9 words women use!

1.) Fine : This is the word women use to end an argument when they are right and you need to shut up.

2.) Five Minutes : If she is getting dressed, this means a half an hour. Five minutes is only five minutes if you have just been given five more minutes to watch the game before helping around the house.

3.) Nothing : This is the calm before the storm. This means something, and you should be on your toes. Arguments that begin with nothing usually end in fine.

4.) Go Ahead : This is a dare, not permission. Don’t Do It!

5.) Loud Sigh : This is actually a word, but is a non-verbal statement often misunderstood by men. A loud sigh means she thinks you are an idiot and wonders why she is wasting her time standing here and arguing with you about nothing. (Refer back to #3 for the meaning of nothing.)

6.) That’s Okay : This is one of the most dangerous statements a woman can make to a man. That’s okay means she wants to think long and hard before deciding how and when you will pay for your mistake.

7.) Thanks : A woman is thanking you, do not question, or Faint. Just say you’re welcome.

8.) Whatever : Is a woman’s way of saying F YOU!

9.) Don’t worry about it, I’ll do it: Another dangerous statement, meaning this is something that a woman has told a man to do several times, but is now doing it herself. This will later result in a man asking ‘What’s wrong?’ For the woman’s response refer to #3.Then you RUN!

Suggestions to Prevent ATM Robberies

5 ways to speed up your PC

By following a few simple guidelines, you can maintain your computer and keep it running smoothly. This article discusses how to use the tools available in Windows to more efficiently maintain your computer and safeguard your privacy when you’re online.

Free up disk space

By freeing disk space, you can improve the performance of your computer. The Disk Cleanup tool helps you free up space on your hard disk. The utility identifies files that you can safely delete, and then enables you to choose whether you want to delete some or all of the identified files.
Use Disk Cleanup to:

Remove temporary Internet files.
Remove downloaded program files (such as Microsoft ActiveX controls and Java applets).
Empty the Recycle Bin.
Remove Windows temporary files.
Remove optional Windows components that you don’t use.
Remove installed programs that you no longer use.

Tip: Typically, temporary Internet files take the most amount of space because the browser caches each page you visit for faster access later.

To use Disk Cleanup

1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Cleanup. If several drives are available, you might be prompted to specify which drive you want to clean.

Image of Disk Cleanup dialog box

2. In the Disk Cleanup for dialog box, scroll through the content of the Files to delete list.

Image of Disk Cleanup for dialog box

Choose the files that you want to delete.

3. Clear the check boxes for files that you don’t want to delete, and then click OK.
4. When prompted to confirm that you want to delete the specified files, click Yes.

After a few minutes, the process completes and the Disk Cleanup dialog box closes, leaving your computer cleaner and performing better.

Speed up access to data

Disk fragmentation slows the overall performance of your system. When files are fragmented, the computer must search the hard disk when the file is opened to piece it back together. The response time can be significantly longer.

Disk Defragmenter is a Windows utility that consolidates fragmented files and folders on your computer’s hard disk so that each occupies a single space on the disk. With your files stored neatly end-to-end, without fragmentation, reading and writing to the disk speeds up.

When to run Disk Defragmenter
In addition to running Disk Defragmenter at regular intervals—monthly is optimal—there are other times you should run it too, such as when:

You add a large number of files.
Your free disk space totals 15 percent or less.
You install new programs or a new version of Windows.

To use Disk Defragmenter:

1. Click Start, point to All Programs, point to Accessories, point to System Tools, and then click Disk Defragmenter.

Image of the Disk Defragmenter dialog box

Click Analyze to start the Disk Defragmenter.

2. In the Disk Defragmenter dialog box, click the drives that you want to defragment, and then click the Analyze button. After the disk is analyzed, a dialog box appears, letting you know whether you should defragment the analyzed drives.

Tip: You should analyze a volume before defragmenting it to get an estimate of how long the defragmentation process will take.

3. To defragment the selected drive or drives, click the Defragment button. Note: In Windows Vista, there is no graphical user interface to demonstrate the progress—but your hard drive is still being defragmented.

After the defragmentation is complete, Disk Defragmenter displays the results.

4. To display detailed information about the defragmented disk or partition, click View Report.
5. To close the View Report dialog box, click Close.
6. To close the Disk Defragmenter utility, click the Close button on the title bar of the window.

For more information on disk defragmentation, Link

Detect and repair disk errors

In addition to running Disk Cleanup and Disk Defragmenter to optimize the performance of your computer, you can check the integrity of the files stored on your hard disk by running the Error Checking utility.

As you use your hard drive, it can develop bad sectors. Bad sectors slow down hard disk performance and sometimes make data writing (such as file saving) difficult, or even impossible. The Error Checking utility scans the hard drive for bad sectors, and scans for file system errors to see whether certain files or folders are misplaced.

If you use your computer daily, you should run this utility once a week to help prevent data loss.

To run the Error Checking utility:

1. Close all open files.
2. Click Start, and then click My Computer.
3. In the My Computer window, right-click the hard disk you want to search for bad sectors, and then click Properties.
4. In the Properties dialog box, click the Tools tab.
5. Click the Check Now button.
6. In the Check Disk dialog box, select the Scan for and attempt recovery of bad sectors check box, and then click Start.

