7/5/11

how to download youtube videos

Why you should download/save videos from youtube :

You found an interesting video from youtube and you want to save/download it to your computer and later share it with your friend or keep it as a collection. However, by default Youtube doesn't allow users to save/download the videos. It only allow user to send a hyperlink to the friends and invite them to go to youtube website to view the videos.

It will become a problem because these video may gone forever due to copyright infringement issues, why not save/download the video before it's too late ?

Steps to save/download the video from youtube

For Internet Explorer (PC) users

1) First of all, to make your job easier, you are advised to faster access to youtube.com.

2) Click your favorite video clip, you can see the URL in your browser becomes something like this :


3) highlight the URL (like above) and right click the mouse and select "copy"

4) Paste the URL at our download page

5) When the download link shows, You should right-click -> "Save Target As" OR copy and paste the link into your download manager. Note: You must change the file extension to .flv

6) The .flv file is not a common multimedia file, you need a software called FLV player to play it.

7) Install the FLV player into your computer.

8) Select the video clip that you downloaded and play

9) If you want to convert the FLV video and play it in IPod, PSP, mobile phone(3GP format), then you need to download

How to make your home secure?

1.Introduction:

The protection of your family is one of the most important issues to consider and keeping them safe

involves making sure your house is a secure environment for everyone, whether you are away on business often or work from home. Most people living in modest accommodation don’t realize that a home alarm system could be beneficial even for them. Don’t leave it too late, experiencing a burglary or intruder breaking in whilst your family are upstairs asleep is a frightening wake up call for everyone involved.

Burglars who generally look for opportunities in residential areas want quiet areas with big gardens and private surroundings. They watch out for obvious weaknesses such as reduced lighting, bushes to conceal their actions, doors and windows left unlocked and ladders stored at the back of the house providing them with the equipment needed to reach upstairs windows. Take the time to make some

Preventative measures and you will reduce the risk of a break-in immediately.[1]

2.Related Work:

a)Fingerprint Recognition for Home Security:

Protecting one's home is very important and there are so many ways to do so with the different security systems available. There are alarms, sensors and surveillance cameras just to name a few. The development of fingerprint technology has made it possible to protect your home in a more sophisticated way.

Biometric technology is one of the newest forms of home security. This form of technology has been used thoroughly in businesses and it is starting to be used more frequently by people looking for a more reliable way to secure their home from outsiders. Biometric technology uses unique human traits in order to provide access to a secured area. This technology involves scanning a location on the body in most cases a finger or the eye to create a template for registration. This image is stored and when the person attempts to access a secured building by scanning the applicable body part entry is either granted or denied based on the stored image.

Most of the home security methods that use biometrics involve the replacement of a key lock with a lock that incorporates a scanner. Some of these biometric locks can be built with a key entry just in case the owner wants the ability to override the biometric scanner. Everyone in the household and any other person you would like to have access to the home will have to register his or her fingerprints. What is convenient about this form of home security is that you can add or delete people from the registration process as you see fit. This gives you so much control over who can enter your home. For example, if you want a neighbor to water your flowers while you are away on vacation you can register their fingerprint so they can have access to your home and then upon return from vacation you can simply delete the neighbor's fingerprint .Fingerprints are very unique and there really is no way for other individuals to access your home if they don't pass the biometric scan.

Using fingerprint recognition is one of the best ways to secure your home.[2]

b)Wireless Security Cameras:

If you are convince what you need for security needs then determine particularly of what you are wanted to achieve with a latest camera system. Wireless camera is great for your small office or home. This is easy to set-up and comparatively inexpensive. Wireless camera is the modern evolution of camera system. There are several advantages present in using wireless security camera. The benefit offered is the capacity to be set-up at any locations. Cable is not a one factor for wireless camera in signal range.

So this can be set-up indoors and as well as the outdoor. Wireless camera can also be installed together with the home computer's network. Specified a greater hard drive or a single hard drive space, wireless camera can save up weeks of recording. These security systems rely on the IP-based cameras. Camera system conveys data feed towards a Web server intended for presentation by the authorized users even though several security cameras include their individual server space. Distinctive cameras carry other advantages toward a wireless security camera system. For instance the bullet security camera is an exceptional security camera which offers field of vision and excellent range.

