Wednesday, July 29, 2009

What is Bot and Botnet

                                                             What is Bot and Botnet

Dear Friends,

            Today we will discuss with you about a dangerous virus named as “Bot”. Bots are similar to Trojans and worms but they perform automated tasks for their master (who created them). And when miscreants are hijacking and linking thousands of compromised computers, called “Botnets”, to launch coordinated attacks. A botnet in action is under the remote command and control of a criminal known as a "Bot Master." Bot is an abbreviation for ‘Robot’. A computer Bot is a remotely controlled malware program that is installed onto a computer without the knowledge or consent of the computer's owner. This type of program may have complete control over the operation of that computer and its Internet functions, but usually does not reveal its presence to the computer's owner or users, or try to interfere with the normal operation of that computer. When a Bot is installed onto a computer that computer will not only be remotely controlled, but will become an unwilling member of a network of similar Bots, known as a "Botnet".
With Love
Urproblemmysolution Team

How Bots are installed in Computer

                                            How Bots are installed in Computer

Dear Friends,

               Computers are infected by bots through different techniques of cyber criminals and hackers. The hackers, crackers and cyber criminals install bot in your computer through hostile links in spam emails and instant messages, hostile JavaScript codes embedded into web pages (with or without knowledge of the website owners), trickery (Trojans - self infection) and social networking site exploits. Some of the tricks used to cause people to infect their own computers with Trojan Bots are phony e-cards and Postcards (favorite of the Storm Botnet), links to view videos where you are informed that you are missing a required or updated Flash player or Codec, and fake security scans that trick you into installing fraudulent security programs to remove the non-existent infections revealed in the fake scan or alert.
With Love
Urproblemmysolution Team 

Feeling of Bots’ Presence and how to Get Relief

                                                      Feeling of Bots’ Presence

Dear Friends

             Now the question is when you will feel that ‘bot’ has been installed in your computer system secretly. If you find that your key board is not working properly. You are pressing “x” but it is displaying “t” or something other but previously it was working normally. This is an example of the danger side of ‘bot’ in your computer. The other signs include poor computer system performance, slower response times and longer start-up and shut-down times, dramatic loss in Internet connection speeds, loss of hard disk space, web browser frequently closes for no apparent reason, browser's home page resets and cannot be changed, new desktop icons and applications, like toolbars, suddenly appear, access to various computer security-related Web sites is blocked, pop-up ads appear even when the Web browser is closed. Some other signs are computer seems to be accessing the hard drive constantly, an unresponsive mouse and keyboard, when you open your email there are several bounce notifications from people you never tried to email, there is internet activity or your modem's activity light continuously flashes even when you're not even accessing the net, your virus checker is disabled and you're unable to update your antivirus program. 

                                                   How to get relief from Bot

             The national security agencies and cyber crime authorities of different countries are awaring the netizens for preventing the bot and as per the suggestion of cyber security agencies and cyber crime detection wings the netizens should install antivirus software, firewall, using strong passwords, and a good email and download behavior. Even now a day some very good antivirus companies like Norton have brought Antibot software for preventing bots in computer. There are also some free versions of Antibot in the net but I get scarred to use those for favorite personal computers and laptops.  
With Love
Urproblemmysolution team

Tuesday, July 28, 2009

what is worm

                                                                  What is Worm?

Dear Friends,

       We have already discussed about the details of Trojan and we will discuss about worm and how it endangers our computer and how we can get rid of from this. So lets start about where from it has come and what it is and how to get relief. 

      History: - Initially this term was used for good purpose but as the time passes it lost its importance to the world as the computer misusers misused it and changed its nature and character for their personal ill motive. The term "worm" actually comes from a science fiction story called The Shockwave Rider written by John Brunner in 1975. In short, the story is about a totalitarian government that controls its citizens through a powerful computer network. A freedom fighter infests this network with a program called a "tapeworm" forcing the government to shut down the network, thereby destroy its base of power.  

             But the world was not much aware about that word as it was not known to all but on 2nd November 1988 when Robert Tappan Morris, a Cornell University graduate student and son of Robert Morris, the former chief scientist at the National Computer Security Center, a division of the National Security Agency (NSA), when brought it in the internet from MIT to conceal the fact that it actually originated from Cornell, it became famous (????) to all as it caused near about 6000 to 9000 computer damaged and collapsed the internet but when he realized that it is causing huge harm to the cyber and computer world he then contacting with one of his friend from Harvard send an anonymous message about how to prevent them and how to heal the infected computer from Harvard over the network but as the internet was clogged it was not reached to anyone, which resulted millions of dollar loss. But as per his version he wanted to gauge the measure of internet and how many computers are in touch with internet and even he did not realize at the time of creation that it may cause such huge loss and it is heard that it was programmed in such a way that it would keep continue counting how many computers in the net has got infected. So this is the history.

