Nov 22, 2009

0 comments

Looking for Driver Software for any Product?

Whenever we buy any hardware component we get a Driver CD along with it.

Ex. TV tuner Card, Sound Card, Webcam, etc

Here in the site below you can find all driver softwares for your laptop and destop related Components like :

* PrinterDrivers

* Cdrom Dreivers

* Modem Drivers

* Sound Drivers

* Mouse Drivers

* Monitor Drivers etc.........

Click on the below link:
http://members.driverguide.com/index.php

What is a Worm?

People use e-mail more than any other application on the internet, but it can be a frustrating experience, with spam and especially e-mail worms filling our inboxes.

Worms can spread rapidly over computer networks, the traffic they create bringing those networks to a crawl. And worms can cause other damage, such as allowing unauthorized access to a computer network, or deleting or copying files.

What's a worm?

A worm is a computer virus designed to copy itself, usually in large numbers, by using e-mail or other form of software to spread itself over an internal network or through the internet.

How do they spread?

When you receive a worm over e-mail, it will be in the form of an attachment, represented in most e-mail programs as a paper clip. The attachment could claim to be anything from a Microsoft Word document to a picture of tennis star Anna Kournikova (such a worm spread quickly in February 2001).

If you click on the attachment to open it, you'll activate the worm, but in some versions of Microsoft Outlook, you don't even have to click on the attachment to activate it if you have the program preview pane activated. Microsoft has released security patches that correct this problem, but not everyone keeps their computer up to date with the latest patches.

After it's activated, the worm will go searching for a new list of e-mail addresses to send itself to. It will go through files on your computer, such as your e-mail program's address book and web pages you've recently looked at, to find them.

Once it has its list it will send e-mails to all the addresses it found, including a copy of the worm as an attachment, and the cycle starts again. Some worms will use your e-mail program to spread themselves through e-mail, but many worms include a mail server within their code, so your e-mail program doesn't even have to be open for the worm to spread.

Other worms can use multiple methods of spreading. The MyDoom worm, which started spreading in January 2004, attempted to copy infected files into the folder used by Kazaa, a file-sharing program. The Nimda worm, from September 2001, was a hybrid that had four different ways of spreading.

What do they do?

Most of the damage that worms do is the result of the traffic they create when they're spreading. They clog e-mail servers and can bring other internet applications to a crawl.

But worms will also do other damage to computer systems if they aren't cleaned up right away. The damage they do, known as the payload, varies from one worm to the next.

The MyDoom worm was typical of recent worms. It opened a back door into the infected computer network that could allow unauthorized access to the system. It was also programmed to launch an attack against a specific website by sending thousands of requests to the site in an attempt to overwhelm it.

The target of the original version of MyDoom attack was the website of SCO Group Inc., a company that threatened to sue users of the Linux operating system, claiming that its authors used portions of SCO's proprietary code. A second version of MyDoom targeted the website of software giant Microsoft.

The SirCam worm, which spread during the summer of 2001, disguised itself by copying its code into a Microsoft Word or Excel document and using it as the attachment. That meant that potentially private or sensitive documents were being sent over the internet.

How do I get rid of them?

The best way to avoid the effects of worms is to be careful when reading e-mail. If you use Microsoft Outlook, get the most recent security updates from the Microsoft website and turn off the preview pane, just to be safe.

Never open attachments you aren't expecting to receive, even if they appear to be coming from a friend. Be especially cautious with attachments that end with .bat, .cmd, .exe, .pif, .scr, .vbs or .zip, or that have double endings. (The file attachment that spread the Anna Kournikova worm was AnnaKournikova.jpg.vbs.)

Also, install anti-virus software and keep it up to date with downloads from the software maker's website. The updates are usually automatic.

Users also need to be wary of e-mails claiming to have cures for e-mail worms and viruses. Many of them are hoaxes that instruct you to delete important system files, and some carry worms and viruses themselves.

As well, some users should consider using a computer with an operating system other than Windows, the target of most e-mail worms. Most of the worms don't affect computers that run Macintosh or Linux operating systems.

How Hackers get you through Social engineering?

Social engineering is the act of manipulating people into performing actions or divulging confidential information. While similar to a confidence trick or simple fraud, the term typically applies to trickery or deception for the purpose of information gathering, fraud, or computer system access; in most cases the attacker never comes face-to-face with the victim.

