Powered by Blogger.

Archive for November 2011

How to configure Gmail With Microsoft outlook Express Step by Step

Outlook Express is easily the most popular Windows e-mail program. One reason for its popularity, of course, is that it is built into every Windows operating system. Outlook Express is easy to use and easy to upgrade.
Enabling POP
You can retrieve your Gmail messages with a client or device that supports POP, like Microsoft Outlook or Netscape Mail.
To enable POP in Gmail:
  • Sign in to Gmail.
  • Click Settings at the top of any Gmail page.
Click Forwarding and POP/IMAP


  • Select Enable POP for all mail or Enable POP for mail that arrives from now on.
  • Choose the action you'd like your Gmail messages to take after they are accessed with POP.
Configure your POP client* and click Save Changes
To set up your Outlook Express client to work with Gmail:
  • Open Outlook or Outlook Express.
  • Click the Tools menu, and select Accounts...
  • Click Add and then click Mail...

  • Enter your name in the Display name: field, and click Next.
  • Enter your full Gmail email address (username@gmail.com) in the Email address: field, and click Next.

Enter pop.gmail.com in the Incoming mail (POP3, IMAP or HTTP) server: field. Enter smtp.gmail.com in the Outgoing mail (SMTP) server: field.

  • Click Next.
  • Enter your Gmail username (including '@gmail.com') in the Account name: field. Enter your Gmail password in the Password field:, and click Next


  • Click Finish.
  • Highlight pop.gmail.com under Account, and click Properties.
  • Click the Advanced tab.
  • Fill in the following information:
1. Check the box next to This server requires a secure connection (SSL) under Outgoing Mail (SMTP).
2. Enter 465 in the Outgoing mail (SMTP): field.
3. Under Outgoing Mail (SMTP), check the box next to this server requires a secure connection (SSL).
4. Under Incoming mail (POP3), check the box next to this server requires a secure connection (SSL). The port will change to 995.
Return to the Servers tab, and check the box next to My server requires authentication.
Click
OK.
Congratulations! You're done configuring your client to send and retrieve Gmail messages.

What is Cloud Computing & How it works ?

Cloud computing is the delivery of computing as a service rather than a product, whereby shared resources, software, and information are provided to computers and other devices as a utility over a network (typically the Internet).



Layers
Once an internet protocol connection is established among several computers, it is possible to share services within any one of the following layers.


Client
A cloud client consists of computer hardware and/or computer software that relies on cloud computing for application delivery and that is in essence useless without it. Examples include some computers, phones and other devices, operating systems, and browsers.
Application
Cloud application services or "Software as a Service (SaaS)" deliver software as a service over the Internet, eliminating the need to install and run the application on the customer's own computers and simplifying maintenance and support.
Platform
Cloud platform services, also known as platform as a service (PaaS), deliver a computing platform and/or solution stack as a service, often consuming cloud infrastructure and sustaining cloud applications. It facilitates deployment of applications without the cost and complexity of buying and managing the underlying hardware and software layers. Cloud computing is becoming a major change in our industry, and one of the most important parts of this change is the shift of cloud platforms. Platforms let developers write certain applications that can run in the cloud, or even use services provided by the cloud. There are different names being used for platforms which can include the on-demand platform, or Cloud 9. It's your choice on what you would like to call the platform, but they all have great potential in developing. When development teams create applications for the cloud, they must build its own cloud platform.
Infrastructure
Cloud infrastructure services, also known as "infrastructure as a service" (IaaS), deliver computer infrastructure – typically a platform virtualization environment – as a service, along with raw (block) storage and networking. Rather than purchasing servers, software, data-center space or network equipment, clients instead buy those resources as a fully outsourced service. Suppliers typically bill such services on a utility computing basis; the amount of resources consumed (and therefore the cost) will typically reflect the level of activity.
Server
The servers layer consists of computer hardware and/or computer software products that are specifically designed for the delivery of cloud services, including multi-core processors, cloud-specific operating systems and combined offerings.

Deployment modelsCloud computing types

Public cloud

Public cloud describes cloud computing in the traditional mainstream sense, whereby resources are dynamically provisioned to the general public on a fine-grained, self-service basis over the Internet, via web applications/web services, from an off-site third-party provider who bills on a fine-grained utility computing basis.

Community cloud

Community cloud shares infrastructure between several organizations from a specific community with common concerns (security, compliance, jurisdiction, etc.), whether managed internally or by a third-party and hosted internally or externally. The costs are spread over fewer users than a public cloud (but more than a private cloud), so only some of the benefits of cloud computing are realized.

