Blogger Templates

பல இணைய தளங்களிலிருந்து சேகரித்தவைகளை பலருக்கும் பயனாக அமையும் என்ற நோக்கம் கருதி இந்த - Blogல் பதிந்துள்ளேன்

- பொன்.சுதாகர்

Monday, November 29, 2010

Folder Lock without any Software...

Many people have been looking for a way to lock folders without the use of any alternative software. So, here you go.


Here is the easy method to lack the folders without using a software. Open Notepad and copy the below code and save as locker.bat. Please don't forget to change your password in the code it's shown the place where to type your password.

Now double click on locker .bat

First time start, it will create folder with Locker automatically for u. After creation of the Locker folder, place the contents u want to lock inside the Locker Folder and run locker.bat again. The Locker folder disappears from the window. To make the folder available again, double click the locker.bat and enter the password. And you get your folder back!
 
cls

@ECHO OFF
title Folder Locker
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B303
09D}" goto UNLOCK
if NOT EXIST Locker goto MDLOCKER
:CONFIRM
echo Are you sure u want to Lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END

if %cho%==N goto END

echo Invalid choice.

goto CONFIRM
:LOCK
ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked

goto End
:UNLOCK
echo Enter password to Unlock folder

set/p "pass=>"

if NOT %pass%== type your password here goto FAIL

attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"

ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker

echo Folder Unlocked successfully

goto End
:FAIL
echo Invalid password

goto end
:MDLOCKER
md Locker
echo Locker created successfully

goto End

:End
Share:

Open Blocked Websites....

 
Steps are described as follows :-

1. Go to Google
2.Type transparent free proxy address free.
3.Click on the transparent proxy fresh transparent proxy list
4.Look for a proxy address with port 8080
5.Now go to tools menu of internet explorer
6.Go to internet options
7.connections tab
8.click Activate use a proxy server for ur LAN options
9.Put that number that you found in the website with 8080 port and hit Ok
10.Again Ok Now open any websites. ...........

                                       Enjoy Moments of Life Make it Large
Share:

How to Configure Gmail in Microsoft Outlook?

         Configuring your Gmail account in Microsoft Outlook would become as easy as 1, 2, 3 for you after reading the below mentioned step by step process. Gmail messages can now be retrieved with the help of any device or client which can provide POP support and Microsoft Outlook is one of those clients that offer POP support to their users. Just concentrate and read the every step carefully to understand the whole process:

POP Option Enabling in Gmail:



■First of all login to your Gmail account

■Then click on “Settings” option which can be seen on right top of your screen

■There you will find “Forwarding and POP / IMAP” option, click on it

■There an option i.e. “Enable POP for All Mails” or “Enable POP for Mail” should be clicked

■Now an action would be asked to choose after getting POP access from Gmail. Choose appropriate one that suits your need

■Check “Configure your POP client” and then a button saying “Save Changes” should be pressed.
 
Configuration in Microsoft Outlook 2007


■We consider that you have already opened Microsoft Outlook 2007, click Tools Menu

■Click an option “E-mail Account”

■There you will see an option “Add a new e-mail account” select it and then click on the button “New”

■There you will be asked by the system to select server type. POP3 or POP option must be selected ….. then click on the option “Next”

■Now system will ask for necessary setting. Put on your desired / required setting including email address and password of your email

■Write “pop.gmail.com” as your incoming mail server and as the settings of outgoing mail server “smtp.gmail.com” must be written in the required field

■Then click on the button that says “More Settings . . .”

■Then click on the tab saying “Outgoing Server” and an option saying “My outgoing server (SMTP) requires authentication” must be checked by you. It will increase security and a password will be required to even send a single email from this Microsoft Outlook in addition to receiving email

■Then on the same screen, you will see a tab saying “Advanced”, click on it

■Here you will have to change port numbers for your incoming and outgoing mail server but first you need to check the appropriate box before assigning any value

■Incoming server should be set a port value as “465” and “995” port number should be set to outgoing mail server

■That’s it. You are done and finally have set up Gmail in Microsoft Outlook 2007.
Share:

Monday, November 22, 2010

USE USB AS A KEY TO START WINDOWS

Most of us are concerned about the security and privacy of our data. We put login passwords, encrypt data and do various other tricks to ensure that someone cannot access our system without our authorization. Hardware manufacturers have also started exploiting our desire for data security by offering fingerprint readers, face recognition and other fancy stuff. If you are paranoid about who accesses your system, you can use a simple trick to prevent the system from booting unless you want it to boot.
This can be achieved by using a regular USB/pen/thumb drive (whatever you call it). Basically configure your system to boot windows from USB stick. The hack would be more than enough to keep even your curious geeky computer friends from booting into the system. That said, it is by no means foolproof (which security measure is? ) so you might not want to bet your life on it.

