Kaspersky Lab Will Quit BSA Over SOPA Support

One of the largest computer security laboratories in the world, the famous Russian Kaspersky company, is planning to quit the anti-piracy lobby outfit for software firms, Business Software Alliance, also known as BSA, next month. The company has taken this decision because of the BSA’s strong support for the debatable American anti-piracy legislation called SOPA.

According to the Russian newspaper “News” (“Izvestia”) report, Kaspersky is not the only tech company concerned about the impact SOPA will have on the industry. For example, the largest Russian social network InTouch (“VKontakte”), has been recently targeted by the Motion Picture Association of America and labelled as the largest copyright infringer.

A representative of Kaspersky company also said during the interview to “Izvestia” that the legislation proposed in the United States will become a serious threat to the evolution of technology. Kaspersky Lab also admitted that the company has decided to quit Business Software Alliance because it doesn’t want to be associated with this kind of legislation. The Russia’s largest antivirus company has promised to release an official statement in the nearest future, announcing its position.

Meanwhile, Business Software Alliance can boast a quite impressive list of members, including such software giants as Microsoft, Intel, Adobe, Apple, Dell, and McAfee. This past October, the outfit has publicly expressed its support to the SOPA bill, introduced in the United States. However, the SOPA appeared to be so controversial that because of this surrounding it has already determined a lot of companies worldwide to boycott it. Among them are such companies as Facebook, Google, Yahoo! and Twitter. Right after Business Software Alliance expressed its support to the legislation two months ago, a hearing was held with such guests as the Motion Picture Association of America, AFL-CIO, Pfizer, and Google, being the only voice speaking against the legislation at that meeting.

In respond, the CEO for Business Software Alliance, Rober Holleyman, wrote after the hearing in question that the outfit still supports SOPA, but admitted that it “could sweep in more than just truly egregious actors”.

How to Access Censored Websites

The U.S. Immigration and Customs Enforcement began targeting “rogue” online services last year within the ‘Operation in Our Sites” campaign. As a result, a lot of domain names have been either closed or blocked. That anti-piracy policy has already spread its tentacles outside the American soil; for instance, in the United Kingdom, BT (the largest Internet service provider) had been forced by the court order to block access to Newzbin2, a well-known Usenet indexing service. Meanwhile, one more threat to the liberties of the ordinary user is the undergoing Stop Online Piracy Act (better known as SOPA) – a legislation that might grant absolute power to government authorities over the web itself.


DNS blocking is recognized as the adopted solution against the “notorious” online services. It has been argued against by Public Knowledge: the outfit explained that this blocking method actually causes conflict between DNS server on the web, thus creating both security holes and opening doors for identity theft. In addition, not all users were happy to see they aren’t able to access their favourite websites any more. That’ why there appeared a lot of ways to circumvent the sites blocking.

One of them is BlockAID – a service especially designed to help Internet users access blocked online locations by getting a built-in database of all those websites. In case an Internet user tried to access a blocked Internet portal, BlockAID would redirect them to the correct address instead of the one seized by the Immigration and Customs Enforcement. Although this piece of software doesn’t automatically detect blocked services yet, it still can learn to do so. If you are interested in this application to help you access blocked sites, you can easily find an online guide on how to use it.

Among other solutions the experts point at a FireFox plug-in introduced by MAFIAAFire. This software easily installs on your PC as an add-on to the Internet browser, and, being at its conceptual stage, makes an attempt to overcome the problem of blocked sites by sending a number of the user’s requests (that he chooses) to certain websites via a proxy. The plug-in is also available on the Internet, as well as many reviews and advices on how to use it more efficiently.

World Is Always Being Watched

Whistle-blowing site Wikileaks has recently released papers which reveal the shady world of the international surveillance industry through a new project named Spy Files. A lot of the companies involved appear to operate in plain sight.


Wikileaks has highlighted a huge, billion dollar industry that has largely slipped under the radar, and this is expected to change everything. The firms specializing in surveillance equipment (mostly to repressive regimes) seem to have flourished because mass interceptions of whole populations have gone largely unchecked. However, the leak warns that it isn’t just the usual culprits you would expect – instead, the culture of Orwellian citizen espionage can be seen everywhere. According to the source, this industry already spans twenty-five countries, with developed countries in the west supplying monitoring instruments to others across the globe.

Meanwhile, Wikileaks is trying to bring attention to the alarming fact that this industry is mostly condoned by western countries. The whistle-blowing website is trying to emphasize the scale of the industry and endemic problems involved, like an alarming lack of regulation among purchasers. At the same time, the United States is calling to tighten up legislation that currently allows loopholes for companies to keep operating within.

Julian Assange’s website has released around 300 documents detailing companies involved in flogging surveillance equipment to countries like Libya, including Amesys, a French firm at the centre of a scandal because of exporting surveillance equipment to Gadaffi’s intelligence services. Aside from this company, corporations like Alcatel-Lucent and Siemens also made an appearance in the list. In addition, Nokia Siemens Networks has also faced the woeful record featured after its subsidiary was found to supply tracking equipment to repressive regimes as well.

Spy Files project promises more releases within this week and later, up into the next year. Meanwhile, the service points out that the industry is largely condoned. In the UK, Foreign Secretary William Hague has himself been linked to a company involved in this industry, which is actually unregulated. What is alarming here is that intelligence agencies, along with military forces and police authorities, can silently and secretly intercept phone calls and take over PCs without even the help or knowledge of the telecommunication providers. This is something to worry about, isn’t it?

Russian Hackers Vote

Part of the Russian news sites appeared to be inaccessible because of DDoS-attacks, high traffic and poor technical training. Those accessible feature faked information about the election results.


Election Sunday in Russia turned out to be a disaster for online services. By the evening of the day websites of the largest newspapers, radio stations and news agencies were completely offline or experiencing outages. Most of the services were highlighting the situation on the elections, trying to track the efforts of multiple voting in different areas.

According to the experts in information security, the most extensive DDoS attacks were launched at the radio station “Echo of Moscow” site and the service “Votes”. At the moment the experts point out at the intense attack on the sites telling about the preliminary election results. The attack is carried out by a large botnet dispersed around the world, with a lot of attacking computers located in the United States, China and other countries. Meanwhile, there are few Russian IP addresses. Security experts also noticed something like the attack at the service “Votes”, but they registered mainly Russian IP-addresses and those from the ex-Soviet Union countries over there.

German Klimenko, the well-known Internet expert and owner of the statistical service Liveinternet.ru, explained that last Sunday the traffic to the news media was much more than usual over the weekend, which could also lead to unstable operation of the resources.
Indeed, the attendance of opposition resources increased by 20%, with people visiting to monitor information on violations during the election. That’s why every major website is constantly exposed to DDoS-attacks, but when combined with the increased traffic, it can lead to the consequences the resources weren’t prepared for.

At the same time, Anton Nosik, the owner of bloghosting LiveJournal, which has been experiencing cyber attacks since Monday, is sure that DDoS-attacks on major Russian resources must be investigated by law enforcement agencies. He is going to insist that no such episode was left without recourse to law enforcement and supervisory authorities. The latter should investigate the inaction of the police. Nosik argues that LiveJournal has twice appealed to the police because of the attacks it suffered in the spring and summer of 2011. However, criminal charges were never filed.

