DNS, How it really work ?

How DNS work on the internet?

I’m sure you probably heard about DNS stuff if you visit this page. But if you wonder how the entire mechanism works, I will try to do my best to explain the entire mechanism behind the DNS factory 🙂

First you need to understand how the internet really work. Whenever you type an address, like google.com your computer will translate this address into a numeric address called by geeks IP ADDRESS. Don’t get scared, the IP address is like a phone number you used to call. I’m sure if you’ll be lost without your phone agenda, and you won’t be able to memorize the entire phone numbers stored there. DNS server is a phone agenda, and whenever you try to call a “name”, he will try to find the “phone number” behind that name.

It’s a smart technology but also a weak point of the Internet. DNSes gets exploited too often by hackers to drive traffic to a specific website. They simply needs to change the “phone number” and when computers start to ask for the phone number, they receive the new number put there by hackers.

Ok, if you got it by now you should know that you can use some public “phone books” (aka DNS servers). Some of them can even protect your computer from malware website, inappropriate content and so on. It’s good to use a public DNS, like google public DNS server.

How you can change the DNS from your computer ?

Well, that’s a simple task, really. Right click on your current internet connection from your task-bar and click on “Open Network and Sharing Center”.

Change DNS from windows

From there, click on “Change adapter settings”. A new window will be opened where you’re going to see your adapters (wifi, ethernet and so on).

Dns Adapter settings

Select the device you want to set and press the right click on your mouse. On the new menu select “Properties

Select Internet Protocol Version 4, and double click on it. Now you should see the image presented below:

DNS properties adapter settings

Click on “Use the following DNS server addresses” and use the servers listed there. When you’re done, just press ok and you’re good to go. Now you will use the google DNS’es. Really simple isn’t it ?

Windows 10 Upgrade – Threshold 2

 

Code name ‘Threshold 2‘ is first major Windows 10 upgrade which is available to users around the world. With this upgrade, Windows 10 gets some important modifications.

windows 10, upgrade, update, threshold 2, microsoft, windows 10 upgrade

The most significant change brought to Windows 10 is the fact that from now on it can be activated with a pass key from Windows 7 or 8.

Microsoft has listened to its users that complained about not having enough control over the updating system. Now, Windows 10 can now make the difference between updating and upgrading. From now on users can decide how long to delay updating and upgrading the system, with a maximum time limit of 8 months.

 

The Skype app comes as standard even if you want it or not, use it or not.

windows 10, upgrade, update, threshold 2, microsoft, windows 10 upgrade

The Edge browser has also received some improvements like the Tabs already open show you a preview you when you put the cursor on them. More useful is the ability to have two pages simultaneously, side by side.

 

Right click on the Start Menu or on the Taskbar and you will discover a new menu coloured in dark grey.

From now on you can choose from a larger range of colours to personalize the Start Menu, the Taskbar or the control panel.

 

Microsoft added another option which might prove to be more useful for those who use Windows based phones and tables. The time-zone can be set automatically depending on where you are on the planet. This option is enabled by default but can be disabled from the Settings menu, Time and Date, uncheck the automatic time-zone setting.

windows 10, upgrade, update, threshold 2, microsoft, windows 10 upgrade

Last but not least, Cortana has become a little more smarter. Cortana has received new options that include support for Stylus, automatic recognition and the possibility of reading phone numbers, addresses, e-mail addresses. Reminders for flight tickets or movie tickets are available now. The options listed above for Cortana are available in the United States and a couple of European countries with the rest of the world is having to wait a little longer.

windows 10, upgrade, update, threshold 2, microsoft, windows 10 upgrade

 

How to send an anonymous email

There are times an anonymous email is a must.

Either you send a business transaction, either you cheat on your wife or simply you don’t want anyone to read your emails having the possibility to send a anonymous email is a god send.

Anyone can do that with a Web-based email like Gmail by using a browser extension like Secure Mail by Streak. For desktop email clients, GnuPG (Privacy Guard) or EnigMail. But those don’t hide who sent the message.

Here are the services you should use to create that truly nameless, unidentifiable email address.

