7 December 2014

Best 5 Bitcoin Accepting Web Host

The rise of Bitcoin as a digital currency or crypto currency has changed the idea of online payment. This cryptocurrency is growing  very fast and many web hosting companies are accepting Bitcoin as a legitimate payment method.

The beauty of Bitcoin is, it could be used all over the world that have access to the internet. So if you are from one of the Paypal unsupported countries, you can use bitcoin as a Paypal alternative easily.


Bitcoin is a software based payment system which enables instant payment to anyone located anywhere in the world. It has no central authority, managing transaction and the issuing of Bitcoin is carried out collectively by the P2P network.

 Must Read :  Earn Online Money with Bitcoin

Now let’s take a look on the best 5 web hosting providers support bitcoin payment system as per our research.


Arvixe is a California-based webhosting company that started its journey in the year 2003 with the mission to provide affordable and quality web hosting service. It has been hosting thousands of websites all over the world. It has already received several awards from industry authorities. It offers Shared Hosting, VPS hosting, Dedicated Hosting, Reseller Hosting etc. You could host your website on Arvixe as low as $4/month.


Namecheap is leading domain name registrar and web hosting company around the web started their journey in 2000. It has more than one million customers. they offers cheap domain registration and reliable web hosting. Namecheap is the first major domain registrar that accepts bitcoin payment. You could host your site on Namecheap as low as $9.88 per year.


Qhoster is yet another very popular for accepting a wide variety of payment methods (including Bitcoin) for web hosting and domain name registrations.Qhoster was founded in 2004 and it serves customers to all over the world. They offers several packages like cPanel web hosting, Linux VPS, Windows RDP VPS, Dedicated Server etc.


Bitcoin Web Hosting is designed especially for Bitcoin users which offers stable and secure bitcoin hosting solutions. Their mission is to provide best bitcoin hosting on the planet.they offers Bitcoin Shared Hosting, Bitcoin VPS Hosting and Bitcoin Dedicated Servers.


Hosterbox is a Canadian web hosting company which was founded in 2005 with a mission to offer customers industry-leading Web hosting and design services. You could host your site as low as 3.95/month.they also offers free hosting transfer.

Read More

2 December 2014

5 Apps That Give College Students an Advantage

Unlike their parents, who mostly relied on Cliffs Notes and wrist calculators, today's college students have access to thousands of apps that can help them get better grades. Before you take another class, make sure that you have these five apps working for you.


Countless students have spent hours writing original essays only to find out that they didn't cite their sources properly. A lenient professor will correct the mistake. A strict one may use the word "plagiarism." Unless you actually stole someone else's work, it's unlikely that the university will find you guilty of plagiarism. Still, it's not a lesson that you want to learn the hard way.
With EasyBib, students don't have to worry about improper citations. All you have to do is scan a book's barcode (or enter the name manually) and select MLA, APA, or Chicago style. It will do the hard part for you.

 Must Read : Run Whatsapp on PC


Technology gives today's college students many advantages, but it also creates a lot of distractions that can make it difficult to focus on homework. When you have a mid-term paper due in the morning, you don't want to spend the rest of the night playing games or chatting with friends.
If you can't make yourself concentrate on your work, then turn to the SelfControl app for help. The app lets you choose websites that you shouldn't (but want to) visit while studying. When you can't access your favorite sites, you're more likely to do your work.
Unfortunately, you will have to resist some temptations on your own. SelfControl won't stop you from making phone calls or texting your friends all night.

RealCalc Scientific Calculator

Whether you're studying theoretical physics or getting a Master of Taxation, you need a reliable calculator that's ready to work when you are. RealCalc turns your mobile device into a scientific calculator that lets you:
  • set customizable unit conversions
  • use binary, octal, or hexadecimal settings
  • access a physical constants table
  • calculate trig functions in grads, radians, or degrees
Assuming that you don't need the strength of a super computer, this calculator will meet your needs.


Considering that 82 percent of graduate students have some type of job, it's easy to forget about distant deadlines. The iHomework app solves that problem by letting students create a schedule for their assignments. Unlike the schedule scribbled on the back of a coffee-stained notebook, this one actually works. You can manage your deadlines by course, day, or week. When a deadline approaches, the app reminds you.

Dictionary: Merriam-Webster

Going to college guarantees that you will run into a few obscure words. With enough context, you can usually guess the meaning of a word. Unfortunately, you don't always have enough context. The Merriam-Webster Dictionary app gives you access to the entire dictionary. That includes word origins, first uses, synonyms, and antonyms as well as definitions.

Read More

Why You Should Use a VPN

Why you should use a VPN

When we take a look at five favorite VPN service providers, we realized a few things. First, for being the "best" is a big deal for VPN providers, and they will fight dirty to be one of them. Secondly, there are many VPN providers is difficult to choose a good one. VPNs are not all equal, and in this post, we'll see what a VPN is why you want one, and how to choose the best for you. Let's get started.

What is a VPN?

