or crash randomly without any visible reason, it is more than likely that your computer has got some form of worm that is attaching itself to various programs and thus, corrupting their code. A virus modifying registry entries to prevent these programs from running could also cause this.

2) Unusual Network Traffic: If even after closing your browser and other applications that may use the internet, you see that your computer is still downloading or uploading anything, then your computer is possibly infected with some form of spyware that is either downloading other viruses to your computer or is uploading your private information to a remote computer. In case you use a wifi connection, it is also possible that your neighbors are using your network. If that indeed is the case, you need to make sure that wireless network is properly secured.

Malware Virus Worm Trojan Infection

3) Internet Connection not available or is slow: If suddenly, your internet connection has stopped working or has become extermely slow, it is possible that a malware is the cause. However, problems with your internet service provider could also be the cause of such issues.

4) Annoying Popups or Redirection to Strange Websites: If there has been an increase in the number of annoying popups while browsing the internet or your web browser redirects you to a different website from the one you wanted to visit, a virus or adware might be the cause.

5) Computer won't boot: If your computer has suddenly stopped booting, it is possible that some malware has modified your computer's system files. In such a situation, re-installing or repairing your operating system might be the only solution.

6) Slow Computer: Some viruses are designed specifically for this purpose. Malware programmers achieve this by designing viruses that increase your CPU's usage level to 100%. If on running the Task Manager, you find that your CPU's usage is constantly at 100% level, a malware might be the cause.

Computer Infected Virus

7) Programs start automatically: Some viruses and adware automatically start strange programs on your computer in order to show unwanted advertisements or simply to frustrate users.

8) Unusual File Associations: Some viruses change .exe or other file associations which prevents these files from opening. Some viruses also do this to automatically start themselves when a file of a particular type is started.

9) Security Software Disabled: Most malware disable antiviruses and firewalls to prevent themselves from being detected. If only a single software stops working, it might be a specific software failure issue. If it is a general trend and almost every security software is facing this issue, a virus infection is most likely.

10) Weird Behaviour: If your computer automatically starts sending emails or opens strange applications randomly or does things different from its "normal" behaviour, your computer is most likely compromised by malware. 

PC Security Tips : Make Computer Secure

PC Security Tips : Make Computer Secure

Here are some tips which will enable you to make your PC more secure.

Anti-virus

1. Never, ever turn off the resident protection of your antivirus even if it decreases performance. Upgrade if necessary.

2. Keep your virus definitions up-to-date. Use the automatic update feature of your anti-virus and try not to ignore the "Do you want to update now" message however often it might pop up.

3. Even if you update regularly and you have not seen any suspicious activity on your PC, do a deep scan at least once a month.

4. Always create an emergency boot disk and keep it in a safe place.

PC Security tips

5. Run a deep scan in safe mode at least once every two months to kill viruses that would otherwise remain hidden.

Firewalls

1. If you are unsure about the alert displayed by your firewall, try searching it on the internet.

2. A firewall is a powerful tool that requires an understanding of how the program works and exactly what it is doing and whether it is secure or not. Reading the help files is extremely important in successful configuration of your firewall.

Computer Security

3. If you are running a third party firewall,be sure to turn off the Windows Firewall.

4. You can temporarily disable a firewall by right clicking the icon in the tray. This is handy when you know a site is one you can trust but your firewall is blocking it. But remember to re-enable it as soon as possible.

5. Read firewall notices carefully when they pop up so that you don't let a bad thing in or prevent good traffic.


Anti-Spyware

1. You should regularly check for updates. Enable the automatic update feature.

2. Remember to do a scan every now and then, or schedule scans if your program allows it. If you don't want to sit that long for scans to complete, use a single folder for all your downloads, then scan only that folder,Windows installation folder and the Registry. Alternately, you can do a quick scan if your program allows it.


Anti-Spam

1. Be patient with anti-spam software, it will get better over time.

2. Even if it looks that your anti-spam software is working great, periodically check the 'Spam' folder for good mail. None of the anti-spam software is perfect right now.

3. Don't give your anti-spam software too much rules, because it will not learn anything then. It is better if it learns on its own.

Friday 18 July 2014

Speed Up a Slow Windows Computer to Make it Faster (COMPUTER TRICK)

Speed Up a Slow Windows Computer to Make it Faster

Having a slow computer is not something most users fancy but that is what most of us end up with after prolonged usage. Understandably, there are also a few of us who are trapped with a low-end PC and forced to get as much out of it as possible. This article caters to both types of users mentioned above as it not only explains how to make your computer as fast as it was when new but also how to reduce the footprint of your system to utilize your PC's current system resources in the best possible way.

First thing first. Make sure your PC isn't infected by a virus, worm or other malware

Anyone who has used an infected computer will verify how painfully slow a computer becomes when infected by a virus. More tech savvy users will counter that an infected computer's speed depends upon the type of malware. To be honest, it does. However, based on my personal experience, I can say that while some malware are designed specifically for making computers slow and unresponsive, most malwares tend to decrease a computer's performance. If your computer is infected, the first thing you need to do is deep scan your entire hard drive to remove all traces of the virus. Also, scan your secondary storage devices to make sure that they are clean as well. Additionally, make sure to follow best security practices to avoid getting infected in the future.

Increase computer speed

Remove unused and unnecessary programs

Now that we are sure that your computer is not slow because of a virus, you need to do is get rid of all the unnecessary programs that you have installed on your PC. To remove these programs, go to Programs in the Control Panel and uninstall your unnecessary programs one by one. If you are like most Windows users (including me) and are having a tough time figuring out which programs to uninstall as all of them seem important, follow this rule: If you have not used the program in the last month, it probably is unnecessary. It is better to uninstall that program given that you can reinstall it whenever required. It also is a good idea to remove all the useless software that came bundled with your computer at this stage. If you want, you can remove unused Windows features as well to further tone down your operating system.

