Showing posts with label FAQ. Show all posts
Showing posts with label FAQ. Show all posts

May 23, 2011

What’s the difference between symmetric and asymmetric encryption?

Symmetric cryptography uses the same secret (private) key to encrypt and decrypt its data whereas asymmetric uses both a public and private key. Symmetric requires that the secret key be known by the party encrypting the data and the party decrypting the data. Asymmetric allows for distribution of your public key to anyone with which they can encrypt the data they want to send securely and then it can only be decoded by the person having the private key. This eliminates the need of having to give someone the secret key (as with symmetric encryption) and risk having it compromised. 

The issue with asymmetric is that it is about 1000 times slower than symmetric encryption which makes it impractical when trying to encrypt large amounts of data. Also to get the same security strength as symmetric, asymmetric must use strong a stronger key than symmetric. 

If you do a quick search on the differences between symmetric and asymmetric you can find many more explanations. This just a quick overview.

May 5, 2011

How to Delete a Facebook Page?


Facebook pages really help you Connect with your audience, share your story and participate in real-time conversations quickly and easily on Facebook but there are some users who want to delete their facebook page for some reason. I hope this post will help them. Go through the step by step to delete your facebook page.
Step1: Go to your facebook page and login with facebook account.
Step2: Click on the edit page button on the right top corner of your page.
Step3: Now click on permanently delete this page option.
Step4: Confirm your facebook page deletion and you are done.

Keep in your mind that you will not be able to recover you facebook page once you deleted it.

May 2, 2011

How to Find a Stolen Laptop?

As you know it is very hard to trace and locate a stolen laptop but Antivirus company Quick heal got a service that will help you recover and locate your stolen laptop.
To recover your stolen laptop first thing you have to do is register your computer with Quick heal service called trackmylaptop.net.Once your computer got registered you can trace your stolen laptop by clicking trace now button.
If you are a quick heal user you can register your laptop to this service by clicking here. If you are not using Quick heal products you can submit your request here.
When registering for Laptop tracking service Quick heal may ask you Mac address of your computer. If you are not a tech savvy person you will get difficulties in finding the Mac address of your computer. If have any difficulties you can use Quick Heal Mac ID enumeration tool to find your computer Mac address. You can download it from here.


Just run this tool and click on enumerate button to know you computer Mac Address. This tracking service from Quick heal is presently available in selected regions of selected countries. Let me know if your location is available in the service list or not?





Apr 29, 2011

Recover Deleted Data Using FreeUndelete Software


Many times it happens that we accidently delete some important data from our computer.In such cases data recovery softwares are very helpful but most of them are paid softwares.There are only few Free data recovery softwares available on the the internet and one of them is freeundelete.
Before you use FreeUndelete or Recuva software I advise you not to transfer any data to that particular drive from which you have to recover data as it can reduce your chances of data recovery.
Now In post I will give you download link for the Freeundelete software and also highlight some of its main features.
Filesystems that are supported by freeundelete Software are:
  • NTFS 1.0 and 2.0 (Filesystems of windows NT,Xp,Vista,2000 and Windows 7)
  • FAT 12,FAT 16,FAT 32 (Windows 98)
Where are the recovered files stored?
The recovered files will be stored at the user specified destination
Click Here To Download freeundelete Data recovery Software

Trick For How To Hide Your Profile On Facebook


Are you fed up with everyday unwanted friend request or want to hide your profile from unknown people then you can hide your profile in facebook and google search.Whenever someone type your name or email Id in facebook search it will automatically search into its database and will show link to profile.
Is It really Possible to Hide Profile from facebook  search?
Yes,you can hide your facebook profile from facebook search.Basically facebook provides you with three options as follows:-
1. Everyone can search your profile on facebook
2. Only Your friends and friends of friends can search your profile
3. Only your friends can search your profile
For those who are really frustrated by daily unwanted friends request should select either 2 or 3 option.
Here is the complete step by step tutorial with screenshots on How To Hide Your Profile On Facebook
1.       Login into your facebook account.
2.       Click on Account on top right side.
3.       Now Click on Privacy and then on View Settings Under Connecting on Facebook heading
4.       Now you will see a lot of privacy settings and the first one being Search for you on Facebook
5.       In front of Search for you on Facebook you can select any one of the three options from the drop-down box as per your need.


Apr 28, 2011

Find Location of Email Sender Using Gmail/Yahoo/Hotmail


It often happens that we are interested in knowing the approximate location (city name at least) of the person who have sent you an email on your Gmail, Yahoo or Hotmail account.
Well, many may not know, but yes you can have the city name of the sender using certain information that comes with your email. When you receive an email, you receive more than just the message.
The email comes with headers (that are normally not displayed in the message) that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. Okay let’s start learning on how you can find the IP address of the sender.

Finding IP address With Gmail


Log into your Gmail account with your username and password.
  1. Now open any email from your inbox (or the one you want to track the location)
  2. On the left side of the To panel, click on down arrow button, that will open a drop down menu.
  3. Click on “Show Original”
  4. A New window will open, which will have plenty of raw material. Don’t get confused here…! try to find out following line
  5. Look for “Received: from” Received: from [69.138.30.1] by web4587.mail.***.yahoo.com
  6. [69.138.30.1]  can be different for every mail, as this is the IP address of the sender.
  7. You may find more than one Received: from patterns, in that case select the last one.
  8. Now that you have an IP address, you can locate this IP address by puting it in who.is
  9. open www.who.is and enter this ip address without brackets
  10. the query will give you the city name of the sender…!
Finding IP address with Yahoo
  1. Log into your Yahoo! mail with your username and password.
  2. Click on Inbox or whichever folder you have stored your mail.
  3. Open the mail that you want to track back.
  4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers
  5. Click on Options on the top-right corner
  6. In the Mail Options page, click on General Preferences
  7. Scroll down to Messages where you have the Headers option
  8. Make sure that Show all headers on incoming messages is selected
  9. Click on the Save button
  10. Go back to the mails and open that mail
  11. You should see similar headers like above
  12. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.
  13. That is be the IP address of the sender.
  14. If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.
  15. 7. Track the IP address of the sender.
Finding IP address in Hotmail
  1. Log into your Hotmail account with your username and password.
  2. Click on the Mail tab on the top.
  3. Open the mail.
  4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,
  5. Click on Options on the top-right corner
  6. In the Mail Options page, click on Mail Display Settings
  7. In Message Headers, make sure Advanced option is checked
  8. Click on Ok button
  9. Go back to the mails and open that mail
  10. You should see the email headers now.
  11. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address Hotmail headers. In this case the IP address of the sender is [68.34.60.59].
  12. Look for Received: from followed by IP address within square brackets[
  13. In this case, the IP address of the sender is [69.140.7.58].
  14. Or else if you have headers like this
  15. Look for Received: from followed by IP address within square brackets[].
  16. In this case, the IP address of the sender is [61.83.145.129] (Spam mail).
  17. 10. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.11. Track the IP address of the sender

How to Backup all your Windows Drivers free

Backup all your Windows Drivers free

Take a backup of all the device drivers that are currently installed on your system and put them on a CD or another drive.
Double Driver is a free utility that can help you with this process.

Double Driver 
scans your Windows system and creates a listing of every since device driver that's installed on the system. When you click the “backup” button, the tool will place all the drivers in separate folders – the modem drivers will be in one folder while the display related drivers will be in another one and so on.

This will make it easier for you to restore the relevant drivers without having to remember any of the file names and other technical details.

Double Drivers is available for Windows XP, Vista and Windows 7 and is compatible with both 32-bit and 64-bit edition of Windows.

Important: Double Driver is portable and requires no installation. However, if you are using it under Windows 7 or Vista, make sure you run the tool as an administrator

Backup all your Windows Drivers

Apr 27, 2011

How To change|Spoof IP And Mac Address?

MAC Address(media access control) is the unique Code/Name given to your LAN card that differentiate your computer from any other computer on the internet. mac address sometime also called as Ethernet Hardware Address. Now the question arises if the mac address is unique then how can we change it?
The answer to this question is very simple, the exact address is only known to your Operating System(windows xp) because this is the one who actually interact with hardware And operating system provide allow us to change this address that's why we are able to change our mac address[mac address can not overwritted it can only be spoofed].

Steps:-

  1. Open Network connections from Control Panel.
  2. right click the connection (of which you want to change mac address).
  3. Click Property.
  4. Now the window will appear as shown below in here click configure...

    change mac address from local area connection property
  5. Now a window will appear in here click Advanced Tab.
  6. In here in Property click Network address.

What Is a Port Number?


In computer networking, a port number is part of the addressing information used to identify the senders and receivers of messages. Port numbers are most commonly used with TCP/IP connections. Home network routers and computer software work with ports and sometimes allow you to configure port number settings. These port numbers allow different applications on the same computer to share network resources simultaneously.

How Port Numbers Work

Port numbers are associated with network addresses. For example, in TCP/IP networking, both TCP and UDP utilize their own set of ports that work together with IP addresses.
Port numbers work like telephone extensions. Just as a business telephone switchboard can use a main phone number and assign each employee an extension number (like x100, x101, etc.), so a computer has a main address and a set of port numbers to handle incoming and outgoing connections.
In both TCP and UDP, port numbers start at 0 and go up to 65535. Numbers in the lower ranges are dedicated to common Internet protocols (like 21 for FTP, 80 for HTTP, etc.).

When You May Need to Take Action with Port Numbers

Port numbers are typically processed by network hardware and software automatically. Normally you will not see them while casually using a network nor need to take any action involving them. However, in these special cases you can work with network port numbers:
·   Network administrators may need to set up port forwarding to allow the port numbers of specific applications to pass through a firewall. On home networks, broadband routers support port forwarding on their configuration screens.
·    Network programmers sometimes need to specify port numbers in their code, such as insocket programming.
·    Sometimes, a Web site URL will require a specific TCP port number be included. For example, http://localhost:8080/ uses TCP port 8080. Again, this is more usually seen in software development environments than on the Internet.