Adobe Launched Marketing Campaign

Adobe has recently purchased a company called Efficient Frontier that is engaged in adverts in the channel. The company believes that splashing out on Efficient Frontier could really improve its own Digital Marketing Suite, along with the abilities for flogging advertisements to different companies and in turn firms flogging advertisements to wherever else.


Adobe Senior Vice President for digital marketing recently made an uncharacteristically thrilling statement, saying that its clients would want to know exactly how they are able to spend dosh in order to get the best return. The outfit known as Efficient Frontier is believed to provide Adobe’s Digital Marketing Suite with a little more shine to online advertisements.

The software of this company, according to experts, will provide Adobe with a way to promote more advertisements in Facebook. This social network is considered essential to Efficient Frontier’s algorithms – substantially, predicting results and targeted advertisements. The capabilities in question will be tied to Adobe SearchCenter that is already running with Facebook advertisements buying. Likewise, the company is going to integrate Efficient Frontier’s applications into its own Adobe SocialAnalytics software that is aiming at maximizing return depending on what online users are blogging about and discussing on the Internet.

The company’s SearchCenter has already paid search management included. Adobe believes that this will help Efficient Frontier complement this nicely by implementing search portfolio optimization. The company hasn’t disclosed thus far how much money and efforts it has already spent on Efficient Frontier. However, taking into account all the moves the company is taking, the industry experts could estimate that it wasn’t just a modest sum.

This is not the first case of such acquisition that would help one of the online companies prosper due to smart advertising. The market develops in regard to this line of behaviour, and more and more players understand this and take steps to keep pacing along the trend. Meanwhile, as it often happens in these cases, the board has to agree and government has to approve. Here Adobe expects that the deal will close in Q1 of the company’s 2012 fiscal year.

Google Chrome is Close to Becoming #2 Worldwide

One of the Internet statistics companies revealed that Google’s Chrome browser is very close to the point of killing off Firefox as the number 2 most popular browser worldwide.

StatCounter is engaged in tracking browser usage with the help of different analytics instruments offered by the service to websites. The statistics firm recently claimed that Google Chrome is about to pass Firefox to take the place number 2 behind Microsoft's Internet Explorer (IE) in two months.

The global average user share of Chrome for the past month was 23.6%, while Firefox boasted 26.8% and Internet Explorer was at 41.7%. The statistics company pointed out that the rise of Google Chrome had been dramatic. Indeed, the browser has gained 8 percentage points since the start of this year, which was almost 50% increase. But this is not the most surprising in the statistics: the matter is that the Chrome growth turned out to be at the expense of Firefox and Internet Explorer that have both dropped 4 percentage points.

These numbers are not exactly what the Internet industry considers significant. In addition, a company like StatCounter can’t be regarded as the universally acknowledged standard for Internet browser use. Instead, many industry experts prefer using Net Applications numbers. Earlier in 2011, this company predicted that Google Chrome could have a 17.8% share by the end of this year, short of Firefox’s forecasted 22.3%. However, if the pace of change continues, Google Chrome should pass Firefox on Net Applications’ chart by the middle of next year.

Although these numbers are not that shocking as those of StatCounter, they still indicate that Google Chrome is rapidly developing and growing faster than many of us could ever expect. In other words, if Firefox and Internet Explorer don’t take quick action, it may end worse for them.

How to Make Mobile Communication Safe

In our days people rely on mobile devices to access the web, look for different information and keep in touch with family and friends. That’s why it is so important to know how to behave online, how to manage your Internet reputations and how to put your personal safety on the first place when communicating on a mobile device.

First of all, think twice before sharing a thought or a picture. Think about your colleagues, grandmother, or teacher receiving them. Are you sure that what you’re sharing is suitable for anyone to see? Then it is highly recommended to protect your personal data. So, when you send something like emails, messages, pictures or instant messages to someone who isn’t a trusted friend or a member of your family, never disclose any personal data that may be used either to figure out your physical location or to exploit you.

It is also recommended to control negativity and think twice about who deserves to communicate with and who doesn’t. A number of Internet services allow you to block visitors. In case you have received any abusive or harassing messages on the Internet, you should report the abuse where and when you saw it.

Another advice is to use filters. For example, a few browsers have filters that help keep inappropriate material out of your search results. Although there are no filters in the world that are able to guarantee you 100% removal of unwanted content, they can still make a great difference to keeping inappropriate material out of your search results.
When it comes to downloading things, most of the troubles with security begin. Educated netizens will never download software from unknown and unchecked sources. If you download applications from 3rd parties, you should make sure they are only from developers you trust. Before clicking “I agree” and installing, read their terms of service and privacy policies carefully in order to fully understand what permissions you are giving the developers when downloading their software.

Norton Overestimated Cyber Crime Figures

Norton, the consumer division of Symantec, was noticed to overestimate some online security figures. For example, for the last month the net saw the stories that claimed digital crimes costs society $388 billion per year. These figures are tagged onto to stories about cyber crimes.

These figures can be found in a Norton survey report asking around 20,000 people in two dozen countries about their experience with digital crime. The survey asked the respondents to evaluate both direct and indirect losses they think were caused by cyber crime.

Norton concluded that punters lost $114 billion per year, including consumer losses that were reimbursed – the most widespread case of such kind of crime is credit card fraud. However, the company seemed to fudge things a little: for example, it decided that online harassment was also a cyber crime, as well as being approached on the Internet by sexual predators. Moreover, the term “fraud” was defined so widely that it would have covered all credit card fraud, as the word “online” can’t even be found in the definition.

Nevertheless, this wasn’t enough for Norton, who firmly decided to make the statistics appear worse by calculating how much the cyber crime experiences in question were worth including “time lost”. And this last figure alone more than doubled the direct losses, as it was calculated to be $274 billion.

The media couldn’t miss the fact that even with the faulty reasoning something strange is happening with the numbers. Norton took the UN figures for the trade in heroin, cocaine and marijuana, reasoning that it was worth $411 billion a year. Meanwhile, if you add the $114 billion for direct Internet crime losses to the $274 billion for “time lost”, you’ll end up with a figure pretty close to the drug sales! In other words, Norton claimed that online crime is close to all global drug trafficking. The company is therefore boosting figures with “time lost” money, which in reality never existed, thus meaning that cyber crime is as bad as an industry based on real money!

Moreover, the experts found out that Norton made a press release two years ago, claiming that online crime eclipsed the global drug trade, and it seems that this time it reiterates the same, simply trying to back it up with numbers. As for the company itself, Norton explained that discrepancies can be explained by huge amount of unreported crime. At the same time, they insist that the company is confident it provides a valid representation of the current state of consumer online crime.

Russian Hacker Made $3,000,000 with Botnet

According to the latest media reports, it has been recently uncovered how far one of the online criminal’s reach went. An individual in his 20s, somewhere in the Russian Federation, used a bunch of criminal toolkits to help him earn money, which resulted in attacking more than 90 countries and stealing $3.2 million in only six months.

