Saturday, May 21, 2011

How to create strong passwords for your facebook & gmail account


Create strong passwords

Strong passwords are important protections to help you have safer online transactions.

Keys to password strength: length and complexity

An ideal password is long and has letters, punctuation, symbols, and numbers.
  • Whenever possible, use at least 14 characters or more.
  • The greater the variety of characters in your password, the better.
  • Use the entire keyboard, not just the letters and characters you use or see most often.

Create a strong password you can remember

There are many ways to create a long, complex password. Here is one way that may make remembering it easier:
What to do
Suggestion
Example
Start with a sentence or two (about 10 words total).
Think of something meaningful to you.
Long and complex passwords are safest.
Turn your sentences into a row of letters.
Use the first letter of each word.
lacpasikms (10 characters)
Add complexity.
Make only the letters in the first half of the alphabet uppercase.
lACpAsIKMs (10 characters)
Add length with numbers.
Put two numbers that are meaningful to you between the two sentences.
lACpAs56IKMs (12 characters)
Add length with punctuation.
Put a punctuation mark at the beginning.
?lACpAs56IKMs (13 characters)
Add length with symbols.
Put a symbol at the end.
?lACpAs56IKMs" (14 characters)

Test your password with a password checker

A password checker evaluates your password's strength automatically. Try our secure password checker.

Protect your passwords from prying eyes

The easiest way to "remember" passwords is to write them down. It is okay to write passwords down, but keep them secure.

Common password pitfalls to avoid

Cyber criminals use sophisticated tools that can rapidly decipher passwords.
Avoid creating passwords using:
  • Dictionary words in any language.
  • Words spelled backwards, common misspellings, and abbreviations.
  • Sequences or repeated characters. Examples: 12345678, 222222, abcdefg, or adjacent letters on your keyboard (qwerty).
  • Personal information. Your name, birthday, driver's license, passport number, or similar information.

How to recognize phishing email messages or links


Phishing email messages or links

Phishing email messages are designed to steal your identity. They ask for personal data, or direct you to websites or phone numbers to call where they ask you to provide personal data. A few clues can help you spot fraudulent email messages or links within them.

What does a phishing email message look like?

Phishing email messages take a number of forms:
  • They might appear to come from your bank or financial institution, a company you regularly do business with, such asMicrosoft, or from your social networking site.
  • They might appear to be from someone in your email address book.
  • They might ask you to make a phone call. Phone phishing scams direct you to call a phone number where a person or an audio response unit waits to take your account number, personal identification number, password, or other valuable personal data.
  • They might include official-looking logos and other identifying information taken directly from legitimate websites, and they might include convincing details about your personal history that scammers found on your social networking pages.
  • They might include links to spoofed websites where you are asked to enter personal information.
Here is an example of what a phishing scam in an email message might look like.
Example of a phishing email message
Example of a phishing email message that includes threat of account closure and malicious links designed to trick you into entering your account information.
To make these phishing email messages look even more legitimate, the scam artists use graphics that appear to go to the legitimate websites (Windows Live Hotmail and Woodgrove Bank, respectively), but actually take you to a phony scam site or possibly a pop-up window that looks exactly like the official site.
Here are a few phrases that are commonly used in phishing email scams:
"Verify your account."
Businesses should not ask you to send passwords, logon information or user names, Social Security numbers, or other personal information through email.
If you receive an email message from Microsoft or any other business asking you to update your credit card information, do not respond: This is a phishing scam.
"You have won the lottery."
The lottery scam is a common phishing scam known as advanced fee fraud. One of the most common forms of advanced fee fraud is a message that claims that you have won a large sum of money, or that a person will pay you a large sum of money for little or no work on your part. The lottery scam often includes references to big companies, such as Microsoft. There is no Microsoft Lottery. For more information, see What is the Microsoft Lottery scam?
"If you don't respond within 48 hours, your account will be closed."
These messages convey a sense of urgency so that you'll respond immediately without thinking. A phishing email message might even claim that your response is required because your account might have been compromised.

What does a phishing link look like?

Sometimes phishing email messages direct you to spoofed websites.
HTML-formatted messages can contain links or forms that you can fill out just as you would fill out a form on a legitimate website.
Phishing links that you are urged to click in email messages, on websites, or even in instant messages, may contain all or part of a real company's name and are usually masked, meaning that the link you see does not take you to that address but somewhere different, usually an illegitimate website.
Notice in the following example that resting (but not clicking) your mouse pointer on the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address. This is a suspicious sign.
Example of a masked web address
Example of a masked web address.
Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered by adding, omitting, or transposing letters. For example, the address "www.microsoft.com" could appear instead as:
  • www.micosoft.com
  • www.mircosoft.com
  • www.verify-microsoft.com
This is called "typo-squatting" or "cybersquatting."
For more information about phishing, see Email and web scams: How to help protect yourself.

