helozzzzzz everyone ..

Here u can get some internet or OS tricks , pc and windows problems solutions••••

Hope u will like that••••


Search This Blog

Thursday, April 28, 2011

What is CAPTCHA and How it Works?

CAPTCHA or Captcha (pronounced as cap-ch-uh) which stands for “Completely Automated Public Turing test to tell Computers and Humans Apart” is a type of challenge-response test to ensure that the response is only generated by humans and not by a computer. In simple words, CAPTCHA is the word verification test that you will come across the end of a sign-up form while signing up for Gmail or Yahoo account. The following image shows the typical samples of CAPTCHA.
Almost every Internet user will have an experience of CAPTCHA in their daily Internet usage, but only a few are aware of what it is and why they are used. So in this post you will find a detailed information on how CAPTCHA works and why they are used.
 

What Purpose does CAPTCHA Exactly Serve?

CAPTCPA is mainly used to prevent automated software (bots) from performing actions on behalf of actual humans. For example while signing up for a new email account, you will come across a CAPTCHA at the end of the sign-up form so as to ensure that the form is filled out only by a legitimate human and not by any of the automated software or a computer bot. The main goal of CAPTCHA is to put forth a test which is simple and straight forward for any human to answer but for a computer, it is almost impossible to solve.
 

What is the Need to Create a Test that Can Tell Computers and Humans Apart?

For many the CAPTCHA may seem to be silly and annoying, but in fact it has the ability to protect systems from malicious attacks where people try to game the system. Attackers can make use of automated softwares to generate a huge quantity of requests thereby causing a high load on the target server which would degrade the quality of service of a given system, whether due to abuse or resource expenditure. This can affect millions of legitimate users and their requests. CAPTCHAs can be deployed to protect systems that are vulnerable to email spam, such as the services from Gmail, Yahoo and Hotmail.
 

Who Uses CAPTCHA?

CAPTCHAs are mainly used by websites that offer services like online polls and registration forms. For example, Web-based email services like Gmail, Yahoo and Hotmail offer free email accounts for their users. However upon each sign-up process, CAPTCHAs are used to prevent spammers from using a bot to generate hundreds of spam mail accounts.
 

Designing a CAPTCHA System

CAPTCHAs are designed on the fact that computers lack the ability that human beings have when it comes to processing visual data. It is more easily possible for humans to look at an image and pick out the patterns than a computer. This is because computers lack the real intelligence that humans have by default. CAPTCHAs are implemented by presenting users with an image which contains distorted or randomly stretched characters which only humans should be able to identify. Sometimes characters are striked out or presented with a noisy background to make it even more harder for computers to figure out the patterns.
Most, but not all, CAPTCHAs rely on a visual test. Some Websites implement a totally different CAPTCHA system to tell humans and computers apart. For example, a user is presented with 4 images in which 3 contains picture of animals and one contain a flower. The user is asked to select only those images which contain animals in them. This Turing test can easily be solved by any human, but almost impossible for a computer. 
 

Breaking the CAPTCHA

The challenge in breaking the CAPTCHA lies in real hard task of teaching a computer how to process information in a way similar to how humans think. Algorithms with artificial intelligence (AI) will have to be designed in order to make the computer think like humans when it comes to recognizing the patterns in images. However there is no universal algorithm that could pass through and break any CAPTCHA system and hence each CAPTCHA algorithm must have to be tackled individually. It might not work 100 percent of the time, but it can work often enough to be worthwhile to spammers.


How to Create Your Own Customized Run Commands


Let me take up an example of how to create a customized run command for opening the Internet explorer. Once you create this command, you should be able to open the Internet explorer just by typing “ie” (without quotes) in the Run dialog box. Here is how you can do that.
1. Right click on your Desktop and select New -> Shortcut.
2. You will see a “Create Shortcut” Dialog box as shown below
3. Click on “Browse”, navigate to: Program Files -> Internet Explorer from your Root drive (usually C:\) and select “iexplore” as shown in the above figure and click on “OK”.
4. Now click on “Next” and type any name for your shortcut. You can choose any name as per your choice; this will be your customized “Run command”. In this case I name my shortcut as “ie”. Click on “Finish”.
5. You will see a shortcut named “ie” on your desktop. All you need to do is just copy this shortcut and paste it in your Windows folder (usually “C:/Windows”). Once you have copied the shortcut onto your Windows folder, you can delete the one on your Desktop.
6. That’s it! From now on, just open the Run dialog box, type ie and hit Enter to open the Internet Explorer.
In this way you can create customized Run commands for any program of your choice. Say “ff” for Firefox, “ym” for Yahoo messenger, “wmp” for Windows media player and so on.
To do this, when you click on “Browse” in the Step-3, just select the target program’s main executable (.exe) file which will usually be located in the C:\Program Files folder. Give a simple and short name for this shortcut as per your choice and copy the shortcut file onto the Windows folder as usual. Now just type this short name in the Run dialog box to open the program.
I hope you like this post! Pass your comments.


