Skip to main content

Posts

Showing posts with the label security

Resolving Windows Activation Problems - Convert Pirated Windows to Genuine

I bought my PC a couple of years back.Recently I upgraded to Windows 7, bought it off a local retailer. Recently my Windows 7 (build 7600 OEM) began to "troll" me in the most irritating way. The foremost thing I do after installing windows is enabling the Windows Update service from the Services Microsoft Service Console window. After that my system remains "safe" from the pirates; until recently when an astonishing behavior caught my eye as I saw Windows was constantly updating. I went back to check if things were right and saw that the Update service was running in Automatic(Delayed Start) mode. Today morning as I logged in I saw That Infamous watermark saying "This copy of windows is not genuine". After a brief online troubleshooting I came to know about a few tools to remove such watermarks and make the copy validated again. I downloaded one such tool (watermark remover). Though it did remove the watermark, the next session proved more irritatin...

Trace your IP

Tracing your IP and the hops made is easy. Remember this is different from finding your IP address. You can easily get your IP address by simply running the ‘ping’ command. This tutorial will show you the geographical locations travelled by the data between your system and some remote address. What is an IP address? An Internet Protocol address ( IP address ) is usually a numerical label assigned to each device (e.g., computer, printer) participating in a computer network that uses the Internet Protocol for communication. How to trace your IP?   Windows Press Win + R', the Run Dialog box opens Type ‘cmd’ and press Enter Type tracert www.google.com (or any other site) You will find many entries with their respective IP addresses. These actually denote the path travelled by the packets of data between your machine and www.google.com (or any other site)         I have blurred some data to protect my privacy.   Unix/Linux...

Block those Ads

If you browse the internet often you know what I am talking about. Ads are everywhere. And necessary for paying for hosting bills and like but sometimes they are just plain annoying and useless distraction. Besides heavy and bad ads even take up a lot of bandwidth. In the end you might just say, Enough, now I will call the shots. I will decide what I see and not. So here I will brief you about the Do’s and Don’t in blocking unnecessary advertisements. Chrome AdBlock Simplicity is the key. A must have. Get it here : http://chromeadblock.com/   Firefox   AdBlock Plus Very useful, works great and ultra light. You can find it here. https://addons.mozilla.org/en-US/firefox/addon/adblock-plus/ IE 9   Simple AdBlock Go here : http://simple-adblock.com/ Download the Installer, install and you are done! One thing though, it is important to know that some ads are good and even useful, remember the nice ad that caught your attention (in a ...

Biomimicry to the Rescue

  We have a tendency to name software entities after biological creatures whose behaviors they remind us of – think of viruses in general, or worms. Now a bunch of computer security geeks are coming from the other direction, taking inspiration from nature’s creatures for the next weapon in the never-ending war against malware and viruses… few species are more effective at responding to intrusions into their system than the ant, after all. Unlike traditional security devices, which are static, these “digital ants” wander through computer networks looking for threats, such as “computer worms” – self-replicating programs designed to steal information or facilitate unauthorized use of machines. When a digital ant detects a threat, it doesn’t take long for an army of ants to converge at that location, drawing the attention of human operators who step in to investigate. The concept, called “swarm intelligence,” promises to transform cyber security because it adapts readily to changing...