JavaScript Free Code */ /* ---( page defaults )--- */ body { margin: 0; padding: 0; font-size: small; text-align: center; color: #333333; background: #e0e0e0; } blockquote { margin-top: 0; margin-right: 0; margin-bottom: 0; margin-left: 30px; padding-top: 10px; padding-right: 0; padding-bottom: 0; padding-left: 20px; font-size: 88%; line-height: 1.5em; color: #666; background: url(http://www.blogblog.com/tictac/quotes.gif) no-repeat top left; } blockquote p { margin-top: 0; } abbr, acronym { cursor: help; font-style: normal; border-bottom: 1px dotted; } code { color: #f63; } hr { display: none; } img { border: none; } /* unordered list style */ ul { list-style: none; margin-left: 10px; padding: 0; } li { list-style: none; padding-left: 14px; margin-bottom: 3px; background: url(http://www.blogblog.com/tictac/tictac_orange.gif) no-repeat left 6px; } /* links */ a:link { color: #6699cc; } a:visited { color: #666699; } a:hover { color: #693; } a:active { color: #cc3333; text-decoration: none; } /* ---( layout structure )---*/ #outer-wrapper { width: 847px; margin: 0px auto 0; text-align: left; font: normal normal 100% Verdana, sans-serif; background: url(http://www.blogblog.com/tictac/tile_left.gif) repeat-y; } #content-wrapper { margin-left: 42px; /* to avoid the border image */ width: 763px; } #main { float: left; width: 460px; margin-top: 20px; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 0; padding-right: 0; padding-bottom: 0; padding-left: 1em; line-height: 1.5em; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } #sidebar { float: right; width: 259px; padding-top: 20px; padding-right: 0px; padding-bottom: 0; padding-left: 0; font-size: 85%; line-height: 1.4em; color: #999999; background: url(http://www.blogblog.com/tictac/sidebar_bg.gif) no-repeat left top; word-wrap: break-word; /* fix for long text breaking sidebar float in IE */ overflow: hidden; /* fix for long non-text content breaking IE sidebar float */ } /* ---( header and site name )--- */ #header-wrapper { margin: 0; padding: 0; font: normal normal 100% 'Lucida Grande','Trebuchet MS'; background: #e0e0e0 url(http://www.blogblog.com/tictac/top_div_left.gif) no-repeat left top; } #header { margin: 0; padding-top: 25px; padding-right: 60px; padding-bottom: 35px; padding-left: 160px; color: #FFFFFF; background: url(http://www.blogblog.com/tictac/top_h1.gif) no-repeat bottom left; } #header h1 { font-size: 200%; text-shadow: #81A75B 2px 2px 2px; } #header h1 a { text-decoration: none; color: #FFFFFF; } #header h1 a:hover { color: #eee; } /* ---( main column )--- */ h2.date-header { margin-top: 0; padding-left: 14px; font-size: 90%; color: #ff9933; background: url(http://www.blogblog.com/tictac/date_icon.gif) no-repeat left 50%; } .post h3 { margin-top: 0; font: normal bold 130% 'Lucida Grande','Trebuchet MS'; letter-spacing: -1px; color: #ff6633; } .post { margin-top: 0; margin-right: 0; margin-bottom: 1.5em; margin-left: 0; padding-top: 0; padding-right: 0; padding-bottom: 1.5em; padding-left: 14px; border-bottom: 1px solid #ddd; } .post h3 a, .post h3 a:visited { color: #ff6633; text-decoration: none; } .post-footer { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 0; padding-left: 14px; font-size: 88%; color: #999999; background: url(http://www.blogblog.com/tictac/tictac_grey.gif) no-repeat left 8px; } .post img, table.tr-caption-container { padding: 6px; border-top: 