Windows Password Myth - Tips To Secure Your Password

Windows Password Myth - Tips To Secure Your Password

This is a guest post by Claudia Somerfield.

With the virtual world threatening to envelope the real world in terms of impact and the host of activities that happens online, security assumes paramount importance. Creating and using passwords is an integral part of this security. With the goal of helping the users create better, easy-to-remember and tough-to-crack passwords, we go on a myth-busting spree. Here are 9 myths laid bare before you.

1. 14 characters form the optimal password Length: LanManagers (LMs) used two separate 7-character hashes for passwords which made them very susceptible to brute-force attacks. For instance, a 10 character password could be cracked by easily by breaking it into a 7-character and a 3-character has which could be processed simultaneously by the hacker.Today, things have changed - a lot at that. Windows 2000 onwards, it is possible to store passwords that are up to 127 characters long. Actually, when a password is more than 15 characters long, Windows stores a constant, AAD3B435B51404EEAAD3B435B51404EE, as the LM hash, which is equivalent to a null password. It then becomes almost impossible to crack the password. So, go on and get longer and stronger passwords.

2. Passwords give an insight into your personality: It is often construed that obsessive people who lack imagination would generate a password with their lover's name. So also, an unimaginative, career-obsessed person would choose a work-related password, an extra-logical and humorless person would choose a numerical password, a fantasist would use own name or words like 'sexy' and 'stud' and so on. This better not be true for, if it is, it will only make the hackers work that easier because any intelligent hacker starts by working on related terms.

3. It is best to use passwords created by Random Password Generators: Random password generators create very complex passwords. These are very tough for the maker to remember. For instance, try remembering '4rfgo*ql9p'. On the other hand, as far as cracking the password is concerned, it is as easy or tough as any other password of similar length. For instance, '4race*car4' is equivalent to '4rfgo*ql9p' for a hacker but is much easier to remember for the user. Complexity may be useful in a classroom, but in the real world password length is much better than complexity for security.

4. Any password can eventually be cracked: Theoretically this is true. Practically, it is definitely not - unless the Federal Government loans the hacker their impressive computing powers! Unless it is something vital like a nuclear installation, hackers will usually give up after a few minutes of effort. There is no need to get paranoid about no password being secure for the 'eventually' can take a lifetime!

5. Use ALT+ 'number' for the strongest possible password: For those that are unaware, here is something interesting. Holding down the 'ALT' key and typing any character's ASCII value on the numeric keypad creates a hitherto unavailable character. For example, the sequence ALT-020 creates 'ú'. But again, this is difficult for the creator to remember and it also involves holding down the 'ALT' key which hints anyone watching nearby.It is also more time-consuming. Better would be to increase the password by the same number of keystrokes! One trick that can however be used is ALT+ 0160 which creates a 'non-breaking' space which can fool a hacker.

6. Passwords cannot have spaces: Another absolute misnomer! Maybe it arose from the different forms which advise you not to leave any blank space between characters. From Windows 2000 onwards, 'space' is a legit character. Since space is used between words, it automatically encourages users to create a complex password with multiple words that is also easy to remember.

7. It is safer to store passwords in software utilities rather than writing it down: What guarantee is there that the software utility itself will not be cracked open? It would then be like locking all the rooms of a home and handing over the master key to the thief. Writing it down on paper is better because it would require the 'thief' to be physically present at the place where the paper is stored.Where it is critical, it would be a good practice to note the password on paper and store the same in a safe or locker.

8. Passwords must be changed regularly (once a month): This is one of the most irritating and self-defeating myths. Constant changing of passwords forces one to come up with passwords that are easy to remember. Multiple passwords can lead to the creation of a new password which is much weaker than the original.It would be advisable to have good password-creation measures and advice in place rather than the compulsory and regular changing of passwords.

9. Using Passfilt.dll is the best way to enforce strong passwords: Though it is a component to enforce 'complex' passwords, Passfilt.dll is likely to bug and irritate users who find their passwords getting rejected. Again, it would be a better idea to enthuse users into making longer passwords rather than complex ones.

About the author:

Claudia is a blogger by profession. She loves writing on luxury and technology. She recently read an article on most expensive computer that attracted her attention. These days she is busy in writing an article on best ipod dock.
Simple Yet Effective Security Tips Against Website Hackers

Simple Yet Effective Security Tips Against Website Hackers

This is a guest post by Chris Miller.

