<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Coderinsider - Ethical hacking,Programming,Cyber security,Internet Security,tricks and tips</title><description>Coderinsider is a blog about cyber security,internet and network security,ethical hacking ,programming,linux,windows,</description><managingEditor>noreply@blogger.com (cyb3rnoob)</managingEditor><pubDate>Fri, 1 Nov 2024 03:33:55 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">11</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://coderinsider.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Coderinsider is a blog about cyber security,internet and network security,ethical hacking ,programming,linux,windows,</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Why Facebook is blue in color </title><link>http://coderinsider.blogspot.com/2015/12/why-facebook-is-blue-in-color.html</link><category>Facebook</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Mon, 28 Dec 2015 05:35:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-4269696881266369188</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjGlu-JjVqZSCizd9p7dIpphWeC-P43D3Ete5Dh7zTJN3W2OL__di6cnBXddXQqNbyte07mLmWXy5jVjPOMHI9XO7Ez7Aeget_LW7kcpx7fnvhC8lAtXGWa2yxS4DVhnCLM3px-1fbHY/s1600/why+facebook+is+blue+in+color.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjGlu-JjVqZSCizd9p7dIpphWeC-P43D3Ete5Dh7zTJN3W2OL__di6cnBXddXQqNbyte07mLmWXy5jVjPOMHI9XO7Ez7Aeget_LW7kcpx7fnvhC8lAtXGWa2yxS4DVhnCLM3px-1fbHY/s400/why+facebook+is+blue+in+color.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
Welcome , Today we are going to talk about the Big Blue App&amp;nbsp; having billions of users world wide that why Facebook is blue ever and ever .As you may have notice that every apps coming of the Facebook are blue in color what the heck is this . From logos to their background , From icons to typography all comes in blue in color.&lt;br /&gt;
The reason behind this is :&lt;br /&gt;
According to The New Yorker, the reason is simple. It’s because Mark Zuckerberg is red-green colorblind. This means that blue is the color Mark can see the best. In his own words Zuck says:&lt;br /&gt;&lt;br /&gt;
“Blue is the richest color for me; I can see all of blue.”&lt;br /&gt;
&lt;br /&gt;
Not highly scientific right? Well, although in the case of Facebook.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
 &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaxDfBWUuHzbFZFScwzOVS0o5vTtZA7lmXzatPhkQcig1Iv_GKS82lO49SbYt51zNwdAimPAh4_pN6jPOmuhXctMTqML_nzz1WqDOYR0O9-Npyn4SUg12QbFc48qFtLpY3sXqH3kE5bwY/s1600/the+facebook.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="258" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgaxDfBWUuHzbFZFScwzOVS0o5vTtZA7lmXzatPhkQcig1Iv_GKS82lO49SbYt51zNwdAimPAh4_pN6jPOmuhXctMTqML_nzz1WqDOYR0O9-Npyn4SUg12QbFc48qFtLpY3sXqH3kE5bwY/s400/the+facebook.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;So Blue Color is the lucky color for Mark Zuckerberg . therefore all the Apps and other services that are nearly coming  expectedly will be blue in color.Facebook are keeping their color maintain for a while from "thefacebook.com" till now and also the Statistics Shows that blue is the color which both males and females likes the most.&lt;br /&gt;
&lt;br /&gt;
Another Cool things as you may see about hyperlink they are all blue in color ,its not only in facebook but all the web around as you see you may encounter the hyperlinks color .The reason behind this is that hyperlinks blue in colors are highly contrasted and clearly shown to every users &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;
 &lt;o:OfficeDocumentSettings&gt;
  &lt;o:AllowPNG/&gt;
 &lt;/o:OfficeDocumentSettings&gt;
&lt;/xml&gt;&lt;![endif]--&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
“Tim Berners-Lee, the main inventor of the web, is believed to be the man who first made hyperlinks blue. Mosaic, a very early web browser, displayed webpages with a (ugly) gray background and black&lt;br /&gt;
text. The darkest color available at the time that was not the same as the black text was that blue color. Therefore, to make links stand apart from plain text, but still be readable, the color blue was selected.”&lt;br /&gt;
 &lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgUjGlu-JjVqZSCizd9p7dIpphWeC-P43D3Ete5Dh7zTJN3W2OL__di6cnBXddXQqNbyte07mLmWXy5jVjPOMHI9XO7Ez7Aeget_LW7kcpx7fnvhC8lAtXGWa2yxS4DVhnCLM3px-1fbHY/s72-c/why+facebook+is+blue+in+color.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Backup or restore your files in windows</title><link>http://coderinsider.blogspot.com/2015/12/backup-or-restore-your-files-in-windows.html</link><category>Windows</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Sat, 26 Dec 2015 02:19:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-6609660154688803607</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuWQKntB94AsLGFGyfc8eFqycZ0hqXAWV9H-2ud-1yx5sS7Zm5-3de5NeNneVEGkgP_WTkI0IortLVXvkF5goAmtjcdX4tBrioPC_0KmdWOe9PkfnWT8RbZeXyMfUO5v7Wx6M5OPbDE2E/s1600/win7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuWQKntB94AsLGFGyfc8eFqycZ0hqXAWV9H-2ud-1yx5sS7Zm5-3de5NeNneVEGkgP_WTkI0IortLVXvkF5goAmtjcdX4tBrioPC_0KmdWOe9PkfnWT8RbZeXyMfUO5v7Wx6M5OPbDE2E/s320/win7.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;br /&gt;What’s the difference between using “Back up or restore your Files” in Windows 7 and buying a portable hard dive featured in your website like Seagate or Western digital? &lt;br /&gt;&lt;br /&gt;&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg"&gt;&lt;/a&gt;What is the point in buying a portable hard drive if one can back up everything for free using Windows backup as described in &lt;a href="http://windows.microsoft.com/en-US/windows7/Back-up-your-files"&gt;this link&lt;/a&gt;?&lt;br /&gt;
&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;/a&gt;&amp;nbsp;Backing up your files using the above method is a good way of preserving an additional copy of your important files. But, although this will provide protection against accidental deletion, it offers no protection against other common causes of data loss such as hard drive failure or theft of your entire PC. &lt;br /&gt;&lt;br /&gt;The Notes section of the page to which you have linked, provides a clue to the answer: “We recommend that you don’t back up your files to the same hard drive that Windows is installed on” &lt;br /&gt;&lt;br /&gt;If you make a backup copy of your data onto the same hard drive as the original files, consider what happens when that hard drive breaks down – both the original and the backup copy will be lost and you will have no way of recovering your data. &lt;br /&gt;&lt;br /&gt;Backing up your files on to an external hard drive means that, when your PC’s hard drive fails, you can buy a new one and then restore all of your carefully backed up data from the external drive. &lt;br /&gt;&lt;br /&gt;If you keep your external hard drive away from your PC, then there’s a good chance that if your PC were to be stolen, the external hard drive might be left behind. This means you would be able to restore your data onto a new PC. Microsoft recommends a “fireproof location separate from your computer” – leaving a second copy with a friend or neighbour would be even more secure. &lt;br /&gt;&lt;br /&gt;A more convenient way to back up your data offsite, would be to use one of the many available cloud storage services. See also: Top 20 cloud storage services &lt;br /&gt;&lt;br /&gt;This method automatically backs up your data to secure online servers and gives you the added benefit of being able to access your data from anywhere in the World. Most of the time you can also access your files on the move via smartphones and other mobile devices. &lt;br /&gt;&lt;br /&gt;Backing up your files via the Internet does take much longer and costs will depend on the volume of data you need to back up. &lt;br /&gt;&lt;br /&gt;There are however many ways to back up data online free of charge. For example, if you sign up to Microsoft’s SkyDrive service you will get 7GB of free storage space. Microsoft suggest that this is enough to store around 20,000 Office documents or 7,000 photos. &lt;br /&gt;&lt;br /&gt;You could also use Dropbox.com, which will give you another 2GB of free storage that can be increased for free if you refer the service to friends. &lt;br /&gt;&lt;br /&gt;If you have a lot of photos, you can upload them to Flickr.com. Signing up to the service will give you 1TB of free storage; room for around 500,000 smartphone photos.