Tuesday, January 31, 2012
Facebook scammers redirect victims through Amazon's cloud :
Facebook scammers redirect victims through Amazon's cloud :
------------------------------ ------------------------------ -----------
Facebook scammers have started redirecting victims through Amazon's
cloud in order to bypass malicious URL filters, according to security
researchers from antivirus vendor F-Secure.
One Facebook survey
scam recently analyzed by F-Secure uses malicious browser extensions to
hijack Facebook accounts and post spam messages on their walls.
The messages contain Bit.ly shortened links that appear to lead to
interesting videos. However, in reality they point to redirect scripts
hosted on Amazon's S3 service that send victims to a fake Facebook page.
The rogue page displays a video player image, which when clicked,
prompts a window asking users to participate in a survey. Scammers earn
money through affiliate marketing schemes for every user who agrees to
participate.
The scam is distributed through fake extensions
for Google Chrome and Firefox that are passed to victims as YouTube
player updates. Users are asked to download and install these in order
to watch the videos they clicked on.
According to F-Secure's
chief research officer, Mikko Hypponen, scammers prefer to redirect
users through links on Amazon's cloud because its domain name and
corresponding IP addresses have a high trust rating. This increases
their chances of tricking malicious URL filters like those used by
Bit.ly or Facebook.
While the use of Amazon S3 links in
Facebook scams is a relatively new technique, the hosting of malware on
the popular cloud service is not a new practice. The Amazon S3 hosting
service is not very expensive and a lot of cybercriminals are probably
able to afford it.
However, some of them prefer to steal login
credentials from existing Amazon customers and abuse their accounts,
Hypponen said. "Some of the malcreants exclusively use accounts
belonging to other people. Others create new accounts with stolen credit
cards. Some create valid accounts and pay for them."
Money from your website

EARN MONEY FROM YOUR WEBSITE
Turn your valuable blog visitors into cash. Work online and join our free money making partner program. We offer the most payment rate to help increase your money stream.
Join our money making program absolutely free and 100% risk free.
INCOME WHILE YOU SLEEP
Earn $100... $200... $500...
Turn your webpage visitors into cash!You get money for every person that clicks on our advertizing. Our wish is to enable you to receive as much as possible from your advertising space. We pay monthly, either by check, or using PayPal.
FREE INVESTMENT PROGRAM
We designed this free money program specially for NO SETUP FEE methods, to make hundreds, if not millions of dollars, without spending something.Begin collecting steady partner revenue
This money earn system really can make you revenue on the same day. Start collecting serious affiliate commissions with almost no investments at all. This is a serious revenue opportunity, the chance for you to build a steady, trustworthy, long-term profitable business.Welcome to Jeunesse Jeunesse provides anti-aging and scientific health breakthroughs and an unparalleled business opportunity
Thursday, January 26, 2012
We have new traffic exchange program with 1:1 exchange ratio.
We have new traffic exchange program with 1:1 exchange ratio.
It brings unlimited hits to your site. This software is absolutely free.
To download software and start receiving users on your website:
It brings unlimited hits to your site. This software is absolutely free.
To download software and start receiving users on your website:
- Open file http://www.globalpromotionalliance.com/downloads/HitXchangeInstall.exe in your Internet browser.
- A File Download window will appear, prompting you to Open or Save the file.
- Save the file to your desktop or to a location you normally use
for downloading. Be sure to write down where you are downloading the
file.
- Double-click the HitXchangeInstall.exe application to run the software installer.
- The software will be installed on your computer. This software does not have any spyware, viruses, or adware.
- Run the software and follow the instructions step by step.
Advertise to over 10 million customers around the globe
Advertise to over 10 million customers around the globe.
We advertise your company in international network of affiliate websites, each with own targeted auditory.Our company gives you effective advertising strategies that makes your business profitable online.
We will give you real and visible results and take your website to the next level.
Advertise to Millions customers Now...
Increase your site search engine rankings
Showing up on search engines is one of the most critical strategy to increase website traffic and expose your business or service to people who might be looking for what you are offering.Most of the major search engines use a software to determine your web-site ranks.
They know the number of websites are linking to your website; more referrers and hits better rank for your web site.
Get Higher Rank...
Millions of Customers
Connect your business to millions of shoppers searching for products and services.Our auditory is day by day growing and now it's over 25 million unique shoppers each month. We send traffic from high-quality American and international advertising webpages, which bring potential shoppers from North America, Western Europe and upcoming markets.
Get More Hits, Get More Visitors...
Saturday, January 21, 2012
How To Prevent Your Laptop From Overheating [Windows 7]
This tip might come in handy not just for gamers and people who wish
to run resource intensive application in the wake of overheating
laptops, but also if, for some reason, you are unable to return a laptop
with a heating issues (perhaps due to warranty constraints), or are
dealing with an old laptop, which won’t take the brunt any more.
Before explaining the method of reducing the maximum processor state, let us take a look at the logic behind reducing the maximum processor state to prevent overheating of your laptop. Reducing the maximum processor state for your laptop (both when it is on battery or when the power cable is plugged in), reduces the processor’s performance a notch (depending on your settings) and prevents it from being used at optimum potential by an application or game, which will reduce thermal heating. For example, if you are playing a game that is consuming 100% of your processor’s capacity, then it may also result in heating up your system, whereas reducing the battery power state to, say 80%, can resolve this problem, and also result in battery power conservation.
To change these settings, go to Power Options from the Control Panel or the system tray menu.

