This is default featured slide 1 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 2 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 3 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 4 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

This is default featured slide 5 title

Go to Blogger edit html and find these sentences.Now replace these sentences with your own descriptions.

3 Ways a Twitter Hack

Just days after popular social networking tool Twitter was hit was a phishing scam, the company is now trying to clean up a mess surrounding a separate hacking attack.
Over the weekend, some Twitter users received scam tweets, or direct messages, to visit certain sites or blogs. The URL in the message redirected users to a bogus login page in an attempt to steal login credentials for a phishing scheme. Monday, thing got worse as Twitter officials revealed several high profile accounts, such as those of Britney Spears and Barack Obama were hacked.



"It appears someone gained access to the tools Twitter uses to control its millions of accounts," explained Graham Cluley, a senior technology consultant at security firm Sophos PLC. "Internal tools used by the tech support team were compromised. It's not clear if it was an inside job, or outside hacker. Twitter does say they think it was an individual."

The hack, according to Cluley, is much more serious than the earlier phishing attack because it was compromise of the system that potentially exposed all Twitter users to the following dangers.



Fraudalent password use If you gain access to someone's Twitter account, you might be able to gain access to their password, said Cluley.

"We know that 41 percent of people admit to using the same password on every web site and account that they access," he said.

Hackers, while gaining access to something seemingly simply like a username and password to one account may very well be able to use the information to gain access to more important information, such as your bank account.

Malware Infection Twitter officials said 33 accounts had been attacked in the latest hack, including high-profile users such as Britney Spears and Barack Obama. The hackers used their temporary access to send offensive messages. CNN journalist Rick Sanchez found his account had been hacked with a message that read "i am high on crack right now might not be coming to work today."

The damage could have been much worse, said Cluley, if the hacker had decided to take a different approach.

"Imagine if instead, in the case of Britney Spears account for example, that the hacker had posted a link that said: 'Here's my new video. Click on this link.' Imagine how many people would have clicked on that and it could have pointed to malware? And Barack Obama is one of the most followed people on Twitter. If he said: 'I've just made a new speech. Check it out.' a lot of people would click on that link and get infected."



source:network world

How To Identify Fonts Being Used In Images

Have you ever encountered problems in identifying what fonts is being used in an image? Of course fonts being used in popular movie banners can be found easily because you have the keyword but what if you found a free template and the font is not included? You either recreate the buttons with your own fonts replacing the original, or try posting in forums and hope that someone would have seen that font before and let you know what is the font name. There are so many fonts, maybe hundred of thousands fonts available on the internet and to identify an unknown font is definitely NOT an easy task!

If you need to identify a font, don’t despair. I have found 2 methods that is able to help you identify an unknown font. If it is not able to help you identify the font, it will at least help you narrow down to the closest ones.



Identifont, a free service offered to help you identify fonts by answering a series of simple questions about its appearance.
 
[ Identify Unknown Fonts with Identifont ]
 
Images can be color or black & white, and they don’t have to be very high quality (although that helps). Even a digital photograph of some lettering you like can be accepted. Accuracy of results is unprecedented by previous automatic systems. [ Identify Unknown Fonts with WhatTheFont ]

Finally, if WhatTheFont system is unable to give you a good match of the font you’re looking for, you can then submit your image to WhatTheFont Forum to have your image viewed by font geeks the world over.

Creates Auto-Starting Installer CDs for Any Applications

Windows only: Free app Install-It puts a small auto-starting application on any removable drive that makes installing applications a double-click affair.

After downloading the Install-It package, you'll want to extract its files to somewhere you can reach, like your desktop, and open up the Install.ini file in your favorite text editor. This file is simply a list of program descriptions and the locations of their installer files. If you're creating a disc full of useful installers, just replace the default examples with your chosen verbiage for each app and the location/names of the setup files. You separate those two items with a comma, using slashes where necessary, and end each line with a semi-colon.

Here's an example Install.ini I made for a supposed Windows XP re-installation:



Copy all your installer files and Install-It's files into a CD-burning app, such as CDBurnerXP, and fire away.

Now you've got a CD that, on most computers, will pop up with a list of programs that can be installed without anyone having to guess which icon or cryptic filename means. If a computer isn't set to auto-start when it detects an autorun.inf file, though, you'll have to point the computer to install.exe—not a problem, though, if you've put each application in its own directory.

Install-It is a free download for Windows systems only.

Install-It [via The Red Ferret Journal

Lock ID Yahoo Messenger: How to Unlock your Locked ID?

Lock ID means that your ID of Yahoo Messenger cannot be used anymore caused by someone who lock your ID. When you ID got locked, you will never be able to join or login to yahoo messenger. It mean, when you try to type your ID and type your password in chat client such as official chat client of yahoo messenger the error message will arise. Usually the error told that your password or username is incorrect.



You are being in chat room. Than suddenly, your got disconnected. When you try to login with your password and ID, the error that I told above appear. It may be you got locked. Lock ID work to lock you ID or username because you have a weak password, so whit a little iterations your password got locked. However, you will never got locked if you never online or login to yahoo messenger. Lock ID usually working if you are online.



