DIGITAL SECURITY


Protection of digital identity, internet or network equivalent of our identity is called Digital Security. It includes different tools like web services, biometric, anti-virus software which we use to secure our identity, technology and assets in both mobile and online world. 
Digital security devices includes secure personal devices like USB token, SIM card, secure chip or e-pass. These devices helps us to travel, bank, communicate or work using our digital identity in a secure, enjoyable and convenient way.
Digital technology is generating new ways and possibilities everywhere to work, transact and interact. Now a days we are surrounded by digital identities and data.
These devices facilitate us to use a variety of services. The advantages of digital technology are obvious however there are some security risks associated with it also. Doubtless, there are risks for every individual person. Government, company and personal info which we share over networks with the organization, folks and devices is also at risk.
Every device asked the following two questions to protect or limit access to these services:
 "Are you who you say you are?" and "Is my data safe with you?"
Digital Protection answers these questions with solutions. These solutions protect and enhance interactions and assets.
Examples of Inappropriate Digital Security


Followings are some examples of inappropriate digital security system
  • People are not using any security software for the protection of their computers
  • People giving their personal data and information to strangers 
  • People sending their data and information to questionable peoples/authors
  • People opening attachments, files and links from some unknown sources
  • People using storage devices without any security protection
  • People access to inappropriate site without using proxy server
  • People sharing their ID and passwords
  • People ignoring prompts appears to update software
  • People writing down their user ID and their user passwords for all web sites

Examples of Appropriate Digital Security
Some examples of appropriate digital security system are:
  • ·         Using secure software and update it responsibly
  • ·         People communicating through secured e-mail services or on secure sites with one  another
  • ·         People removing messages, links and attachments from unknown sources
  • ·         People who are aware of security breaches and report it
  • ·         People blocking inappropriate sites with the help of software.
  • ·         In order to keep system security up to date, set pc settings to do automatic scans, check and install updates.


USEFUL CMD COMMANDS

1. Add Hardware Wizard - hdwwiz.cpl
2. Add/Remove Programs - appwiz.cpl
3. Administrative Tools - control admintools
4. Bluetooth Transfer Wizard - fsquirt
5. Calculator - calc
6. Certificate Manager - certmgr.msc
7. Character Map - charmap
8. Check Disk Utility - chkdsk
9. Clipboard Viewer - clipbrd
10. Command Prompt - cmd
11. Component Services - dcomcnfg
12. Computer Management - compmgmt.msc
13. Control Panel - control
14. Date and Time Properties - timedate.cpl
15. DDE Shares - ddeshare
16. Device Manager - devmgmt.msc
17. Direct X Troubleshooter - dxdiag
18. Disk Cleanup Utility - cleanmgr
19. Disk Defragment - dfrg.msc
20. Disk Management - diskmgmt.msc
21. Disk Partition Manager - diskpart
22. Display Properties - control desktop
23. Display Properties - desk.cpl
24. Dr. Watson System Troubleshooting Utility - drwtsn32
25. Driver Verifier Utility - verifier
26. Event Viewer - eventvwr.msc
27. Files and Settings Transfer Tool - migwiz
28. File Signature Verification Tool - sigverif
29. Findfast - findfast.cpl
30. Firefox - firefox
31. Folders Properties - control folders
32. Fonts - control fonts
33. Fonts Folder - fonts
34. Free Cell Card Game - freecell
35. Game Controllers - joy.cpl
36. Group Policy Editor (for xp professional) - gpedit.msc
37. Hearts Card Game - mshearts
38. Help and Support - helpctr
39. HyperTerminal - hypertrm
40. Iexpress Wizard - iexpress
41. Indexing Service - ciadv.msc
42. Internet Connection Wizard - icwconn1
43. Internet Explorer - iexplore
44. Internet Properties - inetcpl.cpl
45. Keyboard Properties - control keyboard
46. Local Security Settings - secpol.msc
47. Local Users and Groups - lusrmgr.msc
48. Logs You Out Of Windows - logoff
49. Malicious Software Removal Tool - mrt
50. Microsoft Chat - winchat
51. Microsoft Movie Maker - moviemk
52. Microsoft Paint - mspaint
53. Microsoft Syncronization Tool - mobsync
54. Minesweeper Game - winmine
55. Mouse Properties - control mouse
56. Mouse Properties - main.cpl
57. Netmeeting - conf
58. Network Connections - control netconnections
59. Network Connections - ncpa.cpl
60. Network Setup Wizard - netsetup.cpl
61. Notepad - notepad
62. Object Packager - packager
63. ODBC Data Source Administrator - odbccp32.cpl
64. On Screen Keyboard - osk
65. Outlook Express - msimn
66. Paint - pbrush
67. Password Properties - password.cpl
68. Performance Monitor - perfmon.msc
69. Performance Monitor - perfmon
70. Phone and Modem Options - telephon.cpl
71. Phone Dialer - dialer
72. Pinball Game - pinball
73. Power Configuration - powercfg.cpl
74. Printers and Faxes - control printers
75. Printers Folder - printers
76. Regional Settings - intl.cpl
77. Registry Editor - regedit
78. Registry Editor - regedit32
79. Remote Access Phonebook - rasphone
80. Remote Desktop - mstsc
81. Removable Storage - ntmsmgr.msc
82. Removable Storage Operator Requests - ntmsoprq.msc
83. Resultant Set of Policy (for xp professional) - rsop.msc
84. Scanners and Cameras - sticpl.cpl
85. Scheduled Tasks - control schedtasks
86. Security Center - wscui.cpl
87. Services - services.msc
88. Shared Folders - fsmgmt.msc
89. Shuts Down Windows - shutdown
90. Sounds and Audio - mmsys.cpl
91. Spider Solitare Card Game - spider
92. SQL Client Configuration - cliconfg
93. System Configuration Editor - sysedit
94. System Configuration Utility - msconfig
95. System Information - msinfo32
96. System Properties - sysdm.cpl
97. Task Manager - taskmgr
98. TCP Tester - tcptest
99. Telnet Client - telnet
100. User Account Management - nusrmgr.cpl
101. Utility Manager - utilman
102. Windows Address Book - wab
103. Windows Address Book Import Utility - wabmig
104. Windows Explorer - explorer

