Wednesday, February 22, 2012

How to Set Up Email Filters In Gmail and Hotmail

Setting up email filters or organizing your emails into folders is an efficient way to manage your emails. To help you organizing your incoming email messages, Windows Live Hotmail can put them in specified folders automatically.You might want to know how to set up email filters to automatically sort your email into folders for better management.

For example, if you want to have a Facebook filter to separate all your notifications emails from your everyday emails. You could also do this for newsletters that you are subscribed to, emails from family members, or emails related to work. As you can see, there are a lot of advantages for filtering your emails.In this blog, I am going to show you how to set up email filters in Gmail and Hotmail .

Creating Filters in Gmail:

The first thing to point out is that Gmail does not use the tradition “˜folder’ structure. Gmail uses “˜labels’, but they are pretty much the same thing, it just has a different name.If you have existing filter then it will be displayed.
gmail filter settings

Gmail, Google’s web-based email, is one of the most popular email programs on the Internet. The first thing to point out is that Gmail does not use the tradition “˜folder’ structure. Gmail uses ‘labels’. For create the filter in Gmail follow the given steps:

  •  Logon your Gmail account, to setup an email filter, click on settings which are in the top right corner, then click on Filters.
  • To create a filter, click on Create a new filter. Fill the all criteria like… 
       From: Who the email is from. This can be an email address or a phrase in the email address such as   makeuseof. If you include makeuseof in the From box, all emails that are from a MakeUseOf email address will be applied to the filter.

To: You may have email forwarding or POP access set up on your Gmail account so all your work emails get sent to your personal Gmail account. Therefore, if you want to separate your work emails from personal emails, enter your work email address in the To box. All emails you receive that are sent to the email address you specify, the filter will apply.

Subject: If you enter a phrase in the Subject, any emails with that phrase in the subject would be applied.

Has the words: If the contents of the email has the words you specify, the filter will apply.

Doesn’t have: All emails that do not contain the following phrase you specify, the filter will apply.

Has attachment: All emails with a file attached.
Gmail filter criteria

  • Click on the “Test Search” button after entering your filter information. You will want to verify that the emails you were trying to filter show up in the test search. If they do not, you will need to tweak the filter options and perform another test search. After confirming that the emails are filtering properly, click on the “Next Step” button.
 Suppose if you want filter your Facebook email and also apply to the Facebook label .If you don’t  have a Facebook label, make sure you create it when you select the label in the drop down box. Make sure Apply the label is also checked.
Gmail create filter 

Create An Email Filter In Hotmail:

  • Select Options | More options... (or just Options in Windows Live Hotmail classic) from the toolbar.
  • Follow the Automatically sort e-mail into folders link under Customize your mail.
  • Click on New filter button.
  • Select the desired filtering criterion under Which messages are you looking for?.
  • Choose the folder to receive all mail matching your criterion under Where do you want to put these messages?.
  • Click Save. 
Smiley face

Wednesday, February 15, 2012

Great features in Internet Explorer 9

Internet Explorer 9 is series of graphical web browsers developed by Microsoft .IE (Internet explorer) has been losing potential users for a number of years now. In an effort to keep their users they have offered a new internet explorer version 9.IE9 give everything that users want and need in a web browser.
Internet Explorer 9 should be the go-to browser for organizations concerned about protecting computers  from malicious downloads, according to a new study from NSS Labs: Microsoft's browser trounced rivals Chrome, Firefox, and Safari in the security company's more recent malware-blocking tests, a significant win considering that traditional malware remains among the most prevalent threats to users.
Internet Explorer 9 provides the best features for Windows. Here are the top features which is providing by windows internet explorer 9.
It's even faster:
Hardware-accelerated text, video, and graphics speed up performance and make websites perform like programs that are installed on your computer.
Clear appearance:
Internet Explorer 9 gives internet users a cleaner web browsing experience. Tabs, buttons and other items are all moved into one row instead of cluttered all over the screen.
Tracking Protection:
Any other area where IE has taken the privacy-related issue of tracking protection. Most sites request content from third parties, and often these are ad networks that track users' web surfing habits and build up profiles by combining data from many sites that use the same third party.

The Ability to Pin Tabs 

pinning tab
Tab pinning
IE9 offered a tab pinning option. This means if you have a tab that you can visit a lot or need to keep referencing, you can pin it so it doesn’t move down the list. Also included in the tab pinning option is the ability to pull up a row of all tabs so you can see each window and tab in real time and flip back and forth to it.

