Make The Website Professional

Today, I am going to show you how easy it is to create a professional-looking Flash website for free.

Know To Spread The Web

So you've made a new site, huh? But no one knows about it! Here you will find tips to spread news about a website that you've created!.

The Path To Be An Expert Geek

In this website one can find many TIPS AND TRICKS of Computer,Internet,Web,Mobile And Blogger Tips.

To Increase The Knowledge Of Bloggers

In This Site We Want To Increase The Knowledge Of Bloggers About Blogging To Be A Better Blogger.

How To make Money Online With Your own Website

If you look at many websites, you will probably notice that there are banner advertisements displayed on most pages. If you are a newcomer to the scene, you might think that you must either be a company or that your site must be famous before you can get advertisers, just as it is the case in hardcopy publications..

Get our toolbar!

Thursday, August 30, 2012

TomTom Android app confirmed to arrive in October


TomTom Android app confirmed to arrive in October
The Android ecosystem has its fair share of navigation system apps, with Google’s home brewed offering doing a mighty fine job already. However, it certainly won’t hurt to have TomTom finally jumping onboard. After a not so subtle hint two months ago, TomTom for Android is ready to direct you to your destination and stop you from getting lost — and it’s coming pretty soon.

The Android version of TomTom, which will be showcased at IFA event, is bringing along many features that one expect to see from TomTom, such as on-board maps with new map interface, updated routes, traffic redirection, intelligent routing, advanced lane guidance, spoken street names, 2D/3D driving view, and even speed camera alerts.

Optimistic about the October launch of TomTom on the platform that it has seemingly forsaken in the last couple of years, TomTom managing director Corinne Vigreux said that bringing TomTom navigation app to Android smartphone is a significant milestone for the company.

While many features on the app can be used for no extra cost, users will have to cough up more dough for the use of HD traffic and speed camera alerts through in-app purchasing.

There’s no word yet on how much TomTom will cost, but we should be hearing more details  as we near the release date. In the meantime, how excited are you about TomTom finally finding its way to Android?

Saturday, August 25, 2012

New side-scrolling continuous running game Escape from Rikon sprints onto Android

If you are into continuous running games but happen to be looking for something a little different, developers going by the name of Tvee have released a side-scrolling one called Escape From Rikon. Featuring a more cartoon style of visuals, this game is pretty much what you expect it to be, just in side-scrolling format.

Instead of the usual over-the-shoulder point of view most of the continuous running games worth their salt use, this particular one is a side-scroller where you can jump and slide over and under obstacles. Themed a lot like Temple Run with the whole jungle atmosphere, there are also power-ups you can by from the coins you collect from each run you do in the game.

android_game_1 android_game_1


The controls are pretty straightforward as well, tapping on the left side of the screen will make your character jump while tapping on the right will make him slide. There are the usual sharing features as well whenever you get a new best score, sharing it with friends on Facebook.

If you're up for something a little different in this genre, you might want to check Escape from Rikon out. It is available for free off of the Google Play store.


PRASHANT KUMAR

Wednesday, August 22, 2012

Apple Breaks The Record Of Microsoft


New York: Apple Inc’s market value climbed past $623 billion on Monday, surpassing the record set by Microsoft Corp during the heyday of technology stocks in 1999.


Apple shares rose 2.6 percent, bringing its gains this month to almost 9 percent as Wall Street bets on the September 12 rollout of the latest version of the iPhone, the device that revolutionized the mobile industry.

Microsoft, however, retains the title of history’s most valuable company if its 1999 peak value of about $621 billion were to be adjusted for inflation.

Apple’s stock usually rallies in the run-up to major product launches, among the most heavily watched events on the annual tech calendar. The iPhone is the company’s biggest product, yielding half or more of its sales.

apple breaks the record of microsoft

Sources have said the company will take the wraps off a larger version of its iPhone on September 12. Some analysts also think it intends to announce a smaller iPad to safeguard its market share, as rivals from Google Inc to Amazon.com Inc begin selling cheaper, seven-inch tablets.

But Bernstein Research’s Toni Sacconaghi warned that questions remain about the availability of components for both the iPhone and the iPad, which in the past has constrained Apple’s product shipments.

“A key question for the launch will be Apple’s expected rollout schedule,” the analyst wrote on Monday. “Apple’s intention is to continue to ramp offerings as quickly as possible, but the company’s ability to do so remains a key near-term question.”

Apple’s shares have risen 64 percent in 2012. On Monday, they closed at a session high of $665.15, conferring on the Silicon Valley giant a capitalization of $623.5 billion, exceeding Microsoft’s 1999 value of $620.8 billion, according to data provided by S&P Dow Jones Indices.

But Microsoft’s value would rise to $853.7 billion after adjusting for rising prices, according to the Bureau of Labor Statistics’ inflation-calculator.

POLAR OPPOSITES

Apple overtook Exxon Mobil (XOM.N) to reach the No. 1 spot by market capitalization last year. Monday’s move means it has now entered the record books as the biggest company ever, in terms of market value.

“Everyone loves a winner; if you play the quick trade be careful,” said Howard Silverblatt, senior index analyst at S&P Dow Jones Indices in emailed comments. “If you are an investor, check the fundamentals and business plans, and avoid the hype in your decision.”

Apple climbed even as fellow technology heavyweight Facebook Inc (FB.O) plumbed new depths. The No. 1 social network slid to a record intraday low of $18.75 in the morning before bouncing back to close just above $20 after Capstone upgraded the company’s stock to buy from hold.

Facebook’s stock has gone south in the past month as investors worried about its ability to make revenue grow. Last week, some early investors were given the go-ahead to sell for the first time since Facebook’s May 18 IPO. Several similar lockups will expire through the end of the year.

Facebook rebounded above $20 in afternoon trade after Capstone’s upgrade, based on a combination of a more attractive valuation since its decline, and good long-term advertising prospects.

“It seems to be down around levels that people who didn’t like the deal thought it was really worth. And now it seems to have stabilized,” sad Eric Kuby, chief investment officer, North Star Investment Management Corp in Chicago.

It may have “found a level which seems more of a better price for people valuing the company in terms of the future.”


PRASHANT KUMAR

Tuesday, August 21, 2012

Know To Increase Traffic Through These 10 Ways Of Twitter


Twitter provides a great platform through which you can increase your blog traffic.  Many people know this yet they fail to actually take full advantage of it. Here are 10 ways that you can do this without
being viewed as a spammer.

1.) Send out short tips about a topic covered on your blog and include a url to one of the posts.  This is great because people who read your tips will be interested in learning more and many of them will click the link and visit your blog.

2.) Set up your blog posts to automatically post to twitter. You can do this with the wordpress blogging plugin called twitter tools or with the networked blogs application on facebook. The second one posts your blog posts to facebook and then also to twitter.

