Sunday, March 28, 2010

RAR Password Recovery Magic 6.1.1.232 + resumable link

RAR Password Recovery Magic 6.1.1.232 | 5 Mb

RAR Password Recovery Magic 6.1.1.232 RAR Password Recovery Magic is a powerful tool designed to recover lost or forgotten passwords for a RAR/WinRAR archives. RAR Password Recovery Magic supports the customizable brute-force and dictionary-based attacks.RAR Password Recovery Magic has an easy to use interface. All you need to do to recover your password is just to add your file to the operation window.

Key Features
Recover passwords for RAR/WinRAR archives.
Custom character set for "brute-force" attack supported.
You can select character from a range of character options including: Letters, Numbers, symbol...
Large wordlist dictionary.
Work in the background.
Features a user-friendly interface.

Download Links:

Torrent Mirror: RAR Password Recovery Magic 6.1.1.232 + resumable link

Luxor Adventures (2009)

Luxor Adventures (2009)

Bonus: This game includes the full version of Luxor 3. You get two games for the price of one! Travel to the edge of time and back! Follow John Swift and Jane Graham in this Hidden Object game, as they travel through the past to keep history intact. When the archaeology duo uncovers the Osiris Orb just outside of Luxor, they learn that the mythical Stairway to Heaven is more real than they had first believed.Now, they find themselves tumbling through time and space in a race to keep the deceptive, power-hungry Seth Hisster from changing history forever!

* Unlock new game modes * Purchase includes LUXOR Adventures and LUXOR 3! * Travel through time!

## Requirements: Windows XP/Vista; CPU: 1.0 GHz; RAM: 512 MB; DirectX: 9.1.

Download Links:

Part-01

Part-02

Torrent Mirror: Luxor Adventures (2009)

Saturday, March 27, 2010

Kaspersky Internet Security 2010 v9.0.0736 + Activation


Kaspersky Internet Security 2010 v9.0.0736 + Activation | 84 MB
Kaspersky Internet Security 2010 v9.0.0736 + Activation

Kaspersky Anti Virus and Kaspersky Internet Security provides a qualitatively new level of protection for your PC through the optimal combination of traditional antivirus technology and modern proactive methods. Products easy to install and configure, they provide a greater opportunity to adapt the work under the individual needs of users. Programs differ not only integrate seamlessly with the family of operating systems Microsoft Windows, but compatibility with other software to protect personal computers.
Year: 2010
Developer: Kaspersky Lab
Language: English

Download Link:- Download Can Be resumable











Torrent Mirror: Kaspersky Internet Security 2010 v9.0.0736 + Activation

The Cursed (2010) TVRip XviD PrisM


The Cursed (2010) TVRip XviD PrisM | 700 Mb


The Cursed (2010) TVRip XviD PrisM

English | 136mins | 688x288 | 25fps | XviD | MP3 - 131kbs | 700MB

Genre: Horror | Thriller


A supernatural thriller set in a cozy Tennessee town where Sheriff Jimmy Muldoon and younger brother, Deputy Lloyd Muldoon, have a firm grasp of law and order until a stranger, Denny White, comes to town and horrible things begin to happen

Download Links:


Hotfile


Part-1
Part-2
Part-3
Part-4
All links are interchangable. It mean you can download any part of archive from any server and can extract it without problem! PM me if links are dead, I will try to re-upload the file if I can!

Thursday, March 25, 2010

Fresh JAVA games

Fresh JAVA games | 6 java | English | size : 9 mb
List:
Brain Challenge 3: Think Again!
(128x160, 176x208, 176x220, 240x320, 352x416)
Twilight
(128x160, 176x208, 176x220, 208x208, 240x320)
Halloween
(128x128, 128x160, 176x208, 176x220, 208x208, 240x320)
Poker with Nancy
(240x320)
War in Normandy
(128x160, 176x208, 176x220, 208x208, 240x320)
WRC: FIA World Rally Championship 3D
(176x220, 240x320)
To Download Click The Download Image Below:

Torrent Mirror: Fresh JAVA games

1000 Photoshop Tricks

1000 Photoshop Tricks | 32 MB

This book contains 1000 cool photoshop effects and tutorials. Pictures are included along the way, along with descriptive explanations of each step.