Unified Address Bar

IE9 that makes it address bar unified – it means address bar is unified box for navigating the site or start a search. When you type the words, it gives you suggestions from your history and bing with inline images.

Redesigned New Tab Page

IE9 giving the facility of new tab page which  is totally redesigned to give a quick access to the sites you visit often and also display that site’s icon, title and a bar to indicate the relevant frequency of visits. You can also reopen the closed tabs or your last browsing session or start a new Private browsing session.

Improved Add-on Management

Add-on management  offer the  Add-on Performance Adviser which gives you an idea about which add-on is slowing down your browsers and allows you to disable or remove it permanently to ensure that your browser always loads up fast and runs fast.

Better Privacy Features

The new tracking protection feature enables you to limit the sites that can track your information when you are online. It means there is a built-in blacklist option than helps you choose certain websites and block them.

HTML5 Support

Google Chrome has supported HTML5 location capabilities since version 5 came out last spring, and Firefox and Opera also support this technology. Finally, Internet Explorer 9 uses the services and supports HTML5. This will allow you to open HTML5 designed websites, video and audio and other HTML5 goodies. IE9 also supports SVG and Canvas graphics.

New Download Manager

tab management
Tab management
Internet explorer 9 ,allows you to view your files that are downloading through your browser. You will find the option “View Downloads” in the options menu at the end of top toolbar. It also notifies when a downloaded file is malicious or contains viruses. It also helps you to pause any of the download and resume it later.

Enhanced Tab Management

Tab Management has been improved tremendously in IE9 as well and now it implements the feature of tab tearing similar to Opera, Chrome, Safari and Firefox. You can easily move tabs between windows by tearing them from one window to another.

Monday, February 13, 2012

Safety Tips for Online Banking

Online banking facility is more convenient for any user to access their account. The Internet is a public network. Therefore, it is important to learn how to safeguard your banking information, credit card numbers, Social Security Number, password and other personal data. Hackers can any time get your username and password; they can clean out your data.


Beware of scams like phishing, where thieves use emails or fake websites to impersonate your bank and obtain your username and password.
Hackers out there in the world know that you will go online to access your emails or search for various things like favorite music numbers, online databases, free online virus scanner, online virus removal support service, and free virus removal software among other things. Considering that you need help understanding about a virus, its effects, and removal and you can take help virus removal guide from any technical support services.
Install a firewall and run antivirus software on your computer to prevent someone from stealing personal information or recording your keystrokes.


Never give your account information, username or password to others, especially in an email. Do not click on links embedded in suspicious emails. Never open emails or email attachments from strangers as they may contain malicious viruses that once executed can do massive harm to your computer.

Password Tips

Create passwords that are difficult for others to guess and change them often. Use symbols or both letters and numbers.


Avoid using shared computers, such as those in libraries or workplaces, to access your account. Always log off or close your browser when you are finished with your transactions.


Make sure your bank transactions are encrypted. Look for the lock symbol on your web browser or web addresses that begin with "https://" where the "s" stands for "secured."

Time Frame

If you notice unusual transactions or money missing from your account, notify your bank immediately. While federal law does protect consumers from fraud, you must discover it within 60 days and report it within two business days.

General security
Over your personal computer such as virus protection and physical access controls should be used and updated regularly. Contact your hardware and software suppliers or Internet service provider to ensure you have the latest in security updates.

Sunday, February 12, 2012

Types of Computer Attacks

Now a day’s without security measures and controls in place, your data might be subjected to an attack. There are main types of computer attacks are passive attacks and active attacks.
In case of passive attacks, data transaction on the computer is monitored and later utilized for malicious interests and in case of active attacks, the information is altered with intent to corrupt or destroy the data or the network itself.
Active Types of Computer Attacks
Most common and famous computer attacks are viruses which attempts to install itself on a user's system and to spread directly to other files on that system with the aim that these infected files will be transferred to another machine.
A virus relies on users to spread by sharing infected files either directly or via email. Once launched, a virus is completely independent of its creator.
A worm is very similar to a virus. The main difference between virus and worm is that worms infect the system without any kind of assistance from the user.  It typically scans other computers for vulnerabilities which it is designed to exploit. When such a machine is identified, the worm will attack that machine, copying over its files and installing itself, so that the process can continue.
A Trojan virus is a dangerous program that masquerades as a legitimate program and thus bypasses your security program’s reach. It mostly comes embedded into freeware like weather forecast software and tray clocks etc.
Root Kit: 