Image of Check Disk dialog box

7. If bad sectors are found, choose to fix them.

Tip: Only select the “Automatically fix file system errors” check box if you think that your disk contains bad sectors.

Protect your computer against virus and spyware

A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. The term “virus” is also commonly but erroneously used to refer to other types of malware, adware and spyware programs that do not have the reproductive ability. A true virus can only spread from one computer to another (in some form of executable code) when its host is taken to the target computer.

Spyware collects personal information without letting you know and without asking for permission. From the Web sites you visit to usernames and passwords, spyware can put you and your confidential information at risk. In addition to privacy concerns, spyware can hamper your computer’s performance.

To combat spyware, you might want to consider my personal recommendation ESET NOD32 Internet Security.  Alternatively, there are other free antivirus and anti-spyware software programs available.

Learn all about Tweaking

Download TuneUP Utilities to do all the above all in one place with a lot of other tweaking like Registry cleaning, registry defragmenting and alot more. You can also use CCleaner or TweakUI as a free alternative.

Threat Dictionary

Adware

Adware (advertising-supported software) is any software application which automatically plays, displays, or downloads advertising material to a user’s computer without users knowing it, or with their partial assistance. Typical features are pop-up windows or banners, persuasions to set web page as a home page, etc. Some adware enter the program with user’s permission, because in order to use the program, you have to accept presence of advertising materials.

Backdoor

Backdoor is a client-server type of application allowing remote access to a computer. The difference from common legitimate application with similar function is that the installation is done without user’s knowledge.

Boot sector

Boot sector viruses attack boot sector of a hard disc to make sure that they run every time the computer is started. It is relatively older group of viruses.

Dialer

Dialer is a program designed to redirect user’s telephone connection to the Internet to some premium rate number. These programs can be used legally when paying for Internet services, but fraudulent dialers are often used for redirecting without user knowing it.

File viruses

File viruses – use individual files as hosts. Generally, these are always executable files, because the aim of malicious code is its replication. Most frequent are viruses with “.COM“, “:EXE“, “.BAT“ or “.SYS“ extension.

HLL viruses

HLL (High Level Languages) are viruses created in high level programming languages as Pascal, C, C++, Delphi, Basic or Visual Basic. Common viruses are created in assembler, but HLL viruses are more massive and to analyze them is very complicated. The detection by heuristic analyses is almost impossible.

Hoax

Hoax (rumor) – There are many hoaxes sent via emails, spreading only thanks to human endeavor. The only way how to defend from hoaxes is heightened caution. Hoaxes are the most common with trustworthy companies ( “Microsoft warns…”, “CNN announced…”, etc.) They often inform about catastrophic consequences, e.g. devastating new viruses. What these messages have in common, is appeal for immediate forwarding to other users. This is how hoaxes are spread

Macroviruses

Microviruses – are Macros able to copy themselves from one document to another. So called macros are common parts of applications in office packages and they can positively enlarge their functionality. But they are programmable in common languages and thus can manipulate with application data, or modify other data in computer. Viruses especially written for specific application can be spread basically only on this application. Therefore the malicious code authors are searching generally spread applications. These conditions fulfill especially programs from Microsoft Office package, like Word or Excel.

Overwriting viruses

Overwriting viruses are the simplest forms of infection. The original code is deleted and substituted by new, malicious code. Upon execution of the infected file the virus is executed as well and it can try to replicate again.

Parasitic viruses

Parasitic viruses – they attach themselves to executable file as a host leaving the contents of the host program unchanged, but attaching to the host in such a way that the virus code is run first. When the file is infected, upon execution it runs the virus as well.

Phishing

Phishing is a form of criminal activity using techniques of so called social engineering. It is characterized by attempts to fraudulently acquire sensitive information, e.g. password, or credit card details, by masquerading as a trustworthy person or business in an apparently official email. Obtaining this type of personal data is very attractive because it allows an attacker to impersonate their victims and make fraudulent financial transactions.

Retroviruses

Retroviruses are malicious applications trying to disable, delete or deactivate antivirus systems.

Riskware

Riskware as a term includes all applications that upon execution comprise some security risk. Similar to spyware or adware installation, their installation can be approved in license agreement when installing the program. Dialers can be considered as a good example.

Rootkit

Rootkit is a special type of infiltration able to hide its “root” on the infected systemwithout system administrator even seeing it and thus escape detection. Usually it’s a malicious code package enabling attacker to exploit vulnerabilities in the system and gain full control over infected (rooted) computer. The most important thing with rootkits is the prevention – the ability to stop the infiltration proactively when trying to infiltrate into the system, before it is executed. After execution a rootkit is able to make itself “invisible” and thus exploited user gains false feeling of security.

Social engineering

Social engineering is a way of gaining personal information by deception. This method commonly uses telephones or the Internet, exploiting the gullibility by masquerading as a trustworthy business or institution.

Spyware

Spyware is a program using Internet to send various user’s data without his prior knowledge. Similarly to adware, accepting the license agreement can be a part of a free program. Spyware usually sends statistical data as information about installed programs, visited sites, etc. Acquired information is usually exploited for commercial gain.

