www.puzzlehacker.com

In 2011 I will be blogging more taking inspiration from wordpress.com. Blogging more often can bring in more visitors and provide great platform to interact.At puzzlehacker.wordpress.com I will try to post more often. Do visit and have a healthy conversation.

There is a saying among writers: to write more, write more. The hardest part of blogging isn't the tools – it's what goes on between your ears. Many people start blogs with excitement, but lose courage when facing the blank post page, or chicken out before hitting publish. Here at WordPress.com, we know. And we're here to help. Announcing DailyPost.WordPress.com Starting today, you can go to dailypost.wordpress.com for inspiration, encouragement … Read More

via WordPress.com News

Advertisements

I was checking around for ways to republish blog posts I liked, and I stumbled upon this awesome post. I would be using this option from wordpress quite often from now on, so that I can post frequently without having to write a whole new post on the subject.Thank you WordPress!

We All Like to Reblog Have you ever come across a blog post that you enjoyed so much you wanted to easily share it with the readers of your own blog? Sure, you can copy and paste the link and perhaps even a snippet of text with your own comments, but overall it's not a particularly enjoyable experience. We wanted to change this and make sharing other posts with your readers as easy as posting to your blog. Today we're introducing a new like and reblog feature enabled … Read More

via WordPress.com News

Puzzlehacker branching tree though launched almost 2 years ago, the interest in it is not waning. So I have decided to add a few more pages to it and take it a bit further.

I am also planning to expand the puzzlehacker family a bit, by adding new groups of puzzles. If anyone have ideas on new puzzles do leave a comment below.

To solve the original puzzle visit puzzlehacker

Circumventor proxies are a good way for uncensored browsing. These proxy lists are updated on a weekly basis and delivered to my inbox. I compile these lists and publish on a monthly basis on my blog techpiper.com

Circumventor Proxies January 2010 series

Circumventor Proxies December series

Circumventor proxies, November series

Proxies to browse uncensored, october series

Great proxies for September,browse without being blocked

Avatar vs Pocahontas

Avatar vs Pocahontas

Tags:

Now a days as more and more people report falling prey to phishing scams, Google blog has come up with some safety guidelines, which I would like to share with my readers.

What is phishing?

Someone poses as someone else in an effort to fool you into sharing personal or other sensitive information with them, this is a simple defenition of phishing.

Phishers can masquerade as just about anyone, including banks, email and application providers, online merchants, online payment services, and even governments. And while some of these attacks are crude and easy to spot, many of them are sophisticated and well constructed. That fake email from “your bank” can look very real; the bogus “login page” you’re redirected to can seem completely legitimate.

Guidelines to escape from Phishing attacks

1.Be careful about responding to emails that ask you for sensitive information like social security number, bank passwords,account numbers.Legitimate businesses will never ask for this information via email.

2.Go to the site yourself, rather than clicking on links in suspicious emails.Open a new browser window and go to the organization’s website as you normally would

3.Check for signs and verifications.If you’re on a site that’s asking for sensitive information,check the URL to make sure the page is actually part of the organization’s website, and not a fraudulent page on a different domain (such as mybankk.com or g00gle.com.)look for “https” at the beginning of the URL and the padlock icon in the browser. (In Firefox and Internet Explorer 6, the padlock appears in the bottom right-hand corner, while in Internet Explorer 7 the padlock appears on the right-hand side of the address bar.)

4.Avoid “fabulous offers” and “fantastic prizes” that you’ll sometimes come across on the web.

5.Use a browser that has a phishing filter. The latest versions of most browsers — including Firefox, Internet Explorer, and Opera — include phishing filters that can help you spot potential phishing attacks.

Tags:

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 93 other followers

Twitter

Error: Twitter did not respond. Please wait a few minutes and refresh this page.

Subscribe to RSS headline updates from:
Powered by FeedBurner

Software Blogs - BlogCatalog Blog Directory