*** DISCLAIMER : the following method requires you to make some changes to your operating system.MakeUseOf cannot accept any legal liability if anything goes wrong with your PC and you should proceed at your own risk.Please read the instructions thoroughly before beginning and if you are still not sure what you are doing, you should seek help from a knowledgeable friend ***
A key requirement for the hack to work is that your system should support booting from a USB device. This can be verified from within the BIOS menu. So if you have an older system that doesn’t support booting from USB devices, this one is not for you. We will cook up something else! Although, now that I think about it, theoretically (because I have not tried) the hack should work with a floppy disk as well. So you guys with older systems can also follow along and let us know if it worked.
What we are going to do is transfer some of the important files (you will see which ones) that Windows needs in order to boot, to the USB drive. Now if someone was to boot up the PC without your USB drive the system won’t find these important files and will thus fail to boot.
So now that you know the concept, let’s get working:
  • Format the USB drive.
  •  Within Windows Explorer go to Tools > Folder Options. Within the View tab, choose “Show hidden files” and uncheck “Hide protected operating system files”.
    usb key lock computer
  • Open up the Windows Partition (usually C:), copy boot.ini, NTLDR and ntdetect.com onto your USB drive.
  • Boot up the system and change the boot order preference to check for a USB device first. You can access the BIOS menu generally by hitting F8 when the computer just starts.

 Just in case you are curious, the boot.ini file is required to tell where the operating system resides. NTLDR is the NT loader which actually loads the operating system. ntdetect.com detects basic hardware that is required to boot up the system.

The changes are fully recoverable, although it would require some work for the uninitiated. If something goes wrong or you want to restore back things as they were then use the Recovery Console from your Windows CD.
Share:

BLOCK UNWANTED EMAILS

no email
For Gmail:
1. Login to your account
2. At the top-right corner, click on Settings
3. Under Settings,click on Filters
4. You’ll now see an option “Create a new filter“, click on it.
5. Now in the From field enter the email address from which you do not want to receive the emails
For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.
6. Click on Next Step, select the action you’d like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you’ve created.

For Yahoo:
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. In the left panel select the option Filters and click on create or edit filters
5. Now click on Add 6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.
Fox ex. nishantsri12345@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail:
1. Login to your account
2. At the top-right corner, click on Options
3. A drop down menu appears, now click on More options
4. Click on Safe and blocked senders link under Junk e-mail
5. Now click on Blocked senders
6. Type in the email address that you want to block under blocked e-mail address or domain field.
For ex. Enter nishantsri12345@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain. That’s it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy.
Share:

MS - Office Password Breaker full version download

ms office password  breaker

Description:


Forgetting a password to your own Word document or Excel worksheet is surely annoying, but interfering with the office workflow causes substantial damage. If youÆre not in hurry, you can try guessing the password. If you have no time to play games, just unlock your documents and spreadsheets û guaranteed! No matter how long and complex your passwords are, Advanced Office Password breaker recovers Word documents and Excel spreadsheets within a limited timeframe. No need to perform lengthy attacks while a
40-bit encryption key can be crunched quickly and efficiently, and more importantly, with a guaranteed positive result.

Advanced Office Password Breaker unlocks documents created with Microsoft Office Word and Excel 97 and 2000, as well as documents saved with Microsoft Office XP and 2003 in Office 97/2000 Compatibility Mode.