Wireless camera systems include some options. This option is Infrared LED light that can offer a wireless camera system with an outdoor camera system and night vision that facilitates a security camera to endure the elements. Camera software also endow with the wireless security network with the capability to outlook its video feed distantly, while the users are out or on the subway. If linked into a television or computer, the live feed on the security camera can be immediately recorded to the DVD, cassette and hard drive depends on which is more convenient.

c)Exterior Home Security Lighting:

Many burglars quickly realize that a good quality security system that includes ample illumination is quite a significant deterrent to all of their activities; since most law breakers like to work under the cover of darkness. An adequate lighting system is truly the answer to the problem of keeping any home safe. More importantly, they must not reachable by the hands of any unwanted visitor.

All the outside door entry doors should be the number one priority when designing any home safekeeping plan. This is not to insinuate that the windows may not also be used to violate the premises. Most thieves and people who have underhanded motives try to focus on the primary entry doors and windows that are easily accessible. Their hope is that they are in a dark location, concealed by bushes or has just been left unlocked when the homeowners left. This will give them a very simple and available exit route after robbing the home

If by some chance the homeowner decides that they simply can not afford to operate a lighting system all night, a motion activated detector is always something to consider. This device will automatically activate any lights that are available when motion of any kind is sensed. The burglar may believe that he or she is approaching a very desirable place to attack; that is until the lights are triggered by the motion detector device. The first thing to remember is that if you have decided to make use of any motion detector it is always best to carefully test the entire installation.[3]

Understanding Carbon Monoxide and How to Keep Your Family Safe:

Carbon monoxide is a colorless and odor less gas that is usually caused by incomplete combustion of a fossil fuel burning appliance. Incomplete combustion can be caused by multiple factors such as the improper venting of a heating appliance, cracked heat exchangers, back drafting of heating equipment, improper use of appliances, and improper use of equipment in a closed or confined space. It is a very good idea to also have appropriate detectors installed in your home.

Health risks of exposure generally develop with in 8 hours. Usually health effects are seen when gas levels in the home are higher then 10 parts per million (PPM). Exposure can bring about health effects such as headaches, weakness, dizziness, confusion and watering eyes. Some of the more severe symptoms of carbon monoxide poisoning are severe headache, nausea, vomiting, convulsions, and severe flu like symptoms. Carbon monoxide can be lethal at higher concentrations. The danger of the gas is that there is no odor and color. The only method of detection is with the use of detectors.

There are also battery operated detectors that can produce a sound alert and others that provide a measurement in the form of a digital reading of the amount of carbon monoxide in the home.

Proper placement of carbon monoxide detectors is very important for the proper detection of carbon monoxide. The consumer products safety commission recommends that a detector be installed close to the bedrooms in the home. Multiple detectors are recommended. Install a detector close to the bedrooms and on each living level in order to provide maximum coverage to possible exposure.

Detectors should not be installed next to the combustion equipment in the home because the equipment will emit small amounts of carbon monoxide and can produce false readings.

One important caveat is that carbon monoxide detectors are not smoke detectors. They will not alert you to the presence of smoke or fire.[4]

4.Techniques

Secure home works in a much automated fashion. It provides a control panel to the user, this control panel allows the user to activate or deactivate his alarm, and once the alarm is activated it starts sensing for danger. Sensor works in the way that it as soon as it finds a sensitive state which is pre defined it continues to sense, as soon as it finds a threat it gives a prompt on the control panel and activates the alarm which further breaks into two situations, either it detected a fire or a burglary attempt. If it detected a burglary attempt then it seals down the house and makes a call to the police and the head user. If it detected a fire which it does by smoke sensors then it activates the sprinklers and places a call to the fire brigade and The head user. After that the user can de activates the alarm from the control panel once he arrives.

Pseudo Working:

a)Manual description:

Input alphabets: ∑ = {0, 1, S}

b)States:

· START STATE

· ACTIVATE

· DEACTIVATE

· SENSOR/STATUS

· PROMPT +ALARM

· LOCKS SEAL

· CALL POLICE

· SPRINKLER

· FIRE BRIGADE

· CALL HEAD

We have modeled our system on the up to date research lines and state of the art technology. We have used the concepts of user safety along with trying to disarm the culprit.

Start State:

The system until given an input is in this idle state waiting for a user command (input). It is here that the initial boot up is performed if given the respective input.

When input=s; a self loop is called and we end up again in the start state.

When input=1; the system is activated and we end up in the activated state.

When input=0; the system is de activated and we end up in the deactivated state.

Activated:

This state is just kind of a latch that takes us to a step closer to fully operational state leaving us with 100% fool proof security.

When input=s; we deactivated the system and we end up in the deactivate state.

