Monday, January 17, 2011

Categorized Posts

In Blogger, We do not have the opportunity to post along with Categories. I Have done Categorization My self. And put together all the posts which have been posted on this blog according to the Categories. So that you can find easily the posts in Categories Wise.
So Have Look At these posts which are arranged Categorize Wise.


Entrepreneurs And Entrepreneurship



Technology And Reviews

These Were Some Small Numbers of posts on my blog which I have categorized In a sequence From Old To New, So You can Find it easily that which post is categorized where.
New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
Learn About MaskedBlogger - Here

Sunday, January 16, 2011

Shifted Again

Hi Readers Sorry To Disturb You Again And Again, I have encountered a problem in Blogger platform that's why it took me to decision to change the blog. But Now Again I have shifted to Shaun's  Blog.

New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
Learn About MaskedBlogger - Here

Saturday, January 15, 2011

Image Spam Trends (Part 2)

This Is Part 2 in a series of Image Spams Trends. You can check it's Part 1 - Here. The part 1 of a series describes the latest trend of Image spam but this post will be presenting new trend of image spam.

New Trends

Dynamic Zombie BotNets

Bot Nets Can be defined as
Networks of Compromised Computers which can be controlled by a single master.
The number of Nodes (also known as Zombie) of these botnets can run into millions and these machines make use of different software vulnerabilities to gain full access to the infected hosts and add it to their existing array of Zombies. Computer hackers had long been using botnets to launch DoS (Denial Of service) attacks and distribute network hacking attacks. Computer criminals had also been using botnets for money making schemes, such as stealing credit card information and spamming PPC (Pay Per Click) advertising companies. Seeing huge potential in botnets, spammers started financing hackers to make use of zombie machines. Hackers were able to offer services such as renting of botnets for a few minutes or hours and collections of E-Mail recipients (Spam Lists). The anti-virus industry noticed correlations between the spam industry and botnets. Not only were maleware writers allowing spammers to make use of their creations, but they were writing malicious code to specificially suit their needs. An unholy alliance had been created.

Most anti-spam vendors had added Bayesian filtering to their arsenal of spam blocking methods. The fight between spam and anti-spam looked like it was taking a positive turn. Thhis time the spam started looking more graphic in nature. Spammers began making use of images to bypass text-based content filtering, simply by no longer using any text content. By making use of Image spam, spammers were attacking the defenses of most antispam solutions, while the images displayed text messages to the end users, the antispam software was only able to see pixels. Some email anti spam software decided to go with OCR (Optical Character Recognition) to turn the images into text that the software could then use. However, spammers took their images to next level. In an approach usually applied to CAPTCHA (antispam solution used on web forms/forums), they started fuzzing (including noise and distortions) images to make it even harder for the machine to recognize text. Although it is possible for the machine to read this text, the process is very CPU intensive, especially when it is handling multitudes of images every few seconds.
New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
  • Learn About MaskedBlogger - Here

Friday, January 14, 2011

Importance Of Blog Designs

I think it goes without saying that I have some rather
strong opinions when it comes to the importance of
blog design. To understand my reasons for doing so, we
have to first look at the concept of BRAND, then at the
importance of layout.

First, a BRAND is not a logo. It’s not a company’s letter
head, nor is it a sign on a door. A company’s brand exists
in the minds of its staff, customers, suppliers, and
prospects. It’s the sum of the experiences one has with
a company, and the expectation that certain events or
experiences will be met.

A blog is a hugely powerful branding tool. If branding
is important to your company, care must be taken to ensure
your blog and your brand jive. Failing to do so can
seriously jeopardize your existing efforts. Why? Reading
and responding to blogs is a very personal experience.
It’s intimate in a way that reading a newspaper ad isn’t.
It’s an ongoing experience, re-inforced time and again.

