Top 10 Online Scams for 2011

Be aware

Almost all people in the world know how to use computers and internet. Users can do a lot of things over the internet but most were got scammed unknowingly. Innocent internet users were unaware on the scams over the internet and just keep on clicking on bogus links, and ads. These links and ads are taking advantage of these users and they were exploiting them without their knowledge. Unaware users are tempted to click ads like Test your I.Q, You Won a Lottery, Make Money through the Internet, Find your Soulmate and many more.

But these things not only happen on naïve users but they also trap even the tech savvy and knowledgeable users.

Better Business Bureau has compiled the Top 10 Internet scams for the last year. It includes some malicious party pretended to be the BBB itself. They send emails to small business owners wherein they were being fooled to download an information stealing malware. Here are the top 10 online scams for 2011.

Blowfish12@2012 Author: Sudharsun. P. R.

The Top 20 Internet Terms

for Beginners, 2012

Welcome, readers!  As you strive to make sense of the Internet and the World Wide Web, these 30 terms are bound to be very helpful.

1. The Web vs. the Internet

The Internet is a vast ‘interconnection of computer networks’ that spans the globe.  It is comprised of millions of computing devices that trade volumes of information.  Desktop computers, mainframes, GPS units, cell phones, car alarms, video game consoles, and even soda pop machines are connected to the Net.  

The Internet started in the late 1960’s as an American military project, and has since evolved into a massive public spider web. No single organization owns or controls the Internet.  The Net has grown into a spectacular mishmash of non-profit, private sector, government, and entrepreneurial broadcasters.

The Internet houses many layers of information, with each layer dedicated to a different kind of documentation. These different layers are called ‘protocols’. The most popular protocols are the World Wide Web, FTP, Telnet, Gopher space, instant messaging, and email.

The World Wide Web, or ‘Web’ for short, is the most popular portion of the Internet.  The Web is viewed through web browser software.

2. http and https

http is a technical acronym that means ‘hypertext transfer protocol’, the language of web pages. When a web page has this prefix, then your links, text, and pictures should work in your web browser.

https is ‘hypertext transfer protocol SECURED’.  This means that the web page has a special layer of encryption added to hide your personal information and passwords.  Whenever you log into your online bank or your web email account, you should see https at the front of the page address.

:// is the strange expression for ‘this is a computer protocol’.  We add these 3 characters in a Web address to denote which set of computer lanaguage rules affect the document you are viewing.

3. Browser

A browser is a free software package that lets you view web pages, graphics, and most online content.  Browser software is specifically designed to convert HTML and XML into readable documents.

The most popular web browsers in 2012 are: Google Chrome, Firefox, Internet Explorer, and Safari.

4. HTML and XML

Hypertext Markup Language is the programmatic language that web pages are based on. HTML commands your web browser to display text and graphics in orderly fashion. HTML uses commands called ‘HTML tags’ that look like the following:

  • <body></body>
  • <title></title>

XML is eXtensible Markup Language, a cousin to HTML.  XML focuses on cataloging and databasing the text content of a web page. XML commands look like the following:

  • <entry>
  • <address>
  • <city>

XHTML is a combination of HTML and XML.

5. URL

URL’s, or ‘uniform resource locators’, are the web browser addresses of Internet pages and files. A URL works together with IP addresses to help us name, locate, and bookmark specific pages and files for our web browsers.

URL’s commonly use three parts to address a page or file: the protocol (which is the portion ending in ‘//:’); the host computer (which sometimes ends in .com); and the filename/pagename itself. For example:

6. IP Address

Your computer’s ‘internet protocol’ address is a four-part electronic serial number. An IP address looks something like ‘’, complete with dot separators.  Every computer, cell phone, and device that accesses the Internet is assigned at least one IP address for tracking purposes. Wherever you browse, whenever you send an email or instant message, and whenever you download a file, your IP address acts like a type of automobile license plate to enforce accountability and traceability.

7. Email

Email  (formerly spelled e-mail with a hyphen) is electronic mail.  It is the sending and receiving of typewritten messages from one screen to another.  Email is usually handled by a webmail service (e.g. Gmail or Yahoomail), or an installed software package (e.g. Microsoft Outlook).

Email has many cousins: text messaging, instant messaging, live chat, videomail (v-mail), Google Waving.

8. Blogs and Blogging

A blog (‘web log’) is a modern online writer’s column.  Amateur and professional writers publish their blogs on most every kind of topic: their hobby interest in paintball and tennis, their opinions on health care, their commentaries on celebrity gossip, photo blogs of favorite pictures, tech tips on using Microsoft Office. Absolutely anyone can start a blog, and some people actually make reasonable incomes by selling advertising on their blog pages.

