Wednesday 29 February 2012

How To AutoFollow Your Followers on Twitter.



Now here are few free tools which will help you to follow the Twitter users which are following you. There are Twitter tools like Social OomphGeeky reciprocate. which also provides feature tofollow your followers on Twitter, I would like to share few other useful twitter tools which will help you to follow twitter users who are following you on Twitter.
FriendorFollow

1. FriendorFollow :-

FriendorFollow is an twitter tool which will help you to get quick glance about your followers, mutual friends and fans. Thus you can easily select the twitter user who are following you and you want to follow them back.
Friendorfollow
Link :- http://www.friendorfollow.com/

2. Reciprocate :-

Reciprocate is a Tweepi tool which gives you the number of followers whom you are not following and gives you option to follow them in bulk. Reciprocate is very user-friendly and is not messed up with other features.


Twitter Apps Free Download3. Refollow :-

Refollow is another tool which helps you to follow your followers. Apart from following tweeter followers in bulk, it also helps in managing your friends and followers, group them , filter unwanted users, use crowd tagging and comments and much more. It is a complete package to manage your followers on twitter.

Tweet Adder 4. Tweet Adder :-

Automated Promotion & Marketing Tool for Twitter which aims at getting you more targeted Twitter followers.

Software that automatically builds up your Twitter Follower Network with like minded individuals for huge increase in your twitter markeing efforts: 5 targeted twitter searches, auto follow, auto unfollow, auto tweet, auto message, twitter trends, proxy supported, set it and forget it.

Tweet Adder

5. Tweet Big :-

TweetBig is another Twitter management tool that has 6 key features including Automatic Follow Back, Tweet Scheduling and Follower Time Bomb helping you to drastically increase your followers and build your network.
free twitter apps download

History Of Twitter :-

Twitter is an online social networking service and microblogging service that enables its users to send and read text-based posts of up to 140 characters, known as “tweets”. It was created in March 2006 by Jack Dorsey and launched that July. The service rapidly gained worldwide popularity, with over 300 million users as of 2011, generating over 300 million tweets and handling over 1.6 billion search queries per day. It has been described as “the SMS of the Internet.”

Use Tweetdeck to Manage Your Multiple Twitter Accounts



If you have various twitter accounts i.e. a personal account and a brand account that you manage, you could definitely use Tweetdeck. It is a browser that enables to you to view your various accounts simultaneously. You could also post your tweets, or schedule them using this tool.
Per their latest update, you can also use tweetdeck not only for your twitter account but also for facebook, google buzz and even foursquare accounts. Check it out at this link http://tweetdeck.com

How Firewalls Work



How Firewalls WorkIf you have been using Internet on a regular basis or working in a large company and surf the Internet while you are at work, you must have surely come across the term firewall. You might have also heard of people saying “firewalls protect their computer from web attacks and hackers” or “a certain website has been blocked by firewall in their work place”. If you have ever wondered to know what exactly is this firewall and how it works, here we go. In this post I will try to explain “How firewalls work” in a layman’s terms.

How Firewalls Work

Firewalls are basically a barrier between your computer (or a network) and the Internet (outside world). A firewall can be simply compared to a security guard who stands at the entrance of your house and filters the visitors coming to your place. He may allow some visitors to enter while denying others whom he suspects of being intruders. Similarly a firewall is a software program or a hardware device that filters the information (packets) coming through the Internet to your personal computer or a computer network.
How Firewalls Work
Firewalls may decide to allow or block network traffic between devices based on the rules that are pre-configured or set by the firewall administrator. Most personal firewalls such as Windows firewall operate on a set of pre-configured rules that are most suitable under normal circumstances so that the user need not worry much about configuring the firewall.
Personal firewalls are easy to install and use and hence preferred by end-users for use on their personal computers.  However large networks and companies prefer those firewalls that have plenty of options to configure so as to meet their customized needs. For example, a company may set up different firewall rules for FTP servers, Telnet servers and Web servers. In addition the company can even control how the employees connect to the Internet by blocking access to certain websites or restricting the transfer of files to other networks. Thus in addition to security, a firewall can give the company a tremendous control over how people use the network.
Firewalls use one or more of the following methods to control the incoming and outgoing traffic in a network:
1. Packet Filtering: In this method packets (small chunks of data) are analyzed against a set of filters. Packet filters has a set of rules that come with accept and deny actions which are pre-configured or can be configured manually by the firewall administrator. If the packet manages to make it through these filters then it is allowed to reach the destination; otherwise it is discarded.
2. Stateful Inspection: This is a newer method that doesn’t analyze the contents of the packets. Instead it compares certain key aspects of each packet to a database of trusted source. Both incoming and outgoing packets are compared against this database and if the comparison yields a reasonable match, then the packets are allowed to travel further. Otherwise they are discarded.