      What actually worm is: - A worm is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action. A worm takes advantage of file or information transport features on your system, which is what allows it to travel unaided. 

      The biggest danger with a worm is its capability to replicate itself on your system, so rather than your computer sending out a single worm, it could send out hundreds or thousands of copies of itself, creating a huge devastating effect. Many worms come in the form of email file attachments, or as hidden additions to actual email messages, which trigger the execution of infectious code. And even some website contents may carry worm and when you click on them they will try to get installed if you don’t have good antivirus in your system.

Only a good Antivirus can stop and prevent the worm by its background scanning and keep the antivirus always updated.  

With Thanks

Urproblemmysolution team

Sunday, July 26, 2009

How Trojan Comes to you


                           How Trojans enters in your computer.

Dear Friends,

               In our previous discussion we already told you what is Trojan and what is the history of Trojan and there we published two pictures through which we explained that if you invite Trojan in your room i.e.: computer they enters there otherwise they don’t have any chance to enter there and you can keep yourselves free from them. So we have primarily understood how the most dangerous computer program Trojan enters in your computer and now we will bring before you the experts comment in a nutshell about how Trojans enters in your computer.
  Here the ways or paths, which we give the Trojan to enter in our room and stay with us safely for causing danger to our computer and personal life:- 

1) When we download software from an unknown website with an executable file. It comes in windows platform with .exe, .bat, .com, .vbs extension.
2) When we share file during chatting with known and unknown friends.
3) When we download crack file from different websites for validating the trial version of software as experts say that most of the crack files contains Trojan.
4) It comes through multi-extension file name such as .txt.vbs or .jpg.exe and the Trojan creators hide the last extension so that the downloader can’t see the original file status.
5) When we download or open any attachment file or picture from an unknown or untrusted sender.
6) When you blindly type commands that others tell you to type, or go to web addresses mentioned by strangers, or run pre-fabricated programs or scripts.
7) When we open porn sites and porn pictures.

So now you have understood which can stop you from being the victim of Trojan and we think you will follow this during net surfing and installing any file from any outside source. 

With Thanks

Urproblemmysolution Team

 Pl keep continue your visit for knowing more about cyber danger.

Nuisense value of Trojan

                                  What casualty Trojan does in your computer.

Dear Friends,

         Now we will tell you the danger site of Trojans in our computer. We think that you read about cookies and there we learnt that the websites keeps their evidences in the browser for identifying you in the next time when you visit or they keep some records for their creators as their needs and it may be for good or bad. In the same manner if Trojan is installed in your computer the Trojan creates backdoor for his creator for operating your computer from remote by sitting far from you. You just think that the door, windows and all holes of your room are closed and sealed and then can anyone do anything in your room? No it’s impossible as there is no hole to get entry there. But if he can manage to create a hole or open the window or door, he can do anything there by using his power and knowledge. So Trojan is that it creates backdoor in your computer through which the hacker or cyber criminals can hack your system and cause casualty. But you should keep in mind that Trojan can’t do anything without the control of any person or system it does that what its creator programmed it during creation. It just resides in your system hidden and when the said executable file is executed by any means it comes with its original nature. It can format your any drive as per their program or deletes your important data and they can do anything as controlled by their operator.
  When they take control your computer is called a bot, since it is now their robot. All passwords, data, system settings, just about anything you can think of can be changed or monitored. Each keystroke you do can be captured. Your sound, screen functions, mouse, you name it can be altered. They can completely control your computer. So these are the vulnerable sides of Trojans.

With Thanks
Urproblemmysolution team.  

Pl keep continue your visit for knowing more about cyber danger.

Relief from Trojan

                                                  How we can get rid of Trojans

Dear Friends,

        We have discussed so far what is Trojan, history of Trojan, how it comes to you, what it does in your computer and now we will discuss you the last topic about Trojan i.e.: how to get rid of from Trojans. Anti-virus programs detect known Trojan horses. However, Trojan horse programs are easier to create than viruses and many are created in small volumes. These Trojan horse programs will not be detected by anti-virus software. The best defense against a Trojan horse is to never run a program that is sent to you. The others are as follows:-

1) Take back up of your important files and then format it and re-install the system.

2) Install good paid antivirus not the free version.

3) Keep the antivirus in auto scanning mode always.

4) Always allow your antivirus to scan your computer completely.

5) If you download any file or image or film don’t run it until you scanned it by your own good paid antivirus like Kaspersky and Norton. Don’t go against antivirus.

For knowing the recent Trojans you are requested to visit

With Thanks

Urproblemmysolution team.

