Showing posts with label Tech news. Show all posts
Showing posts with label Tech news. Show all posts

Wednesday, September 24, 2014

Kajal Majhi

If you are a celebrity, you are vulnerable to hack

By     No comments:

celebrity, celebrity logo, celebrity account compromised
No doubt that celebrities are more talented , good looking and intelligent than us but they are damn vulnerable to hack.For example, lets take the Oscar winner Jennifer Lawrence , recently whose’ extremely private photos were leaked by hackers from the Apple’s cloud storage service. Celebrities are being targeted because their private data are extremely valuable in the underground markets as well as many hackers try to show their skills to the world.

Why Celebrities are vulnerable to hack?That’s what this topic is about. When we forget our password of some websites we try to recover them from the ‘forget Password’ option, and there we have two or three option two reset or retrieve our password , first by receiving a password rest link in our email id, secondly we have to enter the ‘one time password’ received on our cellphone else we have to answer the security questions.Skip the first two options and lets try to answer the security questions.  Most of the account’s security questions based on the followings :

  • The place where you were`
  • In which year you were born?
  • Your childhood nickname ?
  • Which High school did you attend?
  • Your Childhood best friend name?
  • Your birth year?




If you are a celebrity or a popular person then all the answers of the security questions are already out there around the internet . Turn on the Wikipedia pages you will get all the biographical information from the birth year to yearly life story.A celebrity has to face different questions which belongs to their personal life, likes dislikes, hobbies as well as career . Hit the search engines and it will retrieve all the information published on the online portal of news and entertainment channels .   Their social profiles also yells various internal information about their daily life activities which can be the key of the security questions.

Well, nothing is secured in internet but one should adopt latest security features which are availe by their service provider such as Dual authentication systems , fingerprint recognition system etc so that a hacker have to access the celebrity’s device or have to plant malware to see the one time password which is not impossible but a difficult task.
Read More

Wednesday, September 3, 2014

Kajal Majhi

Story of cloud storage security

By     No comments:
keyhole, digital keyhole, internet security wallpaper

The recent phenomenon of compromising the cloud account of Hollywood stars and leaking their private pictures around the internet , has been the hottest topic from last few days. As this incident has tickled the medulla of website moderators , security analytics and cloud service provider  that what to do. Really it is a million dollar question “What to do? “   Because it is the matter about security and privacy of the users.

Yes we can do a lot of things , but there is an one strong point which everyone should know. “Nothing is 100% secured in the internet”  Not mine, not yours and nor even the geeks who designs security protocols .  Internet is the game of codes, hardware, connectivity and we users . The things we human knows to build , does also know to break it, If it is not possible by punctual manner then there are lots of hammering and destructive way to break it.

Understanding the cloud storage

Cloud storage service has been built to bring flexibility of data sharing and migration anytime and anywhere. Once you upload your data then you can retrieve it from anywhere in the world. You don’t have to carry your own storage device , you just need an computing device with an internet connectivity .

So, here I have a question, where does you upload your files?
Sorry, don’t get me wrong,  but I have to say this.  Point to the line above “you don’t have to carry your own storage device” . So you are uploading your data to someone else’ storage media isn’t it? Where you don’t have any idea and control other than accessing your files and configuring your account’s digital security.  You don’t know where the storage media is,  about the physical security in the data warehouse of cloud service provider and so on. Its like handing over your important things to someone else.

Is your cloud account secured?

cloud storage service, cloud security

Keeping the point in mind “Nothing is secured in the internet” . But there are lots of way by which we can prevent or extend the duration to crack the security . Almost every cloud service provider has multiple security option some of them are by default and few of them have to configure by the user itself.

Two step authentication is one of the most important security measures that should be adopted by everyone , for not only your could account but also for your email and social accounts. In dual step authentication , first you have to enter your primary password and then the server will send you a text with a code, that’s your secondary password.

Authenticate by generating code using your smartphones cloud apps.

Pincode : It is generally generated once during enabling this feature. You will need to remember this incase you have enabled dual step authentication but you don’t have your cellphone with you.

Security question : Never choose an security question and answer which are know by anyone other than you.

Enable the SSL encryption.  Many cloud service has SSL by default and few have to configure by the user itself that he wants SSL encryption or not.

Secure your computer first

computer security, localhost security, hacker eye

What is your primary computing device? Your laptop, desktop, tablet, iPad, or smartphone?  Do a proper maintenance of your device on a regular basis. Don’t keep the unusual applications and programs as it may bring security flaws.  Use a total security program consist of anti virus, anti malware, firewall , spam/phishing detection system etc. Do the updates of your operating system once in a month to get security patches .
Apart from these, spend your little more precious time over internet to learn about worms, malware, virus and information security threats . It will help you to deal with daily life phenomenon.

How is your smartphone?

Smartphone is one of the most important daily life gadgets , without it we feel like we are out of this living world isn’t it?
 Yes it is,  it has more secret information than your social id does and can be the target for your competitors and malicious hackers.  Never Jailbreak or root your smartphone if you want to keep it safe. Root and Jailbreak can break the security level of your smartphone and becomes vulnerable to information security threats.  Keep a security program in your smartphone , by which you can wife the storage remotely if you ever lose it.


Few lines from my opinion.
Cloud storage is great innovation and technology for this developing IT infrastructure of this world. You can backup your data for emergency purpose, you can share work and office documents with clients and workmates , and much more. But I don’t recommend it keep your extreme private data on cloud storage as cloud storage device are not managed by yourself . If it’s the matter for your extreme privacy and security then there is no safer storage device  in the world other than your own isolated hard drive.




Did you get bored? Sorry about this :)  please express your anger by dropping your comment below :) 
Read More

Friday, July 25, 2014

Kajal Majhi

My dream phone a real smart

By     1 comment:

If it is possible to grab the world in my hand , use the technology to most then  I will use my smartphone to do that. In the modern era of high end technologies we have reached much ahead that we may not have imagined a decade back . An innovative trend of the product of technologies is smartphone , in which we carry our world, connectivity, accessibility , entertainment and captures in our pocket.
I wish If I can enhance the power and features then it can do what others can not do and It will really change the way of our daily life activities. Smartphone are something on which we are very much dependent like accessing the internet when we are away from computer , enjoying movies , sports and other videos when we don’t have a television by our side, a handy tools to click pictures, and so on, and if we combine more features within it something which is really innovative. Read my wish list that I want to combine all these to form a real smartphone and with which the stuffs that I can do and others can’t’ . Follow me :

Artificial Intelligence


Call it Artificial Brain. In the smart world everyone want their device to work smartly , effectively and efficiently . I want my smartphone to have an Artificial Intelligence system or artificial brain that will work like machine and act like human.  It will have pre installed initial features and programs but it will also learn to stimulate with users , from interaction of humans like a small grown baby then each and every day it will learn something new and its’ functions will increase may be limit to infinity.  The ability to learn, think analytical and react according to changing condition will really bring blaze in smartphone and computing.
For example, if someone is calling and the user(receiver) is not near by the device then the device will receive the call itself and talk like its user and save the conversation for him/her.
If  I want to write something , I don’t have to speak loudly or type , I can just move my lips and I will detect what I want to speak.  Or it will detect the words just by moving my fingers on air from a distance etc and so on.



Smart processor
Obviously a smart device needs a very smart and powerful
processor that can handle high end task effectively and efficiently without any hindrance . A smart processor which is going to work with artificial brain should be biologically inspired  modelled like real life neurons which is capable of learning from the feedback of users. It should be fast enough to do multiple task at a same time at the same speed.
One common issue for smartphone processor is extreme usage of battery,  but the smart processor will consume very less power and conserve the rest for rest of the process in the device as well as the device will be enabled with multi source of power such as it will absorbe power from geothermal  heat, heat emitting from human body  and solar energy in such way that If it is consuming one source of energy it will automatically charge it’s battery cell from secondary and tertiary source of energy so that I do not have to worry about losing or charging my smartphone.



