Tuesday, April 24, 2012

View Full Universe

http://htwins.net/scale2/scale2.swf?bordercolor=white

Wednesday, April 18, 2012

Thursday, April 12, 2012

Facts for PDF


Q: First things first – How do I create PDF documents on my computer without Adobe Acrobat?

A: You can download and install a virtual PDF printer like Nitro Reader on your computer. You can then create PDF files from any Windows application using the regular Print command – just choose Nitro from the list of available printers.

Q: I like the cloud and don’t want to install software just for converting a bunch of documents to PDFs. Are there any web-based alternatives?

A: Sure. You can upload your documents to Google Docs in the browser and then export them as PDF files. In fact this is the recommended approach if you want to covert multiple documents to PDF in a single batch.

Q: Is it possible to convert documents to PDFs on a mobile phone?

A: There are tons of PDF conversion app for the iPhone and Android phones but you can also use email to convert documents to PDFs on a mobile phone without requiring apps. Just forward the source file(s) to pdf@zamzar.com as an email attachment and they’ll send you an email when the PDFs are ready for download.

Q: How do I directly save web page as PDFs in the browser?

A: There are several options. Either open the web page in your browser and then print it locally using the Nitro PDF Reader (See #1). Or you can email the web page URL to mypdf@joliprint.com and they’ll send you the full page as a PDF. Alternatively, you can use CleanPrint to download web pages as PDFs. This is available as a bookmarklet and as an extension for all popular browsers.

Q: How can I convert PDF files to other formats like Word, images, HTML, etc.

A: You can upload the PDF document to zamzar.com and convert it to other formats like doc, html, text, and more.  Or you can use your Gmail account to convert PDF to HTML.

Q: Someone sent me a PDF document in Chinese but I can read only English?

A: You can easily translate PDF files from one language to another using Google Translate .

Q: Can I edit PDF files?

A: PDF files are essentially read-only documents but there are several tools to help you edit PDF files.

Q: How do I merge two or more PDF files into one? Can I also change the page order?

A: You should use PDF Fill, a versatile PDF editing tool that lets you combine multiple PDF files into one. PDF Fill can also be used to rearrange pages of a PDF file or for rotating pages (useful for scanned PDFs).

Q: I want to extract text from a scanned PDF document and use it in my Word document. What is the best option?

A: You can easily extract text from regular PDFs using the text selection tool in Adobe Reader but for scanned PDFs, Google Docs OCR is a good choice. Upload the scanned PDF document to Google Docs, select the option that says “Convert text from PDF and image files to Google documents” and then choose File –> Download as Word to save the extracted text.

Q: I have some restricted PDF documents on my computer that neither allow printing nor can you select text with the mouse.

A: You can use online services like PDFUnlock.com or freemyPDF.com to remove all common restrictions around a PDF file – such as print, copying, etc. – without requiring any passwords.

Q: Some PDF files on our intranet are protected by a password and the employee who created those PDFs is no longer with the company. How can we open these PDFs?

A: There are workarounds to open password protected PDFs or you can completely remove passwords from a PDF file (like your bank’s credit card statements).

Q: Is there a PDF conversion service that I can integrate with my website to help visitors download my articles as PDFs?

A: Add the Joliprint button anywhere on your website and people can convert your web articles to PDFs with a click. If your blog offers an RSS feed, you can use RSS2PDF to offer a downloadable PDF version of your blog.

Q: How can I add annotations or text notes to some of my PDF documents?

A: Get PDF-X Viewer, a PDF viewer app like Adobe Reader but with some extra features. You can add comments, annotations or even paste images to your PDF pages. Alternatively, use PDF Escape to add annotations, call-outs and text to your PDFs online in the browser without requiring any software.

Q: Can I fill PDF forms online without Acrobat Reader?

A: Sure, go to PDF Filler, upload the PDF form and start typing. It converts the PDF form into images and the user can type right on top of these images. When you have filled the form and ready to print, the images and user text are combined into a single image. The other good option is FillanyPDF.com that is again free.

Q: How can I add watermarks or even my (real) signature to a PDF document?

A: First draw your signature in Paint (or other photo editing tool) and save it as an image. Now open Adobe Reader and choose Tools –> Place Signature. Copy-paste that signature image anywhere on the PDF page. You can use the same technique to insert watermarks inside the PDF.

Q: I have a PDF book that contains some 200 pages. Is there a way to extract selected pages from that book and save it as another PDF.

A: You can the free PDF SAM (split and merge) utility to extract one or more pages from a PDF document and save them as separate PDFs. The same tool can be used to merge multiple PDFs into one file.

Q: How can I protect my PDF documents with a password?

A: Upload the PDF file to pdfprotect.net, set a security password and export it as PDF again. The service can be used to password-protect files up to 10 MB in size.

Q: How do I embed PDF files on my blog?

A: Upload the PDF file to Google Docs and then embed it in your web pages using the Google Docs Viewer. Alternatively, upload the PDF to document hosting sites like Issuu, Scribd or SlideShare and use their Flash based viewer for embedding PDF into your web pages.

Wednesday, April 4, 2012

How to find the IP Address of E-Mail Sender . .


Option A: Gmail may include the IP Address

Gmail doesn’t include the IP address of the sender when the sender is using Gmail’s web interface to send email. However if he or she is using a desktop client (like Microsoft Outlook) or a mobile device to send that email, the IP address is often included in the outgoing message.

Open the message in Gmail, click on More –> Show Original and search for the line “Received: from “ – it may have the IP address of the sender that you can map to a physical location with the help of Wolfram Alpha.

