Friday, December 19, 2014

Now Anyone can Learn Programming with

Standard is a non-profit organization and eponymous website led by brothers Hadi and Ali Partovi that aims to encourage people, particularly school students in the United States, to learn computer science. The website includes free coding lessons, and the initiative also targets schools in an attempt to encourage them to include more computer science classes in the curriculum. On December 9, 2013, they launched the Hour of Code 2013 challenge nationwide to promote computer science during computer science week until December 15, 2013. Major tech companies and their founders, including Bill Gates and Facebook’s Mark Zuckerberg, have put up about $10 million for


According to its website, has the following goals:

Bringing Computer Science classes to every K-12 school in the United States, especially in urban and rural neighborhoods.
Demonstrating the successful use of online curriculum in public school classrooms
Changing policies in all 50 states to categorize C.S. as part of the math/science "core" curriculum
Harnessing the collective power of the tech community to celebrate and grow C.S. education worldwide
Increasing the representation of women and students of color in the field of Computer Science.

Launch and first video release: was launched in January 2013 by Hadi and Ali Partovi, with the goal of making programming accessible to everyone. Their initial focus was on creating a database of all computer science classrooms in the United States. The launch was covered in a number of technology publications online, includingTechCrunch,and Geekosystem. In late February 2013, a month after launch, they released a video featuring Mark Zuckerberg, Bill Gates, Jack Dorsey and other programmers and entrepreneurs on the importance of learning to code. This video was covered in a number of news sources. Two weeks after the launch, TechCrunch reported that the video had been a "blockbuster hit".

Hour of Code challenge:

During Computer Science Education Week  from December 9 to December 15, 2013, launched the "Hour of Code Challenge" on its website to teachcomputer science to school students, enticing them to complete short programming tutorials. The challenge involved getting people to write short snippets of code to achieve pre-specified goals using Blockly, a visual programming language of a similar flavor as Logo. The initiative had been announced about two months in advance. At the time of launch, the initiative was supported by United States President Barack Obama as well as leaders of many technology companies such as Microsoft and Apple Inc..About two weeks later, it was announced that over 20 million people had participated and over 600 million lines of code had been written as part of the challenge.

Friday, November 28, 2014

Why using VPN is important


Here are three words for you: Virtual Private Network (more commonly referred to as VPN). If you’ve never heard of the term, or aren’t sure about its exact nature in our info tech world, then chances are you’ve never utilized one. A VPN is facilitated for several reasons, by individuals and the business sector alike. Anyone who initiates one for their time on the internet will have a variety of reasons. They can vary according to the individual’s needs and wants; scaling from minimal personal usage to access international television programs not available in their region, to encryption and security during time spent in cyberspace. In essence, a VPN is used to secure and encrypt communications when using an untrusted network which is in the public domain.

The latter is the more common theme. In this day and age where big brother seems to lurk in every corner of our internet browser, more and more people, and companies, are resorting to the use of a VPN provider. In fact, as people are educating themselves on the realms of the digital jungle that is fast becoming a second home, the VPN is becoming a common household name. And why not? With hackers at the ready to steal your sensitive information, and government regimes watching and monitoring your every move, the VPN is now an essential addition to add to our daily internet rituals. In essence, public networks are cesspits, and if we dwell in them too long, without the correct protective elements, then we tend to ‘pick up’ those bugs which dwell in them.

When you use a VPN, the usual presentation is to launch a VPN client on your personal computer. You log in; your computer then “exchanges trusted keys with a server,” and once both systems have been authentically verified, your communication on the internet is secure.

However, not all VPNs are created equally. When searching for the right VPN for your own use, it is important to know what it is you are signing up for, and who with. You need to take into consideration connectivity protocols, features and server locations. The best VPNs will offer a good selection on these criteria. Most importantly, the VPN Provider should have a so called ‘no-logging policy’ which ensures that no user activity will be logged.

