July 12, 2014

How To Hide Your Friends List On Facebook From Others

If You dont want to share your Facebook Friend List On Your Facebook Account.You Can Easily Hide Your Facebook Friends List From Other (Either From Friends Or Public).Just Follow The Steps Below:



1. Loginin your facebook account.
2. Go to your timeline by clicking on your name.






3. Now scroll down and you see your friends widget in left side bar.

4. Mouse hover on friends widget and click on manage and then click on edit privacy.




Must Read - How to detect facebook fake account.






5. Now you can hide your friends list privacy.If you want to show your friends list to your friends only then select friends. and if you want not show your friends list to anyone the select only me.



what is Facebook Hashtag


Introducing Hashtags on Facebook

Starting today, hashtags will be clickable on Facebook. Similar to other services like Instagram, Twitter, Tumblr, or Pinterest, hashtags on Facebook allow you to add context to a post or indicate that it is part of a larger discussion. When you click on a hashtag in Facebook, you'll see a feed of what other people and Pages are saying about that event or topic. 
Now you can:
• Search for a specific hashtag from your search bar. For example, #NBAFinals.
• Click on hashtags that originate on other services, such as Instagram.
• Compose posts directly from the hashtag feed and search results.

Hashtags are just the first step to help people more easily discover what others are saying about a specific topic and participate in public conversations. We'll continue to roll out more features in the coming weeks and months, including trending hashtags and deeper insights, that help people discover more of the world's conversations.

Hashtags turn topics and phrases into clickable links in posts on your personal timeline or your Page, and help people find posts about topics they’re interested in. To make a hashtag, write # (the number sign) along with a topic or phrase written as one word and add it to your post (ex: Maverick Console provide Website Devlopment & Digital Marketting Services #mcsindia).
 

How do I use hashtags?

Hashtags turn topics and phrases into clickable links in your posts on your personal Timeline or Page. This helps people find posts about topics they’re interested in. To make a hashtag, write # (the number sign) along with a topic or phrase (written as one word) and add it to your post. For example:
    Maverick Console provide Website Devlopment & Digital Marketting Services #mcsindia
When you click a hashtag, you’ll see a feed of posts that include that hashtag. You'll also see some related hashtags at the top. You can search for a hashtag using the search bar at the top of any page.
Note that you'll only see posts that were shared with you. Learn more about who can see your posts when you use hashtags. The hashtag feature isn't available to everyone right now.
 

July 11, 2014

How to detect a fake facebook account




 Facebook has put together a social network of over a billion people. Some of those people do not have the best interests of their fellow humans at heart. They may seek you out to get information, to steal your identity, or even to destroy your reputation. How do you protect yourself from all these fake account.Here are some point i am mentioning to avoid these frauds

1.  Look for photos in the profile.If there is only one photo of the individual in the whole profile it makes it quite clear that the account is fake.

2. Look for status updates,wall posts and comments.If the user hasn’t updated a status for quite a long time and hasn’t been involved in any wall posting or commenting of other statuses,it means that the profile is likely to be fake.

3. Look at the recent activities.If it is that the user has just been adding randomers and making new friends,and that there are no pages liked or groups joined,it suggests that the user is determined in jst adding people and hence the profile is fake.

4. Check out the friend list.If found that maximum of the friends are of the opposite gender,it can be assumed that the profile is used either for fun or for random dating.

5. Check the info.If found that there is no ideal links given regarding school or education institutions or workplace and that the user is looking for dating and interested in both men and women,it shows signs of fakeness.

6. Check the birthdate.Birth dates like 1/1/XX…..or……31/12/XX are common between fake accounts as it is quite unique and easy to type in.

7. Fake profiles of girls usually have a contact no. in their info. Lets face it,girls harldy will have their contact no. in public.So watch out if the user exposes info that is unlikely for general users to unveil in public.

8. Look out for recent wall posts,if u see loads of people asking…’THANKS FOR THE ADD….DO I KNOW YOU’……and yet the posts remains unanswered…it is bound to be a fake one.

9. Look for common tarits used in facebook,like.using applications such as farmville,pet society etc….and adding siblings.If these traits are not found among the user, the profile is highly inactive or fake.This point can’t single handedly prove the fakeness,however this will be a supporting clue along with other points.

10. If you are quite certain about the profile’s fakeness,and want to be absolutely sure, try browsing google for some random profile pictues. Fake profile pictures are usually selected frm google and while browsing through it,you might as well come upon the picture the user chose for the fake account.

If you have any question please free to leave your preciious comment.

July 9, 2014

What is hacker And its type ?

In the computer security context, a hacker is someone who seeks and exploits weaknesses in a computer system or computer network. Hackers may be motivated by a multitude of reasons, such as profit, protest, challenge or enjoyment

Hackers are three types:-

1.    White hat hacker
2.    Gray hat hacker
3.    Black hat hacker


What Is A White Hat Hacker?
 
Today, anyone can become a hacker. Within that denomination, there are three types of hackers. The first one is the black hacker, also known as a cracker, someone who uses his computer knowledge in criminal activities in order to obtain personal benefits. 

