Jan 13, 2012


Reliance 4-Gen Tablet at Just 3500 INR

Mukesh Ambani's Reliance Industries plans to offer high speed data services on attractively priced tablets by 2012-end, which will coincide with the worldwide deployment of an advanced technology that it plans to use, two people familiar with the development told ET.

The company had earlier planned to launch services by mid next year on data cards that could be plugged into computers and laptops. The RIL services is based on fourth generation, or 4G, technology which offers faster internet access compared to third generation (3G) services. RIL plans to launch tablets at around Rs 3,500 and bundle it with data offering as low as 1 GB at Rs 10, a tenth of the current 3G prices.

RIL's entry and price disruption could therefore nullify the business case for 3G for existing mobile operators, all of whom on an average offer 1 GB of downloads for Rs 100 at present. Analysts also add that the immediate threat posed by RIL's entry will be to operators like Sistema Shyam and Tata Teleservices, the largest players in the dongle business, plug-in devices that provide wireless connectivity to the internet.

An industry expert who asked not to be named said: "Frankly I am quite surprised that none of these companies is treating RIL's launch as a threat at the moment. I would think it is time to start gearing up for it. I don't see any of them doing anything." RIL is the only company to have pan-India spectrum to offer wireless broadband services on the 4G technology platform having paid Rs 13,000 crore for these airwaves.
It will be launching services based on Qualcomm's long term evolution, or LTE, technology, which is currently in test phase. Global majors like Vodafone, Verizon and Telenor have deployed LTE networks in some developed markets. While subsidising devices will be main pillar of RIL's upcoming 4G mobile services offerings, the company is also analysing lessons from its previous foray into mobility. India's largest private sector company had launched mobile services in 2003, before the group was split between brothers Mukesh and Anil Ambani. At the time, it offered mobile handsets at an initial payment of Rs 501.

In 2006, after Anil Ambani took charge of the telecom unit of the divided Reliance group, the operator struggled with unpaid bills and wrote of nearly Rs 4,500 crore primarily on account of the discount scheme.

The RIL management is still working on structures that will avoid defaults of a similar nature, said one person.

The company said its broadband offerings were still in the planning phase and no dates had been finalised.
"Infotel Broadband Services is currently in the process of actively evaluating various technologies that will form a part of its pan-India rollout. At this stage, we have neither finalised a date for launching the services, nor the various types of services and associated tariff plans that we would offer at launch," the company spokesman said in an e-mail statement. "It is our intention to make all of our offerings device agnostic, and our services will be supported by a wide variety of devices from multiple vendors.

We will, at appropriate times, make announcements about our plans," Reliance Industries spokesperson said. Currently the cheapest tablets in the market are between Rs 12,000 and Rs 13,000, including one of Reliance Communications at Rs 12,999, which it plans to bring down by 50% by late next year as volumes increase. Tablets and smartphones spur increases in data consumption and these services are billed at a premium giving some relief to operators hit by falling profit margins due to hyper competition in the voice calling space.

source: Economic Times

Send Free SMS Without Registration or Login

Now You can Send SMS to anyone in India without registration.

On the occasion of New Year 2012, many of us want to send sms without following the long term registration process.

You can send SMS upto 160 character in anywhere in India. Delivery is instant but fast enough as compared to paid mobile services.

Click on this link to send free SMS without registering your mobile anywhere  http://smsti.in/send-free-sms/

Here you need to put the mobile number of those whom you want to send sms. Write your message and click on send button. You SMS will be delivered very quickly.

Jul 22, 2011


Cyber Crime Complaints And Resolution Assistance Center [CCC-RAC]

CCC-RAC is a  public information and assistance service dedicated to the assistance of Cyber Crime Victims in India.

The Cyber crime resolution infrastructure in India is still in a nascent stage and inadequate. As a result, whenever a Cyber Crime occurs, the victim is at a loss to understand where he should seek relief.
This center is a public service division of Naavi.org and aims at providing guidance to the victims of what they are expected to do when they observe a crime against them.