First Step: Browse Anonymously

Your Web browser is tracking you everywhere. Cookies, and in the last time the “super cookies” know where you’ve been and what you’ve done and they’re willing to share. Do not rely on your browser’s incognito/private mode sites are still going to record your IP address.

anonymous, email, how, to, anonymous email

If you want to browse the Web anonymously (and use that private time to set up an email), you need the Tor Browser, a security-laden, Mozilla-based browser from the Tor Project. If you don’t know about Tor, it’s what used to be called The Onion Router, and it’s all about keeping you anonymous by making all the traffic you send on the Internet jump through so many servers, people on the other end can’t begin to know where you really are. Having available 15 languages, applications for Windows, Mac OS, and Linux, self-contained and portable,it’ll run off a USB flash drive if you don’t want to install it directly the Tor-secure address will protect the location of users.

Anonymous Email

anonymous, email, how, to, hushmail, anonymous email

Hushmail

Recommended by the EFF and others, Hushmail’s entire claim to fame is that it’s Web-based, easy to use, doesn’t do advertising, and has built-in encryption between members. Of course, to get all that, you have to pay for it, starting at $34.99 per year for 1GB of online storage. There’s a free version with 25MB of storage, but you need to re-up your sign-in at least every three weeks. Businesses can use it for $5.24 per user per month, and they get their own domain name. There’s a free trial so you can check out Hushmail for yourself.

The downside is that if you use it for illegal purposes the company is well-known for giving the authorities your data.

anonymous, email, how, to, hidemyass, hma, anonymous email

Hide My Ass! Anonymous Email

Hide My Ass is a well-liked private virtual private network (VPN) service that makes it a breeze for users to access content blocked at their location, not to mention providing a much higher level of privacy.Base price is $11.52 a month, but the price goes down if you pay for more months at a time.

An extra that comes with HMA is its Anonymous Email service—in fact, it’s open to anyone, you don’t need to pay for VPN service. You get an address @hmamail.com that can be set to last 24 hours, one week, one month, six months, or 12 month. There’s a countdown clock to indicate just how long you have left when reading messages. At signup, it does ask for your existing email address, so HMA can send it a note when you get a message on the anonymous account, but it’s not required. HMA also has iOS and Android apps that provide secure mobile connections, plus privatized SMS texts and chat services with other HMA users.

anonymous, email, how, to, guerrilamail, anonymous email

Guerrilla Mail

Guerilla Mail provides disposable, temporary email. Technically, the address will exist forever, and never be used again. Any messages received at the address, accessible at guerrillamail.com, only last one hour. You get a totally scrambled email address that’s easily copied to the clipboard. There’s an option to use your own domain name as well, but that’s probably not keeping you under the radar. GuerrillaMail is the perfect way to create an email address to sign up for a different, more permanent-yet-anonymous email address. Or to send a quick, anonymous email instantly—no signup required. You can even attach a file if it’s less than 150MB in size, or use it to send someone your excess bitcoins. Coupled with the Tor browser, you’re practically invisible.

anonymous, email, how, to, mailinator, anonymous email

Mailinator

Mailinator’s free, disposable email has a slick interface, but you probably don’t even need it. Whenever you’re asked for an email, just make up a name and stick @mailinator.com at the end. Then visit the site, enter the name, and you’ll see if it’s received any messages. No signup required, though you can sign in with a Google account.

Here’s the problem. If someone else comes up with the same name, then you both get access to the messages received. There’s no passwords. There’s also no sending possible. Its FAQ states if you get an email from Mailinator, it’s a guaranteed forgery. This one is for quick service signups only, and only with the most obfuscated, obscure name you can come up with.

Feel free to comment if you have a better list.

 

 

Get A Totally Free Prepaid Virtual Visa Card

What can you do when you are in a position to purchase something from the internet but you don’t feel comfortable sending your credit card number to the seller, even if it’s over the phone or fax machine ? What can you do when you want to acquire a service from a website that you don’t trust, but you really have to ? I’ve found the best way to do that, without disclosing your real credit card information.  It’s totally free of charge, but you are free to deposit the amount that you wish to spend online using a virtual prepaid credit card (visa card) and is globally accepted. Instead of it’s plastic form, it came as a picture (virtual prepaid card) and you can use it straight away.

