Sunday, 5 February 2012

How to Undo a Sent Email in Gmail


Gmail is one of the biggest email service provider of Google. It gives you a vast memory of storage of above 7.49 GB during the time of writing this post. In mobiles we communicate via SMS for free of cost like wise in internet we send emails to communicate to others for free of cost. Basically every internet user owns his private email id. It’s natural that every human makes a mistake. But sending an email with mistakes might cause a problem anytime.

So, Gmail has a feature of undoing a sent email. By oversight or unintentionally if you send an email you can undo it in Gmail and the email will be saved in drafts and can be corrected and resend it again or you can trash that email. Undo is sudden option which can only be used when you accidentally send an email to others by mistake.


Steps to Undo a Sent Email in Gmail

1. Log in to your Gmail account. Now click on settings icon which you can find in left top bar. If not go to mail settings in old user interface and then you can find settings in that menu.

Undo a Sent Email in Gmail

2. Now in settings menu you can see the ‘Labs’ option click on it. Now you will find a normal search bar where you can type anything you want in that search bar.

Undo a Sent Email in Gmail

3. Now make a simple search for “Undo Send” extension in labs. You will find a cool Gmail Beta Plugin which helps in you in undoing a sent email by mistake in Gmail, now as soon as you Enable it and click on Save your Mail settings. Refresh your page otherwise Gmail will automatically load again so that plugin could start working in your account.

Undo a Sent Email in Gmail

4. Now just refresh the page of Gmail to see that Gmail Beta plugin in action.

5. Now you can try once by sending an email to anyone. Go to compose email or just click on any email and select the reply option in that email. Fill the spaces you want to send email and then click on Send, now you will see email sent and you will find a small Undo Option besides it to get that email back, click that and you email will be backed up in Drafts for future use. You can edit that email and resend it or you can trash that email if you don’t want it for further use.

Undo a Sent Email in Gmail

This feature has been introduced in Gmail since long time but yet many are still unaware of this. Don’t forget to reload the page or refresh your Gmail account once after enabling this. So, now you are not lagging behind with any new Gmail features. Now there is no word of mistake in your Gmail history.


How to Send mails from command line

Send mails from command line

Often times, we want to send log files or other emails from command line or want to script them. In this tutorial, I will show you how to do that using two mail clients mail and mutt.

Sending mails using mail:

mail (mailx is the newer version) is a fantastic program that can be used for sending email from command line or from within scripts.


The following example will send an email to admin@example.com, with subject “Apache is down” and text “Please check Apache at host name of the server”

echo “Please check Apache at `hostname`” | mail -s “Apache is down” admin@example.com



We can cat the contents of any text file, for example, log file and it will be sent to the recipient specified

cat “/var/log/apache2/error.log” | mail -s “Apache is down” admin@example.com

To attach a file, other than a text one, we need to uuencode (unix to unix encode) it before sending

uuencode banner.jpg banner_out.jpg | mail webmaster@example.com

The banner.jpg is the name of input file and banner_out.jpg is the output uuencoded file that we will be sent by mail.

To have text sent alogwith the attachment, we can cat or echo that text too

(cat /var/log/apache2/error.log;uuencode banner.jpg banner.jpg) | mail -s pic webmaster@example.com



Sending mails from using mutt:

With mutt, its same as using mail.

echo “Please check Apache at `hostname`” | mutt -s “Apache is down” admin@example.com

or we can cat the contents of a text file to show as body text

cat /var/log/apache2/error.log | mutt -s “Apache is down” admin@example.com

OR

mutt -s “Apache is down” admin@example.com

To send an empty body mail, use an empty line as the mail body:

echo | mutt -s “Software upgrades for `hostname`” admin@example.com

To attach a binary file, its even easier with mutt, just use the -a option

echo | mutt -s “New logo for the company” -a logo.gif webmaster@example.com

Hope you this creation added to your knowledge.