CCC-RAC will function from Bangalore and maintain a group of accredited legal advisors who will provide litigation assistance to the victims.

Interested parties may utilize the mediation and arbitration services offered by www.arbitration.in for resolving their disputes as per applicable provisions of law. Such services can be used only if both parties to the dispute agree on the use of the facilities.

For more information on Naavi and activities of Naavi.org, check www.naavi.org 

[Before Lodging Your Complaint check if you need the services of www.ceac.in  for archiving the evidence on which you are basing your complaint. For some useful information on procedural aspects of a Criminal Case, refer this FAQ]
Following are the contact details of some of the Cyber Crime Police Stations set up by different States. Victims in the respective jurisdiction may contact them based on the "Location".

For example, a victim in Madurai should contact Cyber Crime Cell, CB CID, Chennai while a victim in Chennai City needs to contact the Cyber Crime Cell at Egmore.
The names of the officers in charge is as per information available at present and may not be correct. Your complaint can be made by designation.

These officers are not in anyway connected with this information center.

If you donot find a Cyber Crime Police Station in your location, you may lodge the complaint in the Police Station nearest to their residence or contact the SP in the area.
CCC_RAC will only provide legal assistance through its associate members where available. 

Location Officer In Charge Address Telephone No E-mail
Chennai Dr Sudhakar Assistant Comissioner of Police
Cyber Crime Cell
Commissioner office Campus
Egmore, Chennai- 600008
Chennai for Rest of Tamil Nadu ACP Cyber Crime Cell No:3, SIDCO Electronic Complex, I Floor, Guindy, Chennai - 32.
Address Complaints to : ADGP, CBCID

Off:ADGP-CB CID 044-22509229/22502501
 DIG CBCID: 044 22502503
Control Room: 044 22502510
cbcyber@tn.nic.in Notification
Bangalore for the Whole of Karnataka - Cyber Crime Police Station
C.O.D Headquarters,
Carlton House,
# 1, Palace Road,
Bangalore - 560 001
080-22387611 (FAX)
Toll-free telephone number for filing petitions is :100 or
ccps@kar.nic.in ccps@blr.vsnl.net.in
http://www.ksp.gov.in  (Police website where complaints can be lodged online)
(NGO site where public can notify crimes)
List of e-mail addresses of all Senior Police officers in Karnataka : (P.S: Some mail addresses may be incorrect)
Hyderabad -
Crime Investigation Department, 3rd Floor, D.G.P. Office, Lakdikapool, Hyderabad-500004
 040-23240663, 040-27852274 040- 23297474 (Fax) cidap@cidap.gov.in info@cidap.gov.in
Mumbai -
Cyber Crime Investigation Cell (Crime Branch, C.I.D), Annex-III Building, Police Commissioner Office, Crowford Market, Mumbai

officer@cybercellmumbai.com http://www.cybercellmumbai.com/
Lucknow   Cyber Crime Investigation Cell    
Trivandrum   Cyber Crime Reporting Center Call center(0471) 2727004 www.cyberkeralam.in http://keralapolice.org/newsite/ccps.html
Thane   3rd Floor, Police Commissioner Office
Near Court Naka, Thane West,
Thane 400601.
022-25424444 www.thanepolice.org
E-Mail: police@thanepolice.org
Pune   Assistant Commissioner of Police
Cyber Crime Investigation Cell
Police Commissioner Office of Pune
2, Sadhu Vaswani Road, Camp,
Pune 411001
020-2612 7277
020-2616 5396
020-2612 8105 (Fax)
Web site: http://punepolice.com/crime branch.html
E-Mail: punepolice@vsnl.com
DIG, CID, Crime and Railways
Fifth Floor
Police Bhavan
Sector 18, Gandhinagar 382 018
079-2325 4384
+91-79-2325 3917 (FAX)
Delhi   CBI Cyber Crime Cell:
Superintendent of Police,
Cyber Crime Investigation Cell
Central Bureau of Investigation,
5th Floor, Block No.3, CGO Complex,
Lodhi Road, New Delhi – 3