Pl keep continue your visit for knowing more about cyber danger.

Friday, July 24, 2009

History Of Trojan


        What is The History of Trojan

Dear Friends,

            We think now you have understood what we are going to publish before you as the pictures above have made you clear about our discussion. It is that picture which reminds us the great story of Greek mythology. And yes it is. Now you will say why we are discussing the story here. It’s not the place of story discussion but we think we should, as what we will bring before you just now that name has come from this history and practical idea. So we think we have primarily got success to make you understand why the most dangerous and sensitive virus or program in computer world has been christened in this manner. And we have made you clear also that as we invite they come but if we don’t they will not. Yes our friends this is Trojan horse virus of the computer world. As our blog is only for preventing cyber crime and our principle moto is to make aware the netizens about the danger of cyber world and how to get rid of from them and how we can keep ourselves safe from there so readers pl don’t ask us how to write Trojan programs. We are against them who spread this type of danger to the cyber world.
With Love
Urproblemmysolution Team

What is Trojan To Computer

             What is Trojan horse or Trojan to computer?
Hallo Friends,
           This was a discussion only and now we will tell you what is Trojan Horse Virus related to computer. It is heard that this virus came to the computer world in the year 1999 in the form of an executable file named "ie0199.exe" and was provided as an email attachment. It will come to you as a useful software but starts damage after its installation as just after its installation the virus writer take the control of your computer through the backdoor which he created by installing Trojan in your system. Trojan horses are not self-replicating. Their action starts just when they come in contact with their writer as the writers use Trojan as remote computer operating program. Until and unless they are interacted with their creator or user they dont work. Is it not functioning like the soldiers of Troy? They work the same way the ancient Trojan horse did: Once they're installed, the program will infect other files throughout your system and potentially wreak havoc on your computer. 

So thank you friend this is for today and keep in touch with us we will post the rest interesting portion of Trojan or Trojan Horse virus in our next posting. There are many things to discuss about this in our next postings.

With Thanks
Urproblemmysolution Team

Thursday, July 23, 2009

Best Cyber Security Expert Says

Dear Friends,

   Today is our most happiest day for our blog as one of the bset Cyber Security Expert of the World Mr. Gunnar has made his comment on one of our posting on blog and that is on the topic "Pay Pal member beware from phishers and and cyber criminals". This is the most valuable comment of our blog so far and so we have decided to post it on the front page for your kind notice and future guideline. And here it is for you:-

Gunnar said...

Hi there,
I am a friend of Sitanshu Ray who forwarded me that link of your interesting blog.
Phishing mails like this will never stop in a principal way and of cause they can be danger like in this case.
This Phishing mail you posted looks like an "invitation" of a (so called) drive-by-infection. This means, if you open the link from this mail, your computer might get infected by a virus/trojan in a second without interaction. They might use unfixed or new vulnerabiliys in the browser and/or plugins to do that and its very possible that your antivirus didnt "know" that used virus/trojan. In worst case, your computer is after this a part of a botnet or they "only" steal data out of your computer like passwords, banking data etc.
If you check the main URL of this like, you will see that the owner of the domain is "inContact Inc." - a call center. Call Center often act like this and offer there service to "normal" companys i.e. to send out spam etc.
On the inContact Website you can also see the address of them: 7730 South Union Park Avenue, Suite 500 Salt Lake City, UT 84047 or check the with the whois data.
But the problem is: It's hard to attest them, that they send the phishing mail by themself. They can easily say someone (unknown) did it. But there are also some possibility to make traps for them that could it be possible to sue them ... ;-)
Kind regards
July 22, 2009 10:16 AM

Wednesday, July 22, 2009

Pay Pal Members Beware of Phishers

Pay Pal Members Beware From Phishers and Cyber criminals

Dear Friends,

    Now we are producing before you about latest fraud emails which was seemed to be generated from Pay Pal and it came to one of our team member and then feeling it suspicious he mailed the entire content to Pay Pal and in response what Pay Pal said we are producing that before you for your future reference. 

Here is the suspected mail from spammer with its header file which was sent to Pay Pal for verification:-

Form Message
customer subject: Please use a supported language when contacting us.
customer message: Additional Information: 'Again I recived this mail was
it from yours.? to me
 show details ##:## PM (## hours ago)

Dear Kept Hidden ,( Here they used the name, which they did not use in previous mail)

On ##/##/#### I replied to the email message you sent regarding your

PayPal account. As part of PayPal's commitment to excellence, I want to
make sure I met your needs in my response. Would you please take a
minute to answer a few questions to let me know how I did?

