How to Use 'Instant Hotspot' On a Mac with OS X Yosemite

With OS X Yosemite, Apple has included a number of Continuity features that improve the integration between iOS and Mac devices. OS X Yosemite includes a feature called Instant Hotspot which allows users to more easily use their iPhone's wireless cellular data connection from their Mac or iPad.

instanthotspot
With Instant Hotspot, there is no longer a need to enter a password to connect as security is handled through a common iCloud account. An iPhone can even be in sleep mode and allow your Mac to initiate Instant Hotspot, with no additional settings needing to be enabled aside from Wi-Fi and Bluetooth.


Before you Start


You need iOS 8.1 and OS X Yosemite in order to use Instant Hotspot. You also need to ensure that your data plan with your wireless carrier allows for internet hotspot capabilities. In the United States, AT&T, Verizon, and T-Mobile, allow phones to be used as hotspots with select data plans. Sprint offers mobile hotspot capabilities with a monthly add-on plan.

Also, make sure both your Mac and iPhone are logged into the same iCloud account, and check that your Mac supports Instant Hotspot. This can be done by clicking the  symbol in the top left-hand side of the Menu bar, navigating to About This Mac, clicking on System Report and clicking on the Bluetooth listing. You should see information about whether your system is compatible with Instant Hotspot and Handoff.

instanthotspot1
After you ensure that you have a compatible Mac and data plan, follow the instructions below to turn on Instant Hotspot:

Steps


1. Turn on Wi-Fi on your iPhone (Settings -> Wi-Fi) and Mac (Menu Bar -> wifi -> Turn Wi-Fi On.

2. Turn on Bluetooth on your iPhone (Settings -> Bluetooth) and Mac (Menu Bar -> Apple -> System Preferences -> Bluetooth -> Turn Bluetooth On).

wifi
3. On your Mac, click the Wi-Fi symbol wifi in the menu bar. A new "Personal Hotspot" heading now appears near the top, and will be followed by the name of your iPhone. On the right side of your iPhone's name, signal strength, network type, and available battery life are displayed. Click on your device's name to begin using it as an Instant Hotspot for your Mac.

personalhotspot5
4. You may now begin using the Internet on your Mac with your iPhone acting as an Instant Hotspot. On the Mac, the Instant Hotspot connection between both devices is represented by a special icon that shows a link over the traditional Wi-Fi symbol. On the iPhone, the connection is represented by a blinking blue bar that shows that a Personal Hotspot is active.

When a tethered Mac or iPad switches to a Wi-Fi connection or is no longer connected to an iPhone, Instant Hotspot automatically turns off. This feature is designed to save battery on the iPhone, because tethering can use a significant amount of battery life.

Troubleshooting


While we had few issues with Instant Hotspot, several  have had more inconsistent results. Several people have had to try logging out and back into iCloud on their devices, turning Wi-Fi off and then back on, or even rebooting their devices. These steps may help if you are having trouble turning using Instant Hotspot.

What is the exact date when Elizabeth became Queen?


Queen Elizabeth II, born in 1926, Queen of the UK of Great England and Northern Ireland. Elizabeth Alexandra Mary was born in London, the first child of the duke and duchess of York, later King George VI Queen Elizabeth.
When you’re in London, UK, keep in mind to visit Buckingham. This Popular palace is the London, home of King Elizabeth II. Security officers carefully watch over the palace grounds. Visitors enjoy viewing the changing of guards.

The Queen has very little power when compare with earlier English a kings and Queens. Today, a chosen PM and Parliament hold most Govt Power. But Elizabeth II is popular with her people. You’ll find her picture on every English seal (British Stamp), banknote, and coin!

Facts about Queen Elizabeth ii.

She is known as after her mom Queen Elizabeth, her paternal great-grandmother Queen Alexandra and her paternal grand mother Queen Mary.

queen Elizabeth II had travel to Jamaica sex times, Australia 15 time and Canada 23 Times. In March 2006, she Travel to Melbourne, Australia to open the commonwealth games.

The Real birth day of the Queen Elizabeth is in April 21. But the officially celebrated in june.
When the World War II started she was a Girl Guide (British Lady Scouts) and went through the same coaching (training) as the other Lady Guides her age.