1px solid #ddd; border-left: 1px solid #ddd; border-bottom: 1px solid #c0c0c0; border-right: 1px solid #c0c0c0; } .tr-caption-container img { border: none; padding: 0; } .feed-links { clear: both; line-height: 2.5em; } #blog-pager-newer-link { float: left; } #blog-pager-older-link { float: right; } #blog-pager { text-align: center; } /* comment styles */ #comments { padding: 10px 10px 0px 10px; font-size: 85%; line-height: 1.5em; color: #666; background: #eee url(http://www.blogblog.com/tictac/comments_curve.gif) no-repeat top left; } #comments h4 { margin-top: 20px; margin-right: 0; margin-bottom: 15px; margin-left: 0; padding-top: 8px; padding-right: 0; padding-bottom: 0; padding-left: 40px; font-family: "Lucida Grande", "Trebuchet MS"; font-size: 130%; color: #666; background: url(http://www.blogblog.com/tictac/bubbles.gif) no-repeat 10px 0; height: 29px !important; /* for most browsers */ height /**/:37px; /* for IE5/Win */ } #comments ul { margin-left: 0; } #comments li { background: none; padding-left: 0; } .comment-body { padding-top: 0; padding-right: 10px; padding-bottom: 0; padding-left: 25px; background: url(http://www.blogblog.com/tictac/tictac_orange.gif) no-repeat 10px 5px; } .comment-body p { margin-bottom: 0; } .comment-author { margin-top: 4px; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 0; padding-right: 10px; padding-bottom: 0; padding-left: 60px; color: #999; background: url(http://www.blogblog.com/tictac/comment_arrow.gif) no-repeat 44px 2px; } .comment-footer { border-bottom: 1px solid #ddd; padding-bottom: 1em; } .deleted-comment { font-style:italic; color:gray; } /* ---( sidebar )--- */ .sidebar h2 { margin-top: 0; margin-right: 0; margin-bottom: 0; margin-left: 0; padding-top: 25px; padding-right: 0; padding-bottom: 0; padding-left: 40px; font: normal bold 130% 'Lucida Grande','Trebuchet MS'; color: #666666; height: 32px; background: url(http://www.blogblog.com/tictac/sidebar_icon.gif) no-repeat 10px 15px; height: 32px !important; /* for most browsers */ height /**/:57px; /* for IE5/Win */ } .sidebar .widget { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 10px; padding-left: 10px; border-bottom: 1px solid #ddd; } .sidebar li { background: url(http://www.blogblog.com/tictac/tictac_green.gif) no-repeat left 5px; } .profile-textblock { clear: both; margin-left: 0; } .profile-img { float: left; margin-top: 0; margin-right: 5px; margin-bottom: 5px; margin-left: 0; border: 1px solid #ddd; padding: 4px; } /* ---( footer )--- */ .clear { /* to fix IE6 padding-top issue */ clear: both; } #footer-wrapper { margin: 0; padding-top: 0; padding-right: 0; padding-bottom: 9px; padding-left: 0; font-size: 85%; color: #ddd; background: url(http://www.blogblog.com/tictac/bottom_sill.gif) no-repeat bottom left; } #footer { margin: 0; padding-top: 20px; padding-right: 320px; padding-bottom: 20px; padding-left: 95px; background: url(http://www.blogblog.com/tictac/bottom_sash_left.gif) no-repeat top left; } /** Page structure tweaks for layout editor wireframe */ body#layout #outer-wrapper, body#layout #main, body#layout #sidebar { padding-top: 0; margin-top: 0; } body#layout #outer-wrapper, body#layout #content-wrapper { width: 740px; } body#layout #sidebar { margin-right: 0; margin-bottom: 1em; } body#layout #header, body#layout #footer, body#layout #main { padding: 0; } body#layout #content-wrapper { margin: 0px; } -->