Smart display screen with holographic interface 



Indeed a smartphone without a smart screen is incomplete since touchscreen has replaced the traditional approach of input now it screen is only the primary output and input device for smartphones. We can enhance it more by including a holographic input and output. Holographic display will give more impressive output , explore into more depth  of the things, as well as diaphragmatic view will express more of the content beautifully  for high tech gaming  The interface will be much better, one need not have to use the small touch screen anymore to type , draw slide and zoom,  with the holographic interface one can change the resolution size of the interface according to his/her preference which will stand as much better and user-friendly input method .  We can move the images around, push them right onto the table, interact with the area above table and do many other manipulation using see-through and reach-through mist screen.one can have many screen instead have single small screen with minimal display.


Accessibility, Connectivity and security.

The internet has already minimized the distance between the people and countries ,  and no doubt there will be much improved and advance connectivity within next few years and compiling these advance network features with such smart device there will be much  connectivity and accessibility to our online world. We can explore much better , we can build a much secure access by the security and defence system of artificial intelligence , as it know what is harmful and what is beneficial for your device , it knows what is your confidential data.

One in all

We prefer laptop instead of desktop for portability, tablets and pads instead of laptop , we prefer more in portability, so why not all in just one small handy device ? if it has a powerful processor , artificial intelligence , holographic input and output , connectivity, accessibility then it is possible to have feature of advance computing and heavy tasking like we do in our desktop or laptop.  The processor and artificial intelligence will do the real tough job of computer, holographic interface will be the primary means of input and output ,  connectivity which will connect the device to world in all means , and the intelligence security will provide smart a authentication and accessibility as It know the human behaviour  it will provide much better defence from hackers and spammers .

So I don’t need to buy a big damn computer for normal desk job, I can easily create presentation,  edit multimedia files , computer added design ,text  documents from just a small handy smartphone laying on bed. Isn’t good?  Imagine the capabilities of a smartphone with these features , It will create dynamic change in computing ,  network and communication  .


This post has been written for IN SEARCH OF INCREDIBLEblogging contest held by ASUS at Indiblogger. Follow the link http://www.asus.com/campaign/zenfone/IN/



Read More

Sunday, July 20, 2014

Kajal Majhi

How to securely delete all files

By     1 comment:

Are you planning to sell your smartphone, tablet, laptop? Then you should be aware about few important things about privacy and protection of your data. Every mobile devices has an internal memory and it may have lots of your personal photos, documents , videos and other important files.
What normally people do is “Factory reset” or “Format” by plugging into the computer .

But beware, if you are going to hand over your device the it may not the correct way to securely wipe your every data.  Anyone who have a few knowledge about software can easily recover your deleted data by using freely available data recovery tools like windows kernel and recuva until you overwrites the data randomly. So, don’t fall in the prey of blackmailing your privacy is in your hand .

But there are always an way to get out of the problems which I am going to tell you.

How to delete all files securely in Android ?
                      
                        


If you are not having PC then don’t worry a single apps will do all the required work. It is FILE SHERDDER which is available in playstore.  It claims to delete all your files securely in your android device, I am not sure which algorithm does it use to overwrite the data but I have tested in my Micromax Bolt A56 and it works pretty well and I liked this apps very much.
I tried to recover the deleted files using Forensic imaginer and what all I got is overwritten data , which is not an easy task for a normal person  to extract data and meta data from a over written file. Isn’t it?

How to delete all the files securely in windows?

In our daily life we do many random things like we give our pendrive/usb drive to our friends , we try to sell our laptop and so on. Have you deleted your files securely? It’s the same case like I told you above , any files is not securely deleted until it has been overwritten by random files.  So before you going to hand over your device please wipe your important data properly and this applies to all flash drive, external hdd,  SD card, cellphones , laptop and so on.
Here I  have mentioned few tools which will do all the work for you.

CC-CLEANER


Its an tool with a complete package and most commonly used utility software. It have the features to wipe internet history, cookies, seasons. It can delete the system memory dumps to free up spaces, it can also edit and delete the registry. Apart from this in the tool section there are more important tools like drive wiper with many overwriting phases such as 1 passes , 3 passes , 7 passes, 35 passes .
You can choose the 7 passes that is complex overwriting to wipe your data securely. I am in love with this software.
Download CC-CLEANER


EARESR


It’s a tool which has been developed only to securely delete your files and it does its’ work very well. I personally recommend you this tool if your only intention is to wipe your files . Its an user friendly, overwrite and delete the data using 7 passes and 3 passes method. Even you can add the files and folder and schedule it to delete the data on that  specific time.

Download Eraser  




Read More

Tuesday, April 15, 2014

Kajal Majhi

Power of cloud computing

By     No comments:

Technologies has pulled the world into a modern era , where internet has become our primary source to connect around the globe. From last two decades internet has played a vital role to pull the mode of communication, data transfer and work in the most advance way as it possible.

You know, we have fully adopted the technologies for our daily life, and when our life changes then the mode of our requirement changes too. The emergence of new generation computers, smartphones, tablets has brought an evolution in computing and world wide web.  I think you are already using the cloud computing service if you are using web based mail services such as Hotmail, Gmail, Yahoo Mail etc, through which you can access the email services from any device having a internet connectivity and from anywhere in the world.

So, What is cloud computing?
Cloud computing is delivery of computer resources over internet rather than storing those resources in our own personal computers. Cloud service allows us to use the software and hardware resources that are managed by third parties (cloud service provider) at remote location.  We can use the cloud computing service over internet from any location. We can retrieve our data and information from anywhere in the world being connected with cloud service.
Imagine you are running a company where each and every employee need a computer system and some software installed in their allocated system and who have to purchase licenses for those software. If you manage your own centralized database for your company then , you need system administrators , high storage space, server maintenance ,system cooler,  security, uninterrupted power supply and so on. If there is a new updates in the server’s  software & system then the entire system workstations will go down until they don’t get supportive update packages. 

You are already using some cloud computing services such Gmail, Yahoo mail, Hotmail, Facebook,  online file hosting service etc, do you need any updates? Do you need to run them by burning your own electricity? Do you have a technical team to keep on eyes on these? Do you need security enhancement every month? Its NO, all it gets automatically and you don’t have to worry about anything. That’s the pros features of cloud computing.

So, what if instead of running your own system and servers , let the third party company host the applications, storage spaces , hardware and other services for you, then  you don’t  have to worry about security, upgrades & updates, technical team etc., you have to pay only for those things you will use as a monthly subscriptions, no extra charges, no maintenance and upgrade expenditures , you will receive upgrades automatically . The only thing you and your employees will need is a cloud computing interactive software , just log in and get started.
The cloud computing have almost every services from commercial apps, business apps, online  business and marketing systems , live collaboration system and much more. You can even demand a service from you cloud service providers.



The Power of cloud

I am in love with cloud computing because of its extensive features, the live collaborating system is amazing , especially when I am doing online study, its helps me to interact with my fellow mates and mentors   with hands on coding , sharing  and editing the same data at a once .
I feel   proud  that, I have achieved the certification of  Certified Android Developer and Certified HTML5 Developer through online mode and practicals on cloud platform. Its fun when more than one people work on the same file, its makes me feel more than a class room.

