Monday, December 31, 2012

must-know Windows 8 tips and tricks

Filled under:


Employ the hottest hotkeys we know

In these key combinations, hold down the Windows key (normally located between Alt and Ctrl) and another key, as described on this list.

  • Press the Windows key to enter the tiled Start screen.
  • The Windows key + M minimizes everything that's showing on the desktop.
  • The Windows key + E opens Explorer for quick access to folders.
  • On the Start screen, press the Windows key + D to instantly get to the desktop.
  • The Windows key + Tab opens a list of currently running programs.
  • The Windows key + Print Screen takes a screenshot and saves it in a Screenshots folder nested in your Pictures folder. 
  • To take a screenshot on a Windows 8 tablet, simultaneously press the Windows button and the volume-down button on the tablet chassis.
  • The Windows key + Q opens a global search menu. Type what you're looking for and where you would like to look.
  • The Windows key + W opens a search in your system settings to quickly locate and change system properties.
  • The Windows key + F opens a file and folder search.
  • The Windows key + Pause opens the system properties page to show you a quick rundown of your specs.
  • The Windows key + "," (that's the comma sign!) makes all current windows transparent, giving you a peek at the desktop as long as you hold down the Windows key.
  • The Windows key + "." (the period) snaps a window to the right or left side (toggling each time you press ".").
  • The Windows key + R prompts the Run command—useful for quickly launching apps and other routines with a command prompt.
  • The Windows key + X opens the Quick Access Menu, exposing system functionality such as the Command Prompt, Disk Management, File Explorer, Run, and more. Alternatively, you can right-click on the bottom right corner of the screen to spawn the Quick Access Menu.
  • The Windows key + I opens the settings menu, giving you quick access to the Control Panel, Personalization, and your Power button, among other features.
  • The Windows key + O locks orientation on devices with an accelerometer.

Posted By R9:36 PM

Tuesday, July 17, 2012

New Computer Virus List

Filled under:


OPRAH WINFREY VIRUS: Your 200MB hard drive suddenly shrinks to 80MB, and then slowly expands back to 200MB.
AT&T VIRUS: Every three minutes it tells you what great service you are getting.
MCI VIRUS: Every three minutes it reminds you that you're paying too much for the AT&T virus.
PAUL REVERE VIRUS: This revolutionary virus does not horse around. It warns you of impending hard disk attack---once if by LAN, twice if by C:>.
POLITICALLY CORRECT VIRUS: Never calls itself a "virus", but instead refers to itself as an "electronic microorganism."
RIGHT TO LIFE VIRUS: Won't allow you to delete a file, regardless of how old it is. If you attempt to erase a file, it requires you to first see a counselor about possible alternatives.
ROSS PEROT VIRUS: Activates every component in your system, just before the whole darn thing quits.
MARIO CUOMO VIRUS: It would be a great virus, but it refuses to run.
TED TURNER VIRUS: Colorizes your monochrome monitor.
ARNOLD SCHWARZENEGGER VIRUS: Terminates and stays resident. It'll be back.
DAN QUAYLE VIRUS #2: Their is sumthing rong wit your komputer, ewe jsut cant figyour out watt!
GOVERNMENT ECONOMIST VIRUS: Nothing works, but all your diagnostic software says everything is fine.
NEW WORLD ORDER VIRUS: Probably harmless, but it makes a lot of people really mad just thinking about it.
FEDERAL BUREAUCRAT VIRUS: Divides your hard disk into hundreds of little units, each of which does practically nothing, but all of which claim to be the most important part of your computer.
GALLUP VIRUS: Sixty percent of the PCs infected will lose 38 percent of their data 14 percent of the time. (plus or minus a 3.5 percent margin of error.)
TERRY RANDALL VIRUS: Prints "Oh no you don't" whenever you choose "Abort" from the "Abort" "Retry" "Fail" message.
TEXAS VIRUS: Makes sure that it's bigger than any other file.
ADAM AND EVE VIRUS: Takes a couple of bytes out of your Apple.
CONGRESSIONAL VIRUS: The computer locks up, screen splits erratically with a message appearing on each half blaming the other side for the problem.
AIRLINE VIRUS: You're in Dallas, but your data is in Singapore.
FREUDIAN VIRUS: Your computer becomes obsessed with marrying its own motherboard.
PBS VIRUS: Your programs stop every few minutes to ask for money.
ELVIS VIRUS: Your computer gets fat, slow and lazy, then self destructs; only to resurface at shopping malls and service stations across rural America.
OLLIE NORTH VIRUS: Causes your printer to become a paper shredder.
NIKE VIRUS: Just does it.
SEARS VIRUS: Your data won't appear unless you buy new cables, power supply and a set of shocks.
JIMMY HOFFA VIRUS: Your programs can never be found again.
CONGRESSIONAL VIRUS #2: Runs every program on the hard drive simultaneously, but doesn't allow the user to accomplish anything.
KEVORKIAN VIRUS: Helps your computer shut down as an act of mercy.
IMELDA MARCOS VIRUS: Sings you a song (slightly off key) on boot up, then subtracts money from your Quicken account and spends it all on expensive shoes it purchases through Prodigy.
STAR TREK VIRUS: Invades your system in places where no virus has gone before.
HEALTH CARE VIRUS: Tests your system for a day, finds nothing wrong, and sends you a bill for $4,500.
GEORGE BUSH VIRUS: It starts by boldly stating, "Read my docs....No new files!" on the screen. It proceeds to fill up all the free space on your hard drive with new files, then blames it on the Congressional Virus.
CLEVELAND INDIANS VIRUS: Makes your 486/50 machine perform like a 286/AT.
LAPD VIRUS: It claims it feels threatened by the other files on your PC and erases them in "self defense".
CHICAGO CUBS VIRUS: Your PC makes frequent mistakes and comes in last in the reviews, but you still love it.
ORAL ROBERTS VIRUS: Claims that if you don't send it a million dollars, it's programmer will take it back. >>

