.

WhatsApp will add voice calls later this year


WhatsApp will add voice calls later this year

Plenty have been wondering what's next for WhatsApp after the popular messaging service was purchased by Facebook for $16 billion last week, and now we have the answer: voice calls. According to TechCrunch, WhatsApp announced during a Mobile World Congress event today that it would be adding voice services to iOS and Android during the second quarter of the year. The feature will reportedly head to Nokia devices and BlackBerrys sometime after that.
=
WhatsApp also provided an update on its active user count: it now has 465 million monthly active users and 330 million daily users, according to TechCrunch. That's 15 million more monthly users than Facebook detailed just last week when reporting the purchase. WhatsApp has already risen to an impressive popularity on basic messaging features alone, and the addition of voice calls should only enhance that further when they begin to roll out later this year. 

The app has done well by offering inexpensive messaging services where messaging is traditionally quite expensive, and doing the same for phone calls would likely be a boon for growth. WhatsApp is reportedly optimizing the amount of data its voice calls use, which should help in keeping users' expenses down as well.

The Guardian reports that WhatsApp's voice calling features will be free, though it's possible that this may only be for a limited time. Messaging is initially free within the app, but eventually requires a $0.99 per year subscription. It's likely that voice services will fall under this too, while breaking it out as a second offering could even provide an additional revenue stream. Though WhatsApp has never appeared eager to bother users with added costs like that on the path to big profits, it'll be interesting to see if that changes as a public company underneath Facebook.

How to Change Your Name on Facebook



How to Change Your Name on Facebook

Open your account settings. Log in to Facebook and click the Gear icon in the top-right corner of the page. Select “Account Settings”.
  • To access this on the mobile app, click the menu button in the top-left corner and scroll down to Account Settings. Select General, and then tap Name.
Click on your name to open the name editor. You can enter a First, Middle, and Last name, as well as an Alternate name (such as a nickname or maiden name).
  • Your name can only be changed four times.
  • Facebook wants you to list your name as it appears on your credit card or ID.
  • You cannot use symbols, numbers, random capitalization, or punctuation.
  • Your middle name cannot be words or phrases.
  • Nicknames should be variations on your real name (rique or jhone..)
Enter your real name. Facebook does not allow you to impersonate someone else, or create a page for a fictional character. Accounts found in violation of this will be forced to change the name.
  • If you want to create an account for an organization, business, or a pet, you will need to create a Facebook Page
Enter your password. To change your name, you will need to enter your password into the box before you are allowed to save your changes.

Click Save Changes. Your new name will be saved, and the change will reflect on your Profile shortly. It can take up to 24 hours for a name change to be approved.

 Red more

How do I change my name on facebook?

How do I change my name on facebook?

 
 
You can change your name or add an alternate name (ex: nickname or maiden name) to your account. To edit your name:
  1. Review our name standards
  2. Click in the upper-right corner of any Facebook page and select Settings
  3. Look for the Name setting and click Edit to the far right
  4. Type in your name and save your changes
Keep in mind:
  • To help make sure that everyone uses their real name, we limit the number of times you can change your name.
  • If you weren't able to change your name, we may be able to help.
You're reading the Desktop Help answer. Learn more in our other Help Centers.
 
Soure:  http://www.facebook.com/help/www/173909489329079

red more 

Transfer files between Android and Windows devices






Andrew Cheng asked for advice on the best ways to transfer files between his Android phone and his Windows PC.
The obvious way is to physically connect the phone to the PC, then drag and drop. But the obvious way isn't necessarily the best--or the most convenient. 


But let's start with that obvious way: Use a Micro USB cable, such as the one that almost certainly came with your Android device, to connect that device to your PC. The first time you do this, you may have to wait a bit while Windows sets up some drivers.
After that, the device will behave like an external drive. You can open it in Windows Explorer (File Explorer in Windows 8) and drag and drop files.
But as I said, there are more convenient ways, and they don't require a cable.
Cloud storage services such as Dropbox, Google Drive, and SkyDrive all support Android. You can send files, via each service's Android app, from the cloud to your device or from your device to the cloud. And everything you have stored in the cloud with one of these services automatically gets on your PC.
1226 dropbox
Let's consider Dropbox. In Android, Dropbox doesn't automatically sync all of the files in its appointed folder as it does in Windows. But you can download files from the Dropbox app to your phone or tablet's local storage. And you can upload files to Dropbox via an Upload here option on the app's pull-down menu.
Dropbox also provides an automatic way to send your photos to your PC. You can set this up in the Android Dropbox app:
  1. Tap the menu icon in the upper-right corner.
  2. Tap Settings.
  3. Tap Turn on Camera Upload.
  4. In order to avoid hitting your mobile data cap, you'll probably want to leave the Wi-Fi only option on.
Once this is set up, every time you snap a picture with your phone, it will automatically transfer to the Camera Upload folder inside your PC's Dropbox folder.
You can also transfer your local music collection without a cable, using your local Wi-Fi network. In other words, it only works when you're at home.
I recommend the free program doubleTwist. On your PC, it's a media sync tool that works with either a cable connection or Wi-Fi. The Android app is an excellent music player in its own right--as well as the other end of the syncing tool.
1226 doubletwist
With these tools, you'll seldom need the cable for anything but recharging.

Tags:

Android, Transfer files between Android and Windows devices, Android, android file transfer,

Android and Linux



Android has always been Linux, but for years the Android project went its own way and its code wasn't merged back into the main Linux tree. Now, much sooner than Linus Torvalds, Linux's founder and lead developer, had expected, Android has officially merged back into Linux's mainline.
The fork between Android and Linux all began in the fall of 2010, "Google engineer Patrick Brady stated that Android is not Linux" That was never actually the case. Android has always been Linux at heart.

At the same time though Google did take Android in a direction that wasn't compatible with the mainstream Linux kernel. As Greg Kroah-Hartman, the maintainer of the stable Linux kernel for the Linux Foundation and head of the Linux Driver Project, wrote in Android and the Linux kernel community, "The Android kernel code is more than just the few weird drivers that were in the drivers/staging/androidsubdirectory in the kernel. In order to get a working Android system, you need the new lock type they have created, as well as hooks in the core system for their security model. In order to write a driver for hardware to work on Android, you need to properly integrate into this new lock, as well as sometimes the bizarre security model. Oh, and then there's the totally-different framebuffer driver infrastructure as well." That flew like a lead balloon in Android circles.