&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuWQKntB94AsLGFGyfc8eFqycZ0hqXAWV9H-2ud-1yx5sS7Zm5-3de5NeNneVEGkgP_WTkI0IortLVXvkF5goAmtjcdX4tBrioPC_0KmdWOe9PkfnWT8RbZeXyMfUO5v7Wx6M5OPbDE2E/s72-c/win7.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>how to stop cryptolocker</title><link>http://coderinsider.blogspot.com/2015/12/how-to-stop-cryptolocker.html</link><category>Internet Security</category><category>Windows</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Sat, 26 Dec 2015 02:13:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-1330079508434801685</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmNx04WXT5xXbPKTXIJSR3-TvG6d_FpwTBkdxwfPlVOTqeMAMA0s9s7c2bSxIcN_b6KQieqdZBPv5Fxxp7Kv8AAcnLJGDfWxzNU1FOcRPLoRnkyunups-dWYpllnwCEzjTc-M8SHoV56g/s1600/c.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="378" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmNx04WXT5xXbPKTXIJSR3-TvG6d_FpwTBkdxwfPlVOTqeMAMA0s9s7c2bSxIcN_b6KQieqdZBPv5Fxxp7Kv8AAcnLJGDfWxzNU1FOcRPLoRnkyunups-dWYpllnwCEzjTc-M8SHoV56g/s640/c.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Your concerns are valid as CryptoLocker is a particularly nasty piece of malware that can effectively destroy files on Windows-based PCs beyond the ability of any data recovery process (see our other feature:&lt;a href="http://coderinsider.blogspot.com/2015/12/how-to-stay-safe-from-cryptolocker-and.html"&gt; how to protect yourself from CryptoLocker)&lt;/a&gt;. Unlike other viruses, which may simply delete your files, allowing for the possibility of some file recovery, CryptoLocker will securely encrypt them, making recovery impossible without the encryption key held by the attackers. This is offered only in exchange for a ransom payment. &lt;br /&gt;
&lt;br /&gt;
Paying the required fee is also no guarantee that your files will be decrypted and restored to you. Other malware has employed similar tactics in the past, but CryptoLocker's encryption is much more secure and is currently not possible to crack. &lt;br /&gt;
&lt;br /&gt;
The steps to guard against CryptoLocker are essentially the same good practices that should be employed to guard against any malware attack or hardware failure: &lt;br /&gt;
&lt;br /&gt;
Make sure you're using antivirus software and that it's kept up to date. Thankfully, most antivirus applications can now detect and remove CryptoLocker, but are only of use if they catch it before the encryption occurs. &lt;br /&gt;
&lt;br /&gt;
Also make sure that you regularly back up all your data. These backups should be in a form that's disconnected from your computer, as CryptoLocker will seek out any connected USB drives and network shares, and attempt to encrypt those files, too. This can also apply to files being synced to Cloud services, although you should often be able to retrieve previous, and therefore unencrypted, versions of these files via the Cloud service provider. Users of Windows starting with XP Service Pack 2 may also be able to retrieve previous (and therefore unencrypted) versions of their files, by right-clicking on an encrypted file and selecting Properties, then 'Previous Versions'. &lt;br /&gt;
&lt;br /&gt;
For peace of mind, it's a good idea to perform an image backup right now and store it on a USB drive that you don't keep permanently connected. &lt;br /&gt;
&lt;br /&gt;
Email is CryptoLocker's primary mode of attack, so avoid opening any email attachments from untrusted sources or that appear in any way suspicious. This should include attachments sent from banks or financial institutions and, particularly in the case of CryptoLocker, from courier companies or from Companies House. Also ensure the email scanning feature of your antivirus software is configured and enabled. &lt;br /&gt;
&lt;br /&gt;
If you want to check right now whether CryptoLocker has found its way onto your PC, you can download and run &lt;a href="http://coderinsider.blogspot.com/2015/12/20152016s-best-antivirus-best-free.html"&gt;Malwarebytes Anti-Malware&lt;/a&gt;. This will scan for the Trojan and remove it for you if discovered. If CryptoLocker has already encrypted your files, then it will display a message demanding payment. Unfortunately, by this time it's too late to recover your files if they are not backed up. You will then have to consider whether to give in to the attackers' demands for the slim chance of receiving a decryption key.&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmNx04WXT5xXbPKTXIJSR3-TvG6d_FpwTBkdxwfPlVOTqeMAMA0s9s7c2bSxIcN_b6KQieqdZBPv5Fxxp7Kv8AAcnLJGDfWxzNU1FOcRPLoRnkyunups-dWYpllnwCEzjTc-M8SHoV56g/s72-c/c.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>2015/2016's best antivirus &amp; best free antivirus for PC and laptop UK </title><link>http://coderinsider.blogspot.com/2015/12/20152016s-best-antivirus-best-free.html</link><category>Internet Security</category><category>Windows</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Sat, 26 Dec 2015 02:01:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-4923787899485144240</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCaXKYopcV3hKd3NWTcR88wrei3sUQ8Q49xDBza_ced7mYDbI4P4bvTwioms_jj_7iQy_oaK1tD68fqjeAGN2RdZsGCqTICJWu796Can1QfaTd2rQZnOfErGBNRohMCcvZRkBezaKTGys/s1600/best+antivius.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="270" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCaXKYopcV3hKd3NWTcR88wrei3sUQ8Q49xDBza_ced7mYDbI4P4bvTwioms_jj_7iQy_oaK1tD68fqjeAGN2RdZsGCqTICJWu796Can1QfaTd2rQZnOfErGBNRohMCcvZRkBezaKTGys/s400/best+antivius.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
2015/2016's best antivirus &amp;amp; best free antivirus for PC and laptop UK  &lt;/h3&gt;
&lt;b&gt;Best antivirus: Why you need antivirus - What is antivirus? &lt;/b&gt;&lt;br /&gt;
Antivirus software detects, and then prevents, disarms or removes malicious programs or malware, often referred to as 'viruses'. Antivirus doesn't offer a perfect solution to the problem of malware, but it is a critical first step to securing your PC or laptop. To help prevent viruses infecting your PC you must install antivirus, and then regularly update your antivirus software. All of the antivirus software reviewed here will update automatically. &lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Best antivirus: what's the difference between free antivirus and paid antivirus?&amp;nbsp;&lt;/h4&gt;
Our tests focus on paid-for and free AV products. Paid-for AV products usually offer better technical support and more comprehensive protection features than free programs, but free is free. Internet security suites go further still, offering firewalls, parental controls, identity theft protection and more. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
15. &lt;a href="http://www.eset.com/us/support/download/home/"&gt;ESET NOD32 Antivirus &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0LMsoH-znaoxA_-VS2z_WAznvdPEyChu7ytDiLkoaGw1iyDZJeaPGUzTDcWxME3x03zzH9hqyyKnn57J11KE-DCFq1VibT8zQg0FsgHTr6Fp_VsyfXD_skli0WQV8IAuSLqfT3vLWvrU/s1600/eset.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0LMsoH-znaoxA_-VS2z_WAznvdPEyChu7ytDiLkoaGw1iyDZJeaPGUzTDcWxME3x03zzH9hqyyKnn57J11KE-DCFq1VibT8zQg0FsgHTr6Fp_VsyfXD_skli0WQV8IAuSLqfT3vLWvrU/s200/eset.jpg" width="200" /&gt;&lt;/a&gt;ESET NOD32 Antivirus is a sound antivirus product with some useful extras, though it’s a bit surprising anti-spam isn't included in the product. The software is easy to use and doesn't disrupt the normal function of a PC it’s running on. Technically, it's a strong contender, without being in the front rank. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
14. &lt;a href="http://www.webroot.com/nz/en/"&gt;Webroot Internet Security Plus 2015&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVJ3j2Rk5OZonqHgIeLRA5K7NGAjDlQaEOmhkgl3mZb56aukiuvBuFPWFmL7vFnJS5SsRt_xrC03Ey6gJ5raaXAfP6rdkxbOPF_CPtnK0ozA92YEhEPWTJlRu0eL8uRg_2ZtqefwPE23s/s1600/webroot.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVJ3j2Rk5OZonqHgIeLRA5K7NGAjDlQaEOmhkgl3mZb56aukiuvBuFPWFmL7vFnJS5SsRt_xrC03Ey6gJ5raaXAfP6rdkxbOPF_CPtnK0ozA92YEhEPWTJlRu0eL8uRg_2ZtqefwPE23s/s200/webroot.jpg" width="200" /&gt;&lt;/a&gt;&amp;nbsp; &lt;br /&gt;
It’s not possible to compare Webroot’s offering with the others in terms of AV efficacy, as we have no test results, but the company’s claim to scan fast and leave a light impression looks fair. &lt;br /&gt;