Thursday, April 1, 2010

News:Yahoo accounts of journalists based in China and Taiwan hacked


Yahoo accounts of journalists based in China and Taiwan hacked

Thursday, April 1, 2010


Foreign journalists and academics targeted. Webmail accounts of foreign journalists based in China and Taiwan have reportedly been hacked.

According to BBC News, the Foreign Correspondents' Club of China (FCCC) has confirmed eight cases of Yahoo email hacks in recent weeks, and criticised Yahoo for not answering the FCCC's questions about the attacks or telling individual mail users about how the accounts were accessed.

It reported on Clifford Coonan, a reporter for the Irish Times, who told the AFP news agency that he had an error message when he logged into his Yahoo account this week.

He said: “I don't know who's doing it, what happened. They (Yahoo) haven't given any information, but it seems to be happening to journalists and academics in China, so that's why it's a little suspicious.”

The incident comes only a few months after Google accused China of hacking the Gmail accounts of Chinese human rights activists. This has culminated in Google scaling down its Chinese domain and moving search operations to Hong Kong.

See original article on scmagazineuk.com
Secure Computing Magazine

Wednesday, March 31, 2010

Visual basic Tool bar

first up all lets  find whats the vb toolbar is   
  • pointer:-pionter helps to bring back to tipical pointer
  • Label:-adds label to form
  • frame:-gives frame to the form
  • chekbox(chkbx):-its a box when we clicks it get ticks
  • list box:-box containing data
  • hscrollbar:-scrolls form horizondally
  • vscrollbar :-scrolls form vertically
  • timer:-gives time
  • dirlistbox:-give information about Directories
  • shape:-Can draw squires rectangles ect
  • OLE:-  provide Ole ffuctions
  • Data:-Helps in data base enabled programming
  • line:-Draws aline
  • Filelistbox:-Lists file detailes
  • drivelistbox:-Lists file detailes
  • combobuton:-the button seen usaly 4 typing date of birth
  • optionbutton:-a circle while clicks a dot will appear
  • Commandbutton:-the typical buttton
  • Textbox:-the text box helps to bring text in the form 
  • picturebox:-gives picture to the form
Drag each of these in a form in next blog I will Blog u the programming in visual basic 







      

visual basic

Hello lets carry to an introduction .it seems boring to have an idroduction on vb . so I decied to give u a link on history of vb. first up all we will lern how a tipical visual basic 6.0 window looks

This is a window that appear while we enter visual basic 6.0 version

Tuesday, March 30, 2010

Tips for making money online

Hi frends its a big difficulty to make money online.Its a business some get profit and some get loss if u want to make money online shabbirbhimami will help u. click here to start the free course on make money online

Xbox director general get this account hacked

It has been reported that Larry Hryb, Xbox director of softwares have been Hacked. The account hijacker even uploaded a video to its official site to demonstrate the access. Though the Microsoft's policy and enforcement director for Xbox Live, Stephen Toulouse has stated that Hryb's account had been restored and the hijacking was very specific and very targeted to Major, some interesting discussion still goes on.
waan watch that video Click here

I-pad

Apple has posted the terms of its firmware licensing agreement for the iPad, which restricts free operating software updates to the current major reference release.
 being a guy who dosent like much about the Apples ipad  fount it necessary to carry information with a link with apple insider

 

Apple launches Mac OS X 10.6.3 Update

A few hours back, Apple released new update for Mac OS X Snow Leopard users that will bring improvements in OpenGL, QuickTimeX and will fix a number of bugs. This update arrives after almost four months after the Intel Atom support nixing Mac OS X 10.6.2 update. As always, the new Mac OS X 10.6.3 will fix several issues in Snow Leopard to bring more reliability and compatibility. Mac users with Mac OS X 10.6.2 can hit the Software Update
and download the Mac OS X 10.6.3 update that has 438.7MB file size. While rest Snow Leopard users can go for Mac OS X 10.6.3 combo update that as 784MB file size.