Social engineering techniques and terms

All social engineering techniques are based on specific attributes of human decision-making known as cognitive biases. These biases, sometimes called "bugs in the human hardware," are exploited in various combinations to create attack techniques, some of which are listed here:

Pretexting

Pretexting is the act of creating and using an invented scenario (the pretext) to persuade a targeted victim to release information or perform an action and is typically done over the telephone. It is more than a simple lie as it most often involves some prior research or set up and the use of pieces of known information (e.g. for impersonation: date of birth, Social Security Number, last bill amount) to establish legitimacy in the mind of the target. 
This technique is often used to trick a business into disclosing customer information, and is used by private investigators to obtain telephone records, utility records, banking records and other information directly from junior company service representatives. The information can then be used to establish even greater legitimacy under tougher questioning with a manager (e.g., to make account changes, get specific balances, etc).
As most U.S. companies still authenticate a client by asking only for a Social Security Number, date of birth, or mother's maiden name, the method is effective in many situations and will likely continue to be a security problem in the future.
Pretexting can also be used to impersonate co-workers, police, bank, tax authorities, or insurance investigators — or any other individual who could have perceived authority or right-to-know in the mind of the targeted victim. The pretexter must simply prepare answers to questions that might be asked by the victim. In some cases all that is needed is a voice that sounds authoritative, an earnest tone, and an ability to think on one's feet.

Phishing

Phishing is a technique of fraudulently obtaining private information. Typically, the phisher sends an e-mail that appears to come from a legitimate business—a bank, or credit card company—requesting "verification" of information and warning of some dire consequence if it is not provided. The e-mail usually contains a link to a fraudulent web page that seems legitimate—with company logos and content—and has a form requesting everything from a home address to an ATM card's PIN.
For example, 2003 saw the proliferation of a phishing scam in which users received e-mails supposedly from eBay claiming that the user’s account was about to be suspended unless a link provided was clicked to update a credit card (information that the genuine eBay already had). Because it is relatively simple to make a Web site resemble a legitimate organization's site by mimicking the HTML code, the scam counted on people being tricked into thinking they were being contacted by eBay and subsequently, were going to eBay’s site to update their account information. By spamming large groups of people, the “phisher” counted on the e-mail being read by a percentage of people who already had listed credit card numbers with eBay legitimately, who might respond.

IVR or phone phishing

This technique uses a rogue Interactive voice response (IVR) system to recreate a legitimate sounding copy of a bank or other institution's IVR system. The victim is prompted (typically via a phishing e-mail) to call in to the "bank" via a (ideally toll free) number provided in order to "verify" information. A typical system will reject log-ins continually, ensuring the victim enters PINs or passwords multiple times, often disclosing several different passwords. More advanced systems transfer the victim to the attacker posing as a customer service agent for further questioning.
One could even record the typical commands ("Press one to change your password, press two to speak to customer service" ...) and play back the direction manually in real time, giving the appearance of being an IVR without the expense.
The technical name for phone phishing, is vishing.

Baiting

Baiting is like the real-world Trojan Horse that uses physical media and relies on the curiosity or greed of the victim.
In this attack, the attacker leaves a malware infected floppy disk, CD ROM, or USB flash drive in a location sure to be found (bathroom, elevator, sidewalk, parking lot), gives it a legitimate looking and curiosity-piquing label, and simply waits for the victim to use the device.
For example, an attacker might create a disk featuring a corporate logo, readily available off the target's web site, and write "Executive Salary Summary Q2 2009" on the front. The attacker would then leave the disk on the floor of an elevator or somewhere in the lobby of the targeted company. An unknowing employee might find it and subsequently insert the disk into a computer to satisfy their curiosity, or a good samaritan might find it and turn it in to the company.
In either case as a consequence of merely inserting the disk into a computer to see the contents, the user would unknowingly install malware on it, likely giving an attacker unfettered access to the victim's PC and perhaps, the targeted company's internal computer network.
Unless computer controls block the infection, PCs set to "auto-run" inserted media may be compromised as soon as a rogue disk is inserted.

