14.7.11

How To Browse Forums Without Logging -Googlebot

How To Browse Forums Without Logging -Googlebot



Googlebot 


Googlebot is Google's web crawling bot (sometimes also called a "spider"). Crawling is the process by which Googlebot discovers new and updated pages to be added to the Google index.
Googlebot use a huge set of computers to fetch (or "crawl") billions of pages on the web. Googlebot uses an algorithmic process: computer programs determine which sites to crawl, how often, and how many pages to fetch from each site.

Googlebot's crawl process begins with a list of webpage URLs, generated from previous crawl processes and augmented with Sitemap data provided by webmasters. As Googlebot visits each of these websites it detects links (SRC and HREF) on each page and adds them to its list of pages to crawl. New sites, changes to existing sites, and dead links are noted and used to update the Google index.

How Googlebot accesses your site

For most sites, Googlebot shouldn't access your site more than once every few seconds on average. However, due to network delays, it's possible that the rate will appear to be slightly higher over short periods. In general, Googlebot should download only one copy of each page at a time. If you see that Googlebot is downloading a page multiple times, it's probably because the crawler was stopped and restarted.
Googlebot was designed to be distributed on several machines to improve performance and scale as the web grows. Also, to cut down on bandwidth usage, we run many crawlers on machines located near the sites they're indexing in the network. Therefore, your logs may show visits from several machines at google.com, all with the user-agent Googlebot. Our goal is to crawl as many pages from your site as we can on each visit without overwhelming your server's bandwidth. Request a change in the crawl rate.


How To Browse Forums Without Logging -Googlebot 


Visit any forum or website to find something useful and they will ask you to register.
All websites and forums will block unregistered users, but they won’t block Google Bot. What we will do is to switch our User Agent to that of Google Bot and freely browse any website orforum without registering. 

First grab the User Agent Switcher add-on for Firefox called ‘user agent’ here and install it.
Now go to Tools > User Agent Switcher > Options and then again to Options.




Select User Agent from the left sidebar and click Add. Now in the description field type:

crawl-66-249-66-1.googlebot.com

and in user agent field type:

Googlebot/2.1 (+What is Googlebot? - Webmaster Tools Help)

as shown in the screenshot below.





Select Google Bot as your User Script by going to Tools > User Agent Switcher.


Now browse any website or forum without registering.

Sunday, December 12, 2010

How to Track Stolen Laptops With a .mac or IP Address

By Carla Boulianne




Computrace LoJack for Laptops states that more than 600,000 personal computers are stolen each year. When a laptop disappears at an airport or coffee shop, the greatest chance of recovery comes from preplanning. Installation of antitheft software offers more protection than trying to track stolen laptops with a .mac or IP address. Protect expensive equipment, personal information and confidential data by practicing prevention.



Instructions
  • Things You'll Need:
  • Tracking software
  • How to Track a Stolen Laptop With a .mac Address

Things You'll Need:


1
Notify your network administrator of the theft. Locating a stolen laptop using a .mac address isn't possible unless the thief gets on the same LAN. This makes recovery unlikely with the exception of a computer used on a college network. The likelihood is much higher if the thief is a student who will log on to the university network with the stolen laptop. In such a case, let the network administrator know of the theft. Supply the .mac address and the network administrator can watch for the laptop to log on to the network.
2
Forget about tracking a stolen laptop over the Internet using a .mac address. Tracking a stolen laptop using a .mac address is not possible over the World Wide Web. This second-level information is not passed through the router to the third-level ISP (Internet service provider).
3
Increase your chances of recovery by preinstalling antitheft software that "phones home" to a service provider or open source software such as Adeona. This allows the original owner to gain IP address information without contracting with a third party such as LoJack.
How to Track a Stolen Laptop With an IP Address


How to Track a Stolen Laptop With an IP Address


1
Contact your ISP (Internet service provider) to see if the thief has accessed the Internet using your service. The ISP issues a location-specific IP address when a computer accesses the Internet. If the owner of a stolen laptop obtains an IP address assigned to her computer since the theft, then the police can track its location.
2
Investigate whether programs such as Yahoo! Messenger or email software that automatically logs on at boot-up are still being accessed. Contact the service provider with appropriate police report documentation and a subpoena to obtain a recent IP address for a stolen laptop.
3