Try faster alternatives to your everyday programs

If you use applications that require too much computing power to operate, you are better off replacing them with applications that do the same job as them but faster. Few resource hogging applications that you can replace are:-
1) Most resource intensive antivirus software can be replaced with the lightweight Microsoft Security Essentials.
2) Microsoft Office can be replaced with OpenOffice, an open source alternative that has loads of unique features.
3) Adobe Reader can be replaced with the free Foxit Reader.
4) The newer versions of Internet Explorer are pretty fast. However, if you have been using an older version, it is time to upgrade IE or replace it with either Mozilla Firefox or Google Chrome. This will also give you faster internet speeds.

Remove unnecessary startup programs

Startup programs are those programs which start automatically each time Windows starts. Not only do they result in a slow startup, but they also run persistently, until you close them, continuously consuming valuable system resources (CPU and RAM) while they are running. So, disabling unnecessary startup items will not only result in a faster startup but a more responsive computer as well, as these applications not running continuously means more RAM and CPU will be available for the operations you perform on the computer.

To disable unnecessary startup programs, type msconfig in the search bar in Start menu (in Windows 7 and Windows Vista) and on the Start screen in Windows 8 and 8.1. On Windows XP, type this in the Run dialog box. This will start the System Configuration utility. Click on the Startup tab and disable all the applications that you think are not essential on your computer's startup. Restart your computer to see the changes. Keep in mind to not disable your security products as that will make your computer more susceptible to getting infected.

Restart your computer often

PC speed
This is assuming that you continuously use your computer for long periods of time. Each time when you close a running program in Windows. it frees the memory that the program was occupying. However, it may so happen that some parts of the memory do not get freed which results in less system resources available to you to use which ultimately results in a slower PC. When you restart your computer, these occupied spaces in the memory get freed. Although, this memory issue has been somewhat fixed in recent versions of Windows, it still is a good idea to reboot your computer at least once a day.

Check your hard drive for errors

Over time, as you use your computer, chances are that some errors might creep in your hard disk which negatively affect your computer's performance. The best way to solve this issue is by using the inbuilt Disk Check utility available in all versions of Windows. To use it, execute chkdsk /r in the Command Prompt. Remember to open the Command Prompt as an administrator. It might prompt you to restart your computer. Execute Y to restart your PC. The chkdsk/ r command scans your computer's hard drive for errors and recovers readable data. Depending upon the size of your hard disk, this step might take some time. This step might increase your computer's performance phenomenally if there are a lot of errors on your hard drive.

Make sure you have enough free space

System speed not only depends upon CPU and RAM. If your hard drive is above 95% full, you will notice that your system hasn't been the fastest. This happens because Windows require empty space for swap files to increase in size and also as space for temporary files. It is imperative that the more cluttered and filled a hard drive is, the more difficult it is to read. To solve this issue, delete unnecessary data or move it to external storage devices.

Repair protected Windows system files

As you use your computer, it is possible that one or more system files gets damaged or gets corrupted which might effect your system's performance in a negative way. Thus, it is important to check that all your system files are original and behaving as they should. The best way to check your operating system's files is through the System File Checker. To run System File Checker, open Command Prompt as an Administrator and execute sfc /scannow. This command will check all your system files and if it finds that some of them are modified or corrupt, it will replace them with the original. This step can take anywhere between 5 to 15 minutes but is one that you should perform especially if your system had ever been infected by a virus.

Disable unnecessary visual effects

Speed up slow computer
The visual effects that make your computer look beautiful also slow it down considerably. So, if you want to get the best performance out of your computer, you should disable all these visual effects. To disable these visual effects:-
1) Press Windows Key+R to launch the Run dialog box.
2) Execute sysdm.cpl.
3) Go to the Advanced tab in the following Window and click on Settingsin the Performance section.
4) Then encircle Adjust for best performance. If you want to use visual styles and themes, check it (located at the very end of the list).
5) Click on Apply to apply the changes.

Disabling these visual effects could lead to a considerable improvement in your system's performance especially if you are on Windows 7 or Windows Vista and using the Aero interface without a graphic card.

Do not run multiple antivirus programs

Make sure that no more than one antivirus program is running on your PC. An antivirus's resident protection takes a lot of resources. So, having more than one antivirus program would bring about a significant reduction in your computer's speed.

Disable sound schemes

Whenever you perform an action in Windows, a sound is played to indicate it. Although it leads to a better user experience, it also contributes towards slowing your PC down. To make your PC a lean work machine, you should disable these sounds. To disable these, open Sounds from the Control Panel or alternately typemmsys.cpl in the Run dialog box. Go to the Sound tab and select "No Sounds" from the Sounds schemedropdown list and click Apply.

Update Windows and make sure that you are using the latest drivers for your hardware

Having all the updates ensures that your computer is running the best possible version of your operating system and your hardware is being utilized by the best possible code. Also, an updated operating system makes you secure against future intrusions by performance reducing malware.

Make computer fast

Use a Registry Cleaner to keep your Registry in good shape

The Windows Registry is a place which registers all the active system files and installed programs on your system. Over time, as you install and uninstall programs, the registry can get filled with useless entries which might increase its size making it difficult to read. This happens because most uninstallers don't remove the program's registry entries during an uninstall. The larger the Registry, the more time it takes for Windows to start.

To solve this issue, use a free Registry cleaner like CCleaner to remove useless entries. Depending upon the number of entries in your Registry and its size, you might see a significant increase in your computer's performance.