Quid pro quo

Quid pro quo means something for something:
  • An attacker calls random numbers at a company claiming to be calling back from technical support. Eventually they will hit someone with a legitimate problem, grateful that someone is calling back to help them. The attacker will "help" solve the problem and in the process have the user type commands that give the attacker access or launch malware.
  • In a 2003 information security survey, 90% of office workers gave researchers what they claimed was their password in answer to a survey question in exchange for a cheap pen. Similar surveys in later years obtained similar results using chocolates and other cheap lures, although they made no attempt to validate the passwords.

Other types

Common confidence tricksters or fraudsters also could be considered "social engineers" in the wider sense, in that they deliberately deceive and manipulate people, exploiting human weaknesses to obtain personal benefit. They may, for example, use social engineering techniques as part of an IT fraud.
The latest type of social engineering techniques include spoofing or hacking IDs of people having popular e-mail IDs such as Yahoo!, GMail, Hotmail, etc. Among the many motivations for deception are:
  • Phishing credit-card account numbers and their passwords.
  • Hacking private e-mails and chat histories, and manipulating them by using common editing techniques before using them to extort money and creating distrust among individuals.
  • Hacking websites of companies or organizations and destroying their reputation.

Nov 20, 2009

0 comments

Remove and Add Right-Click Menu Items

How To Remove and Add Right-Click Menu Items from Files and Folders

REMOVING ITEMS

A lot of programs you install will add themselves to the right-click menu of your files and/or folders. And most times, you have no choice in the matter and, as a result, your right-Click menu can get very long with added items you don't even use. The last person I was helping with this had a right context menu so long that the Rename option was no longer visible!
Fortunately, you can easily remove those unwanted menu items, if you know the registry values to edit. And it's not at all difficult once you know the keys responsible for the additions.

For Files, the secret lies in the "context menu handlers" under the shellex subkey for "All Files" which, in the registry, is nothing but an asterisk - like a dos wildcard, which means the values entered apply to all files. It is at the very top of the Root key, right here:

HKEY_CLASSES_ROOT\*\shellex\ContextMenuHandlers

Click the the + sign next to the ContextMenuHandlers key, to expand it.
Now you will see some of the programs that have added items to your right-click menu. Simply delete the program keys you don't want.
Yup! It's that simple. If deleting makes you uneasy, just export the key before deleting it. Or, instead of deleting the values, disable them. Simply double click the default value for the program on the right hand pane and rename the clsid value by placing a period or dash in front of it.
ie; - {b5eedee0-c06e-11cf-8c56-444553540000}
Then exit the registry, refresh, and right click a file to see if the item was removed from the menu.
Some programs - like WinZip or WinRar - will add several items to your right click menu but all of them will be removed by deleting or disabling their one context menu handler.

Note:- that the above key only applies to the right click menu of files.

To remove entries from the right click context menu of folders, you need to navigate to the Folder and Drive keys:

HKEY_CLASSES_ROOT\Folder\shellex\ContextMenuHandlers
HKEY_CLASSES_ROOT\Drive\shellex\ContextMenuHandlers

All you have to do is follow the same procedure as for Files - either disable or delete items you wish to remove.



Adding Items

Adding Items to the right click menu of Files and Folders is also fairly simple using the Registry. It just involves the creation of a few new keys for each item you wish to add. You edit the same keys used for removing items. Let's use Notepad as an example of an item you'd like to add to the right click menu of all your files or folders.

For folders, go to this key:
HKEY_CLASSES_ROOT\Folder
Click the + sign next to Folder and expand it so that the Shell key is visible. Right click the Shell key and choose New>Key and name the key Notepad or whatever else you'd prefer (whatever the key is named is what will appear in the right-click menu). Now right click the new key you made and create another key named Command. Then, in the right hand pane, double click "Default" and enter Notepad.exe as the value.
Exit the registry, refresh, and right click any folder. Notepad should now be on the context menu.


For files, go here again:

HKEY_CLASSES_ROOT\*
Expand the * key and see if a Shell key exists. If it does exist, follow the same procedure as for folders. If it does not exist, you'll have to create a new Shell first. Just right click the * key and choose New>Key and name it Shell. Then right click the Shell key and continue on the same way you did for adding items to the right click menu of folders.
Once done, Notepad should appear as an option in the right click menu of all your files.

Firefox about:config Tweaks

The about:config page contains most (if not, all) of Firefox configuration options. It is so far the most effective, and the most powerful way to tweak and enhance your Firefox performance. Here are 28 of the popular tweaks.