E-mail spoofing

email spoofing

E-mail spoofing is the forgery of an e-mail header so that the message appears to have originated from someone or somewhere other than the actual source. Distributors of spamoften use spoofing in an attempt to get recipients to open, and possibly even respond to, their solicitations. Spoofing can be used legitimately. Classic examples of senders who might prefer to disguise the source of the e-mail include a sender reporting mistreatment by a spouse to a welfare agency or a "whistle-blower" who fears retaliation. However, spoofing anyone other than yourself is illegal in some jurisdictions.
E-mail spoofing is possible because Simple Mail Transfer Protocol (SMTP), the main protocol used in sending e-mail, does not include an authentication mechanism. Although an SMTP service extension (specified in IETF RFC 2554) allows an SMTP client to negotiate a security level with a mail server, this precaution is not often taken. If the precaution is not taken, anyone with the requisite knowledge can connect to the server and use it to send
messages. To send spoofed e-mail, senders insert commands in headers that will alter message information. It is possible to send a message that appears to be from anyone, anywhere, saying whatever the sender wants it to say. Thus, someone could send spoofed e-mail that appears to be from you with a message that you didn't write.
Although most spoofed e-mail falls into the "nuisance" category and requires little action other than deletion, the more malicious varieties can cause serious problems and security risks. For example, spoofed e-mail may purport to be from someone in a position of authority, asking for sensitive data, such as passwords, credit card numbers, or other personal information -- any of which can be used for a variety of criminal purposes. The Bank of America, eBay, and Wells Fargo are among the companies recently spoofed in mass spam mailings. One type of e-mail spoofing, self-sending spam, involves messages that appear to be both to and from the recipient.
Resources from around the Web
Spoofed/Forged EmailThis document provides a general overview of email spoofing and the problems that can result from it. It includes information that will help you respond to ...
www.cert.org/tech_tips/email_spoofing.html

CERT Advisory CA-1996-21 TCP SYN Flooding and IP Spoofing AttacksThis advisory supersedes the IP spoofing portion of CA-95.01. ..... 19, 1996 Updates - corrected Sun Microsystems security-alert email address. Dec. ...
www.cert.org/advisories/CA-1996-21.html

Email Spamming and Email SpoofingThis document gives advice on the what email spamming and spoofing is.
www.lse.ac.uk/itservices/help/spamming&spoofing.htm

E-mail spoofing - Wikipedia, the free encyclopediaE-mail spoofing is a term used to describe fraudulent email activity in which the sender address and other parts of the email header are altered to appear ...
en.wikipedia.org/wiki/E-mail_spoofing

G4 - Feature - What is Email Spoofing?Email spoofing is the practice of changing your name in email so that it looks like the email came from somewhere or someone else. ...
www.g4tv.com/techtvvault/features/17167/What_is_Email_Spoofing.html

Tuesday, May 10, 2011

JOIN AVISO PACIFIC WORLD’S LARGEST AND INDIA’S FASTEST GROWING SURVEY COMPANY


Description : 

Aviso is a Largest Survey Group in India. Aviso is an online Market Research Group where consumers join hands to shape and develop products and services through online survey. Just click on my profile then click take survey and take the survey to qualify for the income & reward. You will be rewarded payment of $10 per online survey completed. Treat this as extra cash, not a career.
Earn Rs. 2000 per month by spending less than 15 minutes per week on Internet.
Do you want to join us?
Contact us: avisopacificsurvey@yahoo.in

Mobile no.: 09424353595

Name : Devendra

Visit the Company\'s Website here: www.avisopacific.com

SIMPLE STEPS TO GET STARTED
Join \"Aviso\" 
JOINING @ Rs.3100/- only
Fill up 2 online surveys every week
Earn Rs. 250/- for each survey (2 x 250 = Rs. 500 / per week) on 1 Panel. You can subscribe unlimited Panels.
For each referral from your id you will get Rs.250
For each referral from your id you will get spill income of Rs.200 per month
for each pair u will get Rs. 500
Imp: No referring required for earn, but if you refer it to someone, you will get Binary Income and Sponsorship Income as well.
Be the first among your friends to join Aviso. We will add you in our power leg.
Every customer has an opinion, your opinion is important. Aviso gives you an opportunity to make your opinion heard by different organizations. I\'m going to give you something that will drastically change the way you make income online!
Amazing and Genuine Business, This is the online opportunity, which all Indians are looking. Because of my earnings, now my friends are also Aviso Panelists.