Delete Temporary Files

Temporary files are stored in your computer as Windows operates. They are files that contain your recently accessed files list, log files, your internet history, form history, cookies and temporary internet files. Over time, the number of these files increases and cleaning them becomes important. You can use CCleaner (mentioned above) to clean them or the inbuilt Windows Disk Cleanup utility by executing cleanmgr.exe in the Run dialog box. You can also schedule a disk cleanup to ensure that it happens automatically.

Disable Windows Search Indexing Service

Fast computer
The Windows search indexing service scans all the files and folders on your system and stores information about them in a database to make searches faster. Naturally, this results in consumption of resources. If you don't use Windows Search often or are willing to trade faster searches for a faster computer (as you should), disable the indexing service. To disable it, execute services.msc in the Run dialog box. In the work area on the right side, locate Windows Search service and double click on it. In the following Properties dialog box, select Disabled from the Startup type dropdown and click OK. Restart your computer. Your searches will be slow but your computer will be faster than ever.

Check Device Manager to look for hardware conflicts

Open Device Manager to see that all the connected hardware are functioning properly. If you find a hardware conflict, take the necessary steps to resolve it. If the conflict cannot be resolved, disconnect the problematic hardware until you find a solution.

Change to High Performance power scheme

If you are running your computer on a battery and notice that it is running slow, change the power scheme to high performance to increase system speed. Keep in mind that it will increase the amount of power consumed by your computer. To change the power scheme, open Power Options from the Control Panel. You can directly search for Power Options in Windows 7, Windows 8 and Windows 8.1 from the Start Screen/Menu.

Check if your computer is overheating

If your computer is overheating, then it is possible that it is causing your computer to run slowly. This is because most modern processors slow down when the computer is overheated to allow the computer to cool down.

To prevent your computer from overheating, make sure that the cooling fan works properly and that there is no dust clogging the air vents as it will prevent air flow which will result in poor cooling. Clean your computer's case with a light brush and place it somewhere where it can be effectively cooled by air. If you use a laptop, a cooling pad might be of help.

Defragment your hard drive

When Windows stores a file on your hard drive, it does not look for a place to store your file as a whole at a single place. Instead, it stores the fragments of the file randomly, i.e storing them at whatever empty space it can find the quickest. Due to this, the fragments of a single file can be scattered all across a hard disk. A hard drive that has many files distributed like this is called as fragmented. Naturally, this results in slower file access because Windows needs to find all these pieces and put them together (something like a jigsaw puzzle) before the file can be accessed.

Defragment harddrive to increase PC speed

This is what defragmentation corrects. When you defragment a hard drive, the scattered pieces of a file are put together and stored on the hard disk in continuous cells (assuming a hard disk to be made up of a large number of cells with each cell representing a particular storage space).

To defragment your hard drive, you can use the in-built Windows Disk Defragmenter utility. It can be searched on the Start Screen in Windows 8 & 8.1 and is located at Start>Programs>Accessories>System Tools in older versions of Windows.

Use ReadyBoost to increase the speed of your Windows computer

If you are running a computer that does not have enough RAM, using a flash drive with the ReadyBoost technique can and will give you significant improvement in speed. As with ReadyBoost, your flash drive becomes a cache that stores files that you might immediately require giving you faster access times than if those files had been stored on a hard disk.

Keep in mind that ReadyBoost depends upon the condition of your flash drive and was intended to increase speeds of devices which were short on RAM. If you already have a sufficient amount of RAM, chances are that you might see very little to no improvement in speed by using it.

Reinstall Windows

This is one of the more drastic methods and should only be used if all the methods mentioned above fail to bring any significant increase in your computer's speed.


If you haven't reinstalled Windows in a really long time, it is possible that because of constant use, the system has got bogged down with useless clutter in a way that no amount of tweaking will fix its condition. Then, reinstalling Windows is the only option.

Reinstalling Windows brings about a definite increase in speed but gives you a new PC without all your software and customization. Modifying it according to your needs will take a lot of time though but that is something you must compromise for a faster PC.

If you use Windows 8 or Windows 8.1, you can refresh your PC without affecting your installed apps and settings. To refresh your Windows 8 PC, open Update and Recovery by going to Change PC Settings from the Settings button that appears when you move your mouse pointer to the right side of your screen. Under it, click Recovery. Then under Refresh your PC without affecting files, click Get Started.

Upgrade to a solid state HDD

Although solid state hard drives are a lot faster for writing and reading data than older optical hard drives, their heavy price is something that keeps them out of the range of many. Still, if you do manage to get one for your PC, the change in speed will be immediately visible.

Finally, get more RAM

RAM or the Random Access Memory contains all the files of the programs that are immediately required by the computer and are in currently running. Obviously, this means that the more RAM you have, more the programs you can run without compromising on speed. RAM upgrades do not cost much and are one of the best ways to speed up a slow computer.

Should You Be Interested in Cloud Computing? (COMPUTER TRICKS)

Should You Be Interested in Cloud Computing?

The expensive cost of hardware and software drives up infrastructure and operation (I&O) expenses for most businesses. Many businesses are looking for different strategies to help cut down the I&O expenses. One of the fastest growing technology trends that can potentially reduce I&O expenses for businesses is cloud computing.

Save money with "Pay-as-you-go"

Cloud computing adopts a "pay-as-you-go" model, which allows business to pay only for the storage capacity that they use. This model provides very little up-front cost compare to setting up and maintaining an in-house infrastructure. Businesses can start out by renting a small amount of storage, and then increase the storage capacity as required. The idea behind the "pay-as-you-go" model is to allow businesses to adopt cloud computing quickly. Businesses will see an immediate return on investment (ROI) after migrating their infrastructure to the cloud.