So design is important from a brand perspective. But
its also important from a communication perspective.
Non-verbal communications play a massive part of face
to face or voice to voice conversations. In print or on the
web, its up to a layout designer to interpret and support a
writer’s intentions

This is hard enough to do in a magazine with a monthlong
lead time. Trying to accomplish the same thing on
an ever changing blog is tough. But not impossible. Your
investment with your business blog will be significant,
if not in cash then in time. Investing in a good design
shows the world that you are serious about your content
and serious about your business.
Design is ultimately about the way something works, not
about how it looks. The look is part of the package, but is
certainly not the whole. The great majority of your site’s
value will come from its content. With your specific goals
in mind, you need to determine the content hierarchy.
  • What will go at the top of the page? 
  • What gets secondary billing? 
  • What can you do expose archived content? 
  • What can you do to lead your reader to your desired outcome?
As a blog designer, a lot of my time is spent working out
these details. They’re never the same twice, as no two
sites have identical reasons for being.
There are a number of design options available to you.
These range from full custom design to pre-made templates
to some combination of the two.
Having a professional blog designed will run somewhere
between $1500 and $5000.
Don’t get me wrong. One can achieve blogging greatness
without spending a penny. In my experience, many business
bloggers start out with one of the hosted options.
After determining that blogging makes sense for them,
many make the move to a professionally designed site.
Frankly, this makes a lot of sense. Assuming you do one
simple thing right off the bat. Use your own domain
name. You don’t want to get stuck with a subdomain
from your blogging provider. It will make moving your
blog later a pain in the rear if you fail to do this now.
There are all kinds of other benefits to having your own
domain name. But this one alone is worth it.
New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
Learn About MaskedBlogger - Here

Monday, January 10, 2011

Shaun's Blog Best Of 2010

This Post is enclosing the popular articles which were posted in Year 2010 (September - December).
So You Can Check Them Below:-

For September:-
For October:-
For November:-
For December:-
I don't whether these are popular or not but I listed them according to the page views and post views as my blogger - stats showed me of each.

New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
Learn About MaskedBlogger - Here


Sunday, January 9, 2011

Blogging Popular Service On Internet

Blogging History

Blog is composed of two English words "Web" and "log". Which is a website, that keeps track of data in chronological order.
The Word "WebLog" was used first time ever by "John Barger" in 1997. Who owns the website based on blogs. After that "Peter Merholz" broke the word and had used like
We Blog, from there it was popular as "Blog".
A Website named Xanga, had only 100 Blogs in the Year 1998. But Later in 2005 they were about 20 Million. After that other number of blogging services were introduced. Blogs got popularity like this. Open Diary Blogs first time offered the Comments system on it. Which was very successful attempt.
Live Journal is another Free and Popular blogging service. That supports the function of Private Journal, Blogging, Discussion Boards, Social Network. 2 Billions communtities have been setup from 1999. Live Journal was the first which provided the function of posting through mobile phones.
In the begnning the blogs were only based on written materials but later came across the technology of embedding Video, Podcasts(audio services), Pictures etc. You can say Multimedia Blogging services. Now become a big part of Internet.

Why Do We Blog ?

No doubt, Blogging is considered the most popular and important service of Internet. Millions Of People use to write their own blogs and to read other people's blogs. And this activity is spreading all over the Internet World as polution in the World ;-) Oh sorry! Population in the World. Number of Blogging tools make it easier to do (blogging).
What Do Google Blogger (BlogSpot) Say?
Blog Is Your Personal Diary, Your Diary regarding your busy life, a place where you start to communicate, to make relations, a place where important news are obtained and your personal thoughts.
This is Human's nature to spread his Searches, Researches, Inventions etc. to others. He wants to see others thinking like him. These are the reasons which affect human to write blogs. Because blogs are the only places where he describes each and everything in description.
Many companies offer their clients to write their own blogs. Microsoft's many clients are writing regular blogs. This is the condition for other companies where the employees shares the important news, experiments, advices with their readers.
Blogs got too much popularity that now they are used for making money online. Google Adsense is the main source of making money online for every new and old blogger.

How To Make Blogs ?

There are 2 methods of making blogs. First method is to make it on any hosting platform like ( , etc.) Another way is to buy your own domain name and hosting service and install any blog script and start blogging on it. A Google blogger blog provider is the most popular among blogging services.