Now go to Change Plan Settings –> Change Advanced Power Settings.

In the new window that pops-up, expand Processor Power management –> Maximum processor state, and reduce the on battery and plugged in power settings. The settings you keep will depend on your preferences and the capability of your system.
Based on our experience, we have noticed that that the laptop overheats when the processor is running at 100% processor state. Reducing the processor state by a few notches results in the reduction of temperate by 10-20 C, which results in a minor performance dip. We used Speccy to check for temperate during testing, based on which the processor running on 95% processor state gave the same performance (barely noticeable dip), with a drop of 10-20 C. You can keep an even lower processor state (such as 80-85%) to make sure that your laptop heats up even less.

The above mentioned tip should easily prevent your laptop from heating up; however, make sure that the processor state is not reduced very low in order to prevent reducing your processor’s performance to an undesirably low level.
Before explaining the method of reducing the maximum processor state, let us take a look at the logic behind reducing the maximum processor state to prevent overheating of your laptop. Reducing the maximum processor state for your laptop (both when it is on battery or when the power cable is plugged in), reduces the processor’s performance a notch (depending on your settings) and prevents it from being used at optimum potential by an application or game, which will reduce thermal heating. For example, if you are playing a game that is consuming 100% of your processor’s capacity, then it may also result in heating up your system, whereas reducing the battery power state to, say 80%, can resolve this problem, and also result in battery power conservation.
To change these settings, go to Power Options from the Control Panel or the system tray menu.

Now go to Change Plan Settings –> Change Advanced Power Settings.

In the new window that pops-up, expand Processor Power management –> Maximum processor state, and reduce the on battery and plugged in power settings. The settings you keep will depend on your preferences and the capability of your system.
Based on our experience, we have noticed that that the laptop overheats when the processor is running at 100% processor state. Reducing the processor state by a few notches results in the reduction of temperate by 10-20 C, which results in a minor performance dip. We used Speccy to check for temperate during testing, based on which the processor running on 95% processor state gave the same performance (barely noticeable dip), with a drop of 10-20 C. You can keep an even lower processor state (such as 80-85%) to make sure that your laptop heats up even less.

The above mentioned tip should easily prevent your laptop from heating up; however, make sure that the processor state is not reduced very low in order to prevent reducing your processor’s performance to an undesirably low level.
Friday, January 20, 2012
Get cash on the internet now
|
||||||||
|
Have you ever dreamed about a real and easy way to get cash in Internet, even if you have absolutely no experience? Get cash on the internet now
0 (zero) investment programWe designed this system specifically for NO COST methods, to make thousands, if not millions of dollars, without spending money. Join our money making program absolutely free and 100% risk free. Get Started now
Signup is free Income while you sleep.Earn $1,000... $2,000... $5,000...
|
|
|||||
Will my Website work for me?
Yes, absolutely! With our affiliate program everyone can earn every day! You will earn income from 100,000 advertisers. Also you can be absolutely new to use our system - you don't have to have ANY experience. That's really simple.
We have successful members from all countries of the globe and they are part time employees, students, house wives, retired people, just everybody. Because our system works anywhere and for everyone!
Any proof of earnings?
Sure. For example, look at the results of using our affiliate program. Here is real screenshot of bank account presented by a partner:

|
|||||
Here's All You Have to Do...
Fill in the registration form
Insert received code into your website
Watch that your revenue grow
Get Started now
|
Signup is free
PurpleMonkeyNuts.com - Your one stop shop! PurpleMonkeyNuts.com - Your one stop shop
Hello! Today I Will Show You Different Ways Of Making Money From Home
Hello! Today I will show you different ways of making money from home. You just have to browse the Internet and look for your opportunities. And they are! For example, there are sites that pay just to watch their ads, there are sites that pay to write an article or other work done by this condition is to know how to write without spelling mistakes and also to provide information about the author topics on which you write. You can turn on any programs to understand and begin their work. Of course, the profit will come soon! Will take at least three months to start getting good amounts, you must work hard to be at the computer for three to five hours, you can combine work with pleasure. Use your free time in search of opportunities. It’s that simple! You just try!
Hello,
I would like to let you know about a web site that I recently found to make big income online.
It works 24 hours a day, 7 days a week, 365 days a year, and for not just days or weeks, but for months and months, making you huge of profit.
$0.00 invest - earn hunders daily.
It's real and easy way to make money in in Internet.
Open the link below to get it:
http://www.yield2me.com/-63366/3759.htm
See you,
Jishnu .ks
I would like to let you know about a web site that I recently found to make big income online.
It works 24 hours a day, 7 days a week, 365 days a year, and for not just days or weeks, but for months and months, making you huge of profit.
$0.00 invest - earn hunders daily.
It's real and easy way to make money in in Internet.
Open the link below to get it:
http://www.yield2me.com/-63366/3759.htm
See you,
Jishnu .ks
Wireless cellular phone video surveillance solution is here adding a sense of personal security and safety it offers you real-time video monitoring.
This know-how utilizes the most powerful software applications
for remotely monitoring from Anyplace in the world.This is a solution that will turn any ordinary cell phone into a high end surveillance device.
The surveillance system brings video from video source such as USB or IP Webcam to your cell phone. It contains both the client and server application.
You can see your residence, company, babysitter, parents, pets, etc.
You can watch live snapshots from your webcams on mobile phone via any kind of ip connection from any location in the world. In case of intrusion, a real video helps prevent false siren and cancel police dispatches to avoid the fines.Enjoy the freedom of watching all your cameras on cell phone anytime and from anyplace with just the tap of a button.
How does cellular surveillance work:
You connect your camera (USB, IP camera, or Camcoder) to your home pc and install the application.The application captures video and audio from webcam and sends it, as compressed media stream, to web server.
You login to this Web server from your mobile phone and watch your webcam.
No particular software for your cell phone is needed.
All about cellular video surveillance.
Google's First Webpage.

Google's First Webpage.
Google began in March 1998 as a research project by Larry Page and Sergey Brin, Ph.D. students at Stanford working on the Stanford Digital Library Project (SDLP). The SDLP’s goal was “to develop the enabling technologies for a single,integrated and universal digital library” and was funded through the National Science Foundation among other federal agencies.
Originally the search engine used the Stanford website with the domaingoogle.stanford.edu. The domain google.com was registered on September 15, 1998. They formally incorporated their company, Google Inc., on September 4, 1998 at a friend’s garage in Menlo Park, California. The name “Google” originated from a misspelling of “googol,” which refers to the number represented by a 1 followed by one-hundred zeros.
By the end of 1998, Google had an index of about 60 million pages.The home page was still marked “BETA”
Google began in March 1998 as a research project by Larry Page and Sergey Brin, Ph.D. students at Stanford working on the Stanford Digital Library Project (SDLP). The SDLP’s goal was “to develop the enabling technologies for a single,integrated and universal digital library” and was funded through the National Science Foundation among other federal agencies.
Originally the search engine used the Stanford website with the domaingoogle.stanford.edu. The domain google.com was registered on September 15, 1998. They formally incorporated their company, Google Inc., on September 4, 1998 at a friend’s garage in Menlo Park, California. The name “Google” originated from a misspelling of “googol,” which refers to the number represented by a 1 followed by one-hundred zeros.
By the end of 1998, Google had an index of about 60 million pages.The home page was still marked “BETA”
YOU CAN GET ME ON FACE BOOK
Wednesday, January 18, 2012

At the age of 24, I was a Bus
Conductor"
- Rajnikanth
"I didn't even complete my
University
Education"
- Bill Gates
"I was the one who served in
Hotels"
- Oberoi
"In my childhood days, I Stitched
Shoes"
- Abraham Lincoln
"I worked in a Petrol Pump"
- Dhiru Bhai Ambani
"I Failed in the 10th Standard"
- Sachin Tendulkar
"Education Drop-Out & initially a
Keyboard
Player"
- A. R. Rahman
"I Slept On a Bench For A week
and
borrowed Rs. 20
Everyday from a friend to travel
to filmcity"
- Shahrukh Khan
"I used to Serve Tea at a Shop to
support
my Football Training"
- Lionel Messi
-> Life is not about what you
couldn't do so
Far,
Its about what you STILL CAN !!
Intel’s new mobile platform
Intel
unveiled a smartphone chip – dubbed “Medfield” – at CES 2012 designed
to compete with NVIDIA’s Tegra System on a Chip (SoC).
At CES
Intel’s CEO, Paul Otellini, showed off the Lenovo K800 smartphone which
is powered by Intel’s new Medfield chip and runs the Android OS.
Intel’s new mobile platform has been built in conjunction with Motorola Mobility.
“It is a multi-year, multi-product strategy that will bring both phones
and tablets to the (US) marketplace starting with a phone in the second
half of 2012,” Dave Whalen, a vice-president in the Intel Architecture
Group, said of the alliance with Motorola.
Sanjay Jha, the
chief executive of Motorola Mobility, said the company would work with
Intel on a “multi-year, multi-device” collaboration.
The
Medfield chip powering the K800 clocks in at 1.6GHz, and is similar to
the Atom Z2460 architecture. According to stats published by VR-Zone,
the chip scores around 10,500 in Caffeinemark 3 whilst the NVIDIA Tegra 2
scores around 7500, and the Qualcomm Snapdragon MSM8260 scores 8000.
According to VR-Zone the Medfield platform, while having impressive
benchmark scores consumes a great deal of power. The website claims the
chip consumes 2.6W in idle mode, and 3.6W while playing HD video.
Mike Bell, Intel’s Ultra Mobility Group general manager, told the BBC,
“Battery life on this platform is not the best in the mobile market, but
it is by far not the worst.”
join j-tech @ facebook
Tuesday, January 17, 2012
Most Dangerous Computer Viruses of the 20th Century.
Most Dangerous Computer Viruses of the 20th Century.
1. Sadmind worm (2001)
ALIAS: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm
The Sadmind worm was a self-propagating piece of malware, It was first discovered on May 8, 2001 in china. Sadmind is designed to provide remote system administration operations and is installed by default with many versions of the Sun Microsystems operating system. It affected some big operating systems like Sun Microsystems Solaris(OS) and Microsoft's Internet Information Services (IIS) which is the world's second most popular web server in terms of overall websites behind the industry leader Apache HTTP Server. 2. Beast Trojan (2002) Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). It was created in Delphi and released first by its author Tataye in 2002. Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer. Once connected to the victim computer, via Beast hacker can access victim's all computer file and directories along with the power to upload, download, delete or execute any file or folder. 3. SQL Slammer (2003) ALIAS: Sapphire, Worm.SQL.Helkern, SQLSlammer Appeared first in 27th January 2003 and soon got a high rank in the list of most dangerous worms of the year because it is the first fileless worm. Slammer was able to spread by taking advantage of the vulnerability found in the SQL Server. Slammer spread to over 90 percent of all vulnerable hosts in 10 minutes and infected around 359,000 computers total and according to London-based market intelligence the worm caused between $950 million and $1.2 billion in lost productivity in its first five days worldwide. 4. Sasser (2004) Sasser is an Internet worm that probably caused around $18.1 billions of dollars of damage in 2004. It was created by a Computer science student, Sven Jaschan in Germany first seen on last day of april. While there was no intentionally destructive payload, Sasser did cause many computers to slow down or crash, causing some high profile damage. And was destructive enough to shut down the satellite communications for some French news agencies. It also resulted in the cancellation of several Delta airline flights and the shutdown of numerous companies’ systems worldwide. 5. Bandook (2005) ALIAS: Bandook Rat Bandook Rat is a backdoor trojan horse that infects Windows NT family systems (Windows 2000, XP, 2003, Vista). It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / Kernel Patching to bypass the firewall, and allow the server component to hijack processes and gain rights for accessing the internet. It is somehow very similar to Beast Trojan (2002)
1. Sadmind worm (2001)
ALIAS: Sadmind/IIS, Unix/Sadmind, Solaris/Sadmind.worm
The Sadmind worm was a self-propagating piece of malware, It was first discovered on May 8, 2001 in china. Sadmind is designed to provide remote system administration operations and is installed by default with many versions of the Sun Microsystems operating system. It affected some big operating systems like Sun Microsystems Solaris(OS) and Microsoft's Internet Information Services (IIS) which is the world's second most popular web server in terms of overall websites behind the industry leader Apache HTTP Server. 2. Beast Trojan (2002) Beast is a Windows-based backdoor trojan horse more commonly known in the underground cracker community as a RAT (Remote Administration Tool). It was created in Delphi and released first by its author Tataye in 2002. Beast was one of the first trojans to feature a 'reverse connection' to its victims and once established, it gave the attacker complete control over the infected computer. Once connected to the victim computer, via Beast hacker can access victim's all computer file and directories along with the power to upload, download, delete or execute any file or folder. 3. SQL Slammer (2003) ALIAS: Sapphire, Worm.SQL.Helkern, SQLSlammer Appeared first in 27th January 2003 and soon got a high rank in the list of most dangerous worms of the year because it is the first fileless worm. Slammer was able to spread by taking advantage of the vulnerability found in the SQL Server. Slammer spread to over 90 percent of all vulnerable hosts in 10 minutes and infected around 359,000 computers total and according to London-based market intelligence the worm caused between $950 million and $1.2 billion in lost productivity in its first five days worldwide. 4. Sasser (2004) Sasser is an Internet worm that probably caused around $18.1 billions of dollars of damage in 2004. It was created by a Computer science student, Sven Jaschan in Germany first seen on last day of april. While there was no intentionally destructive payload, Sasser did cause many computers to slow down or crash, causing some high profile damage. And was destructive enough to shut down the satellite communications for some French news agencies. It also resulted in the cancellation of several Delta airline flights and the shutdown of numerous companies’ systems worldwide. 5. Bandook (2005) ALIAS: Bandook Rat Bandook Rat is a backdoor trojan horse that infects Windows NT family systems (Windows 2000, XP, 2003, Vista). It uses a server creator, a client and a server to take control over the remote computer. It uses process hijacking / Kernel Patching to bypass the firewall, and allow the server component to hijack processes and gain rights for accessing the internet. It is somehow very similar to Beast Trojan (2002)
Do
you have many mobile prepaid sim cards with different operators?Got
confused with them whether what operator?Don't know the numbers of
prepaid sim cards?Don't worry here is the trick to get the mobile number
of sim card?
HOW TO FIND THE MOBILE NUMBER OF AIRTEL PREPAID SIM CARD?
The following tutorial explains you to find the own mobile number.Goto "Create a New Message option " on your mobile and write an SMS exactly given below:
IM and send this SMS to 57070.
You will get Your Mobile Number as reply message from Airtel.Now your forgotten mobile number is ready to do every thing.
HOW TO FIND THE MOBILE NUMBER OF RELIANCE,VIDEOCON,VIRGIN & TATA DOCOMO PREPAID SIM CARD?
Here is the trick to get the unknown mobile number of Reliance,Tata
Docomo & Virgin prepaid sim cards.Just dial *1# on your mobile you
will get your mobile number on your mobile screen.The mobile number will
looks like 91xxxxxxxxxx.
NOTE:xxxxxxxxxx will be your actual mobile number.
HOW TO FIND THE MOBILE NUMBER OF IDEA IDEA,AIRCEL,BSNL & LOOP PREPAID SIM CARDS?
Idea users just dial *789#
Aircel users simply dial *888#
BSNL users dial 24365 and get it.
Loop mobile users dial *222#.
Now you got tension free?If you like this post kindly join my group at Facebook
Important information -
Important information -
When a thief forced you to take money from the ATM, do not argue or
resist, you might not know what he or she might do to you. What you
should do is to punch your PIN in the reverse...
Eg: If your PIN is 1234, you punch 4321.
The moment you punch in the reverse, the money will come out, but will
be stuck into the machine half way out and it will alert the police
without the notice of the thief.
Every ATM has it; It is
specially made to signify danger and help. Not everyone is aware of
this. SHARE THIS TO ALL YOUR FRIENDS.
Like "Lets Become One" to receive all new similar updates.
follow the link to do so directly...
find my group at facebook
Subscribe to:
Comments (Atom)










