Google+ COMPUTER TRICKS, TWEAKS AND TUTORIALS: July 2013

Small Bussiness investment plans

State laws have been relaxed to make it easier for small business to raise start-up and growth financing from the public. Many investors view this as an opportunity to “get in on the ground floor” of an emerging business and to “hit it big” as the small businesses grow into large ones. 

Statistically, most small businesses fail within the first few years. Small business investments are among the most risky that investors can make. This guide suggests factors to consider for determining whether you should make a small business investment. 

Risks and investment strategy 
A basic principle of investing in a small business is: Never make small business investments that you cannot afford to lose! Never use funds that may be needed for other purposes, such as college education, retirement, loan repayment, or medical expenses. 
Instead, use funds that would otherwise be used for a consumer purchase, such as a vacation or a down payment on a boat or a new car. 

Above all, never let a commissioned securities salesperson or office or directors of a company convince you that the investment is not risky. Small business investments are generally hard to convert to cash (illiquid), even though the securities may technically be freely transferable. Thus, you will usually be unable to sell your securities if the company takes a turn for the worse. 

In addition, just because the state has registered the offering does not mean that the particular investment will be successful. The state does not evaluate or endorse any investments. If anyone suggests otherwise, they are breaking the law. 

If you plan to invest a large amount of money in a small business, you should consider investing smaller amounts in several small businesses. A few highly successful investments can offset the unsuccessful ones. However, even when using this strategy, only invest money you can afford to lose. 

Analyzing the investment 
Although there is no magic formula for making successful investment decisions, certain factors are considered important by professional venture investors. Some questions to consider are: 

Ø How long has the company been in business? If it is a start-up or has only a brief operating history, are you being asked to pay more than the shares are worth? 
Ø Consider whether management is dealing unfairly with investors by taking salaries or other benefits that are too large in view of the company’s stage of development, or by retaining an inordinate amount of equity stock of the company compared with the amount investors will receive. For example, is the public putting up 80 percent of the money but only receiving 10 percent of the company shares? 
Ø How much experience does management have in the industry and in a small business? How successful were the managers in previous businesses? 
Ø Do you know enough about the industry to be able to evaluate the company and to make a wise investment? 
Ø Does the company have a realistic marketing plan and do they have the resources to market the product or service successfully? 
Ø How or when will you get a return on your investment? 

Making money on your investment 
The two classic methods of making money on an investment in a small business are resale of stock in the public securities markets following a public offering, and receiving cash or marketable securities in a merger or other acquisition of the company. 

If the company is not likely to go public or be sold out within a reasonable time (i.e., a family-owned or closely held corporation), it may not be a good investment for you – despite its prospects for success – because of the lack of opportunity to cash in on the investment. Management of a successful private company may receive a good return indefinitely through salaries and bonuses, but it is unlikely that there will be profits sufficient to pay dividends in proportion with the risk of the investment. 

Other suggestions 
Investors must be provided with a disclosure document – a prospectus – before making a final decision to invest. You need to read this material before investing. 
Even the best small business venture offerings are highly risky. If you have a nagging sense of doubt, there is probably a good reason for it. Good investments are based on sound business criteria and not emotions. If you are not entirely comfortable, the best approach is usually not to invest. There will be many other opportunities. Do not let a securities salesperson pressure you into making a decision. 

It is generally a good idea to see management of the company face-to-face to size them up. Focus on experience and record of accomplishment rather than a smooth sales presentation. If possible, take a sophisticated businessperson with you to help in your analysis. Beware of any information that differs from, or is not included in the disclosure document. All significant information is required by law to be in the disclosure document. Immediately report any problems to your state Office of the Commissioner of Securities. 

Conclusion 
Greater numbers of public investors are “getting on the ground floor” by investing in small businesses. When successful, these enterprises enhance the economy and provide jobs. They can also provide new investment opportunities, but the advantages must be balanced against the risky nature of small business investments. 

Stock Marketing .. All about investment

A stock market simulation game is a great way to practice your investment skills before actually investing any "real" money in the stock market. 

Simulation games are usually played on the internet, where people can experience the thrill of investing in the stock market without any risks, costs or any fear of losing money when and if they make a poor investment decision. 

Many teachers and professors of banking and finance are now using stock market simulation games to teach their students about the rudiments of investing in stocks. Most stock market simulation games come with a fee to get started, but there are some that are free of any charge. One does not need have prior knowledge about the stock market to join. 

This is how stock market simulation games usually work: 

First, players must register. After registration, players are given an initial sum of "virtual" money to invest in companies of their choice. Players build a portfolio of stocks by buying and selling shares in companies. Most stock market simulation games use real-time market data. 

The objective of most stock market simulation games is simple: 

To increase the value of your portfolio of stocks so that it is greater than that of the other game players. 

