Latest News

Windows 7

Windows 7 is a personal computer operating system developed by Microsoft as part of Windows NT family of operating systems. Development of 7 occurred as early as 2006 under the codename "Blackcomb". Windows 7 was released to manufacturing on July 22, 2009, and became generally available on October 22, 2009, less than three years after the release of its predecessor, Windows Vista.
Windows 7 was primarily intended to be an incremental upgrade to the operating system, intending to address criticisms faced by its predecessor, Windows Vista (such as performance improvements), whilst maintaining compatibility with hardware and software designed for Vista. While retaining a similar appearance to Vista, 7's interface was streamlined, with the addition of a redesigned taskbar that allows applications to be "pinned" to it, and new window management features. Other new features were added to the operating system, including libraries, the new file sharing system HomeGroup, and support for multitouch input. A new "Action Center" interface was also added to provide an overview of system security and maintenance information, and tweaks were made to the User Account Control system to make it less intrusive. 7 also shipped with updated versions of several stock applications, including Internet Explorer, Windows Media Player, and Windows Media Center.

Hardware requirements:
Architecture: 32 Bit
Processor : 1 GHz IA-32 processor
Memory (RAM): 1 GB
Graphics card: DirectX 9 graphics processor with WDDM driver model 1.0
(Not absolutely necessary; only required for Aero)
HDD free space: 16 GB of free disk space

Architecture: 64 Bit
Processor : 1 GHz x86-64 processor
Memory (RAM): 2 GB
Graphics card: DirectX 9 graphics processor with WDDM driver model 1.0
(Not absolutely necessary; only required for Aero)
HDD free space: 26 GB of free disk space

Windows 7 Ultimate - 32/64 bit
Price: Rs. 100 + Postal Charge
100% Genuine Money Back Guarantee*

Windows 7 All in One - 32/64 bit 
Price: Rs. 150 + Postal Charge
100% Genuine Money Back Guarantee*

How to Purchase :
1. Email Us With The Name of Software Ex - Windows 7
2. Mail Us Your Full Name, Postal Address and Mobile number.  
3. We will reply you back with our Bank Details as soon as possible.
4. After Depositing Cash at Bank. Please Attach Bank Receipt and Mail Us.
5. After Your Payment Verification we will send you your Video Tutorial by INDIAN SPEED POST and Tracking number will be send through SMS at your Mobile Number. You can Track Your Video Tutorial from http://www.indiapost.gov.in/tracking.aspx .
6. Maximum shipping Time - 7 Days. ( Depends on the Indian Speed Post Service)
7. Contact Us Click Here

Payment Mode:
1. Bank Deposit 
2. Paypal (Coming Soon)

Note - Yes, You can download these from torrent free of cost so this is for those who do not have capability to download from internet due to some reason like slow net connection or high net charge. Enjoy Geeky Shows 

Like it ? Share it.

Blogger Blogs And Commenting Permissions

Not all Blogger blog owners know that the ability to comment is a privilege which they control.

Like the ability to publish and read posts, it is also a responsibility which they need to control, carefully.

Any blog owner who wishes to publish a blog, and not be subject to frequent deletion of the blog, as a suspected malware or spam host, needs to understand the responsibilities, and the risks.

There are levels of ability to post comments to a blog, which you select.

Consider possible risks, if you allow comments.

You use the dashboard "Who can comment?" wizard, on the Settings - "Posts and comments" page. Please, protect yourself, if you allow comments.


"Comments" are now a section of the "Settings › Posts, comments and sharing" dashboard page.



  • Anyone - includes Anonymous Users.
  • Everybody with a Google, or an OpenID, account.
  • Everybody with a Google account.
  • Blog members only.
  • Comments disabled.




Choose this setting with care. If you allow comments by "Anyone", prepare to deal with the spam.

Proper choice of comment authentication discourages spam - and encourages frequent and prompt moderation.

Note these controls are only available for Blogger Comments.

Google+ Comments are open to everybody - and only available in public blogs. There is no setting to restrict commenting to Circle members.

With Blogger Comments, the blog owner controls commenting, moderates, and removes spam. With Google+ Comments, anybody can comment, moderation is by the community, and the person publishing the comment owns and control visibility of the comment.

"Anonymous" includes the "Name / URL" option.

Note that anonymous users can post either anonymously, or using "Name / URL" tags, at their discretion, with "Anyone" selected. "Name / URL" does not provide authentication. "Anyone" means anyone, period.

You may also select CAPTCHA verification for everybody - except members.

Besides "Who can comment?", you may also control comment publishing using CAPTCHA (aka "word verification") screening, and using comment moderation. These settings, like "Who can comment?", are part of the Settings - "Posts and comments" wizard.

Note the these settings are not relevant, if Google+ Commenting is used on the blog.

Choose all settings, as a group, carefully.

Every blog owner, hoping for any visibility in the Blogosphere, needs to choose these settings carefully - or risk being buried by spam.
  • Who can comment?
  • Comment Moderation.
  • Comment Notification Email.
  • Show word verification

Comment Moderation, and Comment Notification Email, together, provide 2 settings which can bury your email Inbox, depending upon activity of commenting on your blog. Choose these settings wisely.

