Rss Feed Like Us on facebook Google Plus
Showing posts with label internet. Show all posts
Showing posts with label internet. Show all posts

December 10, 2013

Object Error in Internet Explorer (IE- 7,8,9,10,11)


While opening Internet Explorer you are getting the Object Error in a popup window, this error may come while opening a new web page or between surfing a website.


Issues:
1.most add-ons are not compatible with the 64 bit version of ie
2.Many dysfunctional addons from various utilities will effect the internet explorer
3.Security suites Privacy features/ Toolbars 
4. unwanted addons ,toolbars

Solution:

Here are the few steps to resolve this problem, please follow these steps to automatically resolve it.

Step 1.  Uninstall Unwanted Toolbars from add/remove program

Example:-
privacy safe gaurd,Social Privacy,unfriend checker,Price peep today,Coupon amazing,We-Care Toolbar

Step 2. Disable all addons except from Microsoft

goto Tools >> Manage Add-Ons
or you can use this MS fixit utility.

Step 3. Reset Internet Browser Setting

goto Tools >> Internet options >> Advanced tab 

Click on Reset Button and Restore Advance Setting button


Restart your Browser/System then check. your problem should be resolved.


Read More

November 20, 2013

Ways to Prevent from Popular Online Scams

Online Scams can be done in many forms to your computer,phones or website. so this article going to cover some popular online scams and ways to prevent from it...
 
The use of Internet services or software with Internet access to defraud victims or to otherwise take advantage of them, for example by stealing personal information, which can even lead to identity theft. A very common form of Internet fraud is the distribution of rogue security software. Internet services can be used to present fraudulent solicitations to prospective victims, to conduct fraudulent transactions, or to transmit the proceeds of fraud to financial institutions or to others connected with the scheme.
 
Internet fraud can take many forms: identity theft, injecting malware, fraudulent transactions. It can occur through e-mail, smartphones, websites, and chat rooms. Here are some such scams and ways to avoid them.

These are the sites that are not legitimate and have malicious software to hack your personal information. A lot of such infected sites come up during festive season, when people are buying gifts online, and hackers build these using popular search items. Another variation of infection is legitimate sites that get heavy traffic and, hence, are injected with ads and images that have viruses. 
 
>> A good way to avoid these is to go with familiar, popular sites or install ad blockers on your browser.

2) Fake phone apps

Be very careful about the apps that you download on your phone. Android and Apple phones are particularly vulnerable to fake apps in their stores, and these can introduce malware that steals the datayour phone. 
 
>> To avoid fake apps, check the users' review about the game or app before you download it. You can also go to the developer's website and get more information about the app before zeroing in on it. Another safe option is to go for the most downloaded apps or those that come with the 'editor's tag'. Avoid the apps that are 'paid' but are being offered for free, or ask for too much information.

3) International dialling

If your Internet connection is through a modem using a local telephone number, beware. Some sites lure people into viewing content that requires them to download a dialler or viewer. If you do so, your computer will be disconnectedthe Net and will instead be used to dial an international number, resulting in high phone bills. 
 
>> To safeguard yourself, avoid sites that require you to download a program to view content. You can also have your line blocked making international calls. Also make sure your computer has anti-malware software to detect any illegal activity.


This is probably the oldest known scamming technique that is still going strong. Here e-mails, purportedly sent outwell-known institutions and social networking or payment sites, are used to draw out sensitive, personal informationpasswords and credit card details. These mails could also carry links to infected sites.

>> A preventive step is to never give out personal information and call up the company to crosscheck that the e-mail is genuine. Also scan the url for security (use of https in the address bar means it is safe).

5) Pharming

A combination of 'farming' and 'phishing', this term refers to the process by which a hacker gets a domain name for a site and then uses it to redirect this site's traffic to another, bogus website. It can comp romise serious information and cause heavy losses if the site being copied is that of a bank or taxation department. It can also be used to steal passwords, PIN or account numbers.

>> The best way to prevent this is to make sure you use secure Web connections (https) to access privacy-sensitive sites.