Option B: Find the Sender’s Time Zone

When the IP address is not available, you can determine the sender’s very-approximate location from the time-zone of the originating computer. Go your Gmail Labs page and enable the “Sender Time Zone” feature.

Now open any message in Gmail and click on the down arrow that says “Show details”. The message will display the the current time in the sender’s time zone as shown in the following screenshot.



Next you can use this timezone map to determine countries where the current time is the same as the time displayed in the Gmail message. Obviously this not the most foolproof method as two different countries can be in the same time zone but when the IP address is not available in Gmail, this is the closest you can get.

On a related note, the time zone of your outgoing Gmail messages is determined from your computer’s time zone. If you would like your Gmail messages to show a different time zone, just go to your computer’s data and time settings and change the time zone.

Monday, April 2, 2012

Cybercrime now third biggest business crime issue - survey


UK CIOs worry most about reputational damage
By John E Dunn
Computerworld UK
30 November 11
Cybercrime is now the third biggest crime problem experienced by UK businesses behind only asset theft and accounting fraud, the PricewaterhouseCoopers (PwC) Global Economic Crime Survey has found.
Nearly half of the 178 middle and senior managers in private and public sectors said that cybercrime (defined as loss of IP, malware incidents and industrial espionage) had increased in the last year, with a quarter reporting more than 10 incidents.
Half of these incidents happened in the financial services sector, ahead of media and communications (17 percent), industry and manufacturing (13 percent); the public sector reported a relatively low rate of 8 percent.
The burden of responsibility for such incidents appears to fall overwhelmingly on the CIO, CSO, and to a lesser extent the CEO even if the problem area turns out to be in information systems normally considered beyond their area of expertise.
The main cybercrime worry in the UK was reputational damage which belies the fact that only 57 percent reported having a media or PR plan in place to respond to data loss incidents.
"Reputational damage strikes an organisation at its core. The effects can seriously damage the perception of a brand, leading to loss of market share,” said PwC director of cybersecurity services, William Beer. “As society becomes less tolerant of unethical conduct, businesses need to ensure they place a premium on building public trust."
Twenty-eight percent of respondents said they had no access to the forensics help needed to investigate acrybercrime incident.
One interesting finding is that while external fraud is still mostly committed by a business’s customers, a growing number of respondents were unsure who to blame. PwC’s author’s link this to the anonymity offered to cybercriminals with organisations unsure who to blame. Traditional insider fraud, mostly by middle-managers, appears to be declining.
“I wish I could say I was shocked by these stats, but the volume and severity of breaches this year have made it patently obvious that many organisations have severely limited visibility into what exactly is happening within their own systems," said LogRhythm vice president, Ross Brewer, in response to the survey.
"The PwC survey respondents are right to fear reputational damage as our research has found 87 percent of the UK public would actively avoid interacting with an organisation that had suffered data loss as a result of cyber crime.
"If, as expected, data loss disclosure laws are introduced across Europe next year, this reputational damage will be even more likely to negatively affect business performance,” he added.

Study finds major weaknesses in single sign-on


Researchers were able to deceive both OpenID and Facebook authentication systems
By Cameron Scott,
IDG News Service
March 27, 2012
The single sign-on protocols that allow users to sign in to a range of websites with their Google or Facebook accounts suffer from security flaws that could allow scammers to log in as somebody else, security researchers have reported.
The researchers, from Indiana University Bloomington and Microsoft Research, say they have found a number of serious flaws in OpenID and the single-sign on system used by Facebook, as well as implementations of those systems at several popular websites. Google and PayPal are among the users of OpenID.
"The problem here is that the authentication system makes life easier but it makes security management more challenging," said XiaoFeng Wang, one of the authors of the study.
Using a single sign-on login initiates a conversation between the website a user is currently visiting and the provider of the identifying account. The website asks for certain information to be verified, and the account provider responds with a thumbs-up or thumbs-down. But, as with most conversations, there is room for misunderstanding.
In one of the flaws the researchers exposed, for example, not all websites confirmed that a verification coming fromOpenID included all of the items the website asked to be confirmed, such as the first name, last name and email address. The researchers were able to access the request, delete one piece of requested information (the email address, for example) as it went to OpenID and simply re-insert it in the signed okay from OpenID. In this way, even a hacker who didn't control the email address linked to the user's account on the website in question could log in,and potentially make purchases, using that person's account.
Using Facebook's authentication system, researchers were able to persuade third-party websites that they were somebody else and hijack that person's legitimate Facebook account.
The researchers looked only at a few popular websites in the study. These included Sears, Yahoo, the Web-based project management application Smartsheet, FarmVille's Facebook portal and The New York Times website.
All the security flaws they documented have been fixed, the researchers noted. Wang did not know of any cases in which the flaws he and his colleagues documented were exploited by scammers. But, he said, "it's our feeling that there will be a lot of similar problems" on other sites using single sign-on.
The shared login method is growing in popularity, including among e-commerce platforms. A recent study by Forrester Research found that more than 10 percent of would-be buyers abandon online purchases out of reluctance to create a new account.
Forrester Research analyst Andras Cser said the OpenID platform "has long been a pretty weak platform."
The impact of the Facebook authentication flaw, he said, "was bigger than just Facebook being cracked, because a lot of sites use Facebook Connect for logging in. That's a big problem."
Cser predicted that "the fix will come from using two-factor login." He suggested that login requests from a new device or coming from an unusual location could trigger a second set of security questions or require users to retrieve a temporary password by text message.
The study, "Signing Me onto Your Accounts through Facebook and Google: a Traffic-Guided Security Study of Commercially Deployed Single-Sign-On Web Services," is available online at - https://research.microsoft.com/pubs/160659/websso-final.pdf