- Motion Pictures
- Turning a Character Into a Puppet
- Out of Bounds
- Creating Rain
- Creating a Wormhole
- Creating Fur
- Motion Tweens and Guides [Flash]
- Making Graffiti
- Turning a Character Into a Zombie
- Perspective
- Gender Blending
- Face Swapping
- Tattoos
- Displacement Maps and Textures
And many, many more!
Password For Below Download Link: www.fullandfree.info




Torrent Mirror: 1000 Photoshop Tricks
Rapid Share Link: http://rapidshare.com/files/367734609/1000_PhotoShop_Tricks.rar

Wednesday, March 24, 2010

Super-Hide-IP 2.0.7.2

 
Super-Hide-IP 2.0.7.2 | 1.61 Mb

Do you know what your IP address means? Are you aware that your IP address is exposed every time you visit a website? Many websites and hackers use IP address to monitor your home address and other personal information. Your IP address is your online identity and could be used by hackers to break into your computer, steal personal information, or commit other crimes against you. Super Hide IP allows you to surf anonymously, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.

Key Features
* Anonymous Web Surfing
Click Hide IP button and you will be assigned fake IP addresses, preventing others from getting your true IP when surfing the Internet.
* Protect Your Identity
Surf anonymously to prevent hackers or identity thieves from monitoring your web activity or intercepting your personal information such as your financial information.
* Choose IP Country
You can select to use fake IP from different countries via "Choose IP Country" option and can Check IP directly.
* Send Anonymous E-mails
Hide your IP in E-mail headers. Be protected while sending e-mails via Yahoo!, Hotmail, GMail.
* Un-ban Yourself from Forums and Restricted Websites
Use Super Hide IP to change your IP which allows you to access any forums or websites that has ever banned you.

Homepage: http://www.superhideip.com/


Torrent Mirror: Super-Hide-IP 2.0.7.2

Tuesday, March 23, 2010

Ashampoo Soft Pack March 2010 (21 in 1)

 
Ashampoo Soft Pack March 2010 (21 in 1) | 569MB

This publication presents the latest versions of the program from the developer Ashampoo. Programs are designed to perform the myriad of tasks: work with CD / DVD, optimization of the computer, antivirus protection, restoration of hard disk drives, editing text documents and many others.

Updated March 2010:
* Added a new version of Ashampoo Photo Commander 8.0;
* Updated program Ashampoo Anti-Malware 1.10;
* Updated the keys.

Contents:
1. Ashampoo ® Anti-Malware 1.10
2. Ashampoo ® Burning Studio 9.21
3. Ashampoo ® Burning Studio 9 Theme Pack 1.00
4. Ashampoo ® ClipFinder HD 2.06
5. Ashampoo ® Core Tuner 1.21
6. Ashampoo ® FireWall Pro 1.14
7. Ashampoo ® HDD Control 1.11
8. Ashampoo ® Internet Accelerator 3.20
9. Ashampoo ® Magical Defrag 2.34 & 3.0.2
10. Ashampoo ® Magical Snap 2.51
11. Ashampoo ® Movie Shrink & Burn 3.03
12. Ashampoo ® Music Studio 3.51.0
13. Ashampoo ® Office 2008 3.10
14. Ashampoo ® Photo Commander 7.31 & 8.0
15. Ashampoo ® Photo Optimizer 3.11
16. Ashampoo ® PowerUp 3.23
17. Ashampoo ® Slideshow Studio HD 1.0.3
18. Ashampoo ® Snap 3.31
19. Ashampoo ® UnInstaller 4.04 & 3.13
20. Ashampoo ® UnInstaller Platinum 2
21. Ashampoo ® WinOptimizer 6.60

 Download Links:

Part-1
Part-2
Part-3
Part-4
Part-5
Part-6

Torrent Mirror: Ashampoo Soft Pack March 2010 (21 in 1) 

Windows 7 AIO 23In1 x86/x64 DVD

 
Windows 7 AIO 23In1 | 4.08GB



Install to unpartitioned space without serial. No Serial and No Activation needed! Windows 7 Ultimate is the most versatile and powerful edition of Windows 7. It combines remarkable ease-of-use with the entertainment features of Home Premium and the business capabilities of Professional, including the ability to run many Windows XP productivity programs in Windows XP Mode. For added security, you can encrypt your data with BitLocker and BitLocker To Go. And for extra flexibility, you can work in any of 35 languages.