Free Prepaird Visa Card

Service is provided by Entropay (which is something similar to PayPal – https://entropay.com ). You can open an Entropay account free of charge. Also, Entropay provides prepaid cards so you don’t have to worry about spending more than you have planned. All transactions are verified by VISA and you can see the entire spending reports online in your account.

Here are the steps to get your EntroPay account:

  1. Go to entropay.com
  2. Click on the register link
  3. Fill the form with your personal data, name, address, etc.
  4. Click the next button
  5. Page will ask details for funding your newly created account.
  6. Select pay by bank transfer at this step.
  7. Now, select the country and bank information
  8. Click the next button
  9. Now you have to activate your account by going into your email address provided on the registration form (step 3) and click on the activation link
  10. Click next.

And that’s it. From now on you can make private purchases, withdraw the funds from any ATM globally where VISA logo is displayed, shop online securely, etc.

 

How to speed up WordPress to the maximum

WordPress is undoubtedly one of the content management system (CMS) most used in the world. The reasons for the sucess are so many, in fact too many. Among these it is certainly the case to report the nature completely free service offered as well as the ability to download and install on their online space a viable solution to create a blog. With the passage of time and with the increase of the content on their online space may however happen to find yourself having to do with a blog is not so much performance as well as the beginning. If this is your case you do not have to worry though, I can explain how I do to speed up WordPress .

Attenendoti to the indications and measures that I am going to give you in fact you should be able to restore your WordPress blog to the “glories” of the past. No, do not worry, you will not have to do anything particularly complicated. All operations to speed up WordPress I want to suggest that you put in place are really very simple.

If you are so determined to find out how to speed up WordPress I suggest you sit back and concentrate on reading the following lines. I am sure that in the end you will be ready to thank me and that you will be also very happy with the final result obtained.

Plugin

The first and most basic tip that I want to give you speed up WordPress is to reduce the use of bone plugin by installing and activating only those it deems are really necessary for your blog and for its management. In fact, a large number of plug-in function can lead to excessive loading of pages on your site.

I invite you therefore to carefully evaluate the installed plug that you feel really useful and delete those you no longer use.

To delete plugin in WordPress you simply login to your blog press on the itemPlugins placed in the coffin left side to bring the mouse cursor on the plugins you want to remove and click on the appropriate item for deletion.

Post pending review

Perhaps now it will seem obvious, but I bet it up to a moment ago there had still thought to speed up WordPress can also be useful to eliminate any possible post revision . Yes, between the perpetrators of the slowdown of your WordPress blog there too.

In fact, while not yet been published, the post under review are to use resources load equal to those of the articles and pages.

To delete posts in reviewing access your blog by logging in with your credentials, then presses on the item items placed in the sidebar to the left of the Web page that appears, click on the item Pending , brings the mouse cursor on the item to be deleted and click on the item to Trash when you move your mouse. Hopefully you trashing several elements simultaneously checking the box located to the side, bringing the mouse cursor on the menu Actions Group placed at the top and then clicking Move to Trash .

Having proceeded to wrap the items awaiting review in the trash do not forget to empty the latter. To do so you just type the item trashed attached to the items , select the item or items to be removed by checking the empty box placed at the side, click on the menu Action Group at the top and select the item Delete permanently

Spam

Like the post pending review also comments spam could degrade the performance of your blog. If you want to speed up WordPress so I suggest to delete spam comments on your blog.

To delete comment spam log into your WordPress blog, then presses the voicecomments placed on the left sidebar, and then presses the voice Spam  this up.

Proceed by putting a check mark in the checkbox located next to Author to the left in order to select all comments, click on the menu Action Group and then click on the item Delete permanently.

Hosting

Also choose a hosting service suitable to those who have the skills and potential of your blog can help you speed up WordPress. To function properly WordPress does indeed need specific resources such as memory or processor on the server where it is hosted. In case of shared hosting it may be that these resources are not sufficient to be able to fulfill their purpose in a fluid.

If you choose a shared hosting and you’re going to speed up WordPress so I invite you to consider the idea of changing the service used.

Theme

The theme used is another very important element to which you should pay attention if your goal is to try to speed up WordPress as possible.