You need to be aware of other considerations such as trusting your provider with your data. In other words, what do they log? Everything outside of your VPN server is secure from eavesdropping, but those sharing the same provider may have access to your data. Some VPN providers keep logs in case a government requests them, so decide what is acceptable to you when it comes to logging. AnonHQ recommends IPVanish as it fulfills all criteria regarding speed, security, support of all mobile devices and most importantly anonymity and safety: “IPVanish does not collect or log any traffic or use of its Virtual Private Network service”

Other features you may want to consider are:
Does your VPN provider offers Anti Malware/Spyware?
Do you have the option of securing your phone along with your computer via Mobile Apps?
Pricing of the provider.
Exit Servers if you want a country specific VPN.

Essentially, the million dollar question to ask yourself when you are considering a VPN (or not) is: how secure do you want to be next time you surf the net?

Links: IPVanish VPN (recommended by

.................................................................................Collected From

Saturday, November 8, 2014

First Microsoft Lumia phone to be revealed on 11th November 2014


The first Microsoft Lumia smartphone is looming, with its unveiling set for Tuesday,11.11.2014

The company posted late Thursday a teaser of a smartphone with #MoreLumia hashtag, showing off an orange frame around what is presumably the front of the camera.

The new Lumia smartphone will mark the first time the product line drops the Nokia moniker in favor of Microsoft's name, signifying a new chapter for the mobile devices, which have struggled in the marketplace. The smartphones, which have featured bright colors and a reputation for powerful cameras, barely make a dent as far as sales go, except in a few emerging markets. But Lumia smartphones may have a new lease on life under Microsoft -- at least that's the company's hope.

"Microsoft is delivering the power of everyday mobile technology to everyone," states the new post on the renamed Conversations blog where Microsoft and previously Nokia share Lumia-related news.

The Windows Phone operating system likewise needs a spark. The OS has yet to catch on and powers just 2.5 percent of the world's mobile devices, according to market researcher IDC. In comparison, Google's Android OS runs on nearly 85 percent of mobile devices worldwide.

The orange frame of the teaser image ties together with the orange image that Microsoft revealed last month that touted the Microsoft logo alone. Although the image showed only part of what could be a new smartphone, the company name and Windows-shaped logo aren't actually joined by the word Lumia.

"We are looking forward to unveiling a Microsoft Lumia device soon," Tuula Rytilä, senior vice president of marketing of phones for Microsoft, said at the time, while denying that the name change would render today's Nokia Lumia phones obsolete.

The logo switch is part of Microsoft's effort to more fully take control over its new smartphone business. The Lumia line plays an important role as an ambassador of sorts for the company's Windows Phone platform. Even before Microsoft acquired Nokia's mobile devices unit for $7.2 billion in April, the Lumia smartphone line was often used to tout the latest version of Windows Phone.

Microsoft has increasingly attempted to push its platforms through its own efforts in hardware. On the Windows side, Microsoft has its Surfacetablets, which despite a rough start are beginning to see momentum. The company reported revenue of $908 million on Surface sales in its fiscal first quarter that ended September 30, up 127 percent from a year ago. It's hoping to do the same with the Lumia line of smartphones.

Even as Microsoft's logo begins to take over, the company has said the Nokia name will remain on entry-level devices, which continue to resonate in emerging markets.

Thursday, November 6, 2014

Researchers Discover New 'WireLurker' Malware Affecting Macs and iOS Devices in China


 Most people today know that Apple products aren’t bulletproof, but 350,000 Mac and iPhone users in China are finding that out the hard way. New malware called WireLurker is quietly stealing data from their devices.
It’s a nasty little infection, too. Once it has infected a Mac, WireLurker waits in the shadows for an iOS device to be plugged it. It then takes advantage of Apple’s trusted pairing to siphon specific data off the device, including its serial number, phone number, and iTunes store identifier.
The device doesn’t have to be jailbroken for WireLurker to infect it (the malware abuses Apple’s enterprise provisioning plumbing to pull that off), but jailbroken devices do get special attention. WireLurker steals additional info from the iMessage history, address book, and a handful of other files. According to security researcher Johnathan Zdziarski, WireLurker’s primary target doesn’t appear to be the data in the devices it infects. Rather, it seems as though it’s trying to identify software pirates — nice to know, but not necessarily all that reassuring. Someone is still pushing your personal information to a remote server.