Get it all with Windows 7 Ultimate.

Windows 7 Starter (x86)
Windows 7 HOMEBASIC (x86)
Windows 7 HOMEPREMIUM (x86)
Windows 7 PROFESSIONAL (x86)
Windows 7 ULTIMATE (x86)"
Windows 7 Starter N (x86)
Windows 7 HOMEBASIC N (x86)
Windows 7 HOMEPREMIUM N (x86)
Windows 7 PROFESSIONAL N (x86)
Windows 7 ULTIMATE N (x86)
Windows 7 ENTERPRISE (x86)
Windows 7 ENTERPRISE (x64)
Windows 7 Starter (x64)
Windows 7 HOMEBASIC (x64)
Windows 7 HOMEPREMIUM (x64)
Windows 7 PROFESSIONAL (x64)
Windows 7 ULTIMATE (x64)"
Windows 7 ENTERPRISE (x64
Windows 7 Starter N (x64)
Windows 7 HOMEBASIC N (x64)
Windows 7 HOMEPREMIUM N (x64)
Windows 7 PROFESSIONAL N (x64)
Windows 7 ULTIMATE N (x64)
Lang: English

Torrent Mirror: Windows 7 AIO 23In1 x86/x64 DVD

Monday, March 22, 2010

Adobe Photoshop AIO 7, CS2, CS3, CS4 | 476 MB Only

 
Adobe Photoshop AIO 7, CS2, CS3, CS4 | 476 MB Only

Photoshop is a standard name in graphic design for web use, print layout, and more. Recognized world-wide as the industry-standard, Photoshop offers one of the most robust graphics editing experiences available. Learn tips and tricks, cool effects, and how to use the Photoshop tools more effectively.

Description:
Adobe Photoshop CS2 software, the professional image-editing standard and leader of the Photoshop digital imaging line, delivers more of what you crave. Groundbreaking creative tools help you achieve extraordinary results. Unprecedented adaptability lets you custom-fit Photoshop to the way you work. And with more efficient editing, processing, and file handling, there's no slowing you down.

Features included:

--->Adobe photshop 7
--->Adobe photshop CS2
--->Adobe photshop CS3
--->Adobe photshop CS4

Download Links:
Torrent Mirror: Adobe Photoshop AIO 7, CS2, CS3, CS4 | 476 MB Only

Sunday, March 21, 2010

Ultimate Bluetooth Mobile Phone Spy Software Edition

 
Ultimate Bluetooth Mobile Phone Spy Software Edition
  1. VIEW CONTACTS LIST
  2. READ TEXT MESSAGES (SMS)
  3. VIEW CALLS MADE / CALLS RECIEVED
  4. SET THE TARGET PHONE TO CALL YOU WHENEVER IT MAKES OR RECEIVES A CALL
  5. VIEW PHOTOS


MANY MORE FUNCTIONS

ALL THE ABOVE INFORMATION CAN EASILY BE DOWNLOADED TO YOUR PHONE

MAKE CALLS VIA THE PHONE YOU HAVE TARGETED
NO RANGE LIMITATION - SPY FROM ANYWHERE!
Once the target phone has been remotely set you do not need to be in Bluetooth range to listen to calls.

There is no trace or logging of your phone's details on the target phone
That means: THEY WILL NEVER KNOW


Torrent Mirror: Ultimate Bluetooth Mobile Phone Spy Software Edition

Useful Mouse Shortcuts in Mozilla Firefox

Nowadays, we can practically surf the internet from everywhere using the ever popular notebook or laptop. However, with the latest introduction of smaller and more convenient netbook and webbook, some of us may find it difficult to use its tiny keyboard when surfing the internet. Well, grumble no more. Here are some common yet very useful tips on using the mouse shortcuts in Mozilla Firefox.