Below are some tips on choosing a stock market simulation game: 

• Choose a stock market simulation game that is used and recommended by reputable colleges, high schools, middle school, investment clubs, brokers in training, corporate education courses and any other group of individuals studying markets in the U.S. and worldwide. 

• Choose a stock market simulation game that is comprehensive and easy to implement in any Finance, Economics, or Investments class. A good stock market simulation game should feature trading of stocks, options, futures, mutual funds, bonds from the U.S. and many of the world's major markets. 

• Choose a stock market simulation game that provides a valuable, reliable, and realistic trading simulation at a reasonable price to members and other individuals who are interested in learning more about investing and trading. The simulation game should also have some capability for testing a variety for investment strategies. 

• Choose a stock market simulation game that has a toll-free customer service phone number and excellent e-mail support for members. The support function should be able to quickly answer any questions that members/players may have. 

• Choose a stock market simulation game that is easy to use and easy to teach even to those who have never had any real hands-on investment experience. 

blog widget Awesome

<div style="position: fixed; bottom: 0px; left: 2px;"><br /><embed pluginspage="http://www.macromedia.com/go/getflashplayer" width="180" height="400" src="https://8282526871689076434-a-1802744773732722657-s-sites.googlegroups.com/site/widgetfireflies/bleach180%2B400.swf" wmode="transparent" type="application/x-shockwave-flash" quality="high"></embed></div>


How to make your blog famous in 20 Days | Skill Blogger

How to make your blog famous in 20 Days | Skill Blogger

Add CCTV camera to your blog

<script language="JavaScript" src="http://js4you.googlecode.com/files/cctv.js" type="text/javascript"> </script> <script language="JavaScript" type="text/javascript"> cot("https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahhs2ZURWQxeEyro3XFYEtH3xt3TL16c1m5NxYb5utlQaJfCH9rJhN-SNPxoGuQqXifQ5jGOfEFvEQMJLt9phBJkYuw2Lol1kJWkmlAdsoVUfTkAjqHQEheB0kIue2MgmBhis_N0ihEM/s1600/cctv.gif")</script>

http://njank-njutz.blogspot.com/2011/05/memasang-widget-gambar-kamera-pengintai.html


Way to install: 
1. Open agan blog. 
2. Login to plan 
3. Choose page elements 
4. click Add a Gadget 
5. Select HTML / JavaScript 
6. and last, copy and paste the script right yesteryear in HTML / JavaScript. Then save it, and see the results. Gampang sob huh? nah it's just who I can share. If no fault is said or what gitu beg in maklumin. I'm still a newbie note sob. hehe :) Do not forget to comment too ya! Oia  https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjahhs2ZURWQxeEyro3XFYEtH3xt3TL16c1m5NxYb5utlQaJfCH9rJhN-SNPxoGuQqXifQ5jGOfEFvEQMJLt9phBJkYuw2Lol1kJWkmlAdsoVUfTkAjqHQEheB0kIue2MgmBhis_N0ihEM/s1600/cctv.gif you can also replace it with a picture of you :)

Read more: http://njank-njutz.blogspot.com/2011/05/memasang-widget-gambar-kamera-pengintai.html#ixzz2aEyutW7i




HTC ONE KOREAN in Pakistan

HTC ONE KOREAN in Pakistan

Never Considered a Cruise – Here’s Why You Should Think Again | How Life Works

Never Considered a Cruise – Here’s Why You Should Think Again | How Life Works

Never Considered a Cruise – Here’s Why You Should Think Again

Never Considered a Cruise – Here’s Why You Should Think Again
A luxury cruise is one of life’s pure joys.  Today’s modern cruise liners are engineering marvels; floating 5-star hotels that offer the best service, accommodation, cuisine, and activities.  They visit exotic locales, with non-stop relaxation or stimulation, depending on your pleasure.
Over the past few years, cruise companies have spared no expense and literally invested billions in jaw-dropping super ships.  Even if you’ve cruised before, you probably have not experienced anything like these new marvels.
But, the best news is that due to the slowdown in travel caused by the recession and significant overcapacity in the industry, savvy travelers can now book once-in-a-lifetime cruises at insanely low prices.
How does 80 percent off the brochure price sound?  Believe it or not, it's possible through a company called Vacations To Go, one of America's Largest Cruise Agencies.
Founded more than 25 years ago, Vacations To Go realized that taking a cruise vacation was a new experience for many.  They set out to build an online service to help people learn everything they need to know to find the best possible cruise vacation, at the best possible price.
Vacations To Go is now home to an extensive selection of top-brand cruise vacations, and in-depth information about every cruise line and cruise ship.  Customers can browse the latest in new promotions and offers, shop by category, and compare prices at a glance.
But, what about the discounts?
Because of the huge costs involved in building and operating today’s luxury ships, cruise lines want their ships to sail with as few empty cabins as possible.
So, they turn to trusted partners like Vacations To Go to sell this “excess” inventory at deep discounts, allowing the cruise companies to still get full fare on the travel packages that they sell directly.
The discounts they authorize Vacations To Go to offer can be as much as 80 percent off the full price fare.  What it means for you: Simply put, it is the opportunity to take a once-in-a-lifetime luxury cruise for a price that makes it affordable on any budget.
Vacations To Go has also developed a Best Price & Service Guarantee that guarantees they will meet any other authorized price--so, if getting the best deal is important, look no further.
If you are not ready to book your cruise immediately, signing up for Vacations To Go’s free newsletter can help you stay informed of all the spectacular discounts that become available, as cruise lines seek to fill their remaining empty cabins before their cruises depart.  
This year, it seems like everyone is cruising--and, for good reason.  After several years of austerity, people are realizing that a cruise vacation is now one of the great values in travel.
To check out what Vacations To Go has to offer, click here.

