adbrite

Star cricket live streaming

Watch live world cup matches live and exclusive here just click on the above banner.

Under this section all posts are related to hacking

You will find the posts related to hacking here the posts are nice and can be very useful to you.

The post under title Gadgets

Get to know about new and interesting gadgets.

This is default featured post under the category Computer

Computer related posts under this topic.

Friday, December 31, 2010

Zapak DartMania Hacking

Though i have created Many tutorials regarding hacking this is my first My tutorial which i post in the public in internet…
This Tutorial is about hacking a Multiplayer Game Named “Dart Mania” In the Website www.zapak.com
For this u need cheat engine which can be downloaded here
The full tutorial how to hack that game can be seen in the following video..
As an author i request you guys not to hack the guys with less number of chips.. :)

 Monetize your Website or Blog with BidVertiser

Wednesday, December 29, 2010

2010: The Year Facebook Dethroned Google as King of the Web

Facebook was not only the most searched item of the year, but it passed Google as America’s most-visited website in 2010, according to a new report from Experian Hitwise.
For the second year in a row, “facebook” was the top search term among U.S. InternetInternet users. The search term accounted for 2.11% of all searches, according to Hitwise. Even more impressive is the fact that three other variations of FacebookFacebook made it into the top ten: “facebook login” at #2, “facebook.com” at #6 and “www.facebook.com” at #9. Combined, they accounted for 3.48% of all searches, a 207% increase from Facebook’s position last year.
Rounding out the list of top search terms were YouTube,Craigslist, MySpace, eBay, Yahoo and Mapquest. Other companies that made big moves in terms of searches include Hulu, Netflix, Verizon, and ESPN. The search term “games” also made its first appearance in the list of Hitwise’s top 50 search terms.
More interesting though is Facebook’s ascension to #1 on Hitwise’s list of most-visited websites. The social network accounted for 8.93% of all U.S. visits in 2010 (January-November), beating Google (7.19%), Yahoo Mail (3.52%), Yahoo (3.30%) and YouTube (2.65%). However, Facebook didn’t beat the traffic garnered by all of Google’s properties combined (9.85%).
It’s only a matter of time until Facebook topples the entire Google empire, though. We’ve seen the trend develop for month: Facebook is getting bigger than Google. According to comScore, Facebook’s U.S. traffic grew by 55% in the last year and has shown no sign of slowing down.

  Monetize your Website or Blog with BidVertiser

Monday, December 27, 2010

Generate Backlinks With Us


Copy and paste the below link in you website and submit your website link to us we will show your website on our page after reviewing. More the backlinks the bettre you rank in our site. Because we believe "Sharing is Gaining"





Create your own banner at mybannermaker.com!
Copy this code to your website to display this banner!

                                      



Monetize your Website or Blog with BidVertiser

Best Free Web Hosting Services

This summary is not available. Please click here to view the post.

Sunday, December 26, 2010

HOW TO: Land a Job at Microsoft


Everyone has a dream job. Whether it’s a company you’ve been pining to be a part of or a new product you’re dying to throw your creativity into, there’s always a line of work that seems like the perfect fit.
Though recognizing your ideal position is easy, actually getting the job is the hard part. For those looking to start a career at tech giantMicrosoft, the sheer size of the company makes the hunt seem even more overwhelming. Resumes can get lost in a sea of applications, and finding the right contact to reach out to can be like searching for a needle in a haystack.
But that doesn’t mean you should give up on your dream of working at one of the most successful and dynamic corporations in the world. Here are some tips and resources from the company’s recruiters and employees for landing a job at Microsoft.

Getting Started


With so many locations and products, the first step in starting your Microsoft job search should be deciding where you want to work and what you want to create. Visiting the Microsoft Careers website can help answer these questions. There you can look for a specific position in the navigation bar or choose a country from the drop-down menu. On the Find Your Fit page, details on the company’s various professions and technologies are laid out to help you explore opportunities.
Once you apply by uploading your resume to a specific job posting on the site, it’s up for review. So how do you get that resume noticed?