Hybrid cloud

Hybrid cloud is a composition of two or more clouds (private, community, or public) that remain unique entities but are bound together, offering the benefits of multiple deployment models. It can also be defined as multiple cloud systems that are connected in a way that allows programs and data to be moved easily from one deployment system to another.

Private cloud

Private cloud is infrastructure operated solely for a single organization, whether managed internally or by a third-party and hosted internally or externally.
They have attracted criticism because users "still have to buy, build, and manage them" and thus do not benefit from lower up-front capital costs and less hands-on management, essentially "[lacking] the economic model that makes cloud computing such an intriguing concept".


Architecture

Cloud architecture, the systems architecture of the software systems involved in the delivery of cloud computing, typically involves multiple cloud components communicating with each other over a loose coupling mechanism such as a messaging queue.

The Intercloud

The Intercloud is an interconnected global "cloud of clouds" and an extension of the Internet "network of networks" on which it is based.

Cloud engineering

Cloud engineering is the application of engineering disciplines to cloud computing. It brings a systematic approach to the high level concerns of commercialization, standardization, and governance in conceiving, developing, operating and maintaining cloud computing systems. It is a multidisciplinary method encompassing contributions from diverse areas such as systems, software, web, performance, information, security, platform, risk, and quality engineering.

How to Know if Your Computer is Infected with a Virus



No one wants to own a computer infected with a nasty virus. That's why it's very important to practice safe computing habits and to install reliable anti-virus software. You can avoid most malware just by paying attention and staying away from a few common traps. If your anti-virus software is up to date, you should be in pretty good shape.

But once in a while, computer viruses get beyond our defenses. Maybe our anti-virus software is out of date or has been compromised by a particularly clever bit of code. Perhaps we clicked on a link by accident and activated a virus. Or someone else used our computer and downloaded some malware by mistake.

Signs of a Computer Virus

Assuming your anti-virus software hasn't alerted you to the presence of a virus, here are some indicators of malware on your computer:

If your computer has become unstable, that's a sign that something's wrong. Some malware messes with important files that keep your computer running properly. That could cause your computer to crash. If your computer crashes when you try to run a specific application or open a particular file, that tells you that something has corrupted the data. It could be malware.

Does your computer seem to run much more slowly than it used to? This could be the result of malware as the malicious code begins to drain your computer's processing resources. If you aren't running a resource-heavy application but your computer is very slow, you might have a computer virus.

Strange messages indicating that you can't access certain drives on your computer are another sign that something is wrong. In a similar vein, applications that won't run or files that won't open may also be the result of infection. Other indicators include hardware (like printers) that no longer respond to commands. While none of these guarantee the presence of a virus, they do suggest that something is wrong with your machine.

If you notice that file sizes are fluctuating even if you aren't accessing those files, that's another sign of a computer virus. And finally, if you access menus and their appearance is odd or distorted, you could be the victim of a malware attack.

How Computer Addiction Works



Obsessively checking e-mail. Playing online games for 12 hours or more at a time. Placing more value on chat-room friends than real friends. Neglecting family, work and even personal health and hygiene. These are all symptoms of a new form of addiction that has surfaced only in recent years: computer addiction. In this article, we'll learn about computer addiction, why it's a problem -- and why some doctors disagree about whether it exists at all.Creating a single definition for computer addiction is difficult because the term actually covers a wide spectrum of addictions. Few people are literally addicted to a computer as a physical object. They become addicted to activities performed on a computer, like instant messaging, viewing Internet pornography, playing video games, checking e-mail and reading news articles. These activities are collectively referred to as Computer Mediated Communication(CMC). Computer addiction focused on Internet use is often called Internet Addiction Disorder (IAD).


The various types of computer addicts have different reasons for their habits. Obsessive chat room use or e-mailing might fill a void of loneliness, while excessive viewing of pornography might stem from relationship problems or childhood abuse. The matter is further complicated by the fact that a computer is a useful tool. It's not like heroin, for example -- there are many legitimate reasons why someone might spend hours using a computer.Even if someone uses a computer extensively for purely recreational purposes, that doesn't necessarily represent a real addiction any more than someone who spends hours working on a model train set, makingquilts or gardening is "addicted" to those activities. Even the agreed-upon definition of addiction itself has evolved over the decades and remains a matter of debate in the medical community. In fact, the American Medical Association and the American Psychiatric Association do not currently consider computer addiction a valid diagnosis, a controversy we'll discuss later.As a result of all these complications, any single definition of computer addiction is necessarily broad and a little vague. If the computer use is so pervasive that it interferes with other life activities, and if the user seems unable to stop using the computer to excess despite negative consequences, the problem might be a computer addiction.
Tag : , ,

Remove WGA error From Windows XP

If your Windows XP is not licensed and your computer is connected to internet, it is very possible to get the newest Microsoft update in form of WGA Notification – Windows Genuine Advantage Notification or GENUINE warning.
This update will remind you all time that your Windows XP Operating System is not licensed and it will give options for licensing. Also when your system is already started, the WGA process is always active in your taskbar and there is no way to turn off because it will be started again automatically and continue with annoying warnings.