13. &lt;a href="http://www.pandasecurity.com/usa/homeusers/solutions/global-protection/"&gt;Panda Global Protection 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk0CrRpV5744L7dGqd69UIraapbp3YBCfalFBjEHk5GyJJeFPdSY5NzR-zylV8aNZURdHQ64yt1vhXoHgoua6uq14pEToxHqBz7kVx0M0tqtuuDuQxe377TOiyZocbnY3z_LbPzj03_to/s1600/google+panda.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="147" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjk0CrRpV5744L7dGqd69UIraapbp3YBCfalFBjEHk5GyJJeFPdSY5NzR-zylV8aNZURdHQ64yt1vhXoHgoua6uq14pEToxHqBz7kVx0M0tqtuuDuQxe377TOiyZocbnY3z_LbPzj03_to/s200/google+panda.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &lt;br /&gt;
Panda Global Protection 2015 is a good option, if you need to protect a range of different devices from Windows PCs to Macs and Android machines. Not quite as generous as McAfee's ‘as-many-as-you-like' offering and a point off the perfect score in AV-Test's testing, the Panda product costs £20 less, too and is particularly easy to use. &lt;br /&gt;
&lt;br /&gt;
12. &lt;a href="https://www.gdatasoftware.com/downloads"&gt;G-Data Internet Security 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6vp-nbM7aRWiEJYVHL-O1-HIxjhSw0whMa76CzKDy-6-aM3E8m9US7PhVmE5tdD6CUDWF4l1XhFJJtf6Qxx6ZmpHVz1IzWplM_5UCdunuXcuKw-EkZB8cJkDHIBvUP5lmDCEcngMcM7s/s1600/gdata.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6vp-nbM7aRWiEJYVHL-O1-HIxjhSw0whMa76CzKDy-6-aM3E8m9US7PhVmE5tdD6CUDWF4l1XhFJJtf6Qxx6ZmpHVz1IzWplM_5UCdunuXcuKw-EkZB8cJkDHIBvUP5lmDCEcngMcM7s/s200/gdata.jpg" width="200" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
G-Data Internet Security 2015 is relatively inexpensive for a full-featured security suite. It's not the most successful at beating out web threats, but it is sufficiently good to be worth installing. A decent purchase, if not the best. &lt;br /&gt;
&lt;br /&gt;
11. &lt;a href="http://www.mcafee.com/us/"&gt;McAfee LiveSafe 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFLILNbpmgYKzXTkmDLNSI_-AB3-xa8-PicpZmDgKO4mafxnNmDB0YJEDXcu2ermyumUcirRtMUx0xozQZYZCAjaG7WuDklh4qNKiP41s0fr5Iihyphenhyphend0SDaGupWsRAMXhiDy3oJglpeP3I/s1600/mcafee.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFLILNbpmgYKzXTkmDLNSI_-AB3-xa8-PicpZmDgKO4mafxnNmDB0YJEDXcu2ermyumUcirRtMUx0xozQZYZCAjaG7WuDklh4qNKiP41s0fr5Iihyphenhyphend0SDaGupWsRAMXhiDy3oJglpeP3I/s200/mcafee.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &lt;br /&gt;
If you run a couple of home Windows PCs, a Mac, a tablet and a smartphone, or a similar combination, McAfee LiveSafe 2015 is an economical way of protecting them all and providing anti-theft facilities on the mobile devices. While the feature set of the IS component of the package may lack back-up and PC tune-up, the power of its AV protection can't be denied. &lt;br /&gt;
&lt;br /&gt;
10. &lt;a href="http://free.avg.com/ww-en/homepage"&gt;AVG Free Antivirus 2016&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXELfQMrGsxVgqLLgT6a0Lwd3qO3SLC9pawSMVC80DmzLQRwL0TUk3zlGuVUIRVgD2aHqC0MtHVV7E-t2FMCGyTXSDdnSEB__4q68XG13mc93N7rJWbjPK3DGtKolh9w9VG7Vk7WMgxj4/s1600/avg.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiXELfQMrGsxVgqLLgT6a0Lwd3qO3SLC9pawSMVC80DmzLQRwL0TUk3zlGuVUIRVgD2aHqC0MtHVV7E-t2FMCGyTXSDdnSEB__4q68XG13mc93N7rJWbjPK3DGtKolh9w9VG7Vk7WMgxj4/s200/avg.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
AVG Free continues to be one of the best free antivirus programs you can download. It offers a good selection of key protections, though you do have to be careful to install the right product. &lt;br /&gt;
&lt;br /&gt;
9. &lt;a href="https://www.avast.com/index"&gt;Avast Free Antivirus 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSo8XlckglnDotJYF1sjv7EBZ7LR0o0h_9nCoOVys59NA7BQjKAwzvDafeOH8u7d3gnHNmmKIBYL45I_W4_7k-rSTorCvOIMMQiyQn1dMJ21BHP23lC4fpQhat3YcOKf45IwQrYONJ9W0/s1600/avast.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSo8XlckglnDotJYF1sjv7EBZ7LR0o0h_9nCoOVys59NA7BQjKAwzvDafeOH8u7d3gnHNmmKIBYL45I_W4_7k-rSTorCvOIMMQiyQn1dMJ21BHP23lC4fpQhat3YcOKf45IwQrYONJ9W0/s200/avast.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
Avast Free Antivirus 2015 is one of the best free security products you can install. It offers a surprising range of free goodies, including application and browser app analysis and, separately, an excellent Android suite, covering AV and anti-theft. A better than average AV-Test rating &lt;br /&gt;
&lt;br /&gt;
8. &lt;a href="http://www.pandasecurity.com/usa/homeusers/solutions/free-antivirus/"&gt;Panda Free Antivirus 2016&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLfiTeaNJx5GKLehuT2EG7qVVRYQQvdn_rb46jdPwMBOEPyZLicfFAM_adJRSMIj9iGPuFnuoaEmGo06WGSH8_anwbxcpByXPzzxx3TPS9w4dFzuFHlTD_L6HgllM-7DNSmFOm-M2aLuU/s1600/panda+free.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLfiTeaNJx5GKLehuT2EG7qVVRYQQvdn_rb46jdPwMBOEPyZLicfFAM_adJRSMIj9iGPuFnuoaEmGo06WGSH8_anwbxcpByXPzzxx3TPS9w4dFzuFHlTD_L6HgllM-7DNSmFOm-M2aLuU/s200/panda+free.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Panda is one of the leading antivirus providers and this free offering includes a couple of interesting extras. We were surprised at the time it took for both the initial and follow-up test &lt;br /&gt;
&lt;br /&gt;
7. &lt;a href="https://www.360totalsecurity.com/en/"&gt;Qihoo 360 Total Security 2016&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0HcEhSnnBY4iPGRq9ghSJPBMtTChduyAyGl4w6F071QnOHRRNBtlZLY935r8vJ8U5Hro78o60tqj8AqYLy7KPAkA3IX4vvMXOxXslo1MJW3mvJREzBFFerwtPs9c4rTWW9PJhbAp-p2U/s1600/Qihoo+340.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0HcEhSnnBY4iPGRq9ghSJPBMtTChduyAyGl4w6F071QnOHRRNBtlZLY935r8vJ8U5Hro78o60tqj8AqYLy7KPAkA3IX4vvMXOxXslo1MJW3mvJREzBFFerwtPs9c4rTWW9PJhbAp-p2U/s200/Qihoo+340.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; If you want the extra features that Total Security 2016 offers over and above a plain free antivirus product, then Qihoo isn't a bad choice. And if you do install it, you should head straight into the settings and enable the Bitdefender scanner. &lt;br /&gt;
&lt;br /&gt;
6. &lt;a href="http://downloadcenter.trendmicro.com/"&gt;Trend Micro Internet Security 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuyA7Gwyn_I73XKj5WaNPLcik4VSs36DAnwSk11EpbAMrUTrj2Ys9IpidUU9-68b-sZ4DM6Bmv2TF9pwFiRDLvx_vEjpmANEe6-45wBBYf6akIY3L2OXSgc_ezJ2ZIEA21XYw7fScnArg/s1600/trend+micro.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuyA7Gwyn_I73XKj5WaNPLcik4VSs36DAnwSk11EpbAMrUTrj2Ys9IpidUU9-68b-sZ4DM6Bmv2TF9pwFiRDLvx_vEjpmANEe6-45wBBYf6akIY3L2OXSgc_ezJ2ZIEA21XYw7fScnArg/s200/trend+micro.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; With such a good performance and the lower asking price, Trend Internet Security 2015 represents very good value, even though it misses out on certain extras offered by some of its competition. &lt;br /&gt;
&lt;br /&gt;
5. &lt;a href="http://www.bitdefender.com/solutions/free.html"&gt;BitDefender Antivirus Free Edition 2016&lt;/a&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3rh5D2IdhLyOQGGFOi2T6srtR80dSEr0D3oiJTPA3BspR2XxPW2E1w3-VbhIjczwzm66pzPTigH2tDoLexmbwyuqqGVyWelbqfG0kWKGb3PlleV9vHKMKyooAcdtLVt0ZPkJMdgoNXrM/s1600/bitdefender.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3rh5D2IdhLyOQGGFOi2T6srtR80dSEr0D3oiJTPA3BspR2XxPW2E1w3-VbhIjczwzm66pzPTigH2tDoLexmbwyuqqGVyWelbqfG0kWKGb3PlleV9vHKMKyooAcdtLVt0ZPkJMdgoNXrM/s200/bitdefender.jpg" width="200" /&gt;&lt;/a&gt;BitDefender Free Edition will suit a certain kind of user, one who just wants to install the software and let it do its job, without recourse to setup changes or manually scans. Since it has such a high protection score, it’s safe to do this, but if you prefer to have more hands-on control, you may find this approach frustrating. &lt;br /&gt;
&lt;br /&gt;
4. &lt;a href="http://www.avira.com/en/avira-free-antivirus"&gt;Avira Free Antivirus 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWYQrjMfUytQfu-6qd5ldqoZANsAgWPdXBpEEvZzIdiYFedmJWuX-0M7D_oOIYXWFhleDhspD9ZfGAeVJZwUZ5TqPlxnZsEf7oF-AqaOK2H5FCnpOxhpSmjke7-CWw21POkSx3Vy7g4y4/s1600/avaira.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWYQrjMfUytQfu-6qd5ldqoZANsAgWPdXBpEEvZzIdiYFedmJWuX-0M7D_oOIYXWFhleDhspD9ZfGAeVJZwUZ5TqPlxnZsEf7oF-AqaOK2H5FCnpOxhpSmjke7-CWw21POkSx3Vy7g4y4/s200/avaira.jpg" title="" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; Overall, this is one of the best free AV applications you’re going to find. With perfect scores from AV-Test, a good range of facilities for a zero-cost suite and a well-designed interface which is easy to use and direct, Avira Free Antivirus 2015 is a great choice to protect your PCs. &lt;br /&gt;
&lt;br /&gt;