WireLurker also tries to sneak malicious apps onto the device while it’s connected — and many users won’t even notice their installation. Zdziarski says that “user education is the biggest problem” when it comes to WireLurker, adding that “Apple has a poor reputation for helping their users make smarter decisions about security.”

The good news is that there are tools out there to combat WireLurker. Palo Alto Networks offers a free WireLurker detector, and you’re probably not in any danger of infection if you don’t download warez from shady websites.
If your Mac is clean, then you should be fine. Just don’t go plugging your iPhone or iPad into someone else’s Mac for a little recharge or to swap some files without knowing whether or not it’s clean. You could end up transferring more than you wanted to.

Thursday, October 30, 2014

Remove Shortcut Virus permanently from your Computer


Shortcut virus has become a common problem in almost all the computer users. actually its not a virus its a VBS Script. To get rid of this problem  You have to do some simple task on your computer system. so here's some method>>>>

Using CMD

1. Open CMD (Command Prompt – DOS, go to start then search cmd)
2. Type the command word foe word

attrib -h -s -r -a /s /d DriveName:*.*

Now Type the drive letter which you want to delete the short cut virus in stead of DriveName For example: if you want to make virus free C drive then it will be :  attrib -h -s -r -a /s /d c:*.*
3. Hit the Enter button
4. So you'll see that your computer is back to normal now.

Using .bat

Bat file is a executable file that is written in notepad. once it is cliked it will start its action.

1. Open Notepad
2. Copy this code :

@echo off
attrib -h -s -r -a /s /d 
attrib -h -s -r -a /s /d DriveName:*.*
attrib -h -s -r -a /s /d DriveName:*.*
@echo complete.

3. Now Type the drive letter which you want to delete the short cut virus in stead of DriveName 
4. Give this file's name removevirus.bat and save it in your convenient place of your PC
5. Now close the file and open it by double click
6. Now Your Computer is virus free (*not all kind of virus*)

To save from victimised pendrive

1. Go to RUN
2. Type wscript.exe  then press ENTER
3. Type 1 in  Stop script after specified number of seconds: and then APPLY .

To save victimised PC

1. Type CTRL+SHIFT+ESC from your keyboard
2. Go to PROCESS tab
3. Select wscript.exe file
4. Click End Process
5. Now Go to C:/ drive on your computer
6. search wscript in search box
7. SHIFT+DELETE all the file named wscript
8. skip those file which are not deleting
9. Now go to RUN
2. Type wscript.exe  then press ENTER
3. Type in  Stop script after specified number of seconds: and then APPLY .

Thats it! Now your computer is free from ShortCut Virus!

Monday, October 20, 2014

Brute-Force Attacks Explained: How All Encryption is Vulnerable

Brute-force attacks are fairly simple to understand, but difficult to protect against. Encryption is math, and as computers become faster at math, they become faster at trying all the solutions and seeing which one fits.
These attacks can be used against any type of encryption, with varying degrees of success. Brute-force attacks become faster and more effective with each passing day as newer, faster computer hardware is released.

Brute-Force Basics

Brute-force attacks are simple to understand. An attacker has an encrypted file — say, yourLastPass or KeePass password database. They know that this file contains data they want to see, and they know that there’s an encryption key that unlocks it. To decrypt it, they can begin to try every single possible password and see if that results in a decrypted file.

They do this automatically with a computer program, so the speed at which someone can brute-force encryption increases as available computer hardware becomes faster and faster, capable of doing more calculations per second. The brute-force attack would likely start at one-digit passwords before moving to two-digit passwords and so on, trying all possible combinations until one works.

A “dictionary attack” is similar and tries words in a dictionary — or a list of common passwords — instead of all possible passwords. This can be very effective, as many people use such weak and common passwords.

Why Attackers Can’t Brute-Force Web Services

There’s a difference between online and offline brute-force attacks. For example, if an attacker wants to brute-force their way into your Gmail account, they can begin to try every single possible password — but Google will quickly cut them off. Services that provide access to such accounts will throttle access attempts and ban IP addresses that attempt to log in so many times. Thus, an attack against an online service wouldn’t work too well because very few attempts can be made before the attack would be halted.