This disagreement sprang from several sources. One was that Google's Android developers had adopted their own way to address power issues with WakeLocks. The other cause, as Google open source engineering manager Chris DiBona pointed out, was that Android's programmers were so busy working on Android device specifics that they had done a poor job of co-coordinating with the Linux kernel developers.

The upshot was that developer circles have had many heated words over what's the right way of handling Android specific code in Linux. The upshot of the dispute was that Torvalds dropped the Android drivers from the main Linux kernel in late 2009.

Despite these disagreements, there was never any danger as one claim had it in March 2011, that Android was somehow in danger of being sued by Linux because of Gnu General Public License, version 2 (GPLv2) violations. As Linus himself said at the time, claims that the Android violated the GPL were "totally bogus. We've always made it very clear that the kernel system call interfaces do not in any way result in a derived work as per the GPL, and the kernel details are exported through the kernel headers to all the normal glibc interfaces too."

Over the last few months though, as Torvalds explained last fall, that while "there's still a lot of merger to be done … eventually Android and Linux would come back to a common kernel, but it will probably not be for four to five years." Kroah-Hartman added at the time that one problem is that "Google's Android team is very small and over-subscribed to so they're resource restrained It would be cheaper in the long run for them to work with us." Torvalds then added that "We're just going different directions for a while, but in the long run the sides will come together so I'm not worried."
In the event the re-merger of the two went much faster than expected. At the 2011 Kernel Summit in Prague in late October, the Linux kernel developers "agreed that the bulk of the Android kernel code should probably be merged into the mainline." To help this process along, the Android Mainlining Project was formed.

Things continued to go along much faster then anyone had foreseen. By December, Kroah-Hartman could write, "by the 3.3 kernel release, the majority of the Android code will be merged, but more work is still left to do to better integrate the kernel and userspace portions in ways that are more palatable to the rest of the kernel community. That will take longer, but I don't foresee any major issues involved." He was right.

Today, you can compile the Android code in Linux 3.3 and it will boot. Still, as Kroah-Hartman warned, WakeLocks, still aren't in the main kernel, but even that's getting worked on. For all essential purposes, Android and Linux are back together again.

android virtualbox on windows 7

Install Android 4.0 Using VirtualBox on Windows, Mac or Linux [How-To]
Here is a complete procedure to Install Android OS on PC or laptop. Its very common that almost all smartphones providers are now moving to android platform. This is because it has endless features, supports many applications and there are hundreds of new free and paid apps entering into the market everyday. Android OS is getting popular day by day. This being on one side, here is a short tutorial on how to install Android OS on your PC or Laptop.


Preparing VirtualBox :  VirtualBox is a powerful x86 and AMD64/Intel64 virtualization product for enterprise as well as home use. Not only is VirtualBox an extremely feature rich, high performance product for enterprise customers, it is also the only professional solution that is freely available as Open Source Software under the terms of the GNU General Public License (GPL) version 2. See “About VirtualBox" for an introduction.
Presently, VirtualBox runs on Windows, Linux, Macintosh, and Solaris hosts and supports a large number of guest operating systems including but not limited to Windows (NT 4.0, 2000, XP, Server 2003, Vista, Windows 7), DOS/Windows 3.x, Linux (2.4 and 2.6), Solaris and OpenSolaris, OS/2, and OpenBSD.
You can download the setup file supported from the link. VirtualBox Download.

Preparing Android ISO File
Various Android ISO files are available over the internet. You can google search it easily. One of the providers I trust is Android-x86.org. Various versions of Android are available at it’s download page. For Android 4.0, scroll down the page to "Android-x86-4.0-RC1" and download the file supportive for you operating system. I recommend you to download android-x86-4.0-RC1-amd_brazos.iso”.

Installation Steps : 
1. After completing the download, install and run VirtualBox. You   would see a screen somewhat like this : 

 2. Click on New button at the top left of the VirtualBox window.

3. Click on Next and write the name as “Android OS 4.0” (You can provide any name, it completely depends on you). Select the Operating System as Linux and version as Other Linux. Then click on next.

4. Then select the memory for your device (RAM). 512MB is sufficient for an Android running on a VirtualBox. Click Next.

Note : Make sure the RAM you provide is always lesser than your computer or laptop  RAM, or hence your device would turn up slow and tend to hang.
5. After clicking Next the setup will ask you for a start-up hard disk. Select Create new hard disk. And Next.

6. On clicking Next you would see a virtual disk creation wizard. Select VDI(VirtualBox Disk Image) and Next.

7. Select Fixed size and click next, select the size to be 1GB. And proceed. Click on Create.

8. On the top left you would find a Settings button. Click on it. Go to Display and select video memory to 128MB. Check Enable 3D Acceleration . 
 

9. Go to Storage and in the storage tree select empty. And select the CD/DVD icon from the Attributes section. Now, select the path of you Android ISO file and select it.

10. No further changes in the Settings, click on OK.
11. Now click on the Start button. You would see a window somewhat like this.

You can run Android without installing it on your Virtual Hard Disk by pressing enter on to the first option.
NOTE : This would not save any setting on the Android. 


12. To Install, select the last option and press enter. Select Create/Modify Partition.

13. Select the [New], to create a new partition. 

14. Select the drive to be [Primary] and press enter. Don’t make any changes to the Size, just press enter. Click on [Bootable] and then [Write]. The setup would ask you to confirm your write. Type “Yes” and proceed.  
15. Now select [Quit].
16. You would now find your drive. Select it and press enter.

17.  Format it with ext3, then proceed. Select [Yes]. When setup ask for confirmation to install GRUB boot loader, select [Yes]. Next select [Yes] when it asks to install  system directory as read-write.
 18. Congratulations! You have installed Android OS on a virtual drive. Create a Fake SD card, if you want one. 
19. Before you start enjoying the fun, a main step has to go.  Reboot your device. Just before it get started, go to the devices menu on the top, select CD/DVD devices. Your ISO file will be the one selected there, choose the other option that is Host Drive ‘F’. Now Start the virtual machine.