The cloud storage, where I keep my personal data as backup,  I had to face hard disk crashes, lost my smartphone , but cloud storage helped me to come out of those depression , where I feel my data are safe, I can access my data from anywhere whenever I need, I don’t need to carry a giant laptop or hard disk where it is unsafe , only an internet connection and a small device can retrieve my all the data I need.
There are some business and word processing apps are freely available at some cloud service , I use them which cut the cost of purchasing those software for my computer .




NOTE (the privacy policy):
The biggest concern about cloud computing is the privacy  policy because in this system we handle over our personal/commercial data to another companies. It is necessary to read the ‘privacy policy’ of the company whose’ cloud service you are going to use. There are few more things that you should be concern  such as, does the company who claims to provide cloud storage space actually own it? Does the company has enough data security system to protect the clients’ data? Does the company has enough physical security for the data warehouse? And much more.








This post has been written for ‘I code with cloud power’ blogging contest held by Microsoftat Indiblogger.in
visit http://www.windowsazure.com/en-us/pricing/free-trial/













TOPICS
WHAT IS CLOUD COMPUTING
BENEFITS OF CLOUD COMPUTING
CLOUD STORAGE
WINDOWS AZURE
Read More

Monday, March 10, 2014

Kajal Majhi

How to protect identity theft in online banking

By     No comments:


Online banking system has made our life easy and trouble free from daily hassle and save a lots of time as everything is a click ahead, but no doubt that there are lots of bad people around us due to which there is a possibilities of our account being hijacked or theft of our identity & banking information. 

Malicious people/hacker are always looking for  your personal information like bank login data such as id and password,  credit card numbers, social security numbers  etc. They will attempt various methods like by sending malicious email, backdoored software, fake call etc   to gain access  in your bank account. So when it comes about the matter of online financial transaction, we always need to be precautious.   You should follow the following steps to keep your account secured.

Secure Websites | Secured Browsing

secured banking website
If you need to send & receive confidential  like banking and company’s secret  data through a website, first make sure that the website is secured . Now a days almost every banking websites  and other important websites  have  secured socket layer , through which we can send the information to the server in encrypted format rather than in plain text. It will protect the sensitive data from being sniffed. To be sure the website is secured or not, look at the left of the address bar, if it is secured the address bar will have https protocol with green text and an icon of lock.

Malicious Website | Cloned/Phished Websites

cloned website, phished website
As I told above an important website must be secured over SSL , the malicious people may try to fool you by redirecting you to the fake websites that’s look like the real one. But a fake website will not have a SSL certificate or https encryption . So make sure that the security of the site is well configured and never ever click on any link send to you by other people says that it’s a banking website.  If you can’t conform yourself that the website is real of fake, then Google & Wikipedia is always there for your service.
You need some configuration in your browser too. In the cookie settings never set it to “Accept all cookies” , turn on the “Phishing filters” and also turn on the  “pop up blocker”

Malicious Email | Pop up message
If you receive any suspicious email saying that you have won a grand prize and your email id is in their random list, don’t give any response to these types of emails. Such emails are the traps to collect your personal information like banking  and other data .  Sometime pop up ads on website displays something greedy like You have won a IPhone,  you are their lucky winner and blah blah , don’t click on such ads. Go to your  browser settings and turn on the pop up blocker.

Fake Call | Social Engineering

If you receive any call  and says anything like this call is for security purpose and they need your bank account details like credit card number, log in id & passwords to verify your identity, Beware of such calls! It’s  a to hack into your mind and collect your personal data. Banks will never call you in such way, if banks have any security upgrading you will receive a postal letter from your bank or they will call you to visit the bank for confidential work.

Bank Statements | Credit card statements.
Kindly verify the bank statements personally from bank, if you see any unusual charges or transactions.

Malicious Software | backdoor
Beware of free software and email attachments which may contains malware and keylogger that may infect your system and record your every online activities , collects the important sensitive data and sends the information to the attacker. Use a good anti-spyware & antivirus to protect your system from unusual software. Antivirus and antispyware needs regular updates ,















TOPIC
HOW TO PROTECT ONLINE BANKING ACCOUNT
HOW TO PROTECT IDENTITY THEFT IN ONLINE BANKING
HOW TO DO SECURE ONLINE BANKING







Read More

Sunday, February 9, 2014

Kajal Majhi

How to stay safe online

By     No comments:

cyber security, cyber security tips, basic saftey tips, stay safe online
pic credit: www.shutterstock.com

Cyber security & it’s awareness is the need of the hour. In this modern world most of the people know how to use the internet but, most of the people don’t know about the online threats & how to secure the internet.  Everyone should be aware about the online threats .As the technology is progressing, we are getting more dependent on them to make our life easier by the online ways  of daily life stuffs. Let it be socializing at Facebook, online business deals & presentation, cloud storage, paying bills online, making reservations or sending  private emails etc. everywhere we need extreme privacy, authenticity , security & confidentiality . 

 But there are many threats around the internet such as information warfare, cyber terrorism, malware,  violation of data integrity, phishing, Disturbed Denial interruption of service and so on, by which the malicious hackers try to steal  private data, high sensitivity business information , and much more. They even collect our personal information and sell them to the other people for huge price of money. People who are not aware of these things can be easily a victims of such incidents.
Here I have some basic security tips for everyone that can be helpful to avoid such threats in our daily life activities.

PASSWORD:Don’t use the same password in every websites, because if a website’s security is compromised then a malicious hacker can have access to all your data, he/she will may use your LOGIN data at many other websites  to get access, If you have used the same password and user ID the hacker will gain access automatically.
Always use a unique & strong password that the word should not exist in any dictionary , consists of capital letters, small letters, numbers and special characters .example: ‘Xs&5@a3zt! M’

TWO FACTOR AUTHENTICATION : It means authenticating in two steps, in this feature you have to prove yourself twice that you are the real one, first by entering your user id & password , then in the second step you will receive a code in your cell phone which you have to enter in the website. It helps more to protect your account from unauthorized access in your absence.  Almost in every daily usage websites such as Google, Apple, DropBox, Microsoft, LinkedIn, Facebook, Twitter has this feature.

SYSTEM SECURITY: Use a good firewall & antivirus in your computer, update them regularly to protect your system from virus, worms & network attacks.  Stay away from junk software that’s says to make your system run faster, cracks & hacks of software & accounts. These type of software are mainly backdoors & key-loggers  that records your keystroke, interrupts in the normal process  and lead to  vulnerability of system .

HTTPS SECURED SURFING:  If you attempt to do any financial transaction online like online shopping, paying bills and online banking etc, always use https:// instead of http:// . The https protocol sends the information to the server over secured socket layer rather than in plain text. It will protect your financial data from being sniffed by malicious hackers.


 SMARTPHONE PROTECTION:  Smartphone has brought the world into our fingertips, It allow us to communicate , navigate, connect the internet, shoot the pictures and much more, that means we have thousands of data in our smartphone, data like contact numbers, personals images, email id, record of instant messages & much more. Now a days Govt. & some malicious hackers targeting the smartphones users for surveillance & to collect data. So beware of everything what you use, what you install from outside, with whom you share. Don’t install junky apps which are for fun & entertainment , because they are spam and backdoored  and can harm your phone.  Install apps from only the trusted apps market . And always notice what type of permission does the apps seeks
, for example an app for playing video will never require to access your contact book, if any apps ask you to permit for any unnecessary access , then it is for sure that the app is spam/malware/backdoor.