For example, after a few failed login attempts, Gmail will show you a CATPCHA image to verify you aren’t a computer automatically trying passwords. They’ll likely stop your login attempts completely if you managed to continue for long enough.

On the other hand, let’s say an attacker snagged an encrypted file from your computer or managed to compromise an online service and download such encrypted files. The attacker now has the encrypted data on their own hardware and can try as many passwords as they want at their leisure. If they have access to the encrypted data, there’s no way to prevent them from trying a large number of passwords in a short period of time. Even if you’re using strong encryption, it’s to your benefit to keep your data safe and ensure others can’t access it.


Strong hashing algorithms can slow down brute-force attacks. Essentially, hashing algorithms perform additional mathematical work on a password before storing a value derived from the password on disk. If a slower hashing algorithm is used, it will require thousands of times as much mathematical work to try each password and dramatically slow down brute-force attacks. However, the more work required, the more work a server or other computer has to do each time as user logs in with their password. Software must balance resilience against brute-force attacks with resource usage.

Brute-Force Speed

Speed all depends on hardware. Intelligence agencies may build specialized hardware just for brute-force attacks, just as Bitcoin miners build their own specialized hardware optimized for Bitcoin mining. When it comes to consumer hardware, the most effective type of hardware for brute-force attacks is a graphics card (GPU). As it’s easy to try many different encryption keys at once, many graphics cards running in parallel are ideal.

At the end of 2012, Ars Technica reported that a 25-GPU cluster could crack every Windows password under 8 characters in less than six hours. The NTLM algorithm Microsoft used just wasn’t resilient enough. However, when NTLM was created, it would have taken much longer to try all these passwords. This wasn’t considered enough of a threat for Microsoft to make the encryption stronger.

Speed is increasing, and in a few decades we may discover that even the strongest cryptographic algorithms and encryption keys we use today can be quickly cracked by quantum computers or whatever other hardware we’re using in the future.

Protecting Your Data From Brute-Force Attacks

There’s no way to protect yourself completely. It’s impossible to say just how fast computer hardware will get and whether any of the encryption algorithms we use today have weaknesses that will be discovered and exploited in the future. However, here are the basics:

 Keep your encrypted data safe where attackers can’t get access to it. Once they have your data copied to their hardware, they can try brute-force attacks against it at their leisure.

● If you run any service that accepts logins over the Internet, ensure that it limits login attempts and blocks people who attempt to log in with many different passwords in a short period of time. Server software is generally set to do this out of the box, as it’s a good security practice.

 Use strong encryption algorithms, such as SHA-512. Ensure you’re not using old encryption algorithms with known weaknesses that are easy to crack.

● Use long, secure passwords. All the encryption technology in the world isn’t going to help if you’re using “password” or the ever-popular “hunter2″.

Brute-force attacks are something to be concerned about when protecting your data, choosing encryption algorithms, and selecting passwords. They’re also a reason to keep developing stronger cryptographic algorithms — encryption has to keep up with how fast it’s being rendered ineffective by new hardware.

Wednesday, October 15, 2014

Things to do after being Hacked ? part 2


You opened an e-mail attachment that you probably shouldn't have and now your computer has slowed to a crawl and other strange things are happening. Your bank called you saying there has been some strange activity on your account and your ISP has just "null routed" all traffic from your computer because they claim it is now part of a zombie botnet. All this and it's only Monday.

If your computer has been compromised and infected with a virus or other malware you need to take action to keep your files from being destroyed and also to prevent your computer from being used to attack other computers. Here are the basic steps you need to perform to get back to normal after you've been hacked.

1. Isolate Your Computer

In order to cut the connection that the hacker is using to "pull the strings" on your computer, you need to isolate it so that it can't communicate on a network. Isolation will prevent it from being used to attack other computers as well as preventing the hacker from continuing to be able to obtain files and other information. Pull the network cable out of your PC and turn off the Wi-Fi connection. If you have a laptop, there is often a switch to turn the Wi-Fi off. Don't rely on doing this through software, as the hacker's malware may tell you something is turned off when it is really still connected.