The internet is a very vast place with all kinds of people surfing it. With growing awareness for internet and web based services it is now the responsibility of website owners to protect their websites against any risk or security threat from anyone else. Further, the customer information, such as credit card details and other sensitive personal information etc should be properly protected.

Hack attempts are very common phenomena now and it has been noticed that around 90% of the hackers use the simplest technique for it, i.e. human negligence. However, it is the responsibility of every software development company offering software development services to create secure websites and educate the website owners about various strategies and methods that would help them in securing their website from hack attempts. We are going to offer some very simple yet effective security tips for website owners that will help them in protecting their websites against hackers without applying any advanced security measures.

Create Strong Passwords: While this may sound absurd but it is one of the most targeted area by hackers. They rely on the fact that most of the users are not really aware about the concept of strong passwords. A weak password is usually the weakest link in the chain and hackers try to exploit it. The first thing that you need to do is create a very strong password.

Some of the passwords and password making techniques that should never be used are:
  • Never use the name of your website or the domain name as the admin password.
  • Predictable and simplest combinations such as admin123, abc123, QWERTY etc should be strongly avoided as hackers are definitely going to try them as the first thing.
  • The username and the password should never be similar or have slight variations. This may sound foolish but many users keep their username and passwords same or very similar. For example, admin/admin123, George/george11 etc.
  • Words such as password, secret, admin, go, start, begin etc are also in hackers top list.
  • Also, avoid using words that are from dictionary as there are some programs that would match every word in the dictionary against a user name in order to find a password.
Your passwords should be at-least six characters long with a mixture of upper and lowercase letters combined with numbers and special characters. Further, make sure that you have unique passwords for each login and they are changed at-least once a month.

Do Not Save The Passwords: Avoid saving the passwords when you log into your site. The browsers save the password and hackers target them to fetch any file named saved passwords or similar words. They usually send out a Trojan that scans whole computer software for such files and sends them to the desired location.

Rename Your Admin Folder: Renaming the “admin” folder is another simple yet effective technique to save you website from hackers. Once you change the name of admin folder the hackers won’t even have a clue to reach your admin panel. However, the new name of the folder should not be containing dictionary words or the site name. Further, try to include number and special characters to make the name tougher to guess.

These are some of the simplest tricks to enhance the security of your website without requiring much technical help or expertise. However, website owners should include third party softwares and solutions to make the website secure.

About the author:

Chris Miller is a blogger cum developer @ Xicom Technologies. Xicom a leading CMMI Level-3 Web development company offerings Custom php development offshore web development, web development outsourcing services from a leading offshore web development company.

Top Tech Gadgets For 2012

This is a guest post by Tyler.

Each year brings a new onslaught of technical gadgets meant to appeal to our need to play with all things electronic. This year is no different. In 2012, the tablet computers will be sweeter, the laptops thinner and the phones are going to get even smarter. Apple, Samsung and Nintendo are all promising to make this a highly-charged year in the world of technology. Let’s take a closer look at five of the best-of-the-best gadgets that will hit the market in 2012.

iPad 3


iPad 3 is already making waves from a company known for creating some of the most innovative gadgets, Apple Inc. iPad 3 is the third generation of Apple’s tablet computer. The big news for iPad lovers in this third generation release is the retinal display. Computer screens are made up of pixels, or small dots of color that combine together to create an image. The more pixels the screen has the better the image. A high-definition screen has more pixels than a standard monitor. The iPad 3 display has four times as many pixels as its predecessor. This means added clarity for every image that appears on the iPad 3 regardless of format. The iPad 3 has a faster processor and more advanced hardware along with a display that is crisper than the other tablets available.

Nintendo Wii U


The news coming from Nintendo is this is the year we will see the newest in their line of game consoles. The Nintendo Wii U is their sixth offering of home gaming consoles. Features include high-definition graphics so games look even more realistic. One key change you can look for in the Wii U is the embedded touchscreen that allows you to keep playing a game directly on the console; no television required. The new generation of Wii will be backwards compatible with all the games and accessories of the previous versions. If you own a Wii Remote or any of the sensor features like the pad or board, they will work with Wii U.

