Jul 22, 2011

30 comments

Cyber Crime Complaints And Resolution Assistance Center [CCC-RAC]

CCC-RAC is a  public information and assistance service dedicated to the assistance of Cyber Crime Victims in India.

The Cyber crime resolution infrastructure in India is still in a nascent stage and inadequate. As a result, whenever a Cyber Crime occurs, the victim is at a loss to understand where he should seek relief.
This center is a public service division of Naavi.org and aims at providing guidance to the victims of what they are expected to do when they observe a crime against them.

CCC-RAC will function from Bangalore and maintain a group of accredited legal advisors who will provide litigation assistance to the victims.

Interested parties may utilize the mediation and arbitration services offered by www.arbitration.in for resolving their disputes as per applicable provisions of law. Such services can be used only if both parties to the dispute agree on the use of the facilities.

For more information on Naavi and activities of Naavi.org, check www.naavi.org 
 

[Before Lodging Your Complaint check if you need the services of www.ceac.in  for archiving the evidence on which you are basing your complaint. For some useful information on procedural aspects of a Criminal Case, refer this FAQ]
Following are the contact details of some of the Cyber Crime Police Stations set up by different States. Victims in the respective jurisdiction may contact them based on the "Location".

For example, a victim in Madurai should contact Cyber Crime Cell, CB CID, Chennai while a victim in Chennai City needs to contact the Cyber Crime Cell at Egmore.
The names of the officers in charge is as per information available at present and may not be correct. Your complaint can be made by designation.

These officers are not in anyway connected with this information center.

If you donot find a Cyber Crime Police Station in your location, you may lodge the complaint in the Police Station nearest to their residence or contact the SP in the area.
CCC_RAC will only provide legal assistance through its associate members where available. 

Location Officer In Charge Address Telephone No E-mail
Chennai Dr Sudhakar Assistant Comissioner of Police
Cyber Crime Cell
Commissioner office Campus
Egmore, Chennai- 600008
044-23452350
 
cyberac@rediffmail.com
Chennai for Rest of Tamil Nadu ACP Cyber Crime Cell No:3, SIDCO Electronic Complex, I Floor, Guindy, Chennai - 32.
CB, CID
Chennai
Address Complaints to : ADGP, CBCID

Off:ADGP-CB CID 044-22509229/22502501
 DIG CBCID: 044 22502503
Control Room: 044 22502510
cbcyber@tn.nic.in Notification
Bangalore for the Whole of Karnataka - Cyber Crime Police Station
C.O.D Headquarters,
Carlton House,
# 1, Palace Road,
Bangalore - 560 001
080-22201026
080-22943050
080-22387611 (FAX)
Toll-free telephone number for filing petitions is :100 or
1-800-4250-100.
ccps@kar.nic.in ccps@blr.vsnl.net.in
http://www.cyberpolicebangalore.nic.in/
http://www.ksp.gov.in  (Police website where complaints can be lodged online)
http://www.crimestoppersindia.org
(NGO site where public can notify crimes)
List of e-mail addresses of all Senior Police officers in Karnataka : (P.S: Some mail addresses may be incorrect)
Hyderabad -
Crime Investigation Department, 3rd Floor, D.G.P. Office, Lakdikapool, Hyderabad-500004
 040-23240663, 040-27852274 040- 23297474 (Fax) cidap@cidap.gov.in info@cidap.gov.in
http://www.cidap.gov.in/cybercrimes.aspx
Mumbai -
Cyber Crime Investigation Cell (Crime Branch, C.I.D), Annex-III Building, Police Commissioner Office, Crowford Market, Mumbai

022-22641261
officer@cybercellmumbai.com http://www.cybercellmumbai.com/
Lucknow   Cyber Crime Investigation Cell    
Trivandrum   Cyber Crime Reporting Center Call center(0471) 2727004 www.cyberkeralam.in http://keralapolice.org/newsite/ccps.html
Thane   3rd Floor, Police Commissioner Office
Near Court Naka, Thane West,
Thane 400601.
022-25424444 www.thanepolice.org
E-Mail: police@thanepolice.org
Pune   Assistant Commissioner of Police
Cyber Crime Investigation Cell
Police Commissioner Office of Pune
2, Sadhu Vaswani Road, Camp,
Pune 411001
020-2612 7277
020-2616 5396
020-2612 8105 (Fax)
Web site: http://punepolice.com/crime branch.html
E-Mail: punepolice@vsnl.com
    Gujarat
DIG, CID, Crime and Railways
Fifth Floor
Police Bhavan
Sector 18, Gandhinagar 382 018
079-2325 4384
+91-79-2325 3917 (FAX)
 