Accessing your about:config page
In your Firefox, type about:config in the address bar.


You will be shown a warning page. Click the “I’ll be careful, I promise!” button to proceed.



On the main page, you will see a long list of configuration entries. Enter the name of the key you want to update in the “Filter” field. The list will narrow to only the entries that match your keyword as you type.

To modify the value, simply double click on the entry value field and update the entry. That’s all!

Isn’t that simple? Now, let’s get to the tweaking.
1) Adjust the Smart Location Bar’s Number of Suggestions

In Firefox 3, when you start typing in the location bar, a drop-down list of suggestion URLs will be shown. If you want it to show more than 12 suggestions (12 is the default), you can adjust the browser.urlbar.maxRichResults keys and get it to show the number you want.



Config name: browser.urlbar.maxRichResults
Default: 12

Modified value: Set to your desired number of suggestion. If you want to disable it all together, set it to -1

2) Disable the session restore function
Firefox 3 automatically saves your session every 10 secs so that whenever it crashes, it can restore all your tabs. While this is a useful feature, some of you might find it irritating. To disable this function, toggle the value of browser.sessionstore.enabled to False
Config name: browser.sessionstore.enabled

Default: True
Modified value: False if you want to disable the session restore function

3) Adjust the Session Restore Saving Frequency
 
Same as above, if you decided to keep the session restore feature on, but want to reduce the session saving frequency, change the value of browser.sessionstore.interval so that Firefox will save the session at a longer interval.


Config name: browser.sessionstore.interval
Default: 10000 (in msecs, equivalent to 10secs)

Modified value: Set it to your desired value. 1000 means 1 sec and 60000 means 1 minute.


4) Enable Advanced Color Profile Support


Firefox has this advanced color profile features that display higher image quality. It is not enabled by default as it has a negative effect on the performance of the browser. If you are concern with the image quality rather than the performance, you can activated it via the gfx.color_management.enabled setting


Config name: gfx.color_management.enabled
Default: False

Modified value: True (if you want to activate the color profile support feature)


5) Disable Antivirus Scanning


This is mainly for Windows users. By default, Firefox 3 automatically scan the downloaded file with the default anti-virus application to make sure it is free of virus. If you download a big file, it could take a long time for the whole scanning process to complete. To increase the performance of the browser, you might want to consider disabling the anti-virus scanning via the browser.download.manager.scanWhenDone key.


Config name: browser.download.manager.scanWhenDone

Default: True

Modified value: False (if you want to disable it)


6) Configuring The Scrolling Tabs


When you opened many tabs, Firefox will not keep on reducing the tab width. Instead, it shows a scrolling bar so that the min width (100px) is conserved and you can scroll to find your tabs. If you are those who don’t like the scrolling tab function and prefer Firefox to show all the tabs, regardless how small it is, you can set the value ofbrowser.tabs.tabMinWidth to 0 to disable it. Similarly, if you want Firefox to display more tabs before showing the scrolling button, you can reduce the default value to a lower value, say 75 pixels.





Config name: browser.tabs.tabMinWidth
Default: 100

Modified value: 0 if you want to disable the scrolling functions, other values to set the min width value


7) Show/Disable Close button on Tabs


Some people love to see the Close (the red X) button on every tabs, but some hate it. Whatever is it, you can configure it to your preferences via thebrowser.tabs.closeButtons setting.





Config name: browser.tabs.closeButtons
Default: 1

Modified values:
0 - display a close button on the active tab only
1- display close buttons on all tabs
2- don’t display any close buttons
3- display a single close button at the end of the tab strip


Extend Scripts Execution Time


In Firefox 3, a script is only given 10 seconds to respond, after which it will issue a unresponsive script warning. If you are hooked on a slow network connection, you might want to increase the script execution time via dom.max_script_run_time to cut down on the frequency of the no script warning.


Config name: dom.max_script_run_time

Default:10 (in secs)

Modified value: 20, or any values greater than 10


9) Handling JavaScript Popups


When you come across a site that executes a javascript open new window function, and if the popup window is without all the usual window features, i.e. back/forward/reload buttons, status bar etc, Firefox will automatically treat it as a popup and will not open it as a new tab. However, if you find this to be a nuisance and wanted to open all new windows in a new tabs, you can specify it via thebrowser.link.open_newwindow.restriction setting.