If you allow spam comments without control, you may later find yourself asking for help, in Blogger Help Forum: Something Is Broken
Help me! My blog was deleted by Blogger!
Protect your blog, and your blog's future, by allowing comments, responsibly.

Be Aware When You Install Third Party Code

We've been seeing a few problem reports, in Blogger Help Forum: Something Is Broken, from blog owners who are not aware of the risks from installing third party code, on their blog.

Some blog owners are not even aware that the code being installed is not supplied by Blogger - and is not subject to the same coding standards as code supplied by Blogger.

Third party accessories and code - from simple JavaScript that installs in the blog template, to attractive XML gadgets installed using the "Add a Gadget" wizard - has always been a challenge, to Blogger blogs.

Knowing when you are installing code provided by someone other than Blogger / Google, and taking appropriate precautions, is your responsibility. What you install can affect your reader activity - and even your reader's computers.

Blogger provides a large library of XML coded accessories, installed using the Layout "Add a Gadget" wizard.

Sadly, the Blogger "Add a Gadget" library is subject to abuse by hackers.
As we have learned in the past, however, the "Add a Gadget" accessory library is also used for distribution of non Blogger supplied gadgets. Gadgets supplied by Blogger are available using "Add a Gadget", and are labeled "By Blogger".

Google does have other accessory libraries - the late "iGoogle" library is one well known one. That aside, most Blogger blogs - and all non Google websites, which are used for distribution of Blogger accessories and gadgets - are non Blogger products.

Consider, carefully, any third party code.
Be aware of what you are about to install, on your blog.
  • A gadget provided using "Add a Gadget", and labeled "By Blogger" is a Blogger provided gadget.
  • A gadget provided using "Add a Gadget", but not labeled "By Blogger", is not a Blogger provided gadget.
  • A gadget provided using a Blogger blog, which is not published by Blogger, is not a Blogger provided gadget.
  • A gadget provided using a non Google website is not a Blogger provided gadget.

These are examples of Blogger supplied gadgets. Anything different is not a Blogger supplied gadget.

If you install non Blogger code in the template, and later see
Your blog has been deleted because of MALICIOUS JAVASCRIPT
this is a risk which you take.

Consider the risks involved, before installing third party code.
Do not install non Blogger code on your blog, without knowing the risks.

If You Cannot Prove Ownership Of Your Blogger Account, Your Next Step May Involve Court Action

We've explored the issues of Blogger account and blog recovery policy, repeatedly.

We've mentioned the business concerns, the personal support issues, the strategic hacking possibilities, and even the personal implications of prevention.

With all of the warnings, we continue to see evidence of blog owners who just don't understand the message, posting in Blogger Help Forum: Something Is Broken.
I started a blog under an alias, to be able to post anonymously, and can't remember the login details or the e-mail recovery. How can I regain access to my blog?

Last year, Blogger Support offered the "final" word about account recovery assistance, in the forum.
Due to the sensitive nature of these issues, we won't be able to troubleshoot your issue in this public forum.
Even giving that advice, some blog owners still insist that Google is not cooperating, in refusing to restore access to Blogger accounts and blogs, to people who cannot prove their right to ownership.

The policy on ownership recovery, provided by Blogger, is quite simple. Anybody requiring recovery has to prove their right to a given Blogger account or blog, using the tools provided.
Because Google doesn't ask for much personal information when you sign up for an account, we don't have many ways to verify that you own an account.

Blogger / Google provide two automated recovery tools - and that is the limit of their involvement. Every Blogger blog owner, who actively publishes a blog, and who wants to keep their blog under their control, needs to appreciate this limit - this is how Blogger and Google prevents devious hijacking of our blogs.

For those blog owners who truly need - and deserve - control of their lost blogs, there is one final recourse. Any owner, who cannot use the Blogger / Google automated tools, are entitled to take their concerns outside Google, and have their identity certified by the courts. Start by hiring a lawyer, take the matter to a judge, and get a properly issued court order. Then, serve the court order, properly, to Google.

Let's let the courts assume responsibility of deciding who is a worthy blog owner - and who is potentially a blog thief or hacker.

Country Code Aliases Cannot Be Bypassed

Occasionally we see the innocent query in Blogger Help Forum: Something Is Broken, about the recently introduced Blogger feature - country code aliasing.
Is there any way I can opt out from this constantly changing of the .com termination, into .be, .bg, or .ro, depending on where I travel?

Not many Blogger blog owners realise the benefits of country code aliasing, which is, like auto pagination, a feature which is not optional. There are publicly available workarounds, which may bypass the effects of country code aliasing - and which may cause more trouble than simple URL confusion.

Many spammers would love to setup gateway blogs, and automatically redirect their unwitting victims.

Spammers would redirect traffic to dangerous blogs and websites.

The redirections would lead to other blogs (or non Blogger websites) which contain their actual hacking, porn, or spam payload. Blogger / Google, like some browsers and security programs, actively prevents automatic redirection of Blogger blog traffic.

Blogger malware classification is not understood by everybody.

Not all blog owners understand the effect of Blogger malware classification. Similar to spam classification, malware classification persistently scans through Blogger blogs, looking for signs of malware.

Anti-alias redirection code is very simple, and subtle.

