Bloggiri.com

ANURAG CHOUDHARY

Returns to All blogs
घरेलू उपचार जो बिना साइड इफ़ेक्ट के वास्तव में प्रभावी हैं। घरेलू उपचार अक्सर चिकित्सकों द्वारा किये गए उपचार से अधिक काम करते हैं। उनमें से अधिकांश के पीछे वास्तव में वैज्ञानिक एवं प्रमाणित आधार है। कभी कभी वे अपने पारंपरिक चिकित्सा समकक्षों(alopathy, होमियोपैथी,आयुर्व...
ANURAG CHOUDHARY...
Tag :Home Remedies
  August 6, 2016, 2:47 pm
Facebook tagging scam – the malware automatically expands through taggingफेसबुकटैगिंगस्कैम-मैलवेयरटैगिंगकेमाध्यमसेस्वत:फैलता है ।कैसालगेगाजबआपअपनाफेसबुकखाताखोलेंऔरआपकीटाइमलाइनपरएकपोर्नतस्वीरयापोर्नवीडियोकीलिंकदिखाईदे।आपकोयहभीपताचलेकियहकामआपकेहीकिसीफेसबुकमित्रकाहैजोबहुतहीसभ्यऔरजिम्मेद...
ANURAG CHOUDHARY...
Tag :facebook
  June 27, 2016, 4:06 pm
(UPI) upiunified-payments-interfaceएकीकृतभुगतानइंटरफेसक्याहैऔरयहआपकेलिएकितनाउपयोगीहै - भारतीयराष्ट्रीयभुगताननिगम(एनपीसीआई) नेबहुप्रतीक्षित(UPI) एकीकृतभुगतानइंटरफ़ेसकाशुभारंभकरदियाहै।यहदेशकेवित्तीयक्षेत्रमेंएकबड़ाक्रांतिकारीपरिवर्तनमानाजारहाहै।यहअवधारणाकोईनईनहींहैत...
ANURAG CHOUDHARY...
Tag :Unified Payment Interfface
  May 27, 2016, 9:03 pm
अपने एंड्राइड उपकरणकोवायरससेकैसेबचाएंसाइबर अपराधी हमेशा इंटरनेट से जुड़े उपकरणों पर हमले के नित नए तरीके की खोज में  रहते हैं। एंड्रॉयड, सबसे लोकप्रिय ऑपरेटिंग सिस्टम होने के कारण यह हमेशा अपराधियों के निशाने पर रहता है। आने वाले दिनों में साइबर अपराधियों द्वार...
ANURAG CHOUDHARY...
Tag :Malware Virus
  April 16, 2016, 5:52 pm
Bad effects of Smartphone Addiction Syndrome, how to get rid of themस्मार्टफोन ऐडिक्शन सिंड्रोम, इसके दुष्प्रभाव और इस बुरी आदत से कैसे छुटकारा पाएंअगरआपहमेशाअपनेस्मार्टफोनपरकुछनकुछखोजतेरहतेहैं।आपहमेशासर्फिंगयाकॉलकरनेअथवाएसएमएसभेजनेअथवाप्राप्तकरनेकेअलावाअन्यगतिविधियोंमेंव्यस्तरहतेहैंऔरअ...
ANURAG CHOUDHARY...
Tag :Smart Phone
  April 1, 2016, 9:44 pm
ब्लॉगर ब्लॉग पर साईटमैप(पोस्ट सूची) कैसे बनायेंHow to create sitemap on blogger blogब्लॉग पर साईटमैप(पोस्ट सूची) लगाना बहुत लाभप्रद तथा आसान है।  ब्लॉग पर साईटमैप होने से आपके पाठक आपके ब्लॉग की पूरी सामग्री की सूची एक क्लिक में देख सकते हैं। ब्लॉग देखना सुविधाजनक होने से आपके पाठकों के आ...
ANURAG CHOUDHARY...
