This is default featured slide 1 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 2 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 3 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 4 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

This is default featured slide 5 title

Lorem ipsum dolor sit amet, consectetur adipisicing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam. blogger theme by BTemplates4u.com.

Friday, May 13, 2011

5 Ways to Stealth Yourself Online

Sometimes we just want to be left alone. It's just plain creepy to think that somewhere in a bunch of digital data warehouses there are files containing our search habits, buying preferences, socio-economic status, etc. It's gotten to the point where Amazon knows what I want to buy before I even start searching for it.
How do we get our anonymity-sexy back? I'm going to give you a few tips that you can use to keep a low profile while on the net. Please note that even after using all these methods you can still be found by digital forensic CSI-type folks, so don't do anything illegal because, as the internet sensation Antoine Dodson once said, "We gon' find you". These are merely tips to protect your privacy and anonymity and not a handbook for becoming the next Jason Bourne.

1. Use a Web Browsing Proxy Service
Using an anonymous browser proxy service is one of the easiest ways to prevent the websites you visit from determining your actual IP address. Your true IP address aids advertisers in targeting you, hackers in attacking you, and stalkers in finding you. Your IP can also provide your actual location (at least down to the city and local zip code if you're using a local internet service provider).
An anonymous web proxy service acts as an intermediary between you and the website you are trying to visit. When you try to visit a website using a proxy, your request goes through the web proxy service and then onto the website. The proxy relays the web page you requested back to you, however, since the proxy is the middle man, the website only sees their IP address information and not yours.
There are literally hundreds of both commercial and free anonymous web proxy services available, but you need to be careful before you just randomly pick one, as you're essentially relying on them to protect your data and ensure privacy. The web browsing proxy service is privy to the entire conversation so eavesdropping is still possible. A couple of the more well known commercially available proxies include Anonymizer.com and GhostSurf.
Whatever proxy service you choose, be sure to check their privacy policy to see how your identity and other information is protected.
2. Opt-out of Everything Whenever Possible
Google and other search engines feature the ability for you to remove your personal information such as your phone numbers and physical address. They even let you control whether or not the Google Street View of your house is fully available to the public. If you've never used Google Street View, I urge that you try it. Google Street View can be used by criminals to virtually "case" your home or business. They can virtually pull up right in front of your door to see what the best method of entering your home or business is. While you can't have your house completely removed you can have it blurred. Visit the Google Maps Privacy page for details.
Additionally, you can opt-out of targeted advertising and cookie tracking on some of the larger search engines and at many internet-based retailers.

3. Setup a Throwaway E-mail Account for Site Registrations and Online Purchases
One thing most people hate is giving their e-mail address to everybody and his brother when they have to register for something online. Every time you give someone your e-mail address you risk having it sold to spammers or used for excessive marketing e-mails.
Many people would love to just put a fake e-mail address instead of the real thing but we all know that a confirmation e-mail has to be verified before we can register or purchase something.
Consider opening a throw-away e-mail account devoted to just your site registrations and online purchases. Chances are your ISP allows more than one e-mail account per subscriber or you can use Gmail, Microsoft, or any other free e-mail services available
4. Check and Update Your Facebook Privacy Settings
Most people set their Facebook privacy settings when they first sign up, but rarely check back to see what additional privacy options are available now. Facebook is constantly evolving and changing their privacy options. It's best to check them frequently to ensure that you haven't granted more information to the public than you intended to.


If you want the Facebook equivalent of turning off your porch light (like when you want the trick-or-treaters to go away), Click the chat button, and then choose "Go Offline". Now you can be invisible so people will quit "poking" you.
5. Turn on Your Router's Stealth Mode
Many home wired and wireless network routers have a feature called "Stealth Mode". Stealth mode allows you to make the computers on the inside of your home network virtually invisible to hackers.
Stealth mode prevents your router from responding to "pings" from hacker's port scanning tools. Hackers use these scanning tools to find unsecured ports and services on your computer. They could use this knowledge to mount a port or service specific attack. By not responding to these requests your router makes it look like there is nothing running inside your network.
Check your router's setup guide for instructions on how to enable this feature if it is available.

Tuesday, May 10, 2011

Skype for Mac message processing code execution vulnerability

Pure Hacking, a group of ethical hackers in Australia, reported directly to Skype what they believed to be a zero-day vulnerability in Skype for Mac 5.x


The vulnerability in Skype for Mac can be exploited by malicious people to compromise a user's system, according to Secunia.

The vulnerability is caused due to an unspecified error when processing messages from a contact.

Successful exploitation may allow execution of arbitrary code but requires that a contact is already added to the victim's Contact List.

Solution: 
Update to version 5.1.0.922. Check for Updates or you can download the latest version here.

Thursday, May 5, 2011

7 Clever Google Tricks Worth Knowing

Below I have compiled a list of 7 clever Google tricks that I believe everyone should be aware of.  Together I think they represent the apex of the grand possibilities associated with Google search manipulation tricks and hacks.  Although there are many others out there, these 7 tricks are my all-time favorite.  Enjoy yourself. 

1.  Find the Face Behind the Result – This is a neat trick you can use on a Google Image search to filter the search results so that they include only images of people.  How is this useful?  Well, it could come in handy if you are looking for images of the prominent people behind popular products, companies, or geographic locations.  You can perform this search by appending the code&imgtype=face to the end of the URL address after you perform a standard Google Image search.
2.  Google + Social Media Sites = Quality Free Stuff – If you are on the hunt for free desktop wallpaper, stock images, Wordpress templates or the like, using Google to search your favorite social media sites is your best bet.  The word “free” in any standard search query immediately attracts spam.  Why wade through potential spam in standard search results when numerous social media sites have an active community of users who have already ranked and reviewed the specific free items that interest you.  All you have to do is direct Google to search through each of these individual social media sites, and bingo… you find quality content ranked by hundreds of other people.
3.  Find Free Anonymous Web Proxies – A free anonymous web proxy site allows any web browser to access other third-party websites by channeling the browser’s connection through the proxy.  The web proxy basically acts as a middleman between your web browser and the third-party website you are visiting.  Why would you want to do this?  There are two common reasons:
  • You’re connecting to a public network at a coffee shop or internet café and you want privacy while you browse the web.  You don’t want the admin to know every site you visit.
  • You want to bypass a web content filter or perhaps a server-side ban on your IP address.  Content filtering is common practice on college campus networks.  This trick will usually bypass those restrictions.
There are subscription services and applications available such as TOR and paid VPN servers that do the same thing.  However, this trick is free and easy to access from anywhere via Google.  All you have to do is look through the search results returned by the queries below, find a proxy that works, and enter in the URL of the site you want to browse anonymously.
4.  Google for Music, Videos, and Ebooks - Google can be used to conduct a search for almost any file type, including Mp3s, PDFs, and videos.  Open web directories are one of the easiest places to quickly find an endless quantity of freely downloadable files.  This is an oldie, but it’s a goodie!  Why thousands of webmasters incessantly fail to secure their web severs will continue to boggle our minds.
5.  Browse Open Webcams Worldwide – Take a randomized streaming video tour of the world by searching Google for live open access video webcams.  This may not be the most productive Google trick ever, but it sure is fun!  (Note: you may be prompted to install an ActiveX control or the Java runtime environment which allows your browser to view certain video stream formats.)
6.  Judge a Site by its Image – Find out what a site is all about by looking at a random selection of the images hosted on its web pages.  Even if you are somewhat familiar with the target site’s content, this can be an entertaining little exercise.  You will almost surely find something you didn’t expect to see.  All you have to do is use Google’s site: operator to target a domain in an image search.
7.  Results Based on Third-Party Opinion - Sometimes you can get a better idea of the content located within a website by reading how other websites refer to that site’s content.  The allinanchor: Google search operator can save you large quantities of time when a normal textual based search query fails to fetch the information you desire.  It conducts a search based on keywords used strictly in the anchor text, or linking text, of third party sites that link to the web pages returned by the search query.  In other words, this operator filters your search results in a way such that Google ignores the title and content of the returned web pages, but instead bases the search relevance on the keywords that other sites use to reference the results.  It can add a whole new dimension of variety to your search results.