Monday, April 25, 2011

free AIRCEL 3G hack..!!!


I want to share something about AIRCEL 3G Hacking!!!

First of all u need one AIRCEL SIM and 3G enabled Phone......

Then Buy any Pocket Internet Recharge Card Worth of 14rs or 27rs whatever the price may be in ur city...

Remember do not Easy recharge on ur mobile number.....


Then recharge ur mobile with that Card!

After one hour send a Message to "121" as "START 3G"!!!

After Two Hours the 3G services r activated in ur mobile......

Here Comes the AIRCEL 3G HACK trick......

Connect ur mobile to PC or Laptop with the 2G signal......

Go to Settings --> Phone --> Network Mode --> GSM !!!

After that Browse the internet for 10 min. or so...

Now change the Network Mode to "UMTS" or "DUAL MODE"......

Thats it! U can Enjoy 3G services(Only INTERNET) with broadband Speed!!!

Those who already Activated 3G services can also Enjoy these services by simply messaging "STOP 3G" to "121" !!!
After one Hour ur 3G services will be De-Activated!!!
After that u can Proceed with the Above Steps..........

Enjoy Unlimited Downloads with AIRCEL 3G!!!

Explore Unlimited Possiblities with AIRCEL.......

Friday, April 22, 2011

Top 10 Rapidshare Search Engines

RapidShare is the world leader in one-click file hosting arena, despite being the most popular file-sharing service rapidshare.com lacks file search feature, the only reason I can assume they lack this feature is to avoid searching of copyrighted files by their legal owners getting illegally distributed by this pirate friendly file-hosting service. Nevertheless, their exist many services which allow you to search files hosted on rapidshare.com and other major file-sharing services like Megaupload.com, these free file search engines can be used to search for links of software, movies, music and ebooks hosted on rapidshare and similar services.



Their exist numerous services but here are the selected few top 10 services:
  1. Filez.com: Rapidshare Search - Note: Search Results Contains Adult Ads
  2. Rapidshare-Search-Engine.com
  3. Rapidshare1.com
  4. Rapidsharelink.com
  5. RapidFox.Com
  6. FilesTube.com
  7. Filesbot.com
  8. Hellafiles.com
  9. Searchshared.com - Supports almost all major one click file-hosters
  10. Oneclickfiles.com

Fee GPRS Hack For Reliance Mobile

A brand new free gprs internet hack is now said to be working on Reliance mobile network, our reader Santosh Bhatt from Bharatpur, India was kind enough to share this with us, If you are a Reliance mobile customer pls. follow the steps next to enable free GPRS access on your mobile phones.


To get the hack working all you need to do is to configure your data-connection settings as follows on your cellphones :

APN : rcomwap
IP Address : 10.239.221.22
Port Number : 8080
Homepage : Wap.google.com

Simple Trick To Book Confirmed Tickets Under Indian Railway Tatkal Scheme

Just few hours ago Star News (India) was running a story showing how train-booking agents are utilizing automated software from a company named "SoftValley Travels Pvt. Ltd." to snatch off "Tatkal Quota Bookings" (Urgent Train Ticket Quota in Indian Railways) from common users, today we will be showing you how you can also replicate the exact trick used by that Tatkal Train Ticket Booking Software and get your confirmed tickets the smarter way without paying any extra charges to travel agents or buying that software