20. After this go and run Android. You are done! 


Basic Information About Proxies




Don't you just love the Internet? I mean, there's just so much knowledge and information available on it at a moment's notice that it may feel staggering at times. Looking for cooking recipes? Do a search - get results. Looking for good books to read? Do a search - get results. Interested in weapon manufacturing techniques? Well, you can see where this is going. You can find any type of information online, sometimes even potentially dangerous information. The expression "from a needle to a steam train" really has weight behind it when considering what the Internet has to offer. There's also a strange side to it. Since you can find literally any type of information online, you can find information about how to do damage online. Hacking, phishing, spying; you can find information about all that without much effort. Doesn't sound very encouraging, doesn't it? Well, luckily, there are ways to counter such potential threats and make your surfing experience even safer.

What are proxies?

Depending on your technical knowledge, you probably know that every computer on the Internet has a unique designation assigned to it when it connects online. It is called an IP address and it's basically a series of numbers and decimals that signify which Internet provider company you use for Internet access, what country you're in and even what city you're located in. Why is it necessary to have such sensitive data on something so easily available? Well, it's just a basic precaution. If we could compare it to something, we would compare it to fingerprints. If someone commits a felony, they can often be tracked to the crime by fingerprints. An IP address is a virtual fingerprint that links a user account online to an actual existing individual. It's very handy, but it can also be potentially exploited. To prevent the risk of IP address misuse, proxies are available for everyone to use. A proxy basically makes sure that your IP address can't be so easily detected.

What do proxies do?

Proxies are basically used through proxy servers which have their own IP addresses. In short, whenever you use a proxy server, you use their IP address. You still retain your own unique IP, but your actual visible IP address is the one the proxy server uses. Since some information is contained in an IP address, this can produce some amusing results. For instance, you could be sitting behind your computer in the UK and appear as though you're in Croatia, if the proxy server uses an IP address for that country. A lot of services actually use proxy servers by default. For instance, if you've ever used a modern chat client, you first connect to their proxy server before connecting to any other user. This ensures that not just anyone can get your real IP address.

So proxies make me truly anonymous?

To be blunt, no, using proxies does not make you truly anonymous. Using a proxy server simply adds an additional security layer to increase your own security while surfing. It's not an excuse to feel like you're undetectable while online and attempts to exploit proxies will be punished eventually. A proxy provider keeps a log of IP addresses that used their services, so there's always residual information remaining that can link a person to a certain activity that way. Fortunately, this happens very, very rarely and using proxy servers is just simple enough to warrant their usage as an added security layer.
Visit http://thefreewebproxies.com to learn more about Proxy technology and get your daily fix of free web proxy lists.

Article Source: http://EzineArticles.com/6965699

CCNA 4 Chapter 1 v5.0 Exam Answers

CCNA 4 Chapter 1 v5.0 Exam Answers 2014

CCNA 4 Chapter 1

 

1.
What are two structured engineering principles necessary for successful implementation of a network design? (Choose two.)
quality of service
availability
security
resiliency
modularity

____________________________________________________________________
2
What is an important first consideration when starting to design a network?
access security
size of the network
protocols to be used
type of applications
____________________________________________________________________
3
Which two devices would commonly be found at the access layer of the hierarchical enterprise LAN design model? (Choose two.)
modular switch
access point
Layer 3 device
firewall
Layer 2 switch
____________________________________________________________________
4
A network engineer wants to redesign the wireless network and make use of wireless network controllers that manage the many deployed wireless access points. In which network design module of the campus network architecture would the centralized wireless network controllers be found?
enterprise edge
access-distribution
services
data center
____________________________________________________________________
5

Refer to the exhibit. Which type of Cisco hierarchical LAN design model is used at school site 1?
7 layer
three-tier
3 layer
two-tier collapsed core
____________________________________________________________________
6
In a hierarchical network design, which layers may be combined into a collapsed core for smaller networks?
core, distribution, and access
distribution and access
core and access
core and distribution
____________________________________________________________________
7
The network design for a college with users at five sites is being developed. Where in the campus network architecture would servers used by all users be located?
access-distribution
services
enterprise edge
data center
____________________________________________________________________
8
What is one advantage to designing networks in building block fashion for large companies?
redundancy
increased network access time
failure isolation
mobility
____________________________________________________________________
9
What is creating a new challenge for IT departments by changing the border of the enterprise network?
energy costs
company-owned desktops
access layer switching
tablets
____________________________________________________________________
10
Fill in the blank. Use the abbreviation.
Under the Cisco Enterprise Edge module, the submodule that provides remote access including authentication and IPS appliances is the and remote access submodule.
VPN
____________________________________________________________________
11
Which approach in networking allows for network changes, upgrades, or the introduction of new services in a controlled and staged fashion?
modular
borderless
static
network module
____________________________________________________________________
12
Refer to the exhibit. Which type of ISP connectivity to the service provider edge is being used by company A?
dual-homed
dual-multihomed
multihomed
single-homed
____________________________________________________________________
13
Which three network architectures have been introduced by Cisco to address the emerging technology challenges created by the evolving business models? (Choose three.)
Cisco Enterprise Campus
Cisco Enterprise Branch
Cisco Enterprise Edge
Cisco Borderless
Cisco Data Center
Cisco Collaboration
____________________________________________________________________
14
Which network module is the fundamental component of a campus design?
services module
access-distribution module
enterprise edge
data center

 

 

CCNA 4 Chapter 1,ccna

CCNA 4 

How to Clean An Infected Computer


How to Clean An Infected Computer
The truth is that it's a lot easier to keep a computer malware free than it is to clean one that is already infected. However, with the advice given in this article you should be able to remove any type of malware from your computer and get it back to working order. The main problem with most malware removal guides is that you have no way of knowing if all of the infections were removed. However, with my approach you can easily tell if even just running a single scanner was able to entirely clean the infection. Thus, this can save you the hassle of having to run many different scanners and the uncertainty of whether your computer is really malware free.