Tag :Page creation in blogger
  March 28, 2016, 9:19 pm
Highly Dangerous Adware Virus Safeupdates.net, Symptoms, Protection, Removal - Cyber attackers and hackers develop threats, hard to be detected even by powerful anti malware software. Safeupdates.net is also a malware of such category and it is a very dangerous adware virus which may cause havoc inside your PC and may totally spoil your system. If you don’t have a good computer security software, your chances of getting this infection are very high. During your usual browsing sessions you may suddenly see a Safeupdates.net pop-up message you offering updates of some high quality software like adobe flash player, Java etc. Please close the window at once. This fake message often appear...
ANURAG CHOUDHARY...
Tag :
  February 28, 2015, 4:16 pm
How to avoid and stay safe from tech support phone scams-Some time you may receive a call on your phone/mobile phone. The caller may claim to be a service expert or a tech. representative from a prestigious software/hardware company and may offer various type of help and solutions. Please note that the big corporations like Microsoft, Apple etc. do not have any arrangements to initiate unsolicited phone calls known as cold calls. In fact such calls are always made by cyber criminals because the cybercriminals don't just send fraudulent email messages and set up fake websites, but they might also call you on your telephone/mobile phone and claim to be from a reputed corporation like Microsoft...
ANURAG CHOUDHARY...
Tag :
  February 2, 2015, 4:01 pm
Dangerous Trojan PWS:Win32/Zbot.gen!AP – Behaviour, Removal, How it comes-Created by Zeus kits, Trojan  PWS:Win32/Zbot.gen!AP is a very dangerous malware infection. Experts rate it a malware of high vulnerability. The main goal of this rogue is to steal your financial information and other sensitive data like bank details and credit/debit card details and use these for illicit purpose. It is so dangerous malware that it can cause an irrecoverable damage to your system, if not removed timely. This password-stealing trojan can send the record of your keys hits to a remote malicious hacker including your online activity like visits to your banking websites.Image Source - www.slidesh...
ANURAG CHOUDHARY...
Tag :
  January 22, 2015, 10:22 pm
Trojan.Proxy.Koobface-causes, Systems and Removal Procedure-As the “Trojan” is the most harmful or dangerous category among the malcode, the same way  Trojan.Proxy.Koobface is also a very dangerous malware. If you are a social media addict this is an alert for you because the Trojan.Proxy.Koobface infiltrates your computer through Social media website like ‘Facebook’, ‘MySpace’ etc. Once entered in your PC this self replicating malcode will cause severe damage not only to your system but may also cause you financial loss by stealing your sensitive information. It will also deliver you fake alerts and notifications and random messages through your social networking accounts. ...
ANURAG CHOUDHARY...
Tag :
  January 13, 2015, 4:51 pm
How to add Control Panel option in Desktop Right click in windows 7-Many times we need to open the computer's control panel and to open the Control Panel normally we need to click the Start button, and then ‘Control Panel’. Though we can create an icon of control panel on our desk top, but how it will be if you get the ‘Control Panel’ option in your desk top right click. Yes it is possible. There are arrangements in our windows 7 it self. For it you have to follow a simple procedure. For this you will need to make small modifications in your windows 7 registry. The steps to follow are given below -1.      Login to your computer as administrator.2.  ...
ANURAG CHOUDHARY...
Tag :
  January 6, 2015, 9:55 am
How to Set up a new broadband(PPPoE) DSL or cable connection in Windows 8-To use the broadband(PPPoE- Point to Point Protocol over ethernet) you will need to create a connection and to to create a Digital Subscriber Line (DSL) or cable connection, you first need an account with an Internet service provider (ISP). For DSL, the ISP is usually a landline phone or mobile phone service providing company and for a cable, it will usually be a cable operator or cable TV service provider. You will also need to have a modem and a router, or a combination the these two. Some of the ISPs provide you  these devices free or at cost but if your ISP doesn't, you'll need to buy them. When you have your ...
ANURAG CHOUDHARY...
Tag :
  December 31, 2014, 8:34 pm
How to manually delete duplicate files in windows 7-You might occasionally discover that there are identical or seemingly identical files on your computer Hard Drive. This usually happens if you save copies of the same file in different locations or different directories on your computer. Identical files waste storage capacity and make it difficult to manage your files in addition, since it's more difficult to find the version you want when several files have the same name. Though a number of free software are available on the web for this purpose but in windows 7 you can easily manage it manually. It is very important to ensure that the file you are going to remove is really a duplicate cop...