Download Link
Advanced Office Password Breaker Pro 2.0.rar
Share:

How To Protect USB Drive From Virus When Attached To Infected Computer






Have you ever attached a USB to a computer and later found out that the drive is infected by a virus? I have definitely faced this situation many times. If you attach your USB drive to the infected computer the virus is transferred to the drive in no time infecting all the important documents in USB drive too, depending on the nature of the virus you may loose important data from the USB drive and never recover them back. But there is a solution to protect your USB drive from virus infection when it is connected to already infected computer.If you make your USB drive into non writable mode then any kind of data can’t be written to it which means that if a virus infected computer is going to transmit any virus to drive, it won’t be able to because USB drive is write protected.
WRITE PROTECT SWITCH





THUMBSCREW

Thumbscrew is a freeware application that lets you write protect your USB drive so that virus, Malware, Trojan or any kind of infection from host computer.
usb
Would not be able to write anything on your USB. Now right click the system try icon andchoose Make USB read only. This would make the USB drive write protected which makes it completely protected from infections to to spread onto your drive.

USB WRITE PROTECTOR


USB Write Protector is another free utility that allows you make write protect your USB flash / pen drives just like Thumbscrew mentioned above. This is a very small utility that you can always carry with you in your portable drive.By these applications your pen drive would be protected on that shared system but it is still recommended for you to use a quality antivirus software, and keep it updated regularly.

usb write protector
Share:

Restart Windows without Restarting your PC!


When youclickon the shutdownbutton, make sure to simultaneously press SHIFT Button. If you hold the SHIFT key down whileclickingonSHUTDOWNbutton, you computer would restart without restarting the computer.    

This is equivalent to term "HOT REBOOT".

Share:

Hack PC while Chatting

I am not sure that this will work 100 %.
But yes will work almost 70 percent of the times.
But before that you need to know some few things of yahoo chat protocol
leave a comment here after u see the post lemme know if it does works or not or u having a problem post here.
Following are the features : -

1) When we chat on yahoo every thing goes through the server.Only when we chat thats messages.
2) When we send files yahoo has 2 options
         a) Either it uploads the file and then the other client has to down load it.
         b) Either it connects to the client directly and gets the files
3) When we use video or audio:-
         a) It either goes thru the server
                           Or
         b) It has client to client connection
And when we have client to client connection the opponents IP is revealed.On the 5051 port.So how do we exploit the Chat user when he gets a direct connection. And how do we go about it.Remember i am here to hack a system with out using a TOOL only by simple net commands and yahoo chat techniques.Thats what makes a difference between a real hacker and new bies.

So lets analyse

1) Its impossible to get a Attackers IP address when you only chat.
2) There are 50 % chances of getting a IP address when you send files
3) Again 50 % chances of getting IP when you use video or audio.

So why to wait lets exploit those 50 % chances .
I'll explain only for files here which lies same for Video or audio
1) Go to dos
type ->
netstat -n 3
You will get the following output.Just do not care and be cool
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED
Active Connections
Proto Local Address Foreign Address State
TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED
TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED
TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED
TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

Just i will explain what the out put is in general.In left hand side is your IP address.And in right hand side is the IP address of the foreign machine.And the port to which is connected.Ok now so what next ->
2) Try sending a file to the Target .
if the files comes from server.Thats the file is uploaded leave itYou will not get the ip.But if a direct connection is established
HMMMM then the first attacker first phase is over
This is the output in your netstat.The 5101 number port is where the Attacker is connected.
Active Connections
Proto Local Address Foreign Address State

TCP 194.30.209.15:1631 194.30.209.20:5900 ESTABLISHED

TCP 194.30.209.15:2736 216.136.224.214:5050 ESTABLISHED

TCP 194.30.209.15:2750 64.4.13.85:1863 ESTABLISHED

TCP 194.30.209.15:2864 64.4.12.200:1863 ESTABLISHED

TCP 194.30.209.15:5101 194.30.209.14:3290 ESTABLISHED
3) so what next???

Hmmm........ Ok so make a DOS attack now

Go to dos prompt and

Just do

nbtstat -A Attackers IPaddress.Can happen that if system is not protected then you can see the whole network.

C:\>nbtstat -A 194.30.209.14
Local Area Connection:

Node IpAddress: [194.30.209.15] Scope Id: []

NetBIOS Remote Machine Name Table

Name Type Status
---------------------------------------------

EDP12 <00> UNIQUE Registered

XYZ <00> GROUP Registered

XYZ <20> UNIQUE Registered

XYZCOMP1 <1e> GROUP Registered

MAC Address = 00-C0-W0-D5-EF-9A

What to do next??

It is now ur job to tell me what u have done next...