Make sure you follow this article in order so as to clean the infections with as little work as possible. The idea is that most people won't have to go any further than the first approach in order to clean their computers of active malware. Thus, effectively this article is actually much shorter than it appears to be.

However, before attempting to remove any infected files you should first back up all important files. These may include documents, pictures, videos, etc... This way if anything goes wrong with the cleaning process, which is a very real possibility, your important documents will still be intact. However, do not include any program files as it is possible that these may be infected. Please note that if your computer cannot boot you should follow the advice on this page in order to back up all important files. Also, while cleaning the computer it's important to remember that all scanners can sometimes be guilty of false positive detections. Therefore, before removing any files which you believe could possibly be safe, you should check them using the methods I discuss in How to Tell if a File is Malicious.

Index

1. Make Sure Computer Is Actually Infected
2. How To Clean Your Computer And Make Sure It's Actually Clean
    ​A) Clean Computer With CCE and TDSSKiller
    BIf Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
    C) If Needed Try These More Time Consuming Methods
    D) If Necessary Make A Bootable Disk
3. What To Do If The Above Methods Are Unable To Clean Your Computer
4. What To Do After All Malware Is Confirmed To Be Removed

1. Make Sure Computer Is Actually Infected


Before attempting to clean any infections from your computer it's important to make sure that the computer is actually infected. To do this please follow the advice I give in How to Know If Your Computer Is Infected. If the results of this do in fact show that your computer is infected then continue to follow the steps in the next section. Make sure that you follow them in order.

2. How To Clean Your Computer And Make Sure It's Actually Clean


Please note that advanced users may just want to skip to the last part about how to Make A Bootable Disk and clean the computer that way. This approach is the one which is most powerful, but it is also one of the more time consuming approaches. That said, if you wish you can jump directly to that section and then come back to the beginning again if the infection is not entirely removed.

A) Clean Computer With CCE and TDSSKiller
Download Comodo Cleaning Essentials (CCE). Make sure to select the correct version for your operating system. If you're not sure if your computer is running a 32 or 64 bit operating system then please see this FAQ. Also, download Kaspersky TDSSKiller . Note that if neither will not download correctly, or your internet connection is not working, you should download them on another computer and transfer them to the infected one via a flash drive. Make sure there were no other files on the flash drive. Be careful with the flash drive as the malware may actually infect it when you plug it into the computer. Thus, don't plug it into any other computers after transferring these programs. Also, I would like to point out that both programs are portable. This means that once you're done using them no uninstall is required. Just delete their folders and they will be gone.

After downloading CCE unzip the file, open the folder for CCE, and double click on the file called CCE. This will open the main program for Comodo Cleaning Essentials. If it refuses to open then hold down the shift key and, while still holding it down, double click on the file called CCE. After CCE has successfully opened you can let go of the shift key. However, do not let go of it until the program has fully loaded. If you let go of it even during the UAC popup it may not be able to forcefully open correctly. Holding down shift should allow it to open, even on heavily infected computers. It does this by killing most of the unnecessary processes that could be interfering with its launch. If it still will not launch then download and run a program called RKill. This program will terminate known malicious processes. Thus, after running it CCE should be able to open fine.


Once it's opened perform a "Smart Scan" with CCE and quarantine anything it finds. This program also scans for system changes which may have been caused by malware. These will be shown with the results. I would advise letting it fix these as well. Restart your computer when prompted. After the computer restarts run Kaspersky TDSSKiller, perform a "Smart Scan", and quarantine anything it finds. If anything was quarantined restart your computer once more.

Also, if your internet connection was previously not working please check again to see if it is now working. If not then you should go to this section of my guide about How to Fix a Malware Infected Computer and follow the advice given to fix your internet connection. A working internet connection is required for the remaining steps of this section.

Once you have verified that your internet connection is working, again open CCE. Hopefully it will open up normally this time, but if not then open it while holding down shift. Then open up KillSwitch from the tools menu in CCE. In KillSwitch, select the option to "Hide Safe Processes" from the "View" menu. Then right click on all processes which are flagged as suspicious or dangerous and select the option to delete them. You should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete processes flagged as FLS.Unknown. Next, open up Comodo Autoruns from the tools menu in CCE, and select the option to "Hide Safe Entries" from the "View" menu. Then disable any entries belonging to files which are flagged as suspicious or dangerous. You can do this by making sure the check box next to the entries is unchecked. You should also disable any entries flagged as FLS.Unknown, but which you believe likely belong to malware. Do not delete any entries. 

Now restart your computer. After it reboots, again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. Also, note that even if your computer is found to be clean of active infections there could still be pieces of malware on your computer. These are not dangerous, but don't be surprised if running another scanning program still detects malware on your computer. These are the inactive remnants of what you have just removed. If you are not comfortable having these remnants on your computer then you can remove the vast majority of them by scanning with the programs in the next section.

However, if your computer is not yet clean of active infections, but at least one of the programs was able to run, then go through the steps outlined in this section once more and see if that is able to remove the infections. However, if neither program was able to run please continue to the next section. In addition, if even following the advice in this section a second time is not enough to clean your computer you should continue to the next section.

B) If Still Not Clean Then Scan With HitmanPro, Malwarebytes, And Emsisoft Anti-Malware
If the above steps failed to fully remove the infections then you should download HitmanPro  Install the program and run a "Default Scan". Note that if it will not install please continue to the next paragraph and install Malwarebytes. During the installation of HitmanPro, when asked I would recommend you choose the option to only perform a one-time check of the computer. This should be suitable for most users. Also, if malware prevents it from loading correctly then open the program while holding down the CTRL key until the program is loaded. Quarantine any infections it finds. Please note that this program will only be able to remove infections for 30 days after it is installed. During removal you will be asked to activate the trial license.

Once all detected infections are removed by HitmanPro, or if Hitman Pro refused to install, you should download the free version of Malwarebytes  Note that it has chameleon technology which should allow it to even install on computers which are heavily infected. During installation I would advise that you uncheck the box to "Enable free trial of Malwarebytes Anti-malware Pro". Make sure that it is fully updated and then run a quick scan. Quarantine any infections that it finds. If asked by either program to restart your computer, make sure that you restart it.