But here is simple tutorial how to remove genuine warnings:

Second Update and very functional tutorial:


  1. First – click Start then Run and type “regedit” without quotes and press Enter
  2. Go to My Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify. In this location delete the folder “WgaLogon” and all content with name WgaLogon. If there is no WgaLogon folder continue with next steps.
  3. Restart your computer. After restart WGA will not be active and you can remove it completely following the next steps:
  4. Set your folders options to show hidden and protected Windows files – go to My Computer/Tools/Folder Options and then choose View. From the View tab choose “Show hidden files and folders” and uncheck “Hide protectedoperating system files” and click OK
  5. Now, Go to folder Windows\System32\dllcache, find and delete “WgaTray.exe”. Also, check for “WgaTray.exe” inWindows\System32\, and if you find it delete it, and search for “Wga*.*” with Start-Search-All files and folders and delete everything that starts with “Wga” (Wgatray.exe; Wgalogon.dll, Wgasetup; etc..)
  6. Restart your computer again and live happy and free.

    What is Ethical Hacking & Ethical Hacker ?



    Ethical hacking is the process of hacking the information that is considered to be confidential. The information through the ethical hacking does not remain secret at all. The ethical hacking process is also known as the intrusion testing, penetration testing or red teaming. However the ethical hacking also gives s professional certification to the certified ethical hacker where the hacking of the computer system or some other devices takes place. This service had been made available to the people by the international council of e-commerce consultants.

    Moreover for the ethical hacking the user has to be an ethical hacker which is somehow the name that is given to the person and for this the person must be a penetration tester. The ethical hacker is responsible for the performance of different activities. The main role that had been allotted to the ethical hacker is that he is the person who is mainly working for an organization or the organization hires the ethical hacker for the purpose of penetrating the information from different networks or systems. The organization trusts the ethical hacker as he is responsible for providing different services to the firm.

    The ethical hacking service is very much similar to that of the hacking and the ethical hacker is also working in the same way as the hacker is working for different purposes. The ethical hacker is the person who is found to be a computer expert and at the same time he is also responsible for the working of the networking systems as well. He is the person who works on behalf of the members of the organization. At times the hacking service that is being provided by the hacker can also be dangerous for the firm and hence it can exploit the systems of the company.

    An Ethical Hacker is an expert hired by a company to attempt to attack their network and computer system the same way a hacker would. Ethical Hackers use the same techniques and tactics as those used by illegal hackers to breach corporate security systems. The end result is the company's ability to prevent an intrusion before it ever occurs.



    An Ethical Hacker works to uncover three key pieces of information. First, he determines what information an illegal hacker can gain access to. Next, he explores what an illegal hacker could do with that information once gained. Last, the Ethical Hacker ascertains whether an employee or staff member would be alerted to the break-in, successful or not.

    In order to get the most out of the assessment, a company should decide in advance the nature of the vulnerabilities they're most concerned with. Specifically, the company should determine which information they want to keep protected and what they're concerned would happen if the information was retrieved by an illegal hacker.

    The 8 Most Dangerous Computer Viruses In History




    1 ) Jerusalem – 1987

    This is one of the first MS-DOS viruses in history that caused enormous destructions, affecting many countries, universities and company worldwide. On Friday 13, 1988 the computer virus managed to infect a number of institutions in Europe, America and the Middle East. The name was given to the virus after one of the first places that got “acquainted” with it – the Jerusalem University.

    Along with a number of other computer viruses, including “Cascade”, “Stoned”, “Vienna” the Jerusalem virus managed to infect thousands of computers while still remaining unnoticed. Back then the anti-virus programs were not as advanced as they are today and a lot of users had little belief of the existence of computer viruses.