SOCIAL NETWORKING: Social networking is our another world where we spend most of the time than eating , sleeping & studying. According to recent survey of Indian Cyber Cell, about 40% of crimes against women originate from social networking websites.  It is an important place where we add strangers and make them our friends, we share images & videos with them , we chat for countless  hours without knowing much about them , so here we need  extreme security & privacy.
Before adding anyone into your friends circle make sure that the profile is legit and belongs to the actual person as it is named, check his/her profile updates that there is not any offensive contents. Change the accessibility mode of you photo albums & updates only to friends or  with the people only with whom you want to share. Hide your address & keep your contact number private, that means only viewable to you. If you see any fake profile or someone is bothering you then block them & contact the website’s help centre.

PREVENT IDENTITY THEFT: Hackers are all around, they can retrieve a lot of information about you, network connection &  your device just by your IP address (Internet Protocol).With the retrieved information the hackers can easily try to get access into your device , even they can mask their IP with your IP address.   If you are doing very confidential work and sending very sensitive data over the internet then you must hide the real identity of your device, by using secured proxy servers , or setting up own virtual proxy network or by using tor browser which hides your real identity.


BEWARE OF PHISHING: Phished website are cloned pages of original website, they looks almost real like the original website but these pages are trap to collect the User ID, Email id & passwords. Remember, any legit website doesn’t ask about the details of your email account.  For example, Gmail id & password, Facebook user Id & password etc. If any website ask you to enter these, then  no doubt that it is a fake/phished page.

INTERNET COOKIES :  Cookie is a small file that is generated from web server & placed in the user hard disk for the user identification. Malicious hackers can steal your cookie & hijack the season between you and webserver . If you use public computers at office, college, cyber café or somewhere else, then clean the cookies after use. You can do it by going into the browser settings.

“Remember, nothing is fully secured in this world, everything is breakable, we can only apply some tricks  and methods that will take time to break which is enough to aware ourselves  .”












TOPICS:
HOW TO STAY SAFE ONLINE
BASIC CYBER SECURITY TIPS
HOW TO SECURE YOURSELF ONLINE
TIPS TO STAY SECURE ONLINE



Read More

Sunday, January 19, 2014

Kajal Majhi

what is two step Authentication

By     No comments:


Most of us know how to use the internet but most of us don’t know how to secure the internet.
In this cyber world, security is very essential,  because most of our daily life activities from sending personal and business E-mails , banking transactions , to our virtual world of social networking  are done online.
Having online security doesn't mean only for your online bank account, it is also for your  email account, social networking  website such as Facebook, twitter  etc. Because everyone is associated with each other directly or indirectly and among which your email account is the main key to every websites. Well..

 What is two Step Authentication ?
 Authentication is verifying your identity to the system by entering your  user id , password  and gain access to use the services of the system.  Where as to ensure more security, two step verification is verifying your identity in two steps. First step is by entering your User ID/Email ID and password, then second step is  verifying by something  that you always keep with you that proves that you are the real one. So in second step you always need your cell phone , in which the website will send you a code and you just need to enter the code and get full access.

I know it’s a bit of lengthy process as you have to keep your cell phone always with you and wait for a minute every time you try to log in and its makes you feel painful, because in the E-world we want everything quick and easy , but these things doesn't matter if you want to secure your online assets .

Imagine your friends know your Email ID and Password , and he want to access your account in your absence to spy on your personal feeds, then what? He will enter your first authentication data correctly but he will stuck at the second step when the system will ask him to enter the code that has been sent to your cell phone. Isn't helpful?

Most of our primary usage website have two step authentication system, like in Google, Facebook, twitter, LinkedIn, Microsoft, Apple , DropBox etc.

How to Set two step Authentication 


Lets start with Google account.
Just  goto your Google account at http://accounts.google.com then move to ‘security’ section and enable “2 step  verification”. All you need is your cell phone number , if its not verified then kindly verify it. All the options are there.


DropBox  2 step authentication
No doubt that dropbox is an important website for cloud storage for personal or commercial purpose and it needs security indeed, It also supports authentication by SMS . You can set the 2 step process from your account settings and then move to security section. Whenever you will use a new device you need the SMS code to gain full access into your account.
image source: flicker.com 


  
Twitter ‘Two factor verification’
Twitter call this process ‘two factor verification’ . You need a verified phone number to get started. Go to your twitter account settings , Select ‘required a verification code when I sign in’ then click on add phone and follow prompts. You will receive a six digit code whenever you try to log in.





Microsoft
They lunched this system recently and obviously  people need this in their Microsoft account because with only one account it gives the access to Xbox, Outlook, Hotmail, Dreamsparks, SkyPe and I don’t know how much more . To enable this system goto account settings move to “Security Info”  then click on “set up two step verification”


Facebook Login Approvals:
Facebook supports  code generated only from their own mobile apps. Offline . Go to your security settings , edit the ‘code generator’ .
You can enable the apps. Password to use a special password every time you use the Facebook mobile apps from your cellphone.


                                           

Secure your online world










Topics
What is two step authentication
what is two step verification
how to enable two factor verification
importance of two step verification 
Read More

Monday, March 11, 2013

Kajal Majhi

Online Education in India

By     No comments:



As the technologies are getting advance our life is getting easy and technologies are being most
helpful amenity in our daily life. When we speak about the term “INTERNET” It is an amazing
technology which has converted our almost all activity to the keyword “ONLINE” & “E-…” .
In large and developing countries like India, all the faculties ,
resources and entity for every kind of education in not available at every corner of this nation.
People who want to gain more knowledge about particular course, and pursue more degrees they
had to move around the country to large town and cities to get an institute which cost heavy weight
to the pocket, or sometime people who can’t meet the expenditure for a good institute they lag
behind and loss hope about his career.
But online education has removed all these barriers of education, one just need a computer with an
internet connection. Now students can opt for study resources, certificate courses, tutorial, pursue
major degrees online sitting at home and most all study resources are freely available at different
websites. Working professionals no need to quit their job to get higher education, online college is
just a click away : )

Benefits of Online education are:

  •  All most every contents and resources of syllabus are freely available in the form of

Ebook, Pdf files, Docx files etc. at different websites and hence students do not need
to spend extra money to buy books from market.

  •  Working people do not need to quit their job for higher education, they can opt for

study any time any day during his/her free hours.

  •  Online Lectures can also be downloaded later to use it offline whenever required ,

this has changed the traditional system of attending class, once one have missed the
online class they don’t have to worry, they can view the lectures in video later.

  •  Online course are less expensive as it does not required transport expense, hostel

expense etc.

  •  Online instructors comes from different regions around the globe and students are

exposed to knowledge shared by the instructors which cannot be learned from the
book.

Here are few different online entities which might help everyone to learn something new and pursue
certificate course and degrees…

www.DreamSpark.com

DreamSpark is founded by Microsoft Inc. for betterment of students. It provides highly advance,
professional tools and software for the students for free of cost and also rich online resources and
tutorials for free. Its main aim to teach the students and enrich the knowledge of Windows
programming, Windows Apps building, web development and much more. The apps and software
which is built by the students are presented at Windows store which provide a new goal for
students. DreamSpark also provide Microsoft certification to students. DreamSpark is a amazing
foundation by Microsoft for those who want built his career in the field of programming.

www.w3schools.com

It is an online school for web technologies. One can learn HTML, CSS, CSS3, JavaScript, jQuery, XML,
XML Dom, ASP.NET, PHP, SQL from the free resources and can apply for a certificate by paying an
exam fee. W3schools is recommended by thousands of top universities and schools around the
world.

www.Code.org ™

Code.org is a non-profit foundation dedicated to growing computer programming education around
the globe with free of cost. It is founded and supported by many famous personalities such as Bill
Gates, Mark Zukerburg, many top experienced teachers and many online schools. It is an one
complete entity for kids to IT professionals to gain more knowledge. Code.org provide free
resources and online tutorials for Android , IOS, Xbox, Windows programming, core programming
languages, robotic programming, Web technologies and much more. It also provide major certificate
and degrees.

www.eduarrow.com

Eduarrow provide free education for student of KG to standard (XII) of CBSE, ICSE and other boards.
Its main aim to provide free education and mind set towards study for school children and children
from poor economic background. They cover all most syllabus of Maths, Science, English, Hindi,
Colouring, and other general studies along with worksheets.

www.EduKart.com

EduKart.com is India’s Leading Online Education Company, they deliver high quality degree and
diploma programs such as online MBA, MCA and BBA, International Diplomas, and industry relevant
certificate courses in areas of Retail, Finance, Telecom, Digital Marketing, Programming Languages
and Project Management at an affordable fees. EduKart.com is led by a team consisting of alumni of
Stanford University, Indian Institute of Management and University of Delhi. The courses available
on EduKart can really help the participants to get better job opportunities and achieve their career
aspirations.