What is the exact date when Elizabeth became Queen?

Feb 06, 1952 she was in Kenya when she learned that she had become Queen of the U.K. Her husband Prince Philip was informed first and then it was up to him to tell her that she had become Queen. Before leaving for Britain, Elizabeth made sure that every individual that worked in the hotel where she was stay in had a signed picture of her. The time frame of her coronation was 2nd June 1953, but in a hereditary monarchy the new monarch is successful instantly on the loss of life of his or her predecessor.

I Don’t Base64 SVG

Perhaps you've heard of data URIs. It's a really nice way of including a resource that would have otherwise been a separate HTTP request. The format that you use in a data URI can vary. Essentially you just tell it what content type it is (e.g. image/png), semicolon, then the data of that file.
Like:
<img src='data: ... '>
or:
.bg {
  background: url('data: ... ');
}
For a raster image like a PNG, the data of that image needs to be in base64 format. I'm not a huge expert here, but as far as I understand, base64 is safe for use in something like HTML or CSS because it only uses 64 characters known to be safe in those formats.

On the left, the data of a PNG, which includes characters that have the potential to screw up HTML. On the right, that same image base64 encoded with all safe characters.

Probably better Stack Overflow answer by Dave Markle:
You never know - some protocols may interpret your binary data as control characters (like a modem), or your binary data could be screwed up because the underlying protocol might think that you've entered a special character combination (like how FTP translates line endings).
So to get around this, people encode the binary data into characters. Base64 is one of these types of encodings.
Base64 looks like gibberish, and we often associate gibberish with compression on the web. But this gibberish isn't compression, it's actually a bit bigger than the original because, to quote Jon Skeet on the same Stack Overflow thread:
It takes 4 characters per 3 bytes of data, plus potentially a bit of padding at the end.
I'm not sure how gzip factors into it though. But what I'm getting at here is how SVG factors into this.
You can use data URIs for SVG too.
<img src='data:image/svg+xml; ... '>
.bg {
  background: url('data:image/svg+xml; ... ');
}
For SVG, you don't have to convert the data into base64. Again, not an expert here, but I think the SVG syntax just doesn't have any crazy characters in it. It's just XML like HTML is, so it's safe to use in HTML.
You can leave the encoding in UTF-8, and drop the  syntax right in there! Like this:
<img src='data:image/svg+xml;utf8, ... > ... </svg>'>
.bg {
  background: url('data:image/svg+xml;utf8, ... ');
}
So because we can do that, and we know that base64 often increases the size, might as well do that right? Yep. As a side benefit, the  syntax left alone does gzip better, because it's far more repetitive than base64 is. Say you wanted two versions of an icon, one red, one yellow. You can use the same SVG syntax duplicated just change the fill color. Gzip will eat that for breakfast. Credit to Todd Parker for that tip, and that's also the approach of Grunticon, which data URI's SVG in UTF-8 into CSS.

A Test

To test this out, I downloaded three SVG icons from IcoMoon.


cog.svg - 1,026 bytes
play.svg - 399 bytes
replay.svg - 495 bytes
I ran them through SVGO just so they are nicely optimized and kinda ready for use as a data URI (whitespace removed, although I guess not strictly necessary).
cog.svg - 685 bytes
play.svg - 118 bytes
replay.svg - 212 bytes
Then I ran those through a base64 converter.
cog.svg - 916 bytes - 133% of the original size
play.svg - 160 bytes - 136% of the original size
replay.svg - 283 bytes - 134% of the original size
So that makes sense, right? If it's 4 characters for every 3 bytes, that's 133% bigger, with the variation coming from uneven lengths and thus padding.
Anyway, maybe this is all super obvious. But it just seems to me if you're going to use a data URI for SVG there is no reason to ever base64 it.
Props to Matt Flaschen for his email a few months ago that highlighted this issue for me.

Ubuntu 14.10 desktop: security for global users

Ubuntu 14.10 desktop delivers latest applications and developer support


  • Over 30 million computers preinstalled with Ubuntu have shipped globally in two years and OEM sales of Ubuntu machines are growing in EMEA and South East Asia, while Ubuntu Kylin experiences continued growth.
London, 23rd October 2014: Ubuntu 14.10, the latest desktop release is today available for download from Canonical. This release focuses on the developer experience, overall quality, and brings a number of important features and security enhancements. The Ubuntu desktop continues to be intuitive, easy to use and reliable for users all over the world.
Ubuntu is a popular choice for developers targeting the cloud, mobile or devices because it is easy to use, fast and secure. Ubuntu 14.10 introduces the first iteration of the Ubuntu Developer Tools Centre, which makes it even easier to develop on Ubuntu. It downloads all the Android toolkits and their dependencies and integrates them with the launcher in a single command. This is first available for Android and will soon extend to other platforms such as Go and Dart.
The workhorse applications on Ubuntu, including LibreOffice, Firefox, Chromium and Rhythmbox, have all been updated ensuring the latest versions and features are available on 14.10.  A new addition to Ubuntu is the ability to watch Netflix with Chrome, so viewers can stream TV shows and movies directly to their Ubuntu desktop. The very latest printers will also benefit from 14.10’s new IPP Everywhere™ support, which means Ubuntu will automatically identify and connect to networked and USB printers without any configuration or special software.
Ubuntu 14.10 runs the 3.16 kernel which offers better support for Power8 and ARM 64 architectures and graphics support for NVIDIA and AMD graphics as well as Intel’s Haswell, Broadwell, Merrifield and upcoming Cherryview chips. The kernel gives an improved audio experience with support for the Radeon H.264 video encoder. This release also brings performance improvements in suspend/resume times.
Jane Silber, CEO of Canonical comments; “The continued development and quality of Ubuntu on the desktop is creating more demand from government, education, business, developers and consumers alike. Downloads of Ubuntu are consistently strong and we are experiencing rapid growth of our OEM business.”
Industry analysts are recognising better than expected global PC shipments and reports from both IDC  and Gartner  indicate a general stabilisation of the PC market. Canonical’s PC OEM businesses echoes this trend with major OEM partners seeing solid growth in many markets. South East Asia has seen particularly strong growth with OEM partners in the consumer market; EMEA has also seen strong steady volumes driven by wider adoption across public sector and education users.
Ubuntu Kylin, the Chinese specific desktop operating system has also seen huge traction with over seven million copies downloaded since 2012 and four million copies of the last release, 14.04 LTS. In the last cycle, Ubuntu Kylin was added to the Government Centralised Procurement Program , a procurement list of approved technologies for government use. To co-incide with the global 14.10 release, Ubuntu Kylin is released today. See the Ubuntu Kylin press release here: http://www.ubuntukylin.com/news/ 
Availability
Ubuntu 14.10 desktop is available for download at www.ubuntu.com/download  

Can other have the same email address as yours??????







Email spoofing: The story of “Congratulations you have won a lottery” like spam emails

Mail vs E-mail
Back in old days when internet was not so common, we had to rely only on the postal/courier services. The only thing that bugs me about the traditional mail is their speed. This is when email comes. It offers numerous benefits, like its blazing fast, most of the time its free, you can attach from pictures to videos, from management point of view you don’t have to maintain a hard folder, last but not least its environment friendly. In short, email is one of the greatest inventions of all time.

What is a spam?

I’m not that old, but again back in those dial-up connection days, there was no such thing as Gmail, most of people either used Hotmail or Yahoo mail for the emails. The problem with these two email service providers is the spams. Spams are irrelevant emails coming to you, mostly used for marketing a product/service, but they are cases where spam emails have hacked a person through social engineering attack or session hijacking. Phishing is also associated with spoofed emails, phishing is “the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers“.

If you only use Gmail, you are a lucky person, because Google has got some very intelligent and sophisticated spam filtering mechanism. And frankly speaking I don’t get spams at all in my Gmail, but in case of Ymail or Hotmail … let’s just not talk about it.

What is e-mail spoofing?

In today’s article I will focus on Email spoofing. So, the first question you may ask is what is spoofing? Spoofing in simple terms is when Alice tries to be Bob. Email spoofing is when Alice sends an email to Eve but she keeps her identity to be Bob. When Eve receives an email she thinks that Bob has sent the email but it’s not.

*PLEASE NOTE THIS TUTORIAL IS FOR EDUCATIONAL PURPOSES ONLY. GENERATING SPOOFED EMAILS OR SPAM IS ILLEGAL AND PUNISHABLE UNDER THE LAW. YOU WILL BE RESPONSIBLE FOR YOUR ACTIONS.*

Platform: Windows 7 (also works on MAC and Linux)

How to spoof an e-mail ?

There can be different ways of spoofing an email, but I am going to use “sendmail” program for it. Sendmail is a simple command line program used to send emails via SMTP protocol.

1. Go to Google and type “sendmail google code”. Open the page highlighted below or download here :https://code.google.com/p/mailsend/downloads/detail?name=mailsend1.17b14.exe&can=2&q

2. This is what sendmail on google code looks like.

3. Go to the download section and download the appropriate file, as I m on windows so, I will be downloading the “.exe” file.

Open the command line and call the program “mailsend”. As soon as you type mailsend, the first thing it will ask for is SMTP server. This is a very critical part, if you don’t provide the right SMTP server your email will not be sent. You have to chose a SMTP server that doesn’t require authentication. I will be using PTCL’s SMTP server i.e “smtp.ptcl.com.pk“, this server runs on port 25.

Next in “from”, enter the email ID of the person you want to spoof, In this case I m making a spoof email of Bill Gates i.e “billgates@microsoft.com“

Provide the email id of receiver, I m giving my own email id.

Enter subject and then write your message, after you have completed your message.

Press enter, then press dot button and again press enter, a message will pop that your email has been sent.

Here you can see my inbox has got that spoofed email.

Inbox overview.



hack computer in lan

Hello Friends!
I hope you will enjoy my previous post and now I am sharing with you "How to hack computer in LAN".
Tools Required:
1) USER2SID & SID2USER


2) NetBios Auditing Tool


Download USER2SID & SID2USER
Download NetBios Auditing Tool

After Download then extract both  in C:\ drive

Note: Rename "NetBios Auditing Tool" to "nat"You now need to create a null session to the target computer
Code: write in CMD(command prompt)  
net use \\192.168.1.3\ipc$ "" /u:""
Note:Replace 192.168.1.3 with your victim Computer IP address. 
Now open USER2SID & SID2USER folder in cmd
First we open USER2SID tools in CMD
Code: user2sid \\192.168.40.128 guest
Note : Replace IP address with your address.  
We will test against the Guest account because Guest account is a built in account.

After we get the ID,we need to do some modification on the ID.


We take the ID we get from the guest account and modified it become 

"5 21 861567501 1383384898 839522115 500".

Please leave out the S-1-,leave out all the - too.

Code: sid2user \\192.168.40.128  5 21 861567501 1383384898 839522115 500

Now you will see that you get the username of the Administrator account.


In this case,the Administrator account is Administrator.



Create a text file called user.txt and the content will be the username of the Admin account.(If it is already create on tool then do not create it)

Prepare yourself a good wordlist for Passwords

Now we are going to crack the Admin account for the password in order to access to the target computer.


Browse to the NetBios Auditing Tool directory.In this case,I have get the password.




Note: Most of User have administrator password empty mean there is no password for administrator so leave above if administrator password is blank.


In order to proof that I can get access to the target computer using this password.

After you press enter,it will prompt you for the username and password.
 Therefore,just input them inside the prompt and continue. 
Target C drive will be on your screen.

Success Tips from the Forbes Under 30 Game-Changers

From October 19th to 22nd, Forbes hosted over a thousand innovators in downtown Philadelphia for the first-ever Forbes Under 30 Summit. Among the attendees were those selected for the 30 Under 30 lists spanning across a multitude of industries.
Here are success tips from just 30 honorees from a wide variety of sectors for all you youngin's out there dreaming to get into the spotlight:
1. "To make yourself better, surround yourself with people you aspire to emulate in the future. Never become complacent because that will be the difference between whether you are good or great." -Vikas Mohindra, Senior Financial Advisor at Merrill Lynch
2. "Don't be afraid to chart your own path. You don't need to climb a ladder to become successful and make an impact. You're never going to feel experienced enough. Just start and never look back." -Andrew Dumont, Entrepreneur in Residence at Betaworks
3. "We've become too complacent with what it means to be a teacher, lawyer, social worker, etc. We shouldn't buy into the old definitions of these roles just for posterity's sake. We need to redefine all our society's positions in order to create the world that everyone deserves." -Lauren Burke, Co-Founder, Executive Director, and Resident Obstacle Smasher at Atlas:DIY
4. "If you think you have a good idea, just go for it. Worst that can happen is you'll fail and you'll learn a lot. If you don't at least try, you will likely regret it." -Aaron Firestein, Co-Founder and Chief Artist at BucketFeet
5. "If your idea, pitch or product can't be explained simply, keep refining. The best ideas are so simple, you feel stupid for not thinking of them first." -Jezali Ratliff, Senior Director, Global Consulting at Wasserman Media Group
6. "Building a community around an idea means identifying opportunities for all to participate. At every juncture, there is a network worth engaging." -Dan Berkowitz, Manager at Youth Orchestra LA
7. "Be open to what you don't know and never stop learning. Whether it is from books, experiences or people, the day you stop learning is the day you stop living." -Gregory Kimball, VP of Marketing & PR at Caskers.com
8. "Develop a habit of self-reflection. Knowing how you're doing is as important as what you're doing."-Dale J Stephens, Founder at UnCollege
9. "Getting buy-in is an ongoing journey -- there will always be naysayers. The most important thing is to roll up your sleeves, bootstrap prototypes if necessary, and prove to the world your idea is of value." -Priyanka Bakaya, Founder, CEO at PK Clean
10. "Contrary to the sometimes popular opinion, YOU can actually make a difference! It's your drive and willingness to work hard that will lead to success. And, once you find that success, get involved and give back to the community around you!" -Aaron Letzeiser, Founder at The Medical Amnesty Initiative
11. "Don't do it for the money. Find something you'd do for free. Money will come and go but if you're happy and you can positively impact some peoples lives, that's truly being successful." -Shane Spencer, CEO at Green REIT
12. "It's a marathon, not a race. Always approach your success with the mentality that there is no destination. You have to keep going.-Carlton McCoy, Wine Director at The Little Neil
13. "My father once told me: Always try to make time for family and friends because at the end of the day, no matter how great work is going, your job will never love you back."-Siobhan Pattwell, PhD, Researcher, Fred Hutchinson Cancer Research Center
14. "Passive plus drive equals success. Strive for success in all aspects of whatever you do."-JJ Johnson, Chef de Cuisine at The Cecil
15. "Don't assume your advisors have all the answers. Get your hands dirty, muck around and figure it out for yourself. If you're wrong, imagine how much you'll learn in the process."-Aleksandar Kostic, Postdoctoral Fellow at Broad Institute
16. "Find something you love and specialize in it. It's good to be well-rounded and diverse in your skill set, but also be the best at something. Don't be good at many things, be phenomenal at one thing."-Jesse Katz, Winemaker at Lancaster Estate
17. "Create the life you've imagined and above all, take pleasure in any work that you pursue."-Albert Mach, Senior Engineer at Becton, Dickinson and Company
18. "Don't start a new company/organization unless you're seriously committed to seeing it through to success, which usually takes years of hard work. Use your talents to solve problems that really matter." -Teryn Norris, Tech-To-Market Advisor, US Department of Energy
19. "You need to position yourself. Know your capabilities and your incapabilities. And then follow your heart to do whatever you really want to do." -Changxi Zheng, Assistant Professor at Columbia University
20. "Starting a company will be the biggest roller-coaster ride of your life, and the only way to get through the rough times is to truly believe in what you do." -Derrick Fung, sold Tunezy to SFX Entertainment
21. "Have more than just an idea. You need to not only have unique idea but also relentless will to execute it and the foresight to pivot/restructure when the market dictates despite your attachment to the current plan." -Marc Succi, Founder & Editor-in-Chief at 2 Minute Medicine
22. "Show interests outside of textbooks. Have a passion beyond an academic subject and let that guide you as you choose a career. Follow that and good things will happen."-Jonathan Cloonan, Director of Partnerships at GroupM Entertainment
23. "Be authentic, kind and generous to others. You will find you have so much more momentum if you have the genuine help and support of those you have supported yourself." -Tiffany Pham, Founder & CEO at MOGUL
24. "If you truly believe in your company and vision, others will see that and be more willing to listen. Articulate a narrative that others can easily grasp." -Courtney Powell, Founder and CEO at PublikDemand
25. "Failure is something everyone experiences. The real difference in terms of success is how you look at failure. If you're willing to learn from your experiences, you'll likely turn it into something better than what you started out with." -Steph Parker, Activation Strategy at Allen & Gerritsen
26. "Make sure to not lose sight of your own mission. It's hard to remember the change you want to have in the world -- don't forget what you believe you can do." -Amy Karr, Global Creative, Zero Dot at Starcom Mediavest Group
27. "Don't go at it alone. I attribute a great deal of my success to my business partner and my incredible team. Know your strengths and weaknesses and surround yourself with the smartest people you can find with complementary skills."-Brent Weiss, Principal at Brotman Financial Group, Inc.
28. "Find an arena that is endlessly fascinating to you. Stay humble and never stop searching for the "truth" in your area of expertise." -Alex White, Co-Founder and CEO at Next Big Sound
29. "The competitive advantage that comes from relying only on being the smartest person in the room or only on your business, financial, or strategic acumen is incremental and limited at best. So, in EVERYTHING you do, be a person whose every decision is led by LOVE. I promise you that you personally have everything to gain by doing so, too." - Seth Maxwell, President & CEO at The Thirst Project
30. "Your inexperience can be your greatest asset. You may have few preconceived notions on how a problem must be solved. Pursue ideas that may seem strange, unlikely or off the beaten path...because the distinction between ridiculous and genius is sometimes only one of semantics." - Derek Khanna, X-Lab Fellow
Undoubtedly, advice from these passionate, young game-changers provokes your imagination. Now that you're inspired, it's time to put some of this awesome wisdom into practice. Good luck!