3.) Look for people who are tweeting about the same topics your blog covers and follow them and then share specific blog posts with them.

4.) Use the twitter search feature at search.twitter.com to located people asking questions about topics related to your blog and then reply back to them by answering their question and referring to a blog
post.
Know To Increase Traffic Through These 10 Ways Of Twitter

5.) Include your blog url as your website url on your twitter profile and include the link on your twitter profile background.

6.) Convert the content of some of your posts into audio and then share these audios with your followers via the audioboo application. People who may not read your posts, will listen to them.

7.) Do a search for lists on twitter. Find lists that cover topics you also talk about on your blog and then share your blog posts with the people on that list.

8.) Install the tweetmeme button application on your blog to encourage people to share your blog posts on twitter.

9.) Propose a share on twitter exchange with a few other blog owners. You tweet their posts and they tweet yours.

10.) Encourage your blog readers to connect with you on twitter. This increases the likelihood that they will come back and share your posts.

PRASHANT KUMAR

Monday, August 20, 2012

5 tips to make the best out of your WOT add-on

Hey Friends,
Thank you again for choosing Web of Trust as your safe surfing tool!
Here are some tips to help you get the best out of your WOT add-on.

5 tips to make the best out of your WOT add-on 5 tips to make the best out of your WOT add-on 1)  Consult ratings before you visit a site


WOT’s traffic-light style reputation icons tell you how much other users trust a website. You'll see them on Google, Yahoo, Wikipedia,
Facebook, and many other popular sites on the web. Consult reputation ratings to make informed decisions on what sites to use.

2)  Visit scorecard for detailed information


For more detailed information, visit the site’s scorecard. You’ll find additional information from trusted sources and other users’ comments. Also take a look at the confidence indicator that represents the amount of supporting evidence that the WOT system has for the reputation rating. The higher the confidence level, the more reliable the rating.

3)  Leave your own rating


Take part in making the web safer by reviewing and rating sites that you know and have visited. If you don't have opinions in all four rating components (trustworthiness, vendor reliability, privacy, child safety), rate just the components that you want and leave others unrated.

4)  Supplement your rating by leaving a comment


Is there something you’d like to say about a site? Go to the site’s scorecard and leave a comment. Please be pertinent and to the point so that your comment is useful and relevant to other users.

5)  Join discussion on our forum


Are you interested in web safety and reputations? Join the discussion on our forum to share your interest: www.mywot.com/forum


Together we can make the web more trustworthy. Please recommend WOT to your friends and family.

Stay in touch with us by liking us on Facebook, http://www.facebook.com/weboftrust
and following us on Twitter http://twitter.com/Web_of_Trust

Friday, August 17, 2012

Tricks Of A Blogger To Look Familier

ABOUT 85 percent of the Internet population uses the Microsoft Internet Explorer browser to surf the Web, even though it's relatively ancient, crusty with neglect and about as secure as a screen door. In what other industry would 85 percent of consumers choose such a product — when better ones, also free, were also available?

Microsoft has redesigned the Internet Explorer browser to open more space for Web pages. This version also accepts material sent by R.S.S.

Trick question. Those consumers aren't actually choosing Internet Explorer; in fact, they're not choosing. They just use what came on their Windows computers. Thanks to this built-in following, Microsoft hasn't felt much need to keep Internet Explorer current. Version 6 has been creaking along for five years — an eternity in Internet time.

But hope is in the air. Earlier this week, Microsoft took the wraps off IE 7. The new version is a public beta — Beta 2 — and therefore technically unfinished. Still, Microsoft feels that this release is ready for average people to try out; you can download it from www.microsoft.com/ie. Phone help is available, and you can easily restore Version 6 if necessary.

How this new browser measures up depends on the ruler you're using. If you've never used anything but Internet Explorer, you won't be able to wipe the grin off your face.

But next to rivals like Firefox, Opera and Safari, IE 7 is a catch-up and patch-up job. Some of its "new" features have been available in rival browsers for years.

For example, IE may be the last Web browser on earth to offer tabbed browsing. This useful feature lets you keep several Web sites open on the screen simultaneously — not in a hopeless mess of overlapping windows, but all in one window. File-folder index tabs at the top of the window keep them straight.

Truth is, Microsoft's version of tabbed browsing offers some very nice features. (And yes, dear e-mail correspondents, I'm aware that many of them also made their debut in other browsers.)

For example, you can summon a sheet of Web page miniatures, offering a handy, visual, clickable table of contents for your open tabs. IE 7 can also memorize a fleet of open tabs, saving them as a single bookmark. Later, one click opens them all again, arrayed just as you had them. Similarly, when you quit the browser, it offers to memorize the current open-tab setup, so that later you can pick up where you left off.

SCREEN real estate has been given a priority in Internet Explorer 7, too. ("Say goodbye to bulky toolbars," says the IE Web site — never mind that Microsoft gave us those bulky toolbars in the first place.)

The menu bar (File, Edit, View and so on) is gone, having been replaced by tiny pop-up menus at the right side of the window. (Those feeling disoriented can still summon the menu bar by tapping the Alt key.) And a single, noncustomizable toolbar contains the address bar, Back and Forward buttons, and the welcome new Search box, which can be programmed to use Google, Ask.com, MSN Search or whatever you like. Even with the added height of tabs, Microsoft has conserved so much space that you can see an additional inch or so of Web goodness without scrolling.

R.S.S. feeds represent another major new feature — new to Internet Explorer, anyway. R.S.S. (for Really Simple Syndication) is the Web's version of home delivery: instead of having to slog on over to your favorite sites, you are sent their latest articles and news automatically. To receive these convenient, free "subscriptions," though, you used to need a piece of software called an R.S.S. reader, which you had to download and configure yourself. No wonder R.S.S. doesn't yet play in Peoria.

But IE now joins the list of browsers with built-in R.S.S. readers. Whenever you visit a Web site that offers an R.S.S. subscription, a special logo lights up in IE; click it to see a sample of the R.S.S. broadcast (usually one-paragraph summary blurbs), and click Subscribe if you like what you see. The reading window offers a useful assortment of searching and sorting controls.

Other IE 7 enhancements include a Shrink to Fit printing option that eliminates chopped-off printouts; a print-preview mode whose draggable margins let you print only the useful parts of Web pages; a pop-up menu that magnifies the entire Web page (not just the text); and a single Delete Browsing History dialogue box that can erase all your tracks at once: History list, saved cookies and passwords, Web form data and temp files. (Who will find this feature useful? You know who you are.)

Now, if you currently use IE 6, those are all good reasons to upgrade, perhaps when the final version becomes available this summer. But the most important reason is mostly invisible: security.