Install Antitheft Software to Track a Stolen Laptop IP Address


Use preinstalled antitheft clients to obtain a recent IP address for the stolen laptop. Supply the IP information to law enforcement.
Install Antitheft Software to Track a Stolen Laptop IP Address
1
Contract with a third party for antitheft protection. Computrace LoJack for Laptops offers a three-year antitheft guarantee for its software. Buyers subscribe to a service that uses installed BIOS firmware to track a stolen computer and supply recovery information to the police. Computrace LoJack claims to recover three out of four stolen laptops using its service.
2
Download and install an open source antitheft client. Adeona is a university-developed open source alternative to tracking services. There is no charge to install the software, which monitors and stores location data. Adeona claims superior privacy protection, as only the owner is able to access location data.
3
Check manufacturer service plans for theft protection details or call customer support. Some computer manufacturers, such as Dell, offer tracking, recovery and data deletion for stolen laptops.




Track a Stolen Laptopwww.LoJackForLaptops.com
Track Down Your Stolen Laptop LoJack for Laptops. Official Site.


Intel Anti-Theft SecurityIntel.com/AntiTheft
Learn How Advanced Features Make PC Security More Intelligent Than Ever


IP Management Toolwww.Netcordia.com
Automate Network Change & Configuration, Try NetMRI for Free.


SONY VAIO - Official Sitewww.SonyStyle.com/VAIO
Smart performance w/Intel® Core™ i7 processor laptops. Free shipping.





  • Install tracking software on all laptops, as .mac addresses are rarely useful in recovery, and gaining a subpoena for an IP address is challenging.
  • Third parties may access the tracking information recorded by services such as Computrace LoJack to moniter a laptop owner's movements.


How to trace any mobile number of the WORLD !!

How to trace any mobile number of the WORLD !!





With the rapid growth of mobile phone usage in recent years, I have often observed that the mobile phone has become a part of many illegal and criminal activities. So in most cases, tracing the mobile number becomes a vital part of the investigation process. Also sometimes we just want to trace a mobile number for reasons like annoying prank calls, blackmails, unknown number in a missed call list or similar.

Even though it is not possible to trace the number back to the caller, it is possible to trace it to the location of the caller and also find the network operator. Just have a look at this page on tracing Indian mobile numbers from Wikipedia.

 Using the information provided on this page, it is possible to certainly trace any mobile number from India and find out the location (state/city) and network operator (mobile operator) of the caller. All you need for this is only the first 4-digit of the mobile number. In this Wiki page you will find all the mobile number series listed in a nice tabular column where they are categorized based on mobile operator and the zone (state/city). This Wiki page is updated regularly so as to provide up-to-date information on newly added mobile number series and operators. I have used this page many a time and have never been disappointed.
If you would like to use a simpler interface where in you can just enter the target mobile number and trace the desired details, you can try this link from Numbering Plans. Using this link, you can trace any number in the world.
By using the information in this article, you can only know “where” the call is from and not “who” the caller is. Only the mobile operator is able to tell you ”who” the caller is. So if you’re in an emergency and need to find out the actual person behind the call, I would recommend that you file a complaint and take the help of police. I hope this information has helped you!

How To Secure Your Wireless Home Network

How To Secure Your Wireless Home Network

Home network. Securing a wireless network is very important because if you don't, your neighbors can not only borrow your Internet connection, but also access your files. Even worse, hackers can use your internet connection to upload illegal materials, and the FBI will ring your bell...

Step 1  

Connect to your router via your browser to perform the following steps.

Step 2  

Enable encryption on your access point. Using 128-bit encryption or higher makes your Wireless Network more secure. WEP and WPA are entirely different encryption schemes. WEP has been proven insecure and can be cracked in a few minutes using free utilities that can be downloaded from the Internet. Using at least WPA is recommended, because it is much more secure, but is sometimes a bit harder to set up correctly than WEP is, and isn't completely secure. Some older access points or wireless cards do not support WPA2. If you have one of these, it is recommended that you purchase a newer one that supports WPA2, depending on how important you consider your security.

