Monday, February 24, 2014

How to install and start Turbo C++ on Windows 8 x32 / x64

1. Download and install : http://www.windows8downloads.com/win8-dosbox-auifqjbh/
2. Download the Turbo C++ files: http://www.windows8downloads.com/win8-turbo-c–edqfuffj/
3. Create a folder, for example „Turbo“ (c:\Turbo\)
4. Extract Turbo C++ into the Turbo folder (c:\Turbo\)
5. Run the DOSBox from the icon located on the desktop and type the following commands at the command prompt [Z]: mount d c:\Turbo\
Now you should get a message which says: Drive D is mounted as a local directory c:\Turbo\
6. Type d: to shift to Drive D 

7. To run the install type: install.exe   and press 2x Enter                                                                       

8. Enter the Source drive: D              and press Enter to continue            

9. Enter the Source path:  \              and press Enter to continue

10. In directories specify where Turbo C files are copied. E.g.  D:\TC . When done go to start installation and press Enter                                                                                                         

11. Successful installation – press any key to continue to view readme file       

12. Successful installation – to exit press [ESC] and close DOSBox. Installation of Turbo C++ is done

Start TurboC++ in the DOSBox automatically:

1. For DOSBox versions older than 0.73 browse into program installation folder and open the “dosbox.conf” file in any text editor. For version 0.74 go to Metro (press key [WIN]) and click on “DOSBox 0.74 options“.

2. Scroll down to the very end, and add the lines in the picture, save, close and run DOSBox now.
               
3. Automatically mount and start Turbo C++3.0 in DOSBox


Please note:
Full screen: press [Alt] + [Enter]
When you exit from the DOSBox [precisely when you unmount the virtual drive where Turbo C++ 3.0 has been mounted] all the files you have saved or made changes in Turbo C++ 3.0 will be copied into the source directory (the directory which contains TC folder)
Don’t use shortcut keys to perform operations in TC because they might be a shortcut key for DOSBox also. E.g. [Ctrl]+[F9] will exit DOSBOX rather running the code.

How to use [Ctrl]+[F9] (“Run”) without closing down DOSBox
1. press [ctrl]+[F1] while running Turbo C++ to view/change the mapper commands.
2. click on “ShutDown”,
3. then (click) on “del”,
4. then (click) “add”
5. and then press “q” on your keyboard. Then click “mod1″ in the lower left corner to close DOSBox with [ctrl]+[q]
6. click on “save”

Now you can use [ctrl]+[F9] in Turbo C++ as usual and [crtl]+[q] to close DOSBox.

You can do the same with [ctrl]+[F1] (for topic search) by clicking on “mapper” and changing the command as described above.

To reset the mapping, just run the “Reset KeyMapper”-file in the DOSBox folder.

Friday, January 3, 2014

How to modify or remove your online presence

How to modify or remove your online presence
=============================

At www. accountkiller.com, you can get to-the-point instructions on how to remove your account and/or public profile from many popular websites, blogs and networks.

It's all listed alphabetically but you can also search for the ones you want. In most cases, they also provide a direct link that provides more info on account deletion or a simple 'Delete Account' button. Everything is free and you don't need to sign up with account killer either.

Thursday, November 14, 2013

Is Linux Operating System Virus Free?

To be true, No! No OS on this earth can be ever be 100% immune to Viruses and Malware. But still Linux never had a widespread malware-infection as compared to Windows. Why? Let us find the reason behind this.

Some people believes that Linux still has a minimal usages share, and a Malware is aimed for mass destruction. No programmer will give his valuable time, to code day and night for such group and hence Linux is known to have little or no viruses. Had it been true, Linux should be the primary target of Malware infection because more than 90% of high end server runs on Linux today.

Destroying or Infecting one server means collapse of thousands of computer and then Linux would have been the soft target of hackers. So certainly usages share ratio is not in consideration for the above said fact.

