Wednesday 10 October 2012

Encrypt Internet traffic, View Blocked Websites & Remove Ads With Spotflux

When browsing over massive and never ending World Wide Web or internet, we often come across various visible and hidden threats. These threats can be in the form of viruses, malware, keyloggers, spyware, etc. One of the easiest ways to stay safe from these threats is to use an updated antivirus program with an active firewall. But still sending data over an unsecure internet connection can still be a threat to your system’s security. Previously I covered TinyWall, which improves your built-in Windows Firewall, and also monitors your outgoing and incoming internet traffic. Today I’m going to cover an advanced internet traffic monitoring software called Spotflux. Spotflux software is dedicated to protect your digital privacy and security. It also performs cloud-based, real-time calculations to remove tracking cookies and viruses without slowing down your system.

How does Spotflux encrypts your Internet Traffic

Spotflux works by tunneling or encrypting your internet traffic through their spotflux cloud network. It then runs millions of calculation to remove ads, any kind of tracking cookies, and any other thing that follows you around the web. All the viruses and malware are also detected and removed. Spotflux even hides your system or device location and IP address, thus protecting your identity, thus making your internet experience a lot safer, secure, and unrestrictive.
encrypt internet traffic and view blocked websites
If you install this application, you’ll see that it has a very simple interface. Spotflux doesn’t provide it users with consoles, a lot of tweaking options and other stuffs. There is just an option to Disable or Enable spotflux. You can tweak spotflux by opening the Settings dialog box which is accessible from top left-corner of the main Window. Here you can from options like Hide main window at startup, Show tray notifications, and Warn on Exit. You can even provide proxy settings you’re using any.
encrypt internet traffic with spotflux
With so much protection as the internet traffic is being encrypted and sent through spotflux cloud, you may notice a little decrease in your browsing speed.

Other features of Spotflux

  • Encrypted and Secure Internet Connection.
  • Malware and Virus Protection.
  • Open and Unrestricted Internet Access.
  • Private, Ad-free Browsing.
Conclusion: Spotflux does hide your IP address and provides a secure and encrypted connection. But it does decrease your browsing speed. One thing which I like about Spotflux is that it lets you access blocked websites.
Spotflux works with Windows XP, Windows Vista, Windows 7, and Windows 8. It supports both 32 and 64 bit editions.

How to Access US and UK only sites for free; Bypass country restriction

Very often those of us who live outside US and UK are stuck with problem that  a particular site or online service is only available in US or UK. This restriction based on country can be bypassed using a VPN client.VPN stands for Virtual Private Network. But often setting up a VPN is not a very and straight forward task. But then there is this VPN client which is perhaps the easiest way of setting up a VPN client that will give you access to US and UK sites .
tunnelbear
Tunnel-Bear is very easy set just a few clicks and you are all set to use it.With it you can easily access those sites which will only allow residents of US and UK to access their content.TunnelBear creates a secure, encrypted connection between your computer, tablet or smart phone and a server in the host country you want to connect to. To the internet it will look like your signal originated in the host server country.You can use TunnelBear from anywhere in the world except China

How to Setup and Use Tunnel Bear

Step 1 : Download TunnelBear from this site.
Step 2 : Open the Downloaded file and start the Wizard to set up an account with the Tunnelbear.
tunnelbear setup account

Step 3 :  Fill in the details and do not forget to add your twitter account to it as a tweet about TunnelBear can get you an extra 1 GB for free.
Step 4: Now check your E-mail for a confirmation link that was sent to you by Tunnelbear and click on it.Once you are through above steps TunnelBear will install a OpenVPN driver on your computer.
TunnelBear open vpn driver
Step 5: That’s it you have installed Tunnelbear. Below is a screenshot of what the Tunnelbear looks like when it’s launched.The screen shows you the speed graph and also how much free data is left with your account. You can also decide to select the country of your choice whether UK or US by clicking on the knob.

What Platforms are Supported:

Well if you have already started to think of using this service then there’s some good news,Tunnelbear is available for both Windows and Mac.
Not just this now you can also use Tunnelbear with your iPad or iPhone.