Step 3  

Set the router access password. Anybody who gains access to the router configuration settings can disable the security you have set up. If you forget the password, most routers have a hardware reset that will restore all of the settings to factory defaults. The best option is to use a random sequence of the maximum length of characters - you only have to type that once, so it is not a big thing. When you connect to the router via LAN cable while setting it up, you can copy and paste the password onto the router and onto your local setting, so you never need to type it again.
  • Use a secure password. Don't use easily guessed passwords for your WPA2 or router access passwords, such as "ABC123", "Password", or a string of numbers in order. Use something hard to guess that contains both upper and lowercase letters as well as numbers. Special characters such as !@#$% are not supported by some routers. The longer the key, the better, although the WPA2 key has a minimum and maximum length. Try to make a little mental effort -- good passwords might be hard to remember, but they are harder to crack.
  • If you use a weak key then even WPA and WPA2 can be easily cracked within a day using a combination of special precomputed tables and dictionary attacks. The best way to generate a secure key is to use an offline random number generator or write the entire alphabet in uppercase and lowercase and numbers 0-9 on separate pieces of paper, mix the paper up and randomly pick up pieces and return them, mixing them up again each time; each character you pull out becomes a character in your key. You can also try throwing a pair of dice and using the resulting numbers as your password.

Step 4  

Change the Service Set Identifier (the network name or "SSID") from the default to something unique. A default SSID indicates to hackers that the network was set up by a novice and that other options (such as the password) are also left as the default. Use a name you can remember and identify, as the SSID has no influence on the security of your network (not even if you choose not to broadcast it).

Step 5  

Enable MAC Address filtering on your Access Point or router. A MAC (not to be confused with the computer model 'Mac') address is a code unique to every wireless networking card in existence. MAC Address filtering will register the hardware MAC Address of your networked devices, and only allow devices with known MAC Addresses to connect to your network. However, hackers can clone MAC addresses and still enter your network, so MAC address filtering should not be used in place of proper WPA2 encryption.

Step 6  

Don't disable the 'SSID Broadcast'. Do not disable the 'SSID Broadcast' feature of your Access Point or router. This seems counter-intuitive, but it is actually a bad idea. Although this would make your network invisible to your neighbors, any determined hacker can still sniff out your SSID; and you are implicitly forcing your computer to shout out your SSID anywhere you are, while it is trying to connect to it. Anyone could then impersonate your router with that SSID, and get your credentials that way.

Step 7  

Disable remote login. The first router worm brute forces its way into the router in this manner. Most default usernames are set to Admin. It isn't hard for a virus/worm to crack the password if the username is known. The good thing is that routers normally have this disabled by default. Be sure to confirm that it is disabled when you first set up your router and periodically thereafter. If you need to update your router setting remotely, only set up access for the time you are going to be connected.

Step 8  

Disable wireless administrating. Finally, change the setting that allows administrating the router through a wireless connection to 'off' (meaning that you need to connect with a LAN cable for administration). This disables any wireless hacking into the router! (aside from breaking into your house)













Tips

  • You need to set the same WPA2 Settings on your computer and router.
  • Use the 'Shared Key' method of encryption, so that all data passed between clients is encrypted properly.
  • Check your Access Point or Routers' documentation on how to enable or disable security features.
  • You may need to upgrade the Firmware of your Access Point or Router if it doesn't have any of these features. In some situations, you will need to purchase a new Access Point.

Warnings

  • Be sure to register all devices on your network, including computers, laptops, media players, and networked storage if you are using MAC filtering. Also, be sure to enter the MAC addresses correctly as if you enter the wrong ones, you will not be able to connect the computer to the router to change them back and you will need to reset the router. Some routers allow you to save them while they are connected.
  • Windows doesn't have individual wireless settings for different wireless domains. This means that the settings that 'share' files at home with your LAN will 'share' files with anybody else's wireless network, even a wireless network masquerading as one you trust.
  • Disable 'File and Printer Sharing' in the wireless 'Connection Properties' for your portable computer. Only use the 'Client for Microsoft Networks' half of Microsoft's file sharing. This means that your portable must connect to a machine that shares file/folders in order to access things, and that OTHER computers can't ask to connect to your portable to access files on your machine. At least not through Microsoft's 'File Sharing'. Other running services and back doors may exist.
  • A user with a 'cantenna' can access your wireless network from a very long way off. Just because your notebook doesn't get a signal on the porch doesn't mean someone else can't access or monitor your network from a mile away, meaning that even though you don't think anyone in your neighborhood would break into your network, someone far away might.