So the conclusion is never exchange files , video or audio till you know that the user with whom you are chatting is not going to harm you.
Share:

Change the Default Locations for Installation

To change the default drive or path where Windows will look for it's installation files, go to the key:


HKEY_LOCAL_MACHINESoftwareMicrosoftWindowsCurrentVersionSetupSourcePath

Now you can edit as you wish.

Important Note: Before you read on, you need to keep one thing in mind. Whenever you make changes to the Windows Registry you need to Refresh it before the changes take place. Simply press F5 to refresh the registry and enable the changes. If this does not work Restart your system.
Share:

Clipboard Hack Problem - Shocking news about CTRL+C

Ctrl+C may be the most important work we do everyday. But it's not a very safe thing to do. Read on to know why. What happens when you press Ctrl+C while you are online. We do copy various data by Ctrl + C for pasting elsewhere. This copied data is stored in clipboard and is accessible from the net by a combination of Javascripts and ASP. This is called clipboard hack problem.


Just try this:
1. Copy any text by Ctrl + C
2. Click the Link: http://www.sourcecodesworld.com/special/clipboard.asp
3. You will see the text you copied was accessed by this web page.

Surprised! Do not keep sensitive data (like passwords, credit card numbers, PIN etc.) in the clipboard while surfing the web. It is extremely easy to extract the text stored in the clipboard to steal your sensitive information. Forward this information to as many friends as you can, to save them from online frauds!


It is true, text you last copied for pasting (copy & paste) can be stolen when you visit web sites using a combination of JavaScript and ASP (or PHP, or CGI) to write your possible sensitive data to a database on another server.

How Cipboard Hack is done?

The Clipboard hack is done by the following Source Code:


How to safeguard yourself from Clipboard Hack Problem?

To avoid clipboard hack problem, do the following:

1. Go to Tools->internet options->security.
2. Press custom level.
3. In the security settings, select disable under Allow paste operations via script. (Scripting sub heading)

Now the contents of your clipboard are safe.

Interestingly, this hack works only on internet explorer, and not on Mozilla Firefox browser. Please forward this article to as many friends as you can to make them aware of this issue with CTRL+C.
Share:

Thursday, November 11, 2010

Again Airtel GPRS Hack! Browse Internet For Free

I really don't know whether this trick is working or not, but I found in some forums that members are posting that this trick is still working fine! IF you want to browse internet for free of cost using Airtel Live. All you need to have a free mobile browser Opera 4.2 or 5 Beta 2 and some GPRS setting in Airtel Live

IF your Airtel Live is not active, call the customer care and receive Airtel Live setting and configure according to their guidance.

Now download the following Opera mobile browser and install it in to your mobile.

Now you have have activated your Airtel Live and opera mini browner.

Now change the follow the instruction to configure your Airtel Live setting to surf freely

For s60 users:                                                                                
Access Point as airtelgprs.com
Proxy address= 80.239.242.253
Port= 80 (Remember its 80 not 8080)

Just try it on your mobile and share your feeback with us.
Share:

Reset Your Mobile Memory Card Password 2 minutes


We usually set password for our memory card for privacy and security, but the common mistake every one does at least once in out life time forgetting password. If you set password for mobile memory card, then you should be not forget the password. If you does then the only option is to formate your memory card with the help of the card reader and eventually the loss of all your data stored on it. There is a way to break the security wall. If you are a Symbian device lover then no need to worry about the password. You can crack them in few minutes.

In this tutorial I am going to teach you how to reset your memory card password in easy step. Before we start you need to have X-plore (application used to explore your system files and folder even the hidden folders in your device)

Step1: Install X-Plore in your mobile. If you want to download X-Plore search around internet you can download free trail.

Step2: Open your X-plore apps and Press 0(Zero) and check which you have marked the "show the system files"

Step3: Once you done that now go to the following path C:/Sys/Data/Mmcstore

Step4: Once you reached there you need to press "3" under option to set it in the Hex-viewer

Step5: See the third column you will able to see a line of code ! TMSD02G (c??"?x???6?2?6?2?6). Just check the character between the "?" it is your password ie: 62626

Note: If you have not set the password, then you will not able to gain access to C:/Sys/Data
Share:

Wednesday, November 10, 2010

Secure your Desktop Icons and Settings

You can save your desktop settings and secure it from your nerdy friend by playing with the registry.


