Learn About How To Finding A Spoofed Website With A Javascript (© All Computer Studies)

Lots of people think that Javascript is an lower language but Javascript is an highly powerful language and those people who think that they either don't know how to use it or are not familiar with it's capabilities, With javascript you can do lots of cool things such as edit any online webpage, make an image fly on your web browser etc, but it is a waste of time to spend your time on making images fly with javascripts or editing a webpage. Anyways coming to the main topic, did you know that javascript can be used to detect if a page is a spoofed website or phishing website or a scam one, well if you don't know just paste the following javascript (.js) code in to the address bar and a pop up will appear telling you whether the website is original or not.

Here is the JavaScript code:

javascript:alert("The original URL is:\t\t" + location.protocol + "//" + location.hostname + "/" + "\nThe full address URL is:\t\t" + location.href + "\n" + "\nIf the server names do not match, this may be a spoof/scam.");

Learn About How To Hide Keyloggers And Trojans With Binders (© All Computer Studies)

You would have likely heard that never run a .exe file if you are not confirmed about the authenticity of the person who send you that particular file, The reason why you might have heard that because Trojans, Keylogger, Spywares and Adwares use .exe format by default.

So what do you think are you completely safe that you run trusted MP4,gif files?

The answer is no, Its because you never know that virus has came with which format, It can take any extensions, It could be in JPEG, It could be in MP4 and it could be in almost any Format, So in this article I will tell you how hackers hide Keyloggers,Trojans and other harmful viruses in other files.

#1 With the help of Binder :-

 A Binder is a software used to join or combine two or more files under one name and extension, The files to be combine can have any name or icon, Its all your choice to select the name, icon and various attributes of binded file, The Binded files can be even worse when they are crypted, because Bintext would not be able to find it and at the same time it could also bypass antivirus detection then you are almost guaranteed to be infected.

Learn About How To Protect Your Computer From KeyLoggers? (© All Computer Studies)

Keyloggers having a big problem today as once they get installed in your computer/laptop the hacker can get almost all information of your PCs. Some of the best keyloggers available now a days The program which are specially used to detect and protect your computers from keyloggers are Antiloggers, I have tested lots of Antiloggers and found Zemana Antilogger only which is capable of detecting almost every keylogger. Normally a keylogger is detected by a good antivirus or Antispyware program, but hackers use some methods such as crypting, Encripting, binding etc through which the keylogger can easily Antivirus as well as Antispyware program Zemana AntiLogger now covers pretty much every aspect of Windows including registry modification and dll injection prevention and protects Windows from other spyware-related techniques with Anti-Keylogger, Anti-SreeenLogger, Anti-WebLogger and Anti-ClipboardLogger tools of its own. Another useful feature this apps has is while-list approach meaning it automatically recognizes "safe" programs and does not treat them as "suspects".

Learn About How To Protect Your Computer From ARP Poisoning (© All Computer Studies)

I used different software to see which one works the best to protect computer from an ARP Poisoning attack I came across some excellent software's but they are highly cost, so I thought not to share it and searched for a Free Alternative finally I came across a Free Firewall Which helps you successfully block ARP Poisoning attacks.

Download Commodo Firewall from the link below:

Download Commodo Firewall

Learn About How To Protect Your Computer Against Spywares And Keyloggers (© All Computer Studies)

Spywares like Sniper spy and Remote spy are almost un find able by an antivirus program,to protect your computer against these harmful spyware,Dogs and key loggers you need to install a good anti spyware program .

The following are some of the major risks of spywares:

1. Spyware programs are designed specifically to monitor and record your behaviors, such as track websites you visit online, or monitor your use of other web-based programs.

2. Hackers mainly use spywares to steal sensitive information such as email passwords and credit card data. So it is a must to have an anti-spyware installed on your computer. Antivirus isn't just install today!

3. Spyware is also capable of performing activities such as completely shutting down your computer, or permanently erasing or damaging files. Valuable client files could be destroyed in a blink of an eye, making this type of spyware threat high-risk.