More about TunnelBear

  • Tunnelbear gives you 500MB of free usage for a Month and your account is refilled every month.
  • To get an extra 1GB as free data you can join their twitter promo.
  • Premium TunnelBear with unlimited data is also very cheap at just $4.99 per month or around $49.99 for a year.
  • The surfing speed suffers a little setback because of all the encryption and decryption but you should be able to stream videos with a decent internet connection.

Get 7 Months Connectify Pro license For Free!

What is Connectify??

If you don’t have a costly wireless router or If you want to extend your Home Wi-fi range or Your admin of Wi-fi sharing this is perfect software for you, Connectify allows users to convert their Computer to portable Hotspot.Apart from this users can manage the connection,they can disable internet/LAN access for particular device or remove a particular device alone.Users can also send files easily to connected devices just by dragging and dropping the file to the device icon in Connectify.There are 3 famous Wi-fi connection allowed using Connectify namely open,WEP,WPA2(if you have android device use WPA2).


Whats special about PRO feature??
Connectify is available for Free to download but PRO features are very attractive and smart.Exclusive PRO features include custom hotspot names (in free version you can only have the Hotspot name as “connectify-”), 3G/4G tethering, unlimited drag and drop file transfers, automatic internet selection, and so much more.whenever there is update or bug-fixes PRO users will be getting the update automatically.
How To Get 7 Months Connectify Pro license For Free ??
Connectify gives 7months PRO license for College students for free!! If you’re a college student and if you have a .edu or .ac.in email id you can straight away got to this URL and get a Free license (its a FB page so please log into your FB and open the link).If you don’t have a .edu email Id you dont need to worry we show you how to get 5$ worth .edu email ID for FREE!
  • Hit This Link.
  • Fill up the form. You need a Social Security Number (SSN) and Phone Number for account creation (US citizen detail).
  • You can get fake SSN numbers and phone numbers from This Link.
  • Complete the registration by providing some basic information like current email ID and password
  • After completing, You will get an EDU email address with a student ID.
  • It will take about 20 minutes to activate your account,so please wait patiently
  • After 20 minutes, Go to This Link and login to your .edu email account with your Student ID and Password.
After Creating this free .edu email ID Click this link and register for a free License,you will receive the license within 15minutes from registration.Now download the free Version from this link and enter the Email Id and the license key, Your Connectify is now PRO with 7months validity!!!!
P.S.  This promotion will be available for 2-4days so be quick and grab your key

TEN TOP QUESTIONS OF THE YEAR

1. What is TCP/IP and its integration?

TCP/IP is known as Transmission control protocol and Internet protocol. Its integration as as, Reliability not achieved at lower layers shall be implemented at the higher layers and more importantly each Layer in TCP/IP protocol suite is responsible for some network operations. IP though unreliable it implements routing of network information across the nodes upto the destination. But TCP cannot do this it implements only the end-to-communication (i.e) the source and destination without taking care of the intermediate nodes across which the network information should pass through which is done by IP layer. Therefore IP is integrated with TCP.

2. How to install Printer in the network?

Go to the start menu -> setting -> printers and fax -> add a printer -> local printer attached to this pc -> create the new port -> select the standard TCP/IP protocol -> and enter the ip address and insert the printer CD for driver and install the printer drive. After that, share printer to all computers.

3. What is PING?

PING stands Packet Internet Gopher. This is a utility for ensuring connectivity between computers . ICMP protocol works behind this utility. Under it , sending node sends packets to destination node and reply its received if there is proper communication between two.

4. Difference between VLAN and INTER-VLAN?

VLAN(Virtual Local Area Network) is a logical grouping of network users and resources connected to administratively defined ports on a switch. VLAN’s break up broadcast domains in layer 2 switch network.Virtual LANs (VLANs) divide one physical network into multiple broadcast domains. But, VLAN-enabled switches cannot by themselves, forward traffic across VLAN boundaries. So you need to have routing between these VLANs which is called interVLAN routing. You can achieve this by using either a Layer 3 switch or a router.

5. What is router protocol and routing protocol?

A routing protocol is used by router to dynamically find all the networks in the  internetwork and to ensure that all routers have the same routing table. Basically routing protocol determines the path of a packet through an internetwork. A routed protocol can be used to send user data through the established enterprise, when routers know about all networks. Routed protocols are assigned to an interface and determine the method of packet delivery.