3. &lt;a href="http://usa.kaspersky.com/products-services/home-computer-security/total-security/"&gt;Kaspersky Total Security 2015&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVe2WfjVlqu-jSJuXg1U6o3eTAuq-ARkcYztJe8Ir7_ORA5IXcPBMhMr6GCvxlnAaKHlhGkRAXmbRSj93qLnEpp3HfU6LkDl7ioZjuakxhHceRDHRMN7qOQ2dPis1ZgLqIolSrI2DaOQs/s1600/kaspersky.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="112" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhVe2WfjVlqu-jSJuXg1U6o3eTAuq-ARkcYztJe8Ir7_ORA5IXcPBMhMr6GCvxlnAaKHlhGkRAXmbRSj93qLnEpp3HfU6LkDl7ioZjuakxhHceRDHRMN7qOQ2dPis1ZgLqIolSrI2DaOQs/s200/kaspersky.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; A three-device, full protection IS suite for under £50 is good value and when that includes cover on all the major platforms, it should be flexible enough for most. Kaspersky Total Security 2015’s technical strength can’t be faulted, with only Avira Anti Virus Pro matching it in the AV-Test group. &lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgDgjQRrzFozyvV7b8N7bbVJpcuA9TnDrIgdSFEh7LSGR2JgW-mErEgtVtt5ed5yDwbbfT64W8gcbybQvAF01G3Z3_BHiQYPo9d4gjmnWVUd6eBaqiOnux8adf4iqKyC1F_OvkUwqNcAQ/s1600/malwarebytes.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="130" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgDgjQRrzFozyvV7b8N7bbVJpcuA9TnDrIgdSFEh7LSGR2JgW-mErEgtVtt5ed5yDwbbfT64W8gcbybQvAF01G3Z3_BHiQYPo9d4gjmnWVUd6eBaqiOnux8adf4iqKyC1F_OvkUwqNcAQ/s200/malwarebytes.png" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;
2.&lt;a href="https://www.malwarebytes.org/antimalware/" target="_blank"&gt; Malware Bytes Antimalware&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
Malware Bytes Protects you from various types of malicious softwares like worms , viruses, trojan horses and also recomended&amp;nbsp; by security professionals . &lt;br /&gt;
&lt;br /&gt;
1. &lt;a href="http://symantec-norton.com/"&gt;Symantec Norton Security with Backup&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
Offering excellent value with 10 licences to cover all your devices, Norton Security with Backup also offers a strong feature set and very good protection from viruses and other malware. Recommended. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCaXKYopcV3hKd3NWTcR88wrei3sUQ8Q49xDBza_ced7mYDbI4P4bvTwioms_jj_7iQy_oaK1tD68fqjeAGN2RdZsGCqTICJWu796Can1QfaTd2rQZnOfErGBNRohMCcvZRkBezaKTGys/s72-c/best+antivius.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to stay safe from Cryptolocker and GOZeuS</title><link>http://coderinsider.blogspot.com/2015/12/how-to-stay-safe-from-cryptolocker-and.html</link><category>Internet Security</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Sat, 26 Dec 2015 01:12:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-5103631468149517060</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
The UK’s National Crime Agency along with the FBI, Europol and various security softwarefirms have worked together to temporarily pause the attacks from the Cryptolocker and GOZeus malware. Here’s what you need to know about keeping your PC and data safe. See also: &lt;a href="http://coderinsider.blogspot.com/2015/12/how-to-stop-cryptolocker.html"&gt;How to stop Cryptolocker&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfKFX4GwT6tBiLFR59JMITywAXwNJtdEHNsLcQtm8eO9Pi797c5Bz6X0afHtgOE07VSKbkXpgvJqBH36vTHlJiOd5c0h8J1JFmmu9m5XvD92hHSYnPd8Bn6ZmkDDaGHr8BCnE7vTtCNA/s1600/c.png"&gt;&lt;img border="0" height="377" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfKFX4GwT6tBiLFR59JMITywAXwNJtdEHNsLcQtm8eO9Pi797c5Bz6X0afHtgOE07VSKbkXpgvJqBH36vTHlJiOd5c0h8J1JFmmu9m5XvD92hHSYnPd8Bn6ZmkDDaGHr8BCnE7vTtCNA/s640/c.png" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Operation Tovar: in a nutshell&lt;br /&gt;
Since From 30th May, law enforcement agencies, internet service providers and tech security firms from 11 countries have teamed up to try and stop infected computers from communicating with each other. &lt;br /&gt;
It has been fairly effective, but they admit that they can’t keep the criminals’ network down for long. That’s why there are so many headlines telling you that you have two weeks to protect your PC.&lt;br /&gt;
In fact, the malware has been around for a long while and is thought to have infected over 15,000 computers in the UK already. However, because the criminal network’s “command and control” is weakened, the government has said this is a “window of opportunity” to protect your PC. &lt;br /&gt;
Cryptolocker and GOZeuS: what’s the threat? &lt;br /&gt;
&lt;br /&gt;
Both are nasty pieces of malware. Cryptolocker encrypts your files and demands a ransom to decrypt them. However, there’s no guarantee that you’ll get access to your files if you pay up, and there’s no other way to decrypt them. &lt;br /&gt;
&lt;br /&gt;
GOZeuS (GameOverZeuS, also known as P2PZeuS) is an advanced piece of malware that scans your PC for financial – banking – details and other valuable personal data which the criminals can sell on. &lt;br /&gt;
The two work together with Cryptolocker kicking in after GOZeuS has done its dirty work. &lt;br /&gt;
&lt;br /&gt;
How to stay safe &lt;br /&gt;
&lt;br /&gt;
Our advice is simple, and the same as always: &lt;br /&gt;
&lt;br /&gt;
1 – Keep Windows up to date with the latest security patches and other fixes. This should happen automatically, unless you disabled Windows Update. To check if Windows is up to date, run the Windows Update tool. Search for in in the Start menu. &lt;br /&gt;
&lt;br /&gt;
2 – Make sure your antivirus or internet security suite is fully up to date and hasn’t been disabled. If you haven’t installed any antivirus software, or you’ve let a subscription lapse, be sure to re-subscribe or install some free software such as AVG or Avira. &lt;a href="http://coderinsider.blogspot.com/2015/12/20152016s-best-antivirus-best-free.html"&gt;Here are the 15 best antivirus programs for PCs and laptops &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg"&gt;&lt;/a&gt;3 – Don’t open email attachments or click on links in emails unless you’re certain they’re safe. This is how most phishing attacks work, and don’t assume that just because an email is from a trusted person that attachments and links are safe. Their email password may have been hacked and the criminals are using their account to send out phishing emails. Expect to receive emails purporting to be from your internet service provider or the government asking you to click on links or open attachments. These are the ways in which criminals try to fool you and get you to give them personal information. If anything seems suspicious - such as greetings saying 'Dear customer' rather than your full name - delete the email immediately. &lt;br /&gt;
If you do click on a link or open an attachment, the malware may install itself automatically, so always be on your guard. &lt;br /&gt;
&lt;br /&gt;
4 – Back up your most important documents. This is absolutely vital to protect against Cryptolocker. It doesn’t matter if your files are encrypted if you have an up-to-date back up. You can simply restore the files, perhaps after reinstalling Windows if it comes to it. &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;/a&gt;Here’s how to create a backup strategy, but if you don’t have time to read that, the most important thing is to copy the contents of your user folder (Documents, Photos, Videos and any other files that can’t be easily replaced) to a portable hard drive that you can store separately from your PC. See also: &lt;a href="http://coderinsider.blogspot.com/2015/12/backup-or-restore-your-files-in-windows.html"&gt;How to back up files in Windows&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