Config name: browser.link.open_newwindow.restriction

Default: 2 - Open all JavaScript windows the same way as you have Firefox handle new windows unless the JavaScript call specifies how to display the window
Modified values:
0 – open all links as how you have Firefox handle new windows
1 – do not open any new windows
2- open all links as how you have Firefox handle new windows unless the Javascript specify how to display the window


10) Enable Spell Checking In All Text Fields


The default spell checking function only checks for multi-line text boxes. You can get it to spell-check for single line text box as well.


Config name: layout.spellcheckDefault

Default: 1 (spell checker for multi-lines text boxes only)

Modified values:
0 – disable the spell checker
2 – enable the spell checker for all text boxes


11) Open Search Box Results In New Tab


When you search using the search box at the top right hand corner of the browser, it will display the search results in the current tab. If you don’t want the search to interfere with your current tab, you can tweak the browser.search.openintab to make it open in a new tab.


Config Name: browser.search.openintab
Default: False

Modified value: True (open search box results in new tab)


12) Lower The Physical Memory Used When Minimized


This tweak is mainly for Windows users. When you minimize Firefox, it will send Firefox to your virtual memory and free up your physical memory for other programs to use. Firefox will reduce its physical memory usage, when minimized, to approximately 10MB (give or take some) and when you maximize Firefox it will take back the memory that it needs.


The preference name does not exist and needs to be created.


Right click on the background and select New->Boolean.


Enter the name when prompted: config.trim_on_minimize

Enter the values: True


13) Speed up your Firefox


Several tweaks required for this


Config name: network.http.pipelining

Default: False

Modified value: True


Config name: network.http.proxy.pipelining

Default: False

Modified value: True


Config name: network.http.pipelining.maxrequests
Default: 4

Modified value: any value higher than 4, but not more than 8


Config name: network.http.max-connections

Default: 30

Modified value: 96


Config name: network.http.max-connections-per-server

Default: 15

Modified value: 32


14) Increase/Decrease the Amount of Disk Cache


When a page is loaded, Firefox will cache it into the hard disk so that it doesn’t need to be download again for redisplaying. The bigger the storage size you cater for Firefox, the more pages it can cache.


Before you increase the disk cache size, make sure that browser.cache.disk.enabledbrowser.cache.disk.enable is set to True.


Config name: browser.cache.disk.capacity

Default: 50000 (in KB)

Modified value:
0 – disable disk caching
any value lower than 50000 reduces the disk cache
any value higher than 50000 increases the disk cache.


15) Select all text when click on the URL bar


In Windows and Mac, Firefox highlights all text when you click on the URL bar. In Linux, it does not select all the text. Instead, it places the cursor at the insertion point. Regardless which platform you are using, you can now tweak it to either select all or place cursor at insertion point.





Config name: browser.urlbar.clickSelectsAll

Modified value:
False – place cursor at insertion point
True – select all text on click


16) Autofill Address in URL Bar


Other than the smart location feature, you can also get your URL bar to autofill the address as you type the URL.





Config name: browser.urlbar.autofill

Default: False

Modified value: True (Have Firefox autofill the address as you type in the URL bar)


17) Same Zoom Level For Every Site


Firefox remembers your zoom preference for each site and set it to your preferences whenever you load the page. If you want the zoom level to be consistent from site to site, you can toggle the value of browser.zoom.siteSpecific from True to False.


Config name: browser.zoom.siteSpecific

Default: True

Modified value: False (enable same zoom preferences for every sites)


18) Setting your zoom limit


If you find that the max/min zoom level is still not sufficient for your viewing, you can change the zoom limit to suit your viewing habits.


Config name: zoom.maxPercent

Default: 300 (percent)

Modified value: any value higher than 300


Config name: zoom.minPercent

Default: 30 (percent)
value: any value


19) Configure Your Backspace Button


In Firefox, you can set your backspace to better use by getting it to either go back to theprevious page or act as page up function.


Config name: browser.backspace_action

Default: 2 (does nothing)

Modified value:
0 – go back previous page
1- page up


20) Increase Offline Cache


If you do not have access to Internet most of the time, you might want to increase the offline cache so that you can continue to work offline. By default, Firefox 3 caches 500MB of data from supported offline Web apps. You can change that value to whatever amount of your choice.


