Pages

Saturday, June 21, 2008

how-to-make-favicon-on-addressbar

The small icon you see in your address bar is called the flavicon.
If you wondered how to make a flavicon and wanted one for yourself read on.

How to create a great Favorites Icon
Favicon is a small image (16x16 pixels), which is shown in your browsers location bar, next to the URL. The easiest way to create one is to use an icon editing software. Don`t have one? No problem. You can download it for free form our Webmaster Center. You can also use one of the online favicon generators you will find at the bottom of this page.
How do I create a Favicon .ico File ?


1. Create an image that is 16x16 pixels in size. You could also use an image you like and resize it. But remember, the image has to be in proportion (50x50, 100x100) or your favicon will not look good.



How to create a great Favorites Icon

D. Champ Webmaster


2. Save the image as an .ICO file. Name it exactly: "favicon.ico" or it will not work. Upload it to your website s root directory (that`s next to your index.htm file).

3. Add the following lines of code inside the section of your pages.

4. You re done.

Testing the Favicon


If you are using Internet Explorer and your favicon is not showing up, make sure you clear your browsers cache. You can do it by pressing Ctrl and F5 at the same time. Favicon Benefits or Why should I use a Favorites Icon?

Have you ever asked yourself why do all the big companies have favicons?


Here are the reasons:
* Favicon or a page icon is a great tool to brand your website. Since many pages still don`t have a favicon, your page will stand out from others!
* Your site will gain a professional and unique look, which can cause more links to your site and that means better rankings in search engines.

* You will save bandwidth since pages without favicons produce 404 File not found error files.


Free Online Favicon generators:

No problem if you don`t have an image editor. You can create your icon online. Try some of these great favicon makers.


* 1Favicon
- great website with lots of information about favicon.ico and a Tutorial to make your own.

* Favicon Maker
* Dynamic Drive Favicon Generator
* Favicon text generator
* Graphics Guru Favicon Tool

Particularly see

http://www.1favicon.com/

Source
D. Champ Webmaster

Read more On "how-to-make-favicon-on-addressbar"!

Friday, June 20, 2008

security-best-practices

SECURITY OF A WEBSITE
Do you know how important it is?
There's is no free lunch!

One of the world's best Open Source Content Management System
Joomla! tells us
There's no free lunch!

Don't be fooled by Joomla's award-winning ease of use. Maintaining a secure, dynamic Web site on the open Internet is not easy. Adequate security requires constant watchfulness and effort.

Many perspectives
There's no one right way!

Due to the variety and complexity of modern web systems, security issues can't be resolved with simple, one-size-fits-all solutions.

Learning indispensable
You, or someone you trust, must learn enough about your server infrastructure to make valid security decisions.

Experience Matters - Use Forums
There's no substitute for experience!

To secure your web site, you must gain real experience (some of which will be bitter), or get experienced help from others.

Chaltahai*** attitude is dangerous!

Rise above the herd

***[slang in Indian Hindi, meaning "Don't bother"]

The Security Forums are filled with "Help! I've been hacked" posts by people who did NOT follow standard security practices (this author included). If you decided to study documents such as this before your site is attacked, congratulation, you're already above the herd.

It's not as hard as it looks


The following checklist may seem intimidating, but you don't have to deal with all of it at once. As you become familiar with tools of modern Open Source Web development, suchn as GNU/Linux, Apache, MySQL, SQL, PHP, HTTP, CSS, XML, RSS, TCP/IP, FTP, Subversion, JavaScript, Joomla!, you'll add refinements to your set of security tactics.

All complex, dynamic, and open systems require powerful error checking and recovery methods. Web sites are no different.

Strong security is a moving target. Today's expert might be tomorrow's victim. Welcome to the game...

Source
Joomla Administrators Security Checklist - Joomla! Documentation
Getting Started _ _ _

Read more On "security-best-practices"!

password-best-safety-practice


LOCK AND KEY is Your Password
Andy Wallace tells little more than yahoo would tell us about password security.



I may have to pass on security expert's thoughts from time to time. People in general are lazy and loose about password, the only LOCK and key system, you have on the World Wide Internet.

Acknowledgments
Andy Wallace
Last Updated ( Monday, 26 November 2007 )
License

This document is released under the
Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported license.


Secure Password Thinking

Any password you create for Joomla!, MySQL, Apache, or in fact any passwords you ever create, should be made as secure as possible.