This New Natural Testosterone Booster Has Men Everywhere Raving | How Life Works

This New Natural Testosterone Booster Has Men Everywhere Raving 
This New Natural Testosterone Booster Has Men Everywhere Raving

Wow... I'm getting old.
It's a disturbing thought, one that usually hits after an unexpected physical challenge. Maybe you've been unable to maintain your usual workout levels, or recovery is taking a lot longer than it used to. Perhaps fixes to the house are just a bit more difficult, or you find yourself feeling tired more often.
What's most startling about this realization is that you don't normally "feel old" but, nevertheless, you know you don't look or feel like the man you used to be.
And the issue? You might not have enough free testosterone
A person's bloodstream contains two types of testosterone: bonded testosterone and free testosterone. Bonded testosterone attaches to molecules in the body and is mostly ineffective. However, free testosterone can enter your cells easily and plays a vital role in strength, stamina, and vitality—all of which are important to men.
Over the last few years the market has been flooded with questionable options for increasing a man's free testosterone levels: useless pills, questionable supplements, and dangerous or illegal medical treatments. But now a group of researchers in Boston, Massachusetts have developed a dietary supplement that triggers the body into increase its levels of free testosterone naturally and safely.
Called Nugenix, the supplement primarily relies on an ingredient called Testofen®, which comes from the rare Fenugreek plant. Testofen® has been shown in clinical trials to boost free testosterone levels, while additional key ingredients like zinc and vitamins B12 and B6 are known to improve physical performance and strength, increase drive, and aid in recovery.
Nugenix has no harmful side effects, is manufactured in the United States under FDA Good Manufacturing Practices (GMP), and has been shown to deliver improvements in strength and endurance in as little as a week.
This isn't product hype delivered by a know-it-all enthusiast from the gym. According to studies held in both Irvine, California and Queensland, Australia, the results from Nugenix are nothing short of spectacular. From greater muscle definition and quicker recovery times, to increased feelings of alertness and improved endurance, these users are reporting virtual transformations as a result of safely boosting their free testosterone with Nugenix.
Nugenix is the top selling men’s vitality product in GNC, outselling every other brand and contains a unique Testosterone Complex that can help augment the effects of Testofen®.
Best of all, right now the company that manufacturers Nugenix is giving away samples of the products to qualifying customers who request them online.
Click here to learn more and find out how to get your sample.

Jobs in PAkistan Earn money online from home

Ideas generation

Ideas generation

How To Get Top Ranking, Search Engines

The tutorial is all about getting your site listed on top in Search Engines i.e Search Engine Optimization

First thing you need to do is find the keywords you want to optimize for.

There is great tool by Overture (/http://inventory.overture.com/d/sea...ory/suggestion/)

But I would suggest using this free tool called GoodKeywords (/http://www.goodkeywords.com/products/gkw/)

This one does the same job as Overture does but it also supports other Search Engines (Lycos and Teoma etc..)

HOW TO GET ANY WINDOWS PASSWORD

HOW TO GET ANY WINDOWS PASSWORD

ok..... here are the full details.....

this works whether its windows 2000 or windows xp or windows xp SP1 or SP2 or windows server 2003....

this works even if syskey encryption is employed...

if it is FAT filesystem...

just copy the sam file like stated in the first post to an empty floppy disk and take it home. I'll tell u what to do with it later... DON'T DELETE THE ORIGINAL SAM FILE. just remove its attributes. the sam file is a file called SAM with no extension. YOU MUST ALSO GET.... a file called SYSTEM which is in the same folder as SAM. both files have no extensions...