Standing Out


Many recruiters use keyword searches to pull up resumes — but that doesn’t mean every other word needs to be “motivated” or “team player.” Be sure to list the names of certain technologies and programming languages you’ve used in each project you include. This will allow a recruiter to see what you know and how well you know it.
When putting together your resume, think about how you affected your environments and less about the basic facts of what you did. “Often, applicants write their resumes like a list of job tasks, but it’s even more important to call out your major achievements and the difference you made: what you did, how you did it, and why it mattered,” said Gretchen Ledgard, communications manager for Microsoft Recruiting.

Doing Your Homework


Microsoft is known for its difficult interview process and obscure questions. The best way to nail it? “Do your homework on us,” Ledgard said. Candidates who come in with knowledge about the role, team and location tend to already have an idea of how to frame their answers and are ready to ask solid questions.
Thom Mitchell, a Microsoft account technology strategist who was hired earlier this year, couldn’t agree more. He researched each person who was interviewing him and read up on the products he would be responsible for in the role and the competition for those products. He even prepared a short PowerPoint presentation about Microsoft products in case he was asked to present something on the fly (he wasn’t). When Mitchell asked questions, they were substantive and role-related — not “How are the health care benefits?” or “Is there a gym reimbursement?” More importantly, when he didn’t know an answer to a question he was asked, Mitchell simply said so and didn’t try to talk around the issue or come up with a fake answer.

Following Up


If you have questions after submitting your resume, many Microsoft recruiters are open to being contacted via social media, Ledgard said. Microsoft Careers is also open to connecting through social networks and has resources for potential job candidates on its advice hub JobsBlog.
But how do you strike a balance between keeping your name on the radar and being a nuisance? For Mitchell, the key was checking in as needed. He followed up with the recruiter after each screening interview and sent brief thank you notes to the hiring manager he interviewed with in person — but not to each person who interviewed him. Mitchell said his recruiter let him know what would happen every step of the way, so there wasn’t a need to over communicate.

Finding a Fit


There’s a big focus on not only job fit, but also company fit at Microsoft. Recruiters look for people who go above and beyond in everything they do, whether that’s taking the most difficult computer science courses or working on extracurricular projects, Ledgard said.
Still, there’s no fool-proof formula for landing a job at Microsoft. Even though the position you’re applying for might feel like the perfect match, sometimes it’s just not. Microsoft’s recruiters and hiring managers are the experts on what type of person will be a good fit for both the job and the company culture. The best advice? Relax. If it’s meant to be, it will.
Have you scored a job at Microsoft or are you trying to? What has your experience been like? Tell us in the comments below.

Monetize your Website or Blog with BidVertiser

Saturday, December 25, 2010

How To Hack Facebook Chat Application

In this post I will tell you how your can hack facebook chat application to run it from any windows, Using this hack you will be able to chat with your freinds on other browser pages, So here is the step by step guide to hack facebook chat application.
 Note:This trick to hack facebook chat application works for firefox browser only 

1.First of all log into your Facebook account

2.Next visit the following link:
http://www.facebook.com/presence/popout.php 




3.Next press control D and bookmark the Page



4.Next click on the bookmark option at the top beside history button and right click Facebook chat at the bottom and Check load this bookmark in the sidebar and click on ok.



Now you can load Facebook chat application from any browser



Monetize your Website or Blog with BidVertiser

Thursday, December 23, 2010

The 17 Most Dangerous Places on the Web


Monetize your Website or Blog with BidVertiser


Threat 1 >> Malicious Flash files that can infect your PC

The Place: Websites that use Flash
Adobe's Flash graphics software has become a big malware target in recent years, forcing the company to push out frequent security patches. But another danger you might not know about is associated with Flash cookies. Flash cookies are small bits of data that their creators can use to save Flash-related settings, among other things. But like regular cookies, Flash cookies can track the sites you visit, too. Worse still, when you delete your browser's cookies, Flash cookies get left behind.
If You Have to Go There: To help protect against Flash-based attacks, make sure you keep yourFlash browser plug-ins up-to-date. And you can configure the Flash plug-in to ask you before it downloads any Flash cookies.