Simply launch the Registry Editor go to:

HKEY_CURRENT_USERSoftwareMicrosoftWindowsCurrentVersionPoliciesExplorer

In the right pane create a new DWORD Value named NoSaveSettings and modify it's value to 1.

Refresh and restart for the settings to get saved.
Share:

Want to delete the Find option

To delete the Find option,


go to the following registry key:

HKEY_CLASSES_ROOTDirectoryShellFind

Delete Find.

DO NOT delete Open else you will not be able to open any folders in the Start Menu like Programs, Accessories etc.
Share:

Set Back Ground for Driver


Want your change your driver Bachgroung with cool wall paper.

 
Here is the Code
step 1: open a new notepad
step2: copy the below code in it.

[{5984FFE0-28D4-11CF-AE66-08002B2E1262}]
PersistMonikerPreview=%SystemRoot%\Web\classic.bmp
PersistMoniker=file://Folder Settings\Folder.htt
[ExtShellFolderViews]
{5984FFE0-28D4-11CF-AE66-08002B2E1262}={5984FFE0-28D4-11CF-AE66-08002B2E1262}
{BE098140-A513-11D0-A3A4-00C04FD706EC}={BE098140-A513-11D0-A3A4-00C04FD706EC}
[.ShellClassInfo]
ConfirmFileOp=0
IconFile=%SystemRoot%\system32\SHELL32.dll
IconIndex=130
[{BE098140-A513-11D0-A3A4-00C04FD706EC}]
Attributes=1
IconArea_Image=D:\My Documents\00000\f.JPG

Step3: Save the Text file as Desktop.ini file
Step4: Change the ImageArea_Image= your image address as shown in step2
Step5: After done all the things. copy the file to your driver said C:\ paste there.
Step6: Go back the my computer then refresh it
Step7: Now Go to C:\ Cool now you will see the BG...
Step8: hide the file
Share:

Colorful Background For Outlook Express


Now let's move on to some Outlook Express Tricks.

Colorful Background

Don't like the boring background colors of Outlook Express?

Step 1: launch the Windows Registry Editor

step2: scroll down you will see

HKEY_CURRENT_USERSoftwareMicrosoftInternet Mail And News key.

Step3: On the left pane, click on ColorCycle or select Edit and Modify in the menu.

Step4:Now change the value to 1.

Step5:Close and restart your System

Step6:Now, launch Outlook Express.... Get it!!!!!!! Right...!!! Now do next stepStep

step7: whenever you open up a New Message, hold down ctrl-shift and tap the z key to scroll to change the background color.

Step8:Repeat the keystroke to cycle through the colors.

Done :-)
Share:

Monday, November 8, 2010

Rising Antivirus Free Edition

                               risingantivirus
Rising Antivirus Free Edition protects your computers against all types of viruses, Trojans, worms, rootkits and other malicious programs. Ease of use and Smartupdate technology make it an “install and forget” product and entitles you to focus on your own jobs with your computer. RISING Antivirus powerful engine has been certified by Virus Bulletin,Checkmark, TUV.


Rising Antivirus Free Edition is a solution with no cost to personal users for home and non commercial use.

Features:

  •  Anti virus, worms, trojans
  • Anti Rootkit
  • Mail Protection(POP3/SMTP)
  •  Application Protection(RISING unique Account Safe function protects your online bank, online game, MSN, E-mail account, Yahoo Messenger and other private information.)
  • Proactive Defence(protects your security safe from malicious program)
  • Application Access Control
  • Program Startup Control
  • Malicious Behavior Detection
  • Hidden Process Detection
  • Multiple Languages
  • High Speed Update Service
  • Support Service
 
Share:

File and Folder Locker

                                         FileFolderLocker
File & Folder Locker is a very simple utility to lock all of your files, folders and drives. It also helps you to hide one of your drives. Using this tool, you can lock all of your files, folders, hard drives and even removable drives.


Using File & Folder Locker, you can convert your FAT32 drives to NTFS file system without formatting the drives or any data loss.

Requirements :


  •  Only Microsoft Windows XP (any service pack).
  • User account having all administrative privileges (i.e. Administrators account).
  • Drives (i.e. hard/removable) should be in NTFS format.
 
Share:

நீங்களே ரிங்ரோன் (Ringtone) உருவாக்க ஒரு தளம்

Share:

தமிழ் விக்சனரி..