6. Difference between TPC and UDP?

The difference between TCP and UDP is connection(TCP) and connectionless(UDP) protocol. Because In TCP for transferring every Packets it needs a acknowledgment packet from receiver ,so if any packet loss happens receiver will not send a acknowledgment for that packet so Transmitter will once again send the packet.so TCP is reliable connection unless UDP will send a packet and will not expect any acknowledgment from the receiver so it is not reliable.


7. What are the important Network topologies?

BUS topology: In this each computer is directly connected to primary network cable in a single line.
STAR topology: In this all computers are connected using a central hub.
RING topology: In this all computers are connected in loop.

8. Explain the work of SWITCH in detail.

Switch is a data link layer device that connect multiple LAN segments to form a single network segment. In switch when we transmit the data first it examine the data packets for source and destination then the switch forward the data packet to the appropriate destination.

9. Advantages of LAN:

Workstations can share peripheral devices like printers. This is cheaper than buying a printer for every workstations. Workstations do not necessarily need their own hard disk or CD-ROM drives which make them cheaper to buy than stand-alone PCs. User can save their work centrally on the network s file server. This means that they can retrieve their work from any workstation on the network. They don t need to go back to the same workstation all the time. Users can communicate with each other and transfer data between workstations very easily. One copy of each application package such as a word processor spreadsheet etc. can be loaded onto the file and shared by all users. When a new version comes out it only has to be loaded onto the server instead of onto every workstation.

10. What is OSI and its main purpose?

OSI reference model consisting of 7 layers helps the data to be moved in more optimal from source to the destination.And here the protocols are better hidden so the further enhancement can be done easily.This reference model can be used for both connection oriented and connection-less service.
It was a set of top 10 Networking questions and answers for Interview. These questions are previously asked in the interview. If you have any more questions regarding networking, do not hesitate to drop me a mail at prateek@thetechnoclub.com. We will look forward for your queries.

Saturday 6 October 2012



FACEBOOK NETWORK SECURITY AND TIPS TO MAKE IT SUIT UR CHOICE
How To Hide What You Read Through Read If you are among the group of people who love to use social apps for your favorite blogs and newspaper. But often worry about your privacy. There may be times when you could have told yourself that I’ll never this kind of news ever again on Facebook. But reading celebrity gossips, wardrobe malfunction, who left whom and married whom, how to get six pack abs, how to be a dude, and other interesting news is what we like. But reading these kinds of posts and articles may end up degrading up your reputation. As whatever you read using social apps on Facebook ends up showing on your facebook timeline. Now you don’t want your friends to know what you read today as it may be embarrassing for everyone.

If you don’t think you need to hide what you read through social apps. Then here’s a Reason for you

Just for example you saw an article regarding wardrobe malfunction of a famous celebrity and you read it. And you may have younger cousins, girlfriend or wife, and other siblings who’ll be notified that you read this article. Just think embarrassing moment when you meet them in person. Don’t want to go through it now do you?

Don’t delete the social apps

To save yourself from embarrassing moments like the one I mentioned, you’ll think that deleting the social apps is the best solution. No, I don’t think the same. If you delete these social apps, you may end up missing important news like poll position of elections being held.

So the best solution is hiding what you read using social apps from your facebook timeline. Here’s how to do it

  • Login to your facebook account.
  • Now click on the arrow just next to Home, and click on Privacy Settings.
hide what you read using social apps on facebook
  • Now click on Edit Settings, next to Ads, Apps and Websites. A new page will open click on Edit Settings again to open your facebook App Settings page.
hide what you read using social apps on facebook
  • Now find the social app for your social reader, and click on Edit.
  • Choose Only Me from the option: Who can see posts this app makes for you on your Facebook timeline?
hide what you read through social apps on facebook
  • And you’re done. Now you don’t have to worry about what you read on Facebook using social apps.
Closing Words: I think deleting is not the only way to work around with social apps on Facebook, and the fact that no news is bad. It’s just not good for everyone.