Delete any Facebook profile in 24 hours | Full tutorial

Delete Facebook profile

Actually this is not a hacking tutorial. Its only a trick by which you can delete the facebook profile of anyone. Yeah anyone ;)
This is my creation about the facebook security, so how it works what we need and how to do this ? Let me explain you in detail. If you want any help or suggestion then you can submit it in comments thanks for reading this tutorial of vivek creations Read more interesting post about Facebook here.
So, lets do it in some steps.

Step 1 : 


https://www.facebook.com/help/contact.php?show_form=memorialize_special_requests

Click Here first
This is the Url we will use to Report our slave. This Form allows you to report a deceased person (someone who is dead).



Step 2 : 


Complete the Fields: 
Explain: Full Name: Your Victims Full name(Name last name)

Date of birth: Go at his profile and click at Info tab and get his date of birth.

Account Email Addresses: Do the same thing, go to his profile and click on info tab and get his email addresses.

Networks: Again,go to his profile and click on Info tab and get his networks, copy them and paste in the form.

Web address of profile you would like to report: Just go to his profile and copy the link in the address bar.

Relationship to this person: To make more believable select Immediate Family.

Requested Action: Remove Profile Proof Of Death: This is the hardest part of this form. 
Now to make a proof of a death just Google in your language a "Death Certificate" or "Certificate of a Death". 
It doesn't matters from what country you are, Download any death certificate and edit it with the help of photoshop.
Save your image to desktop and upload it in one of the Image Free Hosting like: http://imageshack.us 
And it's done.



Yeah that is only the trick and that is only the creation. Think Think! Wink Wink ;) ;)


Now,


Additional Information: Write what you want, just write that you are in his/her family and you would like to close his/her Facebook account because you won't like that when he is dead, his Facebook is opened.
Attachment includes the note and its objects.


Finally Submit and wait for 24 hours. Please don't misuse my creation. Its only a service of facebook.
Thanks for a visitor of my creations.
If you want updates of our site than you can subscribe yourself through email. Just take a look on Right top of my site.


Read Also:

How to convert a Facebook profile to a Page

Mask My IP 2.2.5.6 | Full version Free Download

Mask My IP 2.2.5.6
Mask My IP 2.2.5.6 | 5.3 Mb

When you connect to a network, your computer has a unique identification IP-address as your home address, alerting everyone who you are and where you are. When you visit online stores, or send an e-mail, your IP address associated with this activity, and it identifies you personally. Hackers who steal personal data can get into your computer, monitor your activities, to steal your personal information. Mask My IP program will help to solve this problem. 
Key Features: 
- Hide Real IP Address 
- Surf Anonymously 
- Block ISP Eavesdropping 
- Guard Against Hackers 
- Prevent Identity Theft & Credit Card Fraud 
- Protect All Connections Including Wi-Fi 
- Defend in the Forum once be banned 
- Send Anonymous Emails 
- Easy & Effective 
- Auto / Manual IP Changing 
- 100% Clean & Safe 
- Compatible With A lot

Home Page - http://www.mask-myip.com/
Setup
+
Crack
Mediafire
4shared
2shared

Tuesday, 31 January 2012

All about Spiders, Crawlers, and Robots


In my first post of Seo sevices i am going to reveal some important terms related to SEO like Spiders, Crawlers and Robots. In my this creation i will provide a huge and deep detail of above terms. So lets start with Spiders