Here's an example - a very simple code snippet, recently discovered in the header of the template, in a blog which has been repeatedly locked for "Malicious JavaScript" / "Spam".


var·blog·=·document.location.hostname;
var·slug·=·document.location.pathname;
var·ctld·=·blog.substr(blog.lastIndexOf("."));
if·(ctld·!=·".com")·{
var·ncr·=·"http://"·+·blog.substr(0,·blog.indexOf("."));
ncr·+=·".blogspot.com/ncr"·+·slug;
window.location.replace(ncr);
}


or maybe, a more compact snippet


if ((window.location.href.toString().indexOf('.com/'))=='-1') {
window.location.href =window.location.href.toString().replace('.blogspot.in/','.blogspot.com/ncr/').replace('.blogspot.com.au/','.blogspot.com/ncr/');
}


or maybe


//<![CDATA[(LF)
var·curl·=·window.location.href;if·(curl.indexOf('m=1')·!=·-1)·{curl·=·curl.replace('m=1',·'m=0');window.location.href·=·curl;}(LF)//]]>


To prevent malware detection from blocking this post, I'm omitting the essential opening and closing tags, which would normally encase the above code snippets.

<script·type='text/javascript'> ... </script>

You can try anti alias redirection code, if you like.

If your blog contains similar redirection code, to bypass country code aliasing, you may get a notice, one day, that your blog has been deleted for "Malicious Javascript". In order to get the blog restored, so your readers may view it, you may have to remove the Malicious JavaScript - then wait until the blog can be reviewed, to ensure that it is safe for public visibility.

When your blog is classified as a malware host, you will suffer.

While you wait for review, you will have to endure the loss of search engine and reader reputation - while every would be reader sees the interstitial notice, mentioning why your blog is deleted or locked.

Work on the problem, don't use (and encourage) dodgy workarounds.

You will accomplish more, and cause yourself (and your readers) less pain, by learning to live with country code aliasing - and concentrating on convincing the various search engines and other Internet services to accept Canonical URLs, so country code aliasing will work, seamlessly, with the Internet service which interests you. Alternately, use better designed gadgets and Internet services.

Blogger Magic - Republishing A Custom Domain

Sometimes, when you have a Blogger blog, published to a non BlogSpot URL, you may need to repeat the publishing process.

Maybe, you want to change the BlogSpot or domain URL, or change the blog - or maybe the previous publishing did not complete, properly. If the blog is currently published to a non BlogSpot URL, you can't just publish it, again. You have to start by publishing the blog back to a BlogSpot URL, before you can again publish the blog to a non BlogSpot URL.

Given the right planning, and understanding of the tasks involved, you can do all of this in 5 minutes - less time than it will probably take you to read these instructions.

The republishing process is not complicated.
  1. Publish the blog back to BlogSpot.
  2. If necessary, make any necessary changes in BlogSpot.
  3. Publish the blog to a domain URL.
  4. If necessary, enable the domain root redirect setting.

You'll use the Blogger dashboard Publishing wizard, at Settings - Basic, for all publishing. You can see a quick overview of the process, in pictures.

To publish the blog back to BlogSpot:
  • Look at the Publishing display.
  • If the blog is published to a custom domain, click on the "X".
  • If the "X" is not visible, you'll need to know where it should be - and you can click where it should be visible.
  • If the blog is currently published to a BlogSpot URL, you may skip this step.
  • If the final objective was to return the blog to BlogSpot, you are now done.


See the "X", to the right of "Edit"?

While the blog is (temporarily) published to BlogSpot, make any necessary changes. Maybe, change the BlogSpot URL, or the Blogger blog.

To publish this blog (or another Blogger blog that you own) to a domain URL:
Use the available and working redirect setting, to enable the domain root redirect, if necessary.

When you publish to a domain URL, you may have to add domain ownership verification. In this case, you'll need access to the Zone Editor wizard, provided by the registrar. If you originally used "Buy a domain" to purchase the domain, you'll need access to Google Apps, to access the registrar login instructions.

Other than the domain ownership verification, the republishing process is just a matter of 1 - 2 - 3 (maybe - 4). Having done this, be aware of the possible search engine relationship issues.

Custom Domain Publishing, And Spam Classification

We see the naive question sometimes, in Blogger Help Forum: How Do I?, about avoiding spam classification by publishing to a non BlogSpot URL.
Can I keep my blog from being deleted, by publishing to a non BlogSpot URL?
This is a complex question, because custom domain publishing provides several possibilities. But will the possibilities provide an opportunity for avoiding spam classification?

Custom domain publishing, in its simplest form, offers only one immediate benefit.
  • The ability to publish to a non BlogSpot URL.
Even when the Blogger blog is published to a non BlogSpot URL, the blog is still subject to spam classification. The Blogger spam classification process, which looks for spammy content, will look for spammy content in any blog, regardless of published URL.

If your blogging activity is centered around several different subjects, as mine are, you may do well to make several different blogs.
Having created a cluster of Blogger blogs, you can aggregate a cluster more easily by publishing each to a different host, in a domain. This is merely one technique, used in a strategy to combine multiple blogs and websites.

Given the ability to separate blogs of different content, you may be able to avoid one known reason for spam classification.
Large blogs with multiple, unfocused / unrelated subjects.

If you host malware or spam in your Blogger blogs, however, you won't necessarily avoid classification. Since a properly published Blogger custom domain blog starts with a BlogSpot URL - and since the BlogSpot URL remains active, even with the blog published to the domain URL, the blog will still be subject to the spam classification process.