 Mozilla Firefox Mouse Shortcuts

Command

Shortcut

Back

Shift + Scroll Down

Forward

Shift + Scroll Up

Zoom In

Ctrl+Scroll Up

Zoom Out

Ctrl + Scroll Down

Close Tab

Middle-click on Tab

New Tab

Double-Click on Tab Bar

Open in Background Tab

Ctrl + Left-click

Middle-click

Open in Foreground Tab

Ctrl + Shift + Left-click

Shift + Middle-click

Open in New Window

Shift + Left-click

Copy Tab or Bookmark

Ctrl + Drag

Reload (override cache)

Shift + Reload button

Save Page As

Alt + Left-click

Scroll line by line

Alt + Scroll

Saturday, March 20, 2010

Download Free MyPhoneExplorer v1.7.4 to Backup and Transfer SMS on SE Phone to PC

Mobile phones these days have plenty of useful features. Apart from using them to make and receive calls, perhaps the most utilized feature of all is sending and receiving SMS or text. Sometimes, for sentimental reasons or other, you might want to keep those SMS text for future reference. Well, here's how you can transfer these text messages to PC by simply downloading this free software – MyPhoneExplorer v1.7.4.
MyPhoneExplorer is a compact software by FJ Software Development which allows users to backup their sms from Sony Ericsson mobile phones to computer. Simply download and install into your PC and connect your SE phone via its USB cable, Bluetooth or infrared and you will be able to manage your phone's data effortlessly. Apart from transferring SMS to PC for archiving, there are host of other useful features too. With MPE, you can even sync your address book directly to Outlook, Windows contacts, Thunderbird, Gmail, Lotus Notes and Tobit David.
                          MyPhoneExplorer Messages Archive
Users are also able to organizer their phone calendar and sync them into Outlook, Windows Calendar (Vista), Sunbird, Thunderbird, Rainlendar, Lotus Notes, Google, Tobit David and other net shared calendars.
Other features include, automatic photo sync, clock sync via Internet, edit phone profiles, display memory status and monitor your phone health.
                                MyPhoneExplorer Status Monitor
In the event you're upgrading to a new phone and you need to transfer all existing data into the new phone, you can use the Create Backup features which will completely backups your phone's database with a single click. Upon connecting the new phone, just select Restore Backup and there you have it! As simple as that.
MyPhoneExplorer is only compatible with phones from Sony Ericsson except XPERIA, P800i, P900i and P910i model. You can download the free software at MyPhoneExplorer.
I Hope This Post Help You...Pass Your Suggestions & Feedback Through Comments
Thanks For Visiting My Blog..Keep Visiting..
Thank You.

Backup Email Database with Amic Email Backup

Email has become increasingly common and important in modern business communication or commercial practice. In some countries, an email even constitutes an adequate and formal means of serving notice. Hence, back up of an email account is extremely important in office management nowadays. There are various ways to back up your email. For instance, you can clone your email into a new account so that there is a backup in the event your original email account is corrupted. However, email cloning might not be a total solution. It is a bit messy to clone and manage two or more email accounts. To ensure uninterrupted access to your email account, Amictools has introduced a handy application for Microsoft Windows based PCs, Amic Email Backup, to create backup copy of users' email database.


Amic Email Backup
Amic Email Backup is available free for downloading. This backup application only works with desktop-based but not web-based email clients. Amic Email Backup works well with various destop-based email clients such as Outlook, Outlook Express, IncrediMail, Eudora, Netscape Messnger, PocoMail, etc. Amic Email Backup can make backup for email, contact list in the address book, email account settings, message rules, blocked senders lists, signatures, etc. This software tool will save the backup copy into a single, compact and compressed file. Users can easily restore the backup files as and when they require.

Amic Email Backup is user friendly and the backup process is quite simple. Users can schedule a backup timetable for their email account. It can be done daily, weekly or at any chosen time period. Once users have backed up their email database, they can restore it to other computers. The application will synchronize the database on the other PCs and keep the database updated. Of course, the email client used for both original and backup PC must be the same. They can't backup the email database using Outlook in computer A and restore it in Computer B which is using Eudora.

I Think This Post Helps You.Please Pass Your Feedback Through Comments....