In India most of the leading colleges and Universities such as IIT Madrass,
Sikkim Manipal University, has introduced online education for students in India. Even Leading
international Colleges such as Harvard University & Massachusetts Institute of Technology have
joined hand to offer free online course to students and committed more than $60 million.
Online education is the future and and next innovation in the field of education not only in India but
around the globe.
Read More

Monday, April 30, 2012

Kajal Majhi

How to make a spy cellphone

By     No comments:

Turn your cellphone into a spy.


Do you want to hear what is going on somewhere like at your office, at your home or somewhere else? Then here you go with simple trick, it is an old trick but genuine


take a cellphone which have longer battery backup because may be you need to keep that cellphone for a longer time. 


so what is the trick?



  • put the cellphone in complete silent mode means every alert should be in silent mode such as message alert, call alert etc, 
  • Vibration should be off, perhaps anyone can hear the sound of vibration, so it should be of.
  • Now go to your call settings, select answering mode into automatic. why automatic? because no one need to press the call button to receive a call, whenever you will call to that cellphone it will recieve automatically and you can hear everything around there.
  • Now hide the cellphone wherever you can like under sofa or bed, under table, be sure that hide in such way that the cellphone will able to catch the sound.

Thats the simple trick, now whenever you will call to that cellphone you can lisent everything without knowing everyone, even you do not need to by any special spy devices.


Found helpful right??
Read More

Monday, April 16, 2012

Kajal Majhi

How to install Windows 7 from USB

By     No comments:

Here I am going to tell you the simplest way to instal Windows  7/ Vista / XP from USB Flah Drive. This trick will be very useful to you in the cases if your DVD Drive is not working. 


Before installing, things you must ensure.



  • Your Motherboard must be USB ready, I mean USB  works without any other driver.
  • You must having a ISO making software, you can download it from here.  MagicISO 
  • Be sure that your USB stick is formatted properly, use low level format software to clean the USB properly.
  • Your USB stick must have enough space at least 4 GB. 

How to install Windows 7 from USB?



  • Download Windows 7  image file or copy Windows 7 image file if you already have a disc.
  • Now open MAGIC ISO MAKER , under BOOTABLE tab choose WRITE IMAGE DISC. and choose your USB as disc drive.the write it.
  • Now restart your system and change your BIOS setting. choose the USB to boot first. save it and restart again, your system will start booting from your USB. have fun...

Read More

Sunday, March 11, 2012

Kajal Majhi

Review of Windows 8

By     No comments:

Windows 8 review, see what changes microsoft has made in this new generation operating system. you can directly download windows 8 from here 

Installation is quite similar and smooth like Windows 7. The first screen looks like modern web interfeace.The 1st step is to give name to your system as like all operating system after that creation and name of user accounts. Then windows 8 moves towards web ,you need to login through your windows live ID if you don't have you have to create. You can also skip this login process.

You know what windows 7 has bright blue colour screen but windows 8 have plesant green screen which will not effect yours eyes so much.


Now the time comes for confusion!! when you will click on the start bar you will think list of programs will be displayed but nope! :) you have to click on start then click on search to find all the application. And its build in conference , it means start typing something and application searching will start, to run any application, suppose to run comand prompt just type "cmd" and hit enter. isnt cool nad time saving?

Windows 8 have two types of application Metro applications made up with javascript and HTML5, and other of old software.

Now another intresting the windows 8 applications does not contain close button!! damm!then how will you close the application??
Here you go, Windows 8 use apple iOS method of program management, in which the application keep running in background and determines the usage.When the application is not in use, it close automatically.

The task manager of windows 8 contains the list of programms which is running, it is a cpmpletely redesgned task manager looks like more powerful than windows 7.


Know what? windows 8 really knows how to copy files :) in windows 7 the average speed of copying files was 25mb/s , now in windows 8, its amazing 80 mb/s, you can also pause copying files and later you can resume after completing heavy task.


Ok buddies, here you go for the summery
Good news!! 
1. New metro style interfeace
2. green screen.
3. Applications have more appealing and clean designes.
4. If you log in to your windows live id, your settings and themes will be sync, no fear of loss.
5. Just type the name of application and it will start searching.
6. New designed and powerful task manager.
7. Knows how to copy files faster :)
8. Faster boot 6 to 8 seconds

The sad news :( :( umm 
1. No easy way to close application. This might engage the computer's memory.
2. lack of all programs.

If i had left something, then people please inform me, I will add.

Read More

Sunday, March 4, 2012

Kajal Majhi

3G for games 4g for cops

By     No comments:
Hey people of India get ready for the taste of 4G.

What is 4G?
The next generation of wireless communication system after 2g and 3g based on LTE(Long term evolution).It enables high speed wireless or mobile broadband access.

What you can do with 4G?
Play interactive games, download and watch movies, download and upload high definition videos in real times. Watch HD Television, conduct HD video conferences on any mobile devices.

But wasn't supported 3g supposed to do all that?
4G is faster and more reliable.Theoretical speeds for 4G range between 100 MBPS and IGBPS(1 gigabites per second). Actual speed could be lower.Latency is down to 10-15 millions.In 3G theoritical speeds ranges between 384 KBPS and 5 MBPS.Latency is 45 milliseconds.

Who will offer 4G?
Reliance Industries, BSNL, Aircel, Tikona digital Networks, Airtel, Qualcomm, MTNL, and Aurgere Wireless Broadband India,

What you will need.....
You need a 4G or LTE Dongle , customer premise equipment, smartphone or tablet.

According to telegraph India, 3G and 4G both will exist because they will have different usage profiles. 3g will be used for more popular offerings on handsets, chatting, games, accessing the internet and so on. 4G will be preferred by small and medium business, police or radio cab networks or people who carry the work
around.

I can't believe this that yet 3g is not available every where in India and there buggers are talking about 4G? whats say people??