This new update for Mac OS X Snow Leopard mostly takes care of QuickTimeX, OpenGL and Windows file server issues. Apart from that, Mail, MobileMe and AirPort are the product that get affected with this update. Here's the list of fixes:


  • improve the reliability and compatibility of QuickTime X
  • address compatibility issues with OpenGL-based applications
  • address an issue that causes background message colors to display incorrectly in Mail
  • resolve an issue that prevented files with the # or & characters in their names from opening in Rosetta applications
  • resolve an issue that prevented files from copying to Windows file servers
  • improve performance of Logic Pro 9 and Main Stage 2 when running in 64-bit mode
  • improve sleep and wake reliability when using Bonjour wake on demand
  • address a color issue in iMovie with HD content
  • improve printing reliability
  • resolve issues with recurring events in iCal when connected to an Exchange server
  • improve the reliability of 3rd party USB input devices
  • fix glowing, stuck, or dark pixels when viewing video from the iMac (Late 2009) built-in iSight camera






Along with this update comes a special Data Collection feature that will collect your Mac's diagnostic and usage information. That data would be automatically sent to Apple for further analysis. Note that this data would be sent ONLY after the user's explicit consent. Mainly intended for bettering the quality and experience of the operating system, this data can be used for improving frequently used applications.

For the detailed list of fixes and changes the new Mac OS X 10.6.3 update brings, head over to this knowledge base article at Apple Support site. In case you observe any weird behavior on your operating system after applying the update, let us know in the comment section below.


source:-techtree.com

Vedio chat using Orkut

Google have introduced many new able sites for netisons.Orkut was one of the favorate ones they introduced (instead thy bought from orkut boykootan) .Orkut is not dead.Chatting is an important process in social networking.But file transfer was an important problem in chatting

From now on, you can share files like photos, audio, video, documents, etc. using 'Send a File' option in the 'Actions' menu while chatting on Orkut and iGoogle. There is no need to install any additional software or any other fuss. Apart from that, users can also start video chat with their Orkut buddies by clicking on the blue camera icon and obviously webcam would be required. Also, you're required to download video chat enabling application
from www.google.com/chat/video. 
 imagine you are Gaurav your legs are hurt.and you have to inform me.But just senting text I cannot understant seriousness.so u can prefer vedio chatting

Indian constitution for cybercrimes

Information Technology Act (IT Act) 2000

The government of India introduced the Information Technology Act, on 17th October 2000. Information Technology Act (IT Act) 2000, is the India’s only cyber law. The IT Act is aimed to provide legal recognition for transactions carried out by means of electronic data interchange and other means of electronic communication, commonly referred to as “electronic commerce”.

India has done a good job by enacting a cyber law. It is the 12th country of the world having a cyber law. It covers areas like e-governance, e-commerce, cyber contraventions and cyber offences.
Information Technology ACT 2000 Effects in Combating Cyber Crime

According to Section 75 of the Act, the Act applies to any offence or contravention committed outside India by any person irrespective of his nationality, if such act involves a computer, computer system or network located in India. The IT Act prescribes provisions for contraventions in Chapter IX of the Act, particularly Section 43 of the Act, which covers unauthorized access, downloading, introduction of virus, denial of access and internet time theft committed by any person. It prescribes punishment by way of damages not exceeding Rs. 1 crore to the affected party. Chapter XI of the IT Act discusses the cyber crimes and offences interalia, tampering with computer source documents (Sec. 65), Hacking (Sec.66), publishing of obscene information (Sec.67), unauthorized access to protected system (Sec.70), breach of confidentiality (Sec.72), publishing false digital signature certificate (Sec.73).
The implications of IT Act 2000 provisions for the e-businesses would be that email would now be a valid and legal form of communication in India that can be duly produced and approved in a court of law. Companies shall now be able to carry out electronic commerce using the legal infrastructure provided by the Act. Digital signatures have been given legal validity and sanction in the Act. The IT Act also addresses the important issues of security, which are so critical to the success of electronic transactions.
One of the first cases where the accused was convicted under the IT Act provisions was the case of State of Tamilnadu V. Suhas Kutty. The case related to posting of obscene, defamatory and annoying message about a divorcee woman in the yahoo message group. E-Mails were also forwarded to the victim for information by the accused through a false e-mail account opened by him in the name of the victim. The posting of the message resulted in annoying phone calls to the lady in the belief that she was soliciting. The accused was found guilty of offences under section 469, 509 IPC and 67 of IT Act 2000 and the accused was convicted and was sentenced for the offence to undergo RI for 2 years under 469 IPC and to pay fine of Rs.500/-and for the offence under Section 509 IPC sentenced to undergo 1 year Simple imprisonment and to pay fine of Rs.500/- and for the offence under Section 67 of IT Act 2000 to undergo RI for 2 years and to pay fine of Rs.4000/-.
Eight years have passed since the act was enacted and in these eight year’s technology has changed at a much faster pace. Though law cannot possibly be expected to keep pace with changes in technology, still there are few areas in the current cyber laws which need some attention.
Some Important Shortcomings of the Information Technology Act, 2000