Threat 2 >> Shortened links that lead you to potentially harmful places

The Place: Twitter
Scammers love Twitter since it relies so much on URL shorteners, services that take long Internet addresses and re­­place them with something briefer.
And it's very simple to hide malware or scams behind shortened URLs. A shortened link that supposedly points to the latest Internet trend-du-jour may be a Trojan horse in disguise.
If You Have to Go There: Simply don't click links. Of course, that takes some of the fun out of Twitter. The other option is to use a Twitter client app. TweetDeck and Tweetie for Mac have preview features that let you see the full URL before you go to the site in question.
Some link-shortening services, such as Bit.ly, attempt to filter out malicious links, but it seems to be a manual process, not an automatic one. TinyURL has a preview service you can turn on.

Threat 3 >> E-mail scams or attachments that get you to install malware or give up personal info

The Place: Your e-mail inbox
Although phishing and infected e-mail attachments are nothing new, the lures that cybercrooks use are constantly evolving, and in some cases they're becoming more difficult to distinguish from legitimate messages. My junk mailbox has a phishing e-mail that looks like a legitimate order confirmation from Amazon. The only hint that something's amiss is the sender's e-mail address.
If You Have to Go There: Don't trust anything in your inbox. Instead of clicking on links in a retailer's e-mail, go directly to the retailer's site.

Threat 4 >> Malware hiding in video, music, or software downloads

The Place: Torrent sites
Torrent sites (such as BitTorrent) are often used for sharing pirated music, videos, or software, and are a trove of malware. No one vets the download files--they may be malware in disguise.
Ben Edelman, privacy researcher and assistant professor at Harvard Business School, thinks torrent sites are the most dangerous places to visit, since they don't have a business model or reputation to defend (by comparison, many porn sites rely on being deemed trustworthy). "The [torrent] customers, they really don't want to pay," he says.
If You Have to Go There: It's probably best to avoid torrent sites entirely, given their untrustworthy content, but if you must visit, use a secondary PC to protect your main system. Use antivirus software, and keep it up­­dated. Scan downloaded files and wait a couple of days be­­fore opening them. Brand-new malware can be tricky to catch, but the delay in opening may allow your antivirus software to get the necessary signatures.

Threat 5 >> Malware in photos or videos of scantily clad women

The Place: ‘Legitimate' porn sites
Porn sites have a reputation of being less secure than mainstream sites, but that assumption doesn't tell the whole story. "There is no doubt that visiting Websites of ill-repute is deadly dangerous. If you make a habit of it, it's a given that you'll be attacked at some point," says Roger Thompson, chief research officer with security firm AVG. "Unfortunately, staying away from those sites won't keep you safe by itself, because innocent sites get hacked all the time, and are used as lures to draw victims to the attack servers."
And as mentioned earlier, many porn sites operate as actual, legitimate businesses that want to attract and retain customers. That said, it may be hard to tell the "legit" porn sites from malware-hosting sites that use porn as a lure.
If You Have to Go There: Be suspicious of video downloads, or sites that require you to install video codecs to view videos (see the next threat, below). Using tools like AVG's LinkScanner and McAfee'sSiteAdvisor (or SiteAdvisor for Firefox) can help you weed out the malicious sites.
And, again, consider visiting such sites on a secondary machine. You don't want your browser history on the family PC.