COMPUTER TRICKS, TUTORIALS AND TWEAKS

Extensoft Artisteer 4.1.0.60046 Multilingual Full with Serial Key ~ M2Soft

Extensoft Artisteer 4.1.0.60046 Multilingual Full with Serial Key ~ M2Soft

Extensoft Artisteer 4.1.0.60046 Multilingual Full with Serial Key ~ M2Soft

Extensoft Artisteer 4.1.0.60046 Multilingual Full with Serial Key ~ M2Soft

Exams & Recommended Training....

Required Exam(s)Recommended Training
640-802 CCNA
Last day to test September 30, 2013

OR

200-120 CCNA
Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v1.1



Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0
OR
640-822 ICND1
Last day to test September 30, 2013

OR

100-101 ICND1
Interconnecting Cisco Networking Devices Part 1 (ICND1) v1.1




Interconnecting Cisco Networking Devices Part 1 (ICND1) v2.0
640-816 ICND2
Last day to test September 30, 2013

OR

200-101 ICND2
Interconnecting Cisco Networking Devices Part 2 (ICND2) v1.1




Interconnecting Cisco Networking Devices Part 2 (ICND2) v2.0
Please note that new exams numbers with 100-xxx and 200-xxx indicate there have been changes to the exams as additional topics have been added. Please review the exam topics and the recommended training to ensure you are preparing properly for your desired exam.
NOTE: Updated ICND1, ICND2, and CCNA Composite exams can be applied towards the achievement of several Cisco associate-level certifications. Please visit the Associate-level Exam Logic Tool for more details.

CCNA Routing and Switching....

Declare your proven ability to install, monitor, and troubleshoot networks by earning Cisco Certified Network Associate (CCNA) Routing and Switching certification. With a focus on network infrastructure, CCNA Routing and Switching also covers wireless access, security, and connectivity to branch offices using WAN. It confirms your ability to work with IP, EIGRP, Serial Line Interface Protocol, Frame Relay, VLANs, OSPF, Ethernet, and access control lists. It also validates your ability to manage Cisco devices with IOS v15, handle Cisco licensing, and perform extensive troubleshooting.
Our CCNA Routing and Switching training includes enhanced content that exceeds standard authorized Cisco content, expanded lab equipment, and an unrivaled guarantee for CCNA certification success.
You may achieve CCNA Routing and Switching certification by passing both Exam 100-101 ICND1 and Exam 200-101 INCD2, or you may opt for the composite Exam 200-120 CCNA.


The following courses help you prepare for this certification.

Standard CCNA Training Path:

ICND1 v2.0 - Interconnecting Cisco Networking Devices, Part 1
ICND2 v2.0 - Interconnecting Cisco Network Devices, Part 2

Accelerated Option:
CCNAX v2.0 - CCNA Routing and Switching Boot Camp

 

Take a Faster Path to Specialization...

To ensure a simplified point of entry for specialized skills paths, students may now move directly from ICND1 into the skills path aligned to their job focus. Previously, candidates would have taken ICND1 and ICND2 before being eligible for certification. This change to the certification path reduces the required training and exams for Associate-level technology concentration certifications by a third.


 

The Evolution Of Programming....

No matter how fast or modern computer hardware becomes, it is nothing more than a trivial exercise in manufacturing without software. Software is the vital link that allows humans to interact with their computer hardware. Programmers are the people who write this software.
When computers first began to appear, programming was done primarily through punch cards and formulas. There was no concept of an application. Output was printed onto paper. Computers were fairly limited and programming was a black art that few had any mastery of.

Fortunately, computers and programming advanced quickly. Punch cards fell out of use and computer programming languages began to develop into human-readable forms. Instead of simply inputting a string of numbers, now languages had keywords and commands that made it easier to visualize the program structure, debug it, and maintain it.

The concept of applications came into existence. These are programs that are run by a user and allow for progressive input instead of just accepting a block of data and returning a result. Word processors began to gain general acceptance as well as spreadsheet programs. They soon became integral parts of an office environment.

The computer world flew headlong into the future. Easy to use operating systems emerged. These systems allowed programmers to have a solid and consistent base on which to build and distribute their software. More programming languages were created, some of them very high level allowing programmers to focus on the programming dynamics themselves and not on trivial issues such as hardware access ports or basic disk input and output functions.

This improved the quality of the software that was developed. It also allowed a wider base of people to begin programming since the days of arcane machine languages were gone. Today, there are a wide variety of programming languages to choose from. Programming has become so accessible, and in some cases so easy to learn, that software is frequently released by hobbyists for free.

The demand for new and easier to use software has become never ending. Because of this the number of programmers has risen in the last decade and will continue to grow to meet the needs of computer users around the world.

Dll Files.How To Unload Cached Dll Files To Free Memory......

Windows Explorer caches DLLs (Dynamic-Link Libraries) in memory for a period of time after the application an using them has been closed. Which in some cases can be an waste of memory. To stop WinXP from always caching these DLL files, create the new registry key below.