 
6) Wi-Fi hacking

If you use a public Wi-Fi connection, such as at airport terminals or coffee shops, to log into your account, you stand the risk of having your password and private information hacked. The hacker can also access your browsing history. This is especially true if you save the password to your account. 
 
>> If you are using a smartphone to access your account, try to use the 3G or 4G connection as it is more secure.

7) Auction/shopping scams

With online shopping and auction sites—wherein you put up household items and gadgets for bidding and sale— becoming popular, the scope of fraud has increased. You could be scammed out of your money by not receiving the goods at all, getting poor quality items, or beingged more than the price mentioned. Your credit card information could also be used fraudulently. Besides, the seller could be defrauded if he doesn't get any payment.

>> To avoid it, make sure you know as much as possible about the item and seller/buyer. The latter shouldn't have just an e-mail or a post office box address. Call him up and ask him about the address and extrages. Also go through the feedback.

8) Investing scams

Here, the prices of stocks are manipulated by sending out false information about the companies through e-mails, chat forums or Internet boards. This results in a rise or fall in the prices of stocks and the scamster benefits by selling or buying shares at the right time. In another variation of investing scam, which came under the Sebi scanner recently, companies were offering 'guaranteed return' schemes through e-mails, websites, blogs and social media platforms, and conning people out of their money. 
 
>> The best way to avoid it is to conduct your own research about the company, and not invest in schemes that promise outrageous returns.

9) Employment fraud

There are two variants of this scam. The more common one involves job offers by recruiters that require you to pay an advance fee or make a deposit, without the job ever materialising. The second one typically offers you the job of a 'representative' of an overseas company and your task is to collect customers' deposits in your account and remit most of it to the company abroad. In doing so, you could not only be a victim of identity theft, but also have money stolenyour account.

>> Avoid any such offers without verifying the company and do not give out personal information.

10) Click scams 

Have you ever clicked on the game strips or dancing/jumping figures that pop up and move across your screen while you are on social networking or other sites? 
 
>> Don't click on on the game strips or dancing/jumping figures . These could be fake and could lead you to click on concealed links, which either make your personal information public or provide access to confidential information stored on your computer.
 
Read More

June 27, 2013

change internet explorer page setup programmatically with C#

Change printer setting of internet explorer with C#,basically you can change it bu updating
registry key.

Users can easily change Internet Explorer printer settings for the page margins, the header, and the footer through the Internet Explorer user interface. However, Internet Explorer and the Web Browser control do not include methods to change these settings programmatically.

The following steps outline how Microsoft Internet Explorer accesses the printer settings:

  1. Internet Explorer tries to obtain the values from the following registry key:
    HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\PageSetup
  2. If the key in step 1 does not exist, Internet Explorer tries to create this key by copying the values from the following key:
    HKEY_LOCAL_MACHINE\Software\Microsoft\Internet Explorer\PageSetup
  3. If the key in step 2 does not exist, default values are provided.
Checkout the below program..

using Microsoft.Win32;
 
namespace iesttings
{
    Class ie
    {
        public void ChangeIEPageSetupSetting()
        {
            string strKey = "Software\\Microsoft\\Internet Explorer\\PageSetup";
            bool bolWritable = true;
            string strName = "header";
            object oValue = "";
            string strName1 = "footer";
            object oValue1 = "";
            string strName2 = "margin_top";
            object oValue2 = "0.75";
            string strName3 = "margin_right";
            object oValue3 = "0.75";
            string strName4 = "margin_bottom";
            object oValue4 = "0.75";
            string strName5 = "margin_left";
            object oValue5 = "0.75";
 
            RegistryKey oKey = Registry.CurrentUser.OpenSubKey(strKey, bolWritable);
 
            oKey.SetValue(strName, oValue);
            Console.WriteLine("0 updated");
            oKey.SetValue(strName1, oValue1);
            Console.WriteLine("1 updated");
            oKey.SetValue(strName2, oValue2);
            Console.WriteLine("2 updated");
            oKey.SetValue(strName3, oValue3);
            Console.WriteLine("3 updated");
            oKey.SetValue(strName4, oValue4);
            Console.WriteLine("4 updated");
            oKey.SetValue(strName5, oValue5);
            Console.WriteLine("5 updated");
 
            oKey.Close();
            Console.ReadLine();
 
        }
    }
    class Program
    {
        static void Main(string[] args)
        {
           ie obj = new ie();
            obj.ChangeIEPageSetupSetting();
        }
    }
}

Note : - Your Web Application should have rights to change the registry settings.