Next download Emsisoft Emergency Kit . Once it's finished downloading, extract the contents from the zip file. Then double click on the file called "start" and open the "Emergency Kit Scanner". When prompted allow it to update the database. Once it's updated select the option to go "Back To Security Status". Then go to "Scan now" and select the option to perform a "Smart Scan". Once the scan is complete quarantine all detected items. Restart whenever required.

After scanning your computer with these programs you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is not yet clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If the programs in part A of this section were previously not able to run correctly you should go back and try and run them again. If none of the above programs were able to run correctly please boot into Safe Mode with Networking and try scanning from there. However, if they were able to run correctly, and threats still remain even after following the advice in this section a second time, then you should continue to the next section.

C) If Needed Try These More Time Consuming Methods
If the above steps were not able to completely remove the infection then you likely have some very inhospitable malware inhabiting your machine. Thus the methods discussed in this section are much more powerful, but will take much longer to complete. The first thing I would advise doing is to scan your computer with another anti-rootkit scanner called GMER. It can be downloaded from Remove anything shaded in red. Make sure you do click on the Scan button once the program has finished its quick analysis of the system. Also, if you're running a 32 bit operating system you should download a program to scan for and remove the ZeroAccess rootkit. Information about this rootkit, and a link to a program to remove it from 32 bit systems. The AntiZeroAccess tool can be downloaded from the link in the second paragraph.

After scanning with the above programs you should next open CCE, go to the options, and select the option to "Scan for suspicious MBR modification". Then select OK. Now perform a full scan with CCE. Restart where requested and quarantine anything it finds. Note that this option can be relatively dangerous as it could possibly identify problems where there are none. Use it carefully and make sure everything important is already backed up. Note that in rare cases scanning with these options may render your system unbootable. This rarely happens, but even if it does it should be fixable. If running this scan renders your computer unbootable please see this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again.

Once CCE has completely finished, again open up CCE while holding down the SHIFT key. This will kill most unnecessary processes which may be interfering with your scans. Then open KillSwitch, go to "Tools", and choose the option to "Hide Safe Processes". Now, once again delete all dangerous processes. Then, you should also right click on any unknown processes that remain and select the option to "Kill Process". Do not delete them. You should follow the advice in this paragraph each time you restart your computer in order to make sure that the following scans are as effective as possible.


After killing all processes not verified to be safe you should open HitmanPro while holding down the CTRL key. Then perform a "Default Scan" and quarantine anything it finds. Then perform full scans with Malwarebytes and Emsisoft Emergency Kit. Quarantine anything they find. Then download the free version of SUPERAntiSpyware from this page. During installation be very careful as other programs come bundled with the installer. On the first page make sure to uncheck both options about adding Google Chrome. Then click on the option for "Custom Install". During the custom install you will once again have to uncheck two boxes about adding Google Chrome.

Other than that the program will install fine. When asked I would recommend that you decline the option to start a free trial. Once the program is fully loaded select the option to do a Complete Scan and click on the button to "Scan your Computer...". Then click on the button to "Start Complete Scan>". Remove all detected files and restart wherever required.

After following these steps you should restart your computer. Then once again check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk. However, if your computer is still not clean then go through the steps outlined in this section once more and see if that is able to remove the infections. If it is not then you should continue to the next section.

D) If Necessary Make A Bootable Disk
If the above methods were not able to completely remove the infection, or you cannot even boot your computer, then you may need to use a bootable CD/Flash-Drive, also called a bootable disk, to clean your computer. I know this may sound complicated, but it's really not that bad. Just remember to create this disk on a computer that is not infected. Otherwise the files may be corrupted or even possibly infected.

Because this is a bootable disk no malware can hide from it, disable it, or interfere with it in any way. Thus scanning in this way, with multiple programs, should allow you to clean almost any machine, no matter how infected it may be. One exception to this is if the system files on the machine have themselves been infected. If this is the case then removing the infection may cripple the machine. It's largely for that reason that you backed up all important documents before starting the cleaning process. That said, sometimes it's possible to get around that by following the advice I give below.


To do this you should download the Shardana Antivirus Rescue Disk Utility (SARDU). This is an excellent program which will allow you to create a single rescue disk with multiple antivirus programs on it. It also has many other useful functions, which I will not be discussing in this article. A few very useful tutorials for SARDU can be found on this page. Be very careful about the added offers now included with the installer. Sadly, this program now tries to trick people into installing extra programs, which are largely unnecessary.

After downloading it extract the contents and open the SARDU folder. Then open the correct executable for your operating system, either sardu or sardu_x64. Under the Antivirus tab click on whichever antivirus applications you would like to add to your disk. You can add as many or as few as you wish. I would recommend that you scan your computer with at least Dr. Web, Avira AntiVir Rescue System, and Kaspersky Rescue System. One of the nice things about Dr. Web is that it sometimes has the option to replace an infected file with a clean version of it instead of just deleting it. This may allow you to clean some infected systems without crippling the computer. Thus I'd strongly recommend including Dr. Web in your bootable disk.

Clicking on the names of the various antivirus applications will often direct you to a page where you can download the ISO for that particular antivirus. Sometimes it will instead give you the option to download it directly through SARDU, which can be found under the Downloader tab. If given the choice always select the option to download the ISO. Also, after downloading the ISO you may need to move it to the ISO folder inside the main SARDU folder. Once you have moved all of the ISO's, for the antivirus products you would like to include, to the ISO folder, you are ready to create the rescue disk. To do this go to the Antivirus tab and make sure that all desired antiviruses have a check next to them. Then either click the button to make a USB or make an ISO. Either will work fine. It just depends on whether you want to run this off of a USB drive or a disk.

After creating your rescue disk you will likely need to change the bootup sequence in your BIOS settings to ensure that when you insert the bootable CD, or flash-drive, the computer will boot from it instead of from the normal operating system. Here is a useful article on How To Change the Boot Order in BIOS. For our purposes you should change the order so that the "CD/DVD Rom drive" is first if you want to boot from a CD or DVD, or that "Removable Devices" is first if you want to boot from a flash-drive. Once that's done just follow the advice given in this other article about How To Boot From a CD, DVD, or BD Disc in order to boot from the rescue disk.


