Saturday 1 October 2011

Benefits of using BCC while sending an Email


                   

Almost every user on the Internet sends/receives hundreds of emails per day. However only a handful of them know what is BCC and what are the advantages of using BCC while sending an email. If you are one such Internet user who is unaware of BCC then this is the post that you should definitely read! 


What is BCC?

♦ BCC stands Blind Carbon Copy.
♦ It refers to the practice of sending an email to multiple recipients without disclosing the individual emails addresses. 

♦ While sending the same email/message to multiple recipients, it is a common practice for most users to separate the email addresses by using comma or semi-colon and insert all those addresses in the "To:" field. When emails are sent in this way, each receiver is able to see the complete list of recipient email addresses to which the same message if being sent to. 

♦ Unlike "To:", the "BCC:" option allows you to hide the recipients in email messages. In other words, when emails are sent using "BCC:", the receiver will not be able to see the list of recipient email addresses. Thus using BCC is a smart way to protect the privacy of the recipients.


Why should you use BCC?

Here are the reasons for using BCC - 

Privacy – BCC provides an easy and simple option for protecting the privacy of your recipients. Under many circumstances it is necessary for us to send an email without letting the recipients know who else is receiving the same message. Also it is highly recommended that you use the BCC: while forwarding a joke or a funny email to a list of your friends. If you are sending email on behalf of a business or organization, it may be especially important to keep lists of clients, members, or associates confidential. So don’t forget to use BCC: in instances wherever privacy matters.

Respect for you recipients - While forwarding email messages, people often do not bother to remove the list of previous recipients. As a result, messages that are repeatedly sent to many recipients may contain long lists of email addresses. This makes it easy for the spammers to collect and target those emails for spamming.

In order to avoid the risk of spammers, it is necessary that you encourage people/friends to use BCC: while forwarding any message to you. This prevents your email address from appearing in other people’s inboxes thereby keeping yourself less exposed to spammers.


How to use BCC?

        

Most email clients(gmail, yahoomail, hotmail) provide the BCC: option under a few lines below the To: field. All you have to do is just enter the list of recipients in the BCC: field instead of entering in the To: field. You may enter only your own email address in the To: field. Once you do this just hit the Send button.


Thanks,
Parag


         

Thursday 29 September 2011

How to Bind .exe files to keep your VIRUS file, FUD and Hidden


<------------- PS : Readers must read the note at the end ------------------->

Hey friends, here in this post I'll show you how to bind 2 or more .exe files so that running the main execution file will also run your hidden execution files in background without the knowledge of user who is running it.


I am sure this will be helpful to you if you are seeking for a trick to keep your virus file inside a genuine software and make it to run when anyone installs that software.


There are many binder software available like filejoiners, file binders etc. I dont know how many of you are aware of this great windows tool. Even I was in search for those softwares to keep my virus files hidden untill I realize that there is an inbuilt windows .exe binder which can bind the files more effectievely than others. Also a great advantage that if you bind in this way the possibilities of being FUD (Fully Undetectable) is very high as it uses genuine windows tools. I will give you step by step explanation for binding 2 .exe files to a single package. Have you heard about IExpress anywhere before? If not just keep in mind that it is the inbuilt tool in windows used for binding .exe files.


Steps:


1) Open run (windows + R)
2) Type iexpress and hit Enter


This will open some thing like this,


         


Do as shown in the screenshot above.
Select "Create new Self Extraction Directive file" and click Next.


3) Give a title for your package.


         


4) If you have give any message, it will be prompted before the user installs the package. Suppose if I give a message "For security reason please disable your antivirus". This will be shown to the user when he/she installs the particular package. Here, in this screenshot I have selected "No prompt".


                  


5) Select as shown below (recommended).


          


6) Now, click on "Add" button and select the files you want to bind. Here, I selected a genuine software and a virus file created by me and bind them together. So, when any user would install this particular software, user observe that the software is installing as usual, but he cannot see that a virus file has also been installed along with the software.


          


7) After clicking on "Next", there will appear 2 options i.e. Install program and Post install program. Just select the files as shown below (either way will also work) and click next.


         


8) Select as shown below.


          


9) Mention any path of your Hard Drive (this is where your newly created file would get stored) and tick the "Hide File...." option (highly recommended).


          


10) Select as shown below and click next.


          


11) Select "Don't save" and click next.


         


12) Click Finish and you're done.


          




NOTE: Binding techniques are mostly used to attach keyloggers, that will spy your each and every activity performed on your computer. These activity could be your bank transactions, your username and password of different login sites viz. Facebook, gmail, Bank sites etc. Hence this a request to all, not to download any kind of software from unknown websites, because most of the cracked softwares are attached with keyloggers that you can't detect easily.
So, be alert and download softwares from authorized and trusted websites only.



Thanks,
Parag 

Saturday 10 September 2011

How to get Information of any Website using Command Prompt


Hey friends, in this post I'll show how to find IP address of any Website(URL) using Command Prompt(cmd) and also how to find many network related information about a particular website.


1) Start Command Prompt


Goto start --> Programs --> Accessories --> Command Prompt
                                 OR
Goto start --> Run --> Type cmd --> hit Enter




2) IP address and Connectivity


Type the following command in the command prompt,
ping website
eg. ping www.google.com


   A screenshot of the ping command


♦ The 2nd line i.e. Pinging www.google.com [66.102.13.104] with 32 bytes of data:


♦ Here [66.102.13.104] is the IP address of google.com


♦ You can replace www.google.com with any other website.