>To respond to our survey, please click on the web address above. If
that does not work, please cut and paste the entire web address into the
address field of our browser. NOTE: Please respond within five days so
that you can provide timely feedback to me, Judith . AFTER # DAYS, THIS
>If you wish to take the survey anonymously, click the link below:


Here is the response from Pay Pal about the above email:- 

Dear Name Kept hidden,

Thank you for contacting PayPal.

Hello, my name is Hazel. From reading your email, I know you are
concerned about the suspicious email you received. I'm sorry if this
caused you any trouble, I'll be glad to explain this further for you.

Thank you for submitting this suspicious email, Mr. Hidden. We did
not send it,
so please don't click any link in the email and delete it
if you haven't already. We also recommend that you log in to your PayPal
account and check your transaction history for any inaccuracies.

Please forward the original email to and then delete
the email from your mailbox. Never click any links or attachments in a
suspicious email.

The majority of Unauthorized Access cases are a result of inadvertently
providing account information, such as bank or credit card account
numbers on a 'fake' PayPal website or in response to a 'fake' PayPal

It is also possible that if you have other accounts (email, eBay, etc.)
that share the same password as your PayPal account, and one of those
accounts was compromised, your PayPal account can be at risk of being
compromised as well.

Remember these steps to help protect your PayPal account from
Unauthorized Account Access:

Emails - Make sure they are sent from PayPal

  1. If you receive an email and are unsure whether it is from PayPal,
open a new web browser (e.g., Internet Explorer or Netscape) and go to
the PayPal website. Don't click on any link in an email which seems
suspicious to you.
  2. Some spoof websites will send emails that pretend to come from
PayPal to entice you to log in at the spoof URL. Be extremely cautious
of emails that direct you to a website that asks for your information,
such as your bank or credit card account numbers.
  3. Stay safe; don't respond to emails asking for any of the
  o Your password and email address combination
  o Credit card numbers
  o Bank account numbers
  o Social security numbers
  o Drivers license number
  o First and Last Names

Email Greeting -

PayPal will never send you an email with the greeting "Dear PayPal User"
or "Dear PayPal Member." Emails initiated by PayPal will address you by
your first and last name, or the business name associated with your
PayPal account. Please note that the automatic response you get from us
may not address you by name.

Always log into the PayPal site

  * PayPal will only ask for information after you have securely
logged in.
  * For your security, PayPal will never ask you to re-enter your full
bank account, credit, or debit card number without providing you at
least the last two digits of the number. These digits let you know that
we already know the full number and are asking you for the rest of it.
Beware of any website or email asking for these numbers for
"verification" that does not prove that it knows the number by providing
at least the last two digits.

Website pages - make sure that they are hosted by PayPal

  1. When using the PayPal service, always make sure the PayPal url
address listed at the top of the browser begins with "https." The "s"
ensures that the website is secure. Even if the URL contains the word
"PayPal" it may not be a PayPal webpage.
  2. Look for the '"lock" symbol that appears in the lower right hand
corner of the browser. This symbol indicates that it is a secure site.

Do not download attachments, software updates, or any application to
your computer via a link you received in an email. PayPal will not ask
you to download anything for your account to work.

Passwords - keep it on PayPal

  1. Use a unique password for the PayPal account and change it every
30-60 days.
  2. The password should be one that is not used on any other site,
service, or login.

Thanks for sharing your concerns with us. We value what you have to say,
and we know situations like this can be difficult. If you have more
questions, visit our Help Center by clicking "Help" in the top right
corner of any PayPal page.

PayPal, an eBay Company

Copyright© 2009 PayPal Inc. All rights reserved.

Consumer advisory: PayPal Pte Ltd, the Holder of the PayPal™ payment
service stored value facility, does not require the approval of the
Monetary Authority of Singapore. Consumers (users) are advised to read
the terms and conditions carefully.

Beware From phishing mail Pay Pal Members

Pay Pal Members Beware From Phishers and Cyber criminals

Dear Friends,

    Now we are producing before you about two fraud emails which was seemed to be generated from Pay Pal and it came to one of our team member and then feeling it suspicious he mailed the entire content to Pay Pal and in response what Pay Pal said we are producing that before you for your future reference. 

Here is the suspected mail from spammer with its header file which was sent to Pay Pal for verification:-

Form Message
customer subject: English
customer message: Additional Information: 'I received this mai on
##/##/#### and was it from yours?

"Dear PayPal member,

We're sorry. We are not able to process your recent reply to our email.
We are the processor for the email surveys for PayPal and are not
directly linked to the PayPal customer service center.

Please respond through the survey link imbedded in the original email
you received from us.

Thank you and we apologize for the inconvenience.