Source- THE TELEGRAPH INDIA

Read More

Saturday, December 31, 2011

Kajal Majhi

Different file formats around the world

By     No comments:

A

ABK     Corel Draw AutoBackup
ACL     Corel Draw 6 keyboard accelerator
ACM     Used by Windows in the system directory
ACP     Microsoft Office Assistant Preview file
ACT     Microsoft Office Assistant Actor file
ACV     OS/2 drivers that compress and decompress audio data
AD     After Dark screensaver
ADB     Appointment database used by HP 100LX organizer
ADD     OS/2 adapter drivers used in the boot process
ADM     After Dark MultiModule screensaver
ADP     Used by FaxWorks to do setup for fax modem interaction
ADR     After Dark Randomizer screensaver
AFM     Adobe font metrics
AF2     ABC Flowchart file
AF3     ABC Flowchart file
AI     Adobe Illustrator drawing
AIF     Apple Mac AIFF sound
ALB     JASC Image Commander album
ALL     Arts & Letters Library
AMS     Velvert Studio music module (MOD) file
ANC     Canon Computer Pattern Maker file that is a selectable list of pattern colors
ANI     Animated Cursor
ANS     ANSI text
API     Application Program Interface file; used by Adobe Acrobat
APR     Lotus Approach 97 file
APS     Microsoft Visual C++ file
ARC     LH ARC (old version) compressed archive
ARJ     Robert Jung ARJ compressed archive
ART     Xara Studio drawing
ART     Canon Crayola art file
ASA     Microsoft Visual InterDev file
ASC     ASCII text
ASD     WinWord AutoSave
ASM     Assembler language source file
ASP     Active Server Page (an HTML file containing a Microsoft server-processed script)
ASP     Procomm Plus setup and connection script
AST     Claris Works "assistant" file
ATT     AT&T Group 4 bitmap
AVI     Microsoft Video for Windows movie
AWD     FaxView document

B


BAK     Backup file
BAS     BASIC code
BAT     Batch file
BFC     Windows 95 Briefcase document
BG     Backgammon for Windows game
BI     Binary file
BIF     GroupWise initialization file
BIN     Binary file
BK     Sometimes used to denote backup versions
BK$     Also sometimes used to denote backup versions
BKS     An IBM BookManager Read bookshelf
BMK     An A bookmark file
BMP     Windows or OS/2 bitmap
BM1     Apogee BioMenace data file
BRX     A file for browsing an index of multimedia options
BSP     Quake map
BS1     Apogee Blake Stone data file
BTM     Batch file used by Norton Utilities
B4     Helix Nuts and Bolts file

C


C     C code
CAB     Microsoft cabinet file (program files compressed for software distribution)
CAL     CALS Compressed Bitmap
CAL     Calendar schedule data
CAS     Comma-delimited ASCII file
CAT     IntelliCharge categorization file used by Quicken
CB     Microsoft clean boot file
CCB     Visual Basic Animated Button configuration
CCF     Multimedia Viewer configuration file used in OS/2
CCH
    Corel Chart
CCM     Lotus CC:Mail "box" (for example, INBOX.CCM)
CDA     CD Audio Track
CDF     Microsoft Channel Definition Format file
CDI     Phillips Compact Disk Interactive format
CDR     Core Draw drawing
CDT     Corel Draw template
CDX     Corel Draw compressed drawing
CEL     CIMFast Event Language file
CFB     Comptons Multimedia file
CFG     Configuration file
CGI     Common Gateway Interface script file
CGM     Computer Graphics Metafile
CH     OS/2 configuration file
CHK     File fragments saved by Windows Disk Defragmenter or ScanDisk
CHP     Ventura Publisher chapter
CIL     Clip Gallery download package
CIM     Sim City 200 file
CIN     OS/2 change control file that tracks changes to an INI file
CK1     iD/Apogee Commander Keen 1 data file
CK2     iD/Apogee Commander Keen 2 data file
CK3     iD/Apogee Commander Keen 3 data file
CK4     iD/Apogee Commander Keen 4 data file
CK5     iD/Apogee Commander Keen 5 data file
CK6     iD/Apogee Commander Keen 6 data file
CLASS     Java class
CLP     Windows Clipboard file
CLS     Visual Basic Class Module
CMD     Command file for Windows NT (similar to a DOS .BAT file)
CMD     DOS CP/M command file
CMD     dBase-II program file
CMF     Corel Metafile
CMP     JPEG Bitmap
CMP     Address document
CMV     Corel Move animation
CMX     Corel Presentation Exchange image
CNF     Configuration file used by Telnet, Windows, and other applications
CNM     Windows application menu options and setup file
CNQ     Compuworks Design Shop file
CNT     Windows (or other) system content files for the help index and other purposes
COB     trueSpace2 object
COD     Microsoft C compiler output as displayable assembler with original C as comments
COM     Command file (program)
CPD     Fax Cover document
CPE     Fax Cover document
CPI     Microsoft MS-DOS code page information file
CPL     Control Panel extension
CPL     Corel colour palette
CPP     C++ code
CPR     Corel Presents Presentation
CPT     Corel Photo-Paint image
CPX     Corel Presentation Exchange Compressed drawing
CRD     Cardfile file
CRP     Corel Presents Run-Time Presentation
CRT     Certificate file
CSC     Corel Script
CSP     PC Emcee On-Screen image
CSV     Comma-separated values file
CT     Scitex CT Bitmap
CTL     Used in general to mean a file containing control information.
CUE     Microsoft Cue Cards data
CUR     Windows Cursor
CUT     Dr Halo bitmap
CV     Corel Versions archive
CV     Microsoft CodeView information screen
CWK     Claris Works data file
CWS     Claris Works template
CXX     C++ source code file

D


DAT     Data file
DAT     WordPerfect Merge Data
DBF     Aston-Tate dBASE database
DBX     DataBeam image
DCR     Shockwave file
DCS     Desktop Color Separation file
DCX     Fax image (based on PCX)
DDF     BTRIEVE database
DEF     SmartWare II data file
DEF     C++ Definition
DER     Certificate file
DIB     Device-Independent Bitmap
DIC     Dictionary
DIF     Data Interchange Format spreadsheet
DIR     Macromedia Director file
DIZ     Description file
DLG     C++ Dialogue Script
DLL     Dynamic-Link Library
DMF     X-Trakker music module (MOD) file
DOC     FrameMaker or FrameBuilder document
DOC     WordStar document
DOC     WordPerfect document
DOC     Microsoft Word document
DOT     Microsoft Word document Template
DPR     Borland Delphi project header file
DRV     Driver
DRW     Micrografx Designer/Draw
DSG     DooM saved game
DSM     Dynamic Studio music module (MOD) file
DSP     Microsoft Developer Studio project
DSQ     Corel QUERY file
DSW     Microsoft Developer Studio workspace
DWG     AutoCAD drawing eXchange format
DXF     AutoDesk Drawing Interchange format

E


EMF     Enhanced Windows Metafile
ENC     Encore file
EPS     Encapsulated PostScript image
ER1     ERWin file
ERX     ERWin file
EVY     Envoy document
EWL     Microsoft Encarta document
EXE     Executable file (program)

F


F     FORTRAN file
F77     FORTRAN file
F90     FORTRAN file
FAR     Farandole Composer music module (MOD) file
FAV     Microsoft Outlook navigation bar
FAX     FAX Type image
FH3     Aldus Freehand 3 drawing
FIF     Fractal image file
FITS     CCD camera image
FLC     AutoDesk FLIC animation
FLI     AutoDesk FLIC animation
FLT     Corel filter
FLT     StarTrekker music module (MOD) file
FMB     Oracle binary source code for form, version 4.0 and later
FMT     Oracle text format of form, version 4.0 and later
FMT     Microsoft Schedule+ print file
FMX     Oracle executable form, version 4.0 and later
FOG     Fontographer font
FON     System font
FOR     FORTRAN file
FOT     Font-related file
FP     FileMaker Pro file
FP1     Flying Pigs for Windows data file
FP3     FileMaker Pro file
FPX     FlashPix bitmap
FRM     Form
FRM     FrameMaker or FrameBuilder document
FRM     Oracle executable form version 3.0 and earlier
FRM     Visual Basic form
FRM     WordPerfect Merge form
FRX     Visual Basic form stash file