How to unlock your ID if you got locked? You can find or search the software or tool to unlock your password again. However, if the ID or username not online, it usually the software not working that mean the unlocking doesn’t work.



For that reason, I will not share or give a link of download unlock ID software because, I am not guarantee the software work well. The best attempt to unlock your ID is, try to login not by yahoo messenger, but by mail of yahoo which has a same user name and password that been locked. Sometime, this step worked, but make sure after your login to yahoo mail and success, you have to change your password with new password, and then you can login to yahoo messenger with new password that you just been created. If you try to send a complain to the contact of yahoo messenger, It will useless. Yahoo doesn’t care what happen to your if you go locked.



To protect your ID or to prevent Lock ID, you must have a strong password. I will suggest you to not chat with your primary email in yahoo messenger. Sometime yahoo makes a prohibition to some of ID. This mean your ID can be banned by yahoo and your ID never be join to yahoo messenger or yahoo email again.



To create a strong password you must use all character who listed in your keyboard. Such as uppercase, number, and symbol. You must be create password which have not less 8 character or more. Here I give you an example a strong password: H4rP3 ^&* (with 3 space on it). To make a better password work well, you have to change your password frequently: 3 week or 3 month, depending how strong and important your password is.

Make Internet Calls from Computer PC to Phone Free Services Include

Below is the list (Website and Tools) how you can make a call to phone including mobile phone or home phone that you can do from you computer just only using Internet. That means you don’t use a cellphone or handphone or any phone, you just use Internet Connection and you desktop or Laptop or NoteBook or NetBook  computer



  • Magic Jack - Most Call are Free .

  • Skype - PC to PC aka skype to Skype Free Call, Need Charge for pc to Phone but cheaper that Phone to Phone

  • Yahoo! Voice - PC to PC Free using Yahoo Messenger Voice Talk, Need Charge for PC to Mobile Phone and else but in low cost

  • PalTalk - PC to PC and als PC to Phone

  • BuddyTalk

  • JaJah

  • DukaDial - North America Free Call

  • Voipcheap - Free Internet Calls (Limited)

  • sharpVoice

  • iConnectHere = PC to Pnone Calls

  • PC2Call - Prepaid Calls

  • YouTring - Free PC to PC, Cheap PC to Phone, International Calls available.

  • EvaPhone - Free VoiP Service PC to Cell Phone Home Phone all over the World

  • Net2Phone

How to get back your lost usb -USB Lost and Found

USB Lost and Found is a tool to setup your USB drive to keep unauthorized users from keeping your USB drive if it were to be lost. USB Lost and Found has two methods of telling unauthorized users to return it. The first method is the Message method which when the user tries to use your USB drive it comes up with a message box that tells them to return it, along with your contact information, and denies access to the USB drive. The second method, which only comes with the Pro version, is called Lock Down. Lock Down immediately locks the user's computer when the USB drive is accessed, covering the whole screen and denying access.

Message method:
[Image]
Lock Down method (Pro version only):
[Image]

[Image]

-Download/Version-
· This version of USB Lost and Found is currently 1.1

· You can download the Free version here. (1.2MB file)

· You can buy the Pro version below



-Requirements-
· Personal computer with Windows 2000/XP/Server/Vista



-Release Notes-
· 1.1:

· Redesigned installer

· Redesigned unlocking system

· Fixed Pro version password on Message selection bug

· 1.0:

· Publicly Released





-Features-
· Free version only has the Message method.

· Pro version has the Message method and the Lock Down method.

· Tricks users to not open it with AutoPlay and run Lock Down/Message.

· Double clicking the USB drive in My Computer causes Lock Down/Message to run.

· Fine with many Anti-viruses.



      Disclaimer: This software is shareware, if you liked it, buy the Pro version. The creator and contributors are not responsible with your actions with any of this software, and cannot be held accountable for any of it. You are not allowed to redistribute this software without Skyler Lyon's permission and consent. By using this software you agree to these terms.
[ Download USB Lost and Found ]

How to delete duplicate Wordpress posts

It can also used to delete the duplicate posts by wp-o-matic



I recently ran into trouble with a Wordpress installation of mine, where a homemade script went totally overboard, and never stopped running, adding posts to the database. Over a few days it added close to 9.000 posts, of which all were duplicates.

After a bit of searching I found the problem, but getting into the database to clean up was a bit of a problem, since the script was still running. I had to remove the script totally from my install in order to stop it!





After a bit of google search i found this trick its working 100% i tried with wordpress 2.6





login in to your  cpanel and go to the phpmyadmin  and select the your wordpress database and run this script in the  query window



DELETE bad_rows.*

from wp_posts as bad_rows

inner join (

select post_title, MIN(id) as min_id

from wp_posts

group by post_title

having count(*) > 1

) as good_rows on good_rows.post_title = bad_rows.post_title

and good_rows.min_id <> bad_rows.id
after deleting the posts u can  prevent the  duplicate post by Wp-o-matic

  1. Open up wp-includes/post.php in your favorite editor

  2. at approx line 703 you will find the following line :

    if ($post_name_check || in_array($post_name, $wp_rewrite->feeds) ) {

  3. After this insert a new line of code :

    return 0;

  4. save (you did make a backup, right?).

  5. All done.