Learn About How To Check Effectiveness Of Your Antivirus (© All Computer Studies)

Have you ever worry that is your Antivirus perform there task properly? Do you want to sure that your antivirus works properly? So don't worry we have got a perfect working solution which will make you to Check Effectiveness of your system Antivirus.The test for this purpose is called EICAR Test. EICAR test is used by many antivirus developers to find whether there antivirus is working properly or not.lets starts...

Follow these steps to test your antivirus:

1. Open notepad Type the following Encrypt code and save it as virustestfile.com

X5O!P%@AP[4\PZX54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*

2. Now scan your computer or laptop If your antivirus detects it as a virus then your Antivirus is working properly and If it does not detect it as a virus then your antivirus is not effective and you need to look for alternative Antivirus.

Learn About What Is Secure Sockets Layer (SSL)? (© All Computer Studies)

You might have heard some people that not to give your secrete information (password or credit card) or any other sensitive information on public computers like cafe PC or on MSN,YAHOO massanger etc.The reason why you might have heard that the Attacker have some ways to you would have probably heard that Attacker have a way to sealed your your credit card numbers , passwords etc.
Learn About What Is Secure Sockets Layer (SSL)? (© All Computer Studies)
A hacker can use different types of attacks such as Packet sniffing or ARP Poisoning to steal your sensitive information Secure Sockets Layer (SSL) is the most popular used technology for inventing a secure communication between the web client and the web server. You must be familiar with http:// protocol and https:// protocol, You might be wondering what they mean.

HTTP protocol is used for standard communication between the Web server and the client.
HTTPS is used for a secure communication.

Learn About How To Secure Your WordPress Blogs? (© All Computer Studies)

As you know that the word press is a common and most popular plate form for blogging, but the security of the WordPress.com is always a great discussion and it need more and more concentration because scam discover everyday.
Learn About How To Secure Your WordPress Blogs? (© All Computer Studies)
Below are some tips to make your blog secure:

Secure WP-Admin By Internet Protocol

Let suppose if someone can get the access (username and Password) to enter into your website WP section, you can secure this area by your IP. It prevent brute forcing attack and only you can able to control on your website because of IP restriction.

Order deny,allow Deny from All 
Allow from 123.456.789.0 
You can allow and deny IP's from a range use this:
order deny,allow deny from all # allow my home IP address allow from **.**.***.*** # allow my work IP address allow from **.**.***.***

Protect WP-Config.php File

WP-Config.php page has a great importance on word press web form, it need more care and usually an attacker get the required information about the database of your website from WP-Config page. Basically if you use a strong database columns user-name and password while your WP-Config security is slow than an attacker can get your strong user-name and password from wp-config page, because it contain all the information about the security and other things of your website.
Access .htaccess file is located at the root your WordPress installation open it and copy & paste the following code.

order allow,deny deny from all

Hide WordPress Version Number

You must hide the version of your word press program because an injector may find the available exploit by searching it on different exploit database by version number and it may cause a great disease for your blogger so be care about it. This tag is in the header.php page that displays your current version of word press Copy and paste the code in the functions.php page of your themes and than you are safe.

remove_action('wp_head', 'wp_generator');

Learn About How Much RAM Need In Windows 8 ? (© All Computer Studies)

In Windows 8 and Mountain Lion powered Laptop Computers, the question of how much RAM a modern system needs is hitting my inbox with increased speed.

Below is my guide to how much RAM you need to increase speed .

Note : that dual-channel motherboards will support 1GB, 2GB, 4GB, 8GB, and 16GB of RAM, depending on motherboard, while triple-channel boards support 3GB, 6GB, 9GB, or 12GB,again depending on motherboard support.

About 3 - 4 GB :-

If you're running a 32-bit operating system then with 4 or 3GB of RAM installed you'll only be able to access around 3.2 GB (giga-bite). However, with a 64-bit operating system then you'll have full access to the whole 4GB.
Learn About How Much RAM Need In Windows 8 ? (© All Computer Studies)
The difference in performance between a system with 2 GB of RAM and one with 3 or 4GB is like day and night. Even on a 32-bit system that limits the RAM to a little over 3GB, the performance boost is well worth the cost. Not only do application play faster, you can read more applications simultaneously handy if you run suites like Microsoft Office 2013 or Adobe  Collection.