Wednesday, March 17, 2010

How to Block Unwanted Emails

Do you want to  block emails from your ex wife/husband? Do you want to block those annoying offers and newsletters that reach your inbox? Well here is a way to block all those unwanted and annoying emails that you do not want to see or read! With this trick you can block individual email address or the whole domain from which you do not want the emails to come from. Here are the step-by-step instructions to do this.

For Gmail

1. Login to your account

2. At the top-right corner, click on Settings

3. Under Settings, click on Filters

4. You'll now see an option "Create a new filter", click on it

5. Now in the From field enter the email address from which you do not want to receive the emails

For ex. you may enter john@gmail .com in the From field to block all incoming emails from this address. However if you want to block the whole domain then use the following syntax: *@xyz.com. Now all the incoming emails from the domain xyz.com will be blocked.

6. Click on Next Step, select the action you'd like to take on the blocked emails. You may select the option Delete it so that the blocked email is moved to trash. To unblock the email, all you need to do is just delete the filter that you've created.

For Yahoo

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. In the left panel select the option Filters and click on create or edit filters

5. Now click on Add

6. In the next screen, give a name to your filter and in the From header field enter the email address that you want to block.

Fox ex. john@gmail.com or if you want to block an entire domain then just enter @xyz.com. Dont enter *@xyz.com. Select the option Move the message to: Trash and click on Save Changes.

For Hotmail

1. Login to your account

2. At the top-right corner, click on Options

3. A drop down menu appears, now click on More options

4. Click on Safe and blocked senders link under Junk e-mail

5. Now click on Blocked senders

6. Type in the email address that you want to block under blocked e-mail address or domain field.

For ex. Enter john@yahoo.com to block the individual email address or just enter xyz.com to block the entire domain.

That's it. You no longer receive those annoying emails in your inbox. Keep your inbox clean and tidy. I hope this post helps. pass your comments! At the Group www.groups.google.com/group/tsksoft

Public Website:

WWW.TSKSOFT.CO.CC

Thursday, March 11, 2010

182 Tips to Maintain a Virus Free Computer

Is your computer infected with virus? Do you often get mysterious error messages?
Well this is a common problem faced by almost all the computer users across the globe.
There are many viruses and worms out there that could infect your computer.
Some are harmless,but,they do have the capacity to do any number of nasty things,
up to and including, erasing all data from your computer.
However there are ways to keep viruses away from your PC.
Here are the 12 tips to maintain a virus free computer.

1. Email is one of the common ways by which your computer can catch a virus.
So it is always recommended to stay away from *SPAM*. Open only those emails
that has it's origin from a trusted source such as those which comes from
your contact list. If you are using your own private email host (other than
gmail, yahoo, hotmail etc.) then it is highly recommended that you use a
good anti-spam software. And finally *NEVER click* on any links in the
emails that comes from untrusted sources.

2. USB thumb/pen drives is another common way by which viruses spread
rapidly. So it is always a good habit to perform a virus scan before copying
any data onto your computer. NEVER double-click the pen drive to open it.
Instead right-click on it and select the option "open". This is a safe
way to open a pen drive.

3. Be careful about using MS Outlook. Outlook is more susceptible to worms
than other e-mail programs, unless you have efficient Anti-Virus programs
running. Use Pegasus or Thunderbird (by Mozilla), or a web-based program
such as Hotmail or Yahoo (In Firefox).

4. As we all know, Internet is the main source of all the malicious programs
including viruses, worms, trojans etc. In fact Internet contributes to virus
infection by up to 80%. So here are the tips for safe surfing habits so that
you can ward off virus infection up to the maximum extent.

   - Don't click on pop-up windows that announce a sudden disaster in your
   city or announce that you've won an hourly prize.
   They are the ways tomislead Internet users and you should never trust them.
   - You can also use a pop-up blocker to automatically block those pop-ups.

5. Most of us use search engines like Google to find what we are looking
for. It is quite obvious for a malicious website to get listed in the search results.
So to avoid visiting those untrusted malicious websites, you can
download and install the AVG LinkScanner <http://linkscanner.avg.com/> which
is a freeware. This tool can become very handy and will help you to
stay away from malicious websites.

