Thursday 26 December 2013

NSA Files: Decoded

In the last five months, the NSA's surveillance practices have been revealed to be a massive international operation, staggering in scope. But how do all of the NSA's programmes fit together – and what does it all mean?
NSA Files: Decoded
Explore more infographics like this one on the web's largest information design community - Visually.

Friday 20 December 2013

Every 60 Seconds in Social Media [ Infographic ]

What happens in the course of 60 seconds in the world of social media?
Every 60 Seconds in Social Media
by cobradave.
Explore more infographics like this one on the web's largest information design community - Visually.

How to Create Outstanding Social Media Pages

The requisite to promoting yourself on any social network is to ensure that your pages are perfectly set up. So here's a quick guide on creating outstanding Facebook, Twitter, Pinterest, Google+ and Linkedin social media pages.
How to Create Outstanding Social Media Pages
Explore more infographics like this one on the web's largest information design community - Visually.

Are You Sharing Too Much Online?

As social media's usage has risen, so has people's willingness to share personal information via that medium. The problem is that what some people might think is a harmless note about going on vacation might be just the news a burglar has been waiting for. People share so much information now that one study said that 90 percent of adults think people share too much information online. But what type of potentially dangerous information is being shared and why do people share this information in the first place? Check out the Infographic to learn the answers to those questions and more. 
Are people sharing too much online?
Explore more infographics like this one on the web's largest information design community - Visually.

Should You Use Twitter?

More than 100 million people have flocked to Twitter since 2006, sharing stories, insights, and cat pictures. But is Twitter really for you? Follow the steps below to determine if you or your business really need to have a Twitter account.
Should You Use Twitter?
by Column Five Media.
Explore more infographics like this one on the web's largest information design community - Visually.

The 5 Minute Guide To Getting A Job In Social Media

As more and more companies begin to offer employment opportunities in the social media world, many of us are trying to figure out how to get a foot in the door. If you want to get into this field but your efforts have proved fruitless, look no further. This unofficial guide will set you on the straight path to employment. 
The 5 Minute Guide To Getting A Job In Social Media
by Column Five Media.
Explore more infographics like this one on the web's largest information design community - Visually.

10 Effective Ways To Increase Followers On Twitter

Wish to have more followers on twitter? Try this.
10 Effective Ways To Increase Followers On Twitter
Explore more infographics like this one on the web's largest information design community - Visually.

Social Media Effect

Wonder what effect social networks have over google search feeds. See for yourself.
The Social Media Effect
Explore more infographics like this one on the web's largest information design community - Visually.

Socialise Your Enterprise

This infographic examines how people interact with businesses on four of the key networks; Facebook, Twitter, Foursquare and LinkedIn.
Socialise Your Enterprise
Explore more infographics like this one on the web's largest information design community - Visually.

Social Network Active Users 2013

A simple infographic stating the number of active users on the top six social networks at the end of 2013. This includes Facebook, Google+, LinkedIn, Twitter, Instagram, and Pinterest.
Social Media Active Users 2013
Explore more infographics like this one on the web's largest information design community - Visually.

Social Media Statistics

Social media is one of those things that businesses of all sizes know that they need to do, but they are not really sure how to do it, where they can find the time to do it, or if they are willing to pay someone else to do it. 
Social Media Statistics
by easyeMerge.
Explore more infographics like this one on the web's largest information design community - Visually.

The Complete History of Google Algorithms

The Complete history of Google Algorithms
Explore more infographics like this one on the web's largest information design community - Visually.

How Google works

Wonder what google does in that fraction of a second to produce millions of results. Here's what..



Wednesday 11 December 2013

The Evolution of Programming

Technological innovation begins with the code and nothing has evolved faster than it, still growing.
The Evolution of Programming [Infographic]
Via: ServicesANGLE

History of Hacking

Here's a short history of hacking from the past to present covering all the major hacks and hackers behind them.
The History of Hacking
[Source: OnlineMBA.com]

The Fall of Apple

Check out in this infographic by MoneyChoice.org how Apple stocks fared in the past 12 months.