Delhi   CBI Cyber Crime Cell:
Superintendent of Police,
Cyber Crime Investigation Cell
Central Bureau of Investigation,
5th Floor, Block No.3, CGO Complex,
Lodhi Road, New Delhi – 3
011-4362203
011-4392424
 

 
Address of CBI Cyber Crime Cell
Supdt. of Police, Cyber Crime Investigation Cell Central Bureau of Investigation, 5th Floor, Block , No.3, CGO Complex, Lodhi Road, New Delhi - 3, Phone: 4362203, 4392424 : EMail: cbiccic@bol.net.in : Web: http://cbi.nic.in/

Contact Address of Yahoo Mail and Hotmail Representative offices in India having responsibility as service providers for any Cyber Crime committed in India under ITA-2000 or other Laws.
 
Address of Yahoo India office:
Yahoo Web Services India Private Limited, 386 Veer Savarkar Marg, Opposite Siddhivinayak temple, Mumbai 400 025, 22 56622222, 22 56622244.e-mail: ad-sales-india@yahoo-inc.com
 
Yahoo also has an R & D center in Bangalore at the following address:  
Yahoo! Software Development India Pvt. Ltd.  4th floor, "Esquire Center", #9, M.G. Road, Bangalore - 560 001. Phone: +91 80 6694 9494, Fax: +91 80 6694 9595
 
Any complaint regarding abuse of yahoo mail can be filed through this web page:

http://help.yahoo.com/l/us/yahoo/mail/yahoomail/abuse.html
 
Address of MSN India Office:
MSN India, Prestige Takt, 23 Kasturba Gandhi Cross,Bangalore – 560 001, eMail: msnadin@microsoft.com, Tel: 91-80-2121212
 
E-Mail Addresses of different Cyber Crime Cells in Kerala
 
Sl.No.
Designation
Email ID
1
Trivandrum city cybercelltvmcity@keralapolice.gov.in
2
Trivandrum rural cybercelltvmrl@keralapolice.gov.in
3
Kollam cybercellklm@keralapolice.gov.in
4
Pathanamthitta cybercellpta@keralapolice.gov.in
5
Alappuzha cybercellalpy@keralapolice.gov.in
6
Kottayam cybercellktm@keralapolice.gov.in
7
Idukki cybercellidk@keralapolice.gov.in
8
Eranakulam City cybercellekmcity@keralapolice.gov.in
9
Eranakulam rural cybercellekmrl@keralapolice.gov.in
10
Thrissure cybercelltsr@keralapolice.gov.in
11
Palakkad cybercellpkd@keralapolice.gov.in
12
Malappuram cybercellmpm@keralapolice.gov.in
13
Kozhikkode City cybercellkkdcity@keralapolice.gov.in
14
Kozhikkode Rural cybercellkkdrl@keralapolice.gov.in
15
Wayanad cybercellwynd@keralapolice.gov.in
16
Kannur cybercellknr@keralapolice.gov.in
17
Kasaragode cybercellksd@keralapolice.gov.in

 
[P.S: CCC-RAC is not a Police Station]
 

THE INFORMATION TECHNOLOGY ACT, 2000


An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "Electronic Commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.

WHEREAS the General Assembly of the United Nations by resolution A/RES/51/162, dated the 30th January, 1997 has adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law;

AND WHEREAS the said resolution recommends, inter alia, that all States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; 

AND WHEREAS it is considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records; 

BE it enacted by Parliament in the Fifty-first Year of the Republic of India as follows:-
CHAPTER 1 - PRELIMINARY
1) Short title, extent, commencement and application
2) Definitions
 
CHAPTER 2 - DIGITAL SIGNATURE
3) Authentication of electronic records.
 
CHAPTER 3 - ELECTRONIC GOVERNANCE
4) Legal recognition of electronic records.
5) Legal recognition of digital signatures.
6) Use of electronic records and digital signatures in Government and its agencies.
7) Retention of electronic records.
8) Publication of rules, regulation, etc., in Electronic Gazette.
9) Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form
10) Power to make rules by Central Government in respect of digital signature
 
CHAPTER 4 - ATTRIBUTION, ACKNOWLEDGEMENT AND DESPATCH OF ELECTRONIC RECORDS
11) Attribution of electronic records.
12) Acknowledgement of receipt.
13) Time and place of despatch and receipt of electronic record.
 