>> Top

Blogger Magic - Redirecting A URL In Your Blog

In 2012, Blogger gave us a suite of useful utilities to control how the search engines see our blogs.

This feature suite includes the ability to redirect one URL in our blog to another URL in our blog. The "Custom Redirects" feature is easy to use - but like many Blogger features, not immediately so.

Neither its possibilities, nor its limitations, are obvious to everybody.

A Custom Redirect starts with the dashboard wizard, at Settings - Search preferences.


Click "New redirect", to start, if you have redirects already.


Add From and To values, as noted.


Remember to select "Permanent".


  1. Go to Settings - Search preferences - Custom Redirects, and click on Edit.
  2. If you have existing redirects, click on "New redirect".
  3. Enter the correct "From" and "To" values.
  4. Select "Permanent".
  5. Click on "Save".
  6. Click on "Save changes".

You can redirect any URL in the blog - to any other URL in that same blog.

The possibilities are almost endless, when you reference any valid URL in a given blog.

Thanks to the syntax of the "From" and "To" values in the wizard, Custom Redirects will only redirect within the blog itself, and is thus useless to spammers and others who would like to misuse it. Also, the custom redirects, which do not include the published URL, will work after the blog URL is changed - either BlogSpot to BlogSpot, or custom domain publishing.

The URL of this post:

http://blogging.nitecruzr.net/2013/01/blogger-magic-redirecting-url-in-your.html

The base URL, stripped:

/2013/01/blogger-magic-redirecting-url-in-your.html

Take any two URLs in your blog, strip the base URL, and add a custom redirect.

Just take any two specific URLs (no masking, or wild cards) within your blog, strip the base URL from each, and enter the results as the "From" and "To" values. Always start "From" and "To" with a "/" (no leading spaces, or non visible control characters!), signifying the root of the URL, follow the above procedure, and you're done.

Click here, for examples of what you can do. Then, use your imagination.

Just remember though to use specific URLs, no masking or "wild card" characters. Also - the actual URL - and what your readers see in the address window - will not change. The magic goes only so far.

Removing The "/p/" From the URL

Ever since Blogger (finally) gave us the option to add static pages to our blogs, blog owners started asking
How do I make my pages URLs cleaner? The "/p/" in the URL is so messy looking.
Our typical response would be simple.
Sorry, you're stuck with the URL, as is, for a static page.
And, that was that.

Later, Blogger gave us the ability to redirect URLs within the blog - and that changed.

This is the URL of the topics index in this blog ("labels", to use the Blogger native term).
http://blogging.nitecruzr.net/p/topics.html
Here are two alternate URLs, which also reference the topic index.
http://blogging.nitecruzr.net/topicindex
and
http://blogging.nitecruzr.net/topic-index
Click on each link, and note where you go.

To make the alternate URLs work, all that I did was use "Custom Redirects", and add two entries.
From: /topicindex
To: /p/topics.html
and
From: /topic-index
To: /p/topics.html
Of course, the address displayed will be the address published - not the address entered into the browser. You can't change the address displayed - you can only simplify what has to be entered. And, to maintain proper spam mitigation policy, you can only redirect within the base URL of the blog.

Other than that, the possibilities are almost endless.

>> Top

iOS application security assessment: Sqlite data leakage


Most of the iOS applications store sensitive information like usernames, passwords & transaction details, etc.. either permanently or temporarily on the iPhone to provide offline access for the user. In general, to store large and complex data, iOS applications use the Sqlite database as it offers good memory usage and speed access. For example, to provide offline access Gmail iOS application stores all the emails in a Sqlite database file in plain text format.

Unencrypted sensitive information stored in a Sqlite file can be stolen easily upon gaining physical access to the device or the device backup. Also, if an entry is deleted, Sqlite tags the record as deleted but not purge them. So in case if an application temporarily stores and removes the sensitive data from a Sqlite file, deleted data can be recovered easily by reading the Sqlite Write Ahead Log. The below article explains on how to view Sqlite files and how to recover the deleted data from Sqlite files on the iPhone. For this exercise, I have created a demo application called CardInfo. CardInfo is a self signed application, so it can only be installed on a Jailbroken iPhone. The CardInfo demo application accepts any username & password, then collects the credit card details from the user and stores it in a Sqlite database. Database entries are deleted upon logout from the app.

Steps to install the CardInfo application:
 
1. Jailbreak the iPhone.

2. Download CardInfoDemo,ipa file - Download link.

3. On the Windows, download the iPhone configuration utility – Download link.

4. Open the iPhone configuration utility and drag the CardInfoDemo.ipa file on to it.


5. Connect the iPhone to the windows machine using USB cable. Notice that the connected device is listed in the iPhone configuration utility. Select the device and navigate to Applications tab. It lists the already installed applications on the iPhone along with our CardInfo demo app.



6. Click on Install button corresponding to the CardInfo application.

7. It installs the CardInfo application on to the iPhone.



When an application is installed on the iPhone, it creates a directory with an unique identifier under /var/mobile/Applications directory. Everything that is required for an application to execute will be contained in the created home directory. Steps to view CardInfo Sqlite files: 1. On the Jailbroken iPhone, install OpenSSH and Sqlite3 from Cydia.
2. On windows workstation, download Putty. Connect the iPhone and the workstation to the same Wi-Fi network.
 