Config name: browser.cache.offline.capacity

Default: 512000 (in KB)

Modified value: any value higher than 512000 will increase the cache value


21) Auto Export Firefox 3 bookmarks to bookmarks.html


Unlike the previous version, Firefox 3 backup the bookmarks file in places.sqlite rather than the usual bookmarks.html. Since bookmarks.html allows us to export and sync our bookmarks with other browser, it will be very useful if Firefox 3 can backup the bookmark to the bookmarks.html as well.


Config name: browser.bookmarks.autoExportHTML

Default: False

Modified value: True (auto export bookmarks file to bookmarks.html)


22) Disable Extension Compatibility Checks


This is useful if you want to use an extension that is not supported by your version of Firefox badly. It is not recommended, but you can still do it at your own risk.


Right click and select New->Boolean. Enter extensions.checkCompatibility in the field. Enter False in the next field.


Right click again and select New->Boolean. Enter extensions.checkUpdateSecurity into the field and enter False into the next field.


23) Disable Delay Time When Installing Add-on


Everytime you wanted to install a Firefox add-on, you will have to wait for several secs before the actual installation starts. If you are tired of waiting, you can turn the functionsecurity.dialog_enable_delay off so that the installation will start immediately upon clicking.





Config name: security.dialog_enable_delay

Default: 2000 (in msec)

Modified value:
0 – start installation immediately
any other value (in msec)

24) View Source in Your Favorite Editor

This is very useful for developers who are always using the ‘view source‘ function. This tweak allows you to view the source code in an external editor.

There are two configuration need to be made:

Config name: view_source.editor.external

Default: False

Modified value: True ( enable view source using external text editor)

Config name: view_source.editor.path

Default: blank

Modified value: insert the file path to your editor here.


25) Increasing ‘Save Link As‘ timeout value

When you right click and select the ‘Save Link As…‘, the browser will request the content disposition header from the URL so as to determine the filename. If the URL did not deliver the header within 1 sec, Firefox will issue a timeout value. This could happen very frequently in a slow network connection environment. To prevent this issue from happening frequently, you can increase the timeout value so as to reduce the possibility of a timeout.


Config name: Browser.download.saveLinkAsFilenameTimeout

Default: 1000 (1 sec)

Modified value: any value higher than 1000 (value is in msec)

26) Animate Fullscreen Toolbar Collapse mode

In Firefox’s fullscreen mode, toolbars and the tab strip are hidden at the top of the screen and only shown on mouseover. To draw attention to this, there is an animation of the toolbar sliding upwards and off-screen when fullscreen mode is toggled on. For performance issue, the animation of the collapse of the toolbar only appear for the first time. For some reason that you may love/hate the animation, you can adjustBrowser.fullscreen.animateUp to switch it on/off for every collapse.


Config name: Browser.fullscreen.animateUp

Default: 1 (animate the toolbar collapse only the first time)

Modified value:
0 -disable the animation
2- enable the animation for every collapse


27) Autohide Toolbar in Fullscreen mode

In fullscreen mode, the toolbar is set to autohide and appear upon mouseover. If you have a need to view the toolbar at all time, you can toggle the value ofbrowser.fullscreen.autohide to False to always show the toolbar.

Config name: browser.fullscreen.autohide

Default: True (always autohide)

Modified value: False (always show the toolbar)

28) Increase Add-On search result

If you go to Tools->Add-ons->Get Add-ons and perform a search there, Firefox will only fetch and display 5 matching results. If you want Firefox to show more than 5 results (say 10), you can adjust extensions.getAddons.maxResults to get it to display more results.

Config name: extensions.getAddons.maxResults

Default: 5

Modified value: any value more than 5

Nov 17, 2009

0 comments

Top 100 infected sites

Symantec’s Web site ratings service Norton Safe Web presents the Dirtiest Web Sites of Summer 2009 – the top 100 infected sites based on number of threats detected by Norton Safe Web as of August 2009.
Norton Safe Web analyzes sites using signature-based file scanning, intrusion detection engines, behavioral detection and install/uninstall analysis to identify security risks including phishing sites, malicious downloads, browser exploits and links to unsafe external sites. In other words – dirty stuff you don’t want on your computer!
It comes as no surprise that 48% of the Dirtiest Web Sites are, well, dirty— sites that feature adult content. However, other Dirtiest sites run the gamut of subject matter, including sites dedicated to deer hunting, catering, figure skating, legal services, and buying electronics. Viruses are the most common threat represented on the Dirtiest list, followed by security risks and browser exploits. Simply clicking through to a site with these threats could put you at risk of exposing your computer to infection, and worse, put your identity, personal and financial information into the hands of cybercriminals.