Linux is architecturally strong and hence very much immune (not totally) to security threats. Linux is Kernel and GNU/Linux is the OS. There are hundreds of distributions of Linux. At Kernel Level they all are more or less the same but not at the OS Level.

Now suppose a malicious script is written for a RPM based system i.e., RedHat, Fedora, CentOs, it can’t infect a Debian based system and a destructive script written for Debian based OS can’t infect a RPM based System. Moreover a script that is going to perform a system-wide change needs root password.

If root password is confidential and strong enough, the OS is literally secure. Now a windows virus can not contaminate a Linux until Wine is installed and run as root. Hence it is suggested not to run wine as root.

You can not set a Linux System without setting up root password and user password. It means every user in a Linux System must have a password except ‘Guest‘. Where as Windows allow you to set user and even root account without password. A user can not run a program be it install/uninstall without permission provided (sudo) or root password.

But this is not the case with Windows, All windows program can be installed or uninstalled without the consent of root (Administrator). Could you run windows without GUI ? NO! But you can certainly run a Linux without GUI and it remains as much productive as it is with GUI. Actually most of the System Administrator disable GUI as a security concern.

Linux is so much secure in architecture that you even don’t need to go behind a firewall until you are on Network. The access control Security Policy in Linux that is called Security-Enhanced Linux (SELinux) is a set of Kernel modification and user-space tools which implement security policies in a Linux system. Even SELinux is not must for normal users however it is important for users on network and Administrators.

An Open Source Antivirus ‘Clam AV‘ is available for free download and you should install it, if your machine is on Network for comparatively more protection.

Download ClamAV from here: http://www.clamav.net/

Apart from these You can encrypt you disk, use a boot loader password, define and implement a custom boot, custom user roles, etc., makes Linux very much secure. However there are certain threats to Linux System and we will be discussing those here.

The known Linux threats like Viruses, Trojans, Worms and Malware of other kind counts up to 422 in 2005 which gets more than doubled in the recent year with the current count of 863, as reported which is seen as a sign of increasing popularity of Linux as claimed by technical experts.
Some Know Linux Threats

>>Virues
>>Tron horses
>>Local Scripts
>>Web Scripts
>>Worms
>>Targeted Attacks
>>Rootkits, etc.

These days a new trend of cross platform viruses is getting common. Some of the measures one should implement, for Linux System protection:

>>Protect bootloader
>>Encrypt Disk
>>check rootkits on regular basis
>>Protect Root with strong Password
>>Provide correct permission to files
>>provide proper roles to users
>>Implement SELinux
>>Use Antivirus
>>Go behind a Firewall
>>Don’t keep un-necesarry packages and programs (It may result into security Flaw).

Using Linux sensibly is secure enough. Now the question arises if Linux is architecturally so much secure then Android which uses modified Linux Kernel for mobile devices has so much security flaws, Why?

Well Android is developed in Java Programming Language and Java itself is known to have a number of security flaws. Moreover Android is very much in its child stage and will take some time to get matured.


mail.com- Choose your favorite Domain

mail.com offers you a unique and professional email service. Personalize your address by choosing from over 200 domains. Free sign up here:

http://www.mail.com/in-en/

http://service.mail.com/registration.html
Express who you are or what you like. With its innovative webmail system, mail.com provides solutions for personal users, as well as small- and medium-sized businesses. As a web-based provider, mail.com is accessible from any computer providing an internet connection.

Its fresh features and convenience rival those of traditional client-based software which require computer installation.