A network-connected backup drive such as a NAS may be susceptible to Cryptolocker, so you need an offline backup to be safe. &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;/a&gt;&lt;a href="http://cdn2.pcadvisor.co.uk/cmsdata/features/3523019/National-Crime-Agency-014.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;/a&gt;5 – Finally, if your PC or laptop has a webcam, you might consider covering it up with a piece of masking tape as these malicious programs may be able to access your device’s cameras and take photos or video.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Check your PC Many of the antivirus companies have made special tools that you can run to check if your computer is infected. These can be used even if you have antivirus software from a different company:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.f-secure.com/en/web/home_global/online-scanner" target="_blank"&gt;F-Secure Online scanner&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.f-secure.com/en/web/labs_global/removal-tools/-/carousel/view/142" target="_blank"&gt;F-Secure Rescue CD&lt;/a&gt; (Windows XP)&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://support.kaspersky.com/viruses/utility#kasperskyvirusremovaltool" target="_blank"&gt;Kaspersky removal tool&lt;/a&gt; (if you think your computer is infected with malware)&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://support.kaspersky.com/8005" target="_blank"&gt;Kaspersky Cryptolocker tool&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.mcafee.com/stinger" target="_blank"&gt;McAfee Stinger&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.us-cert.gov/redirect?url=http%3A%2F%2Fwww.microsoft.com%2Fsecurity%2Fscanner%2Fen-us%2Fdefault.aspx" target="_blank"&gt;Microsoft Safety Scanner&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.sophos.com/VirusRemoval" target="_blank"&gt;Sohpos&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.symantec.com/connect/blogs/international-takedown-wounds-gameover-zeus-cybercrime-network" target="_blank"&gt;Symantec&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.trendmicro.com/threatdetector" target="_blank"&gt;Trend Micro Threat Detector&lt;/a&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsfKFX4GwT6tBiLFR59JMITywAXwNJtdEHNsLcQtm8eO9Pi797c5Bz6X0afHtgOE07VSKbkXpgvJqBH36vTHlJiOd5c0h8J1JFmmu9m5XvD92hHSYnPd8Bn6ZmkDDaGHr8BCnE7vTtCNA/s72-c/c.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Hide your IP Address to Serve and Browse the Internet Safe and Anonymously.</title><link>http://coderinsider.blogspot.com/2015/12/hide-your-ip-address-to-stay-anonymously.html</link><category>Internet Security</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Thu, 24 Dec 2015 09:54:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-5488691541522536825</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAe6jyrLYNgys7NZX7rYzDUFanM3-GbZ-v2oGS0RfAo-_qOWLdSCaDBWe8-M8Js5FoEyFstav5VT6q_MYpssTye-WD4osLBihN8PdpuiZB_CWj9VTKnGy3TlkcJT_EQgM0YzXuXdqYtWg/s1600/how+to+hide+ip+address.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="293" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAe6jyrLYNgys7NZX7rYzDUFanM3-GbZ-v2oGS0RfAo-_qOWLdSCaDBWe8-M8Js5FoEyFstav5VT6q_MYpssTye-WD4osLBihN8PdpuiZB_CWj9VTKnGy3TlkcJT_EQgM0YzXuXdqYtWg/s400/how+to+hide+ip+address.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
How to Hide the IP Address: &lt;/h2&gt;
&lt;br /&gt;
Every computer on the 
Internet has a unique IP address allotted to it which makes it possible 
to trace it back to its exact location. Even though the concept of IP 
address has been designed for its transparency and traceability, in some
 cases this questions the privacy of the Internet users where one would 
not like to reveal his/her identity to the outside world. &lt;br /&gt;
&lt;br /&gt;
Well,
 if you are one such person who is in search of ways to hide your IP 
address, then you are at the right place. In this post, I will discuss 
some of the easy and popular ways to mask your IP address so that your 
identity and privacy is kept safe. &lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Why Hide IP Address? &lt;/h4&gt;
&lt;br /&gt;
The following are some of the common reasons why people want to mask their IP address online: &lt;br /&gt;
&lt;br /&gt;
1.     By hiding the IP address, people can browse websites anonymously without leaving the trace of their identity. &lt;br /&gt;
&lt;br /&gt;
2.    To access websites and portals that are not available to the IP address’s Geo location. &lt;br /&gt;
&lt;br /&gt;
3.    Stay safe from intruders and hackers by showing a fake IP to the world and keeping real IP concealed. &lt;br /&gt;
&lt;br /&gt;
4.   Hiding IP means hiding geographical location. &lt;br /&gt;
&lt;br /&gt;
5.    Hiding IP prevents leaving a digital footprint of their online activity. &lt;br /&gt;
&lt;br /&gt;
How to Hide Your IP? &lt;br /&gt;
&lt;br /&gt;
Some of the most common ways to hide IP and safeguard your online identity are discussed below: &lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
1.       Using a VPN Proxy – Safe and Secure Way to Hide IP&lt;/h4&gt;
&lt;h4 style="text-align: left;"&gt;
What is VPN &lt;/h4&gt;
According to Webopedia VPN, or virtual private 
network, is a network that is constructed by using public wires — 
usually the Internet — to connect to a private network, such as a 
company's internal network. There are a number of systems that enable 
you to create networks using theInternet as the medium for transporting 
data. These systems use encryption and other security mechanisms to 
ensure that onlyauthorized users can access the network and that the 
data cannot be intercepted. &lt;br /&gt;
&lt;br /&gt;
Using a trusted VPN proxy 
service is the best way to conceal your IP address during your online 
activities. Here is a list of most popular and highly reliable VPN proxy
 services that will hide your IP address: &lt;br /&gt;
&lt;br /&gt;
Here are the
 list of Some Free VPNs out there which can transfer your public IP 
Address to the one specify by their services.All have their own 
Advantages and Disadvantages depending on their services they provided. &lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
Top 5 VPNs &lt;/h3&gt;
&lt;h4 style="text-align: left;"&gt;
1.Cyberghost VPN &lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Positives:&lt;/b&gt; Great if you want 
to surf websites with web-optimized content. Cyberghost VPN special 
edition only cost you $1.24/monthly though it also offers a ‘Free Proxy’
 service that changes your IP to let you visit your chosen, often 
blocked, websites, anonymously. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Negatives:&lt;/b&gt; The 
free version works seamlessly if you don’t count the paid advertisements
 that keep popping up. The free version chooses your server for you and 
does not automatically reconnect in the event of a disconnection. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Downloaded From &lt;a href="http://www.cyberghostvpn.com/en_us/download/windows" target="_blank"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
2. Spotflux Free VPN &lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Positives:&lt;/b&gt; Spotflux Free VPN is 
essentially free for Windows and Mac. The speed is also good enough to 
provide a moderately smooth user experience. The innovative system tray 
icon makes it easy to keep track of your connection status. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Negatives:&lt;/b&gt;
 The software does not automatically configure proxies. Therefore, 
manual proxy server entry is required. Moreover, the software sometimes 
needs to be restarted in order to restart browsing. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Downloaded From &lt;a href="https://spotflux.com/" target="_blank"&gt;here&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
3. TunnelBear &lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Positives:&lt;/b&gt; All server locations are 
accessible to free users and a 1GB is added to the data limit as a 
reward if the user tweets about TunnelBear. The user interface is user 
friendly with a minimal learning curve. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Negatives:&lt;/b&gt; The
 monthly surfing limit of 500 MB per month means using it to watch 
movies or play online games is virtually impossible. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Downloaded From &lt;a href="https://www.tunnelbear.com/download/" target="_blank"&gt;Here&lt;/a&gt;.&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
4. Hotspot Shield &lt;/h4&gt;
&lt;br /&gt;
Positives: The free VPN service of 
Hotspot Shield effectively circumvents a majority of viewing and 
download blocks. The free version works almost as good as the paid 
version. &lt;br /&gt;
&lt;br /&gt;
Negatives: The free Hotspot Shield VPN can be
 instantly downloaded. However, it comes with a barrage of paid 
advertisements. Moreover, redirects to advertisements dominate the 
screen from time to time, which is extremely annoying and spoils the 
experience. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Downloaded From &lt;a href="http://www.hotspotshield.com/" target="_blank"&gt;Here&lt;/a&gt;&lt;/b&gt;&lt;a href="http://www.hotspotshield.com/" target="_blank"&gt; &lt;/a&gt;&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
5. Security KISS &lt;/h4&gt;
&lt;br /&gt;
&lt;b&gt;Positives:&lt;/b&gt; The Security Kiss 
Green Plan, another name for its free VPN service, allows unlimited 
server switching across servers located in 4 countries. OpenVPN, PPTP 
and L2TP are available with multi-platform support. Want to know the 
best bit of all? No ads! &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Negatives&lt;/b&gt;: Sporting a 