Sample of Dirtiest Web Sites:

Nov 1, 2009

0 comments

Speed up Firefox

Firefox is already fast, but what if you could make it faster? Most internet users are already using a broadband connection for their internet access anyway, so why not enjoy the benefits of having an extremely fast internet connection by modifying Firefox’s config variables so you can enjoy a fast internet surfing experience with your Firefox Browser!
Here is how you can make Firefox even faster.

How To Speed Up Firefox

1.Type “about:config” into the address bar and hit enter.
FireFox Config
2. You will recieve the following funny error message from your Firefox Browser.


Scroll down and look for the following entries:
- network.http.pipelining
- network.http.proxy.pipelining
- network.http.pipelining.maxrequests
 Firefox Browser Tweaks
Normally the browser will make one request to a web page at a time.
When you enable pipelining it will make several at once, which really speeds up page loading.
2. Alter the entries as followed by double clicking them with your mouse pointer to switch it to true:
Set “network.http.pipelining” to “true”
Set “network.http.proxy.pipelining” to “true”
Set “network.http.pipelining.maxrequests” to some number like 30. This means it will make 30 requests at once.
Firefox Browser Tweaks
3. Lastly right-click anywhere and select New-> Integer. Name it “nglayout.initialpaint.delay” and set its value to “0″.

Firefox Tweaks

Firefox Tweaks
This value is the amount of time the browser waits before it acts on information it recieves.
Now close your Firefox Browser and relaunch it, to save your changes.
If you’re using a broadband connection you’ll load pages MUCH faster now!

Source : http://www.pcwindowstips.com/2008/08/12/how-to-speed-up-firefox/#more-62

Restrict Right Click on the Desktop

Well, restricting right click on the desktop will be very useful to to prevent any one from changing options of your folders and applications by right clicking on them. you can do this easily form the registry. So to do so, just go through this simple steps:-

1. Go to Start menu and run the command prompt with Administrator rights.

2. Type regedit and press Enter. Now locate to the following folder:-

HKEY_CURRENT _USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer.

3. Once you reached to the folder, right click anywhere on the right side and create a new DWORD value. Name it as NoViewContextMenu.

4. Set the value 1 for this key by double clicking on it and press Ok.

5. Now make one more Dword value in the same registry key and name this key as NoTrayContextmenu. And set the value 1 for this key as well by double clicking on it and press Ok.

6. Now to disable the context menu for the Taskbar, locate to the following folder:- 

HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced.

7. Right click in the right pane and create a new DWORD value as before and name it as TaskbarContextMenu. Put value for this key as 0.

8. Close the registry and you are done.

Making Heart , Arrow or TM trademark Symbol And Lot More


All you need to do is Hold down your "ALT" key and press another key on the keyboard to create a symbol. Here is a list of some you can make. Have Fun!


Alt + 0153..... trademark symbol

Alt + 0169.... copyright symbol

Alt + 0174..... registered trademark symbol

Alt + 0176 ... degree symbol

Alt + 0177 ... plus-or-minus sign

Alt + 0182 ... paragraph mark

Alt + 0190 ... fraction, three-fourths

Alt + 0215 .... multiplication sign

Alt + 0162... the cent sign

Alt + 0161..... upside down exclamation point

Alt + 0191..... upside down question mark

Alt + 1.......... smiley fsce

Alt + 2 ......... black smiley face

Alt + 15........ sun

Alt + 12........ female sign

Alt + 11....... male sign

Alt + 6......... spade sign

Alt + 5.......... Club symbol

Alt + 3.......... Heart

Alt + 4.......... Diamond

Alt + 13........ eighth note

Alt + 14........ beamed eighth note

Alt + 8721.... N-ary summation (auto sum)

Alt + 251...... square root check mark

Alt + 8236..... infinity

Alt + 24........ up arrow

Alt + 25........ down arrow

Alt + 26........ right pointing arrow

Alt + 27........ left arrow

Alt + 18........ up/down arrow

Alt + 29........ left right arrow