If you have a 64-bit operating system, then bumping up the RAM from 2GB is a no-brainer.

All but the most basic of Microsoft Windows 8 systems come with 3 or 4GB of RAM, while 4GB is the minimum for all new iMacs, MacBooks, and Red Hat Linex.

Learn About How To Copy a Large File Despite Having Larger Free Space (© All Computer Studies)

In these days of extra large hard disks many try to copy huge files from a DVD/CD but find that can not even though there is plenty of free space on the hard disk. The most likely cause for this is not some sort of copy protection but that the file being copied is too large for the file system to handle. Microsoft Windows 8 allows you to format a hard disk in two different file system formats: FAT32 and NTFS. These file systems differ in the size of file they can handle. FAT32, for example, can only handle files up to ~4GB in size. When it was developed, that size file was almost unheard of but now, a DVD can have files that large or larger routinely. So, if you are trying to copy a movie from a DVD onto your FAT32-formatted hard drive it likely won’t copy as most full-length movies are files larger than 4 gigabyte.

What Is a Country Codes And Domains? (© All Computer Studies)

The last characters on a domain name are usually known as country code (e.g., .pk, .in, etc.) or a top level domain (e.g., .com, .org, etc.).
What Is a Country Codes And Domains? (© All Computer Studies)
Domain names around the world often have a country code associated with them. The links are to the latest WHO is information for the top level domain.

Learn About How Do I Remove Add/Remove Programs? (© All Computer Studies)

Generally, you would use the Window's Control Panel’s ----> Add/Remove Programs tool or Vista's Default Programs | Programs and Features page to install/uninstall programs from your laptop computer. Some of these uninstalls will leave program names behind which, when clicked on it, either produce errors or no result. You can remove these invalid entries using these steps carefully.

Start the Registry Editor (Start ---> Run and then type “regedit” [without quotes] into the textbox)
Go to this key value in the left panel:

HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
Right click on the Uninstall entry. Select the 'Export' option from the left menubar. Give the exported .reg file a name you can remember and store it in a location you can remember. Doing this makes a backup you can recover from if you make an editing error in the steps below.

* Locate the specific key you wish to remove. It will likely have the name of the program but, in case not, scroll down each entry and look at the value for DisplayName. The key you want is the key that contains the same display name as you are trying to remove from the Add Programs menu.
If you want to be extra safe, right click on this key and again select Export and save the .REG file.

* Close the Registry Editor.

* Open the Add/Remove Programs utility from the Control Panel and verify that the invalid entry is gone and that the other entries are still there.

What Is Computer Virus? (© All Computer Studies)

A virus is a program that produces its own language by attaching its self to other executable files (.exe) in such a way that the virus code word is executed when the infected executable file is executed. There are a large number of virus types. A virus reproduces, usually with out your permission or information. In general terms they have an injection phase where they produce widely and an attack phase where they do whatever damage they are manage to do.
What Is Computer Virus? (© All Computer Studies)
An famous example of an executable file would be a program (.COM or .EXE file) or an overlay or library file used by an .EXE file. But just as critical, would be the macro portion of what you might generally consider to be a huge data file (e.g. a M.S Word document). It’s important to also realize that the system sectors on either a floppy or hard disk contain executable code that can be infected even those on a data hard disk. More recently, code written for Internet Web sites included in Electronic mail can also be executed and infected.

Another way of looking at viruses is to consider them to be programs written to create copies of themselves. These programs attach these copies onto host programs . When one of these hosts is executed, the virus code executes, and links copies of itself to even more hosts.

Similar to viruses, you can also find malicious code in Trojan Horses, logic bombs. Often the characteristics of both a virus and a worm can be found in the same beast confusing the issue even further.