
Tuesday, August 18, 2009
Game Informer : Xbox 360 at 54.2 percent failure rate
Unfortunately, for having the highest failure rate, survey participants also pinned Microsoft for having the least helpful customer service representatives. Not that it matters – later in the survey, only 3.8 percent of participants said they'd never buy another Xbox 360 due to its high failure rate.
Speaking of which, we're not sure what future techno-utopia this poll was conducted in, but a 54.2 percent Xbox 360 failure rate sounds awfully low. Had the survey's participants been comprised entirely of Joystiq staffers, it would have been a bone-chilling 100 percent
Sunday, August 16, 2009
Free Tools to Back Up Your Online Accounts
Next time your favorite web site is down or you're locked out of an account, make sure you've got the crucial info you need where you can get to it: on your computer.
"But I don't need backup if my data's in the cloud," you say. "Big companies with lots of servers are better at backup than little old me could ever be." That's true, but cloud computing does come with risks. Depending on an external service to host, update, and maintain the software you love and the data you need is both the cloud's advantage and disadvantage: you're putting your stuff on computers you don't control at a single point of access (or failure). Companies get shut down or bought, accounts get locked up, servers (and you) go offline. If you store your email, photos, documents, contacts, bookmarks, and journal entries in the cloud, there are easy ways to back up all that information from popular online services to your computer. You know, just in case.
Back Up Your Gmail
Command line geeks who want to automate the process, see how to back up Gmail with fetchmail. Otherwise, you can fire up a desktop email client (like Thunderbird, which stores your mail in standard mbox files) and simply download your messages every month or so. Alternately, check out the previously-mentioned Gmail Backup utility. If you're willing to fork over a few bucks a month, BackupMyMail supports Gmail, Yahoo, and Hotmail accounts and also offers a free trial.
Back Up Your Flickr Account
Back Up Your Google Docs
Back Up Your Twitter Account
Command line lovers can use this clever method to download their tweet XML via cURL. Alternately, web application Backup My Tweets does just that and lets you download your tweets in HTML, PDF, or JSON format, with a gotcha: you have to tweet about Backup My Tweets in order to use the free trial. We posted about tweet backup solutionTweetake, which outputs your tweets in a CSV file, but be warned: Tweetake requires you enter your Twitter username and password on their site, which isn't the most secure option the Twitter API offers. (Don't enter your Twitter password anywhere other than Twitter.com itself; if you do to use a Twitter-related service, change it immediately afterward.) For more Twitter archiving options, check out the social media experts' picks over at ReadWriteWeb.
Back Up Your Facebook Account
Back Up Your Blog (Tumblr, WordPress, and Others)
Tumblr users should check out this handy tumble-log backup utility, which sucked in and spit out 272 of my tumblelog's posts in a flash. Folks hosting their own WordPress installation should check out the WP-DB-Backup plug-in, which emails you or saves regular backups of your blog's database. I personally have restored my blog using output from this plug-in, but my fellow editor The How-To Geek had a bad experience with the plug-in. He recommends backing up your web server with rsync and a regular mysqldump command.
If your blog is hosted at Blogger or another service, you can use a web site copying utility to spider its pages and save them as HTML to your computer. For more on how to do that on the Mac or PC, see the previously posted Ask Lifehacker: How Do I Back Up My Blog?.
You can also mirror an entire web site to your hard drive using the hackable command line tool wget. Similarly, a well-formed cURL command can back up your Delicious bookmarks.
Hackers Put Social Networks Such as Twitter in Crosshairs
Web sites such as Twitter are becoming increasingly favored by hackers as places to plant malicious software in order to infect computers, according to a new study covering Web application security vulnerabilities.
Social-networking sites were the most commonly targeted vertical market according to a study of hacking episodes in the first half of the year. The study is part of the latest Web Hacking Incidents Database (WHID) report, released on Monday. In 2008, government and law enforcement sites were the most hit vertical.
Social networks are "a target-rich environment if you count the number of users there," said Ryan Barnett, director of application security research for Breach Security, one of the report's sponsors, which also includes the Web Application Security Consortium.
Twitter has been attacked by several worms, and other social-networking platforms such as MySpace and Facebook have also been used to distribute malware. That's often done when an infected computer begins posting links on social-networking sites to other Web sites rigged with malicious software. Users click on the links since they trust their friends who posted the links, not knowing their friend has been hacked.
The WHID sample set is small, encompassing 44 hacking incidents. The report only looks at attacks that are publicly reported and those with which have a measurable impact on an organization. The WHID's data set is "statistically insignificant" compared to the actually number of hacking incidents, but shows overall attacker trends, Barnett said.