Typically this would mean:

BEGINNING WITH THE SIMPLE THINGS FIRST

  1. * using a minimum of 6 characters - the more the better but 8-10 should be an ideal
  2. * a mixture of upper and lower case alphabet characters, numbers, and permitted special characters for example -, _, *, $, !, %, although the use of these may be governed by the host settings on shared or virtual hosted, remote servers
  3. * do not use easily identifiable passwords for example, birthdays, children's or family names, or words that could be easily associated with you
  4. * in fact try not to use real words at all, replace letters with their numeric equal so the word ocean could become 0c34n (yes – I know it is a real word and there are only 5 characters but it is just an example) try 0c34n!c – and no do not now use that either
  5. * another way is to think entirely off-the-wall. Think of a favourite novel for example, The Hitch-hikers Guide to the Galaxy, and then take say the first and last letter from each word giving a sequence of letters (as indicated by the underscores):
Example 1: t e h s g e t o t e g y
this clearly means absolutely nothing but it could still be traced – eventually – by a determined cracker so let us mix it up a bit more:
Example 2: T 3 h $ 9 3 t 0 T 3 g Y
(again ignore the spaces) but you can now see that it would be a pretty illogical logic that would need to be applied to even come close to cracking that and when the additional security features of the various platforms is then laid over the top of this – we would not want to say it is impossible to crack, but they would take a very long time,
6. * you should regularly change your passwords certainly on critical sites
7. * if you keep a written record of your passwords, always ensure they too are kept secure and safely out of the way of prying eyes
8. * despite the temptation, try to avoid using the same password for all your various access requirements, both at home and at work

[The spaces are included in the two examples solely for clarity and should not be included and in fact spaces are generally not accepted in passwords]

PASSWORD MANAGERS

How to remember all those passwords?

One of the issues that can be experienced particularly when there are a lot of passwords that have to be maintained - especially as more and more services and utilities switch to, or offer, the option to deal with your accounts online - is actually remembering what all of these passwords are.

Most of todays browsers have an inbuilt facility to remember passwords and form completion details but there have been concerns raised over the security of these facilities in the past. It is a case of one program trying to do too much. If you feel this way and don't trust yourself (or your environment) to write down passwords properly and maintain this in an accessibe format then you might consider using one of the dedicated Password Managers that have been developed.

These can often be found as an integrated part of your Internet Security Software or you might consider one of the many commendable Open Source or indeed Commercial alternatives.

Password Managers
are dedicated software programs that apply high levels of encryption to secure your passwords and other data, yet give you an easily accessible repository for the information when you need it. Essentially you only have to remember the one password, which should be the most secure you can make it as described above, and the program holds all of the other information ready for when you need it.

For details on the available options check out the many Open Source and other format download sites and check out the customer & industry reviews that accompany the software and make your choice.

Password Generators

One of the benefits of this type of program is that they will often have a Password Generator that will create a completely random password for you. Takes a bit of the brain strain out of it all! These are also available as a separate standalone application.

Source

Andy Wallace
Acknowledges among many others

Jozsef Tamas Herczeg for the ideas on Password Manager/Generator.
Chad McKissick and Leandro BergantiƱos

From the Joomla! Help Site - article titled Secure Password Thinking

Read more On "password-best-safety-practice"!

Sunday, June 15, 2008

how-password-are-hacked

Howstuffworks "The Hacker Toolbox"
ARTICLE REVIEW
TITTLE How Hackers Work
AUTHOR Jonathan Strickland
Hacking of passwords has been a topic of curiosity and dread to everyone using the Internet at some point of time or the other.


Password became a common word only after the advent of Internet as email and chat spread like wild fire, unprecedented and unforeseen growing in geometric proportion in the population. Password cult now is pervasive world over as Internet access has reached the common man and the mouse is held by school children who pick up new technology fast.

It is worthwhile knowing some basics of password hacking from the experiences of developed countries who are two decades ahead or earlier than the third world countries.
Jonathan Strickland writes:

Malicious hackers use programs to:

* Hack passwords: There are many ways to hack someone's password, from educated guesses to simple algorithms that generate combinations of letters, numbers and symbols. The trial and error method of hacking passwords is called a brute force attack, meaning the hacker tries to generate every possible combination to gain access. Another way to hack passwords is to use a dictionary attack, a program that inserts common words into password fields.
* Infect a computer or system with a virus: Computer viruses are programs designed to duplicate themselves and cause problems ranging from crashing a computer to wiping out everything on a system's hard drive. A hacker might install a virus by infiltrating a system, but it's much more common for hackers to create simple viruses and send them out to potential victims via email, instant messages, Web sites with downloadable content or peer-to-peer networks.
* Log keystrokes: Some programs allow hackers to review every keystroke a computer user makes. Once installed on a victim's computer, the programs record each keystroke, giving the hacker everything he needs to infiltrate a system or even steal someone's identity.
* Gain backdoor access: Similar to hacking passwords, some hackers create programs that search for unprotected pathways into network systems and computers. In the early days of the Internet, many computer systems had limited security, making it possible for a hacker to find a pathway into the system without a username or password. Another way a hacker might gain backdoor access is to infect a computer or system with a Trojan horse.
* Create zombie computers: A zombie computer, or bot, is a computer that a hacker can use to send spam or commit Distributed Denial of Service (DDoS) attacks. After a victim executes seemingly innocent code, a connection opens between his computer and the hacker's system. The hacker can secretly control the victim's computer, using it to commit crimes or spread spam.
* Spy on e-mail: Hackers have created code that lets them intercept and read e-mail messages -- the Internet's equivalent to wiretapping. Today, most e-mail programs use encryption formulas so complex that even if a hacker intercepts the message, he won't be able to read it.