Address of CBI Cyber Crime Cell
Supdt. of Police, Cyber Crime Investigation Cell Central Bureau of Investigation, 5th Floor, Block , No.3, CGO Complex, Lodhi Road, New Delhi - 3, Phone: 4362203, 4392424 : EMail: cbiccic@bol.net.in : Web: http://cbi.nic.in/

Contact Address of Yahoo Mail and Hotmail Representative offices in India having responsibility as service providers for any Cyber Crime committed in India under ITA-2000 or other Laws.
Address of Yahoo India office:
Yahoo Web Services India Private Limited, 386 Veer Savarkar Marg, Opposite Siddhivinayak temple, Mumbai 400 025, 22 56622222, 22 56622244.e-mail: ad-sales-india@yahoo-inc.com
Yahoo also has an R & D center in Bangalore at the following address:  
Yahoo! Software Development India Pvt. Ltd.  4th floor, "Esquire Center", #9, M.G. Road, Bangalore - 560 001. Phone: +91 80 6694 9494, Fax: +91 80 6694 9595
Any complaint regarding abuse of yahoo mail can be filed through this web page:

Address of MSN India Office:
MSN India, Prestige Takt, 23 Kasturba Gandhi Cross,Bangalore – 560 001, eMail: msnadin@microsoft.com, Tel: 91-80-2121212
E-Mail Addresses of different Cyber Crime Cells in Kerala
Email ID
Trivandrum city cybercelltvmcity@keralapolice.gov.in
Trivandrum rural cybercelltvmrl@keralapolice.gov.in
Kollam cybercellklm@keralapolice.gov.in
Pathanamthitta cybercellpta@keralapolice.gov.in
Alappuzha cybercellalpy@keralapolice.gov.in
Kottayam cybercellktm@keralapolice.gov.in
Idukki cybercellidk@keralapolice.gov.in
Eranakulam City cybercellekmcity@keralapolice.gov.in
Eranakulam rural cybercellekmrl@keralapolice.gov.in
Thrissure cybercelltsr@keralapolice.gov.in
Palakkad cybercellpkd@keralapolice.gov.in
Malappuram cybercellmpm@keralapolice.gov.in
Kozhikkode City cybercellkkdcity@keralapolice.gov.in
Kozhikkode Rural cybercellkkdrl@keralapolice.gov.in
Wayanad cybercellwynd@keralapolice.gov.in
Kannur cybercellknr@keralapolice.gov.in
Kasaragode cybercellksd@keralapolice.gov.in

[P.S: CCC-RAC is not a Police Station]


An Act to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as "Electronic Commerce", which involve the use of alternatives to paper-based methods of communication and storage of information, to facilitate electronic filing of documents with the Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act, 1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and for matters connected therewith or incidental thereto.

WHEREAS the General Assembly of the United Nations by resolution A/RES/51/162, dated the 30th January, 1997 has adopted the Model Law on Electronic Commerce adopted by the United Nations Commission on International Trade Law;

AND WHEREAS the said resolution recommends, inter alia, that all States give favourable consideration to the said Model Law when they enact or revise their laws, in view of the need for uniformity of the law applicable to alternatives to paper-based methods of communication and storage of information; 

AND WHEREAS it is considered necessary to give effect to the said resolution and to promote efficient delivery of Government services by means of reliable electronic records; 