6. Install a good antivirus software and keep it updated. Also perform full
system scan periodically. It is highly recommended that you turn on the
automatic update feature. This is the most essential task to protect
your PC from virues. If PC security is your first option then it is recommended that
you go for a shareware antivirus software over the free ones.
Most of the antivirus supports the Auto-Protect feature that provides realtime security
for your PC. Make sure that this feature is turned on.

7. Install a Good Anti-Spyware program, that operates against Internet
malware and spyware.

8. Never open any email attachments that come from untrusted sources.
If it is a picture, text or sound file (these attachments end in the extensions
.txt, .jpeg, .gif, .bmp, .tif, .mp3, .htm, .html, and .avi), you are
probably safe, but still do a scan before opening.

9. Do not use disks that other people gave you, even from work. The disk
could be infected with a virus. Of course, you can run a virus scan on
it first to check it out.

10. Set up your Windows Update to automatically download patches and
upgrades. This will allow your computer to automatically download any
updates to both the operating system and Internet Explorer. These
updates fix security holes in both pieces of software.

11. While you download files from untrusted websites/sources such as
torrents, warez etc. make sure that you run a virus scan before
executing them.

12. And finally it is recommended not to visit the websites that
feature illegal/unwanted stuffs such as cracks, serials, warez etc.
since they contribute much in spreading of viruses and other malicious
programs.

Please Pass your suggestions and comments at the above Topic Which is
Available at these Group and the Group http://groups.google.com/group/tsksoft


--
---Regards,
T.Saikrishna
Public Website: www.tsksoft.co.cc

How to Remove Newfolder.EXE or Sohanad Virus

You can remove this worm by manual method, or using a removal tool.

1.Manual Method
Here are simple steps following which you can get the worm removed from your system:

1.Download this file:Registry_Repair.

2.Double click on that downloaded registry file, you will be asked weather you're sure to add this to registry, click yes.

3.Restart your system.

4.Search for the file svhost32.exe and delete it if its found.

5.Search for the file svhost.exe and delete it if its found.

please pass your suggestions by comments and rating this info

at the Group:  http://groups.google.com/group/tsksoft

 Public Website: www.tsksoft.co.cc

How to Protect an Email Account from SPAM

Most of us get SPAM every day. Some of us get more and some little. Even a newly created email account will begin to receive spam just after a few days of it's creation. Many times we wonder where these spam come from and why? But this question remains unanswered within ourselves. So in this post I will try my best to give every possible information about the spam and will also tell you about how to combat spam.

What is SPAM?

Spam is the abuse of electronic messaging systems (including most broadcast media, digital delivery systems) to send unsolicited bulk messages indiscriminately. Most widely recognized form of spam is email spam.

Where do these SPAM come from?

These spam come only from spammers and never from a legitimate user or a company. These spammers send a single email to hundreds (some times thousands or millions) of email addresses at a time. They either send it manually or use spambots to automate the process of spamming.

Why do spammers SPAM?

The main goal of spammers is to send the spam (unsolicited bulk messages) to as many people as possible in order to make profit. For example, John builds a small website to sell an ebook which gives information about weight loss. In order to make sales he needs publicity for his website. Instead of spending money on advertising, John decides to create an email which contains information about his site along with it's link and send this email to say 100 email addresses in his contact list. If 1 person out of hundred buy this book john gets $10. What if he sends this email to 1000s of email addresses. He gets $100. Imagine, if he sends this email to 1 Million email addresses he gets $100000.

Now I hope you understood the idea behind spamming. So in order to make money, spammers send their advertising emails to as many people as possible without respecting the recipient's privacy.

From where do SPAMmers get my email address?

On the Internet there exists many sites who collect the email IDs of people and sell them to spammers in bulk. Most often, people sign up for monthly newsletters and take up surveys. This is the time where these scam sites get their email addresses. Also many spammers collect email addresses by using spambots. These spambots collect email addresses from the Internet in order to build mailing lists. Such spambots are web crawlers that can gather email addresses from Web sites, newsgroups, forums, special-interest group (SIG) postings, and chat-room conversations.