Threat 6 >> Trojan horses disguised as video codecs, infecting your PC with malware

The Place: Video download sites, peer-to-peer networks
If you watch or download video online, you've likely been told to download a video codec--a small piece of software that provides support for a type of video file--at least once. Usually, these bits of software are perfectly legitimate (for example, the popular DivX codec), but some less-than-reputable download services or video sites may direct you to download a piece of malware disguised as a codec. Security software company Trend Micro provides a good example of what these attacks look like.
If You Have to Go There: Your safest option is to stick with well-known video sites such as YouTube and Vimeo. And for catching up on the latest episodes of your favorite TV shows, sites and services like Hulu, TV.com, ABC.com, and iTunes are safer than peer-to-peer networks.

Threat 7 >> Geolocation--your smartphone and perhaps other parties know where you are

The Place: Your smartphone
The smartphone market is still in its infancy, really, and so are the threats. One possible concern is the use--or abuse--of geolocation. Although plenty of legitimate uses for location data exist, the potential for inappropriate uses also exists. In one case, a game listed on the Android Market was in reality a client for a spy app. In a less invidious example, a site called pleaserobme.com showed that--for a time--a stream of FourSquare check-ins indicated that a person was away from their home (the site's goal, mind you, wasn't to condone theft, but to raise awareness of the issue).
Click to zoom.As in this example showing restaurants in a San Francisco neighborhood, some smartphone apps, such as Yelp for iPhone, use your physical location to provide you with information on nearby businesses or points of interest.Apple recently updated its privacy policy to reflect changes in how it handles location data in iOS 4. The policy now states that "to provide location-based services on Apple products, Apple and our partners and licensees may collect, use and share precise location data." You canread more on Apple's new privacy terms and what they mean for you.
If You Have to Go There: Be particular about the location-based sites, apps, and services that you use. As shown in the screenshot at right services such as Yelp provide good examples of useful location-aware apps. On the other hand, weigh the privacy implications of services like FourSquare or the new Facebook Places feature, and consider how much you feel comfortable divulging. (Read more on how to retain privacy on FourSquare and Facebook Places.)

Threat 8 >> 'Poisoned' search engine results that go to malware-carrying Websites

The Place: Search engines
Search engine poisoning is the practice of building tainted sites or pages that are designed to rank high in a search on a given topic. For example, according to a recent study by the security firm McAfee, 19 percent of search results for "Cameron Diaz and screensavers" had some sort of malicious payload. Breaking news topics and Facebook are also common search targets for attackers.
If You Have to Go There: Pick and choose which sites to go to. Don't just blindly click search results; check each URL first to make sure that it really leads to the site you want. Although any site can be hacked, visiting the Washington Post's story on a hot news topic, for example, is probably a wiser choice than following a link to a site you've never heard of before.

Threat 9 >> Malicious PDFs that try to fool you into installing malware

The Place: Hacked Websites, plus your inbox
As Microsoft has become more serious about Windows security over the past few years, would-be attackers have had to find new ways to infect PCs. Attacking flaws in Adobe Acrobat is one of these newer methods. So-called poisoned PDFs are PDF files that have been crafted in such a manner that they trigger bugs in Adobe Reader and Adobe Acrobat; posted on a hijacked Website, they may let an attacker commandeer your PC and access your files and personal info.
Click to zoom.Feeling particularly paranoid? Uncheck 'Allow opening of non-PDF file attachments with external applications' (near the top) to head off certain PDF exploits.A newer variant takes an otherwise innocent-looking PDF document and inserts malware into it. Adobe Reader may pop up an alert asking if you want to run the malware, but hackers can edit those messages to trick you into opening the file.
How serious is this problem? In 2009, attacks using malicious PDFs made up 49 percent of Web-based attacks, according to security firm Symantec.
If You Have to Go There: First, always make sure that you're running the latest version of Adobe Reader.
You can also use a different PDF reader, such as Foxit Reader. This can protect you from attacks on holes in Adobe Reader itself, but it won't make you immune to all PDF attacks, such as the newer ones that embed malware inside the PDFs. Make sure, also, that you update to Adobe Reader 9.3.3 or later (Reader 8 users should update to version 8.3.3 or later); these updates change the way Adobe Reader handles non-PDF attachments and reduce the risk from such attacks.
You can turn off Adobe Reader's ability to open non-PDF attachments by going to Preferences, clickingTrust Manager, and unchecking Allow opening of non-PDF file attachments with external applications.
The next major release of Acrobat and Reader will provide a new "protected mode" against these attacks.