Trojan horse

Trojan horse (sometimes called Trojan) is malicious program. Unlike viruses or worms, it is not able to replicate and infect files on its own. Most often it exists in a form of executable file with .EXE or .COM extension. Basically file itself doesn’t contain anything except malicious code. The most effective method of cleaning is very simple; deletion. Trojans can also pretend to be useful programs. This type of infiltration has various functions ranging from sending keyloggers to file deletion (e.g. to format a disc).It has also special function – installing of so called backdoor.

Virus

Virus is a program able to self-replicate. It spreads by inserting copies of itself into other executable files and ensures their execution. The name is derived from similarity to behavior of biological viruses. Virus can get to your computer mainly through usage of the Internet. Additionally, viruses can spread to other computers by infecting files on LAN or when copying from data medium like floppy disc, CD, DVD, etc. There are file viruses, thus individual malicious programs, boot viruses, which attack boot sector of a hard disc to make sure that they run every time the computer is started and macroviruses, which are most often a part of documents with .DOC and .XLS extension.

Viruses can be further divided into two types, on the basis of their behavior when they get executed. Whereas non-resident viruses are started upon execution of infected object, a resident virus loads itself into memory on execution and transfers control to the host program. The virus stays active in the background and infects new hosts when those files are accessed.

Worm

Worm is an independent self-replicating program spreading its copies via Internet or LAN. Traditional viruses are passive and cannot propagate themselves whereas worms can. A worm uses a network to send copies of itself to other systems, or on the lower level it uses vulnerabilities of the operation system. A worm is able to carry other malicious programs, which can perform various malicious activities, e.g. to install a backdoor in an infected computer. Even without this payload a worm is able to cause severe damage when enormously increasing the Internet traffic. As a matter of Internet expansion, a worm is able to be distributed worldwide within few hours. Side effects can be the complete congestion of network, including the businesses’ LANs.

Anti-Virus Tips

  • Do not open any files attached to an email from an unknown, suspicious or untrustworthy source.
  • Do not open any files attached to an email unless you know what it is, even if it appears to come from a friend or someone you know. Some viruses can replicate themselves and spread through email. Confirm that your contact really sent an attachment.
  • Do not open any files attached to an email if the subject line is questionable or unexpected.
  • Delete chain emails and junk email. Do not forward or reply to any to them. These types of email are considered spam – unsolicited, intrusive messages that clog up the inboxes and networks.
  • Do not download any files from strangers.
  • Exercise caution when downloading files from the Internet. Ensure that the source is a legitimate and reputable one. Verify that an anti-virus program checks the files on the download site.
  • Update your anti-virus software regularly. Install a good anti virus and keep it up to date.
  • Back up your files on a regular basis. If a virus destroys your files, at least you can replace them with your back-up copy. You should store your backup copy in a separate location from your work files, one that is preferably not on your computer.
  • When in doubt, always err on the side of caution and do not open, download, or execute any files or email attachments. Not executing is the more important of these caveats. Check with your product vendors for updates for your operating system, web browser, and email. One example is the security site section of Microsoft located at http://www.microsoft.com/security.
  • Removable Media. Do scan your removable media like USBs and CDs before accessing there files.
  • If you are in doubt about any potential virus-related situation you find yourself in, you may report a virus to our virus team.

Audit My PC

http://www.auditmypc.com

This site has it all. I recommend you to bookmark it

  1. Firewall Test
  2. Popup Test
  3. Anonymous Test
  4. What’s my IP
  5. Internet Speed Test
  6. Sitemap Generator
  7. Webmaster Tools
  8. HTML Encoder
  9. Keyboard Lessons
  10. Free Address Finder
  11. Free Software
  12. Internal IP
  13. Internet Hoaks
  14. Help Desk
  15. Tools For You Website
  16. Security Tips
  17. Intrusion Detection Tips
  18. Port Search
  19. Acronym Searrch

And Many More

Hack Linux root password

When booting the workstation, the bootloader GRUB allows you time for selecting your operating system. On that screen, follow the following steps:

1 – Highlight/select the distro (Red Hat Linux) using the arrow keys.

2 – Press ‘e’ to edit the boot parameters for the distro.

3 – You will see some entries like the following ones:

root (hd0,0)
kernel /vmlinuz-2.4.20-8 ro root=LABEL=/
initrd /initrd-2.4.20-8.img

3 – Highlight/select the line for the Kernel parameters. In the above example, it is the second line which is in bold. Press ‘e’ when you have selected it.

4 – Add ‘single at the end of the line. Don’t forget to put a space between the last character and ‘single’ or ‘1’. Example:

kernel /vmlinuz-2.4.20-8 ro root=LABEL=/ single

5 – Press ‘Enter’ or ‘Return’ key for saving the changes and then ‘b’ for booting.

6 – Once the system boots and you arrive at the command line interface, use the passwd command to change the root password as below:

passwd root

7 – Follow the instructions to enter new password twice.

8 – Once done, type ‘reboot’ or ‘exit’ to boot again. The new password you set will now work.

Moral : Always keep a password for GRUB