Bonus Material:
Here is a list of my favorite Google advanced search operators, operator combinations, and related uses:
  • link:URL = lists other pages that link to the URL.
  • related:URL = lists other pages that are related to the URL.
  • site:domain.com “search term = restricts search results to the given domain.
  • allinurl:WORDS = shows only pages with all search terms in the url.
  • inurl:WORD = like allinurl: but filters the URL based on the first term only.
  • allintitle:WORD = shows only results with terms in title.
  • intitle:WORD = similar to allintitle, but only for the next word.
  • cache:URL = will show the Google cached version of the URL.
  • info:URL = will show a page containing links to related searches, backlinks, and pages containing the url. This is the same as typing the url into the search box. 
  • filetype:SOMEFILETYPE = will restrict searches to that filetype
  • -filetype:SOMEFILETYPE = will remove that file type from the search.
  • site:www.somesite.net “+www.somesite.net” = shows you how many pages of your site are indexed by google
  • allintext: = searches only within text of pages, but not in the links or page title
  • allinlinks: = searches only within links, not text or title
  • WordA OR WordB = search for either the word A or B
  • “Word” OR “Phrase” = search exact word or phrase
  • WordA -WordB = find word A but filter results that include word B
  • WordA +WordB = results much contain both Word A and Word B
  • ~WORD = looks up the word and its synonyms
  • ~WORD -WORD = looks up only the synonyms to the word 

Sunday, May 1, 2011

How To Build A Computer

Build your own Computer
There are a lot of questions out there about how to build your own computer. It seems to be quite popular to take a bunch of PC parts and hook them all up and some how end up with a working computer. In some cases it can actually save you money and guarantees that you get the computer system that you want. Building your own computer also assures you are familiar with everything about your PC and how it works.


People of all types like to build their own PCs from scratch and you do not need to be a computer geek to do it. The ultimate question is whether you really want to make that PC or go out and purchase a complete one. That is a personal decision every one must make sure before they start putting out dollars to make their own computer.

So you decide that a pre-built computer is not what you want and need some help on how to make your own. When someone puts together their own computer, they are able understand it better because they built it and they are able to choose each component that goes into their PC. There is also a certain sense of satisfaction with having built a computer.

Things to think about

Let us look at some of the key areas of interest:
Component Selection - Make sure you get good computer components that will provide you the performance you want without breaking the bank. Examine each thing you want to do with your PC and make sure to select the parts that are needed to fulfill that need. You can always add functionality later if you found out you missed something.
Price - Do not go buying the most expensive parts if you do not really need them. Purchase good quality pieces that will give you what you need but do not go overboard.
Support - You will need to get familiar with the support forums and other websites out there that can help you when you run into problems.
Warranty - Make sure you keep your warranty information so that if something breaks you can have it fixed correctly. In some cases you might want to buy extended warranties if you have a very expensive piece.


Software - This is where you need to watch your costs. Purchase only what you need to get yourself going. Then buy other software as needed.

First Steps

Deciding what type of computer you need to build. Do you want a really inexpensive computer for the kids to use? A small, quiet machine to use as a media computer in the living room? A high-end gaming computer? Or maybe you need a powerful machine with a lot of disk space for video editing?
Next you will want to gather your components to build your computer. You will need a motherboard, case, power supply, video card, memory, hard drive, sound card, etc. Make a list of everything that you need and everything you feel you want your PC to do.
Choosing a motherboard is the most important part of a new computer because there are so many mother boards to choose from. Cheap motherboards are great for building inexpensive machines. Middle cost motherboards are good for average use systems like home office computer. High-end motherboards are for a powerful gaming machine or video workstation. Extreme motherboards ($200+) have special features that boost the price. For example, they might have multiple CPU sockets, extra memory slots or special cooling features.


Do your own research and decide if you want an Intel or AMD processor. Each have their benefits and things that might concern you. Ultimately they both do the job but you need to make sure you decide one which to buy.
All the other components you gather will be based on the motherboard you chose and what you feel you need your computer to do. You might be using USB, PCI, PCI-express, DDR ram, SATA, etc... ultimately the parts make the machine but always keep it simple if this is your first computer. While building your own computer is not too hard you certainly do not want to start out with the most difficult PC first.


Building your computer

Before you touch anything make sure to ground yourself so that you do not static shock your components. You can build up static electricity that can destroy the parts you just purchased. The best way is to wear a grounding bracelet on your wrist and connect it to something grounded.
Next unwrap the pieces as you need them. You will want to put the processor on the motherboard, put the motherboard in the case, hook up the heat sync, RAM, video cards, hard drives, CD/DVD writer, power supply, etc.
Carefully install each piece as needed and make sure all cables and screws are secured correctly.
Now close up the case, connect your keyboard, mouse, and monitor. Hook it to the power cable and press that On switch.