data limit of 300 MB/day, the free plan does not support streaming, 
email, VoIP and games. Only security gateways located in the US, UK, 
France and Germany are available to the free user.&lt;br /&gt;
You don’t get 
access to the Security Kiss dedicated and fast servers, and the 
connection speed rarely reaches even half of the claimed 100Mbit/s. The 
package is better than the others but the service offers very restricted
 leg room to make for a comfortable user experience. &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Downloaded From &lt;a href="https://www.securitykiss.com/resources/download/" target="_blank"&gt;Here&lt;/a&gt;&lt;/b&gt;&lt;a href="https://www.securitykiss.com/resources/download/" target="_blank"&gt; &lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Besides this you can also use Browser Extensions. &lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;1.    Zenmate : &lt;/b&gt;&lt;/h3&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;Add to&amp;nbsp; Chrome From &lt;a href="https://chrome.google.com/webstore/detail/zenmate-security-privacy/fdcgdnkidjaadafnichfpabhfomcebme?hl=en" target="_blank"&gt;Here&lt;/a&gt;:&lt;/b&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;
&lt;b&gt;Add to Firefox&amp;nbsp; From &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/zenmate-security-privacy-vpn/?src=search" target="_blank"&gt;Here&lt;/a&gt;:&lt;/b&gt; &lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;2.    Browsec : &lt;/b&gt;&lt;/h3&gt;
Add to Firefox From &lt;b&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/browsec/?src=ss" target="_blank"&gt;Here &lt;/a&gt;:&amp;nbsp;&lt;/b&gt; &lt;br /&gt;
&lt;br /&gt;
Add to Chrome&amp;nbsp; From &lt;b&gt;&lt;a href="https://chrome.google.com/webstore/detail/browsec/hnnifklofdcglhalbfplihibjdnmapak?hl=en" target="_blank"&gt;Here&lt;/a&gt;: &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Now lets Dive into our awesome Opensource alternatives which provide numerous of features and Privacy Protection &lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;Open VPN&lt;/b&gt;&amp;nbsp; :&lt;br /&gt;
This
 is Open source alternative of the Above mention VPNs which have 
provided their services to the common plateform ie Windows , Mac 
,Andriod and IOS.You can download Open VPN for Free from &lt;b&gt;&lt;a href="https://openvpn.net/" target="_blank"&gt;Here &lt;/a&gt;&lt;/b&gt;Video Tutorials for complete configuration of VPNs are coming soon in a couple of day.I am working on it soon it will uploaded. &lt;br /&gt;
&lt;br /&gt;
Another Great Open Source alternative are TOR browser . &lt;br /&gt;
&lt;br /&gt;
According
 to TOR official site .The Tor software protects you by bouncing your 
communications around a distributed network of relays run by volunteers 
all around the world: it prevents somebody watching your Internet 
connection from learning what sites you visit, it prevents the sites you
 visit from learning your physical location, and it lets you access 
sites which are blocked. &lt;br /&gt;
&lt;br /&gt;
You can visit their site to download the tor Browser from &lt;b&gt;&lt;a href="https://www.torproject.org/projects/torbrowser.html.en" target="_blank"&gt;Here&lt;/a&gt;. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAe6jyrLYNgys7NZX7rYzDUFanM3-GbZ-v2oGS0RfAo-_qOWLdSCaDBWe8-M8Js5FoEyFstav5VT6q_MYpssTye-WD4osLBihN8PdpuiZB_CWj9VTKnGy3TlkcJT_EQgM0YzXuXdqYtWg/s72-c/how+to+hide+ip+address.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Downloading Windows 7  ISOs officially for free from official  sources along with checksums and md5 hashes</title><link>http://coderinsider.blogspot.com/2015/12/downloading-window-7-ISOs-legally.html</link><category>Windows</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Thu, 24 Dec 2015 08:37:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-5756459126372502715</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title entry-title" itemprop="name headline"&gt;
&lt;/h1&gt;
&lt;div class="title-secondary"&gt;
&lt;span class="post-timestamp"&gt;

&lt;span itemprop="datePublished" title="2015-12-19T09:22:00+05:00"&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="post-header"&gt;
&lt;div class="post-header-line-1"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0EnS38gkxRpsx-gdR7kwdRRwC2zqqG8EdqM_YZE3Dr2MidxajXthWAIh98Tik1TmPvHuB5ME7UiFKg7S345VzLamPXtWk9UR1-8DGN3KzE4NcPCXeZ4F-EnSGYAnolDO_S8oJLMAWpAu/s1600/windows+7.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="291" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0EnS38gkxRpsx-gdR7kwdRRwC2zqqG8EdqM_YZE3Dr2MidxajXthWAIh98Tik1TmPvHuB5ME7UiFKg7S345VzLamPXtWk9UR1-8DGN3KzE4NcPCXeZ4F-EnSGYAnolDO_S8oJLMAWpAu/s400/windows+7.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Hello Guys In this tutorial I wanna Walk u through the downloading 
step of Windows 7from official sources without spying or without 
malicious stuffs&amp;nbsp; (:&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
For years, Microsoft allowed us to download Windows 7 ISOs. They did
 it using their content delivery partner, Digital River. On February 
2015, the company decided to take down those links. Thankfully, there is
 an independent mirror where we can download Windows 7 ISOs, legally and
 for free. &lt;br /&gt;
&lt;br /&gt;
Even though it would work, downloading Windows 7 from
 questionable sources is never a good idea. For all we know, it could 
contain a host of malware: rootkits, trojans, keyloggers,etc etc 
whatever  you name it. &lt;br /&gt;
&lt;br /&gt;
That's why it was a big deal that 
Microsoft allowed us to download Windows 7 as an ISO through Digital 
River. We could download Windows 7 and be sure that the ISO was clean 
and untampered. &lt;br /&gt;
&lt;br /&gt;
And then, in early February 2015, Microsoft decided to take down the Digital River ISOs, for good. &lt;br /&gt;
&lt;br /&gt;
Sure, they have set up the &lt;a href="https://www.microsoft.com/en-us/software-download/home" target="_blank"&gt;Microsoft Software Recovery website&lt;/a&gt;, the "official" way to download Windows 7 &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
The clean way to download Windows 7 &lt;br /&gt;
&lt;br /&gt;
The good news is that whatever goes up on the Internet, never really goes away - for better or for worse. &lt;br /&gt;
&lt;br /&gt;
The German mirror &lt;a href="http://mirror.corenoc.de/"&gt;http://mirror.corenoc.de/&lt;/a&gt;
 has done an exceptional job gathering the Digital River ISOs and 
uploading them as torrent files. They have all the different English 
versions and even a few in other languages.Now Enjoy your Downloading 
and Stayed Connected&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ0EnS38gkxRpsx-gdR7kwdRRwC2zqqG8EdqM_YZE3Dr2MidxajXthWAIh98Tik1TmPvHuB5ME7UiFKg7S345VzLamPXtWk9UR1-8DGN3KzE4NcPCXeZ4F-EnSGYAnolDO_S8oJLMAWpAu/s72-c/windows+7.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Youtube tricks and Tips that you don'nt want to miss it</title><link>http://coderinsider.blogspot.com/2015/12/youtube.html</link><category>Youtube</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Wed, 23 Dec 2015 21:42:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-9124418102203741486</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_9pSiiJjjpdGCJM7FdEvexbNQo-X_E4oWLh3dvpDeBi3lL_Kg7ukWpDoyRg0Gqeb0E8gdt2gW0wxrDDHjM94Q2lts39BR6feZL8vaRT6QveJX5_jwZNiL8gWAO-_-p8Mn9HnlS9bOJTo/s1600/Tips-and-Tricks-on-YouTube.jpg"&gt;&lt;img border="0" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_9pSiiJjjpdGCJM7FdEvexbNQo-X_E4oWLh3dvpDeBi3lL_Kg7ukWpDoyRg0Gqeb0E8gdt2gW0wxrDDHjM94Q2lts39BR6feZL8vaRT6QveJX5_jwZNiL8gWAO-_-p8Mn9HnlS9bOJTo/s640/Tips-and-Tricks-on-YouTube.jpg" width="640" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;YouTube&lt;/b&gt; Tricks, Tips &amp;amp; Secret Features You Might Have Missed&lt;br /&gt;
YouTube, the extremely popular video sharing website averaging more than 3 billion page views per day needs no introduction to its fans who spend a considerable amount of their time watching and sharing videos on it. While most of these users know every nook and corner of this website, there are some features that are hidden deep within, in a manner that only few of the most experienced users seem to know about them. This article contains some such features, tips and tricks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube MySpeed&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