2. Shutdown and remove the hard drive and connect it to another computer as a non-bootable drive

If your computer is compromised you need to shut it down to prevent further damage to your files. After you have powered it down, you will need to pull the hard drive out and connect it to another computer as a secondary non-bootable drive. Make sure the other computer has up-to-date anti-virus and anti-spyware. You should probably also download a free rootkit detection scanner from a reputable source like Sophos.

If you don't feel comfortable removing a hard drive yourself or you don't have a spare computer then you may want to take your computer to a reputable local PC repair shop.To make things a little easier, consider purchasing a USB drive caddy to put your hard drive in to make it easier to connect to another PC. If you don't use a USB caddy and opt to connect the drive internally instead, make sure the dip switches on the back of your drive are set as a secondary "slave" drive. If it is set to "master" it may try to boot the other PC to your operating system and all hell could break loose again.

3. Scan your drive for infection and malware

Use the other host PC's anti-virus ,anti-spyware, and anti-rootkit scanners to ensure detection and removal of any infection from the file system on your hard drive.

4. Backup your important files from the previously infected drive

You'll want to get all your personal data off of the previously infected drive. Copy your photos, documents, media, and other personal files to DVD, CD, or another clean hard drive.

5. Move your drive back to your PC

Once you have verified that your file backup has succeeded, you can move the drive back to your old PC and prepare for the next part of the recovery process. Set your drive's dip switches back to "Master" as well.

6. Completely wipe your old hard drive (repartition, and format)

Even if virus and spyware scanning reveals that the threat is gone, you should still not trust that your PC is malware free. The only way to ensure that the drive is completely clean is to use a hard drive wipe utility to completely blank the drive and then reload your operating system from trusted media.

After your have backed up all your data and put the hard drive back in your computer, use a secure disk erase utility to completely wipe the drive. There are many free and commercial disk erase utilities available. The disk wipe utilities may take several hours to completely wipe a drive because they overwrite every sector of the hard drive, even the empty ones, and they often make several passes to ensure they didn't miss anything. It may seem time-consuming but it ensures that no stone is left unturned and it's the only way to be sure that you have eliminated the threat.

7. Reload the operating system from trusted media and install updates

Use your original OS disks that you purchased or that came with your computer, do not use any that were copied from somewhere else or are of unknown origin. Using trusted media helps to ensure that a virus present on tainted operating system disks doesn't reinfect your PC.

Make sure to download all updates and patches for your operating system before installing anything else.

8. Reinstall anti-virus, anti-spyware, and other security software prior to any other programs.

Before loading any other applications, you should load and patch all your security related software. You need to ensure your anti-virus software is up-to-date prior to loading other applications in case those apps are harboring malware that might go undetected if your virus signatures aren't current

9. Scan your data backup disks for viruses before your copy them back to your computer

Even though you are fairly certain that everything is clean, always scan your data files prior to reintroducing them back into your system.

10. Make a complete backup of your system

Once everything is in pristine condition you should do a complete backup so that if this ever happens again you won't spend as much time reloading your system. Using a backup tool that creates a bootable hard drive image as a backup will help speed up future recoveries immensely.

Sunday, October 12, 2014

What's a verified facebook profile or Page and How To Get Verified on Facebook ?


Some well-known public figures and Pages with large followings are verified by Facebook as having an authentic identity. You'll see a blue badge next to a verified profile or Page's name. These profiles and Pages may include:

◄ Celebrities

◄ Journalists

◄ Government officials

◄ Popular brands and businesses

Facebook Inc.verify profiles and Pages to help you be sure that they are who they claim to be. Keep in mind that not all authentic profiles and Pages are verified and that you can't request to have your profile or Page verified. You can report fake accounts that are impersonating you, your business or your brand.

If your profile or Page isn't verified, there are other ways to help your followers or the people who like your Page know that your identity is authentic. For example, you can:

Link to your Facebook profile or Page from your official website
Complete the About section of your profile or Page to provide more information

* How To Get Verified ?