9. Social Media and Social Bookmarking

Social media is the broad term for any online tool that enables users to interact with thousands of other users. Instant messaging and chatting are common forms of social media, as are blogs with comments, discussion forums, video-sharing and photo-sharing websites. and are very large social media sites, as are and

Social bookmarking is a the specific form of social media. Social bookmarking is where users interact by recommending websites to each other (‘tagging sites’).

10. ISP

ISP is Internet Service Provider.  That is the private company or government organization that plugs you into the vast Internet around the world.  Your ISP will offer varying services for varying prices:  web page access, email, hosting your own web page, hosting your own blog, and so on.  ISP’s will also offer various Internet connection speeds for a monthly fee. (e.g. ultra high speed Internet vs economy Internet).

Today, you will also hear about WISP’s, which are Wireless Internet Service Providers.  They cater to laptop users who travel regularly.

11. Download

Downloading is a broad term that describes when you make a personal copy of something you find on the Internet or World Wide Web.  Commonly, downloading is associated with songs, music, and software files  (e.g. “I want to download a new musical ringtone for my cell phone”, “I want to download a trial copy of Microsoft Office 2010”).  The larger the file you are copying, the longer the download will take to transfer to your computer.  Some downloads will take 12 to 15 hours, depending on your Internet speed.

Be warned: downloading itself is fully legal, as long as you are careful not to download pirated movies and music.

12. Malware

Malware is the broad term to describe any malicious software designed by hackers. Malware includes: viruses, trojans, ratware, keyloggers, zombie programs, and any other software that seeks to do one of four things:

  1. vandalize your computer in some way
  2. steal your private information
  3. take remote control of your computer (‘zombie’ your computer) for other ends
  4. manipulate you into purchasing something

Malware programs are the time bombs and wicked minions of dishonest programmers.

13. Router (aka ‘Network Router’)

A router, or in many cases, a router-modem combination, is the hardware device that acts as the traffic cop for network signals into your home. A router can be wired or wireless or both. Your router provides both a defense against hackers, and the redirection service of deciding which specific computer or printer should get which signals in your home. If your router or router-modem is configured correctly, your Internet speed will be fast, and hackers will be locked out.  If your router is poorly configured, you will experience network sluggishness and possible hacker intrusions.

14. Keywords and Tags/Labels

Keywords are search terms used to locate documents. Keywords are anywhere from one to five words long, separated by spaces or commas:  e.g. “horseback riding calgary” e.g. “ipad purchasing advice”  e.g. “ebay tips selling”. Keywords are the foundation for cataloging the Web, and the primary means by which you and I will find anything on the Web.

Tags (sometimes called ‘labels’) are recommendation keywords. Tags and labels focus on crosslinking you to related content… they are the modern evolution of ‘suggestions for further reading’.

15. Texting/Chatting

Texting is the short way to say ‘text messaging’, the sending of short electronic notes usually from a cell phone or handheld electronic device.  Texting is popular with people who are mobile and away from their desk computers.  Texting is something like the pagers of old, but has the file attachment ability of email. 

To send a text message, you will usually need a keyboard-enabled cellphone and a text message service through your cellphone provider.  You address your text messages using the recipient’s phone number.

16. I.M.

I.M. (usually spelled ‘IM’ without the periods) is instant messaging, a form of modern online chatting.  IM is somewhat like texting, somewhat like email, and very much like sending notes in a classroom. IM uses specialized no-cost software that you install on your computer.  That IM software in turn connects you to potentially thousands of other IM users through the Internet.  You locate existing friends and make new friends by searching for their IM nicknames.

Once the software and your friends list is in place, you can send instantaneous short messages to each other, with the option of including file attachments and links.  While the recipient sees your message instantly, they can choose to reply at their leisure.

17. P2P

P2P file sharing (‘peer-to-peer’) is the most voluminous Internet activity today.  P2P is the cooperative trading of files amongst thousands of individual users. P2P participants install special software on their computers, and then voluntarily share their music, movies, ebooks, and software files with each other.

Through ‘uploading’ and ‘downloading’, users trade files that are anywhere from 1 megabyte to 5 gigabytes large. This activity, while in itself a fully legal pasttime, is very controversial because thousands of copyrighted songs and movies trade hands through P2P.

18. Bookmark

A bookmark (aka “favorite”) is a marker that you can place on web pages and files.  You would bookmark something because:

  1. You want to return to the page or file later
  2. You want to recommend the page or file to someone else

Bookmarks/Favorites can be made using your right mouse click menu, or the menus/toolbars at the top of your web browser.  Bookmarks/Favorites can also be made on your Mac or Windows computer files.

