How to backup your Gmail Inbox

Tuesday, June 29, 2010

If you want to backup your emails from Gmail to the local computer, enable POP3 access in your Gmail
settings and then use a desktop mail client to download a copy of all your messages from the Google cloud to the local disk. That’s easy!

Why you should backup Gmail to the cloud?
  • If your main Gmail account gets hacked you will still have access to all your previous emails.
  • If you delete an important email from your Gmail Inbox by mistake, you can easily retrieve it from the online backup. Google Apps Premier has Postini to restore deleted emails.
  • If the Gmail service goes down (yes, it happens), you will still be able to read your older emails. Gmail outage won’t affect work
Backup your Gmail Messages Online:
There are three services that can help you automatically backup your Gmail (and Google Apps) email accounts online and luckily, they won’t cost you anything.

The first and most obvious choice is Gmail. Create a new Gmail account and under Settings –> Accounts and Import –> Check mail using POP3 –> Add POP3 email account, enter the email address of your main Gmail account that you want to backup.
Within an hour or so, the online mail fetcher program will pull messages from your main Gmail account and will copy them to your new “backup” account. In my limited testing, I found that Gmail’s mail fetcher left all the messages that were either “read” or have been previously downloaded by another POP3 client so it’s not “true backup.”

That brings us to another alternative – copy your Gmail mailbox to Windows Live Hotmail. While you can add a Gmail account to Hotmail using POP3 (just like Gmail’s mail fetcher), there’s a much better and reliable option out there for copying emails from Gmail into Hotmail and it’s called TrueSwitch.


Setup a new Hotmail account and TrueSwitch, an awesome web-based email account migration service, will copy all your emails and attachments from Gmail to your new Hotmail address. If you have a relatively large Gmail Inbox, the backup process might take up to 24 hours but you’ll get an email as soon as the transfer is complete.

Like Gmail, Hotmail too offers “expanding” storage so it can possibly fit your large Google inbox as well. You can then add your Gmail address to Hotmail (click “Add an email account” in the sidebar) and this will ensure that new messages that land in your Gmail inbox in the future are also saved in Hotmail.

That said, both the services discussed above have one common drawback – they’ll always backup your entire Gmail mailbox and you cannot limit the backup process to a specific set of folders (or labels in Gmail). So if you have a fairly large mailbox and don’t want to backup each and every Gmail folder (or label), try Backupify.

Backupify, as you know, can backup your online accounts (including Gmail) to Amazon S3 and a unique point about Backupify is that it lets you specify labels that should be included in the backup process. The messages are stored in the cloud as EML files that you can view inside Outlook or, you can change the .eml extension to .mht, and read the file inside IE.

Backupify supports XOauth so you can add your Gmail account to the service without having to share your Google Account credentials. They are not using a very practical format for saving messages but the advantage is that Backupify will scan your selected mailbox folders every single day for new emails and will archive them automatically.

How To Know If You Are Blocked On Gtalk

Monday, June 21, 2010

In Gtalk you can send voicemail to any person anytime whether he is online or offline. If the person is offline then voicemail should appear in the inbox of that person.


To send a voicemail click on any offline contact. Now click on “Send voicemail” button as shown in screenshot below. If the recording starts and ends suddenly then it means that the person has blocked you and you cannot send him a voicemail anymore

 
 
 
 
 
 
 
if you know any more tips plz write them in comments

How to protect yourself from keyloggers

Sunday, June 20, 2010

Keystroke logging (often called keylogging) is the practice of tracking (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that their actions are being monitored.

How keyloggers spread:


Keyloggers spread in much the same way that other malicious programs spread. Excluding cases where keyloggers are purchased and installed by a jealous spouse or partner, and the use of keyloggers by security services, keyloggers are mostly spread using the following methods.
  • a keylogger can be installed when a user opens a file attached to an email;
  • a keylogger can be installed when a file is launched from an open-access directory on a P2P network;
  • a keylogger can be installed via a web page script which exploits a browser vulnerability. The program will automatically be launched when a user visits a infected site;  
  • a keylogger can be installed by another malicious program already present on the victim machine, if the program is capable of downloading and installing other malware to the system
How to protect yourself from keyloggers:
Most antivirus companies have already added known keyloggers to their databases, making protecting against keyloggers no different from protecting against other types of malicious program: install an antivirus product and keep its database up to date. However, since most antivirus products classify keyloggers as potentially malicious, or potentially undesirable programs, users should ensure that their antivirus product will, with default settings, detect this type of malware. If not, then the product should be configured accordingly, to ensure protection against most common keyloggers.


Let’s take a closer look at the methods that can be used to protect against unknown keyloggers or a keylogger designed to target a specific system.