தமிழ் விளக்கங்களுடன் வளரும் பன்மொழி அகரமுதலி - தற்பொழுதுள்ள சொற்கள் = 190,879
 
தமிழ் விக்சனரிக்கு வருக! இது சொற்களின் பொருள், மூலம், பலுக்கல் அடங்கிய, கட்டற்ற பன்மொழி அகரமுதலியொன்றை உருவாக்கும் கூட்டு முயற்சி. இங்கு எல்லா மொழிச் சொற்களுக்குமான பொருள்களும் விளக்கங்களும் தமிழில் கொடுக்கப்பட வேண்டும்.


 
இம் முயற்சியில், நீங்களும் பங்கு பெறலாம்.

 

 அறிமுகப் பக்கம்
  • தொகுத்தலுக்கான பயிற்சியிடம்
  • புதிய சொற்களை நீங்களே சேர்க்க..
  • புதிய சொற்களை சேர்க்கச் சொல்லிக் கேட்க..
Share:

நீங்களும் பேஸ்புக்கில் வலம் வருகின்றீர்களா? அப்படியாயின் இந்த 10 விடயங்களும் உங்களுக்காக...



பேஸ்புக் எவ்வளவு சுவாரஸ்யமானதோ அந்தளவு ஆபத்தானதும் கூட. தகவல் தொழில்நுட்பப் பாதுகாப்பு நிபுணர் டேவிட்வைட்லெக் பேஸ்புக் இனது இன்னொரு பக்கத்தை இவ்வாறு விளக்குகின்றார். இதில் சில படங்களையோ அல்லது தகவல்களையோ போடுவது நீங்கள் வேலையிலிருந்து நீக்கப்படும் ஆபத்தை, அல்லது ஒரு குற்றத்தில் சிக்கும் ஆபத்தை அல்லது அதை விட மோசமான ஆபத்ததை ஏற்படுத்தக் கூடியது. 'data mining'எனப்படும் கணினி மூலம் மேற்கொள்ளப்படும் திருட்டுக்கள் உள்ளன. அதன்மூலம் பேஸ்புக்கில் இல் ஊடுருவி பிறந்த திகதி, தொலைபேசி இலக்கம், விலாசம் என்பனவற்றைப் பெற்றுக் கொள்ளலாம் .

இது குற்றவாளிகளுக்குக் கிடைத்துள்ள தங்கத் துகிள் போன்றது. பேஸ்புக்கில் எப்போதுமே போடக்கூடாத பத்து விடயங்கள் பற்றி டேவிட்வைட்லெக் குறிப்பிட்டுள்ளார்.


பிறந்த திகதியும் இடமும் :-


இது உங்கள் அடையாளங்கள் திருடப்படக்கூடிய மிக ஆபத்தான நிலைக்குத் தள்ளிவிடும். உங்களது கடவுச் சொல்லை மீளமைக்கும் இணையத்தளங்களில் இது பொதுவாகக் கேட்கப்படும் பாதுகாப்புக் கேள்வி. ஒரு குற்றவாளி இதை மீளமைத்தால் அவர் உங்கள் வங்கிக் கணக்கில் பிரவேசிப்பது உட்பட எதைவேண்டுமானாலும் செய்யலாம்.


தாயின் கன்னிப் பெயர் :-

பல இணையத்தளங்கள் உங்களது தாயின் கன்னிப் பெயரை உங்களுக்கு அங்கீகாரம் வழங்கப் பயன்படுத்துகின்றன. நீங்கள் கற்ற பாடசாலையின் பெயரையும் அவை பொதுவாக பாதுகாப்புக் கேள்வியாகப் கேட்டு பயன்படுத்துகின்றன. எனவே இதையும் பேஸ்புக்கில் போடாதீர்கள்.


விலாசம் :-


நீங்கள் எங்கே வசிக்கின்றீர்கள் என்பதை எல்லோரும் தெரிந்துகொள்ள வேண்டும் என்று நீங்கள் உண்மையிலேயே விரும்புகின்றீர்களா? இது அடையாள மோசடியில் மீண்டும் உங்களைத் தள்ளிவிடும். மோசடியாளர்களும் மற்றவர்களைப் பின் தொடர்பவர்களும் இவற்றைப் பாவிக்க இடமுண்டு.