BE it enacted by Parliament in the Fifty-first Year of the Republic of India as follows:-
1) Short title, extent, commencement and application
2) Definitions
3) Authentication of electronic records.
4) Legal recognition of electronic records.
5) Legal recognition of digital signatures.
6) Use of electronic records and digital signatures in Government and its agencies.
7) Retention of electronic records.
8) Publication of rules, regulation, etc., in Electronic Gazette.
9) Sections 6,7 and 8 not to confer right to insist document should be accepted in electronic form
10) Power to make rules by Central Government in respect of digital signature
11) Attribution of electronic records.
12) Acknowledgement of receipt.
13) Time and place of despatch and receipt of electronic record.
14) Secure electronic record.
15) Secure digital signature.
16) Security procedure.
17) Appointment of Controller and other officers.
18) Functions of Controller.
19) Recognition of foreign Certifying Authorities.
20) Controller to act as repository.
21) Licence to issue Digital Signature Certificates.
22) Application for licence.
23) Renewal of licence.
24) Procedure for grant or rejection of licence.
25) Suspension of licence.
26) Notice of suspension or revocation of licence.
27) Power to delegate.
28) Power to investigate contraventions.
29) Access to computers and data.
30) Certifying Authority to follow certain procedures.
31) Certifying Authority to ensure compliance of the Act, etc.
32) Display of licence.
33) Surrender of licence.
34) Disclosure.
35) Certifying Authority to issue Digital Signature Certificate.
36) Representations upon issuance of Digital Signature Certificate.
37) Suspension of Digital Signature Certificate.
38) Revocation of Digital Signature Certificate.
39) Notice of suspension or revocation.
40) Generating key pair.
41) Acceptance of Digital Signature Certificate.
42) Control of private key.
43) Penalty for damage to computer, computer system, etc.
44) Penalty for failure to furnish information, return, etc.
45) Residuary penalty.
46) Power to adjudicate.
47) Factors to be taken into account by the adjudicating officer.
48) Establishment of Cyber Appellate Tribunal.
49) Composition of Cyber Appellate Tribunal.
50) Qualifications for appointment as Presiding Officer of the Cyber Appellate Tribunal.
51) Term of office
52) Salary, allowances and other terms and conditions of service of Presiding Officer.
53) Filling up of vacancies.
54) Resignation and removal.
55) Orders constituting Appellate Tribunal to be final and not to invalidate its proceedings.
56) Staff of the Cyber Appellate Tribunal.
57) Appeal to Cyber Regulations Appellate Tribunal.
58) Procedure and powers of the Cyber Appellate Tribunal.
59) Right to legal representation.
60) Limitation.
61) Civil court not to have jurisdiction.
62) Appeal to High Court.
63) Compounding of contraventions.
64) Recovery of penalty
65) Tampering with computer source documents.
66) Hacking with Computer System.
67) Publishing of information which is obscene in electronic form.
68) Power of the Controller to give directions.
69) Directions of Controller to a subscriber to extend facilities to decrypt information.
70) Protected system
71) Penalty for misrepresentation.
72) Breach of confidentiality and privacy.
73) Penalty for publishing Digital Signature Certificate false in certain particulars.
74) Publication for fraudulent purpose.
75) Act to apply for offences or contravention committed outside India.
76) Confiscation.
77) Penalties and confiscation not to interfere with other punishments
78) Power to investigate offences.
79. Network service providers no to be liable in certain cases
80) Power of police officer and other officers to enter, search, etc.
81) Act to have overriding effect.
82) Controller, Deputy Controller and Assistant Controllers to be public servants.
83) Power to give directions.
84) Protection of action taken in good faith.
85) Offences by Companies.
86) Removal of difficulties.
87) Power of Central Government to make rules.
88) Constitution of Advisory Committee.
89) Power of Controller to make regulations.
90) Power of State Government to make rules.
91) Amendment of Act 45 of 1860.
92) Amendment of Act 1 of 1872.
93) Amendment of Act 18 of 1891.
94) Amendment of Act 2 of 1934.
THE FIRST SCHEDULE (See section 91)
THE SECOND SCHEDULE (See section 92)
THE THIRD SCHEDULE (See section 93)

Frequently Used Cyber Crimes

 Unauthorized access to computer systems or networks
This activity is commonly referred to as hacking. The Indian law has however given a different connotation to the term hacking, so we will not use the term "unauthorized access" interchangeably with the term "hacking".

Theft of information contained in electronic form
This includes information stored in computer hard disks, removable storage media etc.