Saturday, May 7, 2011

Facebook Truths


Facebook is the second largest social network on the web, behind only MySpace in terms of traffic. Primarily focused on high school to college students, Facebook has been gaining market share, and more significantly a supportive user base. Since their launch in February 2004, they’ve been able to obtain over 8 million users in the U.S. alone and expand worldwide to 7 other English-speaking countries, with more to follow. A growing phenomenon, let’s discover Facebook.
The Facebook Phenomenon
First, let’s start by looking into Facebook in a broad spectrum – as the network, the phenomenon, the company, and its brand.
History
Originally called thefacebook, Facebook was founded by former-Harvard student Mark Zuckerberg (while at Harvard) who ran it as one of his hobby projects with some financial help from Eduardo Saverin. Within months, Facebook and its core idea spread across the dorm rooms of Harvard where it was very well received. Soon enough, it was extended to Stanford and Yale where, like Harvard, it was widely endorsed.
Before he knew it, Mark Zuckerberg was joined by two other fellow Harvard-students – Dustin Moskovitz and Chris Hughes – to help him grow the site to the next level. Only months later when it was officially a national student network phenomenon, Zuckerberg and Moskovitz dropped out of Harvard to pursue their dreams and run Facebook full time. In August 2005, thefacebook was officially called Facebook and the domain facebook.com was purchased for a reported $200,000.
Availability
Unlike its competitors MySpaceFriendsterXangahi5Bebo, and others, Facebook isn’t available to everyone — which explains its relatively low user count. Currently, users must be members of one of the 30,000+ recognized schools, colleges, universities, organizations, and companies within the U.S, Canada, and other English-speaking nations. This generally involves having a valid e-mail ID with the associated institution.
Surveys & Studies
A large number of surveys and studies have been conducted around Facebook – some with interesting results. For instance, according to an internal September 2005 survey, approximately 85% of the students in the supported colleges had a Facebook account, with 60% of them logging in daily. A survey conducted by Student Monitor revealed Facebook was the most “in” thing after the iPod and tying with beer, and comScore Media Metrix discovered users spend approximately 20 minutes everyday on Facebook.Another 2005 survey said 90% of all undergraduates in the U.S. use either Facebook or MySpace regularly, and a detailed questionnaire analysis by Chris Roberts revealed that 76.2% never click on its ads. Perhaps the most amazing statistic of all may be that Facebook is the 7th most trafficked site in the U.S.
    Hey Facebook Users!
    Mashable’s shiny new Facebook account is HERE – feel free to add Mashable to your friends if you sign up, or you’re already a member.
Business & Funding
Given the situation other social networks on the web are facing, Facebook is in a good position financially. While it hasn’t managed to get acquired like its rival MySpace (despite some rumors about an $800m deal with Viacom), it’s been quite lucky in most aspects. For its initial funding, it received $500,000 from Peter Theil, co-founder of PayPal. A few months later, it was also able to get $13 million from Accel Partners, who are also investors in 15 other Web 2.0 startups, and $25 million from Greylock Partners, making their overall venture equal to approximately $40 million.
For users, Facebook’s core service is completely free and ad-supported. In fact, in August 2006 Facebooksigned a three year deal with Microsoft to provide and sell ads on their site in return for a revenue split. The deal followed an announcement from Facebook’s direct competitor MySpace who signed a similar deal with Google. The youthful demographic that both the services attract is highly prized amongst advertisers and should return a good amount of revenue for both the services to stay alive – and profit. Another deal which made news in July was Facebook’s agreement with Apple to give away 10 million free iTunes samplers to Facebook users. A deal has also been signed to provide Facebook credit cards.
Lawsuits & Concerns
In its early days, Facebook faced an extremely threatening lawsuit from ConnectU, a very similar social network which – like Facebook – shares its roots back to Harvard, and as a result almost got shutdown. The founders of ConnectU alleged that Facebook’s founder Mark Zuckerberg stole source code while he was in their employment. Zuckerberg denied the allegation and the lawsuit was dismissed.
Facebook has also been host to other issues and concerns, especially in the privacy sector where its privacy policy states “Facebook also collects information about you from other sources, such as newspapers and instant messaging services. This information is gathered regardless of your use of the Web Site.” Another theory is that Facebook could also be a data-gathering project or if not, used extensively for these purposes. Facebook’s policy also states that it “may share your information with third parties, including responsible companies with which we have a relationship.”
The Service
Now, let’s look into Facebook – the service itself, and some of its features, highlights, and the things that got Facebook where it is today.
