Find out what I'm doing, Follow Me :)

Tuesday, November 30, 2010

New Scam: Some Facebook App Promises To Show You Who Viewed Your Profile--Don't believe it

Facebook users not only want to keep check on people they know but also want to know who's been checking out their profile.

The petitions have been around for a long time to let Facebook users see who viewed their profiles, numerous online forums like Yahoo!Answers are dedicated to whether or not users can uncover who has been clicking through their profile, and numerous apps also claim to uncover who all have viewed their profile.

Now their is one more scamming application "eprivacy" which also promises to uncover who all visited your profile. Don't fall for it--installing this app. and giving it access to your Facebook profile will not only increase the threat of your Facebook profile being scammed, but will also give the app. creators full access to your personal information.

The app has been spreading rapidly on Facebook via message, "OMG OMG OMG... I cant believe this actually works! Now you really can see who viewed your profile! on"

Do try and stay away from this type of scams.

Here is a screenshot of the app.:

Get Your Facebook Email Id

Facebook have just launched a new features in which it will provide email addresses to its users, at present time facebook email id is not open to everyone,users have to request invitation. In order to get a invite to this new service you need to visit the under given link where in you would be asked to click on the ‘Request Invite’ button.


After competing this procedure you will get your email id as soon as it gets approved by by facebook administrators or facebook team.

Note that Your email address will match your public username, for example:


Then your email address will be:


If you don’t have a username, you can follow the under given link and get you username.

Is your "Nokia" Cell Phone "Original"

Nokia is one of the largest selling phones across the globe. Most of us own a Nokia phone but are unaware of it’s originality. Are you keen to know whether your Nokia mobile phone is original or not? Then you are in the right place and this information is specially meant for you. Your phones IMEI (International Mobile Equipment Identity) number confirms your phone’s originality.

Press the following on your mobile *#06# to see your Phone’s IMEI number(serial number).

Then check the 7th and 8th numbers

Phone serial no. x x x x x x ? ? x x x x x x x

IF the Seventh & Eighth digits of your cell phone are
02 or 20 this means your cell phone was assembled in Emirates which is very Bad quality

IF the Seventh & Eighth digits of your cell phone are 08 or 80 this means your cell phone was manufactured in Germany which is fair quality

IF the Seventh & Eighth digits of your cell phone are 01 or 10 this means your cell phone was manufactured in Finland which is very Good

IF the Seventh & Eighth digits of your cell phone are 00 this means your cell phone was manufactured in original factory which is the best Mobile Quality

IF the Seventh & Eighth digits of your cell phone are 13 this means your cell phone was assembled in Azerbaijan which is very Bad quality and also dangerous for your health.

Monday, November 29, 2010

How to Completely Erase a Hard Disk Drive?

A new year has begun and perhaps you have decided to perform a system upgrade or get rid of your old computer system and purchase a new one. But before you sell or donate your old computer, it is very much necessary to completely erase your Hard Disk Drive. Yes, every one of us are aware of this fact and so, we delete the contents of the hard disk either by using the DELETE key on our keyboard or by Formatting the hard disk.

Deleting and Formatting – Just Not Secure Enough


But the fact is, the data will still be on the hard disk even after deleting it or formatting the hard disk. Using the delete key on your keyboard will only remove the shortcuts to the files making them invisible to users. Deleted files still reside on the hard drive and a quick Google search will show many options for system recovery software will allow anyone to reinstate that data.
Formatting the hard drive is a bit more secure way to erase the hard disk. Formatting a disk will not erase the data on the disk, only the address tables. It makes it much more difficult to recover the files. However a computer specialist would be able to recover most or all the data that was on the disk before the reformat. For those who accidentally reformat a hard disk, being able to recover most or all the data that was on the disk is a good thing. However, if you’re preparing a system for retirement to charity or any other organization, this obviously makes you more vulnerable to data theft.

Erasing the Hard Disk through DISK WIPING


So it is necessary for us to use a 100% secure way to erase the hard disk. The secure way of erasing the hard disk is called Disk Wiping. Disk wiping is a secure method of ensuring that data, including company and individually licensed software on your computer and storage devices is irrecoverably deleted before recycling or donating the equipment. Because previously stored data can be brought back with the right software and applications, the disk wiping process will actually overwrite your entire hard drive with data, several times. Once you format you’ll find it all but impossible to retrieve the data which was on the drive before the overwrite. The more times the disk is overwritten and formatted the more secure the disk wipe is.There are a variety of disk wiping products available that you can purchase, or freely downloaded online to perform more secure disk wipes. One of my favorite disk wiping software is.
You have to use this tool by burning the iso image file onto a CD or by using a floppy disk. After burning this tool you have to boot your PC and follow the screen instructions to completely erase the hard disk.

Trick to add Google Documents to the Windows Explorer "New" menu

This trick is for the users who want complete windows integration. This trick works for all versions of Windows. Keep reading for full instructions.

Import the Registry Hack
The first step is to download and extract the package we’ve provided at the end of the article. Once you’ve done that, you’ll have to import the registry hack file, since there are just way too many keys to manually create them all.
Just double-click on the AddGoogleDocsToNewMenu.reg file, provided in the zip file at the bottom of the article, and you’ll see a message saying it was successful.

You aren’t done yet! Keep reading...