Cloud Computing


Save money with "Outsourcing"

For maximum cost savings, most businesses will outsource most of their infrastructure components. By moving their infrastructure to the cloud and hosted by third-party cloud providers, businesses will experience a tremendous decrease in operation cost associated with IT staffing and hardware maintenance. Traditionally, businesses require a high number of IT professionals to take care of the day-to-day infrastructure maintenance such as installation, upgrades, and continuous enhancements. The number of IT staffs can greatly be reduced as more infrastructures are moved away from the traditional model and into the cloud.

Migrate to the cloud only when it makes sense

Advantages of Cloud Computing
Cloud computing offers a wide range of solutions that include Infrastructure-as-a-Service (IaaS), Desktop-as-a-Service (DaaS), and Software-as-a-Service (SaaS). The technology department is responsible for evaluating which one of these three components should be adopted based on the business requirements. For example, IT needs to determine the number of users that require desktops, the number and type of software applications, and the infrastructure components that are currently supported by the cloud. Businesses also need to research and evaluate the different cloud providers and cloud solutions. Standard office applications such as word processing, spreadsheets, and collaboration tools are offered by Microsoft Office 365 or Google Apps.

Another requirement that businesses should carefully evaluate is the mandatory federal and state regulatory and compliances. A financial institution will have stricter compliances to follow than a software development firm will. The reason for this is that financial institution contains more sensitive data than other type of businesses. As a result, financial institutions will have stricter guidelines when it come to moving their data to the cloud.

Less power equals more savings, and the go green factor

Whether the cloud is internally hosted or outsourced to third party cloud providers, businesses will save money on energy either way. Cloud computing is much more energy efficient because there are fewer servers and network equipments that are required to operate. In addition to saving energy costs, businesses are also contributing to a healthier planet by leaving a smaller energy footprint.

YouTube Tricks (INTERNET TRICK)

YouTube Tricks

YouTube, the extremely popular video sharing website averaging more than 3 billion page views per day needs no introduction to its fans who spend a considerable amount of their time watching and sharing videos on it. While most of these users know every nook and corner of this website, there are some features that are hidden deep within, in a manner that only few of the most experienced users seem to know about them. This article contains some such features, tips and tricks.

YouTube Tips, Tricks and Features
YouTube MySpeed 
Are YouTube videos taking too much time to load on your internet connection? Visit the YouTube MySpeed page to find your video streaming speed and compare it with the average speed of your ISP, your city, your state, your country and the world.

YouTube Disco
YouTube is all set to replace your music players with YouTube Disco. This music discovery project allows you to find the videos of your choice, create a list of them and then easily watch them without having the need to choose a new video after the one you are watching is finished.

YouTube Editor
Do you edit your videos before uploading them to YouTube? Now, you don't need to because it lets you to do all of that online with YouTube Editor; well not all of that but it at least lets you combine, trim and rotate videos. The best part about YouTube Editor is that it allows you to find copyright free music that you can add to your videos. It also offers some comparably advanced features like stabilizing shaky videos and inserting transitions.

YouTube TV
YouTube lets you watch the videos of your choice but have you ever wanted to just sit back and enjoy watching videos just like you watch television? If you have, then YouTube TV can be of help. YouTube TV plays high quality full screen videos tailored to your choices (if you are signed in to your Google account). If you are not signed in, you can choose a category to watch videos from, watch featured videos and even search for the video of your choice. You can then connect your TV to your computer to seamlessly enjoy TV, YouTube style.

YouTube Tips & Tricks
YouTube Leanback

Set default video playback quality
Are you annoyed at manually changing the quality of every YouTube video you watch? Now you don't need to, because YouTube has an option that automatically lets you select the quality of videos you see. If you have a slow connection, you can select the option of never playing high quality videos. You can also select the option of showing captions and annotations automatically.

Watch Videos blocked in your country with a URL trick
If the URL of the video that is blocked in your country is youtube.com/watch?v={video-id}, you can access it by going to youtube.com/v/{video-id}. As an additional advantage, you will be able to view the video at the full size of your browser window.

Link to a specific time in a video
If you want to link to a video at a specific time, you can add #t=XXs to the URL where XX is a variable which represents the number of seconds after which the video will start.

Play videos in slow motion
Press the space bar while a video is being played to play it in slow motion.

YouTube Live
Ever wanted to broadcast your videos live on the internet? YouTube Live lets you do just that. YouTube Live supports larger production than Hangouts on Air. However, to broadcast videos live, your channel must be ingood standing.

YouTube Tricks, Tips
Broadcast live events on YouTube
Create a feed of almost anything on YouTube
Just go to the YouTube Data API page and build a custom feed for yourself. However, there is a problem with the URI generated for specific categories as "{http://gdata.youtube.com/ schemas/ 2007/ categories.cat}" is also added to it. Remove this and the URI is good to go.

Find out what is popular on YouTube
Want to find the best videos on YouTube? Use Popular on Youtube channel to find what other users are watching, discussing and favoring. You can select a particular category to determine the best videos in that particular category. You also have the option to play all the videos that are popular right now.

Legally Watch Full Length Movies and TV Shows on YouTube
YouTube has a dedicated page to allow users to watch full-length ad supported movies for free. Movies are classified based on their genre and are offered in full HD quality. Movies are uploaded by the creators for the purpose of creating another source of revenue for themselves as Google gives them a portion of the advertising revenue. A similar page exists for TV shows. These two pages are country specific and may or may not be available in your country.