Other data showed how Web sites were attacked. The most common attack was SQL injection, where hackers try to input code into Web-based forms or URLs (Uniform Resource Locators) in order to get back-end systems such as databases to execute it. If the input is not properly validated -- and malicious code ignored -- it can result in a data breach.
Other methods used include cross-site scripting attacks, where malicious code gets push to on a client machine, and cross-site request forgery, in which a malicious command is executed while the victim is logged into a Web site.
The WHID found that defacing Web sites is still the most common motivation for hackers. However, the WHID includes the planting of malware on a Web site as defacement, which also points to a financial motivation. Hacked computers can be used to send spam, conduct distributed denial-of-service attacks and for stealing data.
"Ultimately they [the hackers] want to make money," Barnett said.
Tuesday, August 11, 2009
How can you delete a virus which an antivirus can't?
Doesn't it look strange? A virus which can neither be deleted nor be taken any action by an antivirus, how can you delete it? But don't worry I have a solution for this one.
First of all, the main thing you should do is deep system scan with the help of an antivirus like Bit Defender or others. You can find lots of antivirus package in market but I prefer Bit Defender, Avast, Norton and Kaspersky. These are the most popular antivirus these days and works well.
Ok. After you have scanned your computer thoroughly, you shouldn't worry about the viruses which the antivirus can react upon. You should worry for the ones which the antivirus can't do anything to. Are you worried? Now don't ? 'coz I have the solution for this as I have already said about this.
Get the log file made by the antivirus. You will find the location of the file and virus which couldn't be acted upon. Visit them through registry editor and kill them by deleting the related keys described in the log file. Problem solved. You are now virus free.
Free Up Your Hard Disk
No matter how big your hard drive is, all those video clips and music files that you share can easily clog your disk. Instead of deleting your media, why not delete some less precious stuff? There are a handful of places where Windows stores (and seems to forget about) its temporary files on your drive; cleaning up this trash can free up some space.
One of these temporary user areas includes a group of folders that contain images of the last Web pages that you went to, as well as uncompressed ZIP files that you have opened. Another folder of stored temporary Web files lets the PC load frequently used images such as logos and icons from the hard drive, rather than from the online sources. Clearing these files out periodically gets rid of those sites that you visited only once, freeing up space for others. You can also allocate a smaller portion of your hard drive for this temporary Web usage, adjusting things to your liking.
Deleting the temporary Web files is an automated procedure within the Internet Explorer browser. When you are viewing a Web page, just click on the Tools drop-down menu, then Internet Options. Then, within Temporary Internet Files, click on Delete Files. You can also delete your cookies here, but be prepared to log on again to all of those Web sites that used to identify you automatically. If you want to adjust the size of this temporary Internet files folder, click on Settings. If you want to view the files before you delete them, click on View Files to see the whole mess. You can be a CSI, digging through the mass of cache files for Web sites opened by other people. Firefox and Opera offer similar levels of automation.
In Windows XP, temporary files are placed in two or more places on your PC's hard drive: C:\Documents and Settings\{your log-on name}\Local Settings\Temp. Windows' temporary system files are stored in:C:\Windows\Temp. Some computer manufacturers and applications create temporary folders in C:\Temp.
You can delete all of the files within these folders, but make sure that you close down as many applications as possible before doing so. As you open applications, temporary working files are placed in this folder, so deleting them when those applications are open will generally produce an error. It's not uncommon to have more than 2MB of files here. Feel free to tag and delete everything in a folder at once by highlighting a single file, then pressing Ctrl-A and then Delete. Once the files fly into the trash can, don't forget to empty the trash.
Some of the Symbian Codes that work with most of the Nokia Mobiles
*#7370# - Soft format - resets all the telefone Memory (like Formatting a disk)
NOTE :- Battery should be full up to at least 75%, do not accomplish during the procedure under any circumstances ! The procedure takes some minutes (approx. 3-4)
Green*3 - Hard format - If the Mobile (only telephone memory) formats, puts back the attitudes (see * to # 7780 #) and implements a RESET.
NOTE :- Battery should be full up to at least 75%, do not accomplish during the procedure under any circumstances ! The procedure takes some minutes (approx. 3-4)
Proceeding : Equipment switch off, keep "green key" (take off) at the same time pressed, "*" and to "3" key and switch the equipment on (the keys thereby keep further pressed)... to "Formatting" on the display appears...