PayPal Survey Partner"

This is the header:-
Delivered-To: kept
>Received: by with SMTP id n##cs######wak;
> Mon, ## Jul #### ##:##:## -#### (PDT)
>Received: by with SMTP id
> Mon, ## Jul #### ##:##:## -#### (PDT)
>Return-Path: <>
>Received: from (
> by with ESMTP id
> Mon, ## Jul #### ##:##:## -#### (PDT)
>Received-SPF: neutral ( is neither permitted
nor denied by best guess record for domain of
>Authentication-Results:; spf=neutral ( is neither permitted nor denied by best guess record for
domain of smtp.mail=
>precedence: bulk
>return-path: <>
>Date: Mon, ## Jul #### ##:##:## -####
>from: ""
>subject: Automatic Response'

Now what Pay Pal replied:- 

Dear Name Kept hidden,

Thank you for contacting PayPal.

Hi Kept hidden! I have read your email and understand your concern over the
email you received. Let me assist you further.

If you think the email you received did not match the description I have
included below please forward the email you received to

PayPal frequently issues surveys in attempt to find more ways to improve
our service and accommodate your needs.

  * If you receive a survey from PayPal, or a third party vendor on
behalf of PayPal, it will arrive as a link sent to you through email *
  * To get to the survey page, simply click on the link, or paste the
link into your browser's web address box

Please keep in mind that a medium like email allows anyone to send a
message to you. Before entering information into the survey you received
via email, you should verify the source of the email.

* To make sure that the email survey you received was from PayPal,
follow these tips:

  1. You will NOT need to enter your password at any point during the
  2. The survey you received will never ask you for any personal
  3. All surveys will address you by first and last name

We appreciate your input, and we thank you for using PayPal!

We know situations like this can be difficult, so thanks for working
with us. If you have more questions, visit our Help Center by clicking
"Help" in the top right corner of any PayPal page.

A Name is there
PayPal, an eBay Company

Copyright © 1999-2009 PayPal. All rights reserved.
Consumer advisory - PayPal Pte. Ltd., the holder of PayPal's stored
value facility, does not require the approval of the Monetary Authority
of Singapore. Users are advised to read the terms and conditions

Tuesday, July 21, 2009

More Tips for Pay Pal Account Security

How To Keep Your Pay Pal Account More Safe?

Dear Friends,

  One of our reader has given his valuable command over Pay Pal Account Security and it seemed to us that it should post on our blog so that our other readers get some more knowledge about their security tips for Pay Pal and we will suggest you to read our previous posting first and this is the continuation of that discussion and we think this will help you to keep your Pay Pal Account more and more safe from hacking or money loss.


Here is the valuable comment of Kailash.

 All About Opensource said...

"I would like to say thanks to all well wishers of this site and also Urproblemmysolution Team for maintaining a such a informative site. 
In this post Urproblemmysolution Team almost cover all the things regarding paypal, though i just need to add few point like when ever trying paying something via paypal for any kind of subscription with multiple payment term please do not check the options like "Auto renewal" or "Auto recharge" or "auto payment option" .
Before paying or receiving any money in paypal please read T&C carefully that will take few min for first time but those few min can save your $$$$ being fraud by some cracker. 
Keep Changing your paypal password in every 7 days or even after every two transaction. 

FYI the official site of Paypal is

p.s. On-Screen Keyboard can be accessible by type "osk" on "Run"

Cheers :) !!!

Sunday, July 19, 2009

How to keep Pay Pal Account Safe from Hackers/Crackers

                            How to keep Pay Pal Account Safe from Hackers/Crackers

Dear Friends,

  In our last posting we discussed about the modern secured net transaction mediator Pal Pal and what it is and how it works and what type of security system they maintain for their customers and there we also told that their account is now also hacked by hackers/crackers. Before discussing the tips for preventing the hackers/crackers we think that we should give you some basic knowledge about some terms used here. So lets start.

1) Hacker/Cracker:- Hacker and Cracker these are two different terms and used for different categories of men in the net. Hackers means those persons, who can access your personal data and site or email unauthorisedly but they don’t create any danger to your life or your system and they show you how much unsecured is your system. They are good for the cyber world but on the other hand crackers do the same thing but cause casualty to your system or your personal data and money. So our fighting is against cracker and moto is not to give a chance to hacker for accessing our system or personal database in net. We think we are now clear about this.

2) Keylogger :- What is keylogger? This is the most dangerous spyware or a computer program, which studies your all keys when you supply any input to your computer or type it. It may be in hardware form also. This may be installed by cyber criminals in your machine through net if your antivirus program is not strong. This may be kept with some links and if click on that in net that may be installed in your computer and generally phishing links and some pornography links carry keylogger with them for installing them in your laptop or PC. Then they sent your data or user name password to the person, who installed that software in your computer through net. Detecting the presence of a keylogger on a computer can be difficult. So-called anti-keylogging programs have been developed to thwart keylogging systems.