After booting from the disk you can select whichever antivirus you want to first scan your computer with. As I previously mentioned, I would recommend starting with Dr. Web. Once it's finished, and you have repaired or deleted everything it finds, you should shut down the computer. Then make sure to again boot from the disk and then scan with another antivirus. Continue this process until you have scanned your computer with all of the antivirus programs you have put on the rescue disk.

After cleaning your computer with whichever programs you've put on the disk you should now try booting your system into Windows again. If it is able to boot into Windows then check your computer using the advice I give in How to Know If Your Computer Is Infected. If all is well then you can skip to the section about What To Do After All Malware Is Confirmed To Be Removed. Remember that a disabled registry entry is not a risk.

If your computer is not yet clean, but you are able to boot into Windows, then I would recommend trying to clean your computer from inside windows, starting from this section of this article and following the suggested methods. However, if your computer is still not able to boot into Windows then again try fixing it by following the advice in this section of an article I wrote about How to Fix a Malware Infected Computer. It should be able to help make your computer bootable again. If even that can't make your computer bootable then try adding even more antiviruses to the boot disk and then rescanning your computer. If doing that still does not work then please read the next section.

3. What To Do If The Above Methods Are Unable To Clean Your Computer


If you followed all of the above advice and were still not able to clean your computer, but you're convinced that the problems are due to malware, then there's not much more I can do to help. I'm actually hoping that nobody ever reaches this section. This article is meant to allow you to completely clean an infected computer. Thus I'd really appreciate it if you could leave a comment below that explains what you tried to do in order to clean the computer, and what symptoms remain that make you think that your computer is not yet clean. This is very important in order for me to improve the article.


You can also seek advice from a specialized malware removal forum. A forum which I have found to be very helpful is MalwareTips. However, if even after seeking help on a malware removal forum your computer is still not free of malware, it may be necessary to format your computer and start over. This means that you will lose anything on the computer which you did not back up. Make sure that if you do this you do a complete format of your computer before reinstalling Windows. This will be able to destroy almost any type of malware. Once Windows is freshly installed please follow the steps in the next section.

4. What To Do After All Malware Is Confirmed To Be Removed


After confirming that your computer is now clean you can now try to repair any damage that may have been caused. For this I have written an article about How to Fix a Malware Infected Computer. Please follow the advice in this article in order to fix any damage that was caused by the infection. If after doing this your computer is running fine, then you can also open Comodo Autoruns and select the option to delete those registry items you had previously only disabled. This way they will no longer be on your computer at all.


Once you have successfully cleaned all infections from your computer, and repaired any leftover damage, you should take steps to ensure that it does not happen again. For this reason I have written a guide about How to Stay Safe While Online. Please read through it and implement whichever methods you feel best fit your needs.

After securing your computer you can now restore any of the previously backed up files that were lost during the cleanup process. Hopefully this step is also not necessary. Also, before restoring them make sure that your computer is very well protected. If you don't lock the computer down strongly enough then you may inadvertently infect it and again have to clean the infections from the computer. In addition, if you used a USB drive to transfer any files to the infected computer you can now plug that back into the computer and make sure there is no malware on it. I would recommend doing this by deleting all files left on it.



 

If you have any problems, or are confused by my directions, please leave a comment below and I will try to help you. Trust me, if you are having a problem then so are many others. I need to know this so that I can improve the advice in this article. Also, I do realize that there are a plethora of programs that can be used to clean an infected computer. I have selected these particular programs, and arranged them in such a way as to emphasize their positive qualities while at the same time compensating for their weaknesses, in an attempt to simplify the malware removal process. Please let me know if you see any problems with the approach I have outlined.
In addition, please help by rating this article. If you believe this article deserves anything less than 5 stars, please leave a comment below explaining how you think it can be improved or where you find fault. This article is written by me but fueled by the community. Thus your opinions and advice are not only much appreciated, but actually necessary in order for this article to grow and improve.

How hackers can switch on your webcam and control your computer

A malicious virus known as Remote Administration Tools (RATs) can be used by hackers to switch on your webcam and control the machine without your knowledge. Andrew McMillen reports.