YouTube Easter eggs

For Star Wars and Star Trek fansIf you are a Star Wars fan, then there is some good news for you. YouTube has an easter egg just for you guys. Search YouTube for "use the force, Luke" to warp your screen. Star Trek fans need not be disappointed as there is an easter egg for them as well. Searching YouTube for "Beam me up, Scotty" reveals it.

YouTube Snakes Easter egg
You can play the classic Snakes game while watching any video in your browser. Just pause a video, hold the left arrow key for 2 seconds and while still holding it, press the Up arrow key. This only works in the new YouTube player on videos played on YouTube.com.

do the Harlem shakeSearch YouTube for "do the Harlem shake" and the entire page will shake violently with the song "Harlem Shake" by Baauer being played in the background.

JavaScript Tricks: Edit Websites in Browser (Live) (INTERNET TRICK)

JavaScript Tricks: Edit Websites in Browser (Live)

Imagine a world where you are a God and have ultimate control on what happens and more importantly, how it happens. Seems too good a dream. Now it has come true, at least for the online world.

JavaScript tricks
Using this trick, you will be able to edit any webpage live in your browser as if it was a Wiki and change the details according to your wish. Yes, you read that right. You can edit Google or even Facebook for that matter right in your browser and that too without requiring any technical know-how or getting deep into hacking and cracking.

Here is an example picture demonstrating the Google Homepage edited by me to say that I own Google.
Edit Websites Browser

This is just an example. You can use it for anything like showing wrong traffic stats or for fooling people by showing that someone said something about them on Facebook or Twitter. It depends only on your creativity. But I would advise you to stay ethical and use it for entertainment purposes only.

(Mozilla Firefox does not support this. If you use Firefox, you can use the bookmarklets given at the end of this post. If you use Google Chrome and the code does not seem to work, precede it with "javascript:" without quotes.)

To use this trick, all you need to do is just copy the code given below and paste it in your address bar after you have opened the website you wish to edit. And start editing.

javascript:document.body.contentEditable%20=%20'true';%20document.designMode='on';%20void%200
You can capture a screenshot by pressing the Print Screen key or by using the Snipping Tool if you use Windows 7 or Windows Vista. If you wish to again make the website non-editable to give a more authentic look, copy and paste the code given below in the address bar after you are done editing (does not work in Firefox).

javascript:document.body.contentEditable%20=%20'false';%20document.designMode='off';%20void%200

Or, alternatively you can use the following bookmarklets by dragging them to your Bookmarks bar.

1.  Edit this Website

2.  Done Editing

The editing that you do will however be temporary as it is not server-sided. You can also save the modified website through your browser by File>Save. This works on all common web browsers including Chrome, Firefox, Opera and Internet Explorer.

How to Unblock Websites at School, Work, Home or Anywhere (INTERNET TRICK)

How to Unblock Websites at School, Work, Home or Anywhere

Internet Censorship has grown drastically over the past few years with countries like China, Pakistan, Saudi Arabia, Iran taking the lead over other governments in extending internet censorship to almost all sources of free unbiased information. Some schools and offices also prevent users from accessing certain websites which they believe are of no use in the respective areas. Governments sometimes enforce censorship on all forms of print and digital media like newspapers and television. China is known to have even forced Google to filter its search results. In such times, sometime you may need to access a website that is blocked. This article explains how.

Which websites are most commonly Blocked?
Unblock Websites
The most commonly blocked websites include websites about pop culture, health, medicine, women, religion and politics. Social websites that are often blocked include Blogger (Blogspot) blogs, Google News, Facebook, Orkut, MySpace, Bebo, Flickr, Hulu, LinkedIn, Yahoo! Messenger, Typepad, eBay, WikiLeaks, Digg, Reddit, Technorati, StumbleUpon, Delicious, YouTube, DMOZ etc.

Access Blocked Websites at School, Work or Anywhere

There are many genuine reasons for which you might visit blocked websites at your school or office. Given below are the many ways you can use to regain access to the blocked website you wish to visit.

1. Cache: Many search engines maintain a cache of web pages indexed by them. You can search for a website on Google , Yahoo! or Bing and click on the cached link that is given next to the result. To load the web pages more quickly, you can visit the text-only version.

2. Using Google Mobile Search: Google Mobile Search acts as a proxy which you can use easily. It removes all the CSS styling and JavaScript and presents a stripped down version of the web page to the user from it's own server. Due to this, the blocking software feels that you are visiting Google, whereas in reality, you are viewing the blocked website. It also breaks larger pages into many smaller ones. Go to Google Mobile Search.

3. To access a blocked website, you can enter the IP address instead of the URL in your browser's address bar. This can bypass most basic forms of website blocks. Although if the blocking software maps the IP address to the website domain, the website will still remain blocked. You can find the IP address of the website by pinging the website domain name in command prompt and noting its IP address. Execute ping www.tweakandtrick.com in command prompt to ping www.tweakandtrick.com.

4. Access Blocked Websites using Google Translate or Yahoo! Babelfish. You can also use translational services to get on blocked websites. To do so, enter a language different from the website in the 'From' field and English in the "To" field. You can also use this method to bypass software that block websites on the basis of specific keyword mentions. Just translate the URL you wish to visit in a different language to overcome the keyword block.

5. Proxy Websites: There are many proxy websites (anonymizers) which open blocked websites on their servers and present the data to you. This hides from the service providers the address of the website you are trying to visit. Few popular free ones include HideMyAssAnonymouse and KProxy.

6. Use RSS Readers for Accessing Restricted Blogs: All blogs syndicate their content via RSS feeds which you can subscribe to in web based RSS Readers like Bloglines to access blocked content.