Email bombing
Email bombing refers to sending a large number of emails to the victim resulting in the victim's email account (in case of an individual) or mail servers (in case of a company or an email service provider) crashing. In one case, a foreigner who had been residing in Simla, India for almost thirty years wanted to avail of a scheme introduced by the Simla Housing Board to buy land at lower rates. When he made an application it was rejected on the grounds that the 169 schemes was available only for citizens of India. He decided to take his revenge. Consequently he sent thousands of mails to the Simla Housing Board and repeatedly kept sending e-mails till their servers crashed.

Data diddling
This kind of an attack involves altering raw data just before it is processed by a computer and then changing it back after the processing is completed. Electricity Boards in India have been victims to data diddling programs inserted when private parties were computerizing their systems.

Salami attacks
These attacks are used for the commission of financial crimes. The key here is to make the alteration so insignificant that in a single case it would go completely unnoticed. E.g. a bank employee inserts a program, into the bank's servers, that deducts a small amount of money (say Rs. 5 a month) from the account of every customer. No account holder will probably notice this unauthorized debit, but the bank employee will make a sizable amount of money every month.

To cite an example, an employee of a bank in USA was dismissed from his job. Disgruntled at having been supposedly mistreated by his employers the man first introduced a logic bomb into the bank's systems.
Logic bombs are programmes, which are activated on the occurrence of a particular predefined event. The logic bomb was programmed to take ten cents from all the accounts in the bank and put them into the account of the person whose name was alphabetically the last in the bank's rosters. Then he went and opened an account in the name of Ziegler. The amount being withdrawn from each of the accounts in the bank was so insignificant that neither any of the account holders nor the bank officials noticed the fault.

It was brought to their notice when a person by the name of Zygler opened his account in that bank. He was surprised to find a sizable amount of money being transferred into his account every Saturday.

Denial of Service attack
This involves flooding a computer resource with more requests than it can handle. This causes the resource (e.g. a web server) to crash thereby denying authorized users the service offered by the resource. Another variation to a typical denial of service attack is known as a Distributed Denial of Service (DDoS) attack wherein the perpetrators are many and are geographically widespread. It is very difficult to control such attacks. The attack is initiated by sending excessive demands to the victim's computer(s), exceeding the limit that the victim's servers can support and making the servers crash. Denial-of-service attacks have had an impressive history having, in the past, brought down websites like Amazon, CNN, Yahoo and eBay!

Virus / worm attacks
Viruses are programs that attach themselves to a computer or a file and then circulate themselves to other files and to other computers on a network. They usually affect the data on a computer, either by altering or deleting it. Worms, unlike viruses do not need the host to attach themselves to. They merely make functional copies of themselves and do this repeatedly till they eat up all the available space on a computer's memory. 170 The VBS_LOVELETTER virus (better known as the Love Bug or the ILOVEYOU virus) was reportedly written by a Filipino undergraduate.

In May 2000, this deadly virus beat the Melissa virus hollow - it became the world's most prevalent virus. It struck one in every five personal computers in the world. When the virus was brought under check the true magnitude of the losses was incomprehensible. Losses incurred during this virus attack were pegged at US $ 10 billion.

The original VBS_LOVELETTER utilized the addresses in Microsoft Outlook and emailed itself to those addresses. The e-mail, which was sent out, had "ILOVEYOU" in its subject line. The attachment file was named "LOVE-LETTER-FORYOU. TXT.vbs". The subject line and those who had some knowledge of viruses, did not notice the tiny .vbs extension and believed the file to be a text file conquered people wary of opening e-mail attachments. The message in the e-mail was "kindly check the attached LOVELETTER coming from me".