Alex. 'Alex', the NSW boy who taught himself how to hack.
The 14-year-old couldn't believe his eyes. The virtual currency he'd worked so hard to amass in the online role-playing game Runescape had vanished. He'd lost the equivalent of $700 in the blink of an eye, after investing his pocket money into the game's economy for months. All that remained was an instant message dialogue box: "Haha, you got RATted!"
Sitting in his bedroom in Wauchope, on the mid-north coast of NSW, the teenager wrote back: "What does that mean?" He didn't know at the time that his machine had been compromised by a Remote Administration Tool (RAT), an aggressive form of malware that allows hackers to access a victim's entire computer. It was too late. The thief had disappeared. "He ran away with my money, like a girl," laments Alex (not his real name).
When I started, it was hard to learn. I was confused. I helped others because I wanted them to feel how I felt when I first started RATting – that feeling of excitement. I wanted to empower them. 
'Alex' the NSW hacker
Weeks later, his desolation and rage had been replaced by joy. After researching RATs and spending an entire day spreading an innocuous link using Runescape's in-game chat function, in the hope that someone would visit the page and run the Javascript application embedded within, Alex had his mark.
An image uploaded to a hacking forum showing a woman picking her nose as seen through her webcam. An image uploaded to a hacking forum showing a woman picking her nose as seen through her webcam.
Within a few clicks, the teenager had access to a stranger's entire computer, without their knowledge. "I was the happiest kid in the whole entire world," he says. "I could see their desktop, what they typed, the history of what they'd typed, stored passwords, files – everything."
Advertisement
His victim didn't have a webcam, so Alex wasn't sure of their gender or their appearance, although he assumes they were male. But he knew that they played Runescape, so he got straight to work on what mattered: looting their gold, just as he'd recently experienced himself.
After emptying the stranger's account, the teenager watched, intrigued, as his mark realised that he'd been hacked, and began trying to close the connection. Fifteen minutes later, Alex's first "slave" – hacker shorthand for a compromised user – had disconnected himself.
An image uploaded to a hacking forum showing a woman sleeping as seen through her webcam. An image uploaded to a hacking forum showing a woman sleeping as seen through her webcam.
The RATted had become the RATter. "I felt unstoppable," says Alex, now 17 and studying Year 11. "I was really insecure about myself at the time. I felt like the most powerful person on Runescape."
Know more? Email us
The senior security manager at antivirus software company Trend Micro has another name for RAT: Remote Access Trojan. "It's a piece of software loaded onto somebody's computer that allows it to be controlled or accessed from a third-party location," says Adam Biviano in Sydney.
An image uploaded to a hacking forum showing a woman starting at her computer as seen through her webcam. An image uploaded to a hacking forum showing a woman starting at her computer as seen through her webcam.
"They often arrive on a computer masquerading as something else," he says. "Just like the mythological story, you open your gates up and you allow it inside your protected walls. All of a sudden, you think you're getting one thing, but in reality you're getting what they call a 'RAT'. You're giving access to your computer to ... who knows who."
A 14-year-old boy motivated by revenge is probably one of the last people you'd want to have unmitigated access to your computer. Especially if you're female, given that one of the most commonly exploited features of RAT software is the ability to spy on a user's webcam. Many modern laptops will display a green light when the webcam is in use; however, RAT developers have long since worked out how to disable that tell-tale sign on some computers.
The cumulative effect is a gross breach of privacy, often without the user's knowledge. Think of where your computer's webcam is positioned, and what someone might see if they watched you constantly: your bedroom antics, perhaps, or your daily nude stroll around the house. They might even see you take your laptop to the toilet with you.
An image uploaded to a hacking forum showing a woman looking at her computer as seen through her webcam. An image uploaded to a hacking forum showing a woman looking at her computer as seen through her webcam.
Discussion threads in the Remote Administration Tools section of HackForums.net overflow with webcam screenshots, to celebrate both "hot female slaves" and "ugly slaves".
Alex goes by a pseudonym on HackForums that Fairfax Media has chosen to keep secret in order to conceal his identity. He's been a particularly active community member over the past 12 months, clocking more than 6000 posts – about 17 a day – while establishing himself as a helpful source of information for those new to RATs.
"When I started, it was hard to learn," he says. "I was confused. I helped others because I wanted them to feel how I felt when I first started RATting – that feeling of excitement. I wanted to empower them."
The teenager says he's never had a job, yet he's drawn a respectable income from his RAT activities for more than two years. His parents began asking questions when he connected his PayPal to his bank account, and sums of up to $500 at a time would flow in: profit from his Runescape thefts. "I sat down with them and told them what was going on," says Alex.
"They understood. They said, 'If you get caught, you're in serious shit.' My parents are laidback about it, because they knew I was smart with computers when I was younger. I've gotten way smarter since then." Their son may not have been completely honest about the precise source of income, though: "They don't really know what happens behind the scenes when I'm on the computer," he admits.
Trend Micro's Adam Biviano isn't surprised by Alex's exploits, nor his age. "I've been in the anti-malware industry for about 15 years," he says. "A lot of these attacks start off with people who are quite young. It's that younger element that probably doesn't understand the legal implications of what they're doing. They think that because it's online, it's simply a bit of harmless fun.
"We also see that those skills are put to far more malicious use these days, by moving on to target businesses, to target individuals by stealing their identities, even cross-border espionage using RATs,” he says, referring to a malware outbreak in the fractured state of Syria last year. "[Virtual goods theft] is one of the more benign uses of RATs, but it can certainly get nastier from there."
The Attorney-General's Department responded to questions with this statement: "The Commonwealth Criminal Code contains a range of offences that apply to the unauthorised access to or modification of data, as well as offences that relate to the possession, control or supply of data with an intent to commit a computer offence."
Federal penalties for these offences range from two to 10 years' imprisonment; the states and territories also have laws prohibiting the installation and use of surveillance devices, including listening, optical, tracking and data surveillance devices, which may also apply to those caught using RATs for malicious purposes.
The Department of Broadband, Communications and the Digital Economy says it does not have a position statement on the use of RATs among private citizens.
Remote access technology is not new – Windows has had this functionality in-built for many years – but the malware form of delivery is a constant headache for security companies such as Trend Micro, especially since some of these products are marketed as "FUD": fully undetectable, by either software or user.
"That's the unfortunate part of the business we're in," says Biviano. "For a malware writer, we're part of their quality assurance process. A piece of malware will be sold for far more money than a competing product if it's undetectable by current anti-malware products. That's the sad reality of life right now."
Trend Micro's labs deal with RAT infections on a daily basis, not just on personal computers, but increasingly, mobile devices. "This year alone, we're anticipating that we'll see nearly one million forms of malware just on [the] Android [mobile operating system]. A lot of these will have RAT built in. It's very rare these days that we see malware that doesn't have some sort of remote access capabilities."
RATs have a long history of legitimate, non-malicious uses: IT departments throughout the world benefit daily from the ability to view their colleagues' screens when troubleshooting, as do workers who wish to access files on their home computer from the office.
Chris Gatford, director of Sydney security consultancy HackLabs, uses this type of software when performing penetration testing for clients on four continents. "We're engaged by our customers to compromise their environment," says Gatford. "We use social engineering as the mechanism to gain access to the organisation, using "RAT-like" functionality in commercial security testing tools to perform our work.
"In our experience, when performing this testing, we're very rarely detected, and therefore most organisations aren't able to detect it," he says. "I would say the majority of Australian organisations certainly wouldn't have the capability to detect whether they were infected by RATs, if [the software] was being used by attackers correctly."
Using freely available RATs with names such as DarkComet and BlackShades, Alex was able to gain control of up to 1000 computers simultaneously. The dual monitors in his Wauchope bedroom became a window to the world. "I've had a guy in Vietnam working in a store," he says of his "slaves". "I've had a whole Asian family looking at the computer at once. I've had a lot of ugly people; one guy in his nineties or something, who looked like Santa Claus," he says, laughing.
He has clicked onto people masturbating to child pornography. He didn't like that one bit. "I basically destroy their computer if I see them looking at that shit, because that's just wrong." With a few commands, he'd delete their computer's "system32" folder; without those files, Windows operating systems won't function.
But those days are behind Alex now. In mid-March, he posted a thread on HackForums saying goodbye to using Remote Administration Tools. The 17-year-old feels he's learned all there is to know about RATs. He's had some fun, made some money. Now he's setting his sights on learning to code, while balancing his Year 11 workload. He's fond of software design, IPT and English, but hates maths. He's looking forward to studying at university – something to do with computers, naturally – and building a career in penetration and vulnerability testing.
The only thing that's stopped the teenager from accessing strangers' computers without their knowledge is boredom. That initial buzz – that feeling of being "the happiest kid in the world" – has long since worn off. Gross invasions of privacy have lost their lustre. Alex maintains that he never touched any bank accounts while RATting: "That shit's lame," he says. "I know people do it, but it's a dog act."
If he got caught by the police – not that he ever came close – he'd have justified his behaviour thus: "I know it was wrong to steal virtual goods, but I didn't do it for bad reasons.
"I did it for educational purposes. Hacking isn't just about 'bad' things. Most people hack to learn."
Asked whether he's proud of what he did, he laughs. "I kind of am! I felt bad when I got my stuff stolen, though." But it was okay when you did it to others?
He pauses. "Now I'm confused ... How do I say it? RATting is bad, and good. People do it for knowledge; people do it to steal shit; people do it to mess around. It's a thing that hackers these days need to learn, before they move on."