Ultrabooks


Laptops have been getting thinner each year and 2012 will see some of the thinnest notebooks yet. Ultrabooks are not really a brand, but a concept that manufacturers can expand on in 2012. These thin, light laptops contain processors from Intel, but come from a variety of companies such as Acer and Dell. The goal is to compete with the lightweight tablets that are hitting the market. An Ultrabook is just as transportable as the tablets but without the hassle of the touchscreen. In 2012, you will see new laptops that follow this same style. Companies like Dell and Acer need to improve upon the laptops from Apple Inc. With the Ultrabooks, they can offer the same size and features as the MacBook Pro but at a lower cost.

Flexible Screens


Flexible screens are going to be all the rage this year. This is not so much a new gadget as a feature you can expect to see on new releases of old gadgets. Both Nokia and Samsung are promising that 2012 will be their year for the bendable, flexible screen. This may put an end to butt calling your friends when you stick your phone in your back pocket. That is just one advantage to the flex screen. Things you are used to doing with your fingertips on a standard touchscreen can be done with the flick a wrist instead. Flexible screens are going to make smartphones more maneuverable.

Accessories


Advances to the iPhone are going to have less to do with the hardware and more to do with the accessories. In 2012, there will be an upsurge of iPhone controlled toys. You can play ball with the Sphero or even fly a helicopter with your iPhone. Gamers will be looking for toys that they can remote control from their phones. This is the beginning of what will probably be a new trend. Over the years, that pile of remotes you have around the house for stereos and televisions may become antiques as smartphones become the new universal remote control.

Whether you are a gamer or just someone who loves electronic devices, 2012 may be your year. The challenge facing companies like Apple is to avoid consumer boredom. Every year they produce a new mouse trap that is faster and more innovative than the last. This year promises to see some of the coolest offerings from the world technology yet.

Asus Gadget 2012

About the author:

Tyler is a tech enthusiast and enjoys writing. He is a professional writer and marketer for SatelliteInternet.com
How To Protect The Information On Your Mobile Phone?

How To Protect The Information On Your Mobile Phone?

This is a guest post by Karen Schweitzer.

Long gone are the days when mobile phones were used for one purpose only--talking to other people. Nowadays mobile phones and smart phones are used in a number of ways. From talking and texting to event planning and internet browsing, mobile phones are used by many to help manage their busy lives. Because they're used for so many things, it's important to protect all of the information that mobile phones store. If your phone were to fall into the wrong hands, your privacy and personal identity could be greatly compromised. If you haven't already taken some precautions to safeguard the information on your mobile phone, here is what you need to do to insure that it's protected once and for all.

Use a Passcode Lock


One of the simplest ways to prevent someone from accessing the information on your phone is to use the passcode lock function on it to keep it under lock and key when you're not using it. If you use this function, you will need to choose a passcode. A passcode is usually a four digit number that you'll be required to key in anytime you go to use your phone. Passcodes typically lock the phone after a short period of time that the phone has been idle. When you select a passcode, don't use dates that are significant to you and by all means don't use the same numeral digit four times. If you lose your phone or someone steals it, you don’t want your passcode to be an easy one to decipher.

Log Out


If your mobile phone is a "smart" phone, always log out of your email or any internet sites that require you to sign in to use them. Although smart phones allow you to stay connected to email, social networks, and other sites you frequent for the sake of convenience, staying logged in puts your personal information at great risk for being stolen. Anyone that obtains possession of your phone will be able to view your email as well as any other sites that you're constantly connected or signed into.

Pick Complicated Passwords


Smart phone users that access email, bank account information, online auctions, or any other site that they need a password to sign into via their phone should always use passwords that are difficult to crack. When choosing a password, use a combination of letters and numbers that have no personal meaning to you, and never use the same password twice.

Stick with Apps You Trust


Let's face it--when it comes to apps, there is an endless sea of them to choose from. Because there are so many cool ones out there, it can be tempting to download way more than you will ever have time to use. Choose apps wisely, and try to stick to the ones you know you can trust. Read up on them before you install them, and find out what other users have to say about them by checking out customer reviews. If an app that you download contains a lot of pop-ups, prompts, or links for you to click on, delete the app from your phone. If something seems suspicious it probably is, so trust your instincts and select only the apps that you know are tried and true.

Use Caution When You Switch Phones


When it comes time to upgrade to a new phone, discard your old one with caution. Whether you decide to sell, donate, or toss your old phone, wipe it clean first. If your phone has a SIM card, remove it before parting with your mobile phone. If you don't need or want the SIM card anymore, don't give it away--not even to someone you know. Also, you should always return a mobile phone to its factory condition before you get rid of it. You can find out how to do this by looking up the instructions in the user manual that came with it, or by locating step-by-step directions online either on the manufacturer's website or on a helpful forum.