3) On-Screen Keyboard :- This is the key board, which has already been installed in your computer for working with this if situation demands. How you will get it. You go to Start->All Programs->Accessories->Accessibility->On Screen Keyboard.

Now we say how to keep safe your Pay Pal Account. Here are the tips.

1) Create safe password by using safe password tips, discussed earlier.
2) Try to use gmail email id for registering your Pay Pal Account as this is more secure than others.
3) As Pay Pal e-transaction is very much secured so hacking pay pal site is very very tough and for that they use Keyloggers help. For getting rid of keylogger use On Screen Keyboard during typing email id and password in Pay Pal site.
4) Use a separate email id for registering Pay Pal.
5) Don’t share it with any other.
6) Please use paid antivirus for your computer.
7) Don’t use cyber café for this transaction as some cyber cafes use screen shot hidden software in their computers and you will not understand this.
8) Don’t use same password for your email id and Pay Pal Account as if anyone can hack your email id he also can hack your Pay Pal Account.
9) Once Pay Pal Account enquiry or transaction is over please delete all cookies (For knowing the reason pl read when cookie is dangerous) and Log out your Account.

Our other readers are also requested to comment over this for more security to the Pay Pal Account holder.

Thank you

Urproblemmysolution Team  

What is Pay Pal Account

What is Pay Pal ( Account?

Dear Friends, 

            As per our words and promise we are going to discuss you about Pay Pal as this is the safest e-transactions in the world as if you visit the above noted website you will find it starts with “https” if you use normal browser and don't use faster browser and for that all the data passes through it to their server is in encrypted form. So we think we first introduce you what is Pay Pal. This is basically a mediator between you and the e-seller and for that they don’t charge any fees from you but they charge it from the seller and that is also a small percentage on sales value. Before that you will have to have an account with them. For opening the account you just need a valid email id, name and address, a valid telephone number. So now a question will arise in your mind that just with the help of that email id can I purchase anything from e-marketing? What should be your answer is it possible that you don’t have money in your account and you will purchase anything. So what you should do. You should keep a balance in your Pay Pal Account and from there you will spend and Pay Pal is taking responsibility to pay the amount to your seller where you don’t know seller directly but getting his product.  

           So in this stage a question may arise in your mind the why I will do so, I have credit card and debit card facility and I can purchase it by using those from net. Yes you can do that but mind it that all the net transactions are not done through secured channel. Some of them are unsecured and their there is every possibility of your credit card and debit card number get hacked and the hacker may misuse it and for that Pay Pal business is in boom. In our first part we discussed that a balance is needed in your Pay Pal Account and you can’t deposit money directly in your Pay Pal Account from out site the USA as the business is run from USA and for that you will have to transfer the balance to your Pay Pal Account from your credit card or some other cards as desired by Pay Pal. Only the American citizens can do the bank transfer and if you don’t have your credit card there is option to transfer the amount from your friend’s card also if your friend wants and for that I made a quarry to Pay Pal authority that why this system is continued by them and why the other countries don’t have the facility of bank transfer and in response they told that it is due to the security purpose and if a card is used the verification of person is possible and at the time of final transaction before purchase they use their Gausebeck-Levchin Test ( which we discussed earlier) for avoiding bot transaction and even I tried to access their site by using a proxy server but they denied. So you can say that it is secured. 

            We think now you have become angry on us and your anger is reaching in such a position that you will tell me then why you have posted this here if the system is so secured and you promised us that you will tell us the danger side of cyber world. Yes you are right that the system is very much secured but in spite of that the Pay Pal accounts are get hacked and the people are becoming victim over this and that is why we were discussing you the details of Pay Pal account system. In our next posting we will discuss you what are the dangers in Pay Pal account and why and how we can get rid of from there. So keep in touch with us.


Urproblemmysolution team  

Friday, July 17, 2009

What is Gausebeck-Levchin Test ?

What is Gausebeck-Levchin Test? 

Dear Friends,

  We promised you in our last posting that we will post about Pay Pal as now a days Pay Pal is most trusted and believable transaction for e-marketing and e-payment for your personal liabilities and we will keep our word, which we promised before you and that is why we are going to introduce the Gausebeck-Levchin test and this is the security test of Pay Pal. All of we know that for opening a Pay Pal Account we don’t need money we only need a valid e-mail id so any one can open a Pay Pal Account and continue their transaction by using the stolen credit card number or debit card number and in these cases if it happens that the Account was opened by using a “bot” (Robot type computer program) and at the same time the transaction is generated by that robot programming then its not possible to stop the fraud and spammers So for preventing fraud during transaction Max Rafael Levchin, an Ukraine born computer scientist and co-founder of Pay Pal, introduced a CAPTCHA test during transaction and that is called Gausebeck-Levchin Test as the bot programming cannot read the words on the capture and only human can decrypt that. This is the first commercial implementation of CAPTCHA test.