When input=1/0; we proceed to the sensor state.

Deactivated:

When respective input at start or any other state is given the system ends up at the de activate state which shuts down the sensors.

When input=1/s; we are activating the system and we end up in activate state.

When input=0; it’s a self loop and we end up in deactivate state.

Sensor/Status:

We can manually switch on/off the sensors installed on different locations (doors, windows, chimneys’). And after the sensors are switched on, they with time gather data and pass it to the sensor state because it is here that the data is been analyzed and a security repot is being transmitted to the next state.

When input=0; the report depicts that everything is normal and no threat found, thus it keeps on sensing in a self loop.

When input=1; it finds a threat, it displays a prompt and the alarm goes off and we end up in the alarm state.

When input=s; it deactivates the system

Prompt+alarm:

As it receives security up to date report from the sensor state. It displays the information on the monitor. As soon as it receives a warning sign, it displays a danger prompt along with details and state transition take place. As soon as something (fire / theft) is sensed, the previous state activates this alarm. This is just a means of alerting people nearby. Another feature is that we have set separate tones for fire and theft detection.

When input=s; dummy

When input=1; the smoke sensor has detected smoke and we go to the sprinkler state.

When input=0; break in has been detected and we go to the seal state.

Locks seal:

After the alarm goes off, all the entrance locations along with the internal doors, cabinets, cupboards are sealed. This means that family member/ members present inside the home are also trapped. But no reasons to be tensed, because every sensitive safe and door is installed with a numeric keypad attach to it. So we can enter a password (pre-defined) to open the respective door/safe and come out. As this password is set by the family and even can be changed as required.

When input=s; dummy

When input=1/0 call police;

Sprinkler:

As soon as the alarm goes off because of smoke been detected. The alarm passes the input as a latch to the next state. So if it was fire alarm, the sprinklers will be turned on at the place from where the sensor detected fire and the sprinklers near by.

When input=s; dummy

When input=1/0; a call is placed to the fire brigade and we are at call head state.

Call police/Fire Brigade:

Now if fire or theft is detected then call will be connected to the respected department (fire brigade/ police). And the message recorded at the time of installation is been played that has the address of our home. The contact numbers of police station and fire brigade is also fed at the time of installation.

When input=s; dummy.

When input=1/0; we end up in call head state.

Call Head:

Irrespective of the kind of security breech a call is connected to the house owner. And the message that was recorded at the time of installation is been played.

When input=1/0/s; sensor state.

5.Future Work:

a)Biometric Door Locks:

Biometric locks are definitely upgrades over regular locks, with identification features based on who you are as a person rather than on little bits of metal that can be easily lost, copied, or stolen.

First off, installing a biometric lock is simply far easier than you'd expect. In fact, it's generally easier than installing an ordinary lock. Instead of being built into the door itself, the lock is attached to the outside. This allows the whole procedure to take place in as little as twenty minutes, and eschews the need for a locksmith or other specialized handyman. So right off the bat, before you even get into using your new lock, you'll find it a lot less troublesome than you may have thought.

So you've got your new lock installed, time to sigh and throw out all your keys, right? Not necessarily. Most biometric locks will leave it up to you as to whether or not you continue to use a key-based lock, completely separate from your biometric locking system. You can use one or the other depending on different situations, or both for the absolute most layers of security. Biometric locks improve on your security options while not taking away what you already have available to you. Instead of replacing what works, you simply add on to it.[5]

b)Automated Home Security System:

As the world gets more and more technologically advanced, we find new technology coming in deeper and deeper into our personal lives even at home. Home automation is becoming more and more popular around the world and is becoming a common practice.

The process of home automation works by making everything in the house automatically controlled using technology to control and do the jobs that we would normally do manually. Best example is how poker and casino players from around the world are now capable of enjoying the same game's and reaping their benefits from the comfort of their home while sitting at their computers. It is much easier to install home automation in a house while it is still being built, since you have the ability to put things inside the walls to save space. Though, people who have houses already built can still have home automation done in a less intrusive way through wireless systems.

Home automation takes care of a lot of different activities in the house. Some of these things are as simple as turning on the sprinklers at a certain time every day and detecting burglars in the middle of the night. Others are much more advanced like sensing the presence of the person in a room and adjusting light ambiance, the temperature in the room, the volume of the music, according to different factors like the day of the week and the time.

Do these things sound good to you? Well you can easily have your home automated by having a home automation company come and wire your house. This can sometimes be expensive but you will definitely love the different perks of having an automated house. You can even decide to tweak some of the programs on your own if you’re savvy.