How hackers can switch on your webcam and control your computer

Source: http://www.smh.com.au/

How To Change Your Channel Display Name

How To Change Your Channel Display Name 
how to change your channel name on youtube

Change YouTube username 

How To Change Youtube Username

How To Change  Username Youtube 

 



How To Change Your Channel Display Name 
how to change your channel name on youtube

Change YouTube username 

How To Change Youtube Username

How To Change  Username Youtube

vpn


vpn ?
vpn VPN software lets you join private networks as though you're sitting at a local computer on that network, giving you access to shared folders and tons more handy stuff. Here's a look at five of the most popular VPN tools.
VPN software brings the security of a private network to an insecure network, and allows you to access private local networks from anywhere. As we've explained in the past, you can do things between computers on your local network you can't from out on the internet: like listen to a shared iTunes library or access files in shared folders. Virtual private network applications give you access to your computer from anywhere on the internet as if you were home on your local network. Earlier this week we asked you to share your favorite software for establishing and maintaining virtual private networks. We rounded up the votes, and now we're back with the five most popular VPN applications.
If you're new to the idea of virtual private networks, you can read up on the technical nitty-gritty at the Wikipedia entry for VPNs. Note: This Hive Five contains both VPN server applications (the apps that create virtual private networks on your local network so it's accessible from the outside world) and VPN client applications (the apps that connect to virtual private networks from the outside world). In many instances companies produce VPN servers, VPN clients, VPN servers with accompanying clients, or VPN clients that are designed to work with a variety of servers.

OpenVPN (Windows/Mac/Linux, Free)

Five Best VPN ToolsExpand

OpenVPN is an open source VPN server that's easy to set up for use with open source VPN clients. You can easily export configuration files from OpenVPN to import into a variety of open source and commercial clients. OpenVPN is also integrated into several router firmware packages including popular DD-WRT, OpenWRT, and Tomato. The OpenVPN system isn't compatible with popular commercial VPN providers, but it provides an open source and free alternative for setting up VPNs to expensive and closed commercial models

All the iPad Pro Rumors So Far


Apple's iPad has changed quite a bit over the last four years (yes, it's been four full years since we first laid eyes on the first generation iPad). Since 2010, Apple's tablet has evolved to the iPad Air and the iPad Mini. The two tablets, available in both WiFi and WiFi+cellular connectivity, form Apple's line of tablets. But could there be a new iPad coming soon?

Rumor has it that Apple is prepping its largest iPad yet. While Apple's iPad Air shares the same branding as the super slim MacBook Air, this new model is said to share the same branding as the more muscly MacBook Pro. So what can we expect from the iPad Pro? We've rounded up all the information we could find regarding this as-yet-unannounced device. We'll update this post as time goes on.

Display

The iPad Pro will apparently be Apple's largest iPad yet. As such, the display is the most talked about aspect of the device. Rumor has it we can expect a display measuring just shy of 13 inches. The current iPad Air's display measures 9.7 inches, so this is going to be quite a jump in size. The current 13-inch MacBook Pro has a Retina display with a resolution of 2560 x 1600 pixels or 227 pixels per inch. Though the iPad Pro rumors haven't really developed to the point where we can start talking about screen resolutions, it's hard to imagine Apple shipping a non-Retina display panel when all of the current generation MacBook Pros have a Retina display. One interesting rumor from late last year suggests 'near UHD quality.'

Form Factor

There is talk that Apple's iPad Pro might actually be a hybrid device. Not hard to picture, given it will carry the Pro branding. Consider the fact that Apple has been advertising the iPad as a 'work on the go' device since its launch, and it seems like a no-brainer. That leaves us wondering how Apple is going to implement this 'hybrid' functionality. Will it be a dock, like the Transformer Prime from Asus, or will Apple go for a more elegant solution, like Microsoft's Surface and its Type Cover?

Hardware

Again, there isn't a whole lot of information available about the hardware powering this large tablet, but the company's recent A7 chip is built on the 28 nm process and boasts a 1.4 GHz dual-core CPU with PowerVR G6430 graphics (450 MHz). This 64-bit chip powers the iPad Air. While it might not be powerful enough for a 'Pro' iPad, we're already hearing rumors about Apple's A8 SoC. At the end of January, DigiTimes reported that the next processor is rumored to be a package-on-package SoC with processors and mobile DRAM in one package.

Software

Apple's iOS 7.1 update is due in March and will bring some enhancements as well as bug fixes. If Apple introduces the iPad Pro this year, it's likely it will ship with iOS 7. However, it's also possible Apple will tweak iOS just for the iPad Pro or even ship the device with OS X. This will probably depend on the nature of the iPad Pro and its target audience. If Apple is just looking to offer a beefed up tablet, then this device will probably still use the same version of iOS we see on the iPad Air and Mini. If Apple is truly going for the business user, it may need to add OS X or at least tweak iOS to make the device more of a productivity tool.