If you are using a theme too glitzy and elaborate strongly I suggest you to opt for another and to choose one of the many issues that have a framework. The issues with framework will enable to improve the overall speed of your Web project but also to obtain several improvements in terms of safety, have a good position in search engines and attract the attention of visitors.

I recommend, in trying to speed up WordPress choosing a better theme for your blog also pays attention to how often the developers of the resource of your choice undertake to update it.

Database

The database is the “place” where it is stored everything about your blog. WordPress then uses the database to store messages, comments, pages, settings and plugin … in short, everything! However if the WordPress database is too full blog can be too slow. To speed up WordPress so I suggest you to optimize your blog database.

To optimize the database of your blog you can use the plugin WP-DBManager.

Download is complete charge and install the plugin on your WordPress blog from acting section Plugins latter.

Once installed WP-DBManager appear on your blog you will see the item Database in the side menu of WordPress. Pressing on it and immediately make a backup of your database by pressing the DB Backup.

A backup occurred proceed going to repair any damaged database tables. To do this operation you need to select the tables to be repaired and press Repair .Subsequently select all tables and then click the Optimize .

Cache

The use of the cache makes it possible to speed up WordPress because it allows visitors to access the content you offer immediately, preventing them from being asked every flies to the database.

To optimize the use of cache to speed up WordPress I suggest you resort to using the plugin W3 Total Cache , very simple and practical to use and extremely effective.

To download W3 Total Cache click here and then presses the button Download Version 0.xx .

Download is complete charge and install the plugin on your WordPress blog from acting section Plugins latter.

 

How to program a universal remote

Fed up, even more, of having to use multiple remotes every day in order to access and change channels on TV, start movie on the DVD player and pause the good old VCR you’ve finally decided: you bought a universal remote control, one of those ” gadgets “that can be used to operate a multitude of electronic devices in the home, the TV in the first place. I must say, you have definitely made ​​the best choice.However, if you end up on this guide it is most likely because you’re having some minor problems with your new purchase. As you say? You do not know how toprogram a universal remote ? here, in fact. Well, then do not worry … I can help you!

I know, when you do not know where to put your hands and you feel it’s all very complicated, but believe me, programmed universal remote is actually a real breeze. Operations that must make to be able to program the universal remote are in fact extremely simple and take away only a little, in fact very little free time.

If your intention is therefore to find out what you have to do to be able to program a universal remote I suggest you take a few moments for you and concentrate on reading this guide. I am sure that after all you will be ready to give me right that program universal remote really was a no brainer.

Assuming that depending on the make and model of universal remote at your disposal the methods by which tune can change know that I will try to be as precise as possible and to provide clear guidance and comprehensive.

According to those who are your preferences and based on what you own keep in mind that universal remote controls can be configured in three ways: by entering them in the code associated with the TV, the decoder or device to be controlled, trying recognition Automatic unit or via a computer connection.

Programmed universal remote control via codes

If you want to program a universal remote control and prefer to do this by entering the proper codes you must first find the one best suited to the device you have.

To find the correct code to be able to associate the use of the universal remote control to your TV, set-top box or other device you can try to give a look at the pages of any book this leaflet in the sales package of the device.

Alternatively you can try to find the code for programming a universal remote starting the Web browser that most want on your computer and connecting to the Web site of the manufacturer of the remote control.

When displayed on the Web site uses the search field typically placed in the upper part of the same, enter the model name of your remote control, presses Enter on the keyboard, click on the search result that you think matches the device you have and the new page displayed identifies the section on how you can leverage with the remote control. It then identifies the code referring to your device.

At this point turn on the device for which you want to program a universal remote, grab the remote control and then awards and continues to hold the TV was on the same. Once that is done, the LED on the remote control will turn on and stay on.

Continuing to hold the TV type in the code that you have previously retrieved. As you type the code, the LED will turn off and then turn on again once inserted the last digit.

Now release the button TV . If you entered the code correctly, the LED will continue to flash for a few seconds then goes out. If you’ve entered the code correctly, the LED will flash four times and you will have to repeat the procedure taking care this time to enter the correct code.

After entering the code correctly you may perform any operation by remote control on the device to which you associate the latter. If you choose to program a universal remote control for use with the TV test, for example, to change channels.If everything goes the right way congratulations, you are successful in the enterprise. Otherwise I suggest you to repeat the whole procedure.

