BHASKAR.com has been hacked by pakistani hacker

pakistani hacker group d3-st4lli0n & [A] has hacked one of the most famous news portalsite of india owned by bhaskar group bhaskar.com. around 11 pm it has been announced proudly by some pakistani group of hacker. it is one of the example of webjacking.there were same accident happened with unicef and also done by some of the pakistani hacker group....

TIPS TO SAVE OWN MAIL

Antivirus software is simply not enough. An email worm can spread worldwide in just minutes, but it takes hours for antivirus vendors to analyze, create, and deploy signature updates. Fortunately, there are five easy steps you can take to help close that window of vulnerability and help keep email worms off your system.Rule 1: Identification - Understanding the nature of the attachment is the first step towards email safety. Any executable type attachment has the potential to be infected. This covers a wide range of extensions. Complicating matters...

The 5 Most Common Mistakes in Email Security

Properly managing your email accounts1. Using just one email account.Individuals new to email often think about their email account like they do their home address, you only have one home address, so you should only have one email. Instead, you should think about your email address like you do your keys; while it may be OK to use the same key for your front and your back door, having a single key open everything is both impractical and unsafe.A good rule of thumb for the average email user is to keep a minimum of three email accounts.2. Holding...

How to Save Your Email Address

Instructions Step 1 Do not post your email anywhere on the web. Make sure you protect your email. Do not live it live out there on the World Wide Web. Do not post it on your websites contact page, or with your blog comments or anything like that. If you feel is necessary to do so, create a new email address just for this purpose. You can forward email from multiple addresses to the one that you like, and if you change your mind, you can un-forward it because you are in control! Step 2 Click on the "un-subscribe" link. Everybody is doing email...

Windows Explorer.exe Does Not Load\Run

This type of problem occurs when your computer get infected from the virus or spyware which has corrupted some registry keys which are related to explorer load.Follow the procedure below FOR SOLVE THIS PROBLEM----1. Press Ctrl+Shift+Esc to launch task manager2. Click File | New Task3. Now type regedit and click Ok4. Browse the following registry pathHKEY_LOCAL_MACHINESOFTWAREMicrosoftWindows NTCurrentVersionImage File Execution.options5. Under this registry path, you will see subkeys named explorer.exe and iexplorer.exe.These keys must be pointing...

How to Detect Missing DLL File Errors?

When a DLL file is corrupt or missing you may receive an error message similar to the one given below when you run a program that needs to use this DLL file: Cannot find the file Program_Name.exe.In the error message Program_Name represents the name of the program or name of one of its components in which the error occurred.This error message is usually followed by an error message similar to the one given below:Error starting program. A required .DLL file DLL_Name.DLL was not found.Here, DLL_Name is the name of the DLL file that...

How To Remove Newfolder dot exe Virus?

What is Newfolder dot exe?The real name of this virus is Iddono. This threat copies its file(s) to your hard disk. Its typical file name is Iddono. Then it creates new startup key with name Iddono and value newfolder dot exe. You can also find it in your processes list with name newfolder dot exe or Iddono.This virus is very difficult to eliminate manually, but you can find solution for removal below.Manual Solution:Step1:1. Search for autorun.inf file. It is a read only file so you will have to change it to normal by right clicking the file ,...

What To Do If Your PC Is Taking Much Time To Shutdown?

Does your system take a lot of time to shutdown? If yes, follow the tips listed below to speed up system shutdowns.Close All Running ProgramsWhen you give the command to shutdown Windows, the shutdown process first closes down all applications and processes running on it and then shuts down itself. Therefore, if your system is slow in shutting down, it is recommended that you first close all programs running on the computer and displayed in the system tray and then give the shutdown command.Resolve Problems Related to Buggy and Outdated DriversBuggy...

HOW ANTIVIRUS WORK TO STOP SPREADING OF VIRUS

Virus definition files tell the anti virus software what code characteristics to look for while monitoring your computer. When a certain file type or activity occurs that matches a characteristic, the anti virus software blocks the execution of code and alerts you that a virus has been found. The virus is then isolated and destroyed.A actually antivirus sees only two thing which is content is "Specific" and "Generic" They provide identifiable characteristics, or finger prints, for malicious code. This is what is meant by "Specific" scanning—your...

TOP TEN ANTIVIRUS OF 2009

This review picks the best antivirus software based on ease to use, effectiveness, updates, feature list, ease of installation, Help/Support.1. BitDefender Antivirus2. Kaspersky Anti-Virus3. Webroot Antivirus4. G DATA AntiVirus5. AntiVirus ESET Nod326. ParetoLogic Anti-Virus PLUS7. AVG Anti-Virus8. Vipre Antivirus + Antispyware9. F-Secure Anti-Virus10. Trend Mi...

Top ten Viruses of 2009 : Based on Ranking

Here is a listing of Top 10 Threats by Bright Hub web site , In the article "Top 10 Computer Viruses of 2009" by KBSMP GROUP, there is the complete list about the worst viruses in this year.Top Viruses of 2009 : Based on Ranking * Rank 1: Win32/Conficker * Rank 2: INF/Autorun * Rank 3: Win32/PSW.OnLineGames * Rank 4: Wind32/Agent * Rank 5: Win32/FlyStudio * Rank 6: INF/Conficker * Rank 7: Win32/Pacex.Gen * Rank 8: WMA/TrojanDownloader.GetCodec * Rank 9: Win32/Qhost * Rank 10: Win32/Auto...