Saturday, 29 October 2011

Hack Google Homepage




















Go to Google , clear the address bar, and paste this

javascript:document.body.contentEditable='true'; document.designMode='on'; void 0

then Edit it and hit Enter

is it funny :)?
plz comment it..

Thursday, 27 October 2011

Are you a hacker..

Are you a hacker? If you are geek then chances are you have searched Google for hacking tools. Chances are most geeks do not end up being Hackers but only fantasizing about it. Code is very important to geeks who are programmers and Google is full of them.
To show their appreciation for the Geek community Google has come up with a Google Search specially for hackers. Just visit http://www.google.com/webhp?hl=xx-hacker
google search hackers Google Search for Hackers, Pirates and Klingons

Are you safe from hacker..?

You may think hackers are only focused on FBI break-ins and bank accounts, but nothing could be further from the truth. According to a Ponemon Institute report published this June, 90 percent of surveyed businesses reported at least one IT security breach in the past 12 months. Any breach compromises user data, which means your online activity is always vulnerable to attacks. In fact, many users are most at-risk when visiting their favorite sites. Here you’ll find out where you’re most likely to get hacked, and how you can safeguard your personal information.

Social Networking Sites

These sites are the most popular places users can get hacked. We’ve seen well-publicized reports of celebrities’ Twitter accounts being hacked, and Facebook also has its share of troubles. Not only is your public reputation at stake, your personal information can be lifted and used to access other accounts. Phishing scams for these sites are common. These catch users by sending a link that looks and seems like a social networking login page, but is a fake (see image below).

These phony webpages record your username and password, with the intent of using the information elsewhere. In addition to your online reputation being compromised, hackers may use the information to gain access to your bank accounts, etc.
Stay safe tip: Don’t post sensitive personal information on your profile: name, address, phone number, or other identifiable information. Always login from the actual site page. Create a separate password for each account and avoid common or obvious names or patterns (the more numbers, symbols, mixed case you use, the safer the password).

Online Banking

Although online banking sites generally do all they can to protect their customers’ information, it is not a hack-proof network. Phishing scams are one method, but keylogging is another covert technique used to record your keystrokes and mouse activity. This method targets your computer’s operating system by installing a virus, which tracks your every move.
Stay safe tip: In addition to password protection, use security software, such as ZoneAlarm Extreme Security, which stops malicious software from attacking your computer and bolsters your firewall. And always update your operating system to deploy the latest security patches.

Email

Your email account is highly vulnerable. Hackers tend to target large providers like Gmail, which has had several breaches in the last year. Some safeguards, like password security questions, are easily answered thanks to the information available from social networking profiles (another reason not to post!). Another discreet way hackers monitor your email is through email forwarding.
Stay safe tip: Do not share information with unknown sources – no “company representative” will ever request address or password via email. You should also verify your settings to make sure your mail is not being forwarded to an unknown account. Also, avoid accessing your email over an unsecured network (free Wi-Fi at your local cafĂ©, for instance). This only increases your chances of being hacked.

Online Shopping

The ease and convenience of online shopping has created a multi-billion dollar industry. And with all those transactions, hackers are eager to intercept your communication – and money.
Stay safe tip: Verify that a business is reputable, and that you are shopping on the appropriate site. Sites with user-rated sellers or that have been verified by a third-party are more likely be accountable and have better safeguards in place. When purchasing, double check that the URL begins with the https:// protocol identifier. This means you’re on a secure network that encrypts information being exchanged between you and the site (instead of the unsecured http://).
You should also avoid leaving a digital trail of transactions, in the form of individual credit card files and accounts for each site. Use a digital wallet service, like PayPal, that protects your payment information. Also keep your online browser updated to offer more security measures.
Though there are many reputable sites that put their users best interests at heart, it’s up to each user to safeguard their online activity. Educating yourself, using common sense, and taking precautions will minimize your chances of being hacked.