ANURAG CHOUDHARY...
Tag :
  December 22, 2014, 10:08 pm
Why to prefer a Tablet instead of a Laptop-Tablet computer, or a tablet PC is a kind of mobile computer, usually having a touch screen or pen-enabled interface. It has almost all the features of a laptop. Tablet computer was Conceptualized in the mid-20th century but prototyped and developed in the last two decades of 20th  century. The tablet computers started to became more popular from the beginning of the year 2010. A tablets may include physical buttons such as speaker volume and power  and ports for network communications and power input to charge the battery. Some attractive features of a modern tablet which make people consider the tablet a better choice over a laptop -Conn...
ANURAG CHOUDHARY...
Tag :
  December 13, 2014, 4:58 pm
TheTrojan Zlob -How it works and How to remove it- The Zlob Trojan, is a Trojan horse which was first detected in by antivirus software vendors in 2005 and it was named by them as Trojan.Zlob, It drew attention of them in mid 2006 when computer infections were reported in a large number. This Trojan horse Masquerades itself as a needed video codec in the form of ActiveX. If you have a good antivirus software installed on your system, the chances of coming it to your PC are rare. This Trojan is very complicated and it is very difficult to remove it manually because it creates a large number of dll files and registry entries.What The Zlob Trojan does in your computer·  &nb...
ANURAG CHOUDHARY...
Tag :
  December 4, 2014, 3:33 pm
Symentech discovers new malicious software most sophisticatedSymentech a leading computer security company, a leader in antivirus/antimalware development says that they have discovered a new malware. They named it ‘Regin’ and claim that it is one of the most sophisticated pieces of malicious code they have ever seen. The malicious code Regin is estimated to be in use approximately for six years or so. According to its characteristics it may have been developed by Government agencies to spy another Government agencies and big business houses and prominent personalities. In view of the experts computers in Russia, Saudi Arabia and Ireland may have been the most probable targets of this esp...
ANURAG CHOUDHARY...
Tag :
  November 24, 2014, 3:20 pm
Fake Antivirus Security Pro-causes actions and removal process-Antivirus Security Pro, basically belonging to the WinWebSec family, is a rogue anti-spyware program. It has a large number of clones which are equally dangerous. Antivirus Security Pro as well as all its clones make unwanted changes to your computer setting to start the fake security application automatically each time your windows starts up. Please do not be fooled by the name of the program as its main goal for which it was created is to trick and instigate people to purchase the fake application by transferring money to the cyber criminals. Such program are categorized as scare-ware as they use scare tactics to make people be...
ANURAG CHOUDHARY...
Tag :
  November 19, 2014, 3:46 pm
How to create a new Broadband connection in Windows 7-  Broadband connection is the most used connection by the internet users throughout the world. This type of connection gives us the highest speed and it is very easy to use. If your computer and the systems of your internet service provider, all are working normal, and you have chosen a high speed plan, it will give you unbelievable speed. It will open your pages as if you are opening files from your local hard drive. Before we use it we have to setup a connection using the user name and password provided by our internet service provider, however, we are at liberty to change the password at any time. For security reasons we must imme...
ANURAG CHOUDHARY...
Tag :
  November 13, 2014, 4:48 pm
How to remove DOS/Rovnix.gen!A extremely dangerous computer infection-The extremely dangerous computer infection ‘DOS/Rovnix.gen!A’ is not very old virus. It was first detected in April, 2014. Experts say, it is  a variant of Win64/Rovnix.gen virus. It enters your system through  an attachment enclosed to a spam email or bundled with some other downloads. After entering to your computer, DOS/Rovnix.gen!A may add malicious entries to your registry and may infects a number of system files of your computer. DOS/Rovnix.gen!A is capable of  Opening up a backdoor for installing other malicious applications on your computer. The infection is certainly a serious problem. The exper...
ANURAG CHOUDHARY...
Tag :
  November 8, 2014, 12:54 pm
Fake Anti virus “PC Fix Speed”-Causes, Actions and Removal- The fake antivirus PC Fix Speed is a program which claims to be developed to help you to fix the issues related to the speed of your PC. Like other fake Anti Virus program PC Fix Speed also claims that it is a very helpful tool. If you install the program on your PC erroneously or otherwise, you can’t remove it without the help of an anti malware/Antivirus software or until you buy the full version of it. I think now you have got the point, what the developers wanted all along. As the software PC Fix Speed itself is classified as rogue-antispyware hence the results provided by the program are not at all trustworthy. Thoug...
ANURAG CHOUDHARY...
Tag :
  November 4, 2014, 2:49 pm
Trojan Horse Fedex Tracking Number Email Virus-Actions, recognition,removal and precautions-A Trojan horse Fedex Tracking Number is an email virus which enter your system through a malicious or a malicious attachment to an email. You will receive an email with an  attachment and if you click it without consideration to open the fake e-mail attachment, the Trojan horse Fedex Tracking Number will install your system because the email attachment is malicious and once you download it, you infect your PC with malware. The spam e-mail may look like as has comes from Fedex, it will be just a trick of cyber criminals to mislead users to the message to be trustworthy. If you receive such email, ...
ANURAG CHOUDHARY...
Tag :
  October 30, 2014, 2:41 pm
Dangerous Adware Radio Canyon-Causes, Actions and Removal-The potentially unwanted adware software Radio Canyon spam computers with annoying commercial advertisements. Radio Canyon is compatible with Internet Explorer and Mozilla Firefox web browsers. If you are an expert computer user and security-minded, please make sure to remove Radio Canyon immediately from your system. If you notice this application installed in your computer, you don’t have to worry as Radio Canyon is not a malware or a computer virus but it is simply an adware. Please note that mostly Adware are also related to some kind of dangerous third party malware/virus which could leak your sensitive data and send them to cy...
ANURAG CHOUDHARY...
Tag :
  October 25, 2014, 3:59 pm
Keyboard shortcuts for Gmail to work Easy and fast-To use Gmail shortcut keys you'll need a Standard 101/102-Key or Natural PS/2 Keyboard to use the shortcuts. Keyboard shortcuts help you save time by allowing you to never take your hands off the keyboard to use the mouse. Some keyboard shortcuts can be used immediately, and others need to be enabled before you can use them. Some Shortcuts are always turned on and these navigational and formatting shortcuts always work whether or not you've enabled the keyboard shortcuts setting. Some short cuts are disabled and Before you can use these keyboard shortcuts, you’ll need to enable keyboard shortcuts in your settings. If we compare Gmail with ...
ANURAG CHOUDHARY...
Tag :
  October 19, 2014, 4:36 pm
TurnedOnTimesView –get startup shutdown report of PC protect from Misuse-If you think that someone is using your computer/laptop TurnedOnTimesView developed by NirSoft may prove very helpful to you. It is a simple and small tool(66 KB Only) in Zip format and available to download free. You can use it without installation. It analyses the event log of Windows operating system, and detects the time ranges when your computer was turned on or turned off and supports all version of Windows, starting from Windows 2000 and up to Windows 8. both 32-bit and 64-bit systems. For every period of time that the computer was turned on, the following information is displayed - Startup Time, Shutdown Time,...
ANURAG CHOUDHARY...
Tag :
  October 15, 2014, 4:14 pm
Fake Antivirus Windows Web Shield-Its actions, how to detect and remove it-Windows Web Shield is totally fake antivirus and does nothing to your PC except infecting it like the fake defragmentor the system Fix claims to be a superior disk defragmenter but defragments nothing and Windows Web watch dog claims to be a very good security software but does not provide any security. In fact Windows Web Shield is nothing more than a tool to trick and instigate you to purchase the full version of the antivirus which actually does not exist. The rogue anti-spyware program imitates system scans to make you think that it can protect you against computer threats. It displays scan results which are ...
ANURAG CHOUDHARY...
Tag :
  October 7, 2014, 10:52 am
[ Prev Page ] [ Next Page ]

Share:
  You can create your ID by clicking on "Sign Up" (written at the top right side of the page) & login into bloggiri. After login, you will be ...
More...  

Hot List (1 Like = 2 Views)
  • 7 Days
  • 30 Days
  • All Time
Total Blogs Total Blogs (819) Total Posts Total Posts (41129)