What will happens Windows 7 on October 31?????

I've gotten a few questions from concerned readers about a fast-approaching deadline date for Windows 7.
windows7cutoffdates
After October 31, 2014 -- Microsoft will no longer provide its PC partners or systems builders with copies of Windows 7 Home Basic, Home Premium and/or Ultimate to preinstall on new PCs. This means that OEMs will be able to continue to sell their stock of PCs running these versions of Windows 7, but they won't be allowed to replenish their supply.
(Last year, on October 31, Microsoft ceased selling shrink-wrapped copies of Windows 7 at retail.)
That looming October 31, 2014 deadline does not apply to PCs preinstalled with Windows 7 Professional, however. Microsoft officials said again this week they still have not yet gone public with the end of sales cut-off date for PCs running Windows 7 Pro. That lack of a firm cut-off date is a good thing for business users who are still leery of Windows 8 and waiting to hear more about Windows Threshold/Windows 9 before committing to buying PCs with those versions of Windows preinstalled.
The October 31, 2014 cut-off date has no implications for end of support or downgrade rights for Windows 7.
Mainstream (free, Microsoft-provided) support for Windows 7 with Service Pack 1 installed isn't expiring until January 13, 2015. Microsoft will continue to provide security fixes for Windows 7 for free until the end of extended support, which is January 14, 2020 -- unless Microsoft ends up extending that support date, as it did with Windows XP.
On the downgrade rights front, users are still able to buy a new PC with an OEM license for a business edition of Windows and then install an earlier version. PCs with Windows 8.1 Pro can be downgraded to Windows 7 Professional or Windows Vista Business. Microsoft volume licensees don't have to worry about their OEM's downgrade rights provisions; they have the right to downgrade to any prior version of Windows.