Read More

September 2, 2012

Ants Speak the Language of the Internet


If you have thought than only humans are intelligent, then pay close attention. According to a paper written by a Stanford biologist and computer scientist, ants speak the language of the Internet - “ifs,” “elses” and “end ifs.”


Deborah Gordon, a biology professor, had recently prepared an algorithm that described how harvester ants go out and search for food. There was something suspicious in the algorithm, so Gordon called up computer science professor Balaji Prabhakar and asked him if that reminded him in any way of file transfers on computer networks.


Prabhakar told Bjorn Carey of Stanford engineering’s in-house news site, “The next day it occurred to me, ‘Oh wait, this is almost the same as how Internet protocols discover how much bandwidth is available for transferring a file!’ The algorithm the ants were using to discover how much food there is available is essentially the same as that used in the transmission control protocol.”


Carey explained the whole process, “Gordon has found that the rate at which harvester ants — which forage for seeds as individuals — leave the nest to search for food corresponds to food availability. A forager won’t return to the nest until it finds food. If seeds are plentiful, foragers return faster, and more ants leave the nest to forage. If, however, ants begin returning empty handed, the search is slowed, and perhaps called off.”


That process is almost identical to how computers transfer files on computer networks using transmission control protocol (TCP). The system divides data into numbered packets. When the destination receives a packet, it sends back an acknowledgment to the source. If that comes back slowly, the source will decrease speed, and if it comes back quickly, it will increase speed.
Read More

February 27, 2012

BSNL Launched a Tablet to Rival Akash Tablet

BSNL Tablet
BSNL has launched three tablets including two 7 inch resistive screen based tabs with Android 2.3 operating system while the third tablet comes with an 8 inch capacitive touchscreen.

>> Buy BSNL Tablet Now

More Details - http://bsnltablet.in/


Made by Noida based company - Pantel Technology, the tablets will be sold with discounted data plans from BSNL. The three tablets are priced at Rs 3,250, Rs 10,999 and Rs 13,500.
The cheapest model is Panta Tpad IS 701r which is priced at Rs 3,250. Notably, Aakash is priced at just Rs 2500. However, Tpad has better specification than the Datawind's low cost tablet.

Panta Tpad is a WiFi only tablet with Android 2.3 operating system, it has a 1 GHz processor (ARM11 IMAP210) clubbed with 256 MB RAM. The tablet also offers HDMI port through which it can be connected to a TV. Its 7 inch resistive touch screen comes with 800x600 resolution and 16:9 aspect ratio.

 The tablet has a 3000 mAh battery and 2 GB internal memory which can be expanded through micro SD card. The tablet also has a VGA front facing camera for video calling. While Panta Tpad IS 701r has the BSNL branding, the other two tablets images do not have.



The second tablet is named 'Panta Tpad_ws704c'. It has the same specification as its cheapest cousin (701r) but offers added 3G connectivity which supports both CDMA/EVDO and GSM, inbuilt A-GPS, Accelerometer and Bluetooth. It also comes with a 2 megapixel rear camera and also has bigger 512 MB RAM for faster performance.

The costliest amongst the three is the Tpad WS802C which has an 8 inch capacitive screen. It comes with a faster 1.2 GHz processor and 512 MB RAM. The internal memory is also bigger at 4 GB. Rest of the features like GPS, camera and Bluetooth are same as the 704C.

Source: here
 
Read More

February 3, 2012

Who owns the Internet?