Since the chief purpose of keyloggers is to get confidential data (bank card numbers, passwords, etc.), the most logical ways to protect against unknown keyloggers are as follows:

  • using one-time passwords or two-step authentication,
  • using a system with proactive protection designed to detect keylogging software,
  • using a virtual keyboard..(on screen keyboard)
Using a one-time password can help minimize losses if the password you enter is intercepted, as the password generated can be used one time only, and the period of time during which the password can be used is limited. Even if a one-time password is intercepted, a cyber criminal will not be able to use it in order to obtain access to confidential information.


In order to get one-time passwords, you can use a special device such as:

a USB key (such as Aladdin eToken NG OTP):

a ‘calculator’ (such as RSA SecurID 900 Signing Token):



In order to generate one-time passwords, you can also use mobile phone text messaging systems that are registered with the banking system and receive a PIN-code as a reply

If either of the above devices is used to generate passwords, the procedure is as described below:
  • the user connects to the Internet and opens a dialogue box where personal data should be entered;
  • the user then presses a button on the device to generate a one-time password, and a password will appear on the device’s LCD display for 15 seconds;
  • the user enters his user name, personal PIN code and the generated one-time password in the dialogue box (usually the PIN code and the key are entered one after the other in a single pass code field);
  • the codes that are entered are verified by the server, and a decision is made whether or not the user may access confidential data.
When using a calculator device to generate a password, the user will enter his PIN code on the device 'keyboard' and press the ">" button.

One-time password generators are widely used by banking systems in Europe, Asia, the US and Australia. For example, Lloyds TSB, a leading bank, decided to use password generators back in November 2005.

In this case, however, the company has to spend a considerable amount of money as it had to acquire and distribute password generators to its clients, and develop/ purchase the accompanying software.

A more cost efficient solution is proactive protection on the client side, which can warn a user if an attempt is made to install or activate keylogging software.




The main drawback of this method is that the user is actively involved and has to decide what action should be taken. If a user is not very technically experienced, s/he might make the wrong decision, resulting in a keylogger being allowed to bypass the antivirus solution. However, if developers minimize user involvement, then keyloggers will be able to evade detection due to an insufficiently rigorous security policy. However, if settings are too stringent, then other, useful programs which contain legitimate keylogging functions might also be blocked.
The final method which can be used to protect against both keylogging software and hardware is using a virtual keyboard. A virtual keyboard is a program that shows a keyboard on the screen, and the keys can be 'pressed' by using a mouse.

The idea of an on-screen keyboard is nothing new - the Windows operating system has a built-in on-screen keyboard that can be launched as follows: Start > Programs > Accessories > Accessibility > On-Screen Keyboard.



However, on-screen keyboards aren’t a very popular method of outsmarting keyloggers. They were not designed to protect against cyber threats, but as an accessibility tool for disabled users. Information entered using an on-screen keyboard can easily be intercepted by a malicious program. In order to be used to protect against keyloggers, on-screen keyboards have to be specially designed in order to ensure that information entered or transmitted via the on-screen keyboard cannot be intercepted.

How to remove Gtalk chat virus

Saturday, June 19, 2010

Gtalk is a great feature of google that allow you to IM-ing or chat with your friends, however this can be used to spead gtalk virus or malware, usually it just popped up in your window and ask you to go to some links or clicking attachments. Do not click any attachments or links from people you don’t know, because this is how gtalk virus starts and it can damage your pc or mac.

Here is the summary of the steps if you are using Vista:

1. Backup your files.
2. Go to start and type in “regedit” in search box, click “ok” for the permission.
3. In Registry Editor, navigate to Edit then “Find”
4. Type in: Explorer.scr
5. If you find it, delete it.
6. Restart your pc and it should be gone.

New Xbox 360 gets official at $299.

Monday, June 14, 2010


According to a Microsoft representative, the Xbox 360 Original will still be sold while there's stock, but they're not making any more of them. Once they're gone, they're gone -- and we'd assume a new $199 variant of the new design will eventually be released to fill the void.
                                                           
                                                           Xbox 360 250GB
Xbox 360 is fully loaded with new features and still comes with everything you know and love. Here's a feature list to make sure you don't miss any of the newest Xbox 360 250GB parts.

Form Factor: Sleek, lean and gloss black finish with chrome accents. Place vertically or horizontally in any living room entertainment center.
Touch Sensitive Buttons: Turn the Xbox 360 video game system on/off and eject a disc with the swipe of a finger.
Whisper Quiet: Whether you're playing a DVD disc or from the hard drive, or navigating the dashboard, with the all-new and much quieter Xbox 360, the only noise you'll hear is your own laughing, cheering and playing.
Wi-Fi: Built-in 802.11n Wi-Fi for fast, easy connection to your friends and entertainment on Xbox LIVE.
Hard Drive: 250GB internal, swappable hard drive for even more storage. To access, remove the bottom panel by pushing the small tab toward the front of the console.
Kinect-Ready: Custom Kinect port on the back of the console that directly hooks up to the Kinect sensor for controller-free fun.
USB Slots: Five USB ports; three in the back of the console and two in the front for easy plug and play.
AV Connections:
AV Cable included for standard definition TV connnection.