The Fall of Apple
Created by MoneyChoice.org

Saturday 12 October 2013

Beware of Identity Theft: People claiming to make you millionaire

A friend of mine received this Phishing mail from a woman claiming to be an employee at Reserve Bank of India, asking her to be an accomplice in distributing more than 5 crores INR among them of an unclaimed bank account. You can read the whole mail yourself,



Then again, here's why it is a spam:
  • The mail doesn't address by a specific name, instead it says, 'dear friend', which means it is generalized mail sent to many.
As I've suggested in my previous blogs as well, that in case you receive such a mail,
  • Do not reply, as your response will be used for identity theft.
  • Do mark it as spam so that you don't receive any further mails from the spammers.
  • One more thing I'd strongly suggest is that don't add your e-mail id to random websites as once it gets public, you become the target of spammers.
The purpose of this Phishing mail is identity theft but there are also a few which would try to gain money from you as in the case of, Fake Hyundai Job Call Letter and Fake Microsoft Job Offer Letter.

Also, take a look at a similar mail, Fake 'Abba Queens Hotel' Job Offer Mail and Fake Audi Promo Program.


And, if you're on Twitter, you might want to read this, Don't Fall For Phishing On Twitter.

Friday 11 October 2013

Beware of Identity Theft: Fake Audi Promo Program

A few days back, my friend received this document in her e-mail:

Other than the obvious fake look, here are some other general points proving, it is fake:
  • The mail has been sent via libero.it and not from any official website of Audi. It is an Italian website which is also a free e-mail provider. The mail asks you to responds at audiclaims@vf.vc. When I visited the site vf.vc, it says:

OooooPs.
We Just closed the registration at VF.VC
Because there is a lot of Spammers are using our service we decided to close it


For Abuse Reports : please contact us at anti-spam@vf.vc

  • The +44 87 phone number is not a land line - it`s a cell phone or a redirect service.

As I've suggested in my previous blogs as well, that in case you receive such a mail,

  • The best thing to do is first google about it like 'audi fake promo award'.
  • Obviously, the above points should also be observed.
  • Do not reply, as your response will be used for identity theft.
  • Do mark it as spam so that you don't receive any further mails from the spammers.
  • One more thing I'd strongly suggest is that don't add your e-mail id to random websites as once it gets public, you become the target of spammers.
The purpose of this Phishing mail is identity theft but there are also a few which would try to gain money from you as in the case of, Fake Hyundai Job Call Letter and Fake Microsoft Job Offer Letter.


Also, take a look at a similar mail, Fake 'Abba Queens Hotel' Job Offer Mail and People claiming to make you millionaire.

And, if you're on Twitter, you might want to read this, Don't Fall For Phishing On Twitter.

Monday 7 October 2013

How to Run Turbo C/C++ in full screen in Windows 7, 8

Turbo C/C++ doesn't run in full screen in Windows 7, 8.
To get rid of this, most people use DOSBox but that will get your Turbo C/C++ to work slower and file handling codes won't work.

There is yet another simpler and better way as a solution. Here's what you do:


  • Open Turbo C/C++. Click on the uppermost left corner icon of the window.
  • Click on Properties.
  • Go to Font tab.
  • Choose font as Lucida Console.
  •  From list of font size, choose 28.
  • Go to Layout tab.
  • Uncheck ‘Let system position window’.
  • Now, do the following changes:
    • For screen buffer size:
                                   width: 80
                                   height: 25
    • For window size:
                                   width: 80
                                   height: 25
    • For window position:
                                   left: -4
                                   top: -4

    • Click on OK.

    Thursday 12 September 2013

    What does Windows x86 and x64 mean?

    x86 Stands for 32 bit OS and x64 Stands for system with 64 bit.