Aaccess the Secret Hidden Menus on Android / iPhone

Here are some codes you can dial into the phone app that will access hidden information and menus in the iPhone:
  • *#06# – Displays IMEI
  • *3001#12345#* + “Call” – Accesses a hidden Field Test menu
  • *#43# + “Call” – Displays call waiting status
  • *43# + “Call” – Enables call waiting
  • #43# + “Call” – Disables call waiting
  • *#21# – Displays call forwarding status
  • ##002# + “Call” – Disables all call forwarding
  • *33*pin# – Enables call barring
  • #33*pin# – Disables call barring
  • #31#phone-number + “Call” – Blocks caller ID for the current phone call
  • *3370# + “Call” – Enables “Enhanced Full Rate” and improves voice quality on GSM networks (may impact battery life)
  • *#5005*7672# + “Call” – Displays your carrier’s message center phone number
Don’t worry, Android users, there’s some great hidden stuff on your phones as well. The problem, of course, is that Android phones all differ so much based on model and manufacturer.
Here are two notable ones — the first will work on most Android phones and the second will work on all Android phones:
  • *#*#4636#*#* – Accesses a hidden test menu with sections for network, battery information and usage stats.
  • Under the “About phone” option in Settings, tap “Build number” seven times – this will enable a new “Developer options” menu in Settings that gives you access to a treasure trove of functions.

Mobile Phone Genuine or NOT


Mobile Markets are full with Fake Phones and mobiles are being sold as original even with Branded tags next to it the replica phones are kept in the market that looks similar to the original phone, to make sure whether your phone is original or fake there would be two ways of checking it. These methods will help you during purchasing a used cell phone.

Check the following Features:

Be alert about the spellings for example, Soniericsson, Nokla and Samsang Warranties: Always ask for 12 months warranty certificate from the phone manufacturers; never trust on an oral agreement with the seller. Fake phones come with a short warranty periods as counterfeiters cannot give guarantee it will last so long Check handset in all aspects completely: Some people take phones home without testing it first.

Some dealers make you fool and encourage this, knowing the handset is fake. As you check it out,
you might observe some points of low performance or other issues such as memory which is cheap quality photos.

Appearances: like dull colours, screen size, quality of printing and paint finish, Fake built quality difference in weight, logos, location of buttons and battery, missing functions, quality control and holograms and lack of quality.

The other method is examining or checking Phones quality through 15 digit IMEI code:
                                            
                                                         Dial *#06#

IMEI stands for ( International Mobile Equipment Identity). This is a 15­ digit number and might be found in the packet of the mobile phone as well. It might be found by eliminating the back cover and it might be located on the battery.

The IMEI number may be as below:

                                             IMEI CODE
                                   3 6 9 3 9 5 0 1 2 3 5 5 6 7 8

Now view the 7th and 8th digit. These two digits will make sure your phone’s quality!
  • If the seventh and eighth digits are 00 this shows your cell phone is made in Original Factory which makes sure the best quality.
  • If the seventh and eighth digits are 01 or 10 this shows your cell phone is made in Finland which is best quality.
  • If the seventh and eighth digits are 13 this shows your cell phone is gathered in Azerbaijan which is too bad. And it is also unsafe and dangerous for health!
  • If the seventh and eighth digits are 02 or 20 this shows your cell phone is gathered in Emirates which is very cheap quality. 
  • If the seventh and eighth digits are either 03/30 04/40, this shows your phone is manufactured in China but its good quality. But is bad either as 00, 01 or 10.
  • If the seventh and eighth digits are 05 or 50 this shows your cell phone is made either in Brazil or USA or Finland.
  • If the seventh and eighth digits are 06 or 60 this shows your cell phone is made either in Hong Kong, or China or Mexico.
  • If the seventh and eighth digits are 08 or 80 this shows your cell phone is made in Germany which is good and fair quality.
  • This will help and facilitate you to select the good one but these tips might not work with the Sony Erickson Mobile Phone.