Hacker Hierarchy
Psychologist Marc Rogers says there are several subgroups of hackers -- newbies, cyberpunks, coders and cyber terrorists. Newbies are hackers who have access to hacking tools but aren't really aware of how computers and programs work. Cyberpunks are savvier and are less likely to get caught than a newbie while hacking a system, but they have a tendency to boast about their accomplishments. Coders write the programs other hackers use to infiltrate and navigate computer systems. A cyber terrorist is a professional hacker who infiltrates systems for profit -- he might sabotage a company or raid a corporation's databases for proprietary information [source: Knittel and Soto].

Read more On "how-password-are-hacked"!

Sunday, June 1, 2008

cellular

"I'm videotaping hot chicks walking in the bikinis.
Man, this is the greatest cell phone ever made. It is, I'm not kidding. Ryan says this as the movie "CELLULAR" begins.
cellular-movie-mobile-phonecellular-movie-kim-baingercell phone used in Cellular movie


"Let me get the phone. Hold on a second, I'm e-mailing this video to my computer. Its gonna be my new screen saver," this is the only wonder that the cell phone does other than being used to talk, just to talk in the movie "CELLULAR".
"This is the great cell phone ever made. It is. I am not kidding" one would expect to be brought in the movie titled 'cellular'.

A piece of video captured at the tail end of the movie is supposed to throw a surprise. Those who would love are in for a huge disappointment.Mobile gizmo fans who would love to see magic capabilities of hand held devices are in for a BIG disappointment when they pay to see another run of the mill kidnap thriller.

MOVIE TRAILOR
MyMovies.Net - Trailer (WM9 - 56kbps) (mymovies.net)

Mobile phone's WIFI, WAP, GPS, GPRS, Music, Camera, Video, HiFi, the lesser known, ever new, amazing magic, used either for sinister, clandestine or fun n funky purpose simply isn't there to send chemicals racing in your blood as you watch the movie CELLULAR. The name 'CELLULAR' is a misnomer.

The magic of the hand held cell phone that links one person to other across continents, over skies through the remote satellite, the blue tooth; for love, for entertainment, for business, for pleasure or as status signature or just as the single and worlds topmost ranking hype that is as widespread as an epidemic craze of the modern times is conspicuously missing in the CELLULAR.
KIM BASSINGER

Result: Nominated for Saturn Award
Category: Best Supporting Actress Kim Basinger
Academy of Science Fiction, Fantasy & Horror Films, USA
Year: 2005


[after slashing a kidnapper's arm with a shard of glass]
Jessica Martin: Tenth grade biology. Brachial artery... pumps 30 liters of blood a minute. There's only five in the human body. I'm sorry.

NO WIZARDRY OF MOBILE PHONE
Chad: [greeting girls at the pier] Hey Chloe. Sam. Friend with nipples.
[talking to Ryan on a payphone]
Chad: Dude, I have no idea what just happened. One minute I'm talking to nipples, next thing you know, I'm wearing a whale costume handing out flyers.
Ryan: [laughs] That sucks. Sounds like she got you.
Chad: I mean, I'm not saying it doesn't have its benefits.
[to two girls that pass him by]
Chad: Hey, you guys know that a blue whale's got an 11-foot penis? Heal the Bay.

A random wrong number on Ryan's (Chris Evans) cell phone sends him into a high-stakes race against time to save kidnapped Jessica Martin's (Kim Basinger) life. With no knowledge of Jessica other than her hushed, fearful voice on the other end of the tenuous cell phone connection, Ryan is quickly thrown into a world of deception and murder in a frantic search to find and save her. They are out looking for Ryan:
Ethan: [on walkie talkie] We found him yet?
Dmitri: No, I don't see him.
Ethan: He's the one on the cell phone, you idiot.
[looks through his binoculars and sees various people on cell phones]
Dmitri: Everybody's on a cell phone.

The lives of Jessica and her family are in his hands, but what is waiting for him on the other side of the line - and what will it cost him to find out? Also stars William H. Macy and Jason Statham. Directed by David R. Ellis (Final Destination 2). Special features: Deleted/alternate scenes with optional director commentary, "Celling Out" featurette, "Dialing Up Cellular" featurette, "Code of Silence: Inside the Rampart Scandal" featurette, Feature-length commentary from director David Ellis and writers Larry Cohen and Chris Morgan, Theatrical trailer
On Fast Track
with
Dr. Ashok Koparday

Read more On "cellular"!

SEXUAL HEALTH EDUCATION

SEXUAL HEALTH EDUCATION
Free Ask Sexologist