Protecting the information on your mobile phone isn’t just something you should do--it's something you must do. Crimes like identity theft are on the rise due largely to the fact that more people use mobile phones and smart phones. By following these simple yet highly effective tips, you can keep the information that's stored on your phone safe and sound.

About the author:

Guest post from Karen Schweitzer. Karen writes about internet providers for Internetserviceproviders.org.

Innobuzz - Be Certified Information Security Expert Level 1 v 2.0

Innobuzz
Hi everyone! From last couple of days, was busy due to exams. So today I’m back with a new approach. Hacking is illegal for general people, but for me it’s a passion. The reason it is illegal for mostly because they don’t know its exact meaning. Hacking simply means to become perfect in anything. It does not matter what you hack, matters what you acquired from it and keeping in mind that it should be ethical. Well today I come up with a new approach; most of friends have asked about from where to start hacking or what kind of knowledge you need for a start. From my viewpoint, you must have only good knowledge about general computer and internet activities else you would learn by own and in hacking you always have to keep learning.

Mostly people don’t know from where to learn hacking and they always ask “Which is the good organization?” So for my readers, I’m going to tell about an organization named “Innobuzz Knowledge Solutions” that provides a platform for newbie from where they can start learning ethical hacking. Innobuzz is the leading Ethical Hacking Indian Company which has been providing training and knowledge based solutions. The main activity of Innobuzz is providing training on Information Security, which is delivered to its audience all over the world via Computer Based Training Programs, Onsite Training Programs and Company Owned learning centers and the reason why it’s better because it provides a platform from where even a newbie can start learning the core concept of hacking in details and can represent him/her as professional hacker.

Demand of ethical hackers is increasingly rapidly worldwide, so Innobuzz is a platform for you all to come ahead and representing the IT world.

Coming to the course details, after completing the course you will acquire CISE (Certified Information Security Expert) Level 1 v 2.0 certification. CISE is one of the most recognized International certification in Information Security and Ethical Hacking. Course consists of 40 hours duration and it requires only general computer and internet knowledge as I mentioned above for a start in hacking field. You can read more about the course details from here or download CISEv2 Training Brochure from here which includes Training module, company profile and some basic requirements for joining the course.

List of Course Content:
  1. Introduction Chapter
  2. Networking & Basics Chapter
  3. Footprinting Chapter
  4. Google Hacking
  5. Scanning
  6. Windows Hacking
  7. Linux Hacking Chapter
  8. Trojans & Backdoors Chapter
  9. Virus & Worms Chapter
  10. Proxy Server & Packet Filtering Chapter
  11. Denial of Service Chapter
  12. Sniffer Chapter
  13. Social Engineering Chapter
  14. Physical Security Chapter
  15. Steganography Chapter
  16. Cryptography Chapter
  17. Wireless Hacking
  18. Firewall & Honeypots
  19. IDS & IPS Chapter
  20. Vulnerability Assessment Chapter
  21. Penetration Testing Chapter
  22. Session Hijacking Chapter
  23. Hacking Web Servers Chapter
  24. SQL Injection Chapter
  25. Cross Site Scripting Chapter
  26. Exploit Writing Chapter
  27. Buffer Overflow Chapter
  28. Reverse Engineering Chapter
  29. Email Hacking Chapter
  30. Incident Handling & Response Chapter
  31. Bluetooth Hacking Chapter
  32. Mobile Phone Hacking
Read This So You Don't Get Hacked

Read This So You Don't Get Hacked

This is a guest post by Allison Brenner.

Computer usage, and more specifically the internet, has become an integral part of our daily lives. We use it to connect to others, discover new information, handle monetary transactions, keep up to date on the latest media, and so much more. It is also no surprise that because we are so entwined with this technology that those who have less than noble actions are using this worldwide connection to perform dishonest acts.Hacking, spamming, and phishing are all ways in which people find their way into uncovering personal information about other people. By creating their own spyware, they grant themselves permission to access other people’s information. Thankfully, there are ways you can prevent your information from falling into the hands of the hackers.