    In general most 32-bit applications will work just fine in a 64-biit operating system, but there are some exceptions. Examples might include old versions of DOS-based applications, anti-virus applications, old hardware which may not support 64-bit, etc.

    Beware: Fake 'Abba Queens Hotel' Job Offer Mail

    A few days back, I received the following mail:


    Please kindly read this letter on attachment file.
    Abba Queen's Gate Hotel is recruiting interested candidate who wish to work in our Company. submit your curriculum vitae CV" to our recruitment department Via Email, These are the list of Countries needed for the Career job offered by the Company. AFRICA REGION: Cameroon, Kenya, South Africa & Sudan. ASIA REGION: India. Indonesia & Philippine. EUROPE REGION: Germany, Spain & France. SOUTH AMERICA REGION: Chile & Argentina.

    along with the following attachment:


    Here's why it is an obvious scam:

    1. The mail has been sent via rediffmail.com and has been asked to respond to some careceo.com. Now, a 4 star hotel at London would never use a free e-mail id.

    2.The letter does not address me by my name. Therefore it's a generalized mass email sent by spammers to hundreds of people hoping that a few would fall in trap.

    3.The +44 87 phone number is not a land line - it`s a cell phone or a redirect service.

    4. Note that the English is very poor and is not written by someone who's primary language is English.

    5. It is impractical to believe of a UK based hotel sending job invitations to non-UK people and claiming that they'll take care of all expenses. This only lures people of developing or underdeveloped countries.

    6. The payment listed is quite overwhelming. 

    In case, you receive any such similar e-mail,

    1. The best thing to do is first google about it like 'Abba Queens Hotel scam'.

    2. Obviously, the above points should also be observed.

    3. Do not reply, as your response might be used for identity theft.

    4. Do mark it as spam so that you don't receive any further mails from the spammers.

    When I googled about this spam, I found some results dating back to early 2010 as well. The fact that this letter is still circulating, it is certain that there are people still falling for it. 

    You should be more alert of such spam mails if you hold an account on any job site like naukri.com. 


    The purpose of this Phishing mail is identity theft but there are also a few which would try to gain money from you as in the case of, Fake Hyundai Job Call Letter and Fake Microsoft Job Offer Letter.

    Also, take a look at a similar mail, Fake Audi Promo Program and People claiming to make you millionaire

    And, if you're on Twitter, you might want to read this, Don't Fall For Phishing On Twitter.


    Thursday 5 September 2013

    Preventing Phishing: Beware of Fake Hyundai Job Call Letter

    Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication(via Wikipedia)Phishing, also referred to as brand spoofing or carding, is a variation on fishing, the idea being that bait is thrown out with the hopes that while most will ignore the bait, some will be tempted into biting.The fake Hyundai Interview Call Letter circulating on the internet from quite some time now is one example. Here's the one I received a few days ago.



    Few things to be noticed about it are:
    - The mail is from some isep.ipp.pt instead of some hyundai.com or hyundai.co.in
    - The letter does not address me by my name. Therefore it's a generalized mass email sent by spammers to hundreds of people hoping that a few would fall in trap.
    - The mail asks me to make a security deposit of Rs.18K, which no such established organization will ever do.

    So, in case you ever receive such a mail, do not fall for it. Rather mark it as spam to avoid receiving any further mails from them.

    Another example is Fake Microsoft Job Offer Letter.

    Many-a-times the purpose of such mails is identity theft as in the following cases.



    Friday 9 August 2013

    How to add or remove items that appear in the 'Send to' menu in Windows 7

    1. Click on start button.
    2. Type shell:sendto
    3. Click on the folder that appears.

    The folder lists all the options that appear in the 'Send to' menu. 

    4. Now, if you wish to delete any option, simply delete it
                                       or,
        if you wish to add an option,
        a. Right click on the screen.
        b. Click on 'New'.
        c. Select 'Shortcut'.
        d. Browse to the location you wish to add.