Convert Facebook Or Twitter Into A Blog With Mild

There are a millions of people in the blogging world. Each day a new blog is hosted on the internet. Each of these websites has their own niche. Hosting a blogging websites is not a big deal (Converting it into a successful one is Tough). But making a blog out of your personal life can be a big hassle. You have to remember and create new posts and topic each and every day. As far as I can remember isn’t Facebook and Twitter some kind a place where we share our thoughts and moments with everyone. Mild (Free Version) is a social networking tool that converts your Facebook or Twitter Accounts into a blog.
The hosted blog of your facebook or twitter accounts will have a unique accessible URL, which you can share with your friends. If you’re worried about other people privacy, you don’t have to worry as it only posts your content without the name and facebook comments. You can also delete stuff from your facebook or twitter blog through the hosted blog. The content will only be deleted from your blog, not from your timeline.
facebook or twitter blog
If you visit Mild website, after signing up, you can either choose facebook or twitter to convert into a blog. Now I chose to convert my facebook into a blog, and was surprise to see that the blog will be all about you.
facebook or twitter blog
That is the content you share, the updates you give, thus showing everything about while hiding content of others in your friend list. To my surprise the name of the person on which update you commented is also not displayed. So, you don’t have to worry about your friends saying that you posted their content on your blog.
facebook or twitter blog
If you check Mild dashboard, you can configure your facebook or twitter blog settings. You can change the blog title or logo, select a different layout, change title and body font, and their sizes. You can even choose to display your account image in place of title or logo.
If you really want to go with your facebook or twitter blog, then you can pay up some money to get your blog tracked by Google, and get it indexed.
Closing Words: I personally like Mild because it provided something out of the box. Also the blog created through Mild provides privacy to your friends and relatives. Anyway as a blogger I kind of keep my profile public so, opening a blog on my facebook or twitter comments is something I’m up for and I know other bloggers will definitely want to do so.
Visit Mild


Stop Facebook Photos Misuse With McAfee Social Protection App

Stealing your Facebook profile data
I think all of you are aware of McAfee and the all the work it has done for internet security. Even though company is bought by the mighty Intel Corporation, McAfee still is one of the leading company to provide antivirus and security suites. With the increase in scams and exploitation of profile pictures and photos on or of Facebook, the folks of McAfee have created the new McAfee Social Protection. This app will be made available as a public beta at the end of this month. This social app adds a layer of privacy to your Facebook photos.
stop facebook photos misuse with mcafee
If you upload your photos using this app, you can easily blur out specific portions of your photos. This in turn helps you in making your Facebook photos indistinguishable to the specific contacts. This gives you total authority over your Facebook photos, that is, you can allow a specific number of friends or groups in your friend list to view your photos.
If you want you can even make your pictures viewable but not downloadable. The McAfee Social Protection app disables the option to save, download and or even capture tools used to grab images or in this case your pictures or photos.

Why you need McAfee social protection app for your Facebook photos

I can give you many reasons why McAfee Social Protection app is helpful for both males and females.
Girls: Your Facebook photos can easily be downloaded and modified. And they may end up with guys or over internet.
Guys: I don’t think we need that much privacy and protection when it comes to our Facebook photos and picture. But we guys do treasure our girlfriends, fiancĂ©, or wife pictures.
Due to this fact I even found out a video describing how a young woman’s Facebook photo is pirated and reused as a sexy internet meme. McAfee Social Protection app is made to remove all these unwanted usage of your Facebook pictures.

Closing Words: With the coming of McAfee Social Protection app, I think internet will be a safer place for beautiful women, giving them the opportunity to upload their favorite picture and photos with their close friends and relatives.


acebook Adding “Want” button?

Facebook has entirely revolutionized the word LIKE,the next word possibly would be “want”.Noted developer  Tom Waddington located some code within the Facebook Javascript SDK that pointed to the development of a “want” button. So what is the use of this want button??

For Companies

Waddington speculates that Facebook could build a universal wishlist that could be queried by other apps through the Graph API.This new  option would  be helpful for Facebook’s ad partners. You add a product to your Facebook wishlist in your profile and the company that produces it or e-commerce websites could serve up discounts- or just keep tabs on interest or show the link to your friend on your birthday so that he can gift you that product.