Choose Your Password Carefully


Passwords are typically our number one choice of a defense tactic, which is why hackers try so hard to crack them. Unfortunately, people end up being less than creative when it comes to selecting theirs. When selecting your password, try not to use your name or the names of anyone close to you. Those are easiest for someone to guess. Also, don’t choose numbers or letters that form a predictable pattern. “QWERTY” and “1QAZ2WSX” are easy to guess. Instead, select a combination of numbers and letters (alternate capital and lowercase) so it becomes harder to guess. Frequently changing your password also enhances your safety.

Update Your Protection System


Keeping your firewall up to date is the first line of defense against letting in Trojan viruses, worms, spyware, and malaware. By constantly ensuring this protection is in place, you are taking precautions to ensure your computer is not compromised in any way. Another way to make sure your computer stays safe: clean out your cookies. While cookies themselves are not harmful, they do keep a record of your most visited sited and can store passwords and other identifying information on them.

If It Looks Suspicious – It Is


If someone posts something on your Facebook that seems out of character for them, don’t open it. Same goes for e-mails and other forms of communication. Also, be mindful of when and where a site asks for a change in your password or to write in your credit card number. If it seems suspicious and doesn’t sit well with you, chances are your gut is right. More than likely it’s someone fishing for your personal information.If you’re careful and cautious, you will find yourself protected and safe. If not, you’ll have a lot of explaining to do as to why your e-mail sent out an advertisement for male enhancement pills – or worse. Just follow your gut and be smart and you can prevent being hacked.

About the author:

Allison Brenner is a copywriter for an online career school. Visit our website to learn more about computer hacking careers.
5 Security Plugins For Your WordPress Blog

5 Security Plugins For Your WordPress Blog

This is a guest post by Arsh Kapoor.

WordPress is the most well-known running a blog service these days. It’s being used by many people all over the world. But because of the reputation, it’s getting more interest by online criminals and spammers too. WordPress is very protected by itself, but there can be never too much ascertainable.

For simple customers, who never value a lot, plug-ins is the best way to protected your site. They are free,
quickly useful and secure. This publish puts together 35 best plug-ins to make your site perfect. They are each created for different requirements, so you will get the best security from each area.

The following are the plug-ins I discovered that can create WordPress more protected:

1) Limit Login Attempts: This tool prevents a person for 20 moments after he goes into wrong password 4 times (default principles, can be changed). It is good way to prevent Incredible Power strike.

2) Stealth Login: his tool allows you to make customized URLs for signing in, signing out, management and applying for your WordPress web page. Instead of marketing your sign in URL on your web page, you can make a URL of your option that can be simpler to keep in mind than wp-login.php, for example you could set your sign in URL to WebRetina Login for an simple way to sign in to your web page.

3) Chap Secure Login: Whenever you try to sign in into your web page, you can use this tool to give your code encoded. The encrypted sheild procedure is done by the Guy method. By initiating the Guy Protected Login tool, the only details given unencrypted is the login name, code is invisible with a unique number (nonce) produced by the procedure – and opportunely modified by the MD5 formula. In the first sign in there will be one, but do not fear is only a specialized mistake. Indeed in the next login’s function, if the are appropriate, there will not be mistakes.

4) Sabre: If you own a WordPress operated website where customers can sign-up easily and see a lot of bogus users, this tool can stop bogus person signing up by crawlers. It can add picture confirmation or numbers analyze to signing up process among other actions to make sure bogus customers are not designed.

5) Secure WordPress: This tool keeps your WordPress set up protected with the help of little features. It conceals information regarding your WordPress edition from non-administrators and tool listing from guests by losing a empty catalog.php computer file.

About the author:

This blog post has been written by Arsh Kapoor who is a technology lover and loves to blog on latest technology on its technical blog Check out his latest posts on cloud computing (Free cloud computing services).

Two Best Ever Platforms For Guest Bloggers And Blog Owners

Guest Posting
Guest posting is the new trend for bloggers nowadays and the key motto of guest posting is genuine backlinks. 3-4 months ago, guest posting was unheard name for me but now I'm solemn towards it. Till now I've published 42 guest posts on my site from different authors, you can check all of them from here and the whole credit goes to Blogger Linkup and MyBlogGuest.

Both websites provide platforms for guest bloggers and blog owners, from where any blog owner can request for available guest posts or guest blogger can offer his guest post, but these both work on different concept.