♦ Notice the connectivity between you machine and the server from the line where it says: "Packets: Sent = X, Received = X, Lost = X (X% loss)," where all the Xs will be replaced by numbers. This gives you an idea of how much percent of the packets sent to the server will be lost.




3) Routing Information


a) Type the following command in the command prompt,
tracert website
eg. tracert www.google.com


    A screenshot of a tracert session


♦ The above command gives you the routing information of a particular website.


♦ You can replace www.google.com with any other website.


♦ Notice the listing of hops along the route path of packets from your machine to the server. This gives you an idea of how many routers/hops the packet has to travel before reaching the server, starting from your machine.


b) Type the following command in the command prompt,
pathping website
eg. pathping www.google.com


   A screenshot of a pathping command execution


♦ The pathping utility gives the information about network latency and network loss at intermediate hops between a source and destination.


♦ Pathping sends multiple Echo Request messages to each router between a source and destination over a period of time and then computes results based on the packets returned from each router. 




4) DNS Information


Type the following command in the command prompt,

nslookup website
eg. nslookup www.google.com

   A screenshot of nslookup execution

♦ The above command gives you the DNS information of a particular website.

♦ It finds the DNS Server (first line) and the IP addresses of the server you queried about.




NOTE : If you're using these command in a corporate network or a school network, some of these commands might not give you results. Most institutions have firewalls with settings to deny services provided by these tools.




Thanks,
Parag

Friday 5 August 2011

Create a Shutdown/Restart shortcut on Desktop


                                    

Hey friends, the following tutorial would make it easy to shutdown/restart your computer by just a double-click. Following steps would create shortcuts as mentioned in the above picture, in just 20 seconds. Checkout....!!




1) Right-click on desktop --> New --> Shortcut

             


2) In "Type the location of the item" box, type,
    shutdown -s -t 00


      
Click Next> button.


 
3) In "Type a name for this shortcut"
    Shutdown (or some other name of your choice)


    
Click Finish button.


4) Change the icon of your choice by right-click over the shortcut --> Properties --> Change icon.


5) Do the same for Restart too. Just change the code with,
    restart -r -t 00


Thanks,
Parag

Downloads



1) Download TV Games (13.7 MB) 
             Games like Bomberman, Spartan, Contra, Road Fighter, Adventure Island etc.


2) Download Fonts (4.53 MB)
             New and crazy fonts that you can't find any of the text editors. Useful for posters and other creations.


3) Turbo C++ (3.86 MB)
             Used for compiling and executing programs written in C & C++ language.


4) PushMonitOff.exe (420 KB)
             If you are using a laptop, then for you its battery life is a big issue. This software turn off the laptop screen when not in use, hence saves energy.


5) Resource Hacker (335 KB)
             A useful hacking tool.


6) Skype 4.0.0.206 Portable.exe (37 MB)             
          Skype is a software application that allows users to make voice and video calls and chats over the Internet.

Thursday 4 August 2011

Articles



1) Black MONEY - From India to UBS

Swiss bank revealed that India has more money than rest of the world. This is so shocking.....If black money deposits was an Olympics event.. Then, India would have won a gold medal. The second best, Russia has 4 times lesser deposit. U.S. is not even there in the counting in top five! India has more money in Swiss banks than all the other countries combined!.........read more
________________________________________________________________

2) "Emptiness" The Real Story of Rohan Rathore

Firstly, the song "Emptiness" by Rohan Rathore for those who have not come across it till now....…It has been shared over 25 thousand times on Facebook over the last week and the different versions of this song have over a million views collectively on Youtube…Now here’s the Story behind this song.........read more
________________________________________________________________


3) Microsoft ERRORS

Microsoft Calculator FAILED in doing following calculations -
Open calculator (goto start --> Run --> type calc --> Click OK).........read more
________________________________________________________________


4) They Have Done it....So Can We....!!
Stammering are you? Well you are not alone! Disappointed about it? Well, approximately 1% of every country’s population stammers. Forget other countries, but that means ten lakhs of fellow Indians are with you. But yet you think about various things that you cannot do because of stammering? You feel embarrassed when you experience a speech block in front of your peers or friends?.........read more
________________________________________________________________


5) Hitler Biography (with Original Scenes)

The Biography of the Chancellor of Germany and one of the Cruel Dictator in History.... Adolf Hitler (1889-1945) who lead to nearly 2.5 crore Soldiers and 2.4 crore Civilians to DEATH...!! The Biography in made of True Videos and Scenes (in Hindi). It comprises of 13 videos.........read more

________________________________________________________________


6) Is your Nokia Cell Phone ORIGINAL?


________________________________________________________________


7) What's 3G?


________________________________________________________________


8) Undersea Internet, Telecom Cables


________________________________________________________________


9) Search Engines


________________________________________________________________


10) Make Money


________________________________________________________________


11) Make 3D models with Google SketchUp


________________________________________________________________


12) HTC EVO 3D Review


________________________________________________________________


13) Android v/s Windows Mobile 7 v/s iPhone v/s Blackberry v/s Nokia


________________________________________________________________


14) Benefits of using BCC while sending an Email


Thanks,
Parag