As a bulwark against frauds, viruses and spyware, Internet Explorer has been about as solid as a sieve. It was such a fat target for Internet bad guys that using it was like hanging a blinking neon Hackers' Entrance sign on your PC.

Internet Explorer 7 is a different story. Not many people beyond engineers will find its 15-page list of patches compelling reading; it's about stuff like Cross-Domain Script Protection, IDN Display Protections and Enhanced Validation SSL.

But some of the security measures are comprehensible even to laymen, and they sound reassuring indeed. For example, any files that you download go into a Temporary Internet Files folder that prevents them from running automatically, in that way thwarting the installation of many evil programs. Spyware can no longer enter your machine by piggybacking on some piece of innocent software, either.

Most welcome of all, a sophisticated phishing detector warns you, with all the subtlety of a sledgehammer, whenever you open a fraudulent phishing page. (An example of a phishing fraud is an e-mail message that says, "Your eBay account will soon be closed; click here for details." Worried, you click the provided link and confirm your account information. Unfortunately, you've just handed over your credit card and account numbers to the Internet baddies, who have set up a fake eBay screen just for suckers like you.)

All those desperate swindlers, spammers and phishers will, no doubt, devise even more nefarious ways to invade PC's and trick their owners. But Internet Explorer 7 will make their job a heck of a lot harder.

Compared against Internet Explorers past, the new version is more secure, better looking and more efficient. There are, however, a few strings attached.

For example, it works only with Windows XP with Service Pack 2. (It will also work with next year's Windows Vista, of course — in fact, that version will offer an additional feature or two, including excellent parental controls.) The installation process is somewhat eccentric, and requires a restart of the PC.

Note, too, that Internet Explorer still offers no Autofill button that completes online order forms with a single click. The new placement of controls will baffle veterans of almost any browser — for example, the Back/Forward, Refresh, Home and Stop buttons are no longer near each other.

Finally, Microsoft says IE 7's better compliance with behind-the-scenes Web technology standards will delight Web designers. Still, some Web sites won't look or work right until they're rejiggered to accommodate the new browser. Thousands of lazy designers, for example, deny access to their sites to anyone not using Internet Explorer 6.

If you want the best browser on the market, several million fans will recommend that you look at programs like Firefox or Opera.

But without question, Internet Explorer 7 represents a big, long-awaited step in the direction of modernization. Millions of people still consider Internet Explorer their window into the Internet — and the sooner they leave the 1990's, the better.

Tuesday, August 14, 2012

Know To Create Fake Websit ScreenShot using Firebug


When you think of faked or edited screenshots, programs like Photoshop probably pop into your mind. I’ve never been very creative when it comes to design and graphical work, so that’s nearly out of the question for me. If you’re trying to swap faces in a picture, you’ll need to learn how to use programs like that. If you’re trying to do something like change the text in a Facebook conversation, there’s no need. All you need is Firebug and a PrtScrn key.

Firebug is available for every major browser: IE6+, Firefox, Opera, Safari and Chrome. In this example, I’ll be running you through a tutorial on how to use it for its native browser, Firefox. What is Firebug though? Firebug is a browser add-on that allows you to edit, debug, and monitor CSS, HTML, and JavaScript. To manipulate webpages as I’m going to show you today, you won’t need to know any of those languages.

Installing Firebug

Installation is incredibly easy. Head on over to the official website to download the add-on. From there, select your browser (Firefox preferred, so that following along is easier). Install the add-on and restart your browser if necessary.
Know To Create Fake Websit ScreenShot using Firebug


Using Firebug

Upon installing Firebug, by default, the icon should be displayed in your add-on bar, Tools menu, and possibly the context menu. Click on the icon in your add-on bar and you’ll see a new tab pop up at the bottom of your screen.


Know To Create Fake Websit ScreenShot using Firebug

What you’re seeing here is an HTML view of the elements of the webpage you’re on. In this example, it’s the Firebug download page on Firefox add-ons. If you’re interested in using Firebug for the more usual purposes, feel free to poke around the tabs and get a feel for its features.
The button that I’ve highlighted in that screenshot is the inspect tool. This is the tool we’re going to be using. Click that button and then you’ll notice that every area of text that you hover your cursor over will become highlighted in the webpage view, and then highlighted down in Firebug’s HTML view.



Know To Create Fake Websit ScreenShot using Firebug


Changing Text

Click on the block of text that you want to manipulate. You’ll see that the text has been selected in Firebug’s HTML view. From there, double click the line of HTML that includes the text you want to change. You can begin typing in whatever you want.



Know To Create Fake Websit ScreenShot using Firebug

As you type, you’ll see that the preview updates live on the webpage.


Know To Create Fake Websit ScreenShot using Firebug

Cool, right? It’s especially easy because of the way that Firebug allows you to isolate raw text from wrapped HTML. That way, all HTML elements, CSS styles, and other important visuals are preserved so that it looks like the real copy.


Know To Create Fake Websit ScreenShot using Firebug

As you get more comfortable with Firebug, or if you already know HTML, you’ll find it just as easy to change other on-page elements, like images.

PRASHANT KUMAR

Sunday, August 12, 2012

Know To Disable Error Reporting In XP


The error reporting feature in Windows XP is turned on by default but you may want to disable error reporting for privacy concerns, if you're not connected to the Internet all the time, or to simply stop being alerted by it.
Know To Disable Error Reporting In XP

Error reporting works by prompting you after a critical error in the operating system or in other programs and asking permission to notify Microsoft about it. This way, Microsoft can gather technical information about serious errors from millions of users, helping them develop fixes and service packs.

If you'd like to disable error reporting, follow the easy steps outlined below.

Difficulty: Easy

Time Required: Disabling error reporting in Windows XP usually takes less than 5 minutes

Here's How:

1.Click on Start and then Control Panel.

2.Click on the Performance and Maintenance link.

Note: If you're viewing the Classic View of Control Panel, double-click on the System icon and skip        to Step 4.

3.Under the or pick a Control Panel icon section, click on the System link.

4.In the System Properties window, click on the Advanced tab.

5.Near the bottom of the window, click on the Error Reporting button.

6.In the Error Reporting window that appears, choose the Disable error reporting radio button and click the OK button.

Note: I would recommend leaving the But notify me when critical errors occur checkbox checked. You probably still want Windows XP to notify you about the error, just not Microsoft.

7.Click the OK button on the System Properties window

8.You can now close the Control Panel or Performance and Maintenance window.

Tips: Not a Windows XP user? See How Do I Disable Error Reporting in Windows? for specific instructions for your version of Windows.

PRASHANT KUMAR

Saturday, August 11, 2012

News:Facebook to undergo privacy checks for 20 years


WASHINGTON: Social networking giant Facebook will be subjected to two decades of regular privacy checkups and other penalties, as part of a settlement finalised by the Federal Trade Commission (FTC).

News:Facebook to undergo privacy checks for 20 yearsThe FTC agreement implicated that Facebook must now obtain 'consent' before sharing a user's information with advertisers or others, which differs from its current privacy settings, and also bars the social site from misrepresenting its privacy and security practices again.

The settlement has the same outlines as the agreement, which FTC reached with Google in 2011 over that company's botched rollout of the Buzz social network, Politico reports.

The FTC faulted Facebook in 2011 for the way the company had handled users' private information, and allowed access of third-party apps.

Among other slip-ups, in December of 2009, Facebook changed its site in ways, which resulted in the private information of users being available to the public, the report said.

The FTC also charged Facebook with misrepresenting the sort of information that it shared with advertisers, and said that the social site wasn't clear with users about the fate of their photos and videos, upon deletion of their accounts, as some of the content didn't disappear, contrary to what the site states, it added.

PRASHANT KUMAR

Friday, August 10, 2012

How To Change The Footer Link Of Blogger

------------------------------------------------------------------------------------------------------------
I have not checked the Blogger Terms and Conditions to find out whether you are allowed to remove the Attribution.   Even if they don’t mention it today, a requirement to keep the statement could be added tomorrow.   This advice does not mean that I, or Google/Blogger, are saying that you should/can/may/must remove the attribution statement.
------------------------------------------------------------------------------------------------------------
How To Change The Footer Link Of Blogger

Hey Frnds here is the way of changing or removing blogger footer link.

1  Go to Design > Edit HTML.

2  Take a backup:

Download a copy of your template:  this is a backup – save it somewhere safe, in case things go wrong.

3  Click Expand Widgets, so you can see all the code

4  Find this section in the template:

<!– outside of the include in order to lock Attribution widget –>
<b:section class=’foot’ id=’footer-3' showaddelement=’no’>
<b:widget id=’Attribution2' locked=’true’ title=” type=’Attribution’>
<b:includable id=’main’>
<div class=’widget-content’ style=’text-align: center;’>
<b:if cond=’data:attribution != &quot;&quot;’>
<data:attribution/>
</b:if>
</div>
<b:include name=’quickedit’/>
</b:includable>
</b:widget>
</b:section>

4  Comment-out the code that displays the Attribution gadget, by putting it inside these characters  <!–   –>    so it ends up looking like this

<!– outside of the include in order to lock Attribution widget –>
<!– <b:section class=’foot’ id=’footer-3' showaddelement=’no’>
<b:widget id=’Attribution2' locked=’true’ title=” type=’Attribution’>
<b:includable id=’main’>
<div class=’widget-content’ style=’text-align: center;’>
<b:if cond=’data:attribution != &quot;&quot;’>
<data:attribution/>
</b:if>
</div>
<b:include name=’quickedit’/>
</b:includable>
</b:widget>
</b:section>
–>

5  Preview the template change, to check that everything is ok.  If not, fix the problem.

6  Click Save Template

7  As the template tries to save, you will get a warning message:

Warning: Your new template does not include the following widgets:
Attribution3
Would you like to keep these widgets on your blog or delete them?
Deleting widgets cannot be undone.

Click Keep Widgets:  This will leave an attribution Gadget in the set of Widgets that your blog has data about, even though it’s not actually showing it on the screen.

PRASHANT KUMAR

Thursday, August 9, 2012

Kaspersky :Virus found in Middle East that can spy on finance transactions.

BOSTON: A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab.


A new cyber surveillance virus has been found in the Middle East that can spy on financial transactions, email and social networking activity, according to a leading computer security firm, Kaspersky Lab.
      A new cyber  surveillance virus has been found in 
      the Middle East that can spy on financial
      transactions, email and  social networking 
      activity, according to a leading computer 
      security firm, Kaspersky Lab.
Dubbed Gauss, the virus may also be capable of attacking critical infrastructure and was built in the same laboratories as Stuxnet, the computer worm widely believed to have been used by the United States and Israel to attack Iran's nuclear program, Kaspersky Lab said on Thursday.

The Moscow-based firm said it found Gauss had infected personal computers in Lebanon, Israel and the Palestinian Territories. It declined to speculate on who was behind the virus but said it was related to Stuxnet and two other cyber espionage tools, Flame and Duqu.

"After looking at Stuxnet, Duqu and Flame, we can say with a high degree of certainty that Gauss comes from the same 'factory' or 'factories,'" Kaspersky Lab said in a posting on its website. "All these attack toolkits represent the high end of nation-state-sponsored cyber-espionage and cyber war operations." 

Kaspersky Lab's findings are likely to fuel a growing international debate over the development and use of cyber weapons. Those discussions were stirred up by the discovery of Flame in May by Kaspersky and others. Washington has declined comment on whether it was behind Stuxnet.

According to Kaspersky Lab, Gauss can steal Internet browser passwords and other data, send information about system configurations, steal credentials for accessing banking systems in the Middle East, and hijack login information for social networking sites, email and instant messaging accounts.

Modules in the Gauss virus have internal names that Kaspersky Lab researchers believe were chosen to pay homage to famous mathematicians and philosophers, including Johann Carl Friedrich Gauss, Kurt Godel and Joseph-Louis Lagrange.

Kaspersky Lab said it called the virus Gauss because that is the name of the most important module, which implements its data-stealing capabilities.

One of the firm's top researchers said Gauss also contains a module known as "Godel" that may include a Stuxnet-like weapon for attacking industrial control systems.

Stuxnet, discovered in 2010, spread via USB drives and was designed to attack computers that controlled the centrifuges at a uranium enrichment facility in Natanz, Iran.

PRASHANT KUMAR

Feeds for Google Alerts

Feeds for Google Alerts: Welcome to this Google Alerts feed! Here you will receive new alerts for your News query "mdu". Depending on your query, it might take some time before any items pop up. Go to the Alerts Management console to change the alert query or delete it. Thanks for using Google Alerts.

Wednesday, August 8, 2012

Result of B.Tech. 8th Semester, MDU






Maharshi Dayanand University Rohtak declared the Result B.Tech. 8th Sem. May / June 2012 and the same is available on the official website of the Maharshi Dayanand University www.mdurohtak.ac.in


For View / Print Your Result Click the Link Given Below

Check Daily Website Traffic


We create websites to make business, to become popular and to educate people about the knowledge we have about a particular niche. There are lots of free as well as paid tools available that will give us exact idea about the incoming traffic to a website that you own. But what you will do to check traffic to a website that you don’t own or have any control. Luckily there are some websites that can help you check traffic to your competitor or any website you like. There may be certain variation in the traffic numbers that you get through these websites. But you can use these website traffic numbers to have an idea about the kind of traffic a website must be having. I have noticed some websites giving traffic estimates very close to the original traffic numbers of a website. I came to this conclusion when I checked website traffic for some of websites and blogs whom I own or have access to their Google Analytics Statistics.


Lots of website owners and bloggers use these traffic checking websites to guess about the kind of traffic their competitors are able to generate on daily, month or yearly basis. Some of popular traffic estimating websites are Google Ad Planner, Alexa, Compete, Qunatcast and BuySellAds. You can use these traffic estimating tools to compare how your website is doing in traffic terms when compared with your competitors websites.

5 Ways to Check Website Traffic

Here is the ultimate list of tools that you can use to check website traffic of your competitors or any website of your choice:

1. Google Ad Planner


I would strongly recommend using Google Ad Planner when you are interested in checking website traffic for other’s website. Google Ad Planner will give you very accurate and detailed traffic details about a website in a specific country and worldwide. This traffic estimating tool from Google will give you important traffic metrics like average number of visits per visitors, average time on site, unique visitors, total page views, total unique visitors to a website in month time and broad category for the entered website.


To start using Google Ad Planner to check traffic to a website, click here and enter the website URL in the search box available just after site:. After clicking the arrow mark shown after the search box, you will get detailed traffic details including top keywords, it’s demographic details etc. I have analyzed data available from Google Ad Planner with the traffic details of some websites I own and I find data available from Google Ad Planner very close to my website original traffic numbers. Traffic details available from Google Ad Planner kind of traffic estimating tools can be very handy when we are analyzing the real worth of a website or blog.

Here is a screenshot taken from Google Ad Planner showing traffic details for Problogger.net:


Alexa.com

2. Alexa.com


You need to go to Alexa.com website and enter a website address in the Search Box Available. After entering website address, you will get important metrics like Alexa Traffic rank (Global), Traffic Rank in Specific demographics like for India specific website, Alexa Traffic Rank in India. Apart from Alexa rank, you will see other website traffic numbers like pageviews, pageviews per user, bounce rate, time on site and search percentage. You will also get list of top search queries for a website. So these search queries can be considered as best performing keywords for that website. Apart from this, you can use Alexa.com website to compare your website traffic graph with 4 websites of your choice. Alexa.com will not give any traffic estimates for new or websites with few daily visits. The data available from Alexa.com is not accurate but you can you’re your own prediction about the traffic numbers about a website after using this tool. Alexa take into consideration only those users who have installed Alexa Toolbar in their browsers. So Alexa will no give you traffic details anyway close to a website actual traffic numbers. But still lots of advertisers and industry experts us it as a tool to check traffic on a website.

Here is a screenshot showing traffic numbers for Bloggers Passion blog:



3. Compete.com


Go to compete.com website and enter a website URL in the search box available under ‘See The Traffic For’. This website gather data from US users and the traffic details shared by this website will be close to the actual traffic generated by US websites only. They have active database of 200000 US users that they use to make prediction about a website traffic and engagement metrics. So you will not be able to predict much about website’s traffic through Compete.com having international traffic. You will get unique visitors numbers and some competitor’s websites list with their monthly unique visitor’s numbers.

Here is a Screenshow showing traffic details for Problogger.net blog:


Compete.com



4. QuantCast.com


QuantCast is another popular website traffic estimating tool among internet users. They share traffic details about a website based on the data sources they have. Again, this tool does not give accurate traffic numbers about a website.

Here is a screenshot checking website traffic for Problogger.net from QuantCast website:


QuantCast.com

5. BuySellAds.com


Basically BuySellAds (BSA) is an ad network for selling banner advertisements on our websites and blogs. We will get traffic estimates very close to the actual traffic numbers on a page, the only condition is that that website or blog should have buysellads script installed. So we can believe on the data available from BSA. The only downside is that we can get estimated page impressions for a website selling advertisement through BSA. To know traffic details about a website, you need to click on the Your Ads here banner pointing to BuySellAds.com website. Here is a screenshot showing the kind of metrics you will get through BSA.

So, BuySellAds website is giving monthly impressions, Alexa Rank, Compete Rank, Delicious Saves, Twitter Followers, Facebook Likes, Current Page Rank and SeoMoz rank for a website.

Here is a Screenshot checking website trafic numbers for Search Engine Journal using BuySellAds.com website:
BuySellAds.com traffic checker



This is how I used to check website traffic through the 5 traffic estimating tools, would you be interested in sharing how you used to check a website traffic, please share in the comments section below.

Tuesday, August 7, 2012

Add Social Bookmarking Widget With Tooltips For Blogger


Social bookmarking widget is need of every blogger thats why you see such gadgets almost on every blog.Social bookmarking widgets helps you to boost traffic on your blog.Today I am sharing an amazing social bookmarking widget which comes with beautiful animated tooltips,when any user hovers on the social icons the tooltip comes out also it applies a opacity effect to these social icons,this effect increase beauty of this widget.Credit for this widget goes to Shareaholic.Now lets see hoe to add it to your blog,also see the demo at the bottom of this post.

How To Add This Widget To Blogger?


I have created a blogger widget generator form for this widget.Follow below simple steps to add this widget to your blog.

You must login to your blogger account first.
Click on below Add to Blogger button
Now you will redirect to blogger add widget page
Choose your blog and add click on Add Widget button
Drag the widget at the bottom of your page layout
Finally click on Save Arrangements button and you are done.

Note - This widget will appear on post pages only,if you want to show this widget at the bottom of every post on your homepage then remove first line (<b:if cond='data:blog.pageType == "item"'>) and last line(</b:if> from the code.

Monday, August 6, 2012

How To Make Blog Post Audioble


Hey frnds have you ever thought of making your blog post audioble for the the comfort of readers.
If not than here is the steps for it....


Its very easy!You have to follow just the steps given below.
First go to the Sign up page and fill the form as shown in the picture below and click submit button.Note that you can add your blog URL or your Feed URL.


Now you have to check your Email in which you will get a Blog or Feed id e.g.22350.
Now Grab those listen buttons by Clicking here.
Now you will see a blank area in front of Feed id as shown in picture below.You will enter that Feed id there and click submit button.
When you click the submit button, you will be taken to another page in which you will see a button "Add Odiogo Listen Button Widget", click this button.
You will be drop to blogger add widget page.You have to click the Edit Content link to have the widget code as shown in picture below.Select all that code and copy it to a notepad.




If you want the widget to appera below post title, you have to search this code in your blogger template shown below:
<div class='post-header-line-1'>
After this copy the Odiogo widget code and paste it here and click encode button.Now add the encoded code just below the code shown above.Note that you have to put enclose the encoded code b/w <div> and </div>.