Pornography
The term ‘pornography’ when used in relation to an offence is not defined in any statutes in India. But Section 67 of the IT Act lays down the law that obscenity is an offence when it is published or transmitted or caused to be published in any electronic form. The expressions, ‘publishing’ or ‘transmission’ have not been specifically defined under the IT Act.

Even the punishment for pornography is not sufficient in India and in the proposed amendment in IT Act the imprisonment is being reduced to two years from the present five year imprisonment. Though legislations worldwide contain severe provisions for child pornography there is no mention of child pornography in the Indian Act. It is interesting to note down that the Information Technology Act prohibits publishing of pornography but viewing of pornography is not an offence under the act.

Data Protection in Internet Banking

The Information Technology Act talks about unauthorized access but it does not talk about maintaining integrity of customer transactions. The act does not lay down any duty upon banks to protect the details of customers and clients. U.K has a data protection law which was enacted 10 years back that is in 1998 under which banks or any person holding sensitive information may be held liable for damages if it fails to maintain adequate security protection in respect of data.

Spamming

Recently the Government of India revealed that as much as 76 per cent of e-mails originating from India are spam’s, although the country accounts for only one per cent when compared with top 25 spam-producing nations. The business of spamming is not only lucrative but is also unregulated to a greater extent. The laws for the prevention of spam in India are missing. Even the IT Act, 2000 fails to address this issue.

USA and the European Union have already enacted anti spam legislation.

In the United States spam is legally permissible according to the CAN-SPAM Act of 2003 provided it follows certain criteria. If the spam fails to comply with any of these requirements, then it is illegal.

Article 13 of the European Union Directive on Privacy and Electronic Communications (2002/58/EC) provides that the EU member States shall take appropriate measures to ensure that unsolicited communications for the purposes of direct marketing are not allowed either without the consent of the subscribers concerned or in respect of subscribers who do not wish to receive these communications, the choice between these options to be determined by National Legislation.

Identity Theft

The IT Act, 2000 does not have any specific provision to deal with Identity theft. It is clear that Indian politicians just do not understand the problem associated with personal identity theft that India employees of outsourcing firms commit. In the face of the controversy generated over leakage of personal information of UK customers through an Indian web marketing firm, prime minister of India has asked the Information and Technology department and industry association Nasscom to consult all stakeholders and give suggestions for changes in the existing laws and, if necessary, to ensure that any breach of secrecy, illegal transfer of commercial and other privileged information and any other form of cyber crime is made a punishable offence.