  So a question may arise in your mind that what is CAPTCHA test? CAPTCHA test is the abbreviated form of Completely Automated Public Turing Test to Tell Computers and Humans Apart. Actually it is a human verification test. When you enter in a yahoo chat room you find a box where few words are written in a typical manner and you have to put those words in the box below and if it matches then you get the permission to enter into the room and allow chatting. So you will ask why this is needed. This is needed as spammers may enter in the room for advertising their site by using “bot” programming and the spammers can’t pass the CAPTCHA test so the chatting personalities present must be there and there IP addresses will be tracked for future references.  

  We think this will help you in future and keep in mind before doing cyber crime where the CAPTCHA test exists.

Thank You

Urproblemmysolution team

Thursday, July 16, 2009

Tips For Net Banking Users

                                             Safety Tips For Net Banking Users
Dear Friends,
  Today we will discuss you the safety tips to net banking users as though phishing mail is a global problem now a days and inspite of that most of the net banking users are not aware of the danger side of Phishing mails and for that they are requested to go through the Phishing mail portion of this blog and there we have discussed about the prevention from phishing mails. But except phishing mail there are some other reasons for which the net banking users may be trapped by outsiders. You will say as you are using net banking facility so you know what the safety tips are. During the course of our discharging duty we got one very good software engineer from CAPGEMINI as a victim of phishing mail. So we know that most of you do not follow all this tips. So you are requested to keep in mind all the following tips before starting your net banking facility.

Here are the tips for you:- 

1) First of all use your own PC or Laptop for your net banking don’t avail cyber café for net banking transaction.
2) Install there a good updated operating system and keep it in auto updated format when in net.
3) Install good updated antivirus and don’t use free version.
4) Always use SMS alert on any transaction through net.
5) Always use safe password (please go through the safe password tips in this blog) for using net banking.
6) Don’t keep your username and password saves in any file in your computer.  
7) Don’t use office computer for net banking transaction as now a days most of the companies use key logger in their computer for studying their employees’ daily work.
8) Before using net banking please check your browser that they are showing ‘https’ as this is secured and if it is bank’s original website ‘https’ will be there. (For knowing ‘http’ vs ‘https’ pl read the discussion about this in this blog)
9) Please keep in mind that ‘The Bank’ never sends mail for updating your user id and password and you find any such mail please delete it and don’t open it and never update your net banking facility from any unsolicited mail.
10) Before starting net banking please type your user name and password in a notepad when your computer is in offline mode and then when you open net banking and copy paste these in your net banking system and then operate it.
11) Please check third party beneficiary list of your account and your profile at least once in a day and if you find any additional name then you delete it understand that it has been hacked and contact with your bank officials immediately.
12) Then you check the mobile no of your profile whether it has been changed or not as the hackers change it for receiving SMS after amount transfer.
13) Then you immediately change your user name and password by using the safe password tips discussed earlier in this blog.
14) Don’t share user name password even with your close person.
Please keep in touch with us as in our next discussion we will bring before you about safety and security of Pay Pal.

With Love

Urproblemmysolution Team

Monday, July 13, 2009

Important Tips For Cyber Cafe Users

Important Tips For Cyber Café Users

Dear Friends,

We promised in our last posting that we will post some important tips for those who use cyber cafes for their net surfing. We believe that this will be helpful to all of you as most of all have to use cyber cafes for any urgent situation. So please read this and try to follow in your life.

Very important tips when using Public Terminals and Cyber Cafes

Tip 1 E-Bay Users - Watch Out

Don't walk away while logged in. Many web sites let you log in, but set cookies for an online session (such as eBay) so if you close the browser and reopen it, you don't have to re-logon. If you just close the browser and walk away, the next user (who may have been watching while you were surfing), could pickup where you left off. Be especially careful using a Microsoft Passport account as well, since it can also be persistent.

Tip 2 Surfing at an Internet Cafe, the Public Library, Terminal at the Hotel, or any Terminal Accessible to Others - Watch Out

1. If you use a public terminal (e.g., Internet cafe) with a Windows XP installation, it could ask if you want to associate your passport account to the Windows XP account. Be sure to say "no"(we repeat, SAY "NO") if you get this prompt, or you'll be giving your passport account to everyone that uses that machine.

2. Normal surfing leaves an electronic trail of temporary files, cookies and a history of where you've been. When you're done with surfing, if you're using:

· Internet Explorer, click on Tools and Internet Options, on the

· General tab, click on Delete Cookies, Delete Files (and be sure Offline content is checked), and

· Clear History.

