Check this out!

Miyerkules, Marso 16, 2011

Configuring your Bulletproof FTP Server Tutorial

I am not sure where I found this tutorial, It’s been a while…It might even have been here... ..So if it is one of yours, my hat goes off to you once again....

After reading the excellent tutorial on "Creating an FTP" that Norway posted…

(I would suggest reading and following his tutorial first, then following up with this one)

I thought that perhaps this tutorial might be pretty helpful for those interested in knowing how to configure their Bulletproof FTP Server that don't already know how... Here's how to get started…

This is for the BulletProof FTP Server 2.10. However, It should work fine on most following versions as well.

I'm assuming you have it installed and cracked.

Basics
1. Start the program.
2. Click on Setup > Main > General from the pull-down menu.
3. Enter your server name into the 'Server Name' box. Under Connection set the “Max number of users" to any number. This is the limit as to how many users can be on your sever at any time.
4. Click on the 'options' tab of that same panel (on the side)
5. Look at the bottom, under IP Options. Put a check in the box “Refuse Multiple Connections from the same IP”. This will prevent one person from blocking your FTP to others.

Linggo, Nobyembre 28, 2010

How to hide your folder

Keep Folders Hidden

First create a new folder somewhere on your hard drive.
When you name it hold down "Alt" and press "0160" this will create and invisible space so it will appear as if it has no name.

Then right click in and select "Properties" select the tab "customize" and select "change icon" scroll along and you should a few blank spaces click on any one and click OK when you have saved the settings the folder will be invisible to hide all your personal files

Sabado, Nobyembre 13, 2010

How to Edit Movie with your PC

Follow this procedure:
1. First go to My Computer > Drive C: > Program Files > Movie Maker (find it, you should have it) then Open or Double Click the Moviemk.exe (an application that can edit movie, audio etc.)

2. There you have it. Open your video file and drag it into  Storyboard (lower part of the application).

3. And then you can edit now your video (split it, play it, put a background sound, or edit a audio file).

4. If you don't like it. You can download any Movie Editor in the Internet with some tutorial. Just Google it and download. Just be careful for downloading an application you should have an Anti-virus to be safe.

Note: If this information helps you. Just follow us on Facebook. (click the follow in the right corner of the page) Thanks a lot!
Any comment would appreciate.

Lunes, Oktubre 25, 2010

Unique Code

239NTEFBH6BK

Huwebes, Setyembre 23, 2010

How to Secure a Wireless Network from Hackers?





The reason we secure a wireless network is to stop people from using the services of our network who don't have permission to utilize them. It is harder to secure a wireless network from hackers as compared to a classic wired network. This is due to the fact that a wireless network can be accessed anywhere inside the range of its antenna.
In order to secure a wireless network from hackers, we should take proper steps to save ourselves against security issues. If you don't secure a wireless network from hackers, you might end up without its service. The consequence might also include the utilization of our network to attack further networks. To secure a wireless network from hackers, you should follow these simple wireless networking tips:


1.       Strategic antenna placement:
The first thing you have to do is to position the access point's antenna in a place which restricts the range of its signal to go further than the required area. You should not put the antenna close to a window because glass can't obstruct its signals. Place it in a central location of the building.
2.       Use WEP:
WEP stands for Wireless encryption protocol.  It's a customary technique for encrypting traffic on a wireless network. You should never skip it as that will allow hackers to get instant access to the traffic over a wireless network.
3.       Change the SSID, disable the broadcast of SSID:
SSID stands for service set identifier.  It is the recognition thread utilized by the wireless access point due to which the customers are capable of starting connections. For every wireless access point arranged, select an exclusive as well as unique SSID. Also, if it's attainable, hold back the broadcast of the SSID out over the antenna. It won\t appear in the listing of offered networks, while being able to provide services as usual.
4.       Disable DHCP:
By doing this, the hackers will have to decode the TCP/IP parameters, subnet mask as well as the IP address in order to hack your wireless network.
5.       Disable or modify SNMP settings:
Change the private as well as public community settings of SNMP. You can also just disable it. Otherwise the hackers will be able to utilize SNMP to get significant info regarding your wireless network.
6.       Utilize access lists:
 For additional security of your wireless network, and if your access point support this feature, employ an access list. An access list lets us determine precisely which machinery is permitted to attach to an access point. The access points which include the access list can employ trivial file transfer protocol (TFTP) now and then in order to download modernized lists to steer clear of hackers.