CHAPTER 5 - SECURE ELECTRONIC RECORDS AND SECURE DIGITAL SIGNATURES
14) Secure electronic record.
15) Secure digital signature.
16) Security procedure.
 
CHAPTER 6 - REGULATION OF CERTIFYING AUTHORITIES
17) Appointment of Controller and other officers.
18) Functions of Controller.
19) Recognition of foreign Certifying Authorities.
20) Controller to act as repository.
21) Licence to issue Digital Signature Certificates.
22) Application for licence.
23) Renewal of licence.
24) Procedure for grant or rejection of licence.
25) Suspension of licence.
26) Notice of suspension or revocation of licence.
27) Power to delegate.
28) Power to investigate contraventions.
29) Access to computers and data.
30) Certifying Authority to follow certain procedures.
31) Certifying Authority to ensure compliance of the Act, etc.
32) Display of licence.
33) Surrender of licence.
34) Disclosure.
 
CHAPTER 7 - DIGITAL SIGNATURE CERTIFICATES
35) Certifying Authority to issue Digital Signature Certificate.
36) Representations upon issuance of Digital Signature Certificate.
37) Suspension of Digital Signature Certificate.
38) Revocation of Digital Signature Certificate.
39) Notice of suspension or revocation.
 
CHAPTER 8 - DUTIES OF SUBSCRIBERS
40) Generating key pair.
41) Acceptance of Digital Signature Certificate.
42) Control of private key.
 
CHAPTER 9 - PENALTIES AND ADJUDICATION
43) Penalty for damage to computer, computer system, etc.
44) Penalty for failure to furnish information, return, etc.
45) Residuary penalty.
46) Power to adjudicate.
47) Factors to be taken into account by the adjudicating officer.
 
CHAPTER 10 - THE CYBER REGULATIONS APPELLATE TRIBUNAL
48) Establishment of Cyber Appellate Tribunal.
49) Composition of Cyber Appellate Tribunal.
50) Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal.
51) Term of office
52) Salary, allowances and other terms and conditions of service of Presiding Officer.
53) Filling up of vacancies.
54) Resignation and removal.
55) Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings.
56) Staff of the Cyber Appellate Tribunal.
57) Appeal to Cyber Regulations Appellate Tribunal.
58) Procedure and powers of the Cyber Appellate Tribunal.
59) Right to legal representation.
60) Limitation.
61) Civil court not to have jurisdiction.
62) Appeal to High Court.
63) Compounding of contraventions.
64) Recovery of penalty
 
CHAPTER 11 - OFFENCES
65) Tampering with computer source documents.
66) Hacking with Computer System.
67) Publishing of information which is obscene in electronic form.
68) Power of the Controller to give directions.
69) Directions of Controller to a subscriber to extend facilities to decrypt information.
70) Protected system
71) Penalty for misrepresentation.
72) Breach of confidentiality and privacy.
73) Penalty for publishing Digital Signature Certificate false in certain particulars.
74) Publication for fraudulent purpose.
75) Act to apply for offences or contravention committed outside India.
76) Confiscation.
77) Penalties and confiscation not to interfere with other punishments
78) Power to investigate offences.
 
CHAPTER 12 - NETWORK SERVICE PROVIDERS NOT TO BE LIABLE IN CERTAIN CASES
79. Network service providers no to be liable in certain cases
 
CHAPTER 13 -MISCELLANEOUS
80) Power of police officer and other officers to enter, search, etc.
81) Act to have overriding effect.
82) Controller, Deputy Controller and Assistant Controllers to be public servants.
83) Power to give directions.
84) Protection of action taken in good faith.
85) Offences by Companies.
86) Removal of difficulties.
87) Power of Central Government to make rules.
88) Constitution of Advisory Committee.
89) Power of Controller to make regulations.
90) Power of State Government to make rules.
91) Amendment of Act 45 of 1860.
92) Amendment of Act 1 of 1872.
93) Amendment of Act 18 of 1891.
94) Amendment of Act 2 of 1934.
 
THE FIRST SCHEDULE (See section 91)
AMENDMENTS TO THE INDIAN PENAL CODE (45 OF 1860)
 
THE SECOND SCHEDULE (See section 92)
AMENDMENTS TO THE INDIAN EVIDENCE ACT, 1872 (1 OF 1872)
 
THE THIRD SCHEDULE (See section 93)
AMENDMENTS TO THE BANKERS' BOOKS EVIDENCE ACT 1891 (18 OF 1891)
 
THE FOURTH SCHEDULE(See section 94)
AMENDMENT TO THE RESERVE BANK OF INDIA ACT, 1934 (2 OF 1934)

Frequently Used Cyber Crimes

 Unauthorized access to computer systems or networks
This activity is commonly referred to as hacking. The Indian law has however given a different connotation to the term hacking, so we will not use the term "unauthorized access" interchangeably with the term "hacking".

Theft of information contained in electronic form
This includes information stored in computer hard disks, removable storage media etc.

Email bombing
Email bombing refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the 169 schemes was available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed.

Data diddling
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

Salami attacks
These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.
Logic bombs are programmes, which are activated on the occurrence of a particular predefined event. The logic bomb was programmed to take ten cents from all the accounts in the bank and put them into the account of the person whose name was alphabetically the last in the bank's rosters. Then he went and opened an account in the name of Ziegler. The amount being withdrawn from each of the accounts in the bank was so insignificant that neither any of the account holders nor the bank officials noticed the fault.

It was brought to their notice when a person by the name of Zygler opened his account in that bank. He was surprised to find a sizable amount of money being transferred into his account every Saturday.

Denial of Service attack
This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. The attack is initiated by sending excessive demands to the victim's computer(s), exceeding the limit that the victim's servers can support and making the servers crash. Denial-of-service attacks have had an impressive history having, in the past, brought down websites like Amazon, CNN, Yahoo and eBay!

Virus / worm attacks
Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. 170 The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was reportedly written by a Filipino undergraduate.

In May 2000, this deadly virus beat the Melissa virus hollow - it became the world's most prevalent virus. It struck one in every five personal computers in the world. When the virus was brought under check the true magnitude of the losses was incomprehensible. Losses incurred during this virus attack were pegged at US $ 10 billion.

The original VBS_LOVELETTER utilized the addresses in Microsoft Outlook and emailed itself to those addresses. The e-mail, which was sent out, had "ILOVEYOU" in its subject line. The attachment file was named "LOVE-LETTER-FORYOU. TXT.vbs". The subject line and those who had some knowledge of viruses, did not notice the tiny .vbs extension and believed the file to be a text file conquered people wary of opening e-mail attachments. The message in the e-mail was "kindly check the attached LOVELETTER coming from me".

Since the initial outbreak over thirty variants of the virus have been developed many of them following the original by just a few weeks. In addition, the Love Bug also uses the Internet Relay Chat (IRC) for its propagation. It e-mails itself to users in the same channel as the infected user. Unlike the Melissa virus this virus does have a destructive effect. Whereas the Melissa, once installed, merely inserts some text into the affected documents at a particular instant during the day, VBS_LOVELETTER first selects certain files and then inserts its own code in lieu of the original data contained in the file. This way it creates ever-increasing versions of itself. Probably the world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. The Internet was, then, still in its developing years and this worm, which affected thousands of computers, almost brought its development to a complete halt. It took a team of experts almost three days to get rid of the worm and in the meantime many of the computers had to be disconnected from the network.

Logic bombs
These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).

Trojan attacks
A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.

Internet time thefts
This connotes the usage by an unauthorized person of the Internet hours paid for by another person. In a case reported before the enactment of the Information Technology Act, 2000 Colonel Bajwa, a resident of New Delhi, asked a nearby net café owner to come and set up his Internet connection. For this purpose, the net café owner needed to know his username and password. After having set up the connection he went away with knowing the present username and password. He then sold this information to another net café. One week later Colonel Bajwa found that his Internet hours were almost over. Out of the 100 hours that he had bought, 94 hours had been used up within the span of that week. Surprised, he reported the incident to the Delhi police. The police could not believe that time could be stolen. They were not aware of the concept of time-theft at all. Colonel Bajwa's report was rejected. He decided to approach The Times of India, New Delhi. They, in turn carried a report about the inadequacy of the New Delhi Police in handling cyber crimes. The Commissioner of Police, Delhi then took the case into his own hands and the police under his directions raided and arrested the net café owner under the charge of theft as defined by the Indian Penal Code. The net café owner spent several weeks locked up in Tihar jail before being granted bail.