Posted By R7:39 AM

DNS Changer Malware

Filled under:

Posted By R7:34 AM

Thursday, May 31, 2012

The Flame Virus


What makes Flame so unusual is its size. It's much larger than some of the largest malware instances that researchers have found. For instance, the infamous Stuxnet virus that was targeted at Iran’s uranium enrichment facilities several years ago was 500 kilobytes, according to Wired.
“Flame is a sizable beast," said Graham Cluley of Sophos Security, a publisher of digital security software. "With all its components in place, it's approximately 20MB. And this is one of the reasons why people have bandied phrases around like 'biggest' and 'most sophisticated.' Reverse engineering 20MB of code is a sizable piece of work."
Researchers have only scratched the surface of what is hidden in all that code. Stuxnet (and its sister DuQu) took researchers months to figure out exactly what it did and where it might have come from. Flame will take a lot longer.
Table comparing Flame and Stuxnet from CrySyS at Budapest University of Technology and Economics
Flame, at its core, is spyware. It has the ability to log key strokes from an infected user’s computer, use the computer’s sensors such as the microphone and Web cam to record what is being said around it, and take screenshots. It can also sniff a network to steal passwords, be spread through USB drives and local networks, and transfer data to command-and-control servers. It can infect Windows XP, Vista and Windows 7 computers.
This is not your ordinary spyware, though. While it does have some simple and basic elements of spyware (which can key log and use the microphone as well), its sheer girth betrays a more sophisticated approach.
Normal spyware is not hard to detect. It is usually some type of derivation of existing malware that has been repurposed by hackers and distributed through normal channels such as spam or infected websites. Antivirus companies such as Symantec (Norton), Kaspersky, Sophos, Bitdefender and others recognize the spyware shortly after it is discovered and issue a detection kit for it. Microsoft then comes out with a patch and the cat-and-mouse game between the malware writers and security companies goes on. To a certain extent, this is what has happened with Flame. Detection and removal kits have already been released by security companies including Sophos and Symantec, as well as the Iranian government.
But the size and uniqueness of Flame may prove to be more than the antivirus companies realize. Right now, the detector kits are looking for specific instances within the Flame code to help detect the virus. For instance, code samples with “flame” or “wiper” are detected and blocked. The thing is, Flame is not exactly new. It has been in the wild for more than five years, perhaps in varying forms that have been added to over time. Much of Flame may have been compiled in 2011, but bits of it may be older. Flame’s ability to avoid detection over time speaks to its unique properties. Those properties could also speak to its source.
Flame also uses a unique programming language to the malware world: Lua. Lua is used primarily by game developers to create cross-platform applications for iOS and Android. It is similar to C++ but easier to update and communicate with.
“Lua is normally used for convenience," said Liam O Murchu, operations manager of Symantec Security Response. "As a scripting language it is much more high-level than C++ and it is easier to write in. Also, it is very easy to update the Lua part of the code and change the behavior of the threat in a very fluid and fast way. Often the Lua portion can be updated without recompiling and redeploying the software in question.”
Flame (sKyWIper) startup sequence from CrySyS