Monday, 24 October 2011

Advantage of Jailbreaking iPhone

ilbreaking of iPhone is very popular since Apple has launched iPhone devices, a mass community of iPhone Dev Team is putting their effort in Jailbreaking of iPhone with every new iOS releases by apple. Do you know the advantages of Jailbreaking an iPhone? if not then you must have to read this post and know the advantage of jailbreaking iPhone.
Advantage of Jailbreaking iPhone
iOS jailbreaking, or simply jailbreaking, is the process of removing the limitations imposed by Apple on devices running on the iOS operating system through use of custom kernels. Such devices include the iPhone, iPod Touch, iPad, and Apple TV 2G. Jailbreaking allows users to gain full access (or root access) to the operating system, allowing iOS users to download additional applications, extensions, and themes that are unavailable through the official Apple App Store, via installers such as Cydia. You can refer my post about Jailbreak iPhone 4 on iOS 4.3.3(8J2) using redsn0w_win_0.9.6rc17.
A jailbroken iPhone, iPod Touch, or iPad running iOS can still use the App Store, iTunes, and other normal functions, such as making telephone calls. Unlike rooting an Android device, jailbreaking is necessary if the user intends to run software not authorized by Apple.
At its core, jailbreaking an Apple iOS device gives access to its root filesystem, allowing modification and installing third-party software components. This gives the user more control over the device and may enable features that were previously unavailable. In many cases, jailbreaking also voids the device’s warranty.

Advantage of Jailbreaking iPhone

    1. Under the DMCA of 2010, jailbreaking Apple iDevices is legal in the United States, although Apple has announced that the practice “can void the warranty.
    2. Cracked iPhone Games and Apps Installation – Jailbreaking is necessary if the user intends to run software not authorized by Apple.
    3. Gain deeper customization of device (e.g. theming, redesigned user interfaces and customize lock screens.)
    4. Jailbreaking also allows users to use paid apps from the App Store for free.
    5. It’s Fast and Easy – One of the best thing about jailbreaking an iPhone is you can easily jailbreak it within few minutes.
    6. Video chat over 3G Network – FaceTime video chat is a new feature of the iPhone 4, but it only works over a Wi-Fi network, which may be difficult to find in many situations. Jailbreaking the iPhone 4 allows for FaceTime video chat over a 3G connection.

Saturday, 22 October 2011

www.WDYL.com from GOOGLE


Most of the internet users, apart from Geeks or Techies are not even aware of various services that Google has to offer. In an effort to connect users to itself, Google has built this search engine for its own services; What Do You Love. Searching across its own territory, any search term generates the content from its various services on a single page for users to scroll across them. Google WDYL Googles Wonderful Things Dashboard (WDYL.com): Search all Google Services at one Place What Do You Love or WDYL generated content includes results from every service provided by Google, ranging image results from Google Images, Google alerts to set alerts or check out trends for entered search terms, to Google blog search, book search, translation to various languages, google news and what not..!!
Google has also tried to allure users to use the services they might not have checked out earlier; say calling someone through Google Voice or promoting Google Chrome for faster web access.
The idea behind this is to find a way to connect the people to products that they might not be knowing about. As google calls it, it’s a ‘wonderful things dashboard‘ that you can even share with your friends through Gmail itself or share it on Google+ or Buzz, right there. It actually ‘awesomely awesome’ that there’s a lot you can do from a single search engine, WDYL. What Do You Love e1310668239965 Googles Wonderful Things Dashboard (WDYL.com): Search all Google Services at one Place
Check out the website yourself at www.WDYL.com. But before that, go through the video and check the search engine in action:

How to Restore Contacts in Gmail


Just log-in to your Gmail account and head over to “Contacts” section (tab). Look for “More actions” menu and click “Restore contacts“.
restore gmail contacts e1292408569400 How to Recover Accidentally Deleted Contacts from Gmail
Next, you’ll see a pop-up section which allows you to choose the duration upto which you wish to restore your contacts. Currently, 30 days is the maximum duration offered by Gmail, so choose accordingly.
In the next step, click “Restore” to revert back to the chosen time:
contacts restore e1292409640542 How to Recover Accidentally Deleted Contacts from Gmail
Wait a second, and you’re done! Depending on what duration you selected above, you’ll see the ‘success’ message as below:
contacts restored e1292408914740 How to Recover Accidentally Deleted Contacts from Gmail
Your contacts have been restored to the original state!
Even if you accidentally deleted your contacts while tweaking the contacts section or organising them or may be it happened while syncing it to some other device, you have a solution for it now!

Secure USB Drives with BitLocker

Secure your USB flash drives using BitLocker encryption. Right-click on your USB drive in My Computer, select Turn on BitLocker and follow the instructions to protect sensitive data on your thumb drives.
The next time you use your USB drive on another computer, it will prompt you for the password before allowing you read-only access to your flash drive. You can even use the drive on older computers running Windows XP/Vista.
Turn On BitLocker