
albanianlovee
Wednesday, March 6, 2013
Zade Buzhala vazhdon tutje !
Zade Buzhala
Modele e cila ka fituar Miss Eleganca kesaj rradhe konkuron ne PLUS SUPERMODELE
Nese doni ta votoni Zaden!
Kjo behet permes Likev ne rrjetin social "FACEBOOK"
http://https://www.facebook.com/photo.php?fbid=493534794042224&set=a.129212040474503.22244.100001571239192&type=1&theater

Friday, March 1, 2013
Bangla violence continues, Khaleda backs Islamists

Key accused was in touch with BJP leader Sudhanshu Mittal, say police - See more at: http://www.indianexpress.com/news/key-accused-was-in-touch-with-bjp-leader-sudhanshu-mittal-say-police/1082004/#sthash.69z5AhI1.dpuf
Prawesh Lama : Sat Mar 02 2013, 02:44 hrs
A police investigation into illegal accessing of call detail records of the mobile phones of BJP leader Arun Jaitley has shown that Anurag Singh, among the four arrested in the case so far, was in touch with another BJP leader, Sudhanshu Mittal. The Special Cell of Delhi Police, which is probing the case, is likely to question Mittal in this regard.
A police officer said Anurag Singh had spoken several times to Mittal two months ago. He said the investigation so far suggested that Anurag and his associates accessed CDRs of only the phones of BJP leaders.
"So far, only the names of some BJP politicians have come up. Anurag was very evasive during his questioning in police custody. We hope the hard drive we seized will shed more light," the officer said.
Anurag runs a private detective agency in New Delhi. He had been arrested earlier for his alleged role in the 2005 tapping of the phone of then SP leader Amar Singh.
When his comments were sought, Mittal acknowledged he had met Anurag. "I have not been contacted by the special cell. I meet 50-100 people on daily basis. In the last four-five years, Anurag came to meet me on different occasions. His father, who was in the Customs, was known to me. And which is why I met him. He seemed so innocent. I am shocked that someone who looks so innocent can indulge in such activities. The police should conduct a proper investigation and arrest all involved," Mittal said.
... contd.
- See more at: http://www.indianexpress.com/news/key-accused-was-in-touch-with-bjp-leader-sudhanshu-mittal-say-police/1082004/#sthash.69z5AhI1.dpuf
What happens next?
Saturday, November 17, 2012
keeping/your/kids/safe
You’ve been on the Internet; you’ve seen how foul and nasty it is. Think about the messages your kids are picking up; think about the shady characters they’re going to meet.
There’s software you can install on your computer to help filter out some of the worst parts of the Internet, but instead of turning to software, I highly recommend that you put your family’s computer in a public part of the house (such as the living room or kitchen) and then keep an eye on your kids whenever they’re on the Internet.
I know that eventually your kids will start browsing the Internet on their own, but if you keep an eye on them during their formative stages and give them useful advice for avoiding the scum of the net, they’ll probably be well prepared when they start browsing by themselves.
LosingItAll
What if a hacker uses the above technique or another technique to access your online account, what is he likely to do? The answer, unfortunately, includes a likely possibility that he’ll wipe out all of your data.
Some hackers are just bad intentioned—they delete all of your data out of spite. Other hackers use your account for some scam, but then they delete all of your data to make it harder for your to undo the scam.
For example, a common scam is the Western Union scam. A hacker breaks into your email account and sends everyone in your address book an email telling them you’re stuck in a foreign country and you’ve lost your wallet. The email continues with a plea for your friends to send you a few hundred dollars by Western Union Moneygram.
If your friends and family do send money, it’ll be picked up by an associate of the scammer and will never be seen again. (Moneygrams are not refundable when fraud occurs.)
To make it harder for you to ruin this scheme, hackers will delete your entire email address book and all of your old messages so you can’t find the addresses for your friends and family to tell them that you’ve been hacked and that the money request is a scam.
As I said earlier, that unfortunately leaves you without email or address book. Scammers will also delete your information off of social media sites for the same reason, leaving you without any friends or followers.
UnprotectedPublicWifi
When you use an unprotected wireless connection in public, anyone within range of the router (which can be up to a mile with the right equipment) can snoop on your connection.
Not only can they see the same web pages you visit, but they can also access the hidden HTTP cookie your Web browser sends to websites to identify you.
For example, you login to Facebook, whether at home or in public. When you open up Facebook at the public coffee shop, your computer sends a secret message (cookie) to Facebook saying, “This is _____. Remember me?” Facebook verifies the secret and lets you access your wall and other information.
But when you send that cookie at the coffee shop on the unprotected connection, anyone else who is listening to the wireless connection can grab your cookie. Then they can send it to Facebook and Facebook will show them your wall and other information.
This method doesn’t just apply to Facebook, but almost every website on the Internet. The only websites which are secure are the websites which run in SSL (HTTPS) mode all the time. Your Web browser indicates you’re on a secure website by turning the address bar green or gold. (Different colors for different browsers.)
I recommend that you avoid unprotected Internet, but if you must use it, open your Web browser in private mode (also called incognito)—look in the File menu or try pressing Ctrl-Shift-N. Private mode won’t send any of your usual cookies, so as long as you don’t log into any sites, you should be safe.
Subscribe to:
Posts (Atom)