7. Use IP Address to Decimal Conversion: If you cannot access blocked websites, you can enter the decimal number of the URL's IP address to get access to restricted websites. Search Google for IP to Decimal + IP Address of the banned website and Google will convert it into decimal. Enter that into your browser's address bar and see if the blocked website opens.

8. Create a 2 layered Unblocker: Just go to Google Translate or Yahoo! Babelfish, open any proxy website inside it and then use that proxy website to access your blocked website. In this way, you can achieve two layered website unblocking.

9. TORTOR or The Onion Router is a free software that protects the privacy and security of its users by channeling data through multiple nodes so as to prevent the orginal data from being unscrambled. Although browsing through TOR is a bit slow, it is one of the most effective ways of bypassing restricted websites.

10. Nyud.net: To unblock blocked websites, just add nyud.net to their URL. For example, if this blog (www.tweakandtrick.com) is blocked, you can visit it by going to www.tweakandtrick.com.nyud.net.

11. Opera Mini Simulator: Opera offers a web based version of Opera Mini to allow users to get an experience of what it is like. You can use this demo version to access most websites that offer their mobile versions. Even websites that do not offer a mobile version can be viewed through this, although the quality of the results obtained may not be that good.

12. Changing DNS servers: A common way of blocking websites is preventing DNS servers from giving the locations of the blocked website's servers. In such a scenario, changing your DNS servers to OpenDNS's or Google's DNS will be your best option to get over the block. As an additional advantage, this will alsoincrease your internet speed.

13. VPN Software: VPN or Virtual Private Network Software can be described as a tunnel under the public network that offers more anonymity than proxy websites as it also encrypts the data transferred by the blocked website thus, offering complete anonymity when you access your favorite web applications. Although most VPN software are available as paid software only, HotSpotShield is a popular free alternative.

14. IP Hiding Software: Sometimes, websites block users on a particular IP address from visiting themselves. In such cases, free IP hiding software like UltraSurf can be used to visit them. While free software offer very less features as compared to paid ones, they are still effective for overcoming most common blocks.

15. Edit your host files: Some malware and blocking software edit your host files and add a website's address to prevent you from visiting that website. In such a scenario, you can edit your host file with Notepad by visiting “C:\WINDOWS\system32\drivers\etc” if C is your system drive and remove that website. In Windows Vista and Windows 7, a warning from UAC might be displayed while editing your host files.

Ways to Unblock Restricted Websites (INTERNET TRICK)

Ways to Unblock Restricted Websites

One way of accessing blocked websites is through the use of proxy websites. However, it is not possible to use them to unblock each web site. If the website you wish to visit falls in this category, then you must use the methods given in this article. Beforehand, I would like to make it clear that different websites are blocked differently.

So you must try all of the tricks given before reaching the conclusion that you cannot access a website. Some of the tips given in this article can also be used to prevent your surfing and IP Address from being logged. So, let us begin:-

Cache

Google and other search engines maintain a cache of web pages that are spidered by their robots and are present in their index. This cache(snapshot) of the web page is saved by Google as a back up in case the original page is unavailable. This can be accessed by clicking on the cached link besides the search results that appear for search queries. The cached version of the page might not be the latest version of the website but nonetheless, you can still use it to visit the web site of your choice. Another way to view the cached version of a web page is by using the 'cache:example.com' search query.



Internet Archive( Wayback Machine)

Internet Archive is a non-profit organization which stores websites in an archive form using which you can see how the website looked at a specific time. This is similar to a saved copy of the website on your local hard drive. Just visit Wayback Machine and enter the address of the web site you wish to visit to see if a cached copy of it is available. This archive can also be used to access websites that are suspended or down.

Site Wayback Machine Internet Archive


Translation Services

Translation Services like Google Translate and Yahoo! Babel Fish can also be used to unblock websites. Enter the URL of the website in the translation field. Select a different language than the one on the website in the "Translate From" field, and the language you read in the "Translate To" field. e.g. If the web page is in English, select an other language like Spanish in the 'Translate From' field and English in 'Translate To' field. This method can be effectively used to access restricted websites.

Google Translate's Access

Changing HTTP into HTTPS

This is the fastest way to gain access to restricted websites. To use this method, just change the 'http:' in your URL to 'https:'. This can confuse the software which is blocking the site you wish to visit. Although this might not work every time, it still is a handy trick to tackle not so complex website blocks.

accessing using HTTP to HTTPS

IP Address of the Website as Address

This is probably the most effective way to access blocked websites. To use this method, first you need to find the IP Address of the website you wish to visit. You can use the command prompt and type 'ping mydomain.com' to get the IP Address of the restricted website. Now that you have the IP address of your website, just enter it in the address bar of  your web browser and press Enter. It is highly probable that the website you wanted to visit will be unblocked.

How to Access Blocked Websites, View Restricted Sites (INTERNET TRICK)

How to Access Blocked Websites, View Restricted Sites

Most of us find ourselves in situations where a website we wish to visit is blocked by a software or by our ISP (Internet Service Provider). So the question arises, how can we access blocked websites? The answer to this is simple: Proxy websites. Before going into details, let us know a bit about these proxy websites. 

Proxy Websites

A proxy website acts as an intermediate source between the user and server the site being contacted is hosted on. Users send requests to proxy websites which conveys them to the site's server. The reply received by the proxy website is then forwarded to the user's computer. This gives an impression to ISP's and blocking software that the user is visiting the proxy website but in reality, s/he is visiting the site which was blocked. Thus, proxy servers also provide extra security to users by hiding their online activities from their ISP's.