Please also note that for some remote control buttons to be pressed at the time of the approval procedure may be different from what I have already indicated. If the procedure that I have suggested to make to program universal remote control is ineffective, you can try pressing the key combination in September + TV (or the key for the device to be stored, for example,  SAT , VCR , etc.) or Power + Muteon the remote control, enter the code of the device to tune and save the settings by pressing the Power .

how-to-program-universal-remote

Programmed universal remote control through automatic recognition

Alternatively the procedure that allows you to program the universal remote via codes you can, in some cases, do one procedure of automatic recognition.

If you want groped the way of automatic recognition switch on the device to which you want to assign the remote control and then hold down simultaneously buttons acensione and one for the device on the remote until the LED turns on and stays on.

Subsequently press the Play every five seconds until the device turns off.

Now press the Rewind or Reverse to see if you log on or off the device to which you are associating the remote control. If not turn wait a while and then again presses the buttons that you have indicated.

To access device press and hold the button Stop until the light on the remote control turns off.

 

Raspberry Pi, receiving the official touchscreen

New accessory for the popular board development: the resolution is not that great, and the price is in line with cost of the basic hardware. The market of the board becomes more crowded and competitive. The Raspberry Pi Foundation has put on sale the first display “official” for the eponymous Card ARM development by ultra-cheap price, a device which enriches the market “accessories” for Raspberry Pi, and that of course the bride vocation low cost of board loved by programmers and “maker” assorted.

Raspberry Pi Touchscreen

The display for Raspberry Pi comes a little further away from the official Construct homes , costs ÂŁ 48 or $ 60 and is compatible with the three models Raspberry latest “generation” (+ Model A, Model B +, 2 Raspberry Pi Model B); owners of a previous hardware revision will be forced to “burdened” the upgrade, before you can use the new accessory. Speaking of specifications, the display official Raspberry Pi boasts 7-inch diagonal, touch controls to 10 fingers simultaneously and 800×480 resolution, connects to the board through GPIO port (for power) and DSI leads to ‘disappear’ on the back of the ticket ARM.

As for the software, finally, the necessary drivers and capacitive controls the virtual keyboard will be integrated in the next release of OS official (Raspbian OS) and will therefore require a further update – this time free. The market development board “bare “variously equipped or is getting more crowded, a result due in large part to their Raspberry Pi and that includes – among others – the products of the Orange Line Pi : Orange Pi PC, the latest model of the board, can boast a CPU SoC with quad-core Cortex-A7, Mali-400 GPU and 1 GB of onboard RAM, various interconnection ports (HDMI, USB) and compatibility with Raspberry Pi through the appropriate 40-pin port.

Canon reaching 250 megapixels

The European division of Canon has developed a prototype of a CMOS sensor in APS-H size smaller than one frame of an old 35mm film, but able to record a resolution of 250 megapixels . Since records are also videos produced by the same prototype, with a resolution of 30 times the size of 4K.

In the press release which announced that it has reached this goal, Canon indicates an impressive goal reached with this technology: a plane in flight more than 18 kilometers away has been taken up sharply from the prototype , with the writing on the sidewall of the fuselage perfectly legible on the final image. This result goes along with the technical innovations required to manage huge amounts of data produced in sensor output: 250 megapixel files to be transformed into a mean thousands and thousands of points to process and convert, and Canon claims to be able to reach about 1.25 billion pixels per second in read-out . This is equivalent in practical terms at a speed “burst” maximum of 5 frames per second (fps), a remarkable figure view of the resolutions in the game, which includes signal processors of a certain power to be able to be achieved.

More interesting would be to discover how Canon has managed to put together a storage device adapted to receive and accommodate the flow of data: a file produced by this sensor is expected to reach about 300 to 350 megabytes in size, and write about 5 per second exceeds the capacity in writing vast majority of media available today . Certainly not enough memory SD or Compact Flash as the ones used on cameras today, which for now can handle a maximum flow 4K video or take pictures of the sensors on the market of up to 50 megapixels as 5Ds on the same Canon and 42 megapixels for Sony A7rII. Canon is cautious on possible future applications of this technology: there are no predictions on entry into the market of such type of product , the utility of which of course could be particularly appreciated by professional photographers, but that could also it is used in other commercial and industrial applications where the maximum achievable detail could be a benefit not just to ensure the quality of products and the efficiency of production lines. At the time, the line closest seem to a new 120-megapixel camera that could be announced in the near term.