விடுமுறைகள் :-

உங்களது விடுமுறைத் திட்ங்களை நீங்கள் பேஸ்புக்கில் வெளியிடுவது, உங்கள் வீட்டைக் கொள்ளையிட வருமாறு நீங்களே கொள்ளையர்களுக்கு அழைப்பு விடுப்பது போன்றது.

வீட்டிலிருந்து புறப்படும் குறுகிய பயணங்கள் :-

இதுவும் நீங்கள் பின் தொடரப்படவும் கொள்ளையிடப்படவும் கூடிய ஆபத்துக்களை ஏற்படுத்தும். குறிப்பாக நீங்கள் பொருள் கொள்வனவுக்காகச் செல்லும் இடங்கள், நண்பர்களோடு உணவருந்தச் செல்லும் இடங்கள். அதைப்பற்றிய தினம் நேரம் போன்ற விவரங்கள். இது உங்களைப் பின்தொடருபவருக்கு நீங்களே அழைப்பு விடுப்பது போன்றதாகும். பேஸ்புக்கின் மூலம் ஒரு பெண்ணைப் பின் தொடர்ந்து அச்சுறுத்தியது சம்பந்தமாக ஒரு வழக்கும் அண்மையில் பதிவாகியுள்ளது.

முறையற்ற படங்கள் :-

பேஸ்புக்கை பலரும் பார்ப்பதால் இத்தகையப் படங்களைப் போடுவது மோசமானது. அது உங்களைப்பறறிய தவறான ஒரு எண்ணத்தை ஏறபடுத்திவிடும். அதே போல் உங்கள் வீட்டின் மாதிரித் தோற்றத்தைக் காட்டக்கூடிய மற்றும் உங்களிடமிருக்கும் பெறுமதியான பொருள்களைக் காட்டக்கூடிய படங்களையும் போட வேண்டாம்.

ஒப்புதல்கள் :-

இதுவும் உங்களை வேலையிழக்கச் செய்து உங்கள் எதிர்காலத்தையே பாதித்துவிடக்கூடும்.நீங்கள் மற்றவர்களுடன் வைத்திருக்கின்ற உறவு மற்றும் வெட்கக்கேடான செயல்களை பேஸ்புக்கில் மூலம் ஒத்துக் கொள்வது ஆபத்தானது. விளம்பரங்கள்:- நீங்கள் பேஸ்புக்கில் போடுகின்ற எல்லாமே உங்களால் அழிக்கப்பட்ட பின்னரும் கூட அதில் இருக்கும்.

தொலைபேசி இலக்கம் :-

உங்களோடு அவசியம் தொடர்புகொள்ள வேண்டிய நிலைமைகள் தவிர இதைச் செய்ய வேண்டாம். இது 'data mining' திட்டத்தால் பெறப்பட்டு விளம்பரதாரர்களுக்கு வழங்கப்படலாம். மேலும் "Lost my phone" அல்லது "Need Ur number".போன்ற பேஸ்புக் பக்கங்களையும் பாவிக்க வேண்டாம்.


பிள்ளைகளின் பெயர்கள் :-

இதுவும் அடையாளத்திருடர்களால் அல்லது சிறுவர் துஷ்பிரயோகத்தில் ஈடுபடுபவர்களால் பாவிக்கப்படக்கூடும். ஒரு பிள்ளையின் விவரங்களைத் திருடுவது மிகவும் இலேசானது.

பொதுவான முழு அளவிலான விவரங்களை வெளியிட வேண்டாம் :-

பேஸ்புக்கில் இத்தகைய விவரங்கள் இருப்பதானது எந்த ஒரு தேடுதல் இயந்திரத்தினாலும் பாவிக்கப்படக்கூடியது. பெயரை மட்டும் வழங்கிவிட்டு ஏனைய எல்லாவற்றையும் மறைத்து வைத்திருப்பது மேலானது.
Share:

என்னை பற்றி...

My photo
Am Working as Assistant Professor in the Department of Information Technology at Sri Sairam Institute of Technology, Chennai.

முக்கிய செய்திகள்...

நாள்காட்டி

வானிலை



IP and Flag Counter

Wikipedia

Search results

QR Code Generator

All Conversion Widget

Recent Posts

Blog Archive

Copyright © பொன். சுதாகர் | Powered by Blogger
Design by SimpleWpThemes | Blogger Theme by NewBloggerThemes.com & Distributed By Bloggertemplates4u