Since the initial outbreak over thirty variants of the virus have been developed many of them following the original by just a few weeks. In addition, the Love Bug also uses the Internet Relay Chat (IRC) for its propagation. It e-mails itself to users in the same channel as the infected user. Unlike the Melissa virus this virus does have a destructive effect. Whereas the Melissa, once installed, merely inserts some text into the affected documents at a particular instant during the day, VBS_LOVELETTER first selects certain files and then inserts its own code in lieu of the original data contained in the file. This way it creates ever-increasing versions of itself. Probably the world's most famous worm was the Internet worm let loose on the Internet by Robert Morris sometime in 1988. The Internet was, then, still in its developing years and this worm, which affected thousands of computers, almost brought its development to a complete halt. It took a team of experts almost three days to get rid of the worm and in the meantime many of the computers had to be disconnected from the network.

Logic bombs
These are event dependent programs. This implies that these programs are created to do something only when a certain event (known as a trigger event) occurs. E.g. even some viruses may be termed logic bombs because they lie dormant all through the year and become active only on a particular date (like the Chernobyl virus).

Trojan attacks
A Trojan as this program is aptly called, is an unauthorized program which functions from inside what seems to be an authorized program, thereby concealing what it is actually doing.
There are many simple ways of installing a Trojan in someone's computer. To cite and example, two friends Rahul and Mukesh (names changed), had a heated argument over one girl, Radha (name changed) whom they both liked. When the girl, asked to choose, chose Mukesh over Rahul, Rahul decided to get even. On the 14th of February, he sent Mukesh a spoofed e-card, which appeared to have come from Radha's mail account. The e-card actually contained a Trojan. As soon as Mukesh opened the card, the Trojan was installed on his computer. Rahul now had complete control over Mukesh's computer and proceeded to harass him thoroughly.

Internet time thefts
This connotes the usage by an unauthorized person of the Internet hours paid for by another person. In a case reported before the enactment of the Information Technology Act, 2000 Colonel Bajwa, a resident of New Delhi, asked a nearby net café owner to come and set up his Internet connection. For this purpose, the net café owner needed to know his username and password. After having set up the connection he went away with knowing the present username and password. He then sold this information to another net café. One week later Colonel Bajwa found that his Internet hours were almost over. Out of the 100 hours that he had bought, 94 hours had been used up within the span of that week. Surprised, he reported the incident to the Delhi police. The police could not believe that time could be stolen. They were not aware of the concept of time-theft at all. Colonel Bajwa's report was rejected. He decided to approach The Times of India, New Delhi. They, in turn carried a report about the inadequacy of the New Delhi Police in handling cyber crimes. The Commissioner of Police, Delhi then took the case into his own hands and the police under his directions raided and arrested the net café owner under the charge of theft as defined by the Indian Penal Code. The net café owner spent several weeks locked up in Tihar jail before being granted bail.

Web jacking

This occurs when someone forcefully takes control of a website (by cracking the password and later changing it). The actual owner of the website does not have any more control over what appears on that website In a recent incident reported in the USA the owner of a hobby website for children received an e-mail informing her that a group of hackers had gained control over her website. They demanded a ransom of 1 million dollars from her. The owner, a schoolteacher, did not take the threat seriously. She felt that it was just a scare tactic and ignored the e-mail. It was three days later that she came to know, following many telephone calls from all over the country, that the hackers had web jacked her website. 

Subsequently, they had altered a portion of the website which was entitled 'How to have fun with goldfish'. In all the places where it had been mentioned, they had replaced the word 'goldfish' with the word 'piranhas'. Piranhas are tiny but extremely dangerous flesh-eating fish. Many children had visited the popular website and had believed what the contents of the website suggested. These unfortunate children followed the instructions, tried to play with piranhas, which they bought from pet shops, and were very seriously injured!

Theft of computer system
This type of offence involves the theft of a computer, some part(s) of a computer or a peripheral attached to the computer.

Physically damaging a computer system
This crime is committed by physically damaging a computer or its peripherals.

Jul 18, 2011


20 Facebook Hacks and Tips You Might Not Know

If you surf Facebook on daily basis or occasionally, chances are you’re already familiar with regular stuffs like add/delete friends, update statuses, walls and profile, add and explore pages & applications, etc, but there’s more..