Open up the Registry and navigate to :

HKEY_LOCAL_MACHINE\ SOFTWARE\ Microsoft\ Windows\ CurrentVersion\ Explorer

Create a new sub-key named 'AlwaysUnloadDLL' and set the default value to equal '1' to disable Windows caching the DLL in memory.

being tired of spam ? Click to see How To Stop Spam ?

How To Stop Spam

Change Mcft to microsoft

HOW TO STOP SPAM VIA WINDOWS MESSENGER SERVICE
Below you'll find many ways (sorted in the most successful ratio first) to stop the Windows Messenger service, depending on your system environment, some may require more than one process. This service is available only on NT, 2K, XP & Server 2003. Administrator Login is REQUIRED

About The Messenger Service


* Messenger is a Windows Service that runs in the background
* Messenger is not the same as MSN Messenger or any other Instant Messaging Program
* Messenger does not facilitate two-way chatting
* Many Windows Programs, Firewalls, UPS and Antiviruses require the Messenger Service
* Antivirus and UPS software, among others, may not work if Messenger is disabled
* The Messenger Service is usually turned on by default in most Windows NT, 2K and XP systems


1. Manually

1. Example 1

1. Click Start, Run and enter the following command:
RunDll32 advpack.dll,LaunchINFSection %windir%\inf\msmsgs.inf,BLC.Remove
NOTE: This will prevent a long delay when opening Outlook Express if you have the Contacts pane enabled
2. To prevent this, click Start, Run and enter {REGEDIT} Go to:
HKEY_LOCAL_MACHINE\Software\Mcft\Outlook Express
3. Right click in the right pane and select New, Dword value
4. Give it the name Hide Messenger Double click this new entry and set the value to 2
5. End result should look EXACTLY like this:
System Key: [HKEY_LOCAL_MACHINE\SOFTWARE\Mcft\Outlook Express]
Value Name: Hide Messenger
Data Type: REG_DWORD (DWORD Value)
Value Data: (2 = remove messenger)

2. Example 2

1. Copy and paste the following to Run Command Bar in the Start Menu:
RunDll32.exe advpack.dll,LaunchINFSection
%windir%\inf\msmsgs.inf,BLC.Remove

3. Example 3

1. If Example 5 didn't work, then try this - Many users miss or don't know of it
2. Click on Start then go to RUN and type:
C:\WINDOWS\inf\sysoc.inf
3. Change:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,hide,7
4. To:
msmsgs=msgrocm.dll,OcEntry,msmsgs.inf,7
5. Then use Add/Remove Windows Components to remove Messenger
NOTE: You can also prevent access to Windows Messenger using Group Policy or the Set Program Access and Defaults utility added by default in Windows XP SP1 and Windows 2000 SP3

4. Example 4

1. Open Windows Messenger
2. From the menu, select "Tools" then "Options" then "Preferences" tab
3. Uncheck "Run this program when Windows starts"
4. Open Outlook Express
5. From the menu, select "Tools" then "Options" then "General" tab
6. Uncheck the option to "Automatically log on", if it's there
7. Also in Outlook Express, select "View" then "Layout"
8. Uncheck the option to "display Contacts" - The program will open a connection and display a list of all Contacts on line if you do not
9. In "Startup Folder" make sure there is no entry there for Messenger
10. Open Norton Anti-Virus if you have it installed
11. Click "Options" then "Instant Messenger"
12. Unckeck "Windows Messenger (recommended"
NOTE: This list ought to work in disassociate MSN from Outlook Express, so that it'll only start up if you really want it to

5. Example 5

1. 2000

* Click Start-> Settings-> Control Panel-> Administrative Tools->Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

2. XP Home

* Click Start->Settings ->Control Panel
* Click Performance and Maintenance
* Click Administrative Tools
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties
* Click the STOP button
* Select Disable in the Startup Type scroll bar
* Click OK

3. XP Professional

* Click Start->Settings ->Control Panel
* Click Administrative Tools
* Click Services
* Double click Services
* Scroll down and highlight "Messenger"
* Right-click the highlighted line and choose Properties.
* Click the STOP button.
* Select Disable in the Startup Type scroll bar
* Click OK

4. Windows NT

* Click Start ->Control Panel
* Double Click Administrative Tools
* Select Services-> Double-click on Messenger
* In the Messenger Properties window, select Stop
* Then choose Disable as the Startup Type
* Click OK
NOTE: If you stop the service and don’t adjust the startup type, the Messenger service will start automatically the next time you reboot. Keep in mind that when you disable the Messenger service, you'll no longer receive messages about an attached UPS, and you won’t be notified of print job completion, performance alerts, or antivirus activity (from Windows) not the program you're using for those purposes.