1. Blogger Linkup is a free service from where bloggers can submit request for:
  • Offering guest posts.
  • Requesting guest posts.
Join Blogger Linkup list for receiving alerts on every monday, wednesday and friday. List contains needed guest posts, available guest posts, products for review/giveaway, contests and sources for interviews. Check out its official site from here.

2. MyBlogGuest provides community for all guest bloggers. it works on the concept:
  • The blog owner writes an article and shows it to the blogger.
  • The blogger decides if the article fits his blog and if yes, publishes it on the site.
Sign Up now and be a part of professional blogger community. Check out its official site from here.

Note: Apart from these, make a section on your blog/site about guest posting (like check out my site's section from here). Guest posting helps in growing network and driving more traffic to your site. So start building your network and site backlinks now.

My Inspiration Of Entire Life "Rahul Dravid - The Wall Of India" Left Cricket

Rahul Dravid
Celebrating after Adelaide win (2003)
Remembering the time when he played 145 knock against Srilanka in 1999 WC, 233 (a marathon inning of approx. 10 hours) and 72* in Adelaide 2003 against Australia which helped India to seal their first victory after 20 years in Australia, made a historical partnership with Very Very Special Laxman in 2001 against Australia, and the time when his wicket remained mystery for the whole world.

Yesterday I shocked after knowing his retirement from the cricket. It made me sad and to the whole cricket world. End of his career means end of cricket's one era. No one in the world can replace him and it's almost impossible to occupy his no. 3 batting place in cricket. Without his presence, test cricket would remain incomplete forever, especially no. 3 batting position.

Rahul Dravid
Good Bye!
He's my inspiration of entire life! What I acquired in my nature just because of him who always remained cool in his entire career, I often call him by name "touch". His words "I like to play under pressure", inspire me always.

What's best in him is patience and dedication towards cricket. He's more than a best technical batsman in the cricket! A former captain, wicketkeeper, best sleep fielder, who could play at any position, a gentleman, dependable person and a great human being.

If Sachin Tendulkar had not been born in India, then Rahul Dravid could be the most famous in India. As I think, "To be a part of world up winning team" was only his unfulfilled dream and I missed him in the whole world cup. Still no one could justify with his number 3 batting position in ODI too.

Rahul Dravid
It could be great if he had announced his retirement to before of one last match, but here's not any test match for team India in coming months and he knew well when to retire.

It's only my tribute to him on his retirement else what this legend player is for me I can't express in words! You're the true legend. My wish is to meet him once in life and I know I would succeed in it! Cricket world would definitely miss his services what he has given to it.

Wish him a successful life ahead and you would always remain my idol. Without your appearance,  no more test cricket and after Sachin's retirement it would be full stop on the cricket.

Good bye!
How To Create Secondary Site Map For Blogger (Table Of Contents)?

How To Create Secondary Site Map For Blogger (Table Of Contents)?

Hello bloggers! Before continue, thanks to Abu Farhan for sharing wonderful wonderful javascript. All you must have heard about site map and what it does. Let me clear in brief what is site map? Site Map represents  the hierarchical structure of your blog posts (like table of contents) and make it accessible to crawlers to index your blog/site properly. It allows the users to navigate through the blog/site to find the information they are looking for and for more information click here.

Note: Well in blogger, you don't need to create any site map as Google generates it by own for your blog. You can find out your primary blog's site map here: BLOGURL/feeds/posts/default?orderby=updated. Secondary site map is only for your users not for crawlers.

In this post, I am going to tell about creating a secondary site map for your blog like table of contents from where users can easily navigate through your blog.

For e.g check out my site's secondary site map: http://www.basicsofhacking.com/p/site-map-of-basicsofhackingcom.html

Follow these simple steps:
  • Add the following HTML code in your blog where you want to display it:

    <script style="text/javascript" src="http://www.abu-farhan.com/script/daftarisiblogger/blogtoc-min.js"></script>
    <script src="http://www.basicsofhacking.com/feeds/posts/default?max-results=9999&amp;alt=json-in-script&amp;callback=loadtoc"></script>


    Replace "http://www.basicsofhacking.com" with your blog URL.
  • That's all.
Note: I recommend add it on menu bar of your blog, for adding it on menu bar: create a static page, paste the above script in content area, publish it, then link created page to menu bar.

Ping.fm - Publish Your Site Post On Multiple Social Networks Simultaneously

Ping Logo
Your post remains worthless until you post it on major social networks like Faceook, Twitter, Yahoo, LinkedIn, MySpace, Delicious. And for updating it on multiple social networks, consumes a lot of time (like logged in on every account once). So in this post, I'm gonna tell you about a site "Ping.fm" which publish your post to all major social networks simultaneously. I'm using this service from more than 3 months and it's worth time saver.

