Wisdom of Life

Get Educate

How do Facebook ‘Like’ scams reach thousands of users?

If you look, you will find countless Facebook pages that have hundreds of thousands of likes and comments. But are these real? Some of the posts invite people to write a comment to see what happens. But predictably, nothing happens and this is all part of a large-scale Facebook scam. These ‘stories’ then appear on newsfeeds and begin to resemble spam. The most common modus operandi for such Facebook scams is to attract people by getting their

Read more
Fake Windows 8 Antivirus Tool “Win 8 Security System’”

McAfee  discovered in August, a Fake Antivirus program that “Windows 8 Security system” claims to detect infections, and displays alerts to scare users into purchasing protection. The real infection, of course, is the Win 8 Security System itself. It’s no surprise that developers of rogue antivirus software are playing up the connection to Windows 8, which Microsoft plans to release at the end of October.[frame align="left"][/frame] writing

Read more
Loophole Allows Anyone To Upgrade To Windows 8 Pro For $14.99

After the recent release of Ms windows 8, a loophole that allows any Ms windows individual to buy a certificate for Ms windows 8 Pro for $14.99 (Rs 800 approximately) has been discovered. According to Technology Customized, the lower cost can be carried out by any individual by simply acting some of the details that Ms demands when you apply for the lower cost. a narrative essay The lower cost is meant for those who bought a Ms windows seven machine

Read more
Cyberespionage malware ‘miniFlame’ discovered

Newly discovered spying malware designed to steal data from infected systems was likely built from the same cyber-weaponry factory that produced two other notorious cyberespionage software Flame and Gauss, a security vendor says. Kaspersky Lab released a technical paper Monday outlining the discovery of the malware the vendor has dubbed "miniFlame." While capable of working with Flame and Gauss, miniFlame is a "small, fully functional espionage module

Read more
To specify shortcut keys for specific programs:

Open My Computer. comparing and contrasting essays Locate the program file (.exe) or the program's shortcut icon. Right-click the program file or shortcut, and then click Properties. With the cursor in the Shortcut key box, select the keyboard key you want to use in combination with CTRL+ALT. Shortcut keys automatically start with CTRL+ALT. The Shortcut key box will display None until you select the key and then the box will display Ctrl+Alt+the

Read more
How you can protect your self from Cyber War

Dear all, Be-Aware from Cyber War, Keep your Security Software up to date. How you can Protect yourself from Cyber Crime 1. Use a best Antivirus with total security. 2. always use windows Firewall Software  in your laptop or desktop buy essays cheap 3. use Original Windows Operating System. 4. Never Click suspected Link or Never open Suspected Links.   Keep in touch   Thanks   Regards CCASociety Jaipur.

Read more
Cleaning your PC

Every body is aware of the fact that windows computers tend to get a bit sluggish after few months of use. Computer begins to take longer time even to perform basic tasks.Earlier the PC felt responsive but now there are delays. Programs launch but lethargically. writing essays Its time to get a Cleaner! CCleaner or Crap Cleaner, as the name suggests helps cleaning of computer space. It checks for temporary internet files, because if these temporary

Read more
Keep a check on who uses your PC !!!

Check who used your pc without your knowledge:- First you should go to start > run >eventvwr.msc Events are stored in three log files: Application, Security, and System. These logs can be reviewed and archived. For our purpose we want the System log. Click on "System" in the left-hand column for a list of events. Look for a date and time when you weren't home and your computer should have been off. double click on the info n it will show u

Read more
You are being tricked!

While e-mails continue to be a major source of malware, criminals have also turned to social networking to trick unsuspecting users. "Post it once and all your friends will see it, click on it, and share it on their walls, " or 'the last pictures of Michael Jackson taken by his doctor' on Facebook or Twitter, such links have been used to fool people. Hackers are now using publicly available tools such as Google Trends to track news and events in

Read more
USB Vaccination

Pen Drives are now-a-days  most popular and convenient device for carrying your data with you. But they are also the most vulnerable to cyber threats. Pen Drives are often used on different computers and are hence the primary source of virus infections on personal computers. Not using pen drives is not a permanent solution for that reason. The solution is using digital vaccine. Such USB vaccines are available now that would vaccinate your pen drives

Read more