· If you downloaded any documents, delete them as well. If you edited any documents clear the "recently used documents" list. To this with Windows XP

· right click on the taskbar at the bottom of the screen and then,

· select Properties,

· select the Start Menu Tab, and

· click on Customize then

· Advanced. On the Advanced tab, click on the

· Clear List button for Recent Documents.

Tip 3 Restrict Pop-Up Windows and Cookies

Pop-up windows are often generated by some kind of scripting or active content. Adjusting the settings within one's browser can reduce or even prevent scripting or active content. In turn, the number of pop-up windows that appear will be reduced.

Some browsers offer a specific option to block or limit pop-up windows.

Accessing Web-based E-Mail Accounts

When connecting to a Web-based mail account via a cyber café (e.g., Yahoo!,, for instance, do as follows:

1) Start the program Microsoft Notepad or Word or any word processing program installed and type your

· User Name,

· Password, then

· Copy the user name AND password using Control C and then paste both into the appropriate fields (use CTRL V) when wanting to log into your web-based e-mail account

The above procedure prevents Keyloggers or password stealers program from grabbing your username and password when trying to log-on from such a public terminal - The same logic applies if you log into a web site from your own computer. –

2) Refuse the option that may pop-up by the browser to save the password.

3) Use the site's log off option (disconnect, or close session option), in turn, this will prevent the next user at the cyber café from being able to access your account.

4) Exit the browser and then open it again before leaving the computer to the next user.

These types of precautions should be taken because a lot of mail systems use cookies via Internet to maintain the session open while the user goes back and forth between Web pages. Thus, user names and passwords don't have to be requested constantly. Cookies store a value that means "open" to the current session and user, so if the session is not disconnected, anyone can use it.

This is especially dangerous in cyber cafés, where several different users continuously work on the same computer, one after another.


Urproblemmysolution Team

Sunday, July 12, 2009

How Cookie Works

How Cookie works

Hallo Friends,

Now you will ask us that in your last posting you discussed us that cookies are not computer programs so how will they work and how can they work and yes you are right its not a computer Program and nor a virus but in spite of that it works and how it works. Actually it works as a passive worker that means when it stays in your computer it helps the browser and server to work freely and smoothly. In our last posting we discussed about the types of cookies and if you read about that then this posting will help you to understand this topic.

The manner through which cookie moves data

· If you type the URL of a Web site into your browser, your browser sends a request to the Web site for the page. For example, if you type the URL into your browser, your browser will contact Google's server and request its home page.

· When the browser does this, it will look on your machine for a cookie file that Google has set. If it finds an Google cookie file, your browser will send all of the name-value pairs in the file to Google's server along with the URL. If it finds no cookie file, it will send no cookie data.

· Google's Web server receives the cookie data and the request for a page. If name-value pairs are received, Google can use them.

· If no name-value pairs are received, Google knows that you have not visited before. The server creates a new ID for you in Google's database and then sends name-value pairs to your machine in the header for the web page it sends. Your machine stores the name-value pairs on your hard disk.

· The Web server can change name-value pairs or add new pairs whenever you visit the site and request a page.

There are other pieces of information that the server can send with the name-value pair. One of these is an expiration date. Another is a path (so that the site can associate different cookie values with different parts of the site).

You have control over this process. You can set an option in your browser so that the browser informs you every time a site sends name-value pairs to you. You can then accept or deny the values. (source howstaffworks)


Urproblemmysolution Team

Cookie is Danger

When Cookie is Danger

Dear Friends,

If you read about what cookies are then you will get there that Cookies can contain specific information about the user:

    • Username and password
    • Date of last visit

So your user name and password of a visiting site may be stored in your computer cookie of that site and you think someone has stolen it by using some software so is it vulnerable or not? You think it. So we need some general solution.

How can one describe the solution from cookies?

To increase your level of security, adjust your privacy and security settings to block or limit cookies in your web browser as follows:

  1. Go to Options (tools in Firefox / Mozilla), click on Internet Options (Options),

  1. Thereafter, click on Privacy, change cookie acceptance privacy level (e.g., do not accept third party cookies - move cursor up with mouse on vertical bar) or accept cookies until I close Firefox, and

  1. Click on General, click on delete cookies to get rid of all temporarily stored cookies you have on the machine right now (Firefox, just check and see what you want, various options best is if you click Privacy, then click on Clear All).

If you don’t use Firefox please go to options in your browser and do the same thing as discussed above.

In our next posting we will give the Very important tips when using Public Terminals and Cyber Cafes please keep visit this blog for your future help.


Urproblemmysolution Team