The security experts believe that Soldier employed a network of money mules, as well as had an accomplice presumably residing in the states. Overall, since this past January, the hacker has been pocketing $17,000 per day. This is what threat researcher Loucif Kharouni pointed out in his research, describing the antics of some Russian hacker known online as Soldier. The hacker was using SpyEye and ZeuS binaries and blackhat SEO in his illegal activity across the Internet. He allegedly traded in traffic with a number of other hackers online, employing various malware to extract money from multiple accounts (most of them located in the United States) and steal security credentials. The most interesting part of this story is that it wasn’t just ordinary people’s dodgy attachments that had been hit by the malware – we are talking about high security organizations and American corporations being among those hit.

All in all, the hacker has successfully infected over 25,000 systems from April to June, which may appear good for Microsoft’s push in making users to upgrade, since most of the victims used Windows XP on their computers. However, around 4,500 Windows 7 machines also took the hit, according to the results of the study. Currently the investigation is still open, with experts trying to find out how they could notify victims.

Twitter Will Allow Advertising in Timeline

The worldwide-known micro-blogging service Twitter will now let brands to advertise in users’ timelines, even if the users don’t follow the advertiser.


Back in July this year, Twitter introduced promoted tweets as its unique form of advertising in users’ timelines. The users of the service could see some sponsored messages in their timelines, but all those messages were from brands and outfits they already followed. Earlier, promoted tweets could only be seen in search results or on the top of the Twitter trends lists. However, according to the new announced system, the users of the service are now able to be served advertisements from brands in their personal timelines, regardless of whether they even follow them or not.

Apparently, this will be the first time that Twitter users are exposed to advertisements in their timelines from the companies they don’t even follow. The company’s representative claimed that it would make such feature available to a single-digit percentage of its global user base. Moreover, of that group, Twitter promised only to show promoted tweets to users from advertisers that are relevant to their interests. The company explained it is carefully investigating how users respond to such tweets, and based on that response, it would roll this capability out to an expanded audience in the nearest future.

Of course, the consumers have a right to choose. Twitter users will be able to remove the advertisement, also called “timely tweet”, from their timelines with a single click. The local media report that Disney, Pepsi and Xbox will be the first clients of Twitter, which advertisements will be presented to the consumers while rolling out the next stage of this company’s advertising program.

Facebook Patented Tracking Method

Although the social networking service Facebook has previously denied that it was interested in what its members do on other online locations, the news is that some evidence has been found that Facebook had developed its own technology to do just that.


One of the Australian bloggers has found a patent that was dated October 2011. According to the information the patent contained, Facebook has described there a method to monitor information about the activities of the social network’s members while on another domain.
The blogger explained that tracking cookies are able to monitor Facebook users whenever they surf any online services having an integrated Facebook “like” button.

One of the Illinois residents has already filed a lawsuit over such tracking on behalf of Facebook users in the United States, so he is currently seeking class action status. As for the most popular social network in the world, it previously claimed that cookies were tracking users by mistake. However, the latest post of the plaintiffs proved that Facebook hasn’t turned the tracking off. Instead, it patented it!

The representatives of Facebook maintain the official line that tracking cookies have only been installed when the registered members accessed Facebook.com. However, the opponents revealed that the cookies were set by all websites containing Facebook widgets. Moreover, it was found out that one of the tracking cookies monitors the users’ activity even if they had never been to the Facebook website at all, and even if they have never clicked a “like” or “share” button.

This is not the first time the cookie was found out: it was disabled after an outcry in The Wall Street Journal earlier in 2011, but later it has quietly returned. The patent, bearing the catchy title “Communicating Information in a Social Network System about Activities from Another Domain”, is all about tracking Facebook members outside of Facebook.com domain. The patent describes maintaining a “profile” of the users while they are moving around the Internet, as well as logging the actions taken on the 3rd-party domains.

In response, a spokesman for Facebook claimed that the patent wasn’t intended to track those users who had logged out from the social networking site. Facebook has also pointed out that the idea in question has only been patented, but hasn’t been used yet.

Google Adds Offline Access to Gmail in Chrome

Chrome browser users will be able to access Gmail when they're not connected to the Internet starting Wednesday and will gain similar offline capabilities for Docs and Calendar in the coming week, the company announced on Wednesday. Users will need to install individual offline-access applications from the Chrome Web Store to add these capabilities to their browser. The Gmail application is called Gmail Offline and is based on the Gmail application for tablets, which works both with and without Internet access. Docs and Calendar will each have its own offline-access application on the Chrome Web Store.

The offline capabilities will become available both for individuals who use Gmail, Docs and Calendar, as well as for organizations who use them as part of the Google Apps collaboration and communication suite in workplaces and educational institutions. Once installed, these offline applications will create an icon in the Chrome browser interface for launching them when users aren't online.

The Gmail application will have its own user interface separate from the Gmail web interface, while the Docs and Calendar applications will trigger their Web application's interface and work in the background. In all three cases, users will get access to a subset of the Web applications' features. For example, in Docs it will be possible to view documents and spreadsheets, but not yet edit those documents. In Calendar, users will be able to view events and RSVP to appointments.

 Previously, Google provided offline access to these applications via its Gears browser plug-in, but the company stopped developing it last year. It has been possible to use Gmail and Calendar offline through Gears in Internet Explorer 8 and Firefox 3.6, but not Docs. Google's focus is on HTML5 for providing offline access for its Web applications. The company plans to provide offline support to more of its applications beyond Gmail, Docs and Calendar, as well as make offline capabilities available in other browsers.

 "While Google tells us that the number of commercial Gmail users impacted by the removal of offline capabilities for Chrome was very small, we certainly know of large Gmail customers that were dismayed by the move," said Gartner analyst Matt Cain via e-mail. "Restoration of offline capabilities for Chrome will certainly be welcomed by businesses relying on Gmail. Restoration of offline capabilities for all browsers would be even more welcome," he added.

United States of Android

Where You Are From - Android or iOS or Blackberry State?

From a July report, mobile phone advertising and marketing firm Jumptap unveiled a colorcoded map, titled United States of Android os, displaying the geographic mobile make-up of the United states of america. Yellow-colored states tend to be covered with Google android lovers and blue-colored states by iOS enthusiasts.

Blackberry mobile phones is established in the small amount of gray-shaded sates. As you can observe, Google android patriots are accumulated in Southern and South west states, whilst iOS loyalists are put collectively in Northeastern as well as Middle west states. Particularly, Ca, Tx and Fl over-index with Google android use and states within New England and also the Middle west over-index with regard to iOS usage, based on the survey. With Ca skewing towards Google android use, the organization made a decision to additional breakout mobile predilections within the state city-by-city. We must notice, as Jumptap does, that amounts don' signify share of the market or even delivery amounts, but rather reveal the information from the eighty three mil customers around the company's network.

Jumptap's set of state-by-state phone utilizationadditionally exposedthat in their particularnetwork, Android mobile phonerules with a thirty-eight % share of the market, trailed tightly by iOS with thirty-three% and alsoBlackberry with twenty two %. The data additionally display that iOS users are apt to have greater ad click-through rates compared to customers of other smartphones on the market (.seventy eight % for iOS, instead of .forty seven or .thirty-six percent for Google android or Blackberry). I have an interest to find out exactly how these details broke lower inside a few of the more populated, technophilic states such as Ca and Ny. Does it differ place to place? Do Los angeles citizens have a tendency towards iOS, whilst San Franciscans favor Google android? I'd also love to observe this particular overlaid with details about the dominating company in that region. Does Google android perform best in locations with solid Verizon wireless coverage, for instance.

How To Earn Money Online Without Investments

Most ofthe time we all continue to keep talking about the online part-time income generating methods using your websites or blogging site. It’s factual that, for greater internet business as well as long-term online revenue planning, we should have got web site along with targeted traffic on there. However, there are lots of people today on the internet who would like to make several part-time earnings from online without having web-site, for the reason that the issue of expense regarding domain brand as well as website hosting, or even due to deficiency of adequate techie knowledge on web hosting along with handling their own personal websites. Therefore, in this post I am about to discuss a few methods for those people who are actually want to make money on the internet without having google adsense or websites.
  • Affiliate marketing
  • Google Adsense
  • Content writing
  • Freelance job
Affiliate marketing without having websites:

Probably the most important things in affiliate marketing online is always to get to the target audience on the internet to market affiliated product or service. This can be carried out in in whatever way, by means of e-mail marketing campaign or social media marketing system, or marketing with articles in free article directory sites. If you're sufficiently good in social networking, you've large list of good friends as well as follower, you'll be ready to here internet affiliate marketing to make online earnings without necessity of website and blogsite.

Earn with Google Adsense without having websites:

Definitely, to publish advertisements of Adsense you'll want websites, however here' 'm discussing the free of charge substitute of paid web site. You might opt for blogger services such as blogger.com, wp or may well build website with cheap domain from namecheap.com (starts from $2) and totally free web hosting from numerous web hosting service provider. When you begin earning, you may be thinking to transfer your website or blogging site to a professional paid web hosting.


Earn with article writing without having websites:

If you're truly best in web content writing or re-writing, you possibly can make dollars on the internet working on this particular thing. You will find websites such as squidoo.com, hubpages.com, that will permit you to build the web pages with your own personal posting and that can make money from the income earned using advertisements in your webpages. You can even try your fortune in free lance writing, presently there are massive necessity of articles writers these days. Make your free accounts in free lance websites and begin bidding upon articles or article writing assignments.

Earn money with free-lance job:

You can make dollars just for anything that you can do on the internet. If you're very good in English and also article writing, do the job as a free-lance article writer, if you're adequate in computer programming ability, software areas, or other IT associated areas, you could start getting careers in free lance website to earn part-time working at home. The majority of the work require merely around an hour or so to finish, you will observe exactly how simple to earn on the internet with free lance job if you start out bidding and obtaining job. Keep in mind that, you have to be professional or adequate at least to have a job in the category you need.

Certainly , there tend to be plenty of choices to make dollars on the internet with or without having websites, with or without having google adsense and many others… Please read on the blog and keep up-to-date with income generating tips.

Best Encription For Cloud Storage - Boxcryptor

Dropbox, a cloud data storage service provider, is considered the most popular of all. Dropbox supplies a fast and simple method to save as well as synchronize your data files, pictures, {documents inside the cloud and share them effortlessly between your friends and relations . However, whenever your documents are uploaded, Dropbox encrypts the data files at the sever end through which your own data files could be accessed by Dropbox and authorities so it grants easy access.

Lately, as a result of safety fault, it had been reported that there seemed to be a four-hour protection bug from Dropbox where by any accidental person could possibly sign into any of the company accounts at Dropbox using almost any username and password. Even though your data files have been encoded with Dropbox’s effective shield of encryption tool, yet still it could be accessed by any person coming from anywhere. This brought about a top safety warn.

The best method to safeguard Dropbox data is to secure all of them prior to upload. Doing this, neither Dropbox regulators can decode it nor any kind of cyberpunk and therefore your data files continue to be protected, it doesn't matter what. It is simple to protect Dropbox files within your account so that even when your account have been hacked, your data files will probably be protected and requires to be decrypted in an effort to access them.

BoxCryptor is but one such software that enables you to definitely upload a protected, encoded version of your data files that only you have access to. BoxCryptor is a Windows-based option for file-by-file encryption utilizing AES-256 bit encryption. It encrypts files on-the-fly, which ensures that whenever data is transferred to its drive, it will eventually secure and save it in associated Dropbox folder. The encoded data files can even be seen on Mac pc as well as Linux systems as it's works with the Encrypted Filesystem (EncFS)

Installation:
The momentinstalled, you’ll get asked to chose the source directory. You have to ensure that you have picked the correct directory where you would like to store your encoded files.
Furthermore, you have to choose the drive letter for BoxCryptor to mount a virtual drive.
Next, you’ll need to specify your password for the BoxCryptor volume to secure your data files.
BoxCryptor then behaves as a virtual hard disk drive, encrypting and decrypting data in real-time.
Data files become readable if the proper password is entered otherwise this is the way they'd look.


Make certain you don't remove the encfs6.xml file present in the BoxCryptor folder. The XML files helps BoxCryptor decode your data files.


BoxCryptor also comes in a couple of versions: 
Free – Restricted encrypted data to 2GB, and
Unlimited – $15 for Personal Users, or $50 for Business

Download Here

Genuine Google Adsense Approval Method

Striving hard to get Google Adsense Account. let me assist you.......
Now get Google Adsense account with you blog for free.


Google adsense conditions are actually tough for india during the last couple of years.And so,it might be hard to acquire adsense account in india for you,but don’t get worried i will show you adsense approval method for India.

You probably have heard about the people say “we are able to acquire adsense approval within just a couple of hours for just some $ $ $ $, but just ask yourself a question, is that possible? You'll certainly get your answer as "Absolutely no" therefore forget about your dream of purchasing adsense account through somebody.

Here' will reveal you probably the most reliable way of how to get google adsense approval in short-term, means that, not in a day, but in just a week, so forget about “obtaining google adsense account in one day techniques” that happen to be almost all sc am.

In this ebook I will demonstrate probably the most genuine method of getting adsense account and not a method to 'get account in a day', since there is no way for that in case you have not followed googles policy.

Be aware that buying adsense account system on internet are usually ho ax.

Download our E-Book For Free:
I am not spa mming here, this technique works perfectly. Its absolutely free and why don't you just try.
The Easy Adsense approval secret is available exclusively and totally free for subscribers of Pctechwizard.info.To get your copy immediately, simply add your Email to the form below and subscribe to our updates via Feedburner. As soon as you click sign up we will send you a confirmation Email, click the confirmation link, after conformation I will send the download link for the book. Or you can follow our blog to get the download  link.
After conformation please put your email id in comments.

Nokia Maps on iOS and Android Devices

There’s good news for all those who have been wanting to use Nokia maps on non-Nokia devices. Nokia is now spreading the Maps service across top mobile platforms as the company has announced the compatibility of Nokia Maps on the iOS and Android platform with location support on both platforms.

The most interesting part of this service is that it doesn't require a snappy Wi-Fi or 3G connection; a regular GPRS connection will be sufficient.

Nokia maps is now available on your smart devices with an HTML5 compatible browser, which means that you can have Nokia Maps on your iPhone, iPod touch and iPad with iOS4 or Android phones with Android 2.2 and Android 2.3. To access nokia maps on your smartphone just simply type maps.nokia.com in your mobile browser and you are in the NokiaMaps page.



Here are the features:
  • You can see where you are on the map, thanks to HTML5 support for positioning
  • You can find addresses, businesses and other places of interest, anywhere in the world
  • You can get to know the places: all the essential information about a place are presented on one page (pictures, user reviews, popular travel guides description, contact information)
  • You can plan the fastest route to your destination by car or on foot
  • You can see where the public transport lines go, and where the stops are
  • You can share your favourite places with your friends via SMS, email, Facebook or Twitter

How to Get Adsense Approval Without a Website

In the previous post we discussed about How to earn money using Google Adsense with a website or a blog. In this post I will tell you how to get Adsense approval without a website.

How to get adsense approved without a website?

I will tell you about some of the websites from where you can apply for adsense directly without any website.

India Study Channel:
Indiastudychannel is an adsense revenue sharing website owned by Tony John and you can apply for adsense with your profile page on this website. You can join the website through this link
Indiastudychannel. One more think you can also win many other prizes at Indiastudychannel.

Indyarocks:
Indyarocks is an adsense revenue sharing website which you can use to get adsense approvel.This is a very reputed website that can be used to get adsense approved. You can find the details of the adsense program on Indiarocks.

Flixya:
Flixya is also a very reputed website and holds the merit of being one of the websites listed in Google adsense case study. You can add photos,videos and blogs on the website and then apply through Flixya using your profile page to get adsense approved.

Hubpages:
Hubpages is also quite popular among bloggers. You can apply for adsense through Hubpages and you get 60% of adsense revenue generated through your posts. The website gets a lot of traffic from U.S thus your posts will also make more as the value of adsense click also depends on location of the person who clicked the ad.

Docstoc:
Go to Docstoc and do a signup then upload some documents. This site has the collection of online documents and magazine etc. Upload more documents here like format tutorials etc. Now your content will good traffic with this site. Go to doccash section and submit your mail id. You will get an google adsense application form, where you don’t need to enter your website information. Fill it and submit. Wait for 1-3 days, you will receive congratulations mail from google. Your application now approved. What ever you will upload here, site will place google ads including your publisher Id, any one click it, you will get 50% share from site. So good luck and earn best income.
These are the sites from where you can get Adsense account without website.

How to Earn with Google Adsense - PPC Marketing

In the previous post we discussed about the basic introduction of various affiliate marketing. Now we will discuss about the Pay Per Click (PPC). The first name which comes to everyone while talking about online jobs is PPC programs.PPC is a pay per click program. Google offers PPC program called GOOGLE ADSENSE.Google allows everyone to EARN MONEY from ADSENSE program.

What is Google Adsense?
Google adsense is a well renowned program by Google which gives an opportunity to the webmasters, publishers and bloggers to earn money, It is most common program used by the website owners to monetize their website. It allows all type of website owners from novice to professional , bloggers of any niche , sites of any size to monetize their site bu placing image or text ads on their site.

AdSense is a Pay Per Click (PPC) program, which means that the publisher gets paid every time one of their visitors click on the adverts. The actual amount paid varies depending on the ad clicked, visitors location, website owners location and many other factors.

How to use Google Adsense?

To start using adsense you need to have a website or a blog. Blogger is most common way to start because creating a blog is free, so, no expense for hosting or domain name (Use blogger.com for creating a free blog). Now after creating a blog, start writing some unique content( means whatever you like but no copying from others).

Conditions for Adsense Approval:
  • You should have own a top level domain or blogger blogs that too registered before 6 months and minimum of 60 posts.
  • Your major content in the site / Blog should be unique and not be copied from some other sites.
  • Your Blog should contain a reasonable content that users might interested to read it,with out any under construction pages.
  • Your blog should not contain pornografic contents.
If you had passed the above conditions,then sign up for adsense(http://www.google.com/adsense)

And for those who don’t have website? Don't worry, You can sill earn money.
In the next post I will show you how to earn using Adsense without blog or website.

Subscribe our News Letter or Follow our blog to get the posts directly in your inbox.

How to Earn Money Online - Introduction

Everyone likes to earn money online but don't know how to start. Here I will show you the different, the most legitimate tips tricks and suitable ways to Make Money Online without any Investment. You don’t need to sell a thing. You don’t need to answer any e-mails.You don’t even need to sit on PC daily. If you have a little free time and basic knowledge of computers, then you can make money online.


No wonder it is true that your initial income would be less but that’s the truth, you might have heard about the people earning 5 figure online income per week by working online with zero or without any investment and zero skills, but just ask yourself a question, is that possible with no money and no skills? You will surely get your answer as "NO"  so forget your dream of making a huge amount of money online with no investment. I will show you the most legitimate way to Make Money Online With Zero Investment and not a way to 'get rich soon', because there is no way for that if you have no investment or no cash to invest.
Note that get rich soon scheme on web which all of them are scam.

There are different ways and many ways that one can be able to make money online. Making money online has become successful to others while in others it has become unsuccessful because of various reasons. Some of the methods that are normally used in making money online are:


Affiliate Marketing

Affiliate marketing, in the simplest way, is a person promoting other people’s product or offer in exchange for an affiliate commission when a sale or lead has been generated.

There are four types of affiliate marketing that you should know. Not all of them will work for you, so you must carefully choose which affiliate program you are joining.

Pay Per Click (PPC)

PPC marketing is mainly associated with Google’s affiliate marketing program, Google AdSense. It’s probably the most simple as well. All you have to do is place the text ad in your website. Google will then find the most contextual ads in relation to you website based on the keywords of your website.
If you want to stick to a stable company that truly pays, then AdSense is your best bet.
In the future post I will show you how to start a website and easy ways to get Google Adsense approval.

Pay Per Lead (PPL)

Advertiser pays publisher a commission for every visitor referred by the publisher to the advertiser (web site) and performs a desired action, such as filling out a form, creating an account or signing up for a newsletter. This compensation model is very popular with online services from internet service providers, cell phone providers, banks (loans, mortgages, credit cards) and subscription services.

Pay Per Sale (PPS)

Cost-per-sale (CPS). Advertiser pays the publisher a percentage of the order amount (sale) that was created by a customer who was referred by the publisher. This form of compensation is also referred to as revenue sharing.

Before starting the basic requirement for online money making, register an account on the
AlertPay and at PayPal, they are like Internet Banks, they keep your
money online in the form of e-currency.
Earned money from the different ways will be transferred to
either AlertPay or PayPal and then you can utilize that money online or at real world or better you can invest it to earn more. So get your free PayPal and AlertPay account right now, they are must required if you wish to make money online with no investment or zero investment or without any investment.

Make sure that during registration register as a PERSONAL ACCOUNT, since the Personal account is an account for users who make small transactions online and they are not charged any Transaction Fee.

Continued in the next post...

Android 3.2 Official Update

The most recent version of the operational system Google Android for the tablets is official now. The new system Android 3.2 will surely arrive on some tablets very soon, according to cnet.com.

The first proof of this fact is that Motorola already started to offer this update for its tablet Xoom. According to the sources, there are already other Android 3.2 eager. The next brands that will have this software update are Samsung Galaxy Tab 10.1, Iconia Acer Tab 500 and Toshiba Thrive.


This comes right after a month since the Huawei announce that said that its tablet will be the first in the entire world to have a seven inches display with dual-core and Android 3.2 system.

According to an official statement of the company, the new Android 3.2 is a very important launching that adds more features both for the developers and the users.

The new platform includes some API changes (that is a programming interface for the applications). This is not the only company’s update. There are also wide ranges of the display dimensions that can be supported, not only the 10.1 inches ones, the media files can be directly loaded from the SD card and these aren’t just a few.

New user features

Some of the new features that users can expect include optimisations for a wider range of tablets. These include a variety of optimisations across the system in order to ensure an enhanced user experience on a wider range of tablet devices.

The latest update introduces a new compatibility zoom mode, which gives tablet users a new way to view fixed-sized apps on larger devices. This new mode provides a pixel-scaled alternative to the standard UI stretching for apps that are not designed to run on larger screen sizes, the likes of tablet displays. The new mode is accessible to users from a menu icon in the system bar, for apps that need compatibility support.

On devices that support an SD card, users will now be able to load media files directly from the SD card to apps that utilise these. A system facility makes the files accessible to apps from the system media store.

New features for Android developers

Besides the new functionality that will become available to users via this update, Android developers can also look forward to some added features. Android 3.2 introduces extensions to the platform’s screen support API, which provides developers with additional ways to manage application UI across the range of Android-powered devices.

The API includes new resource qualifiers and new manifest attributes that give them improved control over how their Android apps are displayed on different screen sizes, as opposed to relying on generalised size categories.

Google’s latest Android platform also delivers a new zoom compatibility mode, which renders the user interface (UI) on a smaller screen area, then scales it up to fill the space available on the display.

Developers can start to develop and test apps for this new platform, by downloading it into their SDK using the Android SDK Manager.

RoboForm Password Manager

RoboForm is a secure password manager that can automatically log into your web accounts with a single click. The program can automatically learn from a new login, just click the a button to save the current login information, the next time you want to access the site, you can do so with a single click. Your stored logins are securely protected by a master password and AES encryption, so there is no need to remember individual password, or to use insecure passwords in order to remember them more easily.

In addition to secure password storage and automatic logins, RoboForm also includes an automatic form filler, that uses Artificial Intelligence to populate common form fields (name, address etc.) whenever you encounter a web form to fill. Besides the obvious convenience of one-click logins, the program also adds an additional level of security by restricting password entry to matching sites (prevent phishing attacks) and bypassing potential keylogger interception.


Pros:
While there are several popular password management programs on the market, they all pale in comparison to the joy and ease that Robo Form delivers.  This is definitely one of those "cannot live without" products.

RoboForm is loaded with features, but topping the list of useful functions is Safenote. RoboForm is not just a program that remembers passwords for you, it actually acts as a virtual notebook to store all sorts of valuable information. Store bank PINs, schedule appointments and meetings, and then print a copy to store in a secure location.

RoboForm remembers information allowing you to fill out web forms much faster. Most browsers do this if you grant those permissions, but they do so without the same encryption algorithms that RoboForm uses. RoboForm has Blowfish and AES implemented to protect that sensitive data. You’re not getting this level of piece of mind from your garden variety Internet browser. You ever notice how often you have to install security updates?
RoboForm has a great feature called Login, which actually takes you to the web site, fills out login , and submits the information - all with just one click! Now, that's slick! It’s capable of dealing with radio buttons, check boxes, and is multilingual. You’re liable to forget your own address considering how infrequently you’ll have to type it out!

Installation is about as easy as it gets, with the auto-run doing most of the work for you. If you use Firefox  you will have to install an extra adapter to run RoboForm. No worries, though, it is a simple process! If you follow the tutorials in the program, you’ll get everything up and running without frustration.

RoboForm provides great support via their complete online manual and FAQs that cover any conceivable concern. Need a super-secure password that can’t be broken? RoboForm’s password generator is capable of creating a password 512 characters long, and then will remember it for you. Talk about security!

RoboForm for Mobiles
A Free App for RoboForm Password Manager is available in the Android Marketplace and for iPhone/iPad in App Store

Cons:
A drawback of using Free RoboForm is that you’re likely to forget passwords when away from your own computer. So, it’s almost a must to purchase RoboForm Pro and RoboForm2Go(store your passwords on a flash drive and take them with you wherever you go. And not to worry! It’s just another feature to give you extra piece of mind.)
Note: Free version can store only up to 10 logins. Download RoboForm

Sony To Release PlayStation 4 In 2012

Its been nearly six years  since the PlayStation3 was debuted, and now Sony plans to unveil its predecessor in 2012. Destructed by a series of heavily publicized hacks, Sony will need to show that it is capable of keeping up with the latest technologies in order to appease gamers. DigiTimes, the company responsible for producing most of the electronic components necessary for Sony consoles, has announced that the new model PlayStation will be manufactured at the end of 2011. Although Sony is waiting to formally announce its creation, it is   likely that the new console will be named the Play Staion 4.


What consumers can expect to see is built-in  infrared technology that is somewhat similar to what you see in the Microsoft Kinect. Just a few months ago, a video game news outlet reported that Sony's executives weren't planning on releasing a new version of the Play Station until 2014. However, the security breaches with the PlayStation Network might have prompted the company to reconsider its position. Nintendo will also be releasing an updated version of the Wii in 2012, which will be steep competition for Sony. So far, Sony is the only company that does not have an interactive accessory or peripheral for video game players.

Die hard PlayStation fans may be waiting  for Sony to release a new version, but if the company is to remain viable it must address both security concerns as well as changes in gaming  technology. Consumers will have to wait to see what Sony has in store until the rumored Play Station 4 is unveiled.

You shouldn’t worry too much about this article, the Playstation 3 will have a lot of good games coming out, even after the release of the Play station 4. We’re seeing this right now with the Playstation 2 which has still quite a bunch of games coming in contrary to the Xbox which has been completely dropped by Microsoft.

Facebook Official Java App for Every Phone

Facebook always tried to be a part of each and everyone using mobile phones. we know it since they tried Facebook lite, then partnering with an app called Snaptu for every touchscreen phones and many more ventures.

Commercially, this is great time for Facebook to launch such revolutionary application as they are competing with recently launched Google+ social network that is only available on Android and iPhone app stores right now.

Facebook app makes it easy to stay connected and share information with friends. The Facebook app offers a fast and comprehensive Facebook experience on over 2,500 different phones. This app not only includes Facebook’s most popular features, such as News Feed, Inbox, and Photos, but also enables you to upload photos and find friends from your phoneÂ’s contacts.This experience is optimized to use less data than other Java apps or mobile sites, making it much more affordable for people to use this app.