Thanks to the over-crowded trains in India getting a reservation is hard and emergency ticket quota like "Tatkal" gets booked within minutes of opening (Tatkal Booking starts at 8:00 AM two days in advance excluding the day of journey), The trick behind the SOFTVALLY ticket booking software is that it pre-populates and submits all the information required for ticket booking on Irctc website in an automated way while others are still entering there information manually giving software users the time edge needed to book the ticket.
Now, to replicate this all we need to do is to use an auto form filler like LastPassRoboform or Kaspersky Password Manager to fill-in all the required information and submit as quickly as possible, to pull-in this trick simply install any one of the above automated form-filler (LastPass is my choice) and follow steps below :
  1. If you need to book your ticket the next day, prepare the data today during tatkal booking hours.
  2. Goto irctc.co.in and login to your account, now click "Quick Book" link. 
3. Now fill-in all the data keeping your tatkal booking in mind (the one you want to book the other day when bookings open for train quota you want ticket for) and save the form data in your form filling automation utility (LastPass).

4. That's it, now when next day tatkal bookings for your train open all you need to do is to visit the irctc.co.in website and use "Quick Book" option (as soon as the irctc website clock located in the top orange bar shows 8:00 AM) and voila the data should be pre-filled in by your form-filler - simply enter the image verification code and submit form.

  
 5.You can further save time by pre-filling the payment gateway information using the same trick.
Voila, you have a confirmed (most probably) Tatkal ticket while others are still entering there data :).









Tuesday, April 19, 2011

Five Best Job Search Sites


Unemployment rates are improving, which means more and more people are actually finding work-and many of them have job search sites to thank for landing their new gig. Here's a look at the five most popular job search and networking sites.
We asked you earlier in the week which job sites were your favorite, and whether you preferred job sites that were clearing houses of available job opportunities or professional networking sites that offered you a chance to connect with an employer before applying to work at their company. We've rounded up all of your votes, and here are your top picks for finding a new job or career.

 
Indeed gets over a billion new job searches every month, and many people refer to it as the Google of job searching. The site allows you to post your resume, search jobs in your area, apply to thousands of opportunities from multiple job listing sites, newspapers, corporate websites, and job boards. It has one of the largest job listing databases on the web, and does a great job of filtering out duplicates and removing spam.

Craigslist isn't just good for finding an apartment or selling your old gear. According to a number of you, Craigslist is also great for making real personal connections with people who are hiring for positions in your area. Your mileage may vary based on locale, but it's more likely that when you respond to the job listing you'll actually strike up a conversation with the hiring manager instead of a recruiting firm. If you do apply for a job on the site, you might want to follow these tips for applying for a job on Craigslist.
Dice is one of the most popular job search sites for technology careers on the Web. If you're looking for a job in tech, entry or senior level, initiate or experienced, Dice is one site that should be part of your job search. The site has thousands of tech jobs listed from some of the country's biggest companies like Hewlett Packard, Google, and Microsoft. If you're not looking for a career in technology however, there's likely not much at Dice for you.
Monster is a job site that often elicits about equal parts love and hate. Many of you expressed love for Monster's massive database, but hate for the sheer amount of spam posted and how difficult it is to actually get your resume in front of someone instead of casting your net wide and applying to everything available. The site features millions of job postings, hosts the resumes of millions more, and has mobile apps for the iPhone, iPad, and Android.


LinkedIn is a social network designed to help professionals build a network of coworkers and associates. Recently, LinkedIn has added features like status updates and corporate profiles. While it does have job listings, its focus isn't on using them to get hired. Instead, potential employees are encouraged to connect with the company, leverage their own professional connections, and connect with other people in their field or at the company they want to work before sending in an application.

CyberGhost VPn 1 Year Coupen Code (2011-2012)


Get your subscription now!!

Step 1:
Register an account
http://cyberghostvpn.com/page/registration.php


Step 2:
Goto this page and enter this Promotion Code: quale157
https://cyberghostvpn.com/page/account.php?serials

Done!!!

Use SSH Tunneling to surf net invisibly

Unable to surf net over work/college ? Want to surf net invisibly ? Well,we have a solution for that,SSH Tunneling.An SSH tunnel is an encrypted tunnel created through an SSH protocol connection. SSH tunnels may be used to tunnel unencrypted traffic over a network through an encrypted channel.In easy language,you can surf net without being monitored and even surf blocked sites too.SSH Is pretty awesome.
Without leaving your seat,you have a way to control a computer which ay be located anywhere on this planet.