Ping.fm is a simple and free web service that enables users to post to multiple social networks simultaneously. Making an update on Ping.fm pushes the update to a number of different social websites at once. This allows individuals using multiple social networks to update their status only once, without having to update it in all their social media individually.
Note: Ping.fm automatically convert your long URL to short URL like above posted would be posted as "A Guide To Google Hacking Techniques: http://ping.fm/gBUTr ". Give it a try and definitely it would save a lot of time.
How To Remove Default Footer In Blogger And Adding Your Own Customize Footer?

How To Remove Default Footer In Blogger And Adding Your Own Customize Footer?

It's so easy to make a blog in blogger, but in reality it's very hard to make an effective and user friendly blog (especially in terms of terms of SEO). Today, I'm gonna tell you about "How to remove default footer in blogger and adding your own customize footer?".

Some bloggers don't like default footer in their blogs like me and they wish to add their own customize footer. Well, it's too easy to remove the default footer, follow these simple steps:
  • Login to Blogger.
  • Go to Design> Edit HTML
  • Backup your template.
  • Check “Expand Widget Templates". 
  • Look for the code: 

    <footer>
    <div class='footer-outer'>
    <div class='footer-cap-top cap-top'>
    <div class='cap-left'/>
    <div class='cap-right'/>
  • Change it with the following code:

    <footer style='display:none'>
    <div class='footer-outer'>
    <div class='footer-cap-top cap-top'>
    <div class='cap-left'/>
    <div class='cap-right'/>
  • Click Preview and Save Template. You've removed your default blogger now.

Adding your own customize footer:


After removing default footer, next step is to add your own customize footer (e.g.: you can scroll down and check my site's customize footer):
  • Again go to Design> Edit HTML
  • Look for: </body>
  • Add your customized footer before body close tag.
  • That's all.
Note: I recommend not to go with any customize blogger template (or purchase it). Pick any of default blogger template and make your own customization in it. It would enhance your knowledge and will make you a perfect blogger.

Facebook - Know Who Unfriended You | About Pending / Declined Friend Requests | Deactivated / Reactivated Profiles

Unfriend Finder Logo
Facebook is the leading social networking site in the world and it's era is increasing time by time. In my previous posts, I explained about about "Know Who Deleted You On Facebook" and "See Your Pending Friend Requests In Facebook", but these both posts have limited feature. So in this post, I'm gonna tell about "Know Who Unfriended You |  Pending / Declined  Friend Requests | Deactivated / Reactivated  Profiles" using Unfriend Finder. Unfriend Finder will tell you which friends have removed you, who has deactivated their accounts, people you have requested friendship with and who has declined your friend request.

Sometimes you may have noticed that list of number of your facebook friends is decreasing, the reason is either they have deleted you or deactivated/deleted their facebook profile. So do you want to know about who unfriended you |  pending / declined friend requests | deactivated/reactivated facebook profiles? Follow these simple steps:
  • Go to the Unfriend Finder download link from here.

    Note: It works in Mozilla Firefox, Google Chrome, Internet Explorer, Safari and Opera.
  • When you will go to the download page, whole procedure would be given there depending on the browser you're using like if you're browsing it from Firefox, then it would show download procedure for Firefox only and so on.
  • After installing, you will see an option "Unfriends" in left sidebar under Events as shown in screenshot:

    Unfriend Finder Tutorial
  • You can track these all activities from "Unfriends" tab next to Home button too as shown below:

    Unfriend
  • That's all.

Hide Online Chat Status In New Facebook Chat Bar From Any Particular Friend

Facebook Logo
Sometimes it happens when you don't wish to chat with a friend because of some issues, but want to stay online for all other friends. In this post, I'm gonna tell about hiding online chat status from any particular friend in new facebook chat bar, follow these simple steps:
  • In Facebook chat bar, click on Options and go to Advanced Settings...
  • Under Advanced Chat Settings:
    • Under "All your friends see you except...", Enter name of friends to whom you want to show offline (you can also include lists if you've made).

      Facebook Chat Bar
  • Click on Save.
  • That's all.
     Note: If you wish to show online to only few friends, add them in second option "Only some friends see you...".