In short, a virtual private network or VPN, is a group of computers (or discrete networks) networked via a public network, ie internet. Companies use VPNs to connect remote data centers, and individuals can use VPN to access network resources when they are not physically on the same LAN (local area network) or as a method to protect and encrypt their communications when you are using an insecure public network.

When connected to a VPN, generally, to launch a VPN client on the computer (or click a link on a special web page), log in using your credentials, and trust their information exchanges keys with a server very far. Once both teams have verified each other as authentic, all Internet communications are encrypted and secured against eavesdropping. IpVanish could be a better solution for your VPN service.

Why you need a VPN

A VPN is only one way to tighten security and access resources on a network that is not physically connected. Whatever you choose to do with a VPN is a different story. Typically, users are divided into separate VPN few categories:

The student / worker:  This person has the responsibility of caring, and uses a VPN provided by your school or company to access network resources when they are at home or traveling. In most cases, this person already has a free VPN service provided to them, so it is not just shopping around. Also, if you are concerned about security, you can always turn your VPN using airport or coffee shop Wi-Fi to ensure anyone snooping on your connection.

The downloader: Whether you are downloading legally or illegally, this person does not want a witch hunt list some company just because they have a torrenting application installed on your computer. VPNs are the only way to stay safe when something like BitTorrent is used, everything else is just a false sense of security. Better safe than try to defend themselves in court or pay a huge fine for something that may or may not have already, right?

The privacy of mind and safety advocate:  Whether you are one in a strictly controlled environment or a completely free and open being, this person uses VPN services to keep your encrypted and secure communications and away from prying eyes whether you are home or abroad. For them, unsecured connections mean that someone is reading what it says.

The globetrotting: This person quierever Olympics live as they occur, without regard to their local networks seedy. They want to visit their favorite TV shows, as the air rather than waiting for translations or re-releases (or watch versions aired in other countries) restricted location listen to Internet radio streaming, or want to use a new web service or application that looks great, but somehow limited to a specific country or region.

A combination thereof: Odds are, even if you're not one of these people most of the time, you are some combination of them depending on what you're doing. In all these cases, a VPN service can be useful, if it's just a matter of protecting yourself when you're away from home, if you handle confidential information of their work and not want to get fired, or are you just covering their MPAA own ass.

Read More

18 November 2014

Pro-Tips to Choose Website Templates for Your Websites


Building a website today has become one of the easiest tasks and even novice user can develop a captivating website within minutes. Once a complicated task of website development that included money as well as time, today, has become one of the easiest activities. And this has been possible with the development of website templates that can be used to design and customize your website with mere clicks.

However, selecting an ideal website template is one of the most critical tasks and one need to consider several factors before selecting one for their website. Here are some of the best tips that will help you choose a website template for your website.

Determine the Type of Your Website

Each website based on its business type has its own peculiarities and one must select a website template for their websites accordingly. For example, an e-commerce website should display more about the products with call-to-action buttons whereas a corporate website must have a simple yet impressive design that emanate professionalism, trust and safety. A website dedicated to kids should have some really good colors, funny illustrations, etc. Hence, one must first determine the type of their website before actually selecting a website template.

Templates That You Need or Visually Like

Today, the Internet is full of captivating templates that tempt us to use it for our own website. However, one must only choose a particular template that would be beneficial for their further customers and should not just depend on their personal likings. Choosing an ideal template is not an easy task and one must always use their mind and not their feelings while selecting one. One of the simplest ways to select a template for your website is by noting down your users’ expectations and start searching for templates accordingly.

Selecting Responsive and Customizable Templates

With the rise in technology, people these days use different gadgets to access the Internet and thus your website must be responsive to all these resolutions. Also, an ideal template should have a wide range of customizable options that help even the novice user to design their website the way they want. Hence, choosing a template that is responsive to the different screen resolution and the one having to customize it is the best to go with. These days almost all the premium website templates offer you these options.

Choose Authentic Seller

Premium templates usually include some investment and thus choosing an authentic seller is mandatory. Selling templates is one of the huge businesses on the Internet and even beginner developers have their own websites offering templates. Such templates are not well tested and may come with bugs that are later complicated to remove. Hence, one must prefer buying templates only from authentic sellers. This does not end here. One must also ensure that these sellers provide you reliable customer support in case you land up in any problem regarding the use of these templates.

Select Templates Considering the Future Perspective

The Internet is a huge place with a wide range of website genre. Some websites on the Internet are created for fun and non-business purpose but some are developed with a clear business intention. Though the fun and non-business websites are captivating with a lot of people interacting on them daily, one must be crystal clear on what their website’s offering. And thus, your website template must be selected considering the larger side or the future perspective. For example, a corporate website with a trendy look will simply depict unprofessionalism thus making them loose their business.

Read More

2 November 2014

How to Make $100 a Month Easily by Link Shortening


URL ShortenerThe internet is one of those entities that just keep on giving. If you are able to manipulate the internet to work for your side, it is one of the best ways to keep earning money forever. All users have to do is be smart about the internet and the ways with which they can make money. There are many people who write blogs for a living and earn a substantial amount of money off of it.
For those who write blogs, now there is a way to get even more views. Seasoned blog writers are aware of the fact that URL shorteners help them get the most out of their links by providing a sweet and short version of their blog website URL name. What they do not know until now is that they can earn money from using shorte.st URL shortener. Another great part is that even those who do not write blogs will be able to earn money from the URL shortener.