If you want the widget to appear at the end of post body, you have to add the encoded code with "div" tags enclosed just below the code given:
<data:post.body/>


Save your template and you are done.


Thats it!!
Now enjoy your blog.


PRASHANT KUMAR

Sunday, August 5, 2012

Know To Make Use Of CSS To Create An Image Map On Websites.


In the early days of the World Wide Web, HTML designers were always on the lookout for ways to make their pages as graphically and feature rich as possible. This was no small task. XHTML, CSS, JavaScript and Flash were nowhere to be seen and companies were pressed to make their presence on the Web memorable and unique as everyone rushed into this new frontier.

One of the Web designer’s most trusted tools to this end was the Image Map. Basically an elaborate variation of the <a> tag, an image map allowed an image file to contain multiple hotspots that linked to any number of Web pages or external sites. Many early Web sites relied on an image map on the home page to uniquely identify themselves.

But thanks to the rise of Flash technology, image maps are rarely used anymore. However, CSS does allow you to create an image map with some subtle mouse over effects with a few slick modifications to the <ul> and <li> tags.


For this exercise, we’re going to use the image shown in Figure A to create an image map with two hotspots using CSS code. Save the file to your hard drive and then open it in an image editor that will allow you to measure the image in pixels.

Figure A




This image will be used to create a CSS image map

Now that you have the image saved to your hard drive and open in an image editor, let’s start coding the HTML and CSS code that will make the image map. In a text or HTML editor, enter the code in Listing A, then save your file with an .htm extension.

Listing A


<html>


<head> 


<title>CSS Image Map</title> 


</head> 


<body>


<div id="photo"> <ul>


<li class="apple"><a href="http://www.bestapples.com" title="Washington Apples">Washington Apples</a></li> 


<li class="orange"><a href="http://www.floridaorange.com" title="Florida Oranges">Florida Oranges</a></li> 


</ul> 


</div> 


</body>


</html>


You can see that by the content of the body of the HTML code that we will be using CSS to style a bullet list (i.e., <ul> and <li> tags) in order to make the hotspots for our image map. In fact, if you were to preview the document in a browser right now, all you would see is a bullet list.

Let’s start writing the CSS code and creating a style ID called “photo.” Begin by entering the code into the <head> of the document that you see in Listing B.

Listing B


<html>


 <head> 


<title>CSS Image Map</title> 


<style type="text/css">  


#photo {     


width: 300px;      


height: 224px;     


position: relative;       


background-image: url(images/fruity_cones.jpg);    


background-repeat: no-repeat;


 } 


</style>


</head> 


<body>


<div id="photo"> <ul>


<li class="apple"><a href="http://www.bestapples.com" title="Washington Apples">Washington Apples</a></li> 


<li class="orange"><a href="http://www.floridaorange.com" title="Florida Oranges">Florida Oranges</a></li> 


</ul> 


</div> 


</body>


</html>


Note in line five of the code that the CSS style is denoted with a hash mark, or pound sign (#), at the beginning of the photo style. This tells the browser that the style is an ID type and not a Class type, which is denoted with a period (.). CSS IDs are preferable to Classes in many cases, because if an HTML element is wrapped with <div> tag that is defined as an ID, rather than as a Class, we can define how other HTML tags within that <div id> will be displayed and no further markup to the HTML within that <div id> tag will be needed.

You can also see in line nine of the code that we are using the downloaded image from Figure A as a background image. This is because both Internet Explorer 6 and 7 have issues displaying the <ul> and <li> elements over an image that is placed with an <img> tag. Be sure that the path to the image fruity_cones.jpg on your hard drive is accurately coded in relationship the .htm document that you’re building.

Now that the #photo ID has been established, let’s code the cascading elements that will appear within the ID. Enter the new code that you see in Listing C.

Lisitng C


<html>


 <head> 


<title>CSS Image Map</title> 


<style type="text/css">  


#photo {     


width: 300px;      


height: 224px;     


position: relative;       


background-image: url(images/fruity_cones.jpg);    


background-repeat: no-repeat;


 } 


#photo ul {   


margin: 0;   


padding: 0;   


list-style: none;


 } 


</style>


</head> 


<body>


<div id="photo"> <ul>


<li class="apple"><a href="http://www.bestapples.com" title="Washington Apples">Washington Apples</a></li> 


<li class="orange"><a href="http://www.floridaorange.com" title="Florida Oranges">Florida Oranges</a></li> 


</ul> 


</div> 


</body>


</html>


By defining any <ul> tag that is wrapped within the #photo ID as having a list-style of none, we are stripping the display of any type of bullet points.

Continuing on, let’s code how the <a> tag will appear within the #photo ID. Enter the code in Listing D.

Listing D


<html>


 <head> 


<title>CSS Image Map</title> 


<style type="text/css">  


#photo {     


width: 300px;      


height: 224px;     


position: relative;       


background-image: url(images/fruity_cones.jpg);    


background-repeat: no-repeat;


 } 


#photo ul {   


margin: 0;   


padding: 0;   


list-style: none;


 } 


#photo a {   


position: absolute;       


width: 60px;       


height: 60px;      


text-indent: -1000em; 





#photo a:hover {   


border: 1px solid #fff; 





</style>


</head> 


<body>


<div id="photo"> <ul>


<li class="apple"><a href="http://www.bestapples.com" title="Washington Apples">Washington Apples</a></li> 


<li class="orange"><a href="http://www.floridaorange.com" title="Florida Oranges">Florida Oranges</a></li> 


</ul> 


</div> 


</body>


</html>


When defining the <a> tag style within the #photo ID, it is important that the position: absolute; attribute is present, because it tells the browser to constrain them to the top-left corner of the photo. Otherwise, the hotspots in the final image map would be off by however many pixels the browser is going to use to float the background image.

The width and height define the size of the clickable hotspots on the image map, while the vital attribute text-indent: -1000em; tells the browser to display the hotlinked copy within the <li> tags way, way, to the left of the browser window so that they will never be displayed over the background image.

We’ve also defined an a:hover class within the #photo ID, so that when the user’s mouse cursor hovers over a hotspot on the image map, a white box will appear.

The last bit of coding is the trickiest. Go to your image editor, where the image you downloaded in Figure A should still be open. Measure, in pixels, how far from the top and the left edges of the image you should place the hotspots for your links. In this example, we’re going to link to two external Websites. One will be linked by clicking on the apple, the other by clicking on the orange.

Therefore, we need to define two new classes of the <a> tag, which will be wrapped in the <div id=”photo”> tag. We’ll call them apple and orange. These classes will also dictate the location of the links on the background image. Add the new code that you see in Listing E.