Microsoft Office 2010 Professional Plus

GRMK2-8Y649-JR6YB-XJXVW-XTP8P

VYBBJ-TRJPB-QFQRF-QFT4D-H3GVB

76XCJ-YMH2W-YQQV6-XX76X-QK3K7

BGCKH-CRYRT-49VQ7-YMCG3-BRBP7

W4D2C-3YK88-KMYP2-2QTXY-28CCY

9GVVR-X6VJT-WDDXD-YB4M2-RQ7CV 

TTK27-44W3B-PVC8K-XJQW8-KJMVG

TVFJ7-76TR7-HHCKT-QQFJR-8KTTD

XF9HV-MG4CV-KCK8F-T39WK-XW3QR

YDCTD-DKK23-4C3P9-CP8RB-9VVBV

6BWCH-DPPVF-MYQ3P-FJPCV-Y494Y

828CH-G4FPY-HMH4R-32GCK-6D9BH

4DRT4-F2M76-3WDJB-XGTRR-QF8KH

GRMK2-8Y649-JR6YB-XJXVW-XTP8P

MB8VG-KB3VC-D236C-H82YB-KYRY6

YQYVG-FR8DB-29J6H-3KBF7-BX286
4FXW8-97KD9-QFKDJ-FV3QC-CY34B

DX4MW-PB7F4-YR4WT-BV3MM-4YV79
BTH8T-MTYCP-4GKX7-3QQQT-86CB6
D8BR2-DR2JY-2GK9D-D7KT4-XGJVQ
PTGBH-XTT3P-RGDC6-VJDTC-TP6GY

XD86P-7DHKT-MHWYH-GDHVT-KYM6D

6BY4V-6V892-D2HQP-T2MP7-HXK46

YQMQM-9KV3J-97G7V-8CK38-346GW

6V9J9-4D3D8-X7KKK-MG4WP-QD9X3

MRPB7-8CBBK-YGPHK-F9JWW-D9KYB

4983Y-W3D73-QY6TX-K7FQD-V7Y8Q

VXWRP-C9HMB-PV487-R7GTR-VFDG3

BQHWD-TGT8T-QC7WW-86HWT-RCT6T

P8TFP-JGFMM-XPV3X-3FQM2-8K4RP

GM3C4-HQQJV-4TQMX-3R8CP-G928Q

DDY79-433JV-2RXGX-MQFQP-PFDH8

XHG6Q-DMJWD-97PYB-Y4CMG-MQ2CG

PTD4T-F6MTH-B7G7Q-2QCX2-6Y828

M2QKF-KDQ4R-YHQKD-M4YYK-GPWVD

HYRWT-T9RWG-43TFB-4X7HQ-T2TTQ

YGQ2J-Q26GM-R8FF8-JDC7M-KKGMV

Abbreviation of major IT companies

GOOGLE :- Global Organisation of Oriented Group Language of Earth
HP :- Hewlett - Packard
IBM :- International Business Machines Corporation
HCL :- Hindustan Computer Limited
WIPRO :- Western India Product Limited
GE :- General Electric
INFOSYS :- Information System
TCS :- Tata Consultancy Services
AOL :- American Online
BPL :- British Process Laboratory
INTEL :- Integrated Electronics
CISCO :- Computer Information System Company
DELL :- michael DELL
SONY :- Sound Of New York
AMD :- Advance Micro Devices
LENOVO :- LE (Legend), NOVO (New)
COMPAQ :- Compatibility And Quality

SYMBOLS WITH KEYBOARD

HOW TO MAKE SYMBOLS WITH KEYBOARD

Alt + 0153..... ™... trademark symbol
Alt + 0169.... ©.... copyright symbol
Alt + 0174..... ®....registered trademark symbol
Alt + 0176 ...°......degre­e symbol
Alt + 0177 ...±....plus-or­-minus sign
Alt + 0182 ...¶.....paragraph mark
Alt + 0190 ...¾....fractio­n, three-fourths
Alt + 0215 ....×.....multi­plication sign
Alt + 0162...¢....the cent sign
Alt + 0161.....¡..... .upside down exclamation point
Alt + 0191.....¿..... ­upside down question mark
Alt + 1...........smiley face
Alt + 2 ......☻.....bla­ck smiley face
Alt + 15.....☼.....su­n
Alt + 12......♀.....f emale sign
Alt + 11.....♂......m­ale sign
Alt + 6.......♠.....s­pade
Alt + 5.......♣...... ­Club
Alt + 3............. ­Heart
Alt + 4.......♦...... ­Diamond
Alt + 13......♪.....e­ighth note
Alt + 14......♫...... ­beamed eighth note
Alt + 8721.... ∑.... N-ary summation (auto sum)
Alt + 251.....√.....s­quare root check mark
Alt + 8236.....∞..... ­infinity
Alt + 24.......↑..... ­up arrow
Alt + 25......↓...... ­down arrow
Alt + 26.....→.....ri­ght arrow
Alt + 27......←.....l­eft arrow
Alt + 18.....↕......u­p/down arrow
Alt + 29......↔... left right arrow