6. Example 6

1. To disable receipt of messenger pop-ups, verify that your firewall disables inbound traffic on UDP ports 135, 137, and 138, and TCP ports 135 and 139. On a system connected directly to the Internet, you should also disable inbound traffic on TCP port 445. If the system you want to protect is part of a Win2K-based network with Active Directory (AD), don't block incoming traffic on port 445 - Mcft Knowledge Base Article - 330904
Code:
http://support.Mcft.com/default.aspx?scid=kb;en-us;330904

NOTE: You can use the firewall approach only if your system doesn't communicate with legacy systems that rely on NetBIOS name resolution to locate machines and shared resources. If, for example, you let users running Windows 9x share your printer or scanner, when you disable inbound NetBIOS traffic, users won't be able to connect to these shared resources. Regardless of the method you choose, you can stop messenger spam

2. Program

Securing Yourself From A World Of Hackers


Top 10 Most Deadly Computer Virus In The World....

A computer virus can cause a lot of destructive damage. VIRUS is an acronym which stands for Vital Information Resources Under Siege. Viruses are sometimes confused with worms and Trojan horses, which are technically different. You just imagine how big organizations, governments, schools,businesses and IT sector were affected when certain viruses attacked their systems.
Computer Virus creates lots of problem in an organization which would result in millions, even billions of dollars in damages and losses. Though not all of these malicious computer programs are massively destructive, there are still some that have caused a lot of damage.


1. Bagle
Bagle was detected in 2004, it infected users through an email attachment, and also used email to spread itself. Bagle did not rely on the MS Outlook contact list to make a list of where to send itself. It harvested email addresses from various document files stored in the infected computer – from plain-text files to MS Excel files. The danger of this virus was that its design opened a backdoor where a remote user could gain access and control of the infected computer. It could download additional components to either spy and steal information from the user or launch DDoS attacks to certain networks and computers

2. Melissa.

Melissa virus was made in 1999 by David L. Smith, created with Basic program, exactly with Microsoft Word macros. The Melissa virus was mass-mailing malware that was said to have infected up to 20 percent of computers worldwide. This virus spreads via email with the document “Here is That document you asked for, do not show it to anybodey else”. When this file will be opened or clicked it will automatically run the virus replication and automatically send a pass up to the top 50 in the address book of an email. Email servers around the world were forced to shut down in order to prevent the virus from spreading, as well as to remove the virus from their system.Smith was jailed 20 months and fined $ 5,000 and prohibited from accessing the computer without supervision.

3. Sasser
Creator by 17 year old German student, Sven Jaschan in 2004. Sasser attack Microsoft Windows. Sasser does not spread via email. The virus is usually spread through the network. It infected computers by exploiting vulnerability present in both Windows 2000 and Windows XP machines, known as the RPC (Remote Procedure Call) exploit. This will create a computer virus could not be shutdown without unplug the power. Jaschan Finally caught but he’s not jail, was only given probation 1 year 9 months, because at that time still under the age of 18.

4. ILOVEYOU a.k.a. Lovebug/Loveletter Virus
This virus started spreading in the Philippines, these virus classified as worm, which has the ability to do her own replication. Creator Onel de Guzman was from the Philippines. ILOVEYOU spread via email, with the title “love letters” from a secret admirer. Once opened, it loaded itself to the memory, infecting executable files. When a user received and opened the email containing the attachment “LOVE-LETTER-FOR-YOU.txt.vbs”, the computer became automatically infected. It then spread itself by infecting *.exe,*.jpg,*.mp3 files. After that, the virus sent itself to others by looking up the addresses contained in the MS Outlook contact list. The virus was written by a Filipino programmer who was still a college student at that time. He said the release of the virus was only “accidental.” This virus spread throughout the world in just a day, infecting computers of large corporations and governments, including the Pentagon in the United States. It caused billions of dollars in damages. The actual “damage” occurred during the removal of the infection from computers, as email servers and computer networks had to beshut down before the virus could be removed.His original file LOVE-LETTER-FOR-YOU.TXT. vbs.

5. MyDome
MyDome virus was detected in 2004. This virus is making a backdoor on the OS. Computer was first known attack on first February by doing DDoS. Then reported back to attack on the 12th of Feb, after that the virus stopped spreading and start creating backdoors. MyDoom spreads via email. MyDoom slowed down global Internet access by ten percent, and caused some website access to be reduced by 50%.

6. Leap-A/Oompa- A
Mac that has a concept of security through obscurity, Mac believe thea system can’t be infected by a virus of cause of the OS system is a closed. But in the year 2006, Leap-A virus or commonly known asOompa-A appears and spreads via iChat on the Mac. Having a Mac attack, the virus will search for contacts via iChat and send messages to each contact. The message will contain a form of corrupt JPEG file. It’s not dangerous, but this proved that the Mac OS systems are not immune to the virus.