Note: Wi-Fi is required to connect the iPhone over SSH. If the Wi-Fi connection is not available SSH into the iPhone over USB.

3. Run Putty and SSH into the iPhone by typing the iPhone IP address, root as username and alpine
as password.

4. Navigate to /var/mobile/Applications/ folder and identify the CardInfo application directory using
find . –name CardInfo’ command. On my iPhone CardInfo application is installed on the - /var/
mobile/Application/B02A125C-B97E-4207-911B-C136B1A08687/
directory.



5. Navigate to the /var/mobile/Application/B02A125C-B97E-4207-911B-C136B1A08687/
CardInfo.app
directory and notice CARDDATABASE.sqlite3 database file.




6. Sqlite database files on a Jailbroken iPhone can be viewed directly using Sqlite3 command line
client. View CARDDATABASE.sqlite3 and notice that CARDINFO table is empty.



7. On the iPhone, open CardInfo application and login (works for any username and password).

8. Enter credit card details and click on Save button. In the background, it saves the card details in
the Sqlite database.







9. View CARDDATABASE.sqlite3 and notice that CARDINFO table contains the data (credit card
details).


10. Logout from the application on the iPhone. In the background, it deletes the data from the Sqlite
database.


11. Now view CARDDATABASE.sqlite3 and notice that CARDINFO table is empty.

Steps to recover the deleted data from CardInfo Sqlite file:

Sqlite database engine writes the data into Write Ahead Log before storing it in the actual database file, to recover from system failures. Upon every checkpoint or commit, the data in the WAL is written into the database file. So if an entry is deleted from the Sqlite database and there is no immediate commit query, we can easily recover the deleted data by reading the WAL. In case of iOS, strings command can be used  to print the deleted data from a Sqlite file. In our case, running ‘strings CARDDATABASE.sqlite3’ command prints the deleted card details.


In iOS, if an application uses the Sqlite database for temporary storage, there is always a possibility to recover the deleted temporary data from the database file.
For better security, use custom encryption while storing the sensitive data in Sqlite database. Also, before deleting a Sqlite record, overwrite that entry with junk data. So even if someone tries to recover the deleted data from Sqlite, they will not get the actual data.

About The Author

This is a guest post written by Satishb3 - www.securitylearn.net.

Why High Speed Internet Crucial for Efficiency on the E-commerce site


An ecommerce host plays an important role in the smooth and successful running of your online business. In fact, without an efficient ecommerce host solution integrated along with your website, you will not be able to imagine on the accomplishment of an ecommerce business. Therefore, you must look out carefully for a high speed internet connectivity that helps in the growth of the ecommerce platform.

Speed
The speed of the different activities on your ecommerce store will basically depend on the velocity of the servers of your ecommerce host. Therefore, you need to ensure that the ecommerce host you have opted for makes use of high speed Internet connection.

Uptime
It not only depends on the speed, but the uptime of the servers of your ecommerce host also matters a lot. For instance, when a customer decides to make a purchase from your online store, he is quite happy with the fast speed of shopping and at the same time when he is just about to enter the credit card number the server of the ecommerce site gets down. Now hope you can imagine the impression of the customer on this particular ecommerce website due to this. This complication will not get this individual back to your online store ever again. There can even be worse situations arising than this one. Just think that the customer makes the payment, and before any individual could get the receipt, the server of your ecommerce host goes down. The customer visiting your website will feel like he is being cheated by your website. He will eventually lose faith on your business. So, what can be worse for your business than losing out customer trust? Therefore, ensure that you have selected an ecommerce host that puts forward 24*7 up time together with high-speed high connection.

Downloading
Easy and quick downloading of visual and audio files, folders, programs and software updates is quite necessary to any Internet user. If there is slow Internet connection it might take hours to get your audio and video files downloaded.

Streaming
If there is a video or audio onto your site, a high speed Internet connection will help you by not making you wait for your file to load and having it bring to a standstill halfway. A poor internet connection will be quite frustrating in that case.

Method of Payment
Another significant element which determines the efficiency of an ecommerce host is the type of payment they can have. Today you will find that the world of ecommerce is quite advanced and you should have a system on your ecommerce website so that the online store is able to accept various kinds of payment. Therefore, you need to ensure whether your ecommerce host is able to provide your eCommerce site such a kind of system. Your high speed internet connection will help your customers with the payment procedure easily without much hassle.

Phone Access
A high speed Internet service will facilitate you to connect the rest of the 21st century that discuss over telephone making use of the Internet connectivity at the same time without having to opt for a second telephone connection.

 Smooth Access to Product Detail Page
It is often seen that the product detail page is one area where most of the eCommerce websites fail. You will find high emphasis on the usability and design of the home page and the same effort is not present to the rest of the websites. It is often found that a user spends most of his or her time on the product detail page as he or she can seek all information that is required. If the details sited in the page enables better understanding of the user which is presented strikingly, your eCommerce website will be in demand surely. High speed Internet connectivity will get the product detail page effortlessly and smoothly.
So, this isn't the time period of 90’s anymore. High speed Internet connectivity could help you to do multi-task on things like checking your bank account, paying off bills, uploading various photos and finally listening to streaming audios. It will also help you to keep your sanity as you do not have to wait for long hours for your page to load. The above mentioned seven areas that benefit from high speed internet access are Speed, Uptime, Downloading, Streaming, Method of Payment, Phone Access and Product Detail Page.