And if you have access to a PC with an SSHd installed, you can channelize your traffic through that computer,which is particularly is useful in situations when -
  1. The site is normally inaccessible from your current location (School/Work)
  2. You do not want your connection monitored (You’re using a WiFi hotspot/You’re in a country that monitors/censors your internet usage)
In this tutorial,I will be using Firefox on Gentoo Linux , but it its applicable to all distributions of linux.
Step One: Setting Up the Tunnel
All common Linux distributions come with openssh packages. To check whether you have ssh installed already type the command "which ssh". Gentoo has opensh package preinstalled,so no tension :)
First we need to SSH to the server that we want to tunnel through, open up terminal and type the following command
ssh -ND @
Replace with a port number of your choice; This will be the LOCAL port whichFirefox will use to tunnel the traffic later on…Try to choose a high and random port number so as nobody scans or sneaks them in (system admin and firewalls)
Practical Example:
ssh -ND 2945 rishabh.cs07@sviet.ac.in
Now enter your password as usual, and it will hang after authentication, which is perfectly normal as it isn’t an interactive session- Now minimize the terminal and open Firefox.
Step Two: Configuring Firefox
In Firefox, Go to (Depending upon which version you are using)
preferences -> advanced -> Network -> connection settings
or
Tools –> options –> Advanced –> Network –> settings
A new window should appear,select the “Manual Proxy Configuration” option, you’ll need to type some information in the ‘SOCKS Host’ section.
Host: localhost 
Port: Port you used in the SSH command earlier.
Save your changes..Just to make sure it worked, check your IP with an online IP checker :)

Monday, April 18, 2011

How to Install Mozilla Firefox 3.6 on Ubuntu 9.10


A guide to install the Mozilla Firefox in your Ubuntu 9.10.
Step 1: Download the latest Firefox 3.6 from http://www.mozilla.com/en-US/products/download.html?product=firefox-3.6.3&os=linux&lang=en-US
Step 2: Run the Archive Manager as root by pressing alt+f2 and runing gksu file-roller
Step 3: Open firefox-3.6.tar.bz2 from your Downloads folder
Step 4: Extract the firefox folder to /opt/
Step 5: Open Terminal from Accessories menu
Step 6: Run the following commands
1. sudo mv /opt/firefox/Plugins /opt/firefox/Plugins-orig
2. sudo ln -s /usr/lib/firefox-addons/Plugins /opt/firefox
3. sudo mv /usr/bin/firefox /usr/bin/firefox-orig
4. sudo ln -s /opt/firefox/firefox /usr/bin
Step 7: That’s it you are done installing =)

How to Fix Script Error Problems With Firefox

You might face Unresponsive Script warning/error while browsing websites with Firefox.

This might lead Firefox to freeze for a moment and may irritate you. This is a alert you get when you try to use sites that auto updates itself, or web2.0 based sites.
Follow the below given steps to fix this problem.
Step 1: Type about:config in a blank tab in the Firefox url field
Step 2: In the text field marked as filter, search for the dom.max_script_run_time option, It will be like
Step 3: Right click on this field and click on modify, you will get a screen, In this instead of the default 5 enter 20 – 30
That’s it. You are done. You wont face any unresponsive script error problems in your Firefox. Happy browsing =)



How to Enable Private Browsing in Chrome and Safari


All browsers nowadays comes with an option called private browsing. The private browsing feature will not save your browsing history and cookies in your PC. Most will know to enable the private browsing feature in Mozilla Firefox. Most does not know how to enable private browsing feature in Google Chrome and Apple Safari. I will show how to enable private browsing feature in Google Chrome and Apple Safari
How to Enable Private Browsing in Google Chrome :
Chrome, Google’s web browser has a private browsing mode to remain incognito on the internet. Here is how to enable private browsing in Google Chrome:
* Launch Google Chrome.
* Click Customize and control Google Chrome.
* In the menu that appears, click the Order New incognito window.
* A new window is open in incognito. Web pages visited in this window are not recorded in the history of navigation.
* When you close the incognito window, all new cookies are deleted.
* Note that you can both browse normally and in incognito mode, using two separate windows.
How to Enable Private Browsing in Apple Safari :
Apple’s web browser has a default feature like Google Chrome. This function preserves the time of a session, the privacy of your online activities. Cookies, Historic sites and downloads are not stored when the feature is enabled
* Launch Safari.
* Click the Edit menu and then click Private Browsing.
* Click the OK button.
* Now you can surf in Private mode on your Safari browser.
Enjoy browsing in private =)