What are Website Spiders? 
Website crawling by website spiders is comparable to what a spider is real life does.  Google, and search engines like it, index your website by using these website crawlers which periodically come to your site.
 How do they relate to websites?      
SEO Spider Search engines use these website spiders to find your website and index it for future searches by search engine users. There a couple different ways a search engine may find your website and its pages to index.  One key to allow your site to be found is by having fresh new content and/or content rich pages.  Search engines don’t want to index old and irrelevant information.  A second key to get your website on Google is providing related article links, and good ones, on your page.  Providing good links to sites with a good reputation is very important, because those sites will provide you with positive linking to your own site.
Google, for instance, begins the website indexing process by using previous lists of URLs which had been generated from previous crawls.  Starting from these previously known sites, the crawlers continue on links from these sites.  Links which are shorter in length are the ones most likely to be followed, as crawlers deem those to be the most important. As you can see, links are the basis in web crawling and therefore a key for directing web spiders.
General Process of Web Crawling:
 Search engine spiders come to your site:
  • via links from other sites
  • your site’s previous relevance in the web directory of the search engine
  • due to the freshness of your site
Once on your website, the website spiders will read the content of each page.  The website crawlers site meta tags as well, and then follow the links that the internet site connects with if allowed.  The website spiders then return back to the depository, where the information is indexed.  Those links which are on your page will be indexed as well, unless meta tags prevent them.  This process is discussed in the Follow/No Follow blog by Vivek Creations .  Website spiders return periodically to check for any changes in information.  Regulatory of this depends on the moderators of the search engine, and it is something you can’t control.  Crawl frequency and depth are things which you can control.
Submitting a sitemap to the search engine is a major influence on the engines ability to better crawl your site.  The sitemap allows the engine to understand your website once the web spiders come to your website, and helps provide changes on the site to be indexed quicker.
What is a Robot.txt (robot text files)?
Robot.txt files are a website tool which can tell the spiders which pages to index.  By placing a robot.txt on the website server with either allow or disallow tag, it provides a set of instructions to the web crawlers which visit the page.  Essentially, robots.txt files are used to map out your site to the crawlers for what they can and cannot index.
The benefits of using a robot text file:                                                                                                                                    SEO Robots
  • Avoids wastage of server resources
  • Prevent website crawler access to pages which you don’t want to be indexed such as login pages
  • Prevent search engines from indexing pages which are still being built
One item to consider is if you want your entire website to be readily available to website spiders placing the robot.txt in your server isn’t necessary; not even one which allows everything.  Leaving the file out completely is the best decision to go with.
By knowing your website and providing search engines with quality pages will allow your site to get to the top of Google, and by properly using robot.txt files will help to improve website navigation.

In my next post of seo services i will explain about Meta Tags in well explained way.
Thanks for reading my post.
If you want to ask or having any doubt regarding my post than you can mention in your comments.

Monday, 30 January 2012

How to convert a Facebook profile to a Page

Facebook new page

I am going to share a awesome trick to converting a profile into a page.
So whats new in it ?
Ok let me tell you a very interesting thing in it, If you have a facebook profile with friends 2,000 or 3,000 and you convert it into a page. Then

The number of FANS in page = Number of friends in profile  (This is the trick)

We know its a great idea to make a huge fans facebook page. Do you like this creation ?
Hmm.. Now how to convert a profile in a page. Lets read here and keep yourself updated on Vivek Creation


  1. Click Here
  2. When you convert your profile (timeline) to a Facebook Page, Fb will transfer your profile pictures and add all of your friends and subscribers as people who like your page. 
No other content Facebook will be carried over to your new page, so be sure to save any important content before beginning your migration.


To avoid losing important content, we recommend taking these steps before you convert your profile (timeline):

  1.  Download your profile (timeline) information. You can download a file that contains all of your sent and received messages and all of the photos and videos you’ve uploaded to Facebook.
    
  2. Appoint a new group admin or a new Facebook Page admin to any groups or pages that you manage. The account you’re converting will lose these admin rights during the conversion process. 

Enjoy :)

For more Facebook Tricks Click Here 

Thursday, 26 January 2012

How to Prevent a website from SQL Injection Attack | Full Tutorial


A SQL injection is a common programming error the consequences of which can be really devastating. Many successful hacking attacks start when a hacker discovers a vulnerability that gives an opportunity to inject SQL code.

When an SQL injection occurs, the structure of an SQL query is compromised and as a result you are left at the mercy of the potential hackers. If there is a vulnerability found, hackers can exploit it to gain access not only to your site and database but in extreme cases also to your corporate network. When hackers can inject their code in your code, they can do what they want.

Why do SQL injections happen so often?