This week we want to cover some interesting things you can do on (or with) Facebook; inclusive of tricks that are not documented or unknown to many, as well as tips to stay connected better with your friends. 

Without further ado, here’s 20 Facebook Tips/Tricks You Might Not Know

       1.How to Place Facebook Chat On Firefox Sidebar
            If you are using Firefox, you can place the Facebook Chat at the sidebar.

  1. Facebook_Chat_Firefox_Sidebar
  2. How to Download Facebook Photo Albums

    FacePAD: Facebook Photo Album Downloader allows you to download your friends’ facebook albums, Events albums, and Group Albums, en masse, with the click of a button.
  3. How to Share Flickr Photos to Facebook

    Flickr2Facebook is an unofficial Flickr to Facebook uploader(bookmarklet) which allows you upload photos to Facebook from Flickr.
  4. How to Update Facebook without Using Facebook

    hellotxt and Ping.fm both introduced features that let Facebook administrators update Facebook Pages.
  5. How to Schedule Facebook Messages

    Sendible lets you schedule Facebook messages ahead of time so you can send messages to your friends, customers or colleagues in the future.
  6. How to "Friend" Someone on Facebook & Hide It From Your Status Updates

    A short tutorial on Makeuseof to guide you how to hide Facebook status updates and keep that fact confined to your closer friends.
  7. How to Create a Photo Collage Using Pictures of Your Facebook Friends

    Click on Friends tab. Proceed to More tab. From "Choose an option" dropdown, choose any of the dashes "" . Your Facebook friends collage is right on your computer screen.
  8. How to Know When Facebook Friends Secretly Delete or Block You

    X-Friends is a unique tool for tracking friends that disappear from Facebook.
  9. How to Display Selected Pictures Only on your Facebook Profile Page

    A little-known feature in Facebook that lets you decide who shows up in that Friends box. Click that "edit" pencil in your Friends box and type the names of your best friends in the box that says "Always show these friends"
  10. How to Remove Facebook Advertisements

    This Greasemonkey script – Facebook: Cleaner removes many of the annoying ads and updates that unavoidably appear on your Facebook pages.
  11. How to Syncs Photos of Facebook Friends with Contacts in Microsoft Outlook

    OutSync is a free Windows application that syncs photos of your Facebook friends with matching contacts in Microsoft Outlook. It allows you to select which contacts are updated. So you can update all contacts at once or just a few at a time.
  12. How to Display Facebook Statuses on Wordpress Blog

    The following method make use of Facebook status feed and Wordpress RSS widget to display Facebook Statuses on WordPress blog.. It will also work for self-host Wordpress blogs.
  13. How to Post Your Blog Posts to Your Facebook Wall Automatically

    Wordbook allows you to cross-post your blog posts to your Facebook Wall. Your Facebook “Boxes” tab will show your most recent blog posts.
  14. How to Access Facebook Chat on Desktop

    Gabtastik and digsby let you keep Facebook chat sessions open on your Windows desktop outside of your regular web browser, using minimal screen real estate and system memory.
  15. How to Create Quiz on Facebook Easily

    LOLapps provides quiz creator that can be employed to conjure up these popular personality quizzes that are so widespread in Facebook.
  16. How to Hide Your Online Status on Facebook Chat from Select Contacts

    Facebook has integrated friends list with Chat and you can also choose which of these list members get to see you online.
  17. How to Get Facebook Updates on Email

    NutshellMail consolidates your Facebook accounts through the inbox you use the most.
  18. How to Update Facebook Status from Firefox

    FireStatus is a status update utility for multiple social networks, including FaceBook.
  19. How to Get Facebook on Your Desktop

    Seesmic DesktopFacebookerXobniFacebook Sidebar GadgetScrapboy and Facebook AIR application are desktop applications that allows you interact with your stream just as you would on Facebook, but without the browser.
  20. How to Delete, Cancel and Terminate Facebook Account and Profile

    A simple guide to terminate, delete or cancel Facebook account, together with the Facebook profile easily.

Source: Hongkiat.com