studentrocks
Showing posts with label INTERNET TIPS. Show all posts
Showing posts with label INTERNET TIPS. Show all posts

Increase Broadband width with simple Tweak

Wednesday, October 20, 2010

A Simple Tweak (XP Pro only) which will increase your Broadband Speed.

Make sure you Log on as Administrator, not as a user with Administrator privileges.

Follow the steps as given below-



1) Click on Start Button.

2) Select Run From Start Menu.

3) Type gpedit.msc

4) Expand the [Administrative Templates] branch.

5) Then Expand the [Network] branch.

6) Highlight(Select by Single Click) [QoS Packet Scheduler]

7) Double-click [Limit Reservable Bandwidth] (Available in Right Side Panel)

8) Check(Select By Single Click on it) [Enabled]

9) Change [Bandwidth limit %] to 0 %

10) Click [OK] Button.

11) Restart Your PC.

12) Now Check Your Broadband Speed.

Read more...

How to send fax by email?

Thursday, October 7, 2010


Sending Fax by email

I know you came here searching for a method to send fax by email, in this article I will explain you on how to send fax by email?.

Here is the procedure to send fax by email,To send fax by email, YOU MUST sign up for an E-Fax account or similar service first.


1. First of all decide which email service you want to use to send the fax. Services like yahoo mail, Gmail and hotmail works the best, you can also use PDA, smart phone or your cellphone to do it .



2. Once you have started an email, here is what you need to check before sending fax by email, whatever service you are using to you must send your email address to that service.


Once converted, the service then transmits your e-mail and fax documents to your intended recipient’s fax-number via a regular software driven fax signal.
Most services require that you put their e-mail in the “To” field on your e-mail application. E-Fax, for instance requires that you enter the >faxnumber< us =" 1)," style="margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; ">For example, to send a fax to the Chicago number (312) 555-1212 you would enter “13125551212@efaxsend.com” in the “TO” box of your e-mail application.

3. Send the message. Your fax will arrive at the number you typed in the destination e-mail address. Don’t forget to enter a message in the body of the e-mail describing the fax you are sending.

Read more...

HOW TO IDENTIFY PHISHING SCAMS

Thursday, August 5, 2010


What is Phishing?
In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.

What does a phishing scam look like?

Phishing e-mail messages take a number of forms. They might appear to come from your bank or financial institution, a company you regularly do business with, such as Microsoft, or from your social networking site.

The following is an example of what a phishing scam in an e-mail message might look like.
Phishing spam
Example of a phishing e-mail message, which includes a deceptive Web address that links to a scam Web site.

Here are a few phrases to look for if you think an e-mail message is a phishing scam.

1.Verify or update your account:

Businesses should not ask you to send passwords, login names, Social Security numbers, or other personal information through e-mail.
2.you have won a prize or lottery:
The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part
"3.If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking.

Tips to protect yourselves from phishing:

1. Don’t reply to, or click links within, emails that ask for personal, financial, or account information.

2. Check the message headers. The ‘From:’ address and the ‘Return-path’ should reference the same source. If necessary, look at the expanded header as some phishing use vulnerable email servers to rout their messages.

3. Instead of clicking the links in emails, go to the websites directly by typing the web address into your browser, cut and paste, or use bookmarks.

4. If on a secure page, look for “https” at the beginning of the URL and the padlock icon in the browser.

5. Use a browser that has a phishing filter (Firefox, Internet Explorer, or Opera).

6. If you ever need to change your account information, such as your billing details or your password, you should always sign in to your account from the main login page of your trusted network (i.e. your bank’s main website) and make the changes directly within your account.

Read more...

How to Save Bookmarks in IE, Firefox, Chrome and Opera

Wednesday, July 21, 2010


Save Bookmarks

How would you like to save your bookmarks in IE, Firefox, Opera and Google Chrome so that you can restore them in case if you need to re-install your operating system or move them from one computer to another? This post will show you how to save and restore bookmarks in simple steps.

Bookmarking the favorite web pages can save a lot of time as it becomes almost impossible to remember a list of favorite websites and their URLs. However it can be really frustrating at times when you lose all those saved bookmarks in case if a computer crashes. Also if you are a person who uses more than one computer then it becomes hard to copy all those saved bookmarks one by one manually. So saving the bookmarks can become handy in such situations. Here is how to to do it.