Blogs Search Engine

Technorati is the biggest blog's search engine while other search engines are also available. Technorati was awarded The Best Technical Award in 2006. Uptil now Technorati listings are of nearly 90million blogs. The following are the other blog search engines:-
blog.ask com

Number Of Existing Blog

Here I am mentioning some number of blogs exist in Internet World. If you know other than these, then feel free to share it in the comments below.
America, Canada, UK, Australia, Newzealand has approximately 36 million blogs. Asia has 25million blogs. Europe has approximately 3 million blogs. Pakistan and India has nearly 10 thousands blogs.
New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
Learn About MaskedBlogger - Here

Friday, January 7, 2011

Avoid Debit/Credit Frauds

When a credit/debit card transaction could not be completed online, the credit card company helpline was contacted. It was found that a prior phone-call notice was needed before any transactions. The notice was given on phone as required and the transactions was safely made online. It was a safety precaution to prevent unauthorized transactions.

In another case, a credit/debit card statement shocked someone when they noted that it had mentioned an expensive purchase that they had never made. On being contacted, their bank confirmed amount of a hefty amount a few days back.

The money was never recovered despite much effort and correspondence with the bank and the credit/debit card institution. Happenings of credit/debit card fraud may not be so frequent on any specific country but they are definitely on the rise.

There are many ways thieves use to steal your money through your credit/debit (ATM) cards. For instance, an ATM card skimming device resembling a part of ATM machine can record a video of typing your personal identification number (PIN). A duplicate keypad may be placed over the actual one, recording the sequence of keying in. A cyber crook can pick up vital information through phishing and use it for credit card fraud.

Thieves managed to have their your card jammed in the machine. A helpful stranger approaches and suggests that you try to key in your PIN but the card remains stuck. As you leave, the card is removed. He already has your PIN number.

An unscrupulous clerk swipes the card to record the vital information into a hidden device which allows them to make a duplicate of the card. Your PIN information is recorded at the same time.

The sales clerk uses a bogus PIN pad that copies your card and its information and issues a fake transactions receipt but does not actually pays cash for the purchase and uses the information to take out money from your account.

Observing a few safety precautions can protect you from credit/debit card fraud:
  • Protect your card, specially your PIN code. Do not share it with anyone. If you suspect someone has discovered your PIN code, change it immediately.
  • Memorize your PIN. Do  not write it on or near your credit/debit card.
  • Avoid using personal information such as your house phone or phone number or date of birth for you PIN number.
  • Use your credit/debit card at a familiar place such as a bank branch where the ATM is constantly under surveillance by the bank employees.
  • Before and during making a withdrawl, keep an eye on your surroundings. If you notice a suspicious activity, leave the place immediately.
  • Using an ATM during the late hours, choose one that is not isolated and is being used by other people.
  • Avoid using an ATM with strange protruding attachments. Report to police or the bank authority if you find a suspicious attachment.
  • Make it a habit to cover the movement of your fingers on the keypad when typing in your PIN number to avoid being recorded on a hidden camera or from intruders.
  • Closely review your online bank account every week so that you know if a fraudulent withdrawl is made.
  • Count the cash at the terminal and put it away safely in your pocket or handbag before you move away. Collect the receipt and your card. Never walk away from the ATM with cash in hand.
  • Report lost or stolen cards as soon as possible you no longer need them.
  • Tear up your receipts as soon as you no longer need them.
  • To protect your money, designate a separate credit/debit card for internet shopping to keep track of your online purchases. An ''https''  in a URL address signifies a safe website and you can confidently enter sensitive information. Sites displaying certification symbols such as VERISIGN Trust Seal can also be trusted. You can also ask your credit/debit card company about getting a virtual account number that's good for only one purchase from a specific vendor.
You must notify your bank and the credit/debit card institution as soon as you are aware of a fraud. Keep a detailed written record of the incident. You may be quizzed about the circumstances of the loss to ensure that you had no part in the fraudulent transaction.

Tuesday, January 4, 2011

Image Spams Trends

A Wish To All

This is my first post in 2011. As the only way I communicate through posts though I Am Wishing You All Happy New Year! May This Year Brings You Billions Of Happiness And Comforts in your life. Love You All

Article Disclaimer

Views Expressed In this Article/Post/Entry are generally accumulated from Published Entries on Internet. Specially from Wikipedia. But This Article is much more improved. And Is written more Informative.