Listing E


<html>


 <head> 


<title>CSS Image Map</title> 


<style type="text/css">  


#photo {     


width: 300px;      


height: 224px;     


position: relative;       


background-image: url(images/fruity_cones.jpg);    


background-repeat: no-repeat;


 } 


#photo ul {   


margin: 0;   


padding: 0;   


list-style: none;


 } 


#photo a {   


position: absolute;       


width: 60px;       


height: 60px;      


text-indent: -1000em; 





#photo a:hover {   


border: 1px solid #fff; 





#photo .apple a {  


top: 29px;   


left: 95px; }


#photo .orange a {        


top: 131px;  


left: 152px; }


</style>


</head> 


<body>


<div id="photo"> <ul>


<li class="apple"><a href="http://www.bestapples.com" title="Washington Apples">Washington Apples</a></li> 


<li class="orange"><a href="http://www.floridaorange.com" title="Florida Oranges">Florida Oranges</a></li> 


</ul> 


</div> 


</body>


</html>


And with that, our CSS image map is complete. Save the document and preview it in your browser. (Figure B) You’ll see that the title attributes in the <a> tags of the document give us a nice label, ala the <alt> tag.

Figure B



The final CSS Image map, with mouseover effects

While Image maps are still considered valid HTML, you can use this CSS method to finally separate content from presentation. It also has the advantage of using less code for more complex image maps, and is good practice for knowing when to declare IDs rather than Classes in your CSS code.

Friday, August 3, 2012

Know To Get Gmail Account Recovery and Security

Know To Get Gmail Account Recovery and Security


The propose of this article is to help guide you through the process of recovering a lost account and (if it was lost due to hacking) re-securing it so that is it less likely to be lost again.

There are other sources of information including the Gmail* help center http://mail.google.com/support/?hl=en and the GMail help forums http://www.google.com/support/forum/p/gmail?hl=en both of which support searching for topics of interest.

Please note that you can not recover your account by posting to the Gmail help forum. You must follow the procedures outlined below.


How to Recover Your Account

Here i am going to explain you all about how to get back the Hacked Gmail Account.
So here is the trick explained for this purpose.

This article is only for the education purpose and not for any misuse of this artcle.

There are other sources of information including the Gmail help center http://mail.google.com/support/?hl=en and the GMail help forums http://www.google.com/support/forum/p/gmail?hl=en both of which support searching for topics of interest.

Please note that you can not recover your account by posting to the Gmail help forum. You must follow the procedures outlined below

We will assume you went to https://mail.google.com/ and tried to log into your account. It didn’t work and you found your way here. You need to start with the following decision tree to determine what actions you need to take to recover your account.

If your password does not work, use the “Can’t access your account?” link which will direct you to a page with three recovery options:
Answer your security question and perform an on-line password reset.
Request a password reset e-mail to be sent to your recovery account.
Proceed to one of two versions of the Account Recovery Form (for accounts with or without 2-step verification enabled). Look for a "Verify your identity" link if the other options don't work.
https://www.google.com/accounts/recovery?hl=en

If you are told the account does not exist, it may have been deleted by the hacker, so use the Account Recovery Form to try and recover it:
https://www.google.com/support/accounts/bin/request.py?ara=1

If you are instructed to supply a mobile number to receive a SMS code, you need to follow the process as described:
http://www.google.com/support/forum/p/gmail/thread?tid=69a33682180a6d01&hl=en
http://mail.google.com/support/bin/answer.py?answer=114129

“Lockout (Sector 4)”, is because of abnormal account usage that may indicate compromise. It should automatically unlock in 24 hours or less.
http://mail.google.com/support/bin/answer.py?answer=43692

“Temporary Error (502)” or 500, indicates an internal error that should correct itself soon.
http://mail.google.com/support/bin/answer.py?answer=140031

Any message about account “maintenance”, indicates that temporary server maintenance is in process which should take less that 24 hours.
http://mail.google.com/support/bin/answer.py?hl=en&answer=63592

Any message about your account being “Disabled” or “Suspended, typically indicates some abuse, violation of the Terms of Service, or possibly a compromised account. Follow any instruction given or provided links when you try to sign in.
http://mail.google.com/support/bin/answer.py?hl=en&answer=43692

If you see some other error not listed above, use the following more comprehensive list of possible errors.
http://mail.google.com/support/bin/static.py?hl=en&page=error_msg.cs

If you are still unsure what to do, there is a help article that you can also use to walk through the process of account recovery. It handles some specific cases not covered above. You might find it more useful if you are not sure just what you should do for your specific case.
http://mail.google.com/support/bin/answer.py?hl=en&answer=46346

Additional Recovery Information
Doing a password reset is the easiest way to regain access to an account. But it can fail if you forgot your secret question, if the recover e-mail address is no longer valid, or it the account was compromised and that information changed.

The Account Recovery Form is the alternative method. It is important that you complete as much of the form as possible, and that the information be as accurate as you can make it. If the form is rejected you can try submitting it again. You can re-submit it as many times as you want, but always wait for a reply to each submission before submitting again. If you don’t receive a reply, check your spam/junk folder (especially if it’s a non-Gmail account).

It’s very important that as you repeatedly submit the Account Recovery Form that you fill in more of the blanks with more accurate information. There is some threshold of correct information you need to prove ownership, so a rejection means you need to supply more. Submitting the same form with no additional information multiple times does not help.

While this system works for many people, there are some cases where it can be very frustrating. But don’t give up. There’s nothing you can do (like deleting the account) until you re-gain access to it and since Google does not offer live one on one support for the free Gmail product directly these are your options.

Also realize that the more complicated account recover process (that very few people need to use) is one of the trade-offs for not being forced to provide a lot of personal information when you create the account (that everyone has to do). Many people prefer this for privacy reasons.

Hints for successful account recovery

It’s not about the number of times you submit the Account Recovery Form, it’s about providing more and better answers with each attempt. If your submission is rejected, you must work harder to provide more answers, and make the answers more accurate in subsequent submissions.
Wait for a response before each new submission (be sure to check Spam). Responses could be delayed as much as 24 hours but you should wait a full 48 hours before submitting another form.
If you are not receiving a response, check your Spam or Junk folder on the account you specified for replies. Also double (triple) check that you correctly spelled the e-mail account name.
Duplicate submissions, or submissions without waiting for a reply can trigger a submission lock forcing you to wait a few days to try again.
Make your best guess on every field of the form. You never know what will help.
There may be one other option for simple password recovery if your account wasn’t compromised and you simply forgot your password. If you have your browser setup to remember your account information you may be able to view your saved password. In Firefox, you can use: Tools->Options, Security, Saved Password, Show Passwords. If you use another browser, then (install and) open Firefox, use File->Import to import your settings and then check to see if the saved password is accessible. Again, this only works for people who forgot their password due to relying on the browser’s auto-fill function, but if it applies it might be an easier than the above procedures.


FAQ About Account Recovery

Q. Why can’t I tell someone private information about my account that they could look up to verify my claim?
A. Account privacy rules are very strict within Google, and allowing employees to look at the contents of an account would be a serious breach of privacy.

Q. Why isn’t there a comments section on the Account Recovery Form where I could add additional information to prove my claim?
A. Like above, it would be a violation of account privacy for an employee to look in the account to verify any additional information supplied.

Q. Why can’t I simply talk to somebody about this?
A. Unfortunately, Google does not offer live support for the free Gmail product (see: http://mail.google.com/support/bin/request.py?contact_type=contact_policy). You must use the recovery methods provided.

Q. Why can’t Google lock the account to protect it from any more damage or outgoing spam.
A. They will lock an account that the detection system identifies as being compromised and sending out spam. But again, privacy concerns would prevent them from simply locking an account because someone claims it’s theirs and is compromised. In addition, since there is no live support, there is no one to even make such a request to.

Q. I had a really long password of random strings that would be impossible to guess. How was my account compromised?
A. Google (as most e-mail providers) have blocks to prevent trying lots of passwords to guess the correct one (brute-force attacks). Most accounts are compromised by harvesting passwords other ways. While a secure password is important, it’s only one in a long list of things needed to keep any online account secure.

Q. But I’m very careful with my password. I don’t give it to anyone except an official request from Gmail.
A. Unfortunately if you provided your password in response to any e-mail (even claiming to be from Google/Gmail) then your password was harvested by phishing. It’s very common, and can trick even the most careful people.

Q. My contacts were deleted by the hacker, how do I recover them?
A. Deleted contacts can now be restored to any point in the last thirty-days: http://mail.google.com/support/bin/answer.py?hl=en&answer=1069522

Q. My e-mail history was deleted by the hacker, how do I recover it?
A. Have you looked in All Mail and Trash for the missing information? Have you used Search to try and find it? Unfortunately, messages deleted from Trash or Spam can not be recovered. If you would like to request Google attempt to recovery messages deleted by a hacker, see: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256

Q. My account was deleted by the hacker, can I recover it?
A. The Account Recovery Form can sometimes restore a recently deleted account. That is your only option in this case.

Q. I don’t care about the account, can I just get the e-mail history or the contacts from it.
A. Unfortunately, you have to be able to access the account in order to transfer any information out of it. This means you need to try and recover the account.

Q. I don’t care about the contents, I just need the e-mail address back because I have other things linked to that address.
A. Account names are never re-used, so you can’t re-create the account. So to get the name back you will have to try and recover the account.

Q. Can I find out who did this? Can anyone prosecute them?
A. About the only information you have available is the list of the last 10 IPs to access your account (see the Details link below the Inbox). But given how easy it is to fake IPs, and how inaccurate they are, it’s unlikely that more than a general location can be determined. In general, law enforcement is not interested in a simple compromised account, and Google is not a law enforcement agency. Bottom line is: one’s energy is better spent on recovery and re-securing the account.

Q. Isn’t what the person did illegal? Can I sue them or get them arrested?
A. Any legal questions should be asked of local law enforcement or an attorney. Google is neither of those and can not advise you on any actions.

Q. Can I find out what they did in my account while they had access.
A. There are no account activity logs available, so you can’t find out for sure. If there is spam in your Sent Mail, they you know they used the account for that. But there’s no way to know if or what messages they may have looked at, so take appropriate precautions.

Q. How was my account compromised?
A. There are many ways passwords can be harvested and account compromised, but the most common ones include:
Using the same password on multiple web-sites. A less secure site is hacked and they get the user database (e-mail and password) and then just try them all. If the person did not use a unique password, the hacker gains access to the e-mail account.
Phishing e-mails that ask for account information or direct you to a phishing web-site. Don’t dismiss this because the messages are a lot more convincing that you would imagine, often using text copied from actual Google e-mails or on-line forms.
Use of a computer that is infected with a key-logger or other malware (most common for public computers like at a school or library) which records your login information.

When you reclaim Your Account

Begin by scrolling to the bottom of your Gmail page and see if there are any other sessions signed into your account (“This account is open in 1 other location”). Then click the word “Details” where it says “Last account activity” and then “Sign out all other sessions”. Now change your password to anything reasonable but without worrying too much about how secure because you are going to change it again. Next check all the following items and verify that they are set correctly.

Note: in the following “Settings” means “Mail settings” as found under the Gear icon in the upper/right of the Gmail window. If you still have the old layout, then “Settings” will be one of the choices along the top. If you have the older “Settings” link, some of the paths below will be slightly different.

Potential Spam:
Settings -> General -> Signature [make sure nothing as been added]
Settings -> General -> Vacation Responder [make sure it's disabled and empty]
E-mail Theft
Settings -> Forwarding and POP/IMAP -> POP Download [disabled]
Settings -> Forwarding and POP/IMAP -> IMAP Access [disabled]
Settings -> Forwarding and POP/IMAP -> Forwarding [disabled or correct address]
Settings -> Filters [no filters that forward or delete e-mail]
Settings -> Accounts and Import -> Send Mail As [make sure it is using your correct e-mail address, delete any unrecognized entries]
Account Security:
Settings -> Accounts and Import -> Change Account Settings -> Change Password [pick a new secure password]
Settings -> Accounts and Import -> Change Account Settings -> Change password recovery options [verify secret question, SMS and recovery e-mail address]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Email Address -> Edit [verify your name and other settings]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Authorizing applications & sites [revoke Access to any sites listed]
Settings -> Accounts and Import -> Change Account Settings -> Other Google account settings -> Using 2-step verification [enable 2-step verification]
Now that your account is secure, check again for other sessions logged in. If there is still another session on the account, repeat the above until you successfully get everything secured while no one else is logged in.
Additional Information
Gmail Security Checklist: http://mail.google.com/support/bin/static.py?hl=en&page=checklist.cs&tab=29488
Keeping account secure: https://mail.google.com/support/bin/answer.py?hl=en&answer=46526
Protecting your account: https://mail.google.com/support/bin/answer.py?hl=en&answer=29407
More account security info: http://www.google.com/help/security/
If your account is compromised: http://mail.google.com/support/bin/answer.py?hl=en&answer=50270
If you are missing messages after recovering your account: http://mail.google.com/support/bin/answer.py?hl=en&answer=8256
Someone using your address: http://mail.google.com/support/bin/answer.py?hl=en&answer=50200
Google Employee comments: http://www.google.com/support/forum/p/gmail/thread?tid=560d53dee40be5e6&hl=en&start=70

In this way you can recover your gmail account.


PRASHANT KUMAR

Related Posts Plugin for WordPress, Blogger...