HDMI port for high definition TV connection.

Optical Audio out port integrated on back of console for AV system connection.

Power Supply: Smaller and more efficient. Xbox 360 250GB and Xbox 360 Original power supplies are not interchangeable.

Wireless Controller: The award-winning Xbox 360 Wireless Controller matches the console in all black with color-matched thumsticks and directional pad with a touch of gloss and chrome to complete the look.

Backwards Compatible. Your favorite accessories and games will work with Xbox 360 250GB. (Xbox 360 External Hard Drives and Memory Units are not compatible.)
Accessories. Customize your Xbox 360 250GB with matching black accessories, including favorites such as Controllers, Wireless Headset, Chatpad, Quick Charge and Play & Charge Kits and more. Get a look at a few of these today.
Key Internal Components Changes:

Fan: Moved from two small fans to one larger fan for improved acoustics.

Chipset: 45 nanometer and integrated CPU and GPU.

Wi-Fi: Integrated wireless capability.

Adobe releases Lightroom 3

Monday, June 7, 2010

Adobe has released Photoshop Lightroom 3, the popular photo manipulating and management tool. It’s been in beta for a while, so none of the features will be particularly shocking, but the final version being made available today does have a few tricks up its sleeve. We’ll take a quick look tonight, but I have a copy on my hot little hard drive, and want to give it a good week or two of use before publishing a full review.




For those who aren’t familiar with Lightroom, it’s a tool under the Photoshop umbrella intended for photographers who want robust RAW image editing as well as a powerful organizational tool for keeping track of thousands of shots. If it sounds a bit like Aperture to you, it is — but both products are relatively new (compared with oldsters like Photoshop and Office), so it’d be just as fair to say that Aperture sounds a bit like Lightroom. I happen to use Aperture, but I found the latest update slightly disappointing, and may just switch to LR permanently.



But what about the update? Well, if you’re in the beta, you’re probably familiar with some of these features. But there’s new stuff for you guys, too. So let’s see here. Apologies if it seems like I’m reading off the press release, it’s hard to remember all this stuff from the demos.





Lens correction and profile gallery: This is handy. If you’re worried about distortion from the wide end of a lens or just want to reduce it a bit, Adobe provides a huge amount of lens profiles with which you can lower or exaggerate the distortion, chromatic aberration, and vignetting. They’re independently adjustable and different for every lens. LR is shipping with a bunch of the more popular Canon and Nikon lenses already profiled, but you can create your own by shooting a printout and letting it crunch the numbers
Perspective correction: Here’s a tool most of us would just run into Photoshop to do, but which is handy to have at your fingertips. It’s basically just adjusting the angle you’re shooting from, within reason of course. Handy for situations where you really need something to be parallel with the edges of the photo, but you couldn’t get at the right angle when you were shooting.


Improved noise reduction and sharpening: If you’ve tweaked your photos at all, you’ve probably seen what can happen when sharpening gets out of hand. The new LR sharpening algorithms try to avoid that weird effect that happens when you push the sharpness too far. Noise reduction is more intelligent as well, and tries to avoid losing color and detail when reducing noise, which can be quite difficult when the details are the same size as the grain.
Streamlined importing: tagging, renaming, and organizing rolls is now apparently easier, and it certainly looked like it when they showed off creating an import preset.

Streamlined publishing: the Flickr integration they showed off was really quite impressive. You can manage all kinds of stuff, from ratings and comments to privacy settings, via the in-app plugin. There are other plugins as well, and their API is available for people who want to make new ones. Drag-and-drop publishing and easy sharing are something they are having to push real hard for, since Aperture 3 made sharing one of its top priorities.

Tethered capture: seemed to work fine in the demo. Definitely nice to have, and you can adjust settings on the fly to be applied to shots coming in.
Video support: still pretty rudimentary right now, but it’s good to at least be able to keep your videos in the same containers as your shots.
Easy slideshows: if you like making slideshows, it’s easier now. Sync the length to a piece of music, add intros and outros, export to video… what you’d expect. Aperture had the jump on them in this, I believe, but they’ve leveled the playing field again.
New adjustment preset system: If you create a “look,” or “development setting,” or whatever you want to call it, that you like, it’s super easy to drop it onto another photo or to apply it to multiple photos at once. Mass rotation is also handy if you choose not to include orientation data in the EXIF like me. Another thing they’ve gotten even with Aperture with — though from what I saw, I think I like LR’s style better. Their curves system was also way more convenient. The ability to grab any luminance level straight from the preview and just drag it up and down is nice.