Firewall Configuration

Firewalls can be configured by adding one or more filters based on several conditions as mentioned below:
1. IP addresses: In any case if an IP address outside the network is said to be unfavorable, then it is possible to set  filter to block all the traffic to and from that IP address. For example, if a cetain IP address is found to be making too many connections to a server, the administrator may decide to block traffic from this IP using the firewall.
2. Domain names: Since it is difficult to remember the IP addresses, it is an easier and smarter way to configure the firewalls by adding filters based on domain names. By setting up a domain filter, a company may decide to block all access to certain domain names, or may provide access only to a list of selected domain names.
3. Ports/Protocols: Every service running on a server is made available to the Internet using numbered ports, one for each service. In simple words, ports can be compared to virtual doors of the server through which services are made available. For example, if a server is running a Web (HTTP) service then it will be typically available on port 80. In order to avail this service, the client needs to connect to the server via port 80. Similarly different services such as Telnet (Port 23), FTP (port 21) and SMTP (port 25) services may be running on the server. If the services are intended for the public, they are usually kept open. Otherwise they are blocked using the firewall so as to prevent intruders from using the open ports for making unauthorized connections.
4. Specific words or phrases: A firewall can be configured to filter one or more specific words or phrases so that, both the incoming and outgoing packets are scanned for the words in the filter. For example, you may set up a firewall rule to filter any packet that contains an offensive term or a phrase that you may decide to block from entering or leaving your network.

Hardware vs. Software Firewall

Hardware firewalls provide higher level of security and hence preferred for servers where security has the top most priority whereas, the software firewalls are less expensive and are most preferred in home computers and laptops. Hardware firewalls usually come as an in-built unit of a router and provide maximum security as it filters each packet in the hardware level itself even before it manages to enter your computer. A good example is the Linksys Cable/DSL router.

Why Firewall?

Firewalls provide security over a number of online threats such as Remote login, Trojan backdoors, Session hijacking, DOS & DDOS attacks, viruses, cookie stealing and many more. The effectiveness of the security depends on the way you configure the firewall and how you set up the filter rules. However major threats such as DOS and DDOS attacks may sometimes manage to bypass the firewalls and do the damage to the server. Even though firewall is not a complete answer to online threats, it can most effectively handle the attacks and provide security to the computer up to the maximum possible extent.

Replace Xp Taskbar with Windows 7 Superbar

If you are a Windows Xp user and have ever worked on Windows 7, you might have feel the comfortableness of windows 7 taskbar which is actually know as Superbar which change the interface and functionality of the Windows Taskbar quite a bit. It was welcomed by the windows users beacuse it is simply superb. Live Taskbar Thumnail Previews, Aero Peek feature, Jumplist feature, big icons without the text, all added to its quick popularity.The advantage of this interface change is that it is possible to squeeze additional icons on the taskbar.

Well, now you can get this superbar in your Windows Xp also. There is an application that makes it possible, SBar Taskbar Replacement. is a sleek utility that will emulate the windows 7 like takbar feature in Windows XP. Once you have installed it on your Xp system, it will look like this:-



SBar Taskbar Replacement features

  • Added compatibility with quick launch (experimental)
  • Added new skin Aero16 that support normal size taskbar buttons
  • Redesigned Options Dialog
  • more better compatibility with XP skins
  • Fixed mouse hover bug