Therefore, these are the basic reasons on why high speed Internet Connectivity is crucial for efficiency on the E-commerce site.

Author Bio:
Donna B. is a career counselor working for a university in the UK. She recommends that everyone should be on the virtual world and stay in touch with all the happenings. If you do not have the internet, you can run a check on what internet providers are available where you live at www.highspeed-internet.com.

Blogger Cannot Provide Advance Warning Of Deletion

One of the more intriguing tales, in the never ending saga of malware and spam interdiction, would have to be the confusion about the proper procedure for deleting or locking blogs, when suspected of hosting malware or spam. We periodically see, as part of a "Please unlock my blog!" request in Blogger Help Forum: Something Is Broken, the naive suggestion.
It would be better if Blogger Support had immediately alerted me of this problem, before deleting my blog!
The irony here is that, from a purely "customer service" viewpoint, I have to concur with the principle here.

It would be better, if Blogger Support could do this. Like many "it would be better" observations, this is probably never going to happen.

What would happen, if Blogger were to provide advance notification of any malware / spam classification? Many spammers would certainly appreciate this option - to remove the dodgy content, before the blog is deleted or locked. The typical spammer would have several options.
  1. Remove the dodgy content, immediately.
  2. Copy the entire blog to a second blog in the spam blog farm, and wait until receiving advance notification for that blog. Lather, rinse, repeat.
  3. Possibly, do nothing. Later, claim indignantly
    I never got the notification!
    and hope that the kind souls at Blogger Support would give him another chance, since he had not been properly warned.

Option #1, used wisely, could even be used to "map" out the current spam mitigation strategy, and let spammers publish hundreds of spam blogs, staying below the radar. Essentially, we would see self whitelisting of spammy blogs. What spammer would not go for that, in a second?

Besides the spammers benefiting hugely from advance notification, not all genuine blog owners would benefit. Not every blog owner uses a properly registered Blogger account, or will read email from Blogger Support.

So, we have two downsides to the option of advance notice.
  • Spammers would love it.
  • Not every non spammer would appreciate it.
I, for one, don't see an upside - or certainly not any upside with benefit to counter the downsides.

In Utopia, there would be no spammers, and no need for any of this. Unfortunately, the Internet will never be part of Utopia.

Third Party Gadgets And Recent Malware Detected Blogs

Earlier this week, we noted an increased level of activity in reports about blogs locked as suspected spam hosts, in Blogger Help Forum: Something Is Broken. Upon review of the increased volume of spam referrals, with the majority of the cases found to be spurious, Blogger Support provided advice, about a new reason for deleted blogs.
Yesterday, our malware detection system began receiving reports of malicious content on some blogs. While the blog content on many of these blog may be malware-free, 3rd party widgets on these blogs may contain malware.

When a blog is locked for hosting malicious third party gadgets, the blog will be present in the dashboard "Deleted blogs" list - and should be unlocked, on the spot, using the "Restore" option in the list.

The Known Issues advice continues, and describes a planned action.
We’re currently in the process of contacting all blog owners with instructions.

Until Blogger Engineering comes up with an automated contact procedure, owners of blogs which are deleted by Blogger may do well to check their dashboard "Deleted blogs" list, before asking for spam review in the forums.

Owners who find their blog listed, in "Deleted blogs" will be able to immediately restore the blog in question. Having restored the blog, it will be accessible in the "Locked blogs" list - where only the administrators can access it - and remove any possibly malicious third party gadgets, which may have been recently installed. So far, we've seen problems reported withAll of these are known to trigger malware classification, and cause locked blogs. While the blog is in "Locked blogs", it will remain offline, and inaccessible by readers and search engines.

Once all malicious / unsafe accessories and tweaks have been removed, the owner can submit the blog for unlock review, using the "Request Unlock Review" button in "Locked Blogs". Given a successful review, the blog will be returned to the main "My blogs" list, and restored to service.

Once malicious accessories and tweaks have been removed from the blog in question, it's a good idea to not reinstall them. Repeated detection will lead to Blogger account termination, similar to the penalty for repeated DMCA violations.

There are several reasons why all owners of such blogs may not see their blog listed, in a dashboard list. Owners of these blogs will still be obligated to report their problem in the forums - and to patiently wait while Blogger Support can restore their blogs.

The latter scenario will provide one more example while poorly planned anonymous blog ownership is not a good idea.

>> Top

Recovery From Locked Blogger / Google Accounts

Not all blog owners understand the reasons behind the locked Blogger / Google accounts.

Even less understand why recovery of locked accounts, and of the blogs owned by the locked accounts, is not immediate. We see the occasional report, in Blogger Help Forum: Something Is Broken.
I had to change the password on my account - and now my blogs are deleted! Why should I wait another "24 to 48 hours" to get my blogs back?
This blog owner does not understand the possible reasons for the locked account - and the work that goes on after the account is unlocked.