For users

It ill be a added advantage for users as they need not go nuts selecting the gifts for birthday or another special occasion.This facility is like wishlist/wantlist available in leading e-commerce websites like eBay,you want or wish to buy something you can add it to the list,later whenever you have money you can review the list and get one.This will be really great feature when its implemented because other social networking sites like twitter or G+ doesn’t have this important feature like this.
Here are some screenshot which i collected from his blog,it clearly shows that facebook is trying this button,





When asked about the feature, a Facebook spokeswoman said “we’re always testing new Platform features, however we have nothing new to announce



Facebook Quietly Hides Your Email Address Leaving Only @Facebook.com Visible.

3
What will be your reaction when you will come to know that Facebook has made visibility  changes to your personal information, If you haven’t looked at your Facebook profile lately, you might want to take a minute and check it out.
It appears Facebook has decided to switch everyone’s default email address to an “@facebook” account. Problem is, they didn’t even bother telling us of the change, much less asking us for permission to do so and all this in an attempt to improve email address privacy.
So if you had left your contact email as xyz@gmail.com , Facebook has conveniently hidden it and now only shows username@facebook.com (username is your Facebook ID). Unless you reset your controls, this makes it harder for friends to contact you via third-party email.
How To Reset Settings And Show Your Personal Emails-
Go to your wall or profile and click “About”. On the “About” page there is a section listed with “Contact Information”. See the picture below for an example. Click the “Edit” button to change the default email address displayed.

When you click the “Edit” button, it will take you to a place where you can edit all your contact information. Find the section at the top labeled “Emails”. See image below for an example.
Find the email address that you would like displayed, and click the dropdown arrow on the right, as displayed in the picture above. Click the selection that says “Shown on Timeline”. If you don’t want people to use your “@facebook” address, then select “Hidden from Timeline”. Then save your settings when you have made desired changes.

So, What are your views on Facebook changing which email of yours is to be seen, without any prior information?



You Might See Facebook Browser & Dead Opera – Soon!

3
The rumor is spreading like fire, that Facebook is looking to buy Opera Software. If it turns out to be true then we will probably see a new web browser, Facebook brand.
facebook browser
Google Chrome, Mozilla Firefox, Apple Safari and Microsoft Internet Explorer just got a new competitor few days ago, namely Yahoo Axis, but it looks like they will have to make room for another one. If the said deal confirms, most probably we will see a brand new Facebook browser. If you don’t know about Yahoo Axis yet, it’s a web browser (of course) which has many new features, but the one it’s bragging about is – thumbnails. It has replaced the standard search results page and address bar suggestions with thumbnails, which shows a quick preview of the web page. Know more about Yahoo Axis.
We are saying this because, a few weeks ago the social networking giant bought Instagram and after a while launched a camera app very much similar to Instagram and apparently, Facebook is serious about developing its mobile services and make its own space in mobile sector – Acquisition of Opera Software is a very good move for this purpose. Also, it has plenty of money as it just went public, in figures its more than 16 billion dollars.
Opera claims to have 200 million users worldwide. Undoubtedly, the mobile browsers by the entity are very good and recommended by many people. Even I recommend it for mobile devices, but when it comes to desktop… I’d rather use Firefox or Chrome. Opera recently launched its very own browser for Android and Linus based TVs. We can only imagine what will happen when the growing and innovative company will get support of social networking giant and its huge public funds.
We can also expect some integration of the said browser with the social network to increase the engagement of its users and may be some exclusive features, similar to desktop notifications of Gmail which are only available in Chrome. To check the authenticity of the rumors, when Mashable contacted the PR team they replied, “Thanks for checking in, but Facebook isn’t commenting on this.” Well, what can we conclude out of that?


Facebook on it’s Way to Become the Next File Sharing Site?

3

With megaupload shutdown by FBI and FileSonic disabling it’s sharing functionality and what better time than this for Facebook  to introduce the new file upload feature in groups.
facebook groups gets the file sharing option
Previously on facebook Groups, members can create and modify docs files. Now through files option user can upload file upto 25 MB size with all data types extensions files except “.EXE” executable files and “Music files” to stay away from copyright notices. You can also take action against those file which compromises any copyright by reporting files or marked as spam
Through new features been integrated on facebook. It is looks like facebook wants to eliminates such competition in future like facebook to be in competition with youtube introduced video upload upto 1GB size and it has also become the largest image sharing site with over 300 millions photos been uploaded on daily basis. If facebook groups files upload option would be a success then if future of our share box we could see a new of files too.
let us know your opinion about facebook introducing the files upload option on groups.


