8 Common Programming Mistakes

Here is a List of some common programming mistakes which are mainly faced by the beginners.

Things You Should Know About Digital Security

Have a glimpse of what all you can lose if one of your accounts is compromised...

Password Hacking - A brief Introduction

Password cracking is the process of recovering secret passwords from data that has been stored in or transmitted by a computer system.

Advance Hiding of Files and Folders using Command Prompt

Super Hide the Files, Folders using Command Prompt

Top 10 Free proxy softwares | Best proxy softwares

There are many sites in the world banned in many countries and internet users of these countries cannot access these sites. Some sites are very important for the people then they use the proxy software to access these banned sites...

Wednesday, 25 December 2013

Things Your Should Know About Digital Security



Have a glimpse of what all you can lose if one of your accounts is compromised...you as well as your employer can lose standing in the market...it can even affecyour 
financial security... hacker can put your reputation at risk.

So, is it not better to play safe with sensitive information?

Let us remind you that several well-funded groups as well as your competitors, 
criminals and governments have been taking an acute interest in getting at your data.







Luckily, there are some basic doctrines that you can follow along with best practices 
to manage to stay safe online. We are sharing some basic rules that can make your 
online life securer than ever.

1. Internet is insecure to the core

Do you know majority of the protocols that form the Internet — such as HTTP (the Web), FTP (file transfers) and SMTP (email) — aren’t safe. This means whatever data you transfer using these technologies is open for anyone to see. So, you might think you’re sending a sealed envelope, but in reality, it’s a postcard that anyone can read.

2. Use Encryption 

Luckily, you can use several most common Internet protocols with safe alternatives. These options bestow you with the similar functionality, but help you encrypt your data before transmitting it and decrypt it once it’s delivered. HTTPS is one of the safest protocols that makes it possible to transmit credit-card numbers and other sensitive data on the Internet. To check whether an HTTPS connection is available for a particular site, enter https:// rather than entering http:// in your browser’s address bar. 

3. Avoid using weak passwords 

Several security breaches start with feeble passwords. Don’t create passwords, which are easy to guess. Various studies indicate the most common passwords are also the weakest ones. Strengthen your password by choosing appropriate length— use eight or more characters. You can also include different letters, numbers and symbols, with a mix of upper and lowercase characters.

4. No password is more important than the one for your email

Avoid sharing your email passwords. If a person has access to your email, it is easier for him/her to gain access to any number of other accounts. This is because many sites allow for password resetting by clicking email-based confirmation links.

5. Use different email accounts for different purposes 

Work towards minimising the damage of a breach. This can be done by using one email account for most public communications and another email for private for more-sensitive communications. 

6. For the best security, use a password manager and memorise just one “super password.”

Use strong passwords to ensure digital security. It will be even better if you use different passwords for different accounts. It is difficult to remember lots of different complicated passwords, in this situation, you can use a password manager. This tool generates very strong passwords and then encrypts those passwords.

7. Storing and communicating data essentially compromise security

Though encryption is a great tool, but choosing good passwords can surely help you keep your data safe.

8. Anonymisation can resolve various security concerns.

Apart from encryption, anonymisation is also another way to ensure security. Anonymisation involves various technologies including proxy servers and VPNs. Tor is a popular anonymisation tool, which employs a combination of encryption and relays to confuse data and send it on a junction path before it reaches its destination. 

9. Open WiFi networks can be a problem

Though HTTPS is a big security tool even when you are communicating over insecure wireless networks, but it is still risky. However, information which has been encrypted over HTTPS won’t be visible, but certain websites execute HTTPS partly, protecting login pages but not other details.

10. Protecting illicit access to your physical devices is essential

All efforts to secure your online details would go in vain if your pc isn’t physically secure. If you stay signed in to accounts in your browsers, it wont take much time to access sensitive data stored on your pc.


Thank You :)

Tuesday, 24 December 2013

Download the Whole website using IDM for offline browsing



Internet Download Manager is very useful software for every internet user. It is very user friendly and easy to operate.Today I am going to discuss a very useful feature of IDM. I will explain you step by step process to download any website for offline browsing using IDM. Here are some steps given below, just read and follow them carefully.




Step 1. First of all open IDM and start GRABBER as given in the snapshot below.




Step 2. Now fill up the required fields as shown below.



       1. Project name (eg. any name you want..i have written it sample)
       2. Start page address (eg. url of the website you want to download..i have written                                        www.w3schools.com)
       3. Choose Project Template (I will recommend you to choose "The whole website"..as if u want to download the complete website for offline browsing)




         4. Then choose "NEXT"

Step 3. Now choose the folder where you want to save the downloaded website.




Step 4. Again click on NEXT to choose which part of websites you want to ignore or download e.g Pop-Up etc.




                                                                  *Click "Next"




Step 5. Again Click on NEXT and done. Your website will be started for download. Now just wait for some time until your download is not completed after that enjoy offline browsing.




Thank You :)

Monday, 23 December 2013

Advance Hiding of Files, Folders using Command Prompt

Super Hide the Files, Folders using Command Prompt



All of us want to hide some files, movies and the stuff from others. Many of us make the attributes of the file as hidden and make it invisible through the folder options. But every computer user knows it. I know on using other’s computer almost all of us enable showing hidden files to see what secret content he has, Don’t you ? But there exists a trick with which you can hide your content from others.  Let me give you that…




Well, If you are a command line lover, then I do not need to tell you about this. If you are not, you are welcome here. 

There is a command called attrib in the Command Prompt in Windows. Operation of this command is to show the attributes of the file  like read only, system file ,hidden and many more. With this command you can set and change the attributes of the complete folder and the file too.

1. First gather all ur private data in a folder..lets say, "abc"
2. now right click on the folder..copy its location..



3. Open command prompt
4. Type command "cd" hit space, then right click nd select paste..


5. now type command "attrib +h +r +s /s /d abc"


that's it..ur file or folder is hidden now.

To Unhide..

1. Open command prompt..type the same location..where u have hide the folder..
2. Type command attrib -h -r -s /s /d abc



That's all..try this

Refer to the snapshot..if u r having any problem..or comment below.. 

Now, comes the explanation, by applying these attributes, you actually change the file/folder into a system folder having special security apart form the hidden files.
Remember, If someone enables viewing system files, you will be caught….
But, not everyone likes to see the system files to temper with it, specially in Windows.



Thank You :)

Manually Remove the Shortcut Virus from USB pendrive



Hi guys. Sometimes its very irritating when
you insert any USB and it shows many 
shortcuts of My Documents and all the 
important data and files become invisible. 
This is due to a shortcut virus. It is usually 
present in many computers of office, college 
or cyber cafes. Many of my friends are 
facing the problems with this virus. So here
 is a simple trick by which you can remove 
this virus from your pen drive.


  • Open command prompt. go to start >run > type cmd.
  • Insert your USB flash drive. Assuming it is drive H:
  • In the command prompt window type the following code and hit enter
attrib -h -r -s /s /d H:\*.*

          here replace H: with your drives name.

  • That's it. Now you can see that all your shortcut files are back now. 
You have successfully removed the shortcut virus from your pen drive.

Thank You :)




8 Common Programming Mistakes


Here is a List of some common programming mistakes which are mainly faced by the beginners.





1. Undeclared Variables: Before compiling the program or even writing the program we should carefully monitor that the variables we're using are already declared or not. The Compiler didn't understand the variables itself. we have to declare them before compiling.

2. Uninitialized Variables: The Advance languages like JAVA, Python handles the uninitialized variables. However we may get the errors with the Languages like C/C++

3. Setting the Variable to an uninitialized value: Users often start using the variables without initialization which may spread the garbage values to other sections of the program too.

4. Using a Single equal sign to check equality:
int c=10;
if(c=10)
 cout <<"Hello";
Always remember while writing any statement for comparison use '==' instead of '=' because '=' is use to assign the values instead of comparison.

5. Undeclared Functions:
void main()
{
hello();
}
void hello()
{
//
//
}
Always remember to put either a prototype for the function or the entire definition of the function above the first time you use the function.

6. Extra Semicolon:
void main()
{
if(1);
 cout <<"Hello";
}
Remember, the semicolon ';' never goes after the if, for, while, do while or functions statements else the program will function improperly.

7. Over Stepping the boundaries of array definitions or variables is also a major error done by the user which results into the incorrect results.

8. Misuse the && or || operators. Study the De Morgans Law instead.