The app can be downloaded simply by entering d.facebook.com/install directly into mobile browser.

Here is the list of network operators offering free bandwidth for the app. Yes in an effort to assur ethat everyone on java mobile will download and use facebook app they have made GPRS/Edge data free for using on this app for 3 months (90 days)

Network operators offering free data access for a limited time:


Aircel (India)
Airtel (India)
Banglalink (Bangladesh)
Beeline (Russia)
Celcom (Malaysia)
Etisalat (Egypt, Nigeria)
Globe (Philippines)
Idea (India)
O2 Telefonica (Germany)
Reliance (India)
Smart (Philippines)
Smartfren (Indonesia)
Telkomsel (Indonesia)
Three (Indonesia, United Kingdom)
TIM (Brazil)
TMN (Portugal)
Ufone (Pakistan)
Vodafone (Turkey)

Giveaway of License Code, Worth 361.95$, Totally FREE!


Advanced MP3 Converter
Advanced MP3 Converter converts audio formats file such as MP3, WMA, WAV, OGG, APE, MPC, CUE, AAC, MP4, M4A, TTA, AC3, FLAC, OptimFROG, Speex, WavPack, ALAC etc from one format to another. including resampling. Audio format conversion is performed directly without storing any temporary files, It supports editing MP3 id3 v1 , MP3 id3 v2, APE, MP4, WMA tag also supported. Automatic volume normalization when converting, It best for burning high quality CD's.

DVD RIPPER
idoo DVD Ripper is a powerful and easy-to-use DVD ripping software for Windows users to rip encrypted and homemade DVDs with fast speed. Rip DVD to any video formats, such as AVI, WMV, MP4, MOV, MKV, MPEG, FLV, VOB, etc. Easily convert DVD movies to iPhone 4, iPhone 3GS, iPod, iPad, PSP, Zune or other portable devices on your vocation and travel. This DVD Ripper can also extract DVD audio to MP3.

All Sound Recorder XP
All Sound Recorder XP is a powerful recorder, editor and player. It is XP version of Sound Recorder. It enables you to record sound, played back through your sound card and any other sound sources like Line in, microphone, VCR, CD, DVD, Audio tape player, Telephone Data, etc.

All Sound Recorder Vista
All Sound Recorder Vista is best Sound Recorder. It has HD quality recording capability, recording's input can use 8000~192000Hz 8,16,24,32 bits. Why name All Sound Recorder Vista? It enables you to record any sound from computer's sound card, like voice, mp3, wav etc. Also It is 100% Windows Vista(32 or 64) compatible.

All Sound Editor XP
All Sound Editor is a visual music & audio files voice editing software. It can edit mp3, wav, wma & ogg voice which allow to perform various operations with audio data such as displaying a wave form image of an audio file, filtering, applying various audio effects, examining the frequency components and other details about your audio with the help of Frequency Analysis, Statistics, Spectral View features, format conversion etc.

Advanced CD Ripper Pro
Advanced CD Ripper Pro is a high quality audio software to rip CD tracks to MP3, WAV, WMA, Flac, Ape, Aac, Wave, and OGG Vorbis Files format on-the-fly.

MP3DO iPhone Ringtone Maker
Mp3do iPhone ringtone maker is a visual music & audio files iPhone ringtone editing software. It can edit mp3, wav, wma & ogg which allow to iPhone ringtone with audio data such as displaying a wave form image of an audio file, filtering, applying various audio effects, examining the frequency components and other details about your iPhone ringtone audio with the help of Frequency Analysis, Statistics, Spectral View features, format conversion etc.

idoo DVD Audio Ripper
idoo DVD Ripper is a powerful and easy-to-use DVD ripping software for Windows users to rip encrypted and homemade DVDs with fast speed. Rip DVD to any video formats, such as AVI, WMV, MP4, MOV, MKV, MPEG, FLV, VOB, etc. Easily convert DVD movies to iPhone 4, iPhone 3GS, iPod, iPad, PSP, Zune or other portable devices on your vocation and travel. This DVD Ripper can also extract DVD audio to MP3.

You can get following useful products FREE within this month, only one month, so hurry up! visit here

Windows 7 Keyboard Shortcuts

List of Windows 7 Keyboard Shortcuts

1.[Win+M] – Minimize all open windows
2.[Win+Shift+M] – Undo all window minimization
3.[Win+D] :- Toggle showing the desktop
4.[Windows+Up] – Maximize window
5.[Windows+Down] – Minimize windows / Restore
6.[Windows+Left] – Dock window to the left side
7.[Windows+Right] – Dock window to the right side
8.[Windows+Shift Up] – Maximize vertical size of window
9.[Windows+Shift Down] – Restore vertical size
10.[Windows+Shift Left] – Move window to left monitor
11.[Windows+Shift Right] – Move window to right monitor
12.[Win+Spacebar] – Aero desktop peek
13.[Win+Home] – minimize/maximize all inactive windows
14.[Alt+F4] - Close the active window
15.[Alt+Tab] - Switch to previous active window
16.[Alt+Esc] – Cycle through all open windows
17.[Win+Tab]- Flip 3D
18.[Ctrl+Win+Tab]- Persistent Flip 3D


Taskbar

1.[Win+Any number (1, 2, 3, .., 0)] – open the corresponding taskbar pinned program
2.[Ctrl+Click a pinned taskbar icon] – cycle through the program’s open windows
3.[Shift+Click a pinned taskbar icon] -run a new instance of the program
4.[Ctrl+Shift+Click a pinned taskbar icon] – run a new instance of the program as administrator
5.[Shift+Right-click on icon] – Show window menu (Restore, Minimize, Move etc)
6.[Shift+Right-click on grouped icon] - Show window menu (Restore All, Minimize All, Move All etc)
7.[Win+T] – Cycle through applications on taskbar (showing its live preview)
8.[Win+Shift+T] – As above, but in reverse order
9.[Win+R] - Opens Run dialog box


General

1.[Win+P] – show presentation mode projector options
2.[Win+G] – show desktop gadgets
3.[Win+L] – Lock computer
4.[Win+X] - Mobility Center
5.[Win++] - Zoom in
6.[Win+-] – Zoom out
7.[Win+=] – Magnifier


Windows Explorer

1.[Alt+P] - Show/hide Preview Pane
2.[Alt+Up] - Go up one level
3.[Alt+Left/Right] - Back/forward

How To Create A Password Protected Folder In Windows 7

In this guide I will show you step by step a very easy way how to create a secure password protected folder in windows 7. You might want to store secret / private files in here that you don’t want anyone else to access. The best thing about this guide is that you don’t need any 3rd party software to do this.


