Read more: http://www.makingdifferent.com/how-to-add-infinite-post-scrolling-effect-to-blogger/#ixzz2VDcOCIJ2 Follow us: @nitinmaheta on Twitter | makingdifferent on Facebook

Template Information

Widget by :MIXGADGTES Soft

Thursday 18 July 2013

How to Make USB Pen drive Dos Bootable with Symantec Ghost

Ghost is a disk cloning program product sold by Symantec. Originally developed by Murray Haszard in 1995 for Binary Research, the technology was acquired in 1998 by Symantec. The name Ghost is an acronym for General Hardware-Oriented System Transfer

 

 


This tool will help u to create USB Pen drive Dos Bootable

with symnatec ghost

 

Download

Tuesday 2 July 2013

What Is Keylogger And How To Be Safe From Keyloggers?

In this tutorial i am going to talk about the most use piece of software besides from RAT by hackers to observe your activities on your computer and that is keyloggers. A keylogger is a software or hardware device which monitors each and every key typed by you on your keyboard. I am going to talk about different types of key-logger and how to be safe from key loggers. So lets learn something about key loggers.




______________________________________________
 1. What is keylogger ?
______________________________________________

You might have heard about keyloggers but really dont know what they are reading this article will clear your mind. A keylogger also know as keystroke logger is software or hardware device which monitors each and every key typed by you on your keyboard. You can not identify the presence of keylogger on your computer since it runs in background and also it is not listed in task manager or control panel. It can be used by parents to keep eye on their childrens or company owner to spy on their employes.


______________________________________________
2. How it can harm you ?

______________________________________________

In this section i will talk about how keylogger can harm you in different ways for example It can be used by your enemy or friend to get sensitive information such as your username and password, Bank credit card details, or any other activities you do on your computer.

    Example: You login in to your Facebook account from a computer in which keylogger is install then your username and password will be captured.






______________________________________________
3. Types of  keyloggers 

______________________________________________

There are two types of keylogger hardware keylogger and software keylogger. Software keylogger is install in your computer where as a Hardware keylogger is attached to your keyboard. Looking at below images will clear your mind.



    HARDWARE KEYLOGGER



                                 




SOFTWARE KEYLOGGER



                          


______________________________________________   

4. How to Protect yourself from keyloggers ?
  _____________________________________________


Keylogger  can be used by your enemy  to get sensitive information such as your Bank credit card details, or password of any social networking sites etc. In order to be safe keep following points in your mind.

    Never use your online banking from cyber cafe. If you want to use then you can try this method. open notepad and type anything Then copy and paste each word that comes in your username or password.
    You can even use above method to protect your Facebook profile, yahoo or gmail id.
    When you enter cyber cafe make sure that no hardware device is attached to keyboard wire. Its look something similar to above image.

Introduction To Basic Terminal Commands For Linux



In this tutorial you will learn to use Linux terminal. You will learn to navigate on the terminal, learn to create and remove file and much more. Most of this commands also works on Mac Os X and power shell on windows.



______________________________________________________
What Is Terminal ?
______________________________________________________

Basically you are reading this tutorial because you are new to linux or want to learn using terminal to navigate. Before you get started you must have linux installed or running virtually on your computer. I would recommend downloading fedora or ubuntu (If you have trouble installing ubuntu leave a comment below and i will post a tutorial).

 _____________________________________________________
Commands To Remember
______________________________________________________

This are some of commands you must remember which will help you to use terminal more easily.
ls - it will list all files and folder in your current directory
ls -l it will give detailt listing of all files and folders
ls -a it will list all files and folder in your current directory including hidden files (files and folders that begin with period)
pwd will print your working directory or simply your current directory


______________________________________________________
Navigating In Terminal
______________________________________________________

Here i may refer folder as directory so dont get confused. This is the term we use in linux for folders.

cd - cd stands for change directory. we use cd follow by path address to navigate ro that folder.
Eg: cd Desktop will make desktop as my current directory.
cd / will make root as you current directory
cd ~ will make home as your current directory
Typing cd alone is same as cd ~ and it will make home as your current directory
cd .. will make parent directory i.e directory above your current directory
cd ../../ will take you two folder up

______________________________________________________
Creating Files And Folder
______________________________________________________

mkdir - we use mkdir follow by path or folder name to create a directory
Eg mkdir car will create directory car in your current directory
to create folder recursively i.e folder inside folder inside folder we use -p flag
Eg mkdir -p vehicles/car/truck will create directory vehicles in your current directory which have car inside it and car has directory truck in it.

touch - we use touch follow by file name to create empty file.

______________________________________________________
 Removing Files And Folders
______________________________________________________

rmdir - we use rmdir follow by path to to remove any directory. This will not work if folder you are trying to remove has something in it.
rm -r  to remove file recursively which can not be removed by rmdir
rm - We use this command to remove files


How To Block Youtube Ads ?



Most of you get bored or annoyed due ads playing before youtube videos. Today i will share with you an amazing peace of programme called Block YouTube Ads . It removes all video ads before and during videos, as well as removes all those ads that pop at the bottom of the screen while the video is playing. It works on all major browser such Internet explorer, google chrome and mozilla firefox.


How to do ?
  1. Download Youtube Ads Blocker
  2. Double click on downloaded file.
  3. Follow the on screen instruction.
©2012 MIX GADGETS Beta is powered by Blogger - Template designed by Designed and powered by Mix Gadgets.