Create HTML Signatures Inside Gmail

Gmail Signatures Step-by-Step




Step 1: Go to Gmail Settings –> Labs and enable “Canned Responses” as well as “Inserting Images.”



Step 2: Compose a new message in Gmail and create a signature just like you would compose any other email message. Be creative!




You can either upload logos and icons* from the computer or use images that are already on the web. I suggest the former style as that will permanently embed the image into your email signature.



[*] You can find images of icons through Google Image Search. Go to Advanced options under image search and type 12 for height and width (use 16px if you are looking to add slightly bigger icons). While optional, you may also select the filetype as PNG or GIF for transparent backgrounds -- see example.



Step 3: Once your happy with the formatting and layout of your new “HTML signature,” go to the Canned Response menu and Save – give some logical name like “Personal” for a signature that you want to attach to your personal emails.

video link that explain.. with an example

Twitter parade app its one of the cool app by twitter



This is probably the cutest Twitter app ever.




Just put your Twitter username (or any other search phrase) in IsParade.jp and the app will create an animated parade of the search results with some good marching band music (though you may want to reduce the volume a bit).



The animation is interactive so you can click the faces of anyone marching in the parade and it will pop-up the associated tweet in a bubble

Access Files on your Computer from Anywhere





Access Files over the InternetThe problem: You have documents, photos, music and other important files on the home computer. How can you “remotely access” these files from your office computer or, when you are travelling, from your mobile phone?



The solution: The simplest solution would be that you copy all your data from the home computer on to a portable hard drive and carry it around but this is obviously a bit cumbersome approach as it requires you to manually sync the home computer and your portable disk.

Access Files on your Computer over the Internet



There are couple of ways by which you can retrieve files stored on your home computer from anywhere else using a regular Internet connection.



Option 1: Using Online Backup



You can use an online backup service like SugarSync, Carbonite, SkyDrive or even Dropbox – they provide desktop utilities that will automatically upload files on your home computer to the Internet and you can then access these files through the web browser of any other Internet connected computer.



The upside is that your files will always be available to you even if the home computer is not running. SugarSync and Carbonite have a mobile optimized website so you can access files from any mobile phone as well.



The downside is that if you are using any of these services for the first time, you’ll to wait until they upload all your data to the cloud and this process may take long if you have too many files on the home computer.



Option 2: Using Desktop Sharing Software



There are free desktop sharing software like TeamViewer and UltraVNC that also let you remotely access your computer files from anywhere else. LogMeIn Pro and CrossLoop Home are some other good options for transferring files from a remote computer but these are paid services.



If all your computers are running Windows, you can use the built-in remote desktop connection feature of Windows (available in XP and later) to access your home computer from another Window computer over the Internet.



With Desktop Sharing software, you’ll always have access to all your files but one big limitation is that it requires that the remote computer stays on. Also, none of these options will help you access files on a mobile phone except LogMeIn which has an iPhone app.



Option 3: Access Files Directly through the Browser



Online backup services, discussed above, will copy files to their own servers before you can access them for anywhere else. Screen sharing services are often slow and they won’t work on most mobile devices. Let’s now explore another set of services that allow you download files directly from the home computer.



Copernic, like Google Desktop, is a popular desktop search software that you may use to find emails, documents and other files on your Windows computer. They have a paid component called myCopernic on the Go that lets you remotely search for content stored on the home or office computer. You can preview the search results and then download them to your mobile phone or remote PC.



With Opera Unite, you can easily turn your computer into a web server and instantly access files and folders on that computer from any other web browser (including that of mobile phones). Opera Unite is a standard web server and therefore you’ll be downloading files directly from the computer – they’re not uploaded anywhere else.



Another option is GBridge that lets you setup a virtual private network using your existing Google Account. Companies use VPNs to let employees access corporate data over a public network (Internet) and with GBridge, even home users can build their own VPNs to access remote files more securely.



Windows Live Sync at sync.live.com is another great choice for remotely accessing files over the Internet. Just install the Live Sync client on your computer and you can then access the entire hard drive of that computer simply through the Windows Live Sync website.



Live Sync is available for both Mac and Windows. The new version of Live Sync is even better and it has integrated online storage (Live Mesh) so you’ll be able to access your important file even if the remote computer is off.



Finally, you may also want to check out HomePipe – this is an extremely easy and free service that lets you access your home files and media from any other computer or mobile phone. Install the HomePipe Agent and all files on that computer will instantly become available through the web. They also have apps for iPhone and Android phones.