Spammers also use the trick of creating Hoax Emails for gathering a huge list of email IDs. For example, a spammer sends a hoax email which says "Forward this Message to Help Severely Burned Child". This email claims that 11 cents will be donated to the child's family every time the message is sent to others. Most of the people believe this and start forwarding this hoax email to all of the IDs in their contact list. In this way the email spreads rapidly and eventually when it reaches the creator (spammer), the spammer gets a huge list of valid email addresses in the email header. When you get these kind of hoax emails, you can see for yourself in the email header which contains a huge list of email addresses of all those people to whom the email is being forwarded to. This is one of the effective methods used by spammers to gather email addresses.

Is SPAMming legal?

Spamming is completely illegal. Yet it is really difficult to stop spammers from spamming since they keep moving from one hosting company to another after getting banned. This makes it practically impossible to catch spammers and prosecute them.

How to protect my email account from getting SPAMmed?

The following methods can be used to combat email spam.

1. Use spam filters for your email account. If you're using email services like Gmail, Yahoo, Hotmail etc. then spam filters are used by defaut. Each spam filter has it's algorithm to detect spam emails and will automatically move them to SPAM folder. This keeps your inbox free from spam. However some spam emails become successful to make their way into the inbox by successfully bypassing the filters.

2. Do not post your email address in public forums, user comments and chat-rooms. Give your email address only to trustworthy websites while signing up for newsletters.

3. While taking up online surveys and filling up feedback forms, it is better not to give your personal email address. Instead singup for a dummy email account and use this for surveys and feedback forms.

4. While posting your contact email address on your website use this format: emailaddress [at] yoursite.com instead of emailaddress@yoursite.com. This protects your email address from being indexed by spambots.

5. Do not respond to hoax messages. When you receive a hoax email, avoid forwarding it to your friends. Examples of hoax messages can be found at www.hoax-slayer.com. If you really want to forward it to your friends, make sure that you use "Bcc" (blind carbon copy) option to send the email. This will hide all the email IDs to which the mail is forwarded to.

I hope this helps. Pass your suggestions and feedback via comments at the Topic Posted at the Group www.groups.google.com/group/tsksoft

Monday, March 8, 2010

Tips for a Total Online Security

With the sudden rise in the Internet usage across the globe over the
past few years, there has also been a rise in the amount of online
scams and frauds. Today most of the Internet users are unaware of the
most prevailing online threats which pose a real challenge for their
safe Internet usage. As a result, Online Security has become a
questionable factor for the most Internet users. However it is still
possible to effectively combat online insecurity provided that the
users are well aware of the common scams and frauds and know how to
protect themselves. A study shows that over 91% of the Internet users
are unaware of the online scams and are worried about their security.
Well if you are one among those 91% then here is a list of 10 tips to
ensure your total online security.

1. Always install a good antivirus software and keep it up-to-date.
Also install a good anti-spyware to keep your PC away from spywares.

2. Always visit known and trusted websites. If you are about to visit
an unknown website, ensure that you do not click on suspectable links
and banners.

3. Perform a virus scan on the files/email attachments that you
download before executing them.

4. Regularly Update your operating system and browser software. For a
better security it is recommended that you surf the Internet through
the latest version of your browser program.

5. Never share your password (email, bank logins etc.) with any one
for any reason. Choose a strong password (A blend of alphanumeric
+special symbols) and change it regularly, eg. every 3 months. Avoid
using easy-to-guess passwords. (ex. pet’s name or kid’s name)

6. Always type the URL of the website in your browser’s address bar to
enter the login pages. For ex. To login to your Gmail account type
http://mail.google.com

7. Before you enter your password on any login page, ensure that you
see https instead of http. ex. https://mail.google.com instead of
http://mail.google.com. HTTPS protocol implements SSL (Secure Sockets
Layer) and provide better security than a normal HTTP.

8. Beware of phishing emails! Do not respond to any email that request
you to update your login details by clicking on a link in the body of
the email. Such links can lead to Fake Login Pages (Spoofed Pages).

9. Always hit the logout button to close your login session rather
than abruptly terminating the browser window. And clear your web
browser caches after every session to remove the temporary files
stored in the memory and hard disk of your PC.