Brute force hacking of our Blogger / Google accounts, by hackers / spammers, who have use of the various botnets in the Internet, is a constant activity. Opposing activity, by the Security teams in Blogger / Google, to not let hackers and spammers take control of our accounts and blogs, is just as constant.

Some of the Security activity requires our patience - and blog owners, having to recover their deleted blogs, are not always patient.

The Security processes, in Blogger / Google hacking prevention, have to work from a worst case scenario, when detecting hacking activity.

Immediate detection of hacking is not always a possibility.

Account hacking cannot always be detected instantly. When hacking is detected, the hacking prevention process has to consider the possibility that the accounts under attack have already been compromised.

When Blogger / Google Security detects possible brute force hacking against an account, they lock the account - and delete the blogs owned by the account.

Alternatively, they quarantine the computers used in the hacking activity. This is where we see the notice of "suspicious account activity" - and possibly the dreaded "403 Forbidden".

Post detection security analysis looks at owner mistakes, and for hacking artifacts.

When we discover a locked account, and request its restore, the security process looks for signs of security weaknesses allowed by the account owners - or possibly added by the (temporarily) successful hacker. In some cases, the owner may be required to change the account password, and receive instruction on using a more secure ("strong") password.

Ongoing efforts by Blogger / Google, to make the account recovery easier for the blog owners to endure, may cause mystery about blogs missing from the dashboard, without obvious recovery options.

After the account is restored, all blogs must be carefully checked.

After the Blogger / Google account is restored, the integrity of the blogs owned by the account must be verified.

  • The blog content must be examined for spammy content added.
  • The blog Permissions list must be checked, for backdoor accounts added.
  • The Mail-to-Blogger settings must be considered as a possible backdoor.

These are simply examples of what must be done, to ensure that our blogs were not compromised, even temporarily, by the hacking just detected. After you get your account back, it's not a bad idea for you to verify this, on your own. If you just got your blog back, after resetting your Blogger account password and / or verifying your phone number, check your template carefully, looking for references to unfamiliar JavaScript code, hosted outside Google address space.

Account / blog verification will take time.

The process of account and blog integrity verification will require an unpredictable time period - and needs to be done with the blogs inaccessible to anybody but the Blogger / Google security processes. The blog being offline may not be immediately observed by the owner - and this may cause more confusion.

Blogger Support is aware that nobody wants to deal with the stress of having a locked or deleted blog - especially after they have gone through the process of verifying their account. They are also well aware of the frustration that is present when someone reports
Somebody is publishing spam on my blog - and I can't access the dashboard to remove the spam!

Locking the owned blogs, after hacking activity is detected, complements the ongoing policy of not disclosing the account names, in helping to keep our blogs under our control.

---

http://blogging.nitecruzr.net/2013/01/confusion-over-recovery-from-locked.html
Confusion Over Recovery From Locked Blogger / Google Accounts

Everybody Won't Get Proper Notice About Their Blog

One problem that we're seeing in Blogger Help Forum: Something Is Broken involves blog owners, who recently discovered their blogs deleted or locked, by Blogger - and without any notice received.

The account actions may be required with the blog deleted for a suspected TOS Violation, such as hosting malware, porn, or spam - or locked because of "suspicious activity" on the Blogger account.
Why was my blog deleted? I never got proper notice!
Too many people depend upon email notification - and may not receive proper notification, in all cases.

Blogger provides a dashboard based malware / porn / spam classification notification / recovery process, which may not be available for everybody. Similar to malware / porn / spam classification, there will be issues with DMCA violation notification.

This is also a problem when accounts are locked for "suspicious activity", and when blogs are locked for hosting malicious third party gadgets.

There are several reasons why some blog owners won't get notification of their blogs being deleted or locked, by the various Blogger / Google security processes.

Nobody should expect advance warning of any action being taken.

Besides notification limitations, nobody should expect to get advance warning of action being taken - as this would simply encourage the intentional spammers to never request review. Intentional spammers, if permitted, would play 3 Card Monte, endlessly, with their spammy blogs.

Both the notification, and advance warning, limitations contribute to confusion about the various Blogger / Google security recovery options. All email based notifications may not be properly delivered.

The owner of any email account, which may not deliver email properly, is still responsible for reading any important email messages.

Some blogs are owned by accounts which use intentionally bogus email addresses.

Too many Blogger blogs are owned by Blogger accounts which are based on inactive or nonexistent email addresses. Owners of these blogs will never see email notification, when they - intentionally or not - make themselves anonymous.

Some email clients may misfile an incoming email message.

In other cases, some people may get the email notifying them of problems - but their email program may misfile the email, in a folder which they may not check, regularly. In some odd cases, somebody other than the owner may get the email.

Blogs owned by teams will be subject to action against any one member.

In team blog ownerships, any blog owned by the team is subject to action, against the Blogger / Google account, used by any team member. Blogs affected will simply disappear from the dashboards of all team members - with no opportunity provided for appeal or review.

Some blog owners maintain too many Blogger and email accounts.

Finally, too many blog owners maintain multiple Blogger / Google accounts, and are not completely sure which Blogger account may own a given blog. These owners may not even see the dashboard based "Deleted Blogs" button / link, because they will be logged in to the wrong Blogger account.

Each blog owner is responsible for any problems, regardless of cause.

Not all of the above scenarios are entirely the fault of the blog owners - but the blog owners are the ones who will have to deal with the resulting problems. It's possible that this may seem unfair - but it's reality.