Are YouTube videos taking too much time to load on your internet connection? Visit the &lt;a href="http://www.youtube.com/my_speed"&gt;YouTube MySpeed&lt;/a&gt; page to find your video streaming speed and compare it with the average speed of your ISP, your city, your state, your country and the world.&lt;/div&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube Disco&lt;/h4&gt;
YouTube is all set to replace your music players with &lt;a href="https://www.youtube.com/disco"&gt;YouTube Disco&lt;/a&gt;. This music discovery project allows you to find the videos of your choice, create a list of them and then easily watch them without having the need to choose a new video after the one you are watching is finished.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube Editor&lt;/h4&gt;
Do you edit your videos before uploading them to YouTube? Now, you don't need to because it lets you to do all of that online with &lt;a href="http://www.youtube.com/editor"&gt;YouTube Editor&lt;/a&gt;; well not all of that but it at least lets you combine, trim and rotate videos. The best part about YouTube Editor is that it allows you to find copyright free music that you can add to your videos. It also offers some comparably advanced features like stabilizing shaky videos and inserting transitions.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube TV&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
YouTube lets you watch the videos of your choice but have you ever wanted to just sit back and enjoy watching videos just like you watch television? If you have, then &lt;a href="https://www.youtube.com/tv"&gt;YouTube TV&lt;/a&gt; can be of help. YouTube TV plays high quality full screen videos tailored to your choices (if you are signed in to your &lt;a href="https://www.blogger.com/p/internet.html#Google"&gt;Google&lt;/a&gt; account). If you are not signed in, you can choose a category to watch videos from, watch featured videos and even search for the video of your choice. You can then &lt;a href="https://www.blogger.com/03/connect-laptop-computer-to-television.html"&gt;connect your TV to your computer&lt;/a&gt; to seamlessly enjoy TV, YouTube style.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
Set default video playback quality&lt;/h4&gt;
Are you annoyed at manually changing the quality of every YouTube video you watch? Now you don't need to, because YouTube has an &lt;a href="http://www.youtube.com/account_playback" target="_blank"&gt;option&lt;/a&gt; that automatically lets you select the quality of videos you see. If you have a slow connection, you can select the option of never playing high quality videos. You can also select the option of showing captions and annotations automatically.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Watch Videos blocked in your country with a URL trick&lt;/h4&gt;
If the URL of the video that is &lt;a&gt;&lt;/a&gt; is youtube.com/watch?v={video-id}, you can access it by going to youtube.com/v/{video-id}. As an additional advantage, you will be able to view the video at the full size of your browser window.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Link to a specific time in a video&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
If you want to link to a video at a specific time, you can add #t=XXs to the URL where XX is a variable which represents the number of seconds after which the video will start.&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
Play videos in slow motion&lt;/h4&gt;
Press the space bar while a video is being played to play it in slow motion.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube Live&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
Ever wanted to broadcast your videos live on the internet? YouTube Live lets you do just that. YouTube Live supports larger production than Hangouts on Air. However, to broadcast videos live, your channel must be in &lt;a href="https://support.google.com/youtube/answer/2797387"&gt;good standing&lt;/a&gt;.&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
Create a feed of almost anything on YouTube&lt;/h4&gt;
Just go to the &lt;a href="http://gdata.youtube.com/demo/index.html"&gt;YouTube Data API&lt;/a&gt; page and build a custom &lt;a href="http:///#"&gt;feed&lt;/a&gt; for yourself. However, there is a problem with the URI generated for specific categories as "{http://gdata.youtube.com/ schemas/ 2007/ categories.cat}" is also added to it. Remove this and the URI is good to go.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Find out what is popular on YouTube&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
Want to find the best videos on YouTube? Use &lt;a href="http://www.youtube.com/charts"&gt;Popular on Youtube&lt;/a&gt; channel to find what other users are watching, discussing and favoring. You can select a particular category to determine the best videos in that particular category. You also have the option to play all the videos that are popular right now.&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
Legally Watch Full Length Movies and TV Shows on YouTube&lt;/h4&gt;
YouTube has a &lt;a href="http://www.youtube.com/movies"&gt;dedicated page&lt;/a&gt; to allow users to watch full-length ad supported movies for free. Movies are classified based on their genre and are offered in full HD quality. Movies are uploaded by the creators for the purpose of creating another source of revenue for themselves as Google gives them a portion of the advertising revenue. A similar page &lt;a href="http://www.youtube.com/shows"&gt;exists for TV shows&lt;/a&gt;. These two pages are country specific and may or may not be available in your country.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube Easter eggsFor Star Wars and Star Trek fans&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
If you are a Star Wars fan, then there is some good news for you. YouTube has an easter egg just for you guys. Search YouTube for "use the force, Luke" to warp your screen. Star Trek fans need not be disappointed as there is an easter egg for them as well. Searching YouTube for "Beam me up, Scotty" reveals it.&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
YouTube Snakes Easter egg&lt;/h4&gt;
You can play the classic Snakes game while watching any video in your browser. Just pause a video, hold the left arrow key for 2 seconds and while still holding it, press the Up arrow key. This only works in the new YouTube player on videos played on YouTube.com.&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
Do the Harlem shake&lt;/h4&gt;
Search YouTube for "do the Harlem shake" and the entire page will shake violently with the song "Harlem Shake" by Baauer being played in the background.&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_9pSiiJjjpdGCJM7FdEvexbNQo-X_E4oWLh3dvpDeBi3lL_Kg7ukWpDoyRg0Gqeb0E8gdt2gW0wxrDDHjM94Q2lts39BR6feZL8vaRT6QveJX5_jwZNiL8gWAO-_-p8Mn9HnlS9bOJTo/s72-c/Tips-and-Tricks-on-YouTube.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>About us</title><link>http://coderinsider.blogspot.com/2015/12/about-us.html</link><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Tue, 22 Dec 2015 10:24:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-4538622290743176184</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnEswWPHnmUKZgWXxHmzUe1FzOowQntOC1JD-o5DXAqZak1xNQh3674D9suNnaqGmeoLmHQziP_nf1XpjRc-j6IZTYHDo4JGif3pmzaLjnrXL1lIdn-RJz40QnyW7jj5t1vvtk96aje3V/s1600/wel.gif" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="190" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnEswWPHnmUKZgWXxHmzUe1FzOowQntOC1JD-o5DXAqZak1xNQh3674D9suNnaqGmeoLmHQziP_nf1XpjRc-j6IZTYHDo4JGif3pmzaLjnrXL1lIdn-RJz40QnyW7jj5t1vvtk96aje3V/s400/wel.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
Hello readers I am so glade to welcome you in my blog.The aim of this 
blog is to provide you the latest and pure technologies .You can found  
amazing tricks and tips relating to our day to day life in computer 
world.The focus of my blog is on Programming ,Internet Technologies  and
 especially cyber security.Here you can learn Ethical Hacking from 
scratch ,fom where you start and to where you go.Here we have provide 
numerous amount of resources  that are official and teach by companies 
professionals and experts which you can get benefits of it .This blog I 
am starting is differ from other here in one plateform you can find the 
numerous of tricks ,tips  ,hecks and technologies . All of the stuff 
provided by this blog is Ethical . If u follow the steps and apply ur 
skills in Good way U can become a successuful security experts . All the
 stuff provided by this blog is for Education Purpose only. If u do 
something wrong with this then I am not responsible for that . Here we 