These are some of the important shortcomings of the Information Technology Act, 2000. Though an amendment was proposed in the Act in 2005, the bill has still not been passed and moreover the bill also fails to address these issues and shortcomings. It seems quite evident that by the time the bill is passed, it would have become obsolete and ineffective.
Challenges to Legislative Measures

Cyber law in India is in its infancy and is struggling hard to meet the contemporary Information and Communication Technology (ICT) requirements. ICT Trends in India-2006, ICT Trends in India-2007, Cyber Security Trends-2007, etc have proved that India has not paid enough attention to the legal framework for the information society and legal enablement of ICT systems in India. To worsen the situation we have a weak cyber and ICT security in India. Cyber and ICT security in India is an ‘ignored world’ and the same is not going to improve due to the faulty cyber security strategy of India. This precarious situation has lead to an insufficient critical ICT infrastructure protection in India. The critical ICT infrastructure protection and management in India have still not got the attention of government of India and private industry players. In short, the ICT strategy of India needs rejuvenation so that we may have a sound cyber law and effective ICT and cyber security.

To compound these problems, many victims of cybercrime are unwilling to file their cases with the authorities. The true magnitudes of cybercrime, as well as demographic statistics on perpetrators and victims, are unknown because most incidents of cybercrime go unreported. The reason behind this is that the victim is either scared of police harassment or wrong media publicity. For minority and marginalised groups who already bear the brunt of media bias, reporting online harassment to the police may simply draw further unwanted attention.

The good news is that, despite these limitations, cyber crimes are detected and culprits are being punished. In October 2002, the Delhi High Court restricted a person from selling pirated Microsoft software over an Internet auction site. Some of the big cities in India where cyber crime cells do exist, there is potential for improvement. There is an immense need for training, and more cities need to have such cells.
 Source:-Desitoop.com(http://www.desitoob.com/indian-approach-towards-the-fight-against-cyber-crime/)
wanna read more:-click here

Anti-virus programs

Anti-virus programs
AVG (free)
www.free.avg.com
AVAST (free)
www.avast.com
Norton (Symantec) (trial)
www.symantec.com
McAfee (trial)
www.mcafee.com
Anti-malware programs
Malwarebytes (free)
www.malwarebytes.org
Ad-Aware (free)
www.lavasoft.com
Malicious Software Removal Tool (MS Windows)
www.microsoft.com/security/
malwareremove/
Report fraud, theft
Internet Crime Complaint Center
www.ic3.gov
FBI reporting center
www.fbi.gov/cyberinvest/escams.htm
Computer Crime and Intellectual Property Section (cybercrime)
www.justice.gov/criminal/
cybercrime/reporting.htm

read more click here

Beware these cities if u wanna Save ur files

The threat of falling victim to cyber-crime is so ubiquitous today, and some of America's biggest cities are even more prone than elsewhere in the country, according to a well known producer of cyber-security software.
The riskiest cyber crimes are reported from
  • The top 10 listed are:
 
  1. Seattle
  2. Boston
  3. Washington, D.C.
  4. San Francisco
  5. Raleigh, N.C.
  6. Atlanta
  7. Minneapolis
  8. Denver
  9. Austin, Texas
  10. Portland, Ore

source:-results March 22 in The Norton Top 10 Riskiest Online Cities report.
waan read more :-Click here

Gujarath police opening cyber cell

Gujarat police have decided to launch new cybercell . the cyber cell is located in the Police Training Academy at Karai in Gandhinagar According to Hasmukh Patel, DIG Planning and Modernisation, the lab will function as a training institute for the police officers.
“We are procuring this lab under the state police to give a full-fledged training to the officers for cyber crime laws, detection methods and investigation techniques, as also prevention of cyber crimes in the state,” said Patel.
Director General of Police S S Khandwawala said: “The decision to set up a specialised lab on cyber crime was taken after senior officers felt there was a need for cyber crime education among them. Cyber crime is emerging as a challenge to Gujarat Police. Cases of phishing, internet fraud, information warfare have increased in the state. Training and expertise of various detection methods is a must, now. This is a holistic approach taken by Gujarat Police to intensify cyber crime detection in Gujarat.” 
to read more "click here"

Monday, March 29, 2010

techno tips

Hai frends,
Tech tips help you to under stand the helthy way to rule the tech world...
we offer a one month free corse sent your name and email to info.technonews@gmail.com
any doughts just comment me