As you know what is virus and its functions. If you want to avoid download a file that may have virus attachment then do following steps: Step 1
Open run and type in run (gpedit.msc) without round braces it will open a local group policy now click on user configuration then click on administrative templates after this click on windows components after this double click on windows explorer. Step 2
Now double click on “Configure Outlook Express” in the right panel of local group policy. It will open a new window there are three options you will have to click on enable radio button and from options mark check box that say &ldquo
The website has been targeted by police in various countries - but still continues to operate An "underground" website famed for selling drugs and other illegal items has been targeted in a cyberattack. It appears the site suffered from a Distributed Denial of Service (DDoS) attack over the course of Tuesday and Wednesday. Silk Road is only accessible through Tor, a service which allows users to browse anonymously online. Several US politicians have called for the marketplace to be shut down, without success. DDoS attacks involve flooding a website with more traffic than it can handle, therefore knocking it offline. After two days of intermittent service, Silk Road'
If you’ve signed up for a broadband internet provider anytime in the recent past you’ll probably have received a wireless router as part of the package. In fact there’s a good chance you’ve gone through several providers and amassed a collection of routers over the years. Wi-Fi routers were once an expensive gadget but they’re now so commonplace that it’s not worth the effort to sell them and chucking out working electronics is wasteful. So what to do? Here are three ideas for useful things you can do with an old wireless router. Extend the range of your wireless network As useful as Wi-Fi can be there are factors beyond your control which can seve
Now I am not getting into the details why would one want to disable right click button on keyboard. or infact, why would want to disable any keyboard key? Well, I am not sure about that as I am not at all interested in the answer. I know a number of people who have asked me if there is a way to disable any specific keyboard button. So, I checked number of sites and came across few tools which would let you do this. The first tool which I was talking about is MapKeyboard. This is actually a free tool which lets you deactivate any button you want on your keyboard. What I have liked the most about this tool is that it is unbelievably easy to use and it is a portable utility, so it does no
Have you ever tried to track the location of email sender? Yes, it is like you receive an email and then you wish to find where exactly did this email come from. It isn’t any FBI level task to trace email sender. We would first find the IP address of the machine from which the email was sent, and then we would track that IP address. An indirect way, but an accurate one to find out what you are looking for. Steps To Track The Location Of Email Sender Find Email Sender’s IP Address On Gmail If you got an email on your Gmail account, then below are the steps to find of the sender’s IP address: On the right hand side where you have Reply button, you will a
WASHINGTON: A flaw in commonly used applications on Android smartphones such as texting, messaging or microblogging could spread private information or allow forged fraudulent messages to be posted, a recent study has revealed.
University of California graduate student Dennis (Liang) Xu has identified security flaws in about 1,20,000 free apps in Android smartphones, which has about a half-billion users worldwide.
The flaws start to appear just when the victim downloads a piece of malicious code onto their phone which could be hidden in a useful app, or attached to a 'phishing' e-mail or web link, that could harm the vulnerable programmes by invading the
This is definitely one of those articles which you would want to read once as you might find something really useful here. You must of heard of keylogger. Well, its a program which records your keyboard activities on your machine. It means, when you typing your email account passwords, bank pins and other confidential stuff like that, your keyboard strokes would be getting recorded at the backend. Oh yes, its as dangerous as it sounds. You can find many programs which can be installed manually in order to find characters that are being typed, and at the same time, such programs are also planted on your machine by hackers. If your machine is jacked by hackers, then it isn’t e
Yes, you read the title right. You can easily host website on Dropbox for free. Before we start with it, I would like you to check out some amazing ways to increase your Dropbox storage for free. Assuming you have not good enough storage space available on your Dropbox account, lets talk about website hosting now. Once you are done reading this, you would surprised to know how easy it is to get free hosting from Dropbox. Ya ya, its not that Dropbox is letting you host a website by the means of any tools, but we are trying to use the Dropbox in a way that it would basically host your web pages. How To Host Website On Dropbox For Free Before we switch to dro
Everybody love free stuff and Internet is one of the top listed items in this most loved list. And if you wish to find free WiFi hotspots, then continue reading this post. As someone smart has said, ‘its all around you, you just need to open your eyes and find it’. This thing goes quite well with finding free WiFi. Most of us are not actually bothered much about it, or say we do not really try finding it. Sometimes scanning for WiFi networks using your default WiFi app won’t do. In this post I would be sharing some of the most amazing and fruitful ways to find WiFi hotspots for free. 3 Best Ways To Find Free WiFi HotSpots 1.) Use WeFi Its not just about usi
This is one of those possibilities that every Internet user think of that if there is a way we can integrate multiple email accounts to one single account. No doubt, such a thing will help you manage all your emails at one stop. We would sharing a step by step guide which will let you combine multiple email accounts to one Gmail account. So, you need no log into your 5 different email IDs while you are checking your emails every day. All you need to is login to your Gmail account, and find all your emails getting diverted there. Steps To Combine Multiple Email Accounts To One Gmail Account The best part about this technique is that its not necessary for you to have all the Gma
Nothing is permanent in this cyber age. And Facebook is nothing different from any of these perishable things we have been talking about. So imagine you wake up one day and find that Facebook has been discontinued, then what about all your photos, videos and other Facebook data. Yes, we are talking about easy ways to backup Facebook photos and data. Using these ways you can easily backup Facebook data. With the increasing popularity of Facebook, it is quite right to say that this social network has become a vital part of your lives. And having your Facebook data backed up is not at all a bad thought. So check out the below methods, and see if any one work outs for you.
AOMEI Backupper is a free backup utility that backs up your entire system drive to ensure your data safety to not only data but the system that holds the data as well, with a simple and intuitive user interface that even your grandma can’t get lost. It’s a perfect solution for someone looking for a system-level of backup plan, whether for your home network or your small business environment. It supports both Windows client operation system as well as server platform like Server 2008 R2 and Server 2012. Both 32-bit and 64-bit editions are supported. The main Window has 4 tabs on the side, with each tab representing a single function of the program. The Home tab doe
When you are browsing the Internet, do you really know what information you are sharing? Most people don’t have a clue that everything they do online could be being tracked. This includes what websites you visit, what you are interested in, and even who you really are. Most people stay unaware of their own footprints on the Internet, and how online tracking is affecting their experience. By knowing more about your online footprint, you have a chance to enhance your own browsing experience. Governments around the world want to control the Internet down to its smallest fiber. What few people know is that we are already tracked in a way that makes our privacy quite obscured. We
Career in Human Resource Management | Course Details of Human Resource Management | Career Prospects for Human Resource Management Human resource management is taught as a part of the 2 year MBA curriculum at B-Schools across the country. Admission in MBA is generally held on the basis of a written test, group discussion and personal interview. Many colleges offer HR courses at the graduation level. Besides, there are executive MBA (HR) programmes offered by some institutes which require a minimum level of experience. Courses & Eligibility: Human resource management is taught as a part of the 2 year MBA curriculum at B-Schools across the country. Admission in M
Financial Management is the management of the finances of a business or an organization in order to achieve financial goals. Sound financial management is essential in all types of organizations whether it be profit or non-profit as it involves efficient use of the resources. A financial manager is required to ensure that sufficient funding is available to meet the needs of the business like investment in equipment and stocks, payment for employees and fund sales made on credit. In a country like India where resources are scarce and the demand for funds are many, the need of proper financial management is enormous. Courses & eligibility: Most of the universities off