Sabado, Setyembre 11, 2010

10 Fast and Free Security Enhancements

Before you spend a dime on security, there are many precautions you can take that will protect you against the most common threats.

1. Check Windows Update and Office Update regularly (_http://office.microsoft.com/productupdates); have your Office CD ready. Windows Me, 2000, and XP users can configure automatic updates. Click on the Automatic Updates tab in the System control panel and choose the appropriate options.

2. Install a personal firewall. Both SyGate (_www.sygate.com) and ZoneAlarm (_www.zonelabs.com) offer free versions.

Martes, Agosto 31, 2010

A Basic Guide to the Internet

The Internet is a computer network made up of thousands of networks worldwide. No one knows exactly how many computers are connected to the Internet. It is certain, however, that these number in the millions.

No one is in charge of the Internet. There are organizations which develop technical aspects of this network and set standards for creating applications on it, but no governing body is in control. The Internet backbone, through which Internet traffic flows, is owned by private companies.

All computers on the Internet communicate with one another using the Transmission Control Protocol/Internet Protocol suite, abbreviated to TCP/IP. Computers on the Internet use a client/server architecture. This means that the remote server machine provides files and services to the user's local client machine. Software can be installed on a client computer to take advantage of the latest access technology.

Google Chrome contains many features that can be harnessed by webmasters to deliver a better end-user experience. Google Chrome comes with Gears built in, which allows webmasters to take advantage of APIs such as offline storage. In addition, Google Chrome allows your web application to look and feel like a "desktop" application, as users can launch Google Chrome in a mode with a minimalist UI, featuring nothing but a title bar.




Mozilla Firefox is a free and open source web browser descended from the Mozilla Application Suite and managed by Mozilla Corporation. As of August 2010, Firefox was the second most widely used browser, with 22.93% of worldwide usage share of web browsers, according to Net Applications.Other sources put Firefox's usage share between 20% and 32%. To display web pages, Firefox uses the Gecko layout engine, which implements most current web standards in addition to several features which are intended to anticipate likely additions to the standards.



Windows Internet Explorer (formerly Microsoft Internet Explorer; commonly abbreviated to IE), is a series of graphical web browsers developed by Microsoft and included as part of the Microsoft Windows line of operating systems starting in 1995. It was first released as part of the add-on package Plus! for Windows 95 that year. Later versions were available as free downloads, or in service packs, and included in the OEM service releases of Windows 95 and later versions of Windows.



Opera is a web browser and Internet suite developed by Opera Software. The browser handles common Internet-related tasks such as displaying web sites, sending and receiving e-mail messages, managing contacts, chatting on IRC, downloading files via BitTorrent, and reading web feeds. Opera is offered free of charge for personal computers and mobile phones. Features include tabbed browsing, page zooming, mouse gestures, and an integrated download manager. Its security features include built-in phishing and malware protection, strong encryption when browsing secure websites, and the ability to easily delete private data such as HTTP cookies.


 

Safari is a graphical web browser developed by Apple and included as part of the Mac OS X operating system. First released as a public beta on January 7, 2003 on the company's Mac OS X operating system, it became Apple's default browser beginning with Mac OS X v10.3 "Panther". Safari is also the native browser for the iOS. A version of Safari for the Microsoft Windows operating system, first released on June 11, 2007, supports Windows XP, Windows Vista, and Windows 7. The latest stable release of the browser is 5.0.2, which is available as a free download for both Mac OS X and Microsoft Windows. As of 2010[update], Safari is the fourth most widely used browser in the US.


 
Maxthon (pronounced /ˈmækstən/ and formerly known as MyIE2) is a China-based freeware web browser for Microsoft Windows. From its early MyIE2 roots, Maxthon has developed a growing user base, especially in China, and in 2006 it received commercial backing for Maxthon 2.0. Maxthon 3, currently on Release Candidate, supports both Trident and the WebKit engine. Maxthon seeks to provide many rich features and a highly customizable user interface, without losing compatibility with Internet Explorer. In January 2006, Maxthon developers partnered with Microsoft in its booth at the Consumer Electronics Show. Maxthon won its first WebWare 100 Award in 2005, and won the WebWare 100 Award also in 2008 and 2009. Maxthon is reported to be the second most popular browser in China, and it has been downloaded more than 500 million times world wide.


Advertise