How To Remove Security Tool


 To Remove Security Tool and other Rogue/Fake Antivirus Malware
If you have a PC infected with Security Tool, you’re probably reading this article so you can understand how to get rid of it. Thankfully we’ve got the instructions to help you get rid of this virus.
Security Tool is just one of many fake antivirus applications like Antivirus Live, Advanced Virus Remover, Internet Security 2010, and others that hold your computer hostage until you pay their ransom money. They tell you that your PC is infected with fake viruses, and prevent you from doing anything to remove them.

This particular virus blocks you from doing most things, like Task Manager…

It also gives you loads of error messages that just seem to pop up constantly.

And worse, it blocks you from running malware removal tools:

First we’ll walk through the general steps that usually apply, but you can skip down to read the specific steps that we used to remove this virus.
Removing Rogue Fake Antivirus Infections (General Guide)
There’s a couple of steps that you can generally follow to get rid of the majority of rogue antivirus infections, and actually most malware or spyware infections of any type. Here’s the quick steps:
  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • If that doesn’t work, reboot your PC into safe mode with networking (use F8 right before Windows starts to load)
  • Try to use the free, portable version of SUPERAntiSpyware to remove the viruses.
  • Reboot your PC and go back into safe mode with networking.
  • If that doesn’t work, and safe mode is blocked, try running ComboFix
  • Note that I’ve not yet had to resort to this, but some of our readers have.
  • Install MalwareBytes and run it, doing a full system scan. 
  • Reboot your PC again, and run a full scan using your normal Antivirus application (we recommend Microsoft Security Essentials).
  • At this point your PC is usually clean.
Those are the rules that normally work. Note that there are some malware infections that not only block safe mode, but also prevent you from doing anything at all. We’ll cover those in another article soon, so make sure to subscribe to How-To Geek for updates (top of the page).
Removing Security Tool
Since the above steps don’t always work, and Security Tool seemed to do a pretty good job of killing the malware removal tools I tried to use, I found another method to kill the virus off so I could begin the work of removing it.
First, we’ll need to know the username—if you aren’t sure what that is, right-click on the Start button and choose Open, then you can see it right in the location bar:

Next, open up the Start Menu, and then click the Run button (or use the Win+R shortcut key), and then type in the following command, substituting your own username if it is something other than administrator.
taskkill /f /fi “username eq administrator”
Note: If it doesn’t kill the virus the first time, you might have to use it again. Don’t be alarmed when your start menu disappears.

If all went well, the virus is dead and so is everything else including your start menu. Use the Ctrl+Shift+Esc shortcut key combination, and then go to File –> Run, and type in explorer to re-open the start menu and taskbar.

Note: If you find that the virus still isn’t dead, you can repeat the steps again.
Use SUPERAntiSpyware to Clean the Malware
Now that we’ve killed off all those processes, we’ll get to removing the actual malware from the system by downloading SUPERAntiSpyware and installing it. You should be able to grab the full version, or you can use the portable variety that we’ve already recommended.

If you grabbed the full version, make sure to use the Check for Updates button, and then click the Scan Your Computer button… make sure to perform a Complete Scan, and select all of your drives. 

Once it’s done, it’ll let you remove them all in a click, and then prompt you to reboot. Job isn’t done, however!
Install Malwarebytes and Scan 
Next you’ll want to install MalwareBytes and run it, making sure to run a full scan. The main reason to do this is because there’s no way a single malware removal tool can know about every single piece of malware out there, and you may as well make sure your system is clean.

Install Microsoft Security Essentials
You should definitely install Microsoft Security Essentials and run another full scan once you’re done.