Facebook Profiles
As Facebook has evolved, so have its profile pages – new fields have been added and users can share more information than before.
A typical Facebook profile consists of a number of different sections, including Information, Status, Friends, Friends in Other Networks, Photos, Notes, Groups, and The Wall. Most of the sections are self-explanatory but some are specific to Facebook.
Facebook Photos
With over 1.5 million photos uploaded daily, one of Facebook’s most popular features has been the ability to upload photos. Users can upload unlimited photos from their cell phone or through its Java-based web interface. Facebook is one of the few services to offer an unlimited quota with their only restriction being a 60-photos-per-album limit – this is much appreciated by Facebook’s college demographic.
The process of uploading photos is very simple. Users create albums which they can assign limitations to (e.g. visible to my friends only) and upload photos within them. The album is then put into their profile, and other users with right credentials have the ability to see and comment on them. Facebook also gives the feature to share the photos with a simple web link or send them via AIM or by e-mail. What’s more, users can also order prints online through a simple integrated interface.
Facebook Groups
Just like every other social network, Facebook has something called ‘groups.’ Users can create new ones or join and participate in existing ones. This is also displayed in their profile and is a good indication of hobbies and interests a person might have.
There are two kind of groups, a normal group and a secret group, which isn’t shown on the profile. A normal group is just like any other, but users can also create and invite others into secret groups. These can be used for collaborating on university projects, and provide a way to have closed discussions. About 80% of the groups are ‘fun-related’ and companies can even sponsor groups – as is the case with, for example, the Apple users group.
Facebook Events
Another Facebook success is their ‘events’ feature, which provides the ability to organize, be part of, and plan for events. This feature has been extremely successful when it comes to organizing parties.
Along with organizing and joining events, users can also invite and recommend others to an event. This feature, however, has raised some controversy as it is generally the start of underage drinking and dry campus violations. Colleges and universities use the feature to catch planning of such events before hand and investigate those that are over. In any case, it’s one of the most popular features of the service and even beats some of the competing products made specifically for this purpose.
Facebook Developers
As of August 2006, Facebook has offered a free Developers API calledFacebook Developers. This essentially gives anyone access to Facebook’s internals and lets programmers create widgets, mashups, tools and projects based around Facebook.
This is an important feature for Facebook since it makes it the first major social network to give access to its API. Although it is limited to 100,000 requests a day, it’s more than enough for a decent web app to come through. What’s more, a selection of applications have already been created. FaceBank is a promising tool which lets you ‘keep track of depts and shared expenses with friends.’ Another interesting application islickuacious which lets you ‘rank your friends by wall popularity.’ The Wall, of course, is Facebook’s comments feature.
Facebook Notes
Facebook’s most recent addition launched in late August. The service is called Facebook Notes, and allows users to write a Facebook blog. All notes are displayed in the user’s profile, and other members can add comments.
Notes possesses an important feature, which is the ability to import and syndicate an external blog, although unlike Technorati, doesn’t allow you to claim one only to yourself (e.g. it’s possible to claim the New York Times syndication feed easily in one’s Notes). The service allows HTML to be included in the posts, although JavaScript and Flash are disabled. You can attach photos and also post via cell phone by sending your notes to notes@facebook.com. Another interesting feature is tagging – tagging a post with a username will automatically send it to that specific user. The Notes feature has been well received.
The Future
Facebook is a massively successful social networking service that grew to prominence in virtually no time. It’s not hard to see why: its features and tools are highly appealing, and Facebook users are extremely well networked in real life. Rumors of an acquisition continue to circulate, with some estimates putting the price in the billions of dollars. In the short term, however, Facebook plans to go it alone, continuing to build out one of the world’s most successful social networks.
    Hey Facebook Users!
    Mashable’s shiny new Facebook account is HERE – feel free to add Mashable to your friends if you sign up, or you’re already a member.
    Facebook Profile
Mark Zuckerberg’s Facebook Profile
    Facebook Photos
Uploading to Facebook Photos
    Facebook Groups
Facebook Groups
    Facebook Events
Facebook Events
    Facebook Notes
Facebook Notes
    Facebook Developers
Facebook Developers