G

GAL     Corel Multimedia Manager album
GCP     Ground Control Point file used in image processing of remote sensing data .
GED     Graphic Environment Document (drawing)
GEM     GEM metafile
GEN     Ventura-Generated text file
GFC     Patton&Patton Flowcharting 4 flowchart file
GFI     Genigraphics Graphics Link presentation
GFX     Genigraphics Graphics Link presentation
GID     Windows 95 global index file (containing help status)
GIF     CompuServe bitmap
GIM     Genigraphics Graphics Link presentation
GIX     Genigraphics Graphics Link presentation
GNA     Genigraphics Graphics Link presentation
GNX     Genigraphics Graphics Link presentation
GRA     Microsoft Graph
GRD     Grid file, used in image processing of remote sensing data often to form map projections.
GRP     Program Manager Group
GTK     Graoumftracker (old) music module (MOD) file
GT2     Graoumftracker (new) music module (MOD) file
GWX     Genigraphics Graphics Link presentation
GWZ     Genigraphics Graphics Link presentation
GZ     Unix Gzip compressed file

H

H     C program header
HED     HighEdit document
HEL     Microsoft Hellbender saved game
HEX     Macintosh BinHex 2.0 file
HGL     HP Graphics Language drawing
HLP     Help file
HOG     Lucas Arts Dark Forces WAD file
HPJ     Visual Basic Help Project
HPP     C++ program header
HQX     Macintosh BinHex 4.0 file
HST     History file
HT     HyperTerminal
HTM     Hypertext document
HTML     Hypertext document
HTX     Extended HTML template

I


ICA     Citrix file
ICB     Targa bitmap
ICM     Image Color Matching profile file
ICO     Windows Icon
IDD     MIDI Instrument Definition
IDQ     Internet Data Query file
IFF     Amiga ILBM
IGF     Inset Systems metafile
IIF     QuickBooks for Windows interchange file
IMA     WinImage file
IMG     GEM image
INC     Assembler language or Active Server include file
INF     Information file
INI     Initialization file
INP     Oracle source code for form, version 3.0 and earlier
INS     InstallShield install script
INS     X-Internet sign-up file
ISO     Lists the files on a CD-ROM; based on the ISO 9660 CD-ROM file system standard
ISP     X-Internet sign-up file
ISU     InstallShield uninstall script
IT     Impulse Tracker music module (MOD) file
IW     Idlewild screensaver

J

JAR     Java ARchive file (a compressed file for applets and related files)
JAVA     Java source code
JBF     Paint Shop Pro image browser file
JFF     JPEG bitmap
JIF     JPEG bitmap
JMP     SAS JMPDiscovery chart-to-statistics file
JN1     Epic MegaGames Jill of the Jungle data file
JPEG     JPEG bitmap
JPG     JPEG bitmap
JS     JavaScript source code
JTF     JPEG bitmap

K


KDC     Kodak Photo-Enhancer
KFX     KoFax Group 4 image
KYE     Kye game data

L


LBM     Deluxe Paint bitmap
LDB     Microsoft Access lock file
LEG     Legacy document
LHA     Alternate file suffix for LZH
LIB     Library
LIS     Output file produced by a Structured Query Reporting (SQR) program
LOG     1. Log file
LOG     2. Log file used by pokerstars for errors in their poker software
LPD     Helix Nuts and Bolts file
LRC     Intel Video Phone file
LST     List file
LWO     Lightwave Object file
LWP     Lotus Wordpro 96/97 file
LZH     LH ARC compressed archive
LZS     Skyroads data file

M


M3D     Corel Motion 3D animation
MAC     MacPaint image
MAD     Microsoft Access module
MAF     Microsoft Access Form
MAK     Visual Basic or MS Visual C++ Project
MAM     Microsoft Access Macro
MAP     Map file
MAP     Duke Nukem 3D WAD game file
MAQ     Microsoft Access Query
MAR     Microsoft Access Report
MAS     Lotus Freelance Graphics Smartmaster file
MAT     Microsoft Access Table
MAX     Paperport file
MAZ     Hover maze data
MB1     Apogee Monster Bash data file
MCC     Dialer10 calling card
MCS     MathCAD image
MCW     Microsoft Word for Macintosh document
MDA     Microsoft Access add-in
MDB     Microsoft Access database
MDE     Microsoft Access MDE file
MDL     Digital Tracker music module (MOD) file
MDL     Quake model file
MDN     Microsoft Access blank database template
MDW     Microsoft Access Workgroup
MDZ     Microsoft Access wizard template
MED     Music Editor, OctaMED music module (MOD) file
MER     Format for interchanging spreadsheet/database data; recognized by Filemaker, Excel, and others
MET     Presentation Manager metafile
MI     Miscellaneous
MIC     Microsoft Image Composer file
MID     MIDI music
MMF     Microsoft Mail File
MMM     Microsoft Multimedia Movie
MOD     FastTracker, StarTrekker, Noise Tracker (etc.) music module file
MOD     Microsoft Multiplan spreadsheet
MOV     QuickTime for Windows movie
MPE     MPEG animation
MPEG     MPEG animation
MPG     MPEG animation
MPP     Microsoft Project file
MPP     CAD drawing file format
MP3     MPEG Audio Layer 3 (AC3) file
MSG     Microsoft Mail message
MSN     Microsoft Network document
MSP     Microsoft Paint bitmap
MTM     MultiTracker music module (MOD) file
MUS     Music
MVB     Microsoft Multimedia Viewer file
MWP     Lotus Wordpro 97 Smartmaster file

N


NAP     NAP Metafile
NCB     Microsoft Developer Studio file
NSF     Lotus Notes database
NST     Noise Tracker music module (MOD) file
NTF     Lotus Notes database template

O


OBD     Microsoft Office binder template
OBD     Microsoft Office Binder
OBJ     Object file
OBZ     Microsoft Office Binder Wizard
OCX     Microsoft Object Linking and Embedding custom control
OFN     Microsoft Office FileNew file
OFT     Microsoft Outlook template
OKT     Oktalyzer music module (MOD) file
OLB     OLE Object Library
OLE     OLE object
OPT     Microsoft Developer Studio file
ORG     Lotus Organiser file
OR2     Lotus Organiser 2 file
OR3     Lotus Organiser 97 file

P


P10     Tektronix Plot 10 drawing
PAB     Microsoft Personal Address Book
PAK     Quake WAD file
PAL     Windows colour palette
PAT     Corel Draw pattern
PBK     Microsoft Phonebook
PBM     Portable Bitmap
PCD     Kodak Photo-CD image
PCL     HP Laserjet bitmap
PCS     PICS animation
PCT     Macintosh PICT drawing
PCX     ZSoft PC Paintbrush bitmap
PDF     Adobe Acrobat Portable Document Format or Netware Printer Definition File
PDF     Package Definition File from Microsoft Systems Management Server
PDQ     Patton&Patton Flowcharting PDQ Lite file
PFA     Type 1 font (ASCII)
PFB     Type 1 font (binary)
PFC     PF Component
PFM     Printer Font Metrics
PGL     HP Plotter drawing
PGM     Portable Graymap (bitmap)
PIC     PC Paint bitmap
PIC     Lotus picture
PIC     Macintosh PICT drawing
PIF     Program Information File
PIF     IBM PIF drawing
PIG     Lucas Arts Dark Forces WAD file
PIN     Epic Pinball data file
PIN     Epic Pinball data file
PIX     Inset Systems bitmap
PJ     MKS Source Integrity file
PKG     Microsoft Developer Studio application extension (similar to a DLL file)
PL     Perl program
PLT     HPGL Plotter drawing
PLT     AutoCAD Plot drawing
PM5     Pagemaker 5.0 file
PM6     Pagemaker 6.0 file
P65     Pagemaker 6.5 file
PNG     Portable Network Graphics bitmap
PNG     Paint Shop Pro Browser catalogue
PNT     MacPaint graphic file
POT     Microsoft PowerPoint Template
PP4     Picture Publisher 4 bitmap
PPA     Microsoft PowerPoint Add-in
PPM     Portable Pixelmap bitmap
PPS     Microsoft PowerPoint slide show
PPT     Microsoft PowerPoint presentation
PRE     Lotus Freelance presentation
PRF     Windows system file
PRN     Print Table (space delimited text)
PRS     Harvard Graphics for Windows presentation
PRZ     Lotus Freelance Graphics 97 file
PS     Postscript Interpreted drawing
PSD     Adobe Photoshop bitmap
PST     Microsoft Outlook Personal Folder File
PTM     Polytracker music module (MOD) file
PUB     Ventura Publisher publication
PUB     Microsoft Publisher document
PWD     Microsoft Pocket Word document
PWZ     Microsoft PowerPoint Wizard
PXL     Microsoft Pocket Excel spreadsheet