10. Avoid (Stop) using any public computers or computers in the
Internet cafes to access any sensitive/confidential information. Also
avoid such computers to login to your email/bank accounts. You cannot
be sure if any spyware, keystroke-logger, password-sniffer and other
malicious programs have not been installed on such a PC.

By following the above 10 tips your online security can be guaranteed
upto 90%. I hope this will help my readers for keeping themselves safe
from any of the online insecurities. Cheers! Pass your Comments &
Suggestions at the Topic Which is Posted at the Group
www.groups.google.com/group/tsksoft

Beaware of Common Internet Scams and Frauds

The term Internet Scam or Internet Fraud refers to any type of fraud scheme that uses one or more online services to conduct fraudulent activities. Internet fraud can take place on computer programs such as chat rooms, e-mail, message boards, or Web sites. In this post I will discuss about some of the commonly conducted scams and frauds across the Internet.

1. Phishing Scam

This is one of the most commonly used scam to steal bank logins and other types of passwords on the Internet. Phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication. Phishing is typically carried out by e-mail or instant messaging.
Example:You may receive an email which claims to have come from your bank/financial institution/online service provider that asks you to click a link and update your account information. When you click such a link it will take you to a fake page which exactly resembles the original ones. Here you’ll be asked to enter your personal details such as username and password. Once you enter your personal details they will be stolen away. Such an email is more than likely the type of Internet scam known as “phishing”. Phishing is said to be highly effective and has proved to have more success rate since most of the common people fail to identify the scam.
Most legitimate companies never request any kind of personal/sensitive information via email. So it is highly recommended that you DO NOT respond to such fraudulent emails.

2. Nigerian Scams

This type of scam involves sending emails (spam) to people in bulk seeking their help to access large amount of money that is held up in a foreign bank account. This email claims that in return for the help you’ll be rewarded a percentage of the fund that involves in the transaction. Never respond to these emails since it’s none other than a scam.
In case if you respond to these emails you will be asked to deposit a small amount of money (say 1-2% of the whole fund) as an insurance or as an advance payment for the initialization of deal. However once you deposit the amount to the scammer’s account you’ll not get any further response from them and you lose your money. In fact “The large amount of money” never exists and the whole story is a trap for innocent people who are likely to become victims. The scammers use a variety of stories to explain why they need your help to access the funds. The following are some of the examples of them.
Examples:
  • They may claim that political climate or legal issues preclude them from accessing funds in a foreign bank account
  • They may claim that the person is a minor and hence needs your help to access the funds
  • They may claim that your last name is the same as that of the deceased person who owned the account and suggest that you act as the Next of Kin of this person in order to gain access to the funds

3. Lottery Scams

This type of scam is similar to the one discussed above. In this type you may receive an email saying that you have won a large sum of money in online lottery scheme (ex. UK Lottery) even though you have not participated in any such schemes. The message claims that your email ID was selected randomly from a lagre pool of IDs. When you respond to such emails they initially ask for your complete name and address so that they can mail the cheque accross to you. After getting those details they may also send you an image of the cheque drawn in your name and address so as to confirm the deal. But in order to mail this cheque they demand a small amount of money as insurance/shipping charge/tax in return. However if you send the amount in hope to receive the cheque all you get is nothing. You’re just trapped in a wonderful scam scheme. Thats it.

4. Other General Scams and Frauds

The following are some of the other types of scams that you should be aware of.
In general, be aware of unsolicited emails that:
  1. Promise you money, jobs or prizes
  2. Ask you to provide sensitive personal information
  3. Ask you to follow a link to a website and log on to an account.
  4. Propose lucrative business deals
However it may seem to be a difficult task for novice Internet users to identify such online scams. Here are some of the common signs of such scam emails. By knowing them it may help you to stay away.
  • All these scam emails never address you by your name. In turn they commonly address you something like “Dear User” or “Dear Customer” etc. This is a clear indication that the email is a fraudulent one
  • When you observe the email header you may notice in the “TO:” Field that, the same email is forwarded to a large group of people or the “TO:” field appears blank. So this confirms that the email was not intended particularly for you. It was forwarded for a large group of people and you are one among them
I hope this post helps. Express your opinions through Comments & Suggestions at the Topic which is posted at the Group www.groups.google.com/group/tsksoft