If your profile or any Page whose your are official representative and also based on above mention categories then their are chances of your page to get verified. Actually Facebook does not have any request form to claim verified this is totally automatic process done from Facebook side. So to become verified in future you should have to do some changes in your Profile or Page

◄ Your page should be official represent your local business or any personality and may be have some popularity on Facebook.
For Facebook claiming process your page or profile must have minimum details because if you add full details accurately then Facebook automatically check your provided information if they find your page or profile details accurate and helpful then verify your page here are two parts mention by Facebook to become verified

◄ Link To Your Profile or Page From Official Website and also link website on your page or profile.

◄ Provide accurate information in details about your business in About Section of Page or Profile
In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab.

In About section must add significant long and short description, keyword who represent your business, Email, Website, Products and verified page location with claimed business address and other details in Page Info tab

Thursday, October 2, 2014

What is Ello? Ello vs. Facebook !


Ello is a simple, beautiful, and ad-free social network created by a small group of artists and designers.

here is the link: 

 ======== Ello vs. Facebook=========

originally built Ello as a private social network. Over time, so many people wanted to join Ello that we built a public version of Ello for everyone to use.

The eight-week-old social network Ello has a manifesto: no ads, no data-mining, no algorithms that make decisions about what you should see, no turning users into products. If you hit the “I agree” button after the manifesto, the site puts you on the waiting list for an invitation. If you click “disagree,” it sends you to Facebook’s privacy page.

The site’s creator, Paul Budnitz, initially comes across as the male version of the ‘Manic Pixie Dream Girl.’ “I create beautiful things that change the world,” he says in his Ello profile. He lives in Burlington, Vermont selling the “most beautiful city bicycles in the world.” He founded Kidrobot, which makes designer toys such as a silver Homer Simpson buddha statue. According to his personal biography, he writes books, makes films, and collects “cultural wearable artifacts,” such as a classic pair of Air Jordans that he sold for $16,000. His eyes shoot lasers.

"We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.
“We see Facebook as an advertising platform not a social network,” says Ello creator Paul Budnitz.

Right now, those lasers are aimed at Facebook. “We see Facebook as an advertising platform not a social network,” says Budnitz. “Users are products at Facebook. They want to know as much as possible to advertise to you.”

Ello has garnered a huge amount of media attention and a desperate stampede to get on the site thanks to a huge misstep by Facebook: last month, it booted drag performers such as Sister Roma and Lil Hot Mess off the site for not using their real names. Budnitz says the booted performers’ protest triggered a flood of requests to Ello last week from the LGBTQ community who wanted to know if they could use whatever names they wanted. “On Sunday or Monday, we got 50 emails over several hours, and we were looking at sign-ups and they were going up and up and up.”

Budnitz said they started getting 4,000 interested new users per hour. It’s snowballed from there. Budnitz won’t release user numbers, “because I don’t want to play that game,” but has been telling people Ello is now getting “50,000 sign-ups per hour.” But that’s a bit hyped; when I asked him if that meant 50,000 new users per hour, he says the number is actually a combination of people creating new accounts, sending out invites and requesting invitations. At this point, Ello is basically only honoring invitations from existing users to control its growth and “not melt our servers.” If nothing else, it’s a great way to make Ello the hot club with a red velvet rope and a long line out front. I suspect there are more people talking about Ello right now than actually using it.

Facebook realized the mistake it made, leading Chief Product Officer Chris Cox to apologize Wednesday. “The spirit of our policy is that everyone on Facebook uses the authentic name they use in real life,” explained Cox, saying that Facebook now realized that for the hundreds of users who got booted, the names they were using weren’t their legal names but were their “authentic” ones. So drag queens are back on Facebook, but Budnitz hopes that his site will continue to serve a need.

“It is beautiful and uncluttered,” he says. “Everything is in chronological order. People will only see what they want to see.”

Budnitz initially launched Ello in the summer of 2013 as a private social network for 90 friends because he was sick of existing social networks. “Facebook thinks I’m a middle-aged women of color, based on the ads I was seeing for high heels, stockings and African-American women magazines,” he says. “I wanted something simple and beautiful.”