7. SQL Slammer
Appeared in January in the year 2003, spread quickly via the Internet . It caused a considerable amount of damage, though, by overwhelming routers, causing them to shut down. The target of this virus was web servers running a vulnerable version of Microsoft SQL Server. Upon infection of a server, the virusgenerated random IP addresses through which it attempted to further infect other computers.This virus has also been a U.S. Bank ATMs crash, the collapse of Seattle’s 911 service, and Continental Airlines.


8. Nimda
Reported attacks in 2001, call Nimda taken from opposite the word “Admin”. With its multi-pronged attack, Nimda appears to be the most troublesome virus of its type that has yet appeared. Its name (backwards for “admin”) apparently refers to an “admin.DLL” file that, when run, continues to propagate the virus.These viruses spread very quickly, according to TruSecure CTO Peter Tippett, Nimda only takes 22 minutes to make the Top Ten Virus at the time. The main target of this virus is Internet servers, Nimda spread through Internet network by creating a backdoor into the OS.

9. Code Red
The world had not yet recovered from the damage caused by the ILOVEYOU virus when Code Red was released in simmer 2001.Code red virus attacks only Windows 2000 & NT OS. This virus will create a buffer becomes full so make the memory becomes full. Once a computer was compromised by the virus, it would modify the handled website, displaying the message “Welcome to http://www.worm.com! Hacked by Chinese!” Then, it would later seek other computers running the web server software and do the same thing. After about two weeks of infection, the virus was programmed to launch DDoS (Distributed Denial of Service) attacks on certain websites, including the server of the White House.
10. The Klez
This virus was first known infected on 2001, this virus spreads via email by conducting continuous replication, and sent to all email addresses in the victim’s address book. This virus makes the victim computer becomes very slow and can also turn off the antivirus application.

This Man Has Hacked A Thousand Banks And Never Been Arrested



Jim Stickley is an identity thief. He's hacked more than 1,000 banks and has never been caught in the act.
We're all safer because of him.
Stickley is what's known as a "penetration tester"—a gun for hire in the computer-security world.
His life is like something from "Sneakers," the classic 1992 hacker movie starring Robert Redford.
Banks, governments, and businesses hire Stickley to test their security measures.
To rob a bank, he disguises himself as a workman, he told Business Insider. Bank employees think he's legit and escort him right into their offices and vault areas. Once in, he plants keyloggers and wireless dongles and steal credit-card numbers, ATM IDs, bank account and Social Security numbers, and other personal data.
A favorite costume is to dress like a fireman.
"I've gone online and ordered fire [department] badges," he says. "I've got badges for every state. No one reads the badge."
He wears authentic uniforms bought from any uniform store. To complete the costume, he puts a fireman's walkie-talkie radio on his belt and has one of his employees sit outside with another radio. The employee pipes chatter from a police scanner over the radio.


Then he can crawl around people's cubicles and install keyloggers, which are small flash-memory devices that record every keystroke. 
"We also try to get into the network, [through] an office cube where they've got open ports," he said. "We plug in a wireless device and then we can sit out in the parking lot, hack away at environment."
He'll dress in other uniforms, too. Pest-control is another good one, he says.
What he does isn't illegal. Before robbing any bank, he gets the necessary legal permissions. But the people at the bank, and the cops responding, don't know what he's up to. They ought to be able to spot and stop him.
And the scary thing is that they never do.
jim stickley pest
Jim Stickley dressed as a pest control guy
In the 20 years he's been doing this work, he's never been caught. He came close once, when a cleaning crew grew suspicious and called the cops on him. He was banging on the door showing
a fake employee badge, trying to get them to let him in.
"People have this idea that hackers only hack only through technology, but that's not the case," Stickley told us. "Criminals steal however its easier to steal."
In other words, they'll dress up as firemen and walk into banks.
Over the years, he's made a lot of banks safer.
For the average Joe he offers this advice:
Go ahead and use online banking. It's just as safe (or unsafe) as ATMs or branch banking. But don't let your kids use the same computer where you do your banking: "Kids will download and  install anything."
Installing apps from the Internet is how crooks get you to put secret viruses on your PCs.