How Facebook Finds Out If Your Passwords Were Stolen

Some of the largest companies around the world have been dealing with security breaches over the last couple of years. Making matters worse, people often use the same e-mail address and password combinations on multiple websites. Consequently, attackers have been able to successfully use some of the stolen login credentials to log into multiple websites associated with the victim, including Facebook, Google GOOGL +2.27%, Dropbox, Twitter TWTR +1.87%, Instagram and Snapchat. Fortunately, Facebook has a way of warning users if their passwords were stolen.
Facebook security engineer Chris Long said that the social network specifically looks at websites where hackers leak e-mail addresses and passwords. Facebook built a tool that actively looks for public postings on websites like Pastebin.com containing login credentials and notifies account owners if their information has been compromised. In the notification, Facebook guides those users with a tutorial on how to change their password. “This is a completely automated process that doesn’t require us to know or store your actual Facebook password in an unhashed form. In other words, no one here has your plain text password. To check for matches, we take the email address and password and run them through the same code that we use to check your password at login time,” said Long in a recent blog post entitled Keeping Passwords Secure.
Once the data is downloaded and parsed, the automated system checks each of them against Facebook’s internal databases to see if any of the leaked e-mails and passwords matches valid login information on Facebook. Facebook stores passwords as hashes in its own database so it has to hash the leaked credentials first and compare them. Facebook uses hashing as a way to verify whether the input matches the stored hash value without actually deciphering the text, including passwords, credit card details, etc.
Facebook suggested a couple of ways to take extra precaution in protecting your login credentials. The first suggestion is to set up two-factor authentication, which requires you to enter a security code from your phone when you log in from a new browser. And the second suggestion is to use Facebook Login when you use third-party websites and apps so you do not have to remember separate usernames and passwords.
Facebook Login
Credit: Facebook
Facebook started tracking public postings of leaked login credentials ever since Adobe announced its servers were hacked in October 2013, exploiting millions of usernames and passwords. Facebook compared the login credentials between its own users and Adobe. For security purposes, Facebook hid the profiles of users with the same credentials as Adobe. Here is the warning that Facebook showed users that were exploited by the Adobe hack (h/t KrebsOnSecurity):
Credit: Krebs On Security
Credit: Krebs On Security
What are some other ways to remain proactive in terms of password security? I recommend changing your password every time there is news about a major security breach. Generally, I change my password five to six times per year. The website IsLeaked.com can check to see if your e-mail address has been leaked on ‘paste’ sites as well.
What are your thoughts about Facebook’s method for finding out if your password is stolen? Let us know in the comments below!

Five Business SEO Tips You Can Implement In-House Right Now-just do it

Every small business owner should implement search engine optimization into his or her online marketing strategy, but many shy away because they think they need a huge budget to get started. An effective and complete strategy will cost money, but that doesn't mean you have to sit idle until you can afford to hire an SEO agency.
Here are 5 small business SEO tips that you can implement right now in-house. These can help you improve your online presence and begin to attract website traffic. Some businesses have to start small because of budget limitations, and there is nothing wrong with that. Following these tips will help you build a solid foundation that an agency can build on when the budget becomes available.
1. Google My Business
The majority of consumers turn to Google search when they are looking for information. It is the dominant search engine, commanding a 67.6% market share, making it extremely important that your small business is found in Google's local search results.
Make sure that you create a Google My Business profile, fully complete all sections and select the most appropriate categories for your business listing. Fill out your full business address exactly as it appears on your website, business location hours, write a complete description of your business, and include the maximum number of photos.
2. Encourage Customer Reviews
Gathering positive reviews online is an important part of small business SEO. There are many ways that you can ethically encourage reviews without straight-up telling your customers to leave a review. E-commerce websites can send an email to previous customers letting them know that their feedback is valuable, and providing links to popular review sites such as Yelp and Google My Business.
Businesses with physical locations can create a page on their website that has links to all of the review websites and direct their customers to the address on receipts and postcards placed in bags. There is a right way and a wrong way to collect reviews. For more information read over Google's local review policies.
3. Secure Links From Trust Sources & Local Organizations
Is your business an accredited member of the Better Business Bureau? If not, then you are missing a great link opportunity. Is your business a member of your local Chamber of Commerce? Again, this is a great link opportunity. Membership organizations like these are a great way to earn high quality links, but they also convey a level of trust.
You can also find amazing link opportunities from local organizations, including charitable groups, schools, and community events. Often times these can double as a link opportunity as well as an opportunity to put your business in front of your local community.
4. Create Citations & Audit NAP Data
There are many business directories that allow you to create a listing for free, complete with your business name, address and phone number. This is often referred to as NAP data, and it is very important that your NAP remains 100% consistent across every business directory.
Listings like Yelp, yp.com, and foursquare are all great listings that you should claim and complete. There are tools available, such as Moz local that will help you identify, claim and manage local listings. Moz local also audits your listings, identifying duplicate listings and inconsistent data.
5. Publish Consistent Content
You should have a blog on your website and it is important that you publish new fresh content on a regular basis. Not only does a frequent content schedule give your website visitors something new to engage with each time the visit, but it also gives you a change to target long tail local-focused keywords to rank in the organic search results.
Hiring an SEO agency or a full-time writer to create content might not be in the budget at the beginning, but that doesn't mean you should neglect your content publishing. Source blog posts from within your business -- assign topics to employees and develop contributors from within.