Introduction To Spam

Spam is a Abusein Electronic Messaging System.To send unsolicited bulk messages indiscriminately. While the most widely recognized form of spam is E-Mail Spam, The Term is applied to similar abuses in other Media: Instant Messaging Spam, Search Engine Spam, Forum Spam, Social Networking Spam, File Sharing Spam etc.
Spamming remains economically viable because advertisers have no operting costs beyond the management of their mailing liss, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, Spammers are numeous and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet Service Providers, which have been the force to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurdictions. People who create electronic spam are called Spammers.It is believed that majority of spammers are using Home PCsfor this purpose.

What Is Image Spamming ?

Before We Start To Discuss Trends, We Should Put Some Light on Image Spam.
Image Spamming is a new method of E-Mail Spamming. The Text Is Embedded In Image or Picture files, which most anti-spam software ignore. They are not detected as spam simply because they are pictures and not text. Blocking Image Spam is proving difficult, as images and pictures (whether as attachments or embedded in the body of the message) are an expected part of a person's daily E-Mail intake - for business reasons (e.g, company logos, product shots, electronic newsletters, etc.) or personal purposes (family photos, vacation shots and so on)
I think we have got enough information about Image Spam, so now we should proceed to its latest trends.

The Latest Trends In Image Spamming

Although Spammers Registered considerable success with image spam (picture, right) the anti-spam software industry had not lost the battle and quickly came out with new counter measures to stop image spam. Realizing that filters had a problem with images, the answer was to hit spammers at source- that is where the E-Mail originated from. This new approach had an immediate positive result and considerably decreased the eddectiveness of image spam and gave back to E-Mail users some control over their mailbox. As with every cat and mouse game, spammers had to respond and in June 2007, they came up with a new technique that is not only ingenious but even more problematic than image spam. Instead of Embedding the image with in E-Mail Itself, they "repackaged" it with in an attachment using one of the most common file formats in use today - A PDF File. This move is clever for a number of reasons described below:

  • E-Mail users 'Expect' spam to be an image or text within the body of the E-Mail and not an attachment.

  • Since most Business today transfer documents using the PDF format, E-Mail users will have to check each PDF document otherwise they risk losing important documentation.

  • With most Anti-Spam Software Products on the market geared towards filtering the E-Mail itself and not attachments, spam has a longer shelf life within a network.

  • An Attachment that is a PDF file has a greater credibility in an E-Mail thus making Social Engineering attacks much easier.

  • The ability to send large PDF files could result in a single spam attack causing huge bottlenecks on a company's E-Mail Server, reducing the quality and amount of bandwidth available.

  • By sending PDF attachments, Spammers can also resort to phising by attaching supposedly authentic documents from a Bank or Service Provider.

  • To use of PDF spam was short lived as anti-spam software vendors quickly came out with updates and filters that analyzed the body of every PDF file. Not tto be defeated, spammers took less then a month to come out with a new option. Microsoft Excel files for push and dump scams. This moves were clever for reasons similar to those above for PDFs.

  • Excel is another extremely common file type in use and users are very familiar with this format.

  • Since many Business use Micrsoft's Excel for spreadsheets, databases and so on, E-Mail users will have to check each document otherwise they risk losing important documentation.

  • Companies that do not use Anti-Spam or Anti-Virus Software on their Network could be easy target for this type of spam.

  • The Damage that Spam can cause any Business should never be underestimate. Efficiency, Productivity, and Profitability can all take a serious hit if electronic junk E-Mail gains access to inboxes, with valuable time and effort eaten up in identifying and deleting unwanted messages. Spam currently accounts for a staggering 84%approx. for all E-Mails heading to corporate gateways. As Spam filters become more effective Spammers have to adobt new techniques to attempt to out with Anti-Spam defenses and ensure their unsolicited E-Mailsare delivered to their targets. By encoding their messages as an image rather than as plain text, Spammers hope to hide the content of the spam from spam filters. Their reasoning is that only the recipient will be able to view and read the image, spam filters will not be able to understand the content and let the E-Mail pass. Neverthless there are subtle clues hidden within the images which identify them as spam.
    New Ad Mode (Ad Mode $0) Has Been Launched, Interested People Can Check Out More Details In Advertise Page.
    • Learn About MaskedBlogger - Here