Read more: http://www.businessinsider.com/jim-stickley-bank-hacker-penetration-tester-2013-4#ixzz2ZCRhVvdG

غیر اخلاقی، غیر اسلامی اور فحش مواد سے پاک سرچ انجن ’’حلال گوگلنگ‘‘ متعارف

انٹرنیٹ پر غیراخلاقی، غیر اسلامی اور فحش مواد سے پاک سرچ انجن ’’حلال گوگلنگ‘‘ متعارف کرایا گیا ہے۔
حلال گوگلنگ نامی سرچ انجن سرچنگ کے نتائج تو ”گوگل“ اور ”بنگ“ جیسے مشہور سرچ انجنوں سے ہی حاصل کرتا ہے لیکن یہ ایسے خود کار تطہیری نظام کے تحت کام کرتا ہے جو غیراسلامی، غیر اخلاقی اور فحش مواد کو صارف کی اسکرین تک نہیں پہنچنے دیتا۔
رپورٹ میں مزید کہا گیا ہے کہ حلال گوگلنگ میں صارفین کو یہ سہولت بھی فراہم کی گئی ہے کہ اگر سرچنگ کے دوران ان کی اسکرین پر کوئی ایسا مواد نظر آتا ہے جو کہ حرام یا غیر اسلامی ہے تو وہ ہلال گوگلنگ کو ای میل کے ذریعے اسے ہٹانے کی درخواست بھی کر سکتے ہیں۔
واضح رہے کہ دنیا بھر میں استعمال ہونے والے تمام سرچ انجنوں سے ہر قسم کا مواد صارفین کی پہنچ میں ہوتا ہے جس کی وجہ سے دنیا میں بسنے والے ڈیرھ ارب مسلمان اپنے بچوں کو غیراخلاقی مواد سے بچانے کے لیے متبادل نظام کی ضرورت محسوس کر رہے تھے۔ حلال گوگلنگ کی ٹیم کے مطابق اس سرچ انجن کی یہ خوبی ہے کہ یہ دیگر سرچ انجنوں سے کسی بھی متعلقہ موضوع سے متعلق فلٹر کرکے مواد صارف کو فراہم کرتا ہے۔



 

اسمارٹ فون کھونےکے خیال سے برطانیہ کی اکثریت خوفزدہ

لندن : اسمارٹ فون یا دیگر جدید ڈیوائسز سے جدائی اب برطانوی عوام کو کسی صورت برداشت نہیں اور وہ ایسا ہونے کی صورت میں ذہنی تناؤ اور کنٹرول سے باہر ہوجاتے ہیں۔
یہ بات ایک نئی سروے نما تحقیق میں سامنے آئی ہے۔
تحقیق کے مطابق 51 فیصد برطانوی افراد اپنےاسمارٹ فونز، ٹیبلیٹس یا دیگر ڈیوائسز سے الگ

آئی ایم ملالہ گانے کی وڈیو جاری

آئی ایم ملالہ گانے کی وڈیو جاری

نیویارک:  اقوا م متحدہ کی جانب سے یوم  ملا لہ منائے جانے کے مو قع پر خراج تحسین پیش کر نے کے لیے آئی ایم ملالہ کے بولوں پر مشتمل گانے کی وڈیو جاری کر دی گئی ہے۔
 گریمی ایوارڈ وننگ ڈا ئریکٹر کی تیار کردہ اس وڈیو میں 3 ابھرتی ہوئی نوجوان گلوکاراؤں کے علا وہ دنیا بھر سے 30 گلوکاراؤں کی آوازیں شامل ہیں جو اس گا نے کے ذریعے ملالہ کو سلام پیش کر رہی ہیں۔
اس گانے کے فروخت سے پیش ہونے والی آمدنی ملالہ یوسف زئی کے قائم کیے گئے خو دمختار فلاحی ادارے ملالہ فنڈ میں دی جائے جو دنیا بھر میں تعلیم کے فرو غ کے لیے کا م کر رہا ہے۔
یادرہے کہ 12جولائی کو یوم ملالہ منایاگیا۔

آئی ایم ملالہ گانے کی وڈیو جاری

آئی ایم ملالہ گانے کی وڈیو جاری

نیویارک:  اقوا م متحدہ کی جانب سے یوم  ملا لہ منائے جانے کے مو قع پر خراج تحسین پیش کر نے کے لیے آئی ایم ملالہ کے بولوں پر مشتمل گانے کی وڈیو جاری کر دی گئی ہے۔
 گریمی ایوارڈ وننگ ڈا ئریکٹر کی تیار کردہ اس وڈیو میں 3 ابھرتی ہوئی نوجوان گلوکاراؤں کے علا وہ دنیا بھر سے 30 گلوکاراؤں کی آوازیں شامل ہیں جو اس گا نے کے ذریعے ملالہ کو سلام پیش کر رہی ہیں۔
اس گانے کے فروخت سے پیش ہونے والی آمدنی ملالہ یوسف زئی کے قائم کیے گئے خو دمختار فلاحی ادارے ملالہ فنڈ میں دی جائے جو دنیا بھر میں تعلیم کے فرو غ کے لیے کا م کر رہا ہے۔
یادرہے کہ 12جولائی کو یوم ملالہ منایاگیا۔