Threat 10 >> Malicious video files using flaws in player software to hijack PCs

The Place: Video download sites
Attackers have been known to exploit flaws in video players such as QuickTime Player and use them to attack PCs. The threats are often "malformed" video files that, like malicious PDFs, trigger bugs in the player software that let the attackers in to spy on you, plant other malware, and more.
If You Have to Go There: Keep your player software up-to-date. Apple and Microsoft periodically release patches for QuickTime and Windows Media Player, respectively. Avoid downloading videos at random. Stick to well-known video sites such as YouTube, or to download services like iTunes.

Threat 11 >> Drive-by downloads that install malware when you visit a site

The Place: Hacked legitimate sites
A drive-by download occurs when a file downloads and/or installs to your PC without you realizing it. Such downloads can happen just about anywhere. Some sites are built to lure people into a drive-by download; but in a common attack method, criminals will hack a Web page, often on an otherwise legitimate site, and insert code that will download malware to your computer.
If You Have to Go There: The first thing to do is to keep your security software up-to-date, and to run regular malware scans. Many security suites can flag suspicious downloads.

Threat 12 >> Fake antivirus software that extorts money--and your credit card information

The Place: Your inbox, hacked legitimate sites
Fake antivirus programs look and act like the real thing, complete with alert messages. It isn't until you realize that these alerts are often riddled with typos that you know you're in trouble.
Most fake antivirus software is best described as extortionware: The trial version will nag you until you purchase the fake antivirus software-which usually does nothing to protect your PC. Once you send the criminals your credit card information, they can reuse it for other purposes, such as buying a high-priced item under your name.
You can get infected with a fake antivirus app in any number of ways. For example, in drive-by downloads (see the previous item), a malicious payload downloads and installs without the user realizing it or having any time to react.
If You Have to Go There: If you get an alert saying you're infected with malware, but it didn't come from the antivirus software you knowingly installed, stop what you're doing. Try booting into Safe Mode and running a scan using your legitimate antivirus software.
However, such a scan may not clean up all of the malware-either the scanner doesn't have a signature for one fragment, or that piece doesn't act like traditional malware. This may render behavioral detection (which spots malware based on how it acts on your system) useless. If all else fails, you may need to call in a professional.

Threat 13 >> Fraudulent ads on sites that lead you to scams or malware 

The Place: Just about any ad-supported Website
Hey--ads aren't all bad! They help sites pay the bills. But cybercriminals have taken out ads on popular sites to lure in victims. Last year, the New York Times site ran an ad from scammers, and earlier this year some less-than-scrupulous companies were gaming Google's Sponsored Links ad programand placing ads that looked like links to major companies' Websites.
"The bad guys have become very clever at exploiting online advertising networks, tricking them into distributing ads that effectively load malicious content--especially nasty, scaremongering pop-ups for rogue antispyware," says Eric Howes, director of research services for security firm GFI Software.
If You Have to Go There: Most large sites, such as PCWorld.com, have ad sales departments that work frequently with a core group of large advertisers, so it's probably safe to click a Microsoft ad on the New York Times site. But as the Google Sponsored Links incident shows, nothing is entirely fail-safe.