The Value of a Hacked Email Account


Wednesday, October 16, 2013

Some Important Portals & their Founders

1. Google— Larry Page & Sergey Brin
2. Facebook— Mark Zuckerberg
3. Yahoo— David Filo & Jerry Yang
4. Twitter— Jack Dorsey & Dick Costolo
5. Internet— Tim Berners Lee
6. Linkdin— Reid Hoffman, Allen Blue& Koonstantin Guericke
7. Email— Shiva Ayyadurai
8. Gtalk— Richard Wah kan
9. Whats up— Laurel Kirtz
10. Hotmail— Sabeer Bhatia
11. Orkut— Buyukkokten
12. Wikipedia— Jimmy Wales
13. You tube— Steve Chen, Chad Hurley & JawedKarim
14. Rediffmail— Ajit Balakrishnan
15. Nimbuzz— Martin Smink & Evert Jaap Lugt
16. Myspace— Chris Dewolfe & Tom Anderson
17. Ibibo— Ashish Kashyap
18. OLX— Alec Oxenford & Fabrice Grinda
19. Skype— Niklas Zennstrom,Janus Friis & Reid  Hoffman
20. Opera— Jon Stephenson von Tetzchner & Geir lvarsoy
21. Mozilla Firefox— Dave Hyatt & Blake Ross
22. Blogger— Evan Willams


A complete tutorial about IP Address


Let us begin with IP Addresses.
What is an IP Address?
► An Internet Protocol address is a numerical label assigned to each device (e.g., computer, mobile phone)
that is connected to a computer network that uses the Internet Protocol for communication.
► An IP address is used for two purposes:
1) To identify whether the interface is host or network.
2) To determine the location of the device.
► IP Versions: IPv4 and IPv6.
Although IPv4 is the earlier version, it is the most commonly used version.
► IPv4 is a 32-bit decimal number while IPv6 is 128-bit number.
► IPv4 is normally written as fournumbers between 1 and 255, each separated from the other by a decimal point.
This standard is called as DOTTED-DECIMAL NOTATION.
► Ex: 115.241.40.93
► There are countless IP addresses in today's world!
-------------------------------------------------------------------------
What is the purpose of IP Address Classes?
Each IP Address Class provides the following information:
► Class A: First 8 bits → NETWORK ID & remaining 24 bits → HOST ID
► Class B: First 16 bits → NETWORK ID & remaining 16 bits → HOST ID
► Class C: First 24 bits → NETWORK ID & remaining 8 bits → HOST ID
► Class D: It represents a 32-bit multicast group ID.
► Class E: It is currently not being used. (NO need)
► For example, Let us consider the IP Address 203.43.21.12
We know that it belongs to Class C.Therefore, the NETWORK ID is 203.43.21 and the HOST ID is 12.
 

Monday, September 23, 2013

What Is A Google Dork? How Google Exposes Your Private Info


I have written an article meant for webmasters, so they can protect users from this privacy breach.

Almost every website you visit has a private “virtual notebook”, also known as a database stores everything you do on that website. If you give the site your credit card number or social security number, it is kept in their “virtual notebook”. You leave the site, believing that no one except you can get your information. Unfortunately, the entire world can get any information you’ve entered on almost any website, if your site doesnt hide private information from Google Search. Google Search indexes everything that is made public including “virtual notebooks” and the information stored within that notebook in their search results. If you’ve given a site your credit card number or social security number, then there is a very high chance that site isn’t secure and has that information open to the public then Google will automatically add the info to Google Search.

This information is very easy for anyone to find, especially for cyber-criminals because Google has made it so anyone can do a Google search with the words filetype: and then the extension for “virtual notebooks”.
 
 

Photo: What Is A Google Dork? How Google Exposes Your Private Info
=========================================

I have written an article meant for webmasters, so they can protect users from this privacy breach.

Almost every website you visit has a private “virtual notebook”, also known as a database  stores everything you do on that website. If you give the site your credit card number or social security number, it is kept in their “virtual notebook”.  You leave the site, believing that no one except you can get your information. Unfortunately, the entire world can get any information you’ve entered on almost any website, if your site doesnt hide private information from Google Search. Google Search indexes everything that is made public including “virtual notebooks” and the  information stored within that notebook in their search results. If you’ve given a site your credit card number or social security number, then there is a very high chance that site isn’t secure and has that information open to the public then Google will automatically add the info to Google Search.

This information is very easy for anyone to find, especially for cyber-criminals because Google has made it so  anyone can do a Google search with the words filetype: and then the extension for “virtual notebooks”.