Acess Restricted Websites

Commonly Blocked Web Sites

The sites which are most commonly blocked at workplaces, schools and offices include websites likeFacebook, Orkut, Blogger (blogspot), Google News, Typepad, eBay, MySpace, YouTube, MSN, Yahoo! Messenger, Bebo, Google Talk, Gmail, Photobucket, AOL AIM, Flickr, Twitter etc. In some countries, social bookmarking sites like Digg and Reddit are also blocked. Countries like Saudi Arabia, Pakistan, China have even blocked access to mainstream media websites like The New York times. A proxy website can be used to easily access these blocked websites. As proxy websites hide a user's location, they can also be used to access popular websites which are restricted to particular countries and block users from other countries from visiting them.

Types of Proxies

There are two types of proxies. First, there are web proxies which have an interactive interface; and second, the proxy servers which work on the basis of IP Addresses and port numbers. Proxies can also be segregated on the basis of anonymity into Anonymous, Transparent and High Anonymous depending upon the amount of privacy they provide.

How to Find Proxy Websites and Proxy Servers

A simple Google search containing the word "proxy websites" is likely to return a lot of useful results. However, most of them are likely to be lists containing proxy servers which you can setup using their IP Address and Port Number. So, in order to find interactive proxy websites, you will have to search for something like "Facebook Proxy Server" or "Orkut Proxy Server". A search like this is most likely to return interactive proxy websites with which you can access your blocked website by simply entering the URL in URL field. If you want additional security and anonymity, you can opt for a paid proxy server.

If you do not want to search, here are few popular free proxy websites you can use:-
  1. http://www.hidemyass.com
  2. http://www.spysurfing.com/
  3. http://proxify.us/p/

How to access Blocked websites

How to Setup Proxy Servers using their IP Address

If you wish to visit your blocked website using a web proxy, you do not need any setup. However, if you wish to use a proxy server that can only be accessed by using its IP address and port number, you must configure your browser to use it. Follow the instructions given below to setup this type of proxy in your browser:-

Google Chrome and Internet Explorer Users

Google Chrome uses the same network settings as Internet Explorer. So, in order to configure Google Chrome to use a proxy server, you have to configure Internet Explorer. You can configure a proxy server in Internet Explorer by following the instructions given below:-

  1. Start Internet Explorer.
  2. Click on ToolsInternet Options.
  3. Click on Connections Tab, select your Network Connection and click on Settings.
  4. Check on Use a Proxy Server for this Connection.
  5. In the Address field, add the IP Address of your Proxy server. In the Port field, enter the Port Number.
  6. Click on OK and OK again.

Mozilla Firefox Users

Mozilla Firefox users can configure their browser to use a proxy by following the instructions given below:-

  1. Start Mozilla Firefox.
  2. Click on ToolsOptions.
  3. Click on Advanced Tab.
  4. Click on Network tab.
  5. Click on Settings.
  6. Encircle Manual Proxy Configuration.
  7. Enter the IP Address and Port Number at the appropriate place. In most cases, it will be a HTTP server.  
After you have successfully configured your browser to use the proxy server, you will be able to access blocked websites whenever you browse the internet with your browse

Safety and Security Risks When Using Facebook (FACEBOOK TRICK)

Safety and Security Risks When Using Facebook

There is no doubt that the biggest social networking site taking over the whole globe is Facebook. Since it’s the biggest thing the online world has ever seen for the last several years, it’s critical that you understand the guidelines and policies listed on the site. They’re very useful in keeping you informed with various aspects of the site and how it runs.

You should know by now that for every website that you go to, there’s always a good chance of encountering good and bad users. Facebook can be accessed by just about anybody so it’s imperative that you are wise and conscious with how you distribute or share information about yourself on it (and other social networking sites for that matter).



Identity theft is one of the biggest concerns in the online world today. They are real and can devastate a person’s life if the person isn’t aware of what’s going on.

The internet is fun to be on nowadays since it helps you to keep in touch with your old and new friends, family and associates. You can share content such as pictures with anyone who has an internet connection, play games seamlessly through a virtual portal, being aware of announcements and updates of certain events and entertaining friend requests. Such things have prompted users to come back for more and what many aren’t aware of is the fact that they are vulnerable to online predators and criminals.

So what should you do to help protect yourself from the bad guys out there? Here are just some helpful things that can help you in the long run if you follow them religiously:

1. Understand how the security feature works on Facebook.
As you are well aware, Facebook is known for periodically modifying its security settings. You will observe posts from the site of the changes being made with regards to its security features that lets other users see content that you don’t want them to view. It’s critical that you look into this carefully and see if the changes can significantly affect you in some way.

2. Don’t reveal too much information on Facebook.
One of the most obvious ways of getting in trouble within the biggest social networking site is by revealing too much information on just about everything (including yourself). You should be aware of the things that you’re sharing, be it your profile, wall posts, messages and even the content that you share such as pictures and videos. You’ll never know, criminals would use whatever it is you post for their own evil means.

3. Pay attention to links, e-mails or friends
Social networking sites these can be penetrated by online criminals who use sites like Facebook to gain information about you. This can occur through a sent or posted link, which will in turn eject a virus or spyware to retrieve personal information about you. If you happen to receive a link that you find suspicious, ask your friends about it or simply delete it.

Make Facebook Photos & Posts Private (FACEBOOK TRICK)

Make Facebook Photos & Posts Private

Do you have private pictures of yourself or your family on Facebook which you don't want the entire world to see? This guide will help you change your Facebook privacy settings to only allow your friends or people you know to see your Facebook photos (and everything else you do). You can even customize the privacy settings of individual albums to share them with a small group of people like your co-workers or relatives.

Make Facebook Photos & Posts Private
There are three ways in which you can do this. Either, you can customize each wall post's or photo's settings individually, or set the preferences for specific albums or use a general setting for all posts and photos you have.