Hackers gain access into the system with the use of root kit drivers and take full charge of the computer. A root kit is a piece of software that once installed on a victim's machine opens up a port to allow a hacker to communicate with it and take full control of the system. Root kits are also known as back doors. Some root kits give a hacker even more control of a machine than a victim may have themselves.
Often malware is a dangerous hybrid that can combine the features of the different classifications described above. The SubSeven root kit is delivered and classified as a trojan.
Passive Types of Computer Attacks
In this case, hackers will sneakily listen to the conversation happening between two computers on the network. When an attacker is eavesdropping on your communications, it is referred to as sniffing or snooping. The ability of an eavesdropper to monitor the network is generally the biggest security problem that administrators face in an enterprise. Without strong encryption services that are based on cryptography, your data can be read by others as it traverses the network. 
Data Modification:
When a hacker has read your data, then next step is to change it. And hackers can modify the data without the knowledge of the sender or receiver. Even if you do not require confidentiality for all communications, you do not want any of your messages to be modified in transit. For example, if you are exchanging purchase requisitions, you do not want the items, amounts, or billing information to be modified. 
Identity Spoofing (IP Address Spoofing):
Most networks and operating systems use the IP address of a computer to identify a valid entity. In certain cases, it is possible for an IP address to be falsely assumed— identity spoofing. An attacker might also use special programs to construct IP packets that appear to originate from valid addresses inside the corporate intranet.
After gaining access to the network with a valid IP address, the attacker can modify, reroute, or delete your data. The attacker can also conduct other types of attacks, as described in the following sections. 
Password-Based Attacks:
Password based attacks are common types of attacks. Here the hackers can easily access to the computer and network resources by gaining password control. And the attackers can easily change server and network configuration and can delete the data .data can also be passed onto different networks.
Denial-of-Service Attack:
This type of computer crime makes your system and network useless and the attacker may not necessarily gain access to the network, but will ensure that the user is not able to use the system.
After gaining access to your network, the attacker can do any computer crime like…
Send invalid data to applications or network services
Make computer or the entire network with traffic until a shutdown occurs because of the overload.
Block traffic, which result in a loss of access to network resources by authorized users.
hacked computer

Man-in-the-Middle Attack:
As the name indicates, a man-in-the-middle attack occurs when someone between you and the person with whom you are communicating is actively monitoring, capturing, and controlling your communication transparently. For example, the attacker can re-route a data exchange. When computers are communicating at low levels of the network layer, the computers might not be able to determine with whom they are exchanging data. 
Compromised-Key Attack:
A key is basically used to store sensitive data, a secret code or number. Hackers can easily attack on the key and can access the key information and the secure data. After an attacker obtains a key, that key is referred to as a compromised key. 
Sniffer Attack:
A sniffer is an application or device that can read, monitor, and capture network data exchanges and read network packets. If the packets are not encrypted, a sniffer provides a full view of the data inside the packet. Even encapsulated (tunneled) packets can be broken open and read unless they are encrypted and the attacker does not have access to the key.
Using a sniffer, an attacker can analyze your network and gain information to eventually cause your network to crash or to become corrupted. And read your communication 
Application-Layer Attack:
An application-layer attack targets application servers by deliberately causing a fault in a server's operating system or applications. This results in the attacker gaining the ability to bypass normal access controls. The attacker takes advantage of this situation, gaining control of your application, system, or network, and read, add delete or modify your data or operating system.

Note: If you are getting virus problem from your computer  then you can reach online technical support service desk of V tech-squad at their Toll Free No +1-877-452-9201 .

Friday, February 10, 2012

How to Manually Remove a Virus from Vista

When we cannot remove virus through antivirus program, that time we can follow the manual removing process in Microsoft vista without online technical support. For removing the virus you should know the name of the virus and the various components associated with it. You can identify the virus name and components by running your antivirus software or you can search in internet search engine typing the virus symptoms.

 End Malicious Processes

Step1:Press "Ctrl," "Alt" and "Delete."
Step2:Click on "Task Manager."
Step3:Click on the "Processes" tab.
Step4:Scroll the list of processes and find any malicious processes. And Right click on any malicious processes and select "End Process."

Remove Malicious Files

Step1:Click on "Start."->Click on "Search."
Step3:Search your files and folders for any malicious files and delete them. Often, malicious files can be found in your temporary internet files folder.

Remove Malicious Registry Keys

 Step1:Click on "Start."-> Click on "Run."

Step2:Type "regedit" into the empty box and then click "OK."
Step3:Search the folders in the left pane and find any malicious registry keys.
Remove any malicious registry keys by right-clicking on the file and selecting "Modify," then "Delete."