Web jacking

This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website In a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. They demanded a ransom of 1 million dollars from her. The owner, a schoolteacher, did not take the threat seriously. She felt that it was just a scare tactic and ignored the e-mail. It was three days later that she came to know, following many telephone calls from all over the country, that the hackers had web jacked her website. 

Subsequently, they had altered a portion of the website which was entitled 'How to have fun with goldfish'. In all the places where it had been mentioned, they had replaced the word 'goldfish' with the word 'piranhas'. Piranhas are tiny but extremely dangerous flesh-eating fish. Many children had visited the popular website and had believed what the contents of the website suggested. These unfortunate children followed the instructions, tried to play with piranhas, which they bought from pet shops, and were very seriously injured!

Theft of computer system
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.

Physically damaging a computer system
This crime is committed by physically damaging a computer or its peripherals.

Jul 18, 2011

112 comments

20 Facebook Hacks and Tips You Might Not Know

If you surf Facebook on daily basis or occasionally, chances are you’re already familiar with regular stuffs like add/delete friends, update statuses, walls and profile, add and explore pages & applications, etc, but there’s more..

This week we want to cover some interesting things you can do on (or with) Facebook; inclusive of tricks that are not documented or unknown to many, as well as tips to stay connected better with your friends. 

Without further ado, here’s 20 Facebook Tips/Tricks You Might Not Know


       1.How to Place Facebook Chat On Firefox Sidebar
            If you are using Firefox, you can place the Facebook Chat at the sidebar.

  1. Facebook_Chat_Firefox_Sidebar
  2. How to Download Facebook Photo Albums

    FacePAD: Facebook Photo Album Downloader allows you to download your friends’ facebook albums, Events albums, and Group Albums, en masse, with the click of a button.
    facepad
  3. How to Share Flickr Photos to Facebook

    Flickr2Facebook is an unofficial Flickr to Facebook uploader(bookmarklet) which allows you upload photos to Facebook from Flickr.
    flickr2facebook
  4. How to Update Facebook without Using Facebook

    hellotxt and Ping.fm both introduced features that let Facebook administrators update Facebook Pages.
    hellotxt
  5. How to Schedule Facebook Messages

    Sendible lets you schedule Facebook messages ahead of time so you can send messages to your friends, customers or colleagues in the future.
    sendible
  6. How to "Friend" Someone on Facebook & Hide It From Your Status Updates

    A short tutorial on Makeuseof to guide you how to hide Facebook status updates and keep that fact confined to your closer friends.
  7. How to Create a Photo Collage Using Pictures of Your Facebook Friends

    Click on Friends tab. Proceed to More tab. From "Choose an option" dropdown, choose any of the dashes "" . Your Facebook friends collage is right on your computer screen.
    photo_collage
  8. How to Know When Facebook Friends Secretly Delete or Block You

    X-Friends is a unique tool for tracking friends that disappear from Facebook.
    X-friends
  9. How to Display Selected Pictures Only on your Facebook Profile Page

    A little-known feature in Facebook that lets you decide who shows up in that Friends box. Click that "edit" pencil in your Friends box and type the names of your best friends in the box that says "Always show these friends"
    friend_photos
  10. How to Remove Facebook Advertisements

    This Greasemonkey script – Facebook: Cleaner removes many of the annoying ads and updates that unavoidably appear on your Facebook pages.
    ads
  11. How to Syncs Photos of Facebook Friends with Contacts in Microsoft Outlook

    OutSync is a free Windows application that syncs photos of your Facebook friends with matching contacts in Microsoft Outlook. It allows you to select which contacts are updated. So you can update all contacts at once or just a few at a time.
    outsync
  12. How to Display Facebook Statuses on Wordpress Blog

    The following method make use of Facebook status feed and Wordpress RSS widget to display Facebook Statuses on WordPress blog.. It will also work for self-host Wordpress blogs.
    statuses
  13. How to Post Your Blog Posts to Your Facebook Wall Automatically

    Wordbook allows you to cross-post your blog posts to your Facebook Wall. Your Facebook “Boxes” tab will show your most recent blog posts.
    wordbook
  14. How to Access Facebook Chat on Desktop