1: Choosing an individual wall post's or photo's privacy settings

While posting your photo or post, click on the down arrow left to the post button. Select Custom from the drop-down menu. Using the pop-up, select who you wish to make a post visible to. You can select if you wish to show a post to friends, friends of friends or specific people or a specific list of people.

Make Facebook Photos Private
Select Custom Privacy Options
You can even hide a photo from specific people or a list of people. This will be especially useful in situations where you don't want your colleagues to see a certain picture that makes fun of them or something similar. Normally, when someone is tagged in a photo, every friend of that Facebook user gets to know about it. So, if you chose to make a photo visible to friends and someone is tagged in that picture, all their friends will see that image. To prevent this, uncheck the Friends of those tagged checkmark.

Facebook Pictures & Posts Private

2: Limiting the Audience for an entire album

This is much similar to setting the audience for an individual picture. Just go to your albums, click on the Settings icon on the bottom right of the album whose privacy settings you wish to customize. Then select Custom from the drop down menu. The options Facebook offers are almost the same as those for an individual photo, however there is one difference.

Private Pictures Facebook Posts

All those people who are tagged and their friends would still be able to see the photos in your album. To prevent this, you will have to change the privacy settings of each individual photo.

Facebook photos & posts privacy settings

3: Making all your Photos and Posts Private

This is the permanent solution against worrying about your Facebook content. However, it doesn't offer much customization options and should only be used if you are sure how you will use Facebook. This is a 2 step process and involves customizing the audience for your past posts as well as those you will make in future.

Step 1: Limiting Past Posts & Photos
Go to your Privacy Settings, and then go to "Limit the audience for posts you've shared with friends of friends or Public?." Then click on the "Limit Old Posts" button. In the pop-up, click Confirm. This is a permanent change and cannot be undone. However, all those tagged and their friends would still be able to see your posts. To prevent this, you will have to change each post's settings individually.

Step 2: Limiting Future Posts and Photos

Facebook Content & Photos Private

While in the privacy center, click on "Who can see your future posts?" This will open a non-functional status update box. However, the privacy options that open when clicking on the down arrow right next to the post button are functional and act as global defaults for the content you post on Facebook in the future. Make sure to select friends if you only wish to share content with your friends. You can however, change this according to your needs; but for most people, friends would be the best option. You can further improve your privacy by selecting Custom and then unchecking the check box that appears next to "Friends of those tagged". This will customize your Facebook settings to show your Facebook activity only to your friends and those tagged.

You can also select who gets tagged in your content to further prevent your content from appearing in front of unwanted eyes. To do this, go to your Privacy Settings from the Settings icon located at the top right of the blue Facebook bar. Then, in Privacy Settings, click on Timeline and Tagging. Then under, "How can I manage tags people add and tagging suggestions?", select Enabled to review tags that friends add to your posts.

Facebook's privacy settings take some time to adjust but once you are done, you will never have to worry about your content ending up in front of unwanted users.

Facebook Scams and How to Tackle Them (FACEBOOK TRICK)

Facebook Scams and How to Tackle Them

Online scams are ever increasing. Almost in every phase of the online world, you will come across scams. Social networks are no exception for such malicious activity. Recently, millions of accounts from LinkedIn and eHarmony were compromised. Facebook seeing danger has updated its security and is advising its users regarding various scams and how to fight them back.

Facebook Scams

‘Please send money scam’
An unknown account sends a message stating that he/she has been mugged. Descriptions of events seem accurate including real names and places. Finally, the sender requests a certain sum, which will enable him/her to return home safely.

Facebook has attributed such scams as ‘Please send money scams’. The sender’s account is either fake or has been taken over by cyber criminals. On receiving ‘please send money scam’ messages, Facebook advices to report/block the account.

Phishing
Phishing is a common way to to hack account(s). Phishing links are sent within messages or through chats.

Phishing links through messages:
A message, which has scrambled words with funny fonts, is the first indication of a Phishing attack. Typo errors and misspelled words are other significant signs to look for. Such messages will be themed around offering gifts such as coins, jewels or any other artifacts. Finally, you will be asked to click on a link placed at the bottom of the message. Immediately report accounts who send such messages.

Phishing links in chats:
If any strange links appear while chatting, then beware. The account through which phished links appeared while chatting is probably compromised. Report the link immediately. However, doing so will not affect the account. Only the link will be considered for review by Facebook’s security team.

What to do if I had clicked on Phishing link accidentally?
If accidentally, a phishing link is clicked, go to password settings  in your profile and change your password immediately. This will eliminate any Phishing threat. It is important to ensure that your new password is hard to crack.

Malicious Script Scam
Often you will come across Facebook applications requesting to copy a certain script and paste it in your browser. Such scripts are malicious in nature. For instance, some applications will provide a list of your profile visitors when the script is pasted in your browser. Apart from showing recent visitors, these applications send events and messages to your friend list. These applications and scripts should be avoided. A screenshot of one such application is shown below:

Malicious Scrip Scam

Suspicious emails:
Occasionally, some emails will request to reset your password, give a warning or will be about notifications. These mails are so convincing that they appear to be from Facebook. A request to click at the link provided at the bottom of the message should alert you. To check the validity of the link, right click and copy it. Later paste it on a separate tab and make sure that the URL starts as www.facebook.com.

Note: Facebook will never request your password through emails.

Suspicious Notifications:
Never click on links within suspicious notifications. For instance, you will receive a notification stating that you had requested a password reset albeit you never had requested. Other suspicious notifications include the ones notifying you of registration of a new Facebook account. With the help of your email provider, mark these mails as spam.