 Must Read : Earn Money with Bitcoin

How shorte.st works?

Users who write blog posts on the internet generally earn money with each click that they get onto their website and by advertising. They use normal URL shorteners that just do the job and get done with it.
Now it is possible for them to shorten their URL’s and at the same time gain money. When a blogger uses shorte.st to reduce the size of his original URL, by sharing the link onto Facebook, Twitter or any other online social media domain, each click that is garnered onto the blog redirects the viewer to a short advertisement that lasts a whole of just 5 seconds.

Various Features Available at Shorte.st

Yeah, 5 seconds is all that it takes for bloggers to earn money for a lifetime of work. This acts as an extra benefit for the bloggers who earn their money through other ways. Shorte.st also has some amazing options that are available to be used exclusively by its members. The monetization options that are just fabulous include Full Page Script, Bounce Rate Monetization, Wordpress Plugin, Social Share Widget and Mass Shrinker just to name a few.

What if you’re not a blogger?

Even if you’re not a blogger, shorte.st provides some great opportunities to earn some money for you too. Users who register with shorte.st just have to share some of the affiliated referral links that are available on the website. The great User Interface makes it very easy. By using the referral link and sharing it on the net, users will be able to generate 20% off every click that is entered on the link.
This is one of the easiest and most effective ways to get money off the internet. It takes barely a few minutes to setup and users can get money for a lifetime period with every click.

Payment methods & Proofs

Read More

18 October 2014

Google Releases New Android 5.0 Lolipop

Google Releases New Android 5.0 Lolipop
Google’s new Android 5.0 Lollipop update release is now confirmed for a number of Nexus devices including the Nexus 4 and Nexus 5 but Nexus users won’t be the only ones getting Google’s brand new update. We’ve seen Android 5.0 Lollipop update details emerge for companies like Samsung, HTC, Sony, and Motorola and here, we breakdown what we know about the Android 5.0 Lollipop release date.

Android L was first announced as Android 4.4 KitKat’s successor back in June during the company’s annual Google I/O developer event. At the event, Google did not confirm an Android L release date or a name though it did outline many of its features and push out a pre-release version to Nexus 7 2013 and Nexus 5 users. In the weeks after that release, we’ve seen features teased and release dates rumored and today, Google finally spilled the beans on Android L with a detailed announcement.

Google’s Android L update, as expected, is called Android 5.0 Lollipop. The update will be accompanied by two new Nexus devices including a Nexus 9 from HTC and a Nexus 6 from Motorola. Both devices will help usher in a new era for Google and its Android operating system.

 Must Read :  Youtube adding Offline Videos


Lollipop's most evident new peculiarities come as visual upgrades and client interface changes, which Google has named Material Design. The stage has new, more liquid movements, a cleaner plan with a bolder shade palette, a patched up multittasking menu, and offers better approaches to cooperate with your voice. A large portion of the new Material Design peculiarities can be seen in the late redesigns that Google has discharged for its own particular Android applications, for example, Google+. The Material Design activity is intended to bind together the product's look and feel crosswise over different structure components, whether that is a tablet, smartphone, home media streamer, or something else. 

Notwithstanding a visual redesign, Lollipop brings in excess of 5,000 new Apis for designers to take advantage of and lets numerous distinctive Android gadgets with different structure variables work better together. Google says that things, for example, tunes, photographs, applications, and late inquiries can be flawlessly matched up crosswise over different Android gadgets. Lollipop likewise incorporates new notice controls to breaking point alarms amid gatherings and different times, another battery saver mode that can squeeze out 90 more minutes of life between charges, numerous client accounts, visitor client modes, and better approaches to secure your gadget through trusted Bluetooth associations. Lollipop will likewise incorporate an insurance against resetting the phone to processing plant defaults, which is intended to make it troublesome for phone hoodlums to utilize a stolen gadget. Huge numbers of these gimmicks have been executed by different Android gadget producers all alone smartphones and tablets for quite a while, yet Google is currently verifying they are a piece of the center Android experience. 

Read More

7 October 2014

Youtube Adding Offline Videos


This is great news for anyone who is a YouTube fiend but doesn’t have internet access at home. The major video-sharing network has announced that it’ll be adding the ability to watch videos offline to its mobile apps.Given that Google’s actively gone after Microsoft for giving people the ability to download videos with its YouTube app, it might hardly be surprising that you will only be able to watch videos using the features for a “short time”.In a blog post aimed at video creators, YouTube says that it means “your fans’ ability to enjoy your videos no longer has to be interrupted by something as commonplace as a morning commute”.The video network adds that the feature is designed “to give people more opportunities to enjoy videos and channels on YouTube mobile”.At this stage, YouTube not yet revealed exactly how the feature is going to work, although it obviously wouldn't be starting from scratch.The company last year began implementing pