Showing posts with label Internet tricks. Show all posts
How to Stop Annoying Add in Websites?
Posted by Anbu on Sunday, February 17, 2013
Problem:
How to Stop Annoying Add in Websites?
Solution:
Did you ever go to warez/cracks sites only to be bombarded with 3 -4 windows opening up at a time, with porn, spam etc?
I discovered a VERY easy way to block about 90-95% of this, without using any pop-up stopping programs.
Here's how you do it...
1) open Internet Explorer and Go to TOOLS and then INTERNET OPTIONS.
2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.
This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets and so on that pop-ups are based upon.
The catch is this... Some places like online banks and other web sites need these functions to work properly... So you'll need to re-enable one important thing..
1) Go to TOOLS and then INTERNET OPTIONS.
2) Click the SECURITY tab, CUSTOM LEVEL, scroll down to SCRIPTING, and under ACTIVE SCRIPTING, select the ENABLE radio button.
3) Click APPLY and you're pretty much done.
Note: This does NOT completely remove pop-ups and other annoyances, but it sure helps ALOT, without having to trash your computer with pop-up blockers.
How to Stop Annoying Add in Websites?
Solution:
Did you ever go to warez/cracks sites only to be bombarded with 3 -4 windows opening up at a time, with porn, spam etc?
I discovered a VERY easy way to block about 90-95% of this, without using any pop-up stopping programs.
Here's how you do it...
1) open Internet Explorer and Go to TOOLS and then INTERNET OPTIONS.
2) Click the SECURITY tab, move the slider up to HIGH and click APPLY.
This applies the highest security settings to IE, which blocks EVERYTHING, including JavaScript, Applets and so on that pop-ups are based upon.
The catch is this... Some places like online banks and other web sites need these functions to work properly... So you'll need to re-enable one important thing..
1) Go to TOOLS and then INTERNET OPTIONS.
2) Click the SECURITY tab, CUSTOM LEVEL, scroll down to SCRIPTING, and under ACTIVE SCRIPTING, select the ENABLE radio button.
3) Click APPLY and you're pretty much done.
Note: This does NOT completely remove pop-ups and other annoyances, but it sure helps ALOT, without having to trash your computer with pop-up blockers.
Computer and Internet Privacy Basics
Posted by Anbu on
Problem:
Computer and Internet Privacy Basics
Solution:
The Computer Privacy protection is a very serious issue to be ignored these days."Everything you do online and offline is monitored by someone.", say many people out there and they are right not because of their paranoia but because the Private Information is too valued for its owner. But is it possible to protect our Computer Privacy without plugging the cable?
See how somebody could steal your Private Information. Reveal what is the difference between Computer Privacy and Internet Privacy. Read how to generate Secure Passwords that hackers can not break.
1. What is Computer Privacy?
This is the power to control what computer information you reveal about yourself and to control who can access this personal information.
2. What is Internet Privacy?
It is a part of the computer privacy. It is the power to control what information you reveal about yourself in Internet, the power to control which web sites, remote scripts and web applications can access this personal information, and the power to know if these web sites, scripts, and web applications are enough trustworthy.
3. What is Private Information?
No doubt, your computer keeps tons of information about:
* all web sites you have visited
* all documents, folders, pictures, videos, files you have opened and created
* all e-mail, forum names and passwords you have
* all bank and credit card information you have saved
* all Skype-to-Skype calls and ICQ chats you have made
* all technology, writing or art you have invented
* your online shopping activities: when you visit the online store order page of some web site
* your shared photos, videos, age data, hobbies, preferences, even thoughts with everyone out there
* generally all your computer habits and things-to-do
All computer and web data you consider to private is your private information.
4. How to Generate Secure Passwords that Hackers can not break?
We use passwords every day to access our computer accounts, e-mail accounts, bank accounts, Facebook and Twitter accounts and hundreds of other services. There is great temptation to use one password for all accounts and to make it short and easy to remember. However, this has devastating effect on our security and privacy. If you think that you have nothing to hide, think again.
In most cases the passwords are hacked to use your computer as spam bot, to steal your money and private information, to infect your computer with computer viruses and spyware and so on.
Learn to avoid the following weak and easy to crack passwords:
* Generic passwords and default passwords. Examples: admin, administrator, user, guest, pass, password, iloveyou, 2010, etc. These are the first passwords that are tried by the password cracking software.
* Meaningful words or names. Examples: sandbox, NY, lion, john, mary, USA, love, myspouse, dragon, etc. Easily cracked by the dictionary-assisted cracking tools.
* Words or names with added numbers. Examples: john123, pass123, 123456, number1, abc123, 654321, etc. Easily cracked by the automated cracking tools.
* Personal names, birthdates or similar information. These are used a lot as passwords and are very easily cracked. For example, if the password is a birthday, there are only hundreds or few thousands (if the year is included) possible combinations, which is very weak for a password.
Learn to generate strong random passwords through these rules:
* Choosing "randomly" letters and numbers. It appears random but only at first sight. Numerous research studies have proven that humans are not very good at random picks - they always try to spread the things too evenly, which is not random behavior.
* "Random" typing on the keyboard with closed eyes. This is slightly better than random choosing but still nowhere random enough.
* Online random password generators. Much better than the previous two alternatives but have 2 major drawbacks. The first is the possibility that the generated password may be saved on the website with malicious purposes or someone may eavesdrop on your connection and intercept the generated passwords. The second major problem is the quality of the random number generators, which very often is not up to the task. Many of them are naively implemented and provide a lot fewer combinations than theoretically possible (no more that tens or hundreds of millions, which is not strong password by any means - see the table in the previous chapter).
* Specialized random password generator programs. The best option as long as they are implemented properly and come from trusted source.
Download one of the best Random Password Generator out there
Computer and Internet Privacy Basics
Solution:
The Computer Privacy protection is a very serious issue to be ignored these days."Everything you do online and offline is monitored by someone.", say many people out there and they are right not because of their paranoia but because the Private Information is too valued for its owner. But is it possible to protect our Computer Privacy without plugging the cable?
See how somebody could steal your Private Information. Reveal what is the difference between Computer Privacy and Internet Privacy. Read how to generate Secure Passwords that hackers can not break.
1. What is Computer Privacy?
This is the power to control what computer information you reveal about yourself and to control who can access this personal information.
2. What is Internet Privacy?
It is a part of the computer privacy. It is the power to control what information you reveal about yourself in Internet, the power to control which web sites, remote scripts and web applications can access this personal information, and the power to know if these web sites, scripts, and web applications are enough trustworthy.
3. What is Private Information?
No doubt, your computer keeps tons of information about:
* all web sites you have visited
* all documents, folders, pictures, videos, files you have opened and created
* all e-mail, forum names and passwords you have
* all bank and credit card information you have saved
* all Skype-to-Skype calls and ICQ chats you have made
* all technology, writing or art you have invented
* your online shopping activities: when you visit the online store order page of some web site
* your shared photos, videos, age data, hobbies, preferences, even thoughts with everyone out there
* generally all your computer habits and things-to-do
All computer and web data you consider to private is your private information.
4. How to Generate Secure Passwords that Hackers can not break?
We use passwords every day to access our computer accounts, e-mail accounts, bank accounts, Facebook and Twitter accounts and hundreds of other services. There is great temptation to use one password for all accounts and to make it short and easy to remember. However, this has devastating effect on our security and privacy. If you think that you have nothing to hide, think again.
In most cases the passwords are hacked to use your computer as spam bot, to steal your money and private information, to infect your computer with computer viruses and spyware and so on.
Learn to avoid the following weak and easy to crack passwords:
* Generic passwords and default passwords. Examples: admin, administrator, user, guest, pass, password, iloveyou, 2010, etc. These are the first passwords that are tried by the password cracking software.
* Meaningful words or names. Examples: sandbox, NY, lion, john, mary, USA, love, myspouse, dragon, etc. Easily cracked by the dictionary-assisted cracking tools.
* Words or names with added numbers. Examples: john123, pass123, 123456, number1, abc123, 654321, etc. Easily cracked by the automated cracking tools.
* Personal names, birthdates or similar information. These are used a lot as passwords and are very easily cracked. For example, if the password is a birthday, there are only hundreds or few thousands (if the year is included) possible combinations, which is very weak for a password.
Learn to generate strong random passwords through these rules:
* Choosing "randomly" letters and numbers. It appears random but only at first sight. Numerous research studies have proven that humans are not very good at random picks - they always try to spread the things too evenly, which is not random behavior.
* "Random" typing on the keyboard with closed eyes. This is slightly better than random choosing but still nowhere random enough.
* Online random password generators. Much better than the previous two alternatives but have 2 major drawbacks. The first is the possibility that the generated password may be saved on the website with malicious purposes or someone may eavesdrop on your connection and intercept the generated passwords. The second major problem is the quality of the random number generators, which very often is not up to the task. Many of them are naively implemented and provide a lot fewer combinations than theoretically possible (no more that tens or hundreds of millions, which is not strong password by any means - see the table in the previous chapter).
* Specialized random password generator programs. The best option as long as they are implemented properly and come from trusted source.
Download one of the best Random Password Generator out there
How to Shop Safely Online
Posted by Anbu on
Filed within
Internet,
Internet tips,
Internet tips and tricks,
Internet tricks,
online security,
security
Problem:
How to Shop Safely Online
Solution:
Shopping online is becoming increasingly popular with consumers of all ages. With fast shipping and websites selling virtually everything, online shopping is an attractive alternative to the hassle of visiting multiple stores.
However, eCommerce safety is a huge issue, and many shoppers are unaware of how to ensure that their online transactions are safe, secure and private. Fortunately, there are a number of simple signs to look out for and changes you can implement to make purchasing items on the Web considerably safer.
The most common methods used by hackers to steal consumer information are phishing sites and emails. Hackers may set up websites that look similar to other branded sites and send emails to potential customers of those companies urging them to shop through special links. By gaining consumer trust through having a similar appearance to the original company’s website, hackers make consumers feel more comfortable about entering their details into such sites, including credit card information.
Avoiding phishing emails and websites is simple. Any time a shopper receives an email from a company asking them to shop or navigate to a website, they should carefully check the domain the email is being sent from or the URLs of the links they land on. All email addresses and URLs should contain the company’s official domain.
Having updated antivirus and firewall software is also necessary. Also, one must ensure that he or she is using the latest version of the web browser of their choice. Most modern web browsers have inbuilt mechanisms to detect spoofed websites.
A common trick to watch out for is a minor misspelling in the domain name that may be hard to pick up without careful attention. Additionally, some hackers may place the company’s name before the @ symbol in the email address, rather than after, which is where it should be.
All pages, including login pages, asking for consumer details, such as billing/shipping addresses and payment information, should have URLs that begin with “https://” rather than the more commonly used “http://.” The “s” denotes a secured connection and provides encrypted communication between a shopper’s computer and the receiving company’s servers.
Preferably, the site will also have a verifiable certification showing that the site can be trusted and that the installed security suites are up to date. Many sites display a security certification image link or privacy seal, making it easy to verify their status.
People who decide to shop on websites they’ve never heard of should ensure that these sites are legitimate. This can be done by searching for online reviews and confirming that the site is listed as a secure site with a trusted online security company.
One must be extra cautious while shopping on shared computers and always remember to not save login information in the web browser. Logging out and clearing cookies once you are done is also recommended.
Shopping with certain methods of payment and opting for tracked shipments can also provide enhanced protection. Payment services, such as Paypal, allow buyers to dispute charges and other issues they may have with sellers. Many credit cards offer similar protection, and since they aren’t linked directly to a bank account, hackers can’t drain a shopper’s finances. Finally, trackable shipping allows shoppers to find out exactly where their packages are, providing added confidence in the legitimacy of any seller's services. All tracking information should originate from the shipping service and be trackable within 24 hours of receiving the tracking number.
How to Shop Safely Online
Solution:
Shopping online is becoming increasingly popular with consumers of all ages. With fast shipping and websites selling virtually everything, online shopping is an attractive alternative to the hassle of visiting multiple stores.
However, eCommerce safety is a huge issue, and many shoppers are unaware of how to ensure that their online transactions are safe, secure and private. Fortunately, there are a number of simple signs to look out for and changes you can implement to make purchasing items on the Web considerably safer.
The most common methods used by hackers to steal consumer information are phishing sites and emails. Hackers may set up websites that look similar to other branded sites and send emails to potential customers of those companies urging them to shop through special links. By gaining consumer trust through having a similar appearance to the original company’s website, hackers make consumers feel more comfortable about entering their details into such sites, including credit card information.
Avoiding phishing emails and websites is simple. Any time a shopper receives an email from a company asking them to shop or navigate to a website, they should carefully check the domain the email is being sent from or the URLs of the links they land on. All email addresses and URLs should contain the company’s official domain.
Having updated antivirus and firewall software is also necessary. Also, one must ensure that he or she is using the latest version of the web browser of their choice. Most modern web browsers have inbuilt mechanisms to detect spoofed websites.
A common trick to watch out for is a minor misspelling in the domain name that may be hard to pick up without careful attention. Additionally, some hackers may place the company’s name before the @ symbol in the email address, rather than after, which is where it should be.
All pages, including login pages, asking for consumer details, such as billing/shipping addresses and payment information, should have URLs that begin with “https://” rather than the more commonly used “http://.” The “s” denotes a secured connection and provides encrypted communication between a shopper’s computer and the receiving company’s servers.
Preferably, the site will also have a verifiable certification showing that the site can be trusted and that the installed security suites are up to date. Many sites display a security certification image link or privacy seal, making it easy to verify their status.
People who decide to shop on websites they’ve never heard of should ensure that these sites are legitimate. This can be done by searching for online reviews and confirming that the site is listed as a secure site with a trusted online security company.
One must be extra cautious while shopping on shared computers and always remember to not save login information in the web browser. Logging out and clearing cookies once you are done is also recommended.
Shopping with certain methods of payment and opting for tracked shipments can also provide enhanced protection. Payment services, such as Paypal, allow buyers to dispute charges and other issues they may have with sellers. Many credit cards offer similar protection, and since they aren’t linked directly to a bank account, hackers can’t drain a shopper’s finances. Finally, trackable shipping allows shoppers to find out exactly where their packages are, providing added confidence in the legitimacy of any seller's services. All tracking information should originate from the shipping service and be trackable within 24 hours of receiving the tracking number.
INCREASE YOUR INTERNET SPEED BY 20%
Posted by Anbu on Saturday, February 16, 2013
Problem:
How to increase my internet speed?
Solution:
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
You can get it back :
Click Start then Run and type “gpedit.msc” without quotes. This opens the group policy editor.
Then go to:
–> Local Computer Policy
–> Computer Configuration
–> Administrative Templates
–> Network
–> QOS Packet Scheduler
–> Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the ‘Explain’ tab i.e.” By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”
So the trick is to ENABLE Reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
It works on Win XP, Win 7 and as well as Win 2000.
How to increase my internet speed?
Solution:
Microsoft reserves 20% of your available bandwidth for their own purposes like Windows Updates and interrogating your PC etc
You can get it back :
Click Start then Run and type “gpedit.msc” without quotes. This opens the group policy editor.
Then go to:
–> Local Computer Policy
–> Computer Configuration
–> Administrative Templates
–> Network
–> QOS Packet Scheduler
–> Limit Reservable Bandwidth.
Double click on Limit Reservable bandwidth.
It will say it is not configured, but the truth is under the ‘Explain’ tab i.e.” By default, the Packet Scheduler limits the system to 20 percent of the bandwidth of a connection, but you can use this setting to override the default.”
So the trick is to ENABLE Reservable bandwidth, then set it to ZERO. This will allow the system to reserve nothing, rather than the default 20%.
It works on Win XP, Win 7 and as well as Win 2000.
Know your Internet browser shortcuts
Posted by Anbu on
Problem:
Know your Internet browser shortcuts
Solution:
Know your Internet browser shortcuts
Solution:
There are dozens of different shortcut keys that can be used with Internet browsers. Below are a few of our top suggested Internet browser shortcuts.
- Pressing Alt + D in any major Internet browser will move the cursor into the address bar. This is a great way to quickly enter an Internet address without having to click the mouse cursor in the address bar.
- Hold down the Ctrl key and press the + or - to increase and decrease the size of text.
- Press the backspace key or hold down the Alt key + left arrow to go back a page.
- Press F5 to refresh or reload a web page.
- Press F11 to make the Internet browser screen full screen. Press F11 again to return back to the normal view.
- Press Ctrl + B to open your Internet bookmarks.
- Press Ctrl + F to open the find box in the browser to search for text within the web page you're looking at.
- Hold down the Ctrl key and press the + or - to increase and decrease the size of text.
- Press the backspace key or hold down the Alt key + left arrow to go back a page.
- Press F5 to refresh or reload a web page.
- Press F11 to make the Internet browser screen full screen. Press F11 again to return back to the normal view.
- Press Ctrl + B to open your Internet bookmarks.
- Press Ctrl + F to open the find box in the browser to search for text within the web page you're looking at.
Quickly move between the fields of a web page
Posted by Anbu on
Problem:
How to Quickly move between the fields of a web page
Solution:
If you're filling out an online form, e-mail, or other text field you can quickly move between each of the fields by pressing the Tab key or Shift + Tab to move back a field. For example, if you're filling out your name and the next field is your e-mail address you can press the Tab key to switch to the e-mail field.
Tip: This tip also applies to the buttons, if you press tab and the web developer has designed correctly the button should be selected and will allow you to press the space bar or enter to push the button.
Tip: If you have a drop-down box that lists every country or every state you can click that box and then press the letter of the state or country you're looking for. For example, is a drop-down box of States in the United States you could press u on the keyboard to quickly scroll to Utah.
Do we need http:// portion of a web page when i am typing ?
Posted by Anbu on
Problem:
Do we need http:// portion of a web page when i am typing ?
Solution:
When typing an Internet address you do not need to type http:// or even www. in the address. For example, if you wanted to visit Top solutions blog you could just type topsolutionsblog.com and press enter. To make things even quicker, if you're visiting a .com address you can type topsolutionsblog and then press Ctrl + Enter to type out the full http://www.topsolutionsblog.com address.