He says other friends started clamoring to join, so he took the site down, got $435,000 in venture funding, and then relaunched an invitation-only site on August 7. “We thought we’d be where we are in 6 months and it happened in 6 days,” he says. As for the making-money part, Budnitz plans to charge users for features. For example, recent users have been clamoring for the ability to maintain multiple profiles with one log-in. “We’ll introduce that and then charge $1 or $2 for it to those power users who want it.”

Budnitz sees the site as a true beta one, a work in progress. Early users complained that they couldn’t block other users. This week the site will introduce block and mute features, he says. “We’re testing them now.”

The site has a feature list that explains what’s been added and what’s coming. Hilariously, I can’t link to it because some enterprising user stole its url by establishing a profile named “Feature List.” The site definitely has some bugs, and I wouldn’t be surprised if “Ello Just Got Hacked” appears in the headlines in the near future.

Monday, August 25, 2014

Things To Do Immediately When Your Facebook Account Is Hacked!


Nowadays Peoples Facebook ID are hacking by some black hat hackers! even some of my frndz are also being victimized of this problem, so again I'M posting a post where I'll describe u guyz how to retrieve your beloved Facebook account  :)

N.B: *You should aware by clicking on some alluring post on your news feed that can be a malware or something like that which can be adjutant for the hackers to hack your account*

Here’s what to do when that happens:

1. Change your password. Just because that’s easy to do. Go to the upper right corner and click on Account and then Account Settings and then your Password can be changed there.

2. Check your Applications. Again in the upper right, Account, then Privacy Settings. Then in the lower left under Apps and Websites click the Edit your settings link. This will show you all the Applications that have access to your profile. Some of these Applications have the ability to post on your wall or your friends wall. Delete any App that you don’t recognize.
Now maybe your account has really been hacked and you can’t get back in and bad things are happening. In that case, you can lock it down by going to

Sunday, August 24, 2014

Sync your Twitter Account & FaceBook Fan page so that they update each other automatically

I have had a few people ask me how to link their Twitter & FaceBook accounts, and even more specifically their FaceBook fan page. So here’s how I do it…

By going to this link you can add Twitter to your Facebook Profile itself or any Pages of which you may be an admin.

And on this page you can assign any Facebook Pages that you are admin of to the Twitter account of your choice!

By doing this no matter whether you update your Twitter or FB page, both feeds will be updated!

Sunday, August 3, 2014

The Real Reason Facebook Went Down Yesterday


Yesterday afternoon Facebook experienced the worst outage that the company has had “in over four years”, causing the site to go down for most users for “approximately 2.5 hours”. One of the company’s engineers followed up with a blog post, explaining exactly what went wrong. The cause of the issue sounds relatively complicated, however the conclusion was that the company had to restart the entire site.

According to Robert Johnson:

The key flaw that caused this outage to be so severe was an unfortunate handling of an error condition. An automated system for verifying configuration values ended up causing much more damage than it fixed.
The intent of the automated system is to check for configuration values that are invalid in the cache and replace them with updated values from the persistent store. This works well for a transient problem with the cache, but it doesn’t work when the persistent store is invalid.
Today we made a change to the persistent copy of a configuration value that was interpreted as invalid. This meant that every single client saw the invalid value and attempted to fix it. Because the fix involves making a query to a cluster of databases, that cluster was quickly overwhelmed by hundreds of thousands of queries a second.
To make matters worse, every time a client got an error attempting to query one of the databases it interpreted it as an invalid value, and deleted the corresponding cache key. This meant that even after the original problem had been fixed, the stream of queries continued. As long as the databases failed to service some of the requests, they were causing even more requests to themselves.

Now come to Fahim (Admin):

If you don’t understand what he’s talking about, it’s ok. Most people probably don’t understand what went wrong for the most part, however it sounds as though the site went into one of those infinite loops of death. While you don’t need to be an advanced programmer to understand how bad infinite loops are, you definitely need to have some engineering know-how.
The bottom line is that it was one of the worst crashes the company has ever experienced and they are working on making it so that never happens again!

Thursday, July 24, 2014

Thursday, February 20, 2014

Sunday, January 5, 2014