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground



Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground

Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
ISBN: 0307588688 | 2011 | EPUB/MOBI | 288 pages | 3 MB

Former hacker Kevin Poulsen has, over the past decade, built a reputation as one of the top investigative reporters on the cybercrime beat. In Kingpin, he pours his unmatched access and expertise into book form for the first time, delivering a gripping cat-and-mouse narrative—and an unprecedented view into the twenty-first century's signature form of organized crime.

The word spread through the hacking underground like some unstoppable new virus: Someone—some brilliant, audacious crook—had just staged a hostile takeover of an online criminal network that siphoned billions of dollars from the US economy.

The FBI rushed to launch an ambitious undercover operation aimed at tracking down this new kingpin; other agencies around the world deployed dozens of moles and double agents. Together, the cybercops lured numerous unsuspecting hackers into their clutches. . . . Yet at every turn, their main quarry displayed an uncanny ability to sniff out their snitches and see through their plots.

The culprit they sought was the most unlikely of criminals: a brilliant programmer with a hippie ethic and a supervillain's double identity. As prominent "white-hat" hacker Max "Vision" Butler, he was a celebrity throughout the programming world, even serving as a consultant to the FBI. But as the black-hat "Iceman," he found in the world of data theft an irresistible opportunity to test his outsized abilities. He infiltrated thousands of computers around the country, sucking down millions of credit card numbers at will. He effortlessly hacked his fellow hackers, stealing their ill-gotten gains from under their noses. Together with a smooth-talking con artist, he ran a massive real-world crime ring.

And for years, he did it all with seeming impunity, even as countless rivals ran afoul of police.

Yet as he watched the fraudsters around him squabble, their ranks riddled with infiltrators, their methods inefficient, he began to see in their dysfunction the ultimate challenge: He would stage his coup and fix what was broken, run things as they should be run—even if it meant painting a bull's-eye on his forehead.

Through the story of this criminal's remarkable rise, and of law enforcement's quest to track him down, Kingpin lays bare the workings of a silent crime wave still affecting millions of Americans. In these pages, we are ushered into vast online-fraud supermarkets stocked with credit card numbers, counterfeit checks, hacked bank accounts, dead drops, and fake passports. We learn the workings of the numerous hacks—browser exploits, phishing attacks, Trojan horses, and much more—these fraudsters use to ply their trade, and trace the complex routes by which they turn stolen data into millions of dollars. And thanks to Poulsen's remarkable access to both cops and criminals, we step inside the quiet, desperate arms race that law enforcement continues to fight with these scammers today.

Ultimately, Kingpin is a journey into an underworld of startling scope and power, one in which ordinary American teenagers work hand in hand with murderous Russian mobsters and where a simple Wi-Fi connection can unleash a torrent of gold worth millions.

http://uploaded.net/file/i70o7ijr/kingpin.rar
or
http://ryushare.com/949336dcc41/kingpin.rar

Hacker's Delight (2nd Edition): Collection of Programming Hacks



Hacker's Delight (2nd Edition)

Henry S. Warren, "Hacker's Delight (2nd Edition)"
English | 2012-10-05 | ISBN: 0321842685 | 512 pages | EPUB + MOBI | 44.84 mb + 41.16 mb


In Hacker’s Delight, Second Edition, Hank Warren once again compiles an irresistible collection of programming hacks: timesaving techniques, algorithms, and tricks that help programmers build more elegant and efficient software, while also gaining deeper insights into their craft. Warren’s hacks are eminently practical, but they’re also intrinsically interesting, and sometimes unexpected, much like the solution to a great puzzle. They are, in a word, a delight to any programmer who is excited by the opportunity to improve.



Extensive additions in this edition include:
- A new chapter on cyclic redundancy checking (CRC), including routines for the commonly used CRC-32 code
- A new chapter on error correcting codes (ECC), including routines for the Hamming code
- More coverage of integer division by constants, including methods using only shifts and adds
- Computing remainders without computing a quotient
- More coverage of population count and counting leading zeros
- Array population count
- New algorithms for compress and expand
- An LRU algorithm
- Floating-point to/from integer conversions
- Approximate floating-point reciprocal square root routine
- A gallery of graphs of discrete functions
- Now with exercises and answers

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws



The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws

The Web Application Hacker's Handbook: Discovering and Exploiting Security Flaws
English | 2008 | 768 Pages | ISBN: 0470170778 | PDF | 11 MB

This book is a practical guide to discovering and exploiting security flaws in web applications. The authors explain each category of vulnerability using real-world examples, screen shots and code extracts. The book is extremely practical in focus, and describes in detail the steps involved in detecting and exploiting each kind of security weakness found within a variety of applications such as online banking, e-commerce and other web applications.


Download


http://uploaded.net/file/4lmygx2l/wwweb.hck.rar
or
http://ryushare.com/fefzaj0rnvdj/wwweb.hck.rar

Contact Us

24x7 online , we happy to answer you
tamilcypc@gmail.com

Disclaimer

This Blog and its TUT's are intended for educational purposes only, no-one involved in the creation of this TuT may be held responsible for any illegal acts brought about by this Blog or TuT.



Featured Post

Custom Domains And HTTPS Redirection Code