Saving a Bookmark file in Internet Explorer

1. From the File menu, select the option Import and Export.

2. Select the option Export to a file and click on Next.

3. In the next screen select Favorites and click on Next.

4. In the next screen again click on Favorites and click on Next.

5. Now choose the destination where you want to save your bookmarks and click onExport.

6. In the next screen click on Finish.

Now you have successfully saved all your bookmarks in a .HTM file. You can use this file to later restore the bookmarks to either IE, Firefox or any other browser. To import the saved bookmarks from a file all you need to do is goto File menu, click on Import and Export, select the option Import from a file and proceed with the screen instructions.

Saving a Bookmark file in Firefox

1. From the Bookmarks menu on the top select the option Organize Bookmarks.

2. A window will pop-up. From the window click on Import and Backup at the top and select the option Export HTML.

3. Now choose the destination where you want to save the bookmark file and click onSave.

To restore this saved file, follow the step-1 and in step-2 select the option Import HTMLinstead of Export HTML and proceed.

Saving a Bookmark file in Google Chrome

1. From the Tools menu, select Bookmark Manager.

2. Click the Organize menu in the manager.

3. Select Export bookmarks.

4. Select the location where you want your exported file to be saved, then click Save.

To restore the bookmarks, follow step-1, step-2 and in step-3 select Import bookmarksinstead of Export bookmarks and proceed.

Saving a Bookmark file in Opera

1. From the File menu, select the option Import and Export.

2. Scroll over to the pull-down menu on the right and choose Export Bookmarks as HTML.

3. On the next screen, choose the destination folder from the Save in menu text box at the top of the screen.

4. Just click the Save button and you’re done.

Read more...

How to Detect Anonymous IP Addresses


Detect-Proxy

As the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.

1. Credit Card Frauds

For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.

2. Bypass Website Country Restrictions

Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.

Proxy Detection Services

So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind andFraudLabs to detect the usage of proxy or spoofed IP from users participating online.

Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.

How Proxy Detection Works?

Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.

The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.

How to Tell Whether a given IP is Real or a Proxy?

There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.

Detect Anonymous Proxy

So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

Read more...

Free .com domain Registrations. Offer till 30 June

Thursday, June 24, 2010


Free registration for .com domain is going on at 1and1 up to 30 June. Yes its not a fake call.
1and1.com is providing free registrations for .com domains up to 1 year validity and after one year you have to pay for the next term, the cool thing is their price after one year the is same as it is now .
Just choose your Address and register. Note for the registrations you must have a verified PayPal account.
If you have it then congrats you will now be having your own .com for free.
Hurry till offers ends.

Read more...

HOW TO INCREASE utorrent DOWNLOAD SPEED

Wednesday, May 12, 2010

This summary is not available. Please click here to view the post.

Read more...

GTalk chatting Tips and shortcuts

Sunday, May 2, 2010

GTalk, my fav. messenger :D

Most of us chat a lot everyday, with friends, family members and many other. If I don’t chat for a day with at least not even with one person, I say the day was boring! :P

So here am I with some chat formatting tips & shortcuts that will help you to deal more efficiently with GTalk…

Text Formatting

  • Bold Text – Place the text between two asterisks. eg. *This text will be BOLD!*
  • Italic Text – Place the text between two underscores. eg. _This text will be ITALIC!_

GTalk Shortcuts

  • Esc – Close current chat window
  • Alt + Esc – Close all chat windows
  • F9 – Open Gmail
  • F11 – Call
  • F12 – End current Call
  • Tab – Switch through the currently open chat windows

Transliteration (Indic Languages)

Google Bots help you to transliterate English to some Indian Languages. Below is a list of bots, add them to your friend list and then send them any message and then they will respond you back with the transliterated message :)

Languages
Bots
English to Hindien2hi.translit@bot.talk.google.com
English to Kannadaen2kn.translit@bot.talk.google.com
English to Malayalamen2ml.translit@bot.talk.google.com
English to Tamilen2ta.translit@bot.talk.google.com
English to Teluguen2te.translit@bot.talk.google.com

GTalk Startup Parameters

There are some parameters that can be given to GTalk when it starts. It adds some extra functionality to GTalk.

To use the parameters, just edit the Google Talk shortcut on your desktop, and add any of the following parameters after a slash(/) or just run GTalk adding these parameters at the end followed by a slash(/).

  • nomutex – Open more than one instance of GTalk at a time
  • checkupdate – Check for updates to the current version
  • factoryreset – Load default settings
  • diag – Run GTalk in Diagnostic Mode
  • mailto user@gmail.com – Send an email using GMail

Read more...

  © DESIGN BY OBILLANENI OBILLANENI by OBILLANENI 2008

Back to TOP