    2 ) Morris (Internet Worm) – November 1988

    The Morris worm or Internet worm was one of the first computer worms distributed via the Internet. It is considered the first worm and was certainly the first to gain significant mainstream media attention. It also resulted in the first conviction in the US under the 1986 Computer Fraud and Abuse Act. Once the worm discovers an internet connection, all that it must do is download a copy of itself to that location, and continue running as normal.  Now it has been 7 years since the Worm was defeated, but it is still worth looking at what happened, both in terms of how the program operated, and as to what conditions allowed it to do what it did. With that in mind, there are a number of subtopics of interest.



    3 ) Solar Sunrise – 1998

    Two Californian teenagers took American government by surprise, in 1998, when they intruded and took control of around 500 systems that belonged to the governmental as well as private sector. This was done with the help of a computer virus and the situation was given the name of Solar Sunrise, after an operating system called Sun Solaris. The computers that ran this OS had few weaknesses. US government took the incident as another golden opportunity to blame Iraqis but soon found out that the culprits were no other than their own Americans.

    Initially it was believed that the attacks were planed by the operatives in Iraq. It was later revealed that the incidents represented the work of two American teenagers from California. After the attacks, the Defense Department took drastic actions to prevent future incidents of this kind.



    4 ) Melissa – 1999

    The Melissa virus, also known as “Mailissa”, “Simpsons”, “Kwyjibo”, or “Kwejeebo”, is a mass-mailing macro virus. As it is not a standalone program, it is not in fact a worm. Melissa can spread on word processors Microsoft Word 97 and Word 2000 and also Microsoft Excel 97, 2000 and 2003. It can mass-mail itself from e-mail client Microsoft Outlook 97 or Outlook 98.  If a Word document containing the virus, either LIST.DOC or another infected file, is downloaded and opened, then the macro in the document runs and attempts to mass mail itself.  When the macro mass-mails, it collects the first 50 entries from the alias list or address book and sends itself to the e-mail addresses in those entries.

    Melissa computer virus was developed by David L. Smith in Aberdeen Township, New Jersey. Its name comes from a lap dancer that the programmer got acknowledged with while in Florida. After being caught, the creator of the virus was sentenced to 20 months in federal prison and ordered to pay a fine of $5,000. The arrest represented a collaboration of FBI, New Jersey State Police and Monmouth Internet.




    5 ) I Love You – May 2000

    This is one of the most dangerous worms ever and spread worldwide in only one night. It infected around ten percent of all internet users, and the monetary loss was around $5.5 billion. The process started when a user received an email with the subject “ILOVEYOU” and an attachment “LOVE-LETTER-FOR-YOU.TXT.vbs”. As soon as the file was opened, the virus managed to send its copy to every address present in the Windows Address Book. This worm was written by a Filipino student who was punished as Philippines had no law related to such cyber crimes. Perhaps this incident triggered the creation of European Union’s global Cybercrime Treaty.



    6 ) The Code Red worm – July 2001

    The Code Red worm was a computer worm observed on the Internet  on July 13, 2001. It attacked computers running Microsoft’s IIS web server.  The Code Red worm was first discovered and researched by eEye Digital Security employees Marc Maiffret and Ryan Permeh. The worm was named the .ida “Code Red” worm because Code Red Mountain Dew was what they were drinking at the time, and because of the phrase “Hacked by Chinese!” with which the worm defaced websites.

    Although the worm had been released on July 13, the largest group of infected computers was seen on July 19, 2001. On this day, the number of infected hosts reached 359,000. The worm spread itself using a common type of vulnerability known as a buffer overflow. It did this by using a long string of the repeated character ‘N’ to overflow a buffer, allowing the worm to execute arbitrary code and infect the machine.



    7 ) Nimda – 2001

    Nimda is a computer worm, and is also a file infector. It quickly spread, eclipsing the economic damage caused by past outbreaks such as Code Red. Multiple propagation vectors allowed Nimda to become the Internet’s most widespread virus/worm within 22 minutes.  The worm was released on September 18, 2001. Nimda was considered to be one of the most complicated viruses, having up to 5 different methods of infecting computers systems and duplicating itself.



    8 ) Downadup – 2009

    The Downadup worm, also known as Conficker and Kido, has affected 6 million PCs in just the past three days, according to British officials. his malicious program was able to spread using a patched Windows flaw. Downadup was successful in spreading across the Web due to the fact that it used a flaw that Microsoft patched in October in order to distantly compromise computers that ran unpatched versions of Microsoft’s operating system. According to New York Times, conficker has more than 7 million computer systems under its control now. China, Argentina, Brazil, Russia, and India were the main affected nations.
    Tag : , ,

    - Copyright © sabhikeliye - Skyblue - Powered by Blogger - Designed by Johanes Djogan -