Lenovo is getting back to rootkits again

The Chinese corporation is back again to install unwanted software, this time acting at the firmware level, resistant to any attempt to format and reinstall Windows. Lenovo has already replied.

After the scandal, the controversy and reputational damage resulting from the pre-installation of Superfish , Lenovo seems to have lost the habit to install unwanted software, classified as bloatware within its PCs both desktops and laptops. The culprit this time It is called “Lenovo Service Engine” (LSE), an integrated feature within the BIOS – obviously in UEFI standard – Systems recently sold and based on an implementation of custom technology “official” Microsoft called “Windows Platform Binary Table “(WPBT). WPBT The technology is designed to ensure the mandatory installation of software importance of “critical” even if you reinstall the operating system, Microsoft said , with binary files (Windows native applications to be run in user mode ) stored within the UEFI firmware and reinstalled on the system being started even before the execution of the boot loader of the hard disk.

LSE exploits the persistence mechanism of WPBT to install a tool called “OneKey Optimizer” (OKO), from most parts branded as a real crapware that claims to “optimize” your PC while sending data to remote servers using the system of Lenovo. A rootkit, have called users, which is more affected by a vulnerability security discovered and notified to Lenovo already months ago. The crapware UEFI Lenovo does not meet the specifications established by Microsoft with WPBT, and not surprisingly the corporation has already distributed an update to the firmware for the removal of LSE PCs affected: the Thinkpad laptop line are not affected by the problem, it is keen to stress the company. What is certain, after the discovery of the rootkit installed on UEFI firmware and technology-based “official” Microsoft for the persistence of binary files on Windows OS, is spreading among users more informed, of the absolute lack of confidence in corporate information out of sight: the PC (brand) are now at outside the control of their owners, a finding of a fact that makes it seem a lot less “crazy” the warnings of Richard Stallman on the end of personal computing as we know it.

Hack any paid WiFi hotspot from Windows

Well, it’s not nice to do that, but you should know it can easily be done even from Windows, not only from linux or other operating systems. First you should know what MAC is in order to understand the entire process.

MAC or Media Access Control is a unique (if your network card is not made in China, or on a ship from China, that’s other story) identifier assigned to network interface for communications on the physical network segment. Basically it’s a form of identification between your computer and the first access point, or router.

What you’re going to do next is more like spoofing an address and access the network using someone else access to that network. Most of the paid WiFi hotspots (or even paid hotel hotspots) are based on MAC address filtering which can be easily bypassed. Even you can Hack any paid WiFi hotspot from Windows

Step 1: Find and connect to the network

Even if you didn’t paid you can connect to the paid network. You don’t have to open any browser or start browsing at this moment, just select and connect to the designated network (target).

Now, go to start and type CMD. Press enter.

On the black window (yes, it’s called command prompt) type arp -a

You should see a bunch of other computers from that network. We are most interested in their MAC address listed there. Just copy a few (or all) in a notepad file.

Wifi Hack Windows 7

 

Step 2: Spoof the MAC Address on your Network Card

First, open the Device Manager. On Windows 8.1, press Windows Key + X and click Device Manager. On Windows 7, press the Windows key, type “Device Manager” to search for it, and click Device Manager. Now you should find the Network Adapters, locate the wifi card and right click on it. Press the properties.

WiFi Hack Windows 7/8

Click the Advanced tab and select Network Address in the list. Your network driver doesn’t support this feature if the option isn’t here.

Mac Address Cloning on windows WiFi

Now, enter the data from your notepad, without dashes or spaces. You should get 12 alphanumeric code after your eliminate the spaces or dots. Place the code on the “Value” input.

Step 3: Enjoy the internet

When you will press ok, you should be able to open a browser and enjoy the free internet. This is also working on paid internet from hotels, bars, train stations or other paid networks you may encounter.