    Gabtastik and digsby let you keep Facebook chat sessions open on your Windows desktop outside of your regular web browser, using minimal screen real estate and system memory.
  15. How to Create Quiz on Facebook Easily

    LOLapps provides quiz creator that can be employed to conjure up these popular personality quizzes that are so widespread in Facebook.
    lolapps
  16. How to Hide Your Online Status on Facebook Chat from Select Contacts

    Facebook has integrated friends list with Chat and you can also choose which of these list members get to see you online.
    hide
  17. How to Get Facebook Updates on Email

    NutshellMail consolidates your Facebook accounts through the inbox you use the most.
    nutshellmail
  18. How to Update Facebook Status from Firefox

    FireStatus is a status update utility for multiple social networks, including FaceBook.
    firestatus
  19. How to Get Facebook on Your Desktop

    Seesmic DesktopFacebookerXobniFacebook Sidebar GadgetScrapboy and Facebook AIR application are desktop applications that allows you interact with your stream just as you would on Facebook, but without the browser.
  20. How to Delete, Cancel and Terminate Facebook Account and Profile

    A simple guide to terminate, delete or cancel Facebook account, together with the Facebook profile easily.
    terminate

Source: Hongkiat.com

Jul 17, 2011

0 comments

Get free mobile credit thru EmbeePay

EmbeePay is a facebook application for getting easyload on your mobile very easily. I got around 200 Rs in 2 days.Very easy to work out.

Follow these steps :

** First JOIN EMBEEPAY & allow the application on facebook . 
** Now enter your phone number and get registered and you will get 100 points.
** After that validate your account .You will get a code in 3-4 min ,enter it and get 50 more points.
** Now subscribe to their mailing and get 5 points.
** Now total you got is 155 points very easily.
** After that go to earn and do different surveys and offers and earn points.I will recommend to do those surveys which are free ad give low points like fb app etc . There are lot of offers you can do.
** Moreover suggest 5 friends and when they register you will get 10 points .
When you reached to 300 points ,go to redeem and you will get easy load of Rs.100 Top Up.

Jul 16, 2011

4 comments

John Walkenbach's Favorite Excel 2010 Tips and Tricks

John Walkenbach's Favorite Excel 2010 Tips and Tricks (Mr. Spreadsheet's Bookshelf)
Wiley | 2010-07-13 | ISBN: 0470475374 | 504 pages | PDF | 6 MB

Build robust Excel 2010 apps quickly and efficiently Known as "Mr. Spreadsheet," John Walkenbach's name is synonymous with excellence in computer books that explain the complexities of various topics. With this collection of favorite Excel tips and tricks, you get a unique look at ways to make Excel 2010 more efficient than you ever imagined.

Packed with easy-to-understand advice regarding all aspects of Excel, this book shares improved ways of speeding up application development with Excel and maximizing the power of Excel to create robust applications.

* Addresses the extensive changes to the 2010 version of Excel and shares tricks and shortcuts for making your Excel experience as successful and efficient as possible
* Reveals ways to deal with function arguments, create "impossible" charts, and tame the Ribbon bar
* Discusses absolute vs. relative references, change data entry orientation, and sort more than three columns
* Demonstrates ways to enter fake data for testing purposes

With John Walkenbach's Favorite Excel 2010 Tips and Tricks, you'll get a jump start on mastering the extensive changes to the 2010 version of Excel.
Download:
Filesonic
 

101 Internet Businesses You Can Start from Home

101 Internet Businesses You Can Start from Home
Publisher: Maximum Press | ISBN:188506859 | 2001 | 520 pages | PDF | 1.7 MB

101 Internet Businesses You Can Start from Home written by Susan Sweeney - best selling author and Internet marketing expert, is for those who want to break away from rigid schedules, unappreciative bosses, and soul-sapping commutes. This book puts prospective Internet entrepreneurs on the road to success by offering an analysis of Internet mechanics and commerce and providing profiles of successful Internet businesses. Containing more than just technical information, this manual also helps the entrepreneur prioritize business goals and evaluate comfortable levels of risk, ensuring that the chosen business matches the aspirations of the entrepreneur. Each of the 101 business profiles includes promotion techniques for helping these start-ups get on the road to success, and a password for access to the companion website is provided.
Download:
Sharingmatrix
Or
Rapidshare