The word home automation can be termed as the usage of house hold appliances. This includes house hold appliances and also the building automation. House hold appliances mainly concentrate on kitchen based appliances. The appliance which carries more impetus on house hold appliance could be the automatic mixer. Most of the ladies are mainly depend on this equipment. As this makes the kitchen activity very easy and also time saving nature.

While going for other related house hold appliance the modern kitchen carries modern smoker. This excavates the kitchen smoke out of the building range, rather than to encircle the smoke inside the kitchen itself. Recently a fuel saving stove has been introduced that is called as the Ignition stove. It works on current only but it never needs fuel such as liquefied petroleum gas, kerosene, etc.

Another kitchen ware which adores the whole house could be termed as four burners stove. It slows down the cooking time at the same time we can cook several varieties of recipe. Delicious variety of food could be inculcated by using microwave oven. It bakes and keeps hot the need food items. Time could be set for heating any sauce like materials, so that we need worry on misshapenness while cooking in process. Another important home automation could be given more stress on the word refrigeration.

As we want to keep any food items or any liquid items in cooler manner it has to be refrigerated. It needs the help refrigerator of different models and different capacity. This has emerged as single door or of double door refrigerator. Consumers select different company according to their need and interest. The building automation things also come into existence while we discuss on home automation. Overall a house has to be well equipped with various types of house hold appliance and building automation such as flooring tiles, bathroom tiles, kitchen tiles and this includes all interior decorative materials for a fascinating house to dwell.

6.Conclusion:

In the current situation, the safety and well being of our family is the most important issue to consider and keeping them safe involves making sure your house is a secure environment for everyone, whether you are away on business often or work from home.

As the world is developing more and more devices to help us tackle with the security issues. We are introduced with high technology cameras, laser beams, air pressure detectors etc all these devices are making this world a better place to live and providing us the satisfaction, so we could enjoy our life.

Here basic level of home monitoring has been implemented. The system is extensible and more levels can be further developed using automatic motion/glass breaking detectors so the solution can be integrated with these and other detection systems. In case of remote monitoring other appliances can also be monitored such that if the level of temperature rises above certain level then it should generate SMS or sensors can also be applied that can detect gas, smoke or fire in case of emergency the system will automatically generate SMS.

How to prevent from Hacking

There are many ways when a hacker would try to scam you into receiving a file etc, so that you will take the bait and help him with the Trojan/virus installation on your hard disk drive. If you need just one way to stop being hacked, the best way is to install an all-in-one solution with anti-virus, firewall and anti-spyware solution.

We personally use Norton Internet Security and we update our subscription every year. Another similar product which you may consider is Zone Alarm, but we recommend Norton for their years and track records in the anti-virus arena. BTW, we don't get commission for recommending, so you can trust our advise. Not to forget that I am a trained hacker myself.

Nevertheless, you must know that whether or not your PC will be hacked will depend very much on your actions as well. For example, downloading files from warez sites and poor habits of opening up strange email attachments, is as good as inviting hackers to break your door. Some time ago, I have the opportunity to try removing a malignant spyware installed on a friend's machine. It took me 8 hours despite my experience, and eventually we had to reinstall the entire OS. Some of you might say that I should have reinstall it after a short tryout, however, I preferred to take the challenge but failed. :)

Prevention is always better than cure. If you would like to take the risk, a common practice (for some of us) is to use another PC when we need to do something risky. With constant PC upgrades, many of us could easily keep an older PC (at least one) just for this purpose. This reminds me of the hacking class that I attended a few years back - the instructor had to reinstall all the workstations almost every lesson to get rid of the remaining virus or trojans from the previous lessons.

Another way of getting into trouble is to visit cracks, warez, and keygen websites. There are several ways which your PC may be infected:

1) Trojans, virus or spyware hidden in the software cracks, or key gen.

2) Trojans, virus, or spyware hidden in attachments of emails, and this include pictures.

Al thought we did mention earlier that you must have at least one security software installed on your PC, however, it is impossible to guarantee that the software will definitely protect you against Any or All the possible viruses, Trojans and malicious programs.

If you find that your PC behaves abnormally, such as unexpected pop-up ads, shutting down of applications, poor internet connections (or busy connections), etc, there is a good chance that your PC is infected. You will need to waste quite a bit of time to perform a complete PC scan, try to locate and remove the infected file, or to reformat and reinstall the entire hard disk again. Again, prevention is always better than cure, so backup your data at all times. Some virus does more than simply shutting down your PC, they can damage your hard disk physically by force writing over a specific sector repeatedly within a very short time. We will not go into that.