Steps To : How To Create A Password Protected Folder In Windows 7

-Create a folder and give it any name you wish. Double click on the folder and then right click and select “New” > “Text Document” Now rename this file to password.bat and make sure the file extension is .bat and not .bat.txt. Now open the file and copy the below text and then paste it in to the file.




cls
@ECHO OFF
title Folder Private
if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK
if NOT EXIST Private goto MDLOCKER
:CONFIRM
echo Are you sure you want to lock the folder(Y/N)
set/p "cho=>"
if %cho%==Y goto LOCK
if %cho%==y goto LOCK
if %cho%==n goto END
if %cho%==N goto END
echo Invalid choice.
goto CONFIRM
:LOCK
ren Private "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
echo Folder locked
goto End
:UNLOCK
echo Enter password to unlock folder
set/p "pass=>"
if NOT %pass%== ENTER YOUR PASSWORD HERE goto FAIL
attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"
ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Private
echo Folder Unlocked successfully
goto End
:FAIL
echo Invalid password
goto end
:MDLOCKER
md Private
echo Private created successfully
goto End
:End



Now replace the text ENTER YOUR PASSWORD HERE with a password of your choice. Make sure you don’t forget the password.

-Now double click on the password.bat file and this will create a Private folder. Now copy and paste the files you wish to keep private in to this private folder.

-When you have finished copying the files go back to the password.bat file and double click on it again. You will get prompted. “Are You Sure You Want To Lock The Folder Y/N” Type Y and hit enter. The folder will now disappear. I recommend moving the Password.bat file to somewhere else on your computer.

-If you want your folder to re-appear move the Password.bat file back in to the folder you created the folder in and double click on the Password.bat file, enter your password and hit enter, your folder will now re-apear.


Warning : How To Create A Password Protected Folder In Windows 7

This script is a very basic script to work out how it works and how to get around it. I would say 80% of IT trained staff will be able to hack this password protected folder, This is why I recommended to move the password.bat file after you have secured your folder.

Download our new Android App



Download our new Android App: "Check out our new Android App PC Tech Wizard.

Get it here http://www.appsgeyser.com/53485"

Tips - How to Prevent Your Email Accounts From Hackers

This is a complete guide to protect yourself from being hacked and secure your personal information from getting leaked or used by anybody online. Nowadays it is very common to hear about online security vulnerability with email and domains being stolen by unauthorized third parties. As a frequent internet surfer, how are you going to ensure your Gmail is safe from being attacked by phishers and prevent your private information from being stolen by third parties?

You never know or suspect the email is actually sent by phisher as the web page looks like a legitimate site you have visited before. Phishers can imitate as banks, email, online merchants, payment services providers and even governments that you may be confused with what they have claimed and follow the instructions to enter your username, password and other private information on the site. All these information can be used by phishers to steal your bank money, open new credit card applications under your name and etc. In order to prevent or minimize such incident from happening, there are few tips you can apply to prevent phishers’ attacks:


Complete Guide to prevent your Email Passwords from Hackers:

1. Don't use the links in an email, instant message, or chat to get to any web page if you suspect the message might not be authentic or you don't know the sender or user's handle. Instead, call the company on the telephone, or log onto the website directly by typing in the Web address in your browser.

2. Avoid filling out forms in email messages that ask for personal financial information.

3. You should only communicate information such as credit card numbers or account
information via a secure website or the telephone. Always ensure that you're using a secure website when submitting credit card or other sensitive information via your Web browser.

  • Phishers are now able to 'spoof,' or forge BOTH the "https://" that you normally see when you're on a secure Web server AND a legitimate-looking address. You may even see both in the link of a spam email. Again, make it a habit to enter the address of any banking, shopping, auction, or financial transaction website yourself and not depend on displayed links.
  • Phishers may also forge the yellow lock you would normally see near the bottom of your screen on a secure site. The lock has usually been considered as another indicator that you are on a 'safe' site. The lock, when double-clicked, displays the security certificate for the site. If you get any warnings displayed that the address of the site you have displayed does NOT match the certificate, do not continue.
  • Remember not all spam sites will try to show the "https://" and/or the security lock. Get in the habit of looking at the address line, too. Were you directed to PayPal? Does theaddress line display something different like "http://www.gotyouscammed.com/paypal/login.htm?" Be aware of where you are going.
4. Consider installing a Web browser tool bar to help protect you from known fraudulent websites. These toolbars match where you are going with lists of known phisher Web
sites and will alert you.

The newer version of Internet Explorer version 7 or 8 beta includes this tool bar as does FireFox Verison 4.xx or 5 Beta too.

  • EarthLink ScamBlocker is part of a browser toolbar that is free to all Internet users - download at EarthLink

5. Regularly log into your online accounts. Don't leave it for as long as a month before you check each account.

6. Regularly check your bank, credit and debit card statements to ensure that all transactions are legitimate (or legal) and done by you or in your supervision. If anything is suspicious or you don't recognize the transaction, contact your bank and all card issuers.

7. Ensure that your browser is up to date and security patches applied.

8. Never Download anything from anonymous links or links in email accounts or chat boxes.

9. Always avoid downloading cracks, keygens and patches as most of these contains Trojans and Malware content that will leak you personal data to hackers.

10. Regularly update your antivirus and anti-spyware software so that all new viruses are detectable and can be repaired easily.

11. While Installing freewares always take precautions and don't install the additional recommended things by the software's. Install only those that you know or that might be useful for you. And never install toolbars as their codes are dynamic that means they can be used to steal your private secured data such as credit card details, email accounts information and other personal data such as your searching patterns and your computer event logs etc.

Few more Important Things that you should always remember:
  • Always report "phishing" or “spoofed” e-mails to the following groups:
  • forward the email to reportphishing@antiphishing.org
  • forward the email to the Federal Trade Commission at spam@uce.gov
  • forward the email to the "abuse" email address at the company that is being spoofed (e.g. "spoof@ebay.com")
  • when forwarding spoofed messages, always include the entire original email with its original header information intact
  • notify The Internet Crime Complaint Center of the FBI by filing a complaint on their website: www.ic3.gov
Some Tips while choosing your Passwords:


Choose a complex password. If you use a simple password such as "password" or "rockstar" or any dictionary word, it makes it easy for people to guess your password. This is especially true if your potential hackers are friends and family members who might try to guess. Instead, choose a password that makes use of both capital and lower case letters, numbers and special characters like the percent or dollar sign.
Change your password regularly. Every month, make a point of changing your password to a new complex.

Google Maps - Offline Download

The new feature – included in version 5.7 of Google Maps for Android – lets you download maps for a specific area, meaning you won’t have to pay expensive roaming rates to find your way in a foreign city.



First of all you’ll need to update to the latest version of Google Maps, released today. Once that’s done you then open up the Google Places page for somewhere you want to visit. If you then click on the ‘More options’, under ‘More info’ you will find the option to download map area.



This will then download the map data for a 10 mile radius around the place you have selected.

Maps expire and will be automatically deleted after 30 days, but you do have the option to delete them at any time to free up space.

The downloads will only store maps so you won’t be able to use the 3D building functionality or satellite view without dipping into your data.

You will need to plan ahead, but it does mean you can use wi-fi hotspots abroad when planning your day and not have to rely on roaming.

If you’re looking for the best deal on an Android smartphone, check out Which? Mobile.

Google has also introduced a Scale feature to help you judge how far away you are from something and a Measure tool to allow you to work out exactly how far one point on the map is from another.