On the other side is the white hat hacker. Although white hat hacking can be considered similar to a black hacker, there is an important difference. A white hacker does it with no criminal intention in mind. Companies around the world, who want to test their systems, contract white hackers. They will test how secure are their systems, and point any faults that they may found. If you want to become a hacker with a white hat, Linux, a PC and an internet connection is all you need.



Grey Hat Hackers

A grey hat hacker is someone who is in between these two concepts. He may use his skills for legal or illegal acts, but not for personal gains. Grey hackers use their skills in
order to prove themselves that they can accomplish a determined feat, but never do it in order to make money out of it. The moment they cross that boundary, they become black hackers.




Black Hat Hackers

Black hat is used to describe a hacker (or, if you prefer, cracker) who breaks into a computer system or network with malicious intent. Unlike a white hat hacker, the black hat hacker takes advantage of the break-in, perhaps destroying files or stealing data for profit. The black hat hacker may also make the exploit known to other hackers and/or the public without notifying the victim. This gives others the opportunity to exploit the vulnerability before the organization is able to secure it.

Note :
There is another type of hacker know as Ethical Hacker.Who work or do hacking for the organization or individual by following ethics.They didn't mean to do for any profit.This concept was first used by US army.They use this to find out any loop hole present in their army.

Like India's Biggest Hacker Army In Facebook :  https://www.facebook.com/IndianHackerzArmy
 



July 8, 2014

How to save computer and laptop from viruses

There are a few basic rules that computer users should follow to short-circuit viruses. The best known bit of advice is this: Never open any attachment unless you know who it's from and why they are sending it. Refusing to open unsolicited e-mail of any kind is the only sure-fire way to sidestep all forms of trouble.
Anti-virus software is now trendy way to prevent from virus attacks, but this strategy only works if users update their software time to time.Updating it weekly, also you can set your antivirus to get updated automatically from company, but file downloads can be large and slow.Antiviru updation is also not possible for user who rarely use internet.
Factors to consider when buying an anti-virus package include cost, quality of tech support, how frequently the package self-updates and the platforms supported by the program.
It would be your intelligency to fight against viruses. Be wary of opening any email attachments, even from your firends , especially if it has been forwarded to them.Set up your anti-virus product so that it automatically scans incoming e-mail and avoiding e-mail software that allows automatic launching of attachments.
If all of this sounds like a lot of work, it is. There is always a tradeoff between ease of use and security but the extra time you spend updating your anti-virus software now will save you hours of time and buckets of frustration later.If you don't keep it updated, you might was well be completely unprotected.
So before we read prevention,let us know about what exactly virus is.
Virus
A computer virus is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes. Viruses can also replicate themselves. All computer viruses are man-made. A simple virus that can make a copy of itself over and over again is relatively easy to produce. Even such a simple virus is dangerous because it will quickly use all available memory and bring the system to a halt. An even more dangerous type of virus is one capable of transmitting itself across networks and bypassing security systems.
Prevention
1. Be sure do a full back up of your system on a regular basis. The best way to clean up an infected file is to replace it with an original non-infected file. Current back up will save if a virus takes your system completely down. It's also a good idea to keep more than one set of backup in case the current one is infected before the virus is detected.
2. Always use an anti-virus software program, one with both an on-demand and an on-access scanner. You'll want to look for one that has a fairly complete database of viruses and that is updateable. New viruses are produced daily, so it's important to have software that can detect the latest threat.You can submit report via antivirus about threat you are facing as feedback.According to this feedback software engineers will have research and will update antivirusaccording to new threat.
3. Update the virus database in your anti-virus program regularly (each month or by the direction of the manufacturer).
4. On a PC, change the CMOS setting of your boot up process from booting first on the A drive (floppy) and then on the C drive (hard drive) to just booting on the C drive. This will not only speed up your boot up process but also completely eliminate the risk of infecting your hard drive with an infected floppy disk.
If you should need to boot from a floppy you can easily change the settings back and reboot from the A drive. Please note: an infected non-bootable floppy disk can just as easily infect your hard drive as would an infected bootable one.
5. Don't allow your web browser to automatically run programs, such as MS Word or other programs through its e-mail program. Configure your browser to launch WordPad or Notepad instead. One of the biggest and growing threats is the macro virus, which is spread through data processing and spread sheet programs
6. Configure your web browsers to disable ActiveX, Java, and Javascript. You'll lose some of the fun the Web's been known for, but you'll save your computer from contracting a virus and speed up your connection.You can do this by doing setting in browser you are using.
7. Know that the only way a virus spreads is either by launching an infected file or by booting an infected disk. You can not get a virus by simply being online or by reading e-mail. You have to download and launch an infected file before it will spread. Therefore, do not launch any unsolicited executable files sent via e-mail.
8. Using an updated anti-virus program, scan all new software for viruses before installing them on your hard drive. Even shrink-wrapped software from major publishers has been known to contain viruses.