Threat 14 >> Questionable Facebook apps

The Place: Facebook
Facebook apps have long been an issue for security experts. You don't always know who's developing the apps, what they're doing with the data they may be collecting, or the developers' data security practices. Even though you have to approve apps before they can appear on your profile and access your personal information, from there the security of your data is in the developer's hands.
Click to zoom.Take a few minutes to check your Facebook application settings to make sure that your app privacy settings are as you want them.If You Have to Go There: Be selective about the apps you add to your profile--don't take every quiz, for example. Check your privacy settings for Facebook apps, as well: Click the Ac­­count drop-down menu in the upper-right corner of Facebook's site, select Privacy Settings, and then click Edit your settings under ‘Applications and Websites'. There, you can control which apps have access to your data, and which of your friends can see what information from apps (such as quiz results); you can also turn off Facebook apps altogether.

Threat 15 >> Sites that lure you in, get you to sign up, then sell your e-mail address for spam

The Place: 'Free electronics' sites
You've no doubt seen sites around the Web blaring, Get a free iPad! Get a free notebook! A free iPod! It's easy! These sites aren't typically dangerous in the classical sense--you probably won't get infected with malware--but your personal information could be sold to other businesses, who can then use it to sell more stuff to you.
If You Have to Go There: Read the privacy policies. And then read them again. Also, beware of privacy policy loopholes--even though a site says that it won't sell your private data to third parties, depending on the language of the policy, they may still be able to give your information to "affiliates."

Threat 16 >> Phishing 2.0 on social networks that tricks you into downloading malware or giving your Facebook login information to a criminal

The Place: Social networks
Questionable Facebook apps and malicious shortened links aren't the only dangers lurking on social networks. Sites like Facebook have given rise to new forms of phishing. Scammers might hijack one person's Facebook account, then use it to lure that person's friend into clicking a malicious link, going to spam sites, or giving up their Facebook login information--thereby giving scammers one more Facebook account to hijack.
"One of the bigger dangers currently facing users is malware, adware, and spyware spread through social networks like Facebook and Twitter," says Eric Howes, director of malware research with Sunbelt Software. "Users may receive spam via these networks offering them free deals, links to interesting videos, or even widgets to enhance their Facebook profiles. In many cases what's really being pushed on users is adware, spyware, or even malicious software that can exploit users' PCs."
If You Have to Go There: Don't trust every link posted to Facebook, even if one of your friends posted it. Be especially suspicious if the post is out of the ordinary for that person. Check the person's wall or Twitter @-replies to see if anyone is concerned that the person's account has been compromised.
And if you suspect that your account has been hijacked, change your password immediately. Both Facebook and Twitter have resources to help you keep up-to-date on the latest threats on both sites. Facebook users should visit its security page; if you're on Twitter, be sure to follow @spam and @safety for Twitter security best practices.

Threat 17 >> Oversharing--exposing too much personal information on your social network profiles

The Place: Social networks
How many times have you seen friends on Facebook or Twitter publicly divulge a bit more information than is necessary? Oversharing isn't just a matter of getting a little too personal--it can leave your private information viewable to the general public. But it's avoidable.
"There is a subtle danger that few people understand with the social networking sites, and that is the idea of information leakage," says AVG's Roger Thompson. "People, particularly teens, put all sorts of information online, without realizing that many more people than just their friends can see that data."
Oversharing could very well lead to more serious privacy issues further down the road, Thompson adds. "As today's young teens reach an age to apply for a credit card, I fully expect an onslaught of fraudulent card applications on their behalf, because they un­­wittingly di­­vulged so much information. Harvesting is going on now, and we have no idea who is doing the harvesting."
If You Have to Go There: This particular threat is relatively easy to avoid, in that a little common sense can go a long way: Just be mindful of what you post. Do you really need to publish your home address and phone number to your Facebook profile?
Finally, be certain to check your privacy settings to make sure that you're not divulging your deepest, darkest secrets to all 500 million Facebook users.

clicksor

Related Posts Plugin for WordPress, Blogger...

Share

Twitter Delicious Facebook Digg Stumbleupon Favorites More