Facebook's New App 'Rooms' now You can Chat Anonymously

FACEBOOK

download all hit movie collection of 2009

all hit movie of 2009 tou will get in single link now. so download quickly.....comment and share more to inspire us......








Hit.And.Run.(2009).DVDRip_DGN_CW

Crank 2 - High Voltage 2009


Crank.High.voltage.2009.x264.300MB

18Year Old Virgin 2009


18_Year_old_virgin

Angles And Demons 2009


Angles.And.Demons.(2009).R5_DGN_CW

Paul Blart Mall Cop 2009


Paul.Blart._Mall.Cop_Dvd_x264_DGN_CW

Knowing 2009


Knowing_2009

Ready Or Not 2009


Ready_Or_Not_2009

Obsessed 2009


Obsessed_2009

Notorious 2009


Notorious_2009

Fast & Furious 2009


Fast.and.Furious.2009

The Pink Panther 2 2009


The_Pink_Panther_2

The Steam Experiment 2009


The_Steam_Experiment_2009

Underworld:Rise of the Lycans 2009


UnderworldRise_of_the_Lycans_2009

Against The Dark 2009


Against_The_Dark_2009

12 Rounds 2009


12_Rounds_2009

Dead Like Me:Life After Death 2009


Dead_Like_MeLife_After_Death_2009

Into the Blue 2: The Reef 2009


Into_the_Blue_2_The_Reef_2009

Land Of The Lost 2009


Land_Of_The_Lost_2009

Night Train 2009


Night_Train_2009

Behind Enemy Lines: Colombia 2009


Behind.Enemy.Lines.Colombia.2009.x264

The Informers 2009


The_Informers_2009

A perfect getaway 2009


A_perfect_getaway_2009

Labor Pains 2009


Labor_Pains_2009

Grace 2009


Grace_2009

State of Play 2009


State_of_Play_2009

Crossing Over 2009


Crossing_Over_2009

Ice Age 3 Dawn Of The Dinosaurs 2009


Ice_Age_3_Dawn_Of_The_Dinosaurs_2009

YEAR ONE 2009


YEAR_ONE_2009


Blood And Bone 2009


Blood_And_Bone_2009

Cry Of The Owl 2009


Cry_Of_The_Owl_2009

Drag Me To Hell 2009


Drag_Me_To_Hell_2009

Bruno 2009


Bruno_2009

Jennifers Body 2009


Jennifers_Body_2009

Tormented 2009


Tormented_2009

The Haunting In Connecticut 2009


The_Haunting_In_Connecticut_2009

Blood The Last Vampire 2009


Blood_The_Last_Vampire_2009

Damage 2009


Damage_2009

Spread 2009


Spread_2009

Doghouse 2009


Doghouse_2009

ASSASSINATION OF A HIGH SCHOOL PRESIDENT 2009


ASSASSINATION_OF_A_HIGH_SCHOOL_PRESIDENT_2009

WRONG TURN 3 LEFT FOR DEAD 2009


WRONG_TURN_3_LEFT_FOR_DEAD_2009

Across The Hall 2009


Across_The_Hall_2009

Hardwired 2009


Hardwired_2009

Moon 2009


Moon_2009

Deadline 2009


Deadline_2009

Five Minutes of Heaven 2009


Five_Minutes_of_Heaven_2009

The Sniper 2009


The_Sniper_2009

Zombieland 2009


Zombieland_2009