The shortest answer is that SQL injections are so popular because of poor programming. Hackers know about the potential of a successful SQL injection attack and they search for vulnerabilities. Unfortunately, very often they don’t have to search hard – vulnerabilities pop right in their face. On the other hand, the risk for a hacker from executing an SQL injection is minor, while the potential rewards are lucrative. What else could a criminal ask for?
Therefore, don’t rely that hackers won’t bother with your site and don’t leave the door widely open. Nobody says that each vulnerability of this type will turn into an attack but it’s not wise to take any chances. The good news is that fortunately, SQL injections are also relatively easy to prevent.

Steps to prevent a SQL injection attack


Basically, there are two fire-proof ways to make an SQL injection impossible:


  • Don’t use dynamic database queries.
  • Don’t accept user input in queries.

However, obviously these two steps can’t be done because if you follow them, then the sites you can create will be very static and in today’s Web this is not a solution. What you can do, is minimize the risks when using dynamic queries and user input. Here are some basic principles that apply to any programming language:

1. Patch your SQL server regularly


Before we get into the coding part of the advice how to prevent an SQL injection, we need to start with the fundamental issues. SQL injections might be a frequent programming error but they aren’t the only way for a hacker to break into. If your underlying software – i.e. the database and the operating system have vulnerabilities, then your efforts to secure your code become obsolete. This is why you should always patch your system, especially your SQL server.

2. Limit the use of dynamic queries

As I already mentioned, dynamic queries are the door to SQL injections. Of course, it might not be realistic to expect that all dynamic queries can be trashed right away but some of the ways out are stored procedures, parameterized queries, and above all – prepared statements. The exact approaches vary from one programming language to the other but basically any programming language offers good substitutes of dynamic queries.

For instance, the PreparedStatement() with bind variables in Java, or the SqlCommand() and OleDbCommand() with bind variables in PHP, or strongly typed parameterized queries with bindParam() in PHP are all possibilities to explore.

3. Escape user input


The second biggest evil for SQL injections is user input. While you can’t always avoid user input completely, the next best thing is to escape it. Escaping user input doesn’t do as good job as limiting dynamic queries but still it can stop many SQL injection attacks. For instance, if you are using PHP, for GET and POST, use htmlspecialchars() to escape XSS characters and addslashes(), in case you using database. Alternatively, you can escape user input from inside your database but since the exact code varies from one database to the next, you should check with the docs of your database for the exact syntax to use.

4. Store database credentials in a separate file

In order to minimize the damage in case of an SQL injection attack, always store database credentials in a separate file. This way even if a hacker manages to break in, he or she won’t benefit much.

5. Use the principle of least privilege

The principle of least privilege is a security cornerstone and it applies to SQL injections as well. For instance, when you grant a user access only to the tables he or she needs rather to the whole database; this drastically reduces the damage potential.

6. Turn magic quotes off

Turning the magic_quotes_gpc variable off can also stop some SQL injection attacks. Unfortunately, this isn’t always a reliable measure because sometimes magic quotes might be off and you are unaware of this but still it is better than nothing. In any case, you need to have code to substitute quotes with slashes. Here is the simplest way to do it:

if (!get_magic_quotes_gpc()) {
$username = addslashes($username);
$password = addslashes($password);
}

7. Disable shells


Many databases offer shell access which essentially is what an attacker needs. This is why you need to close this door. Consult your DB’s documentation about how to disable shell access for your particular database.

8. Disable any other DB functionality you don’t need

In addition to the shells there are many other functions in a database you don’t need. While not all of them are a security risk, the general rule here is that less is more. Just remove or at least disable any functionality you can do without.

9. Test your code

Finally, the last step to ensure your code is SQL injections-proofed is to test it. There are automated tools you can use to do this and one of the most universal is the SQL Inject Me Firefox extension. This tool has many options and many tests the best is if you have the time to run all of them.

All these steps to prevent an SQL injection are relatively easy to implement but failing to do so could make a huge difference. If you stick to these rules, you will drastically reduce the risk of your site being compromised via a SQL injection. Still, you can never be 100 per cent sure that you are completely protected against such an attack (or any other type of attack, to be more precise) and this is why you need to keep an eye on your logs so if a breach occurs, you will know it right away and react appropriately to minimize the damage.

For more about website security you can visit my all posts on WebSite Security
Thanks for reading this creation.
Be updated always here :)