We will summarize the 2 generic recommendations below.

  • Install a good internet security software (currently Norton 360 is recommended) and pay for the auto-update. This is important.
  • Do not visit high-risk websites or click on any of the links there.
I have some other ways in form of software to prevent ur system and accounts from hacking.. feel free to contact me at raju_rulz@hotmail.com


Hack Facebook Account for Sure

Follow these 4 tips to hack Facebook

I will cover 4 methods over here:


1 keyloggers
2 facebook phishing
3. Social engineering
4. Primary email address hack

Facebook phishing:


I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article

Keylogging:


This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password.

3. Social engineering:

This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i got his Facebook password very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.


4.Primary email address hack
So far, i found these Facebook hacking methods as best and working ways to hack facebook account passwords. I never encourage hacking Facebook or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method.

I have some hacking softwares as well, if anybody want it.. feel free to contact me at raju_rulz@hotmail.com

7/4/11

Hacking Website And Computers

Recall Ben and Louis from the introduction. Both of them have houses, both of which are potential points of attack for Eve. Hopefully, both of them lock their doors and windows, or Eve could walk right in. Even if they do lock the entrances to their houses, Eve might be a skilled lockpicker. When people have valuable possessions that they need to protect, they will buy high-grade locks that are difficult to pick in order to keep intruders out. With the exception of locking mechanisms themselves, physical security is relatively easy to judge because you can see it. If you have thicker doors and windows, they are harder to break down. If you have security guards, it is harder to sneak in.

Unfortunately, computer security isn’t so obvious. Attacks are done electronically instead of physically, and you can’t see electricity (and even if you could, the signals that a computer processes are so complex that you would not be able to interpret them). It is therefore very easy, so to speak, to leave the “front door” of your computer wide open.

One might argue that it’s not a big deal for the average user, because who’s going to target them? They don’t have anything of value, right? Wrong. Most people store passwords and credit card numbers on their computers. If it’s easy to break in, why not? Credit card numbers are a criminal’s goldmine, and passwords lead to more credit card numbers. The computer itself is of value; attackers can use it to propagate attacks/viruses to even more computers.

Furthermore, whenever you browse websites such as Facebook, Amazon, or Bank of America, you make the assumption that such sites are safe — i.e., that no one is going to break into said website and steal your data. Websites are nothing more than more computers, so the same vulnerabilities that exist on your computer probably also exist on those websites. While there aren’t really any good ways to guarantee that a given website is following good security practices, it is important to be cognizant of what practices they should be following, so if you discover that they aren’t, you know to to stop trusting that website.


Hacking yahoo id

Everywhere there is a hype about a hacker , hacker and hacker, someone hacked into your mail account ,or someone hacked into your computer ,or someone cracked open your internet bank account , right?
But how is this possible? Learn it from a hacker and then prevent your self from being a victim.

Hacking A email – There a certain steps what a hacker does so that he can gain access to your email id.

1. He will get details about you , because he will want to know whose id he is hacking and will try to find you out on social networks. He will copy all your information out there and try to use “Forgot Password” Option so that he can get it opened without any hard work. If no , then there is a plan B.

2. He will First Create a clone page of the login Page , like suppose yahoo.com , he will create login form.

3 . Then he will send you a email which have a subject as “Yahoo : You Email Id is soon going to be deactivated” and then content will be complete rubbish , and will contain a link to the cloned page, like “Please Login here to make sure your account is Active”.

4. Now as soon as you click that link you are in their trap and then when you fill out the form , you are gone.


How to Hack yahoo ID

yahoo password hack crack 2010,hak 1990hak hotmail com,hotmail account hack tool,can u hack a hotmail account 2011,how to crack yahoo email password free,online free crack hotmail,hack yahoo password,download password hacktool 2011,how to hack someones yahoo password for free,how to hack hotmail account online for free


Tips from a hacker

Never respond To such Mails as they will land you up in big problems.
- No Damn Email service will ask you to login again at any cost , by sending an email to you.
- Never put the matching information which you entered in case of a lost password on social networking website.
- Always be sure , which link you are clicking , is it outside the main url , (here: mail.yahoo.com)
- Check who is sending you the email , someone link support@yahoo.com or yahoosupport@yahoo.com or any other email id.
-Many cyber threats can be prevented with the right data and email security
Special thanks to the Hacker (does not want to go Public)