have provided Pentester Labs which u can play with it ethically and 
legally . You can test ur skills here and improve your skills . The 
resources and cources we are providing here are completely free and open
 cources.So joining me and stayed connected with me to learn the latest 
trends in technology .Thanks&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfnEswWPHnmUKZgWXxHmzUe1FzOowQntOC1JD-o5DXAqZak1xNQh3674D9suNnaqGmeoLmHQziP_nf1XpjRc-j6IZTYHDo4JGif3pmzaLjnrXL1lIdn-RJz40QnyW7jj5t1vvtk96aje3V/s72-c/wel.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Downloading Wndows 10  ISOs directly from Microsofot Server withour Media Creation Tools .</title><link>http://coderinsider.blogspot.com/2015/12/downloading-wndows-10-isos-directly.html</link><category>Windows</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Tue, 22 Dec 2015 10:21:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-7537147212872447264</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
In this tutorial I am going to show u how to Download windows 10 iso 
directly from Microsoft server without media Creation Tool .&lt;br /&gt;
&lt;br /&gt;
Step 1 : By using Chrome Browser First of All go to Microsoft Official Site.&lt;br /&gt;
&lt;a href="https://www.microsoft.com/en-us/software-download/windows10"&gt;https://www.microsoft.com/en-us/software-download/windows10&lt;/a&gt;&lt;br /&gt;
Now Open the web inspector tool in chrome from menu or Direct from command CRTL+SHIFT+C .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA0kV8uET5AfhXmVwnRJcVakwGeCFW4eTog0KBMqfc8a-ttwcAgw5Sxeyanc_LwBppBIdOgDBAX5cHuHnRPDlJJLuHwuai4WAiNHRl5Bd9bdFj9_TVOarpXZ3yeEw4GayqymYDt1ZV97Ap/s1600/step1.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="170" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA0kV8uET5AfhXmVwnRJcVakwGeCFW4eTog0KBMqfc8a-ttwcAgw5Sxeyanc_LwBppBIdOgDBAX5cHuHnRPDlJJLuHwuai4WAiNHRl5Bd9bdFj9_TVOarpXZ3yeEw4GayqymYDt1ZV97Ap/s320/step1.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Step 2 : Now Click on the mobile Phone icon located in the Top right of 
the Window and Select the Device Apple Ipad from the Drop Down list.and 
Refresh the page to view the site on Apple Ipad view.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9kwoJbkbIESDCMQtOfu21gv5bhFof3yZVsLmjIRGeCiGe_5u2InB3x98Kmpbz8YZHJqLEtJaftdhCOKHYmxk23yDdzeAxDCcfBHbz7Ln9pQljy74UcDfPC8C5bt-hGan-WjlZEaNateKU/s1600/step2.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="170" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9kwoJbkbIESDCMQtOfu21gv5bhFof3yZVsLmjIRGeCiGe_5u2InB3x98Kmpbz8YZHJqLEtJaftdhCOKHYmxk23yDdzeAxDCcfBHbz7Ln9pQljy74UcDfPC8C5bt-hGan-WjlZEaNateKU/s320/step2.PNG" width="320" /&gt;&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
Step 3 :Now you can see the option Select Edition . select your desire 
Edition in my case  i choose Window 10 and click confirm .it will load 
for a while now u will see select language . Select your desire language
 and confirm. &lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioYFBHVVYD7f8CYNEDxleW37lR7ItFDV7rpWyFD_pcC565thgPx8KxefEeA5op8QhiVvDqYtvBlRtnz4N-u4J7RRqRD5jgdIutRs-64bmrleh8wV46lkZHt-WVyRuoA6S2efC3MlO7P0mo/s1600/step3.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEioYFBHVVYD7f8CYNEDxleW37lR7ItFDV7rpWyFD_pcC565thgPx8KxefEeA5op8QhiVvDqYtvBlRtnz4N-u4J7RRqRD5jgdIutRs-64bmrleh8wV46lkZHt-WVyRuoA6S2efC3MlO7P0mo/s320/step3.PNG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="" style="clear: both; text-align: center;"&gt;
Step 4 : Now u can See two option for Download for different OS 32 or 64
 select your choice and go . Now it will Start Downloading .&amp;nbsp; &lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYFQIRQ5De3mKkZ4IdE_gLFNlF2fde5fstwtoUBZlTPfUBTeI7xscyr_PHdY3KQ-m1In2zD5vD_TzF512azbrPVJl7U_6qOmwqiQkGQCxHvdFBP4ozj7ci0OLatknuOmnZblJYAZdJUk9T/s1600/step4.PNG" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYFQIRQ5De3mKkZ4IdE_gLFNlF2fde5fstwtoUBZlTPfUBTeI7xscyr_PHdY3KQ-m1In2zD5vD_TzF512azbrPVJl7U_6qOmwqiQkGQCxHvdFBP4ozj7ci0OLatknuOmnZblJYAZdJUk9T/s320/step4.PNG" /&gt;&lt;/a&gt;&lt;/div&gt;
Thats it .Enjoy !&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiA0kV8uET5AfhXmVwnRJcVakwGeCFW4eTog0KBMqfc8a-ttwcAgw5Sxeyanc_LwBppBIdOgDBAX5cHuHnRPDlJJLuHwuai4WAiNHRl5Bd9bdFj9_TVOarpXZ3yeEw4GayqymYDt1ZV97Ap/s72-c/step1.PNG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What is hacking</title><link>http://coderinsider.blogspot.com/2015/12/what-is-hacking.html</link><category>Ethical hacking</category><author>noreply@blogger.com (cyb3rnoob)</author><pubDate>Tue, 22 Dec 2015 10:17:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6026854684548278084.post-3134411587830031859</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgabpsqYs4faISgc2m1MGefSfcPXP4U59WlQyhFMe-r4qEOO0fbP6qoT7p8BBOrdlc0ialTXvKq4fM-3l2mqORfOBc93EdY7hoeaR59g38Nh6W3gcX-eA7C9vmAcZB5Muu0u_05s3Dnhq4/s1600/Hacker.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="197" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgabpsqYs4faISgc2m1MGefSfcPXP4U59WlQyhFMe-r4qEOO0fbP6qoT7p8BBOrdlc0ialTXvKq4fM-3l2mqORfOBc93EdY7hoeaR59g38Nh6W3gcX-eA7C9vmAcZB5Muu0u_05s3Dnhq4/s320/Hacker.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
Hacking is the practice of modifying the features of a system, in order 
to accomplish a goal outside of the creator's orignal purpose . The 
person who is consistently engaging in hacking activities, and has 
accepted hacking as a lifestyle and philosophy of their choice, is 
called a hacker.Computer hacking is the most popular form of hacking 
nowadays , especially in the field of computer security , but hacking 
exists in many other forms. such as phone hacking , brain hacking, 
website hacking , system hacking etc&lt;br /&gt;
Due to mass attention given to black hackers from the media , the whole 
hacking term is often mistaken for any security related cyber crimes, 
This damages the reputation of all hackers, and is very cruel and unfair
 to the law abiding ones of them.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
Types of Hackers :&lt;/h3&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj80zWdLuOohYazDOCKCyx7th4Bcpv2Cl1EkjYSHebA4zMKm6uCsBJhkDQQoNLZh_qe096-iDhzIwK6hFYUS7f4d8Bei9v2D_3Pj4uZH7XwJ-M9HYESWv2kEbQTiFaRWlIuIuaOSdHxaDw/s1600/hackers+has.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj80zWdLuOohYazDOCKCyx7th4Bcpv2Cl1EkjYSHebA4zMKm6uCsBJhkDQQoNLZh_qe096-iDhzIwK6hFYUS7f4d8Bei9v2D_3Pj4uZH7XwJ-M9HYESWv2kEbQTiFaRWlIuIuaOSdHxaDw/s320/hackers+has.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style="text-align: left;"&gt;
&amp;nbsp;&lt;/h3&gt;
&lt;h3 style="text-align: left;"&gt;
Hackers can be categorized due to their tasks . Major types of hackers are :&lt;/h3&gt;
&lt;h4 style="text-align: left;"&gt;
1.White Hat Hackers :&lt;/h4&gt;
These are those hackers that apply their skills and knowledge in good 
way . These are the the people whose job is finding vulnerabilities and 
holes in the systems of an organization and fix it. They are hire by the
 companies to find weaknises in their systems . They have authoritative 
access to their systems and do his pentesting. These type of hackers are
 called Ethical Hackers . they are legally allowed by the authorities of
 the organizations to their their jobs and finding wholes in their 
systems . They have to paid for this if the Hackers finding some 
vunerabilities in their systems.&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
2.Black Hat Hackers :&lt;/h4&gt;
These are the types of hackers that apply their skills and knowledge in 
bad things . These types of hackers are called Crackers.They are Cyber 
Criminals , They gain access to the organizations systems without their 
permissions of the authorities , They illegally access their accounts 
and secrets which violates their rights .These types of hackers are 
wanted by FBI and NSA .&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
3.Grey Hat Hackers :&lt;/h4&gt;
These are the hackers that are in between the two . They sometime do the
 job of white hat sometime the black hat .They are hire by the 
organization . Sometimes they access to the organizations that secrets 
data which he has not permission for accessing it They find 
vulnerabilities in their systems . but sometimes they exploit it itself 
and asked for the organization to pay for this .&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgabpsqYs4faISgc2m1MGefSfcPXP4U59WlQyhFMe-r4qEOO0fbP6qoT7p8BBOrdlc0ialTXvKq4fM-3l2mqORfOBc93EdY7hoeaR59g38Nh6W3gcX-eA7C9vmAcZB5Muu0u_05s3Dnhq4/s72-c/Hacker.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>