Copy the Icons and Runner Application

I’ve created a set of icons and a tiny runner application, which does nothing more than launch whatever your default browser is. In fact, it’s created in AutoHotkey and consists nothing more than the following line:
Run, %1%
You’ll need to copy the 4 icons and the googledocsrunner.exe and put them all into your Windows directory. There should be 5 total files, and it’ll look something like this once you copy them in:

Now you are almost done. Finally you just need to use the “Refresh” option in the context menu.

Go ahead, test it out! Open up your New menu, and select one of them.

If the icons aren’t showing up yet, you might have to log out and back in, or restart Explorer.exe.
Link to the package file:

Sunday, November 28, 2010

Create a fake virus

Many computer users’ wants to pretend that they are a dangerous hacker with the ability to take down any PC, and after you read this article, you can do show off your skills with nothing more than Notepad.

Of course, we’re not making an actual virus—it’s a fake virus. In fact, it’s a test virus. But it’s still fun.

Create a Fake Virus with Notepad

Open up a Notepad window, paste in the following text, and then save it.


It should look exactly like this once you’ve pasted it.

And then you’ll almost instantly see a big fat warning that you’ve created a virus—as long as you’ve got anti-virus installed and working, of course. If you don’t see any warning, you should probably make sure your virus scanning software is properly enabled.

Text2Mail for Mac OS X

MacHouse has announced the release of Text2Mail version 1.1.0 for Mac OS X. Text2Mail provides a quick and easy solution to send the same message to more than one e-mail addresses quickly through Apple’s Mail. This application uses a document file to compose multiple documents on Mail. You have to simply drag and drop an existing document file which contains a message with pictures and hyperlinks onto drop box of the application. This version comes with some improvements. In this version there is an option available for user to activate or deactivate chime after Text2Mail sends out all messages. Now you can set your default mail subject.

Text2Mail 1.1.0 requires Mac OS X version 10.5 or later. It also requires Text Editor and Mail. Text2Mail 1.1.0 is available at a price of $11.95 USD. You can download the free trial version of Text2Mail 1.1.0 from here. Stay tuned with us for more updates.

A website that sold details of stolen credit card, taught how to manufacture illegal drugs and even taught how to make bombs

British police have uncovered a biggest criminal website in the history of cyber crime. Thousand of criminals were logging onto the "cyber supermarket" to shop for stolen credit card details, to learn how to manufacture illegal drugs and to even learn how to make bombs. This website (GhostMarket) worked on the strategy of stealing important and confidential information (including pin codes and passwords) of innocent net bankers and online shoppers and selling them to its members.

Saturday, November 27, 2010

What are Public IP & Private Ip Addresses ?

Internet Protocol (IP) addresses are usually of two types: Public and Private. If you have ever wondered to know what is the difference between a public and a private IP address, then you are at the right place. In this post I will try to explain the difference between a public and a private IP addres in layman’s terms so that it becomes simple and easy to understand.

What are Public IP Addresses?

A public IP address is assigned to every computer that connects to the Internet where each IP is unique. Hence there cannot exist two computers with the same public IP address all over the Internet. This addressing scheme makes it possible for the computers to “find each other” online and exchange information. User has no control over the IP address (public) that is assigned to the computer. The public IP address is assigned to the computer by the Internet Service Provider as soon as the computer is connected to the Internet gateway.

A public IP address can be either static or dynamic. A static public IP address does not change and is used primarily for hosting webpages or services on the Internet. On the other hand a dynamic public IP address is chosen from a pool of available addresses and changes each time one connects to the Internet. Most Internet users will only have a dynamic IP assigned to their computer which goes off when the computer is disconnected from the Internet. Thus when it is re-connected it gets a new IP.
You can check your public IP address by visiting

What are Private IP Addresses?

An IP address is considered private if the IP number falls within one of the IP address ranges reserved for private networks such as a Local Area Network (LAN). The Internet Assigned Numbers Authority (IANA) has reserved the following three blocks of the IP address space for private networks (local networks): – (Total Addresses: 16,777,216) –
(Total Addresses: 1,048,576) –
(Total Addresses: 65,536)

Private IP addresses are user for numbering the computers in a private network including home, school and business LANs in airports and hotels which makes it possible for the computers in the network to communicate with each other. Say for example, if a network X consists of 10 computers each of them can be given an IP starting from to192.168.1.10. Unlike the public IP, the administrator of the private network is free to assign an IP address of his own choice (provided the IP number falls in the private IP address range as mentioned above).

Devices with private IP addresses cannot connect directly to the Internet. Likewise, computers outside the local network cannot connect directly to a device with a private IP. It is possible to interconnect two private networks with the help of a router or a similar device that supports Network Address Translation.
If the private network is connected to the Internet (through an Internet connection via ISP) then each computer will have a private IP as well as a public IP. Private IP is used for communication within the network where as the public IP is used for communication over the Internet. Most Internet users with a DSL/ADSL connection will have both a private as well as a public IP.

You can know your private IP by typing ipconfig command in the command prompt. The number that you see against “IPV4 Address:” is your private IP which in most cases will be or Unlike the public IP, private IP addresses are always static in nature.
Unlike what most people assume, a private IP is neither the one which is impossible to trace (just like the private telephone number) nor the one reserved for stealth Internet usage. In reality there is no public IP address that is impossible to trace since the protocol itself is designed for transperancy.