Useful tips to Secure your Facebook Account

8
Facebook the Giant social networking site has recently overtaken the Google in Alexa rank. This clearly shows the dominance of Facebook on the world of internet. There are more than 955 million of users in Facebook according to the recent information. Providing security for all the users is a big challenge before the Facebook  Keeping it in mind Facebook has provided of many security layers and settings to its users. Irrespective of that thousands of Facebook accounts are getting hacked each and every day, just because, people lack awareness about the security measures that one should follow.
I am writing this article to give you few important tips on Facebook security . Just go through all the tips below and this will really help you secure your Facebook account.

Secure your Facebook account1. Turn on the secure browsing

Many people don’t even consider this thing as security measure, but believe me guys if you are on a Wi-fi connection or in any LAN connection, it is damn easy to hack and get into you accounts using simple hacking tools like Wireshark. I used to see many apps asking you to turn off security browsing to use them but try to avoid such apps.
enable+secure+browsing

Here is how you can turn on your secure browsing

  1. Open your Facebook account.
  2. Click on small button that is just beside the Home button.
  3. Select “Account settings”.
  4. Go to “Security settings”.
  5. Click on secure browsing and tick the box there and give a click on “secure browsing” to complete the procedure. Now you can enjoy the secure browsing.

2. Use a Strong Password.

strong-passwords

Using a strong password will always add an extra security layer to your profile. Even I used to hack my friends accounts just to prank them but I am surprised to see that many of them used their mobile number, Names (crush, friends, relative, places…Etc) as their passwords. After that even I tried to break into few other friends’ accounts just by guessing passwords.
If you don’t want that to happen to you just use some strong Password. Strong password is nothing but of combination of Upper case letter, Lower case letters, Numbers and symbols and I don’t recommend you to write them anywhere. Even avoid sharing your password.
It is also recommended you to change your password frequently.
Also read

3. Enable Log in notification.

First let me explain you what exactly “ log in notification” is, When someone entered in to your Facebook profile other than the registered devices you will get a mail or text message to your mobile or even both. You can make the settings in such manner so that each time when someone hacked your account you can Facebook notify you which help you to take immediate action.
facebook-login
Facebook log in notification

How to turn on log in notification in Facebook.

  1. Open your Facebook account.
  2. Click on small button that is just beside the Home button.
  3. Select “Account settings”.
  4. Go to “Security settings”.
  5. Tick “Email” and “Text message/Push notification” and click on save settings. That’s it you are done now.

4. Beware of Fake log in pages

Most accounts of Facebook are getting hacked just using these fake log in pages. This kind of attack is called as phishing, where people get compromised by hackers to log in  their details in a phishing site and within no time the hacker will get the password of all those who entered their passwords and email address in them. Every time when you enter your password check the URL. Don’t even think of entering your password if the URL is not related to facebook.com. Do remember that no site will ask you to enter Facebook password. Make sure that, even spelling of that URL should be facebook.com, I am mentioning this because intelligent hacker will name the phishing site something like facob00k.com , faaebook.com , fbook.com or something like that which make everyone to believe that they are original sites. Hope you are aware of this now.

5. Use different passwords for different sites

These days many internet users, used to have accounts in various online sites for different purposes. In general most of them used to keep their password same for all the sites without awareness. Do remember that if any one of the account get hacked then possibility of other sites getting hacked is more. So maintaining different passwords is highly recommended. I know that the problem here is, we may forget the passwords of site as we can’t remember all of them. I have a solution for you to solve this problem. Try to use your passwords in some order, let me explain you with example; if $@IChaRaN-123 was your password then you can make $@IChaRaN-124, $@IChaRaN-125, $@IChaRaN-126…Etc for other sites. So this makes you to remember them easily. I am not asking you follow the same order but you can try something similar to this.
That’s all for now friends. If you have any other questions related to security issues just comment below and we will try to solve your problem.