Flame is well organized in how it communicates and translates data. In an infected machine, it can perform a variety of tasks including wiping out its own existence as well as any other malware on the machine. This is a tactic used by other sophisticated viruses – becoming their own antivirus programs – presumably because other, less sophisticated viruses could lead to the discovery of Flame itself. When Flame retrieves data, be it key logs or screen shots, it uses high- and low-level encryption and HTTPS to send data back to its command-and-control servers. That data is then organized into its database through MySQLite, a smaller version of MySQL database software.
In a nutshell: Flame can control almost every aspect of the computer, disappear without a trace, encrypt its own communications and organize the data it collects. That is one smart virus.
It is so large and smart that researchers have concluded that this was not created by a random group of hackers looking to make some money. (Now that its code is out in the wild, though, that may be part of its future.)
“The results of our technical analysis supports the hypotheses that sKyWIper [Flame] was developed by a government agency of a nation state with significant budget and effort, and it may be related to cyber warfare activities,” stated a technical report from the Laboratory of Cryptography and System Security (CrySyS) at Budapest University of Technology and Economics. 
Should average computer users worry about Flame? The short answer is no. Kaspersky Labs, which initially reported on Flame, only found several hundred instances of Flame among its client base, most of them in Iran and Middle Eastern countries. Whoever created Flame has been aiming it at specific targets, perhaps knowing that a virus like this left unchecked in the wild could do serious damage.
“I think run-of-the-mill malware is a much more significant threat to the vast majority of computer users than Flame,” Cluley said. “We have had zero reports of Flame from any of our customers' computers worldwide. Even Kaspersky, who appeared in the first media reports of Flame, only reported a couple of hundred infected PCs. Flame pretty much became the malware you didn't have to worry about because of the media hoopla and antivirus products being updated in the last 36 hours or so. You imagine that whoever was behind Flame is now pretty grumpy about their malware attracting so much attention.”

Posted By R8:24 AM

Thursday, May 24, 2012

Speed Up You Tube Buffering - Simple Trips




 
First Tip:
1. Go to the video you are watching
2.Right click it
3.Click "Settings"
4.Click on the folder icon
5.Slide the button to the end to set it to unlimited
6.Click close
And your done!

Tip 2:
1.Open your browser
2.Type: www.youtube.com/feather_beta
3.Click on Join the "Feather" Beta
4.Search for any video you like
Enjoy!

Posted By R8:54 AM

Now Send SMS freeeeeeeeeeee

 

Now Send SMS From Idea Sim Without activating any Offer or Plan | No need of Offer or Plan ,Send SMS free of coast from idea

             Just dial 55115 infront of the number which you want to send the sms



For example: if you want to send sms to 9876543211 from your number(9876543210) then you send your sms to 551159876543211 (see the image)



* Use a idea sim with zero balance other wise you will loss balance from your accound.


* your sms will recived as multimedia sms with a picture (see image).



















This post is just for informing the latest news...

Don't Forget to leave a Comment and Share this Blog in your Facebook,twitter, G+ Etc...


Note:Your Desk is not responsible for any problems occurs.. Try at your own risk

Posted By R8:46 AM

Saturday, May 19, 2012

Canon Cameras Price List in India 2012

Posted By R7:30 AM