Q


QAD     PF QuickArt Document
QBW     QuickBooks for Windows file
QDT     Quick Books data file from the Quicken UK Accountancy/Tax/Invoice program
QLB     Quick Library
QRY     Microsoft Query
QT     QuickTime Movie
QTM     QuickTime Movie
QXD     Quark XPress file

R


R     Pegasus Mail resource file
RA     Real Audio sound
RAM     Real Audio sound
RAS     Sun Raster Images bitmap
RAW     Raw File Format (bitmap)
RC     Microsoft Visual C++ Resource Script
REC     Recorder macro
REG     Registration file
RES     Microsoft Visual C++ Resource
RFT     RFT-DCA
RLE     Run-Length Encoded bitmap
RM     Real Audio video file
RMI     MIDI music
ROV     Rescue Rover data file
RPT     Microsoft Visual Basic Crystal Reports file
RTF     Rich Text Format document
RTM     Real Tracker music module (MOD) file

S


SAM     Ami Professional document
SAV     Saved game file
SCC     Microsoft Source Safe file
SCD     Matrix/Imapro SCODL slide image
SCD     Microsoft Schedule+ 7
SCH     Microsoft Schedule+ 1
SCN     trueSpace2 scene
SCP     Dial-Up Networking Script
SCR     Windows screensaver
SCR     Fax image
SCT     Scitex CT bitmap
SC2     Microsoft Schedule+ 7
SDL     SmartDraw library
SDR     SmartDraw drawing
SDT     SmartDraw template
SEA     Self-expanding archive (used by Stuffit for Mac files and possibly by others)
SEP     Tagged Image File Format (TIFF) bitmap
SHB     Corel Show presentation
SHB     Document shortcut file
SHG     Hotspot bitmap
SHS     Shell scrap file
SHW     Corel Show presentation
SIT     Stuffit archive of Mac files
SLK     Symbolic Link (SYLK) spreadsheet
SND     NeXT sound
SND     Mac Sound Resource
SQC     Structured Query Language (SQR) common code file
SQR     Structured Query Language (SQR) program file
STM     Scream Tracker music module (MOD) file
STY     Ventura Publisher style sheet
SVX     Amiga 8SVX sound
SYS     System file
S3M     Scream Tracker 3 music module (MOD) file

T


TAR     Tape Archive
TAZ     Unix Gzip/Tape Archive
TEX     Texture file
TGA     Targa bitmap
TGZ     Unix Gzip/Tape Archive
THEME     Windows 95 Desktop Theme
THN     Graphics Workshop for Windows thumbnail
TIF     Tag Image File Format (TIFF) bitmap
TIFF     Tag Image File Format (TIFF) bitmap
TIG     Tiger file, used by US government to distribute maps
TLB     OLE Type Library
TMP     Windows temporary file
TRM     Terminal file
TRN     MKS Source Integrity project usage log
TTF     TrueType font
TWF     TabWorks file
TWW     Tagwrite Template
TX8     MS-DOS Text
TXT     Text
T2T     Sonata CAD modelling software file

U


UDF     Windows NT Uniqueness Database File
ULT     Ultratracker music module (MOD) file
URL     Internet shortcut
USE     MKS Source Integrity file

V


VBP     Visual Basic Project
VBW     Microsoft Visual Basic workspace
VBX     Visual Basic custom control
VCF     Vevi Configuration File; defines objects for use with Sense8's WorldToolKit
VDA     Targa bitmap
VI     Virtual Instrument file from National Instruments LABView product
VLB     Corel Ventura Library
VOC     Creative Labs Sound Blaster sound
VP     Ventura Publisher publication
VSD     Visio drawing (flow chart or schematic)
VST     Targa bitmap
VSW     Visio Workspace file
VXD     Microsoft Windows virtual device driver

W


WAD     Large file for Doom game containing video, player level, and other information
WAV     Windows Waveform sound
WB1     QuattroPro for Windows spreadsheet
WB2     QuattroPro for Windows spreadsheet
WBK     Microsoft Word Backup
WBL     Argo WebLoad II upload file
WCM     WordPerfect Macro
WDB     Microsoft Works database
WEB     CorelXara Web document
WGP     Wild Board Games data file
WID     Ventura width table
WIL     WinImage file
WIZ     Microsoft Word Wizard
WK1     Lotus 123 versions 1 & 2 spreadsheet
WK3     Lotus 123 version 3 spreadsheet
WK4     Lotus 123 version 4 spreadsheet
WKS     Lotus 123 Worksheet spreadsheet
WKS     Microsoft Works document
WLF     Argo WebLoad I upload file
WLL     Microsoft Word Add-In
WMF     Windows Metafile
WOW     Grave Composer music module (MOD) file
WP     WordPerfect document
WPW     Novel PerfectWorks document
WP4     WordPerfect 4 document
WP5     WordPerfect 5 document
WP6     WordPerfect 6 document
WPD     WordPerfect Demo
WPD     WordPerfect Document
WPG     WordPerfect Graphic
WPS     Microsoft Works document
WPT     WordPerfect Template
WQ1     QuattroPro/DOS spreadsheet
WQ2     QuattroPro/DOS version 5 spreadsheet
WRI     Write document
WRL     Virtual Reality model
WS1     WordStar for Windows 1 document
WS2     WordStar for Windows 2 document
WS3     WordStar for Windows 3 document
WS4     WordStar for Windows 4 document
WS5     WordStar for Windows 5 document
WS6     WordStar for Windows 6 document
WS7     WordStar for Windows 7 document
WSD     WordStar 2000 document
WVL     Wavelet Compressed Bitmap

X


XAR     Corel Xara drawing
XLA     Microsoft Excel add-in
XLB     Microsoft Excel toolbar
XLC     Microsoft Excel chart
XLD     Microsoft Excel dialogue
XLK     Microsoft Excel backup
XLM     Microsoft Excel macro
XLS     Microsoft Excel worksheet
XLT     Microsoft Excel template
XLV     Microsoft Excel VBA module
XLW     Microsoft Excel workbook / workspace
XM     FastTracker 2, Digital Tracker music module (MOD) file
XR1     Epic MegaGames Xargon data file
XTP     XTree data file
XY3     XYWrite III document
XY4     XYWrite IV document
XYP     XYWrite III Plus document
XYW     XYWrite for Windows 4.0 document

Y


YAL     Arts & Letters clipart library
YBK     Microsoft Encarta Yearbook

Z

Z     Unix Gzip
ZIP     Zip file
ZOO     An early compressed file format

note- If any other formats are left by me sorry for that,
Read More