Source:Getty Images
Imagine you're in a room full of people from different countries, and everyone only speaks his or her native language. In order to communicate, you'd have to come up with a standard set of rules and vocabulary. That's what makes the Internet so remarkable: It's a system that lets different computer networks communicate with each other using a standardized set of rules. Without rules, these computer networks wouldn't be able to communicate with each other.

Think for a minute about the scope of the Internet. It's a collection of inter-networked computer systems that spans the entire globe. It depends on several sets of rules called protocols. These protocols make it possible for computer communication across networks. It also relies on a huge infrastructure of routers, Network Access Points (NAPs) and computer systems. Then there are the satellites, miles of cable and hundreds of wireless routers that transmit signals between computers and networks.

The Internet's Owners
So who actually owns the Internet? There are two answers to this question:
  1. Nobody
  2. Lots of people
If you think of the Internet as a unified, single entity, then no one owns it. There are organizations that determine the Internet's structure and how it works, but they don't have any ownership over the Internet itself. No government can lay claim to owning the Internet, nor can any company. The Internet is like the telephone system -- no one owns the whole thing.
From another point of view, thousands of people and organizations own the Internet. The Internet consists of lots of different bits and pieces, each of which has an owner. Some of these owners can control the quality and level of access you have to the Internet. They might not own the entire system, but they can impact your Internet experience.
The physical network that carries Internet traffic between different computer systems is the Internet backbone. In the early days of the Internet, ARPANET served as the system's backbone. Today, several large corporations provide the routers and cable that make up the Internet backbone. These companies are upstream Internet Service Providers (ISPs). That means that anyone who wants to access the Internet must ultimately work with these companies, which include:
  • 1. UUNET
  • 2. Level 3
  • 3. Verizon
  • 4. AT&T
  • 5. Qwest
  • 6. Sprint
  • 7. IBM
Then you have all the smaller ISPs. Many individual consumers and businesses subscribe to ISPs that aren't part of the Internet backbone. These ISPs negotiate with the upstream ISPs for Internet access. Cable and DSL companies are examples of smaller ISPs. Such companies are concerned with what the industry calls the last mile -- the distance between the end consumer and Internet connectivity.
Within the backbone are Internet Exchange Points (IXPs), which are physical connections between networks that allow data exchanges. For example, while Sprint, Verizon and AT&T provide part of the Internet backbone's infrastructure, the three networks aren't intertwined. They connect together at an IXP. Several companies and non-profit organizations administer IXPs.
The individual computer networks that make up the Internet can have owners. Every ISP has its own network. Several nations' governments oversee computer networks. Many companies have local area networks (LANs) that link to the Internet. Each of these networks is both a part of the Internet and its own separate entity. Depending on local laws, the owners of these networks can control the level of access users have to the Internet.
You might consider yourself to be an owner of the Internet. Do you own a device that you use to connect to the Internet? If so, that means the device you own becomes part of the enormous inter-networked system. You are the proud owner of part of the Internet -- it's just a very small part.

If no one owns the Internet, who is responsible for making sure everything works?

The Internet's Caretakers
- As the Internet evolves, these protocols must also change. That means someone has to be in charge of the rules. There are several organizations that oversee the Internet's infrastructure and protocols. They are:
The Internet Society and IETF are open membership organizations. Both welcome the participation and input of Internet experts. They shape the way the Internet works and evolves.
ICANN, on the other hand, is a private organization. The exclusive nature of ICANN concerns some people. They argue that ICANN holds a lot of power over anyone who wants to register a domain name. ICANN makes money by accrediting vendors called registrars. These registrars then sell domain names to consumers and businesses. If you want to register a specific domain name, ultimately ICANN decides if you can have it.
While none of these organizations own the Internet, they each influence how the Internet works. The Internet has no central owner. While its structure remains carefully designed and maintained, the actual content on the Internet continues to be the untamed cyberspace we all know and love.

follow me on twitter
Subscribe me on Facebook
Read More

© 2011-2016 Techimpulsion All Rights Reserved.


The content is copyrighted to Tech Impulsion and may not be reproduced on other websites.