19. Social Engineering

Social engineering is the conman art of talking directly to people to trick them into divulging passwords and their private information.  All social engineering attacks are some form of a masquerade or phishing attack, designed to convince you that the attacker is trustworthy as a friend or as a legitimate authority figure. The attacker might use an email, phone call, or even face-time interview to deceive you. Common social engineering attacks include greeting cards, bogus lottery winnings, stock investment scams, warnings from an alleged banker that you’ve been hacked, credit card companies pretending to protect you.

20. Addons and Plugins

Addons are custom software modifications. User optionally install addons to improve the power of their Web browsers or office software. Examples include: a custom eBay toolbar for your Firefox browser, a new search feature for your Outlook email. Most addons are free, and can be found and downloaded from the Web.

Plugins are a special kind of web browser addon. Plugins are essentially required addons, if you wish to view very specialized web pages.  Examples include: Adobe Flash or Shockwave player, Microsoft Silverlight player, Adobe Acrobat pdf reader.

Blowfish12@2012 Author: Sudharsun. P. R.

IPv6: Are You Ready?


As IPv6 is around the corner and set to grow in the coming few years, are you ready for it yet?
Find out using this test if your network are ready for IPv6.


IPv6 is an IP address standard designed to replace the current IPv4 protocol, which has been in use since the 1980s for routing Internet traffic. The new protocol has been available for several years now and supports several magnitudes more address spaces than IPv4, while also providing better security and reliability.

For more than 30 years, 32-bit addresses have served us well,but the growth of the Internet has mandated a need for more addresses than is possible with IPv4. IPv6 allows for vastly more addresses. IPv6 is the only long-term solution,  it has not yet been widely deployed. With IPv4 addresses expected to run out in 2011, only 0.2% of Internet users have native IPv6 connectivity.

Decomposition of an IPv6 address into its binary form.

Decomposition of an IPv6 address into its binary form.

While IPv4 allows 32 bits for an Internet Protocol address, and can therefore support 232 (4,294,967,296) addresses, IPv6 uses 128-bit addresses, so the new address space supports 2128 (approximately 340 undecillion or 3.4×1038) addresses. This expansion allows for many more devices and users on the internet as well as extra flexibility in allocating addresses and efficiency for routing traffic. It also eliminates the primary need for network address translation (NAT), which gained widespread deployment as an effort to alleviate IPv4 address exhaustion.

On 8 June, 2011, top websites and Internet service providers around the world, including Google, Facebook, Yahoo!, Akamai and Limelight Networks joined together with more than 1000 other participating websites in World IPv6 Day for a successful global-scale trial of the new Internet Protocol, IPv6. By providing a coordinated 24-hour “test flight”, the event helped demonstrate that major websites around the world are well-positioned for the move to a global IPv6-enabled Internet, enabling its continued exponential growth.

Organized by the Internet Society, the project was intended to raise awareness about the need to start the global transition to IPv6 and to enable participants to gather data about potential glitches.

Many of the problems are likely to stem from the simple facts that IPv6 is far newer and untested technology compared with IPv4, and that the two protocols will need to coexist for several years.

The real test of the IPv6 protocol, however, will come when companies start migrating to it in earnest in the next few years.

Blowfish12@2012 Author: Sudharsun. P. R. Reference: wiki,,

How To Copy Text and Save Images On Right Click Disabled Websites

Many websites have blocked texts and images on their sites. Blocking text and images on a site means they are not allowing people to either copy any portion of text from their web pages or save any images from their website. Basically sites do not want their contents getting published elsewhere. And most matrimonial websites do not allow image saving options by disabling right click, just to respect their member’s privacy. But this is possible to bypass all their settings and copy text as well as save images from those restricted websites. Read further to know how.

In general we select some portion of text from a website, then right click on it and save that. In order to save images from a website, we right click on the image, select the image saving option and save the image. But now-a-days sites are using some simple javascripts to block right clicking ability on their web pages. And as a result, we can’t save any text or images from their sites. Now if we can block those scripts temporarily, the website will behave like a normal site and we can do whatever we want. Lets learn how to bypass their settings.

How to enable Right Click on web sites : Websites use javascripts to block the right clicks on their websites. This javascript acts with our browser. So, if we can set our browsers to avoid running those scripts, we will be able to copy texts and save images. Now lets learn how to disable javascripts and enable right click.

Firefox users :

  • Go to Tools –> Options
  • Click on Content tab
  • Uncheck the box saying Enable javascript
  • Restart Firefox and you are done.

Internet Explorer Users :

  • Go to Tools –> Internet Options
  • Click on Security Tab –> Custom Level

  • Scroll to Scripting
  • Disable it.
  • Restart IE and you are done.

Once you are done with your job, enable javascript option on your browser again. From now on, you don’t need to get worried when you find a web page that does not allow you to copy text or save images from it. The above mentioned tricks will take care of that and you will be able to copy texts and save images.