Download SBar Taskbar Replacement

How to Detect Anonymous IP Addresses



Detect-ProxyAs the fraudsters are now becoming more sophisticated in bypassing the Geo-location controls by using proxies (Anonymous IPs) to spoof their IP address, it has become very much necessary to come up with a means for detecting the proxies so that the authenticity of the users can be verified. Using a proxy (web proxy) is the simplest and easiest way to conceal the IP address of an Internet user and maintain the online privacy. However proxies are more widely used by online fraudsters to engage in cyber crimes since it is the easiest way to hide their actual Geo-location such as city/country through a spoofed IP address. Following are some of the examples where fraudsters use the proxies to hide their actual IP.
1. Credit Card Frauds
For example, say a Nigerian fraudster tries to purchase goods online with a stolen credit card for which the billing address is associated with New York. Most credit card merchants use Geo-location to block orders from countries like Nigeria and other high risk countries. So in order to bypass this restriction the credit card fraudster uses a proxy to spoof his IP address so that it appears to have come from New York. The IP address location appears to be legitimate since it is in the same city as the billing address. A proxy check would be needed to flag this order.
2. Bypass Website Country Restrictions
Some website services are restricted to users form only a selected list of countries. For example, a paid survey may be restricted only to countries like United States and Canada. So a user from say China may use a proxy so as to make his IP appear to have come from U.S. so that he can earn from participating in the paid survey.

Proxy Detection Services

So in order to stop such online frauds, Proxy Detection has become a critical component. Today most companies, credit card merchants and websites that deal with e-commerce transactions make use of Proxy Detection Services like MaxMind andFraudLabs to detect the usage of proxy or spoofed IP from users participating online.
Proxy Detection web services allow instant detection of anonymous IP addresses. Even though the use of proxy address by users is not a direct indication of fraudulent behaviour, it can often indicate the intention of the user to hide his or her real IP. In fact, some of the most used ISPs like AOL and MSN are forms of proxies and are used by both good and bad consumers.
How Proxy Detection Works?
Proxy detection services often rely on IP addresses to determine whether or not the IP is a proxy. Merchants can obtain the IP address of the users from the HTTP header on the order that comes into their website. This IP address is sent to the proxy detecting service in real time to confirm it’s authenticity.
The proxy detection services on the other hand compare this IP against a known list of flagged IPs that belong to proxy services. If the IP is not on the list then it is authenticated and the confirmation is sent back to the merchant. Otherwise it is reported to be a suspected proxy. These proxy detection services work continuously to grab a list or range of IPs that are commonly used for proxy services. With this it is possible to tell whether or not a given IP address is a proxy or spoofed IP.
How to Tell Whether a given IP is Real or a Proxy?
There are a few free sites that help you determine whether or not a given IP is a proxy. You can use free services like WhatisMyIPAddress to detect proxy IPs. Just enter the suspected IP in the field and click on “Lookup IP Address” button to check the IP address. If it is a suspected proxy then you will see the results something as follows.
Detect Anonymous Proxy
So for all those who think that they can escape by using a spoofed IP, this post is the answer. I hope this information helps. Pass your comments.

What to Do When Your Email Account is Hacked?



Email Hacked?It can be a real nightmare if someone hacks and takes control of your email account as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out. In this post you will find the possible ways and procedures to get back your hacked email account.

For Gmail:

It can be a big disaster if your Gmail account has been compromised as it may be associated with several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.
Step -1: Try resetting your password since it is the easiest way to get your account back in action. In this process Google may ask you to answer the secret question or may send the password reset details to the secondary email address associated with your compromised account. You can reset you password from the following link
If you cannot find success from the Step-1 then proceed to Step-2.
Step-2: Many times the hacker will change the secret question and secondary email address right after the account is compromised. This is the reason for the Password Reset process to fail. If this is the case then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like
1. Email addresses of up to five frequently emailed contacts
2. Names of any 4 Labels that you may have created in your account
3. List of other services associated with your compromised account
4. Your last successful login date
5. Account created date
6. Last password that you remember and many more…
You need to fill out this form as much accurately as possible. It is obvious to forget the dates of last login, account creation and similar terms. However you need to figure out the closest possible date/answers and fill out this form. This is your last chance! The more accurate the information filled out in the recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link

For Yahoo and Hotmail:

Unfortunately for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions that you have setup or reset the password using the secondary email option. 
To initiate the password reset process just click on the Forgot password link in your login page and proceed as per the screen instructions.

Monday 27 February 2012

How To Download and Play Sony PlayStation 1 (PSX) Games on your PC





 Play all of your favorite PS 1 games on your computer using ePSXe Emulator.

Remember Final Fantasy VIII? Remember Eden, Bahamuth, Shiva?? Or Suikoden II, Parasite Eve, Lunar, Rayman, Hercules, Xenogears?? Those were old, good times. Ever wish to play those games all over again or maybe finish them for the first time? You can install and run the necessary software to turn your PC into a virtual PlayStation. Today there are a lot of tutorials on the net about how to download and play PlayStation 1 games on your computer, but only few of the tutorials are really working and the others are not completely finished or aren't explained good and you can't understand them. Here i'll write a full tutorial to run PSX games on your computer. I will be posting links where to get emulator, ISOs and more!

Lets start:

1. Download ePSXe (PS1 emulator)

First of all you need to Download ePSXe. It's available for Linux and Windows. I recommend you to download version v.1.6.0 or lower (don't download any beta version).


2. Download plugins

Plugins will be necessary. You can download plugins for both OS, Windows and Linux. There are three plugins you basically need to run the program.
Go to http://www.ngemu.com/psx/epsxe.php?action=plugins and then press Ctrl+F and download the following plugins:

Graphic Plugins:

P.E.Op.S. Soft GPU (v1.18b)
Pete's GPU Plugins (v1.77)

Sound Plugins:

Eternal SPU (v1.41)
P.E.Op.S. DSound (v1.9)

CD Plugins (To make Game Rips such as ISOs and CDs run on ePSXe):

CDR Mooby (v2.8)
P.E.Op.S. CDR (v1.4)

You can also download Misc Plugins which allows you to play over the net, but those aren't necessary.

Extract the files into the "plugins" folder in the ePSXe. (It's NOT in C://Program Files...! Remember the path when you download the ePSXe program in the first place? And you double click on it to run it? Go there and you will find the "plugins" folder)

3. Download BIOS

Now it's time to get the BIOS in order to play the games. You'll need a file called scph1001.dll. Here is a website where you can download your BIOShttp://dragonballarena.gamesurf.it/english/media/giochi/psx.php.


After the download is complete, place it on the "bios" folder in the ePSXe.

4. Download your game!!

You can type your game on google and search for it, or get torrent on isohunt, mininova or anything... Here are some good sites to download your PSX ISOs:
http://www.emuparadise.org/roms/psx/
http://www.romulation.net/PSX/
http://romhustler.net/roms/psx
http://nitroroms.com/roms/Sony_PSX
http://www.rom-freaks.net/psx-isos-0-asc-name-.html

5. Configuration

Before you start using ePSXe you need to configure some settings. Select the icon that looks like a PSX controller ( that's the emulator itself ) and a window that says ePSXe should pop up. Now choose the Config tab and you are ready to configure the plugins and the bios that you've downloaded.


Config - Video

  • Choose the plugin that you want to use. I use Pete's DX6 D3D Driver. Now choose Configure


  • Choose the resolution, or whether you want to play it in a window. If you are wondering if the resolution depends on your computer performance... I personally choose window. Now on Default Settings (bottom-left) click Nice and OK.


Config - Sound

  • Choose the plugin. I use P.E.Op.S. DSound Audio Driver ->Configure

  • Choose following options:
Mode : 2
Volume : 1
Reverb : 2
Interpolation: 3

Leave the rest as default and OK.


Config - Cdrom

  • Choose the plugin. I use P.E.Op.S. CDR Driver

  • Don't need to configure anything there.. leave it as default.

Config - Bios

  • Locate the scph1001.dll and click OK

Config - Game Pad - Pad 1


  • Adjust it at your convenience...

Now your all set and you can start playing some PSX Games!!!

File - Run ISO and Locate the PS1 game you want to play. If in the folder that you've downloaded there are more than one file, choose the one with the bigger size.


Enjoy Gaming!


If you can't find some of the plugins or if you don't want to spend much of your precious time searching for bios and all other necessary stuff, you can download my ePSXe with all these stuff in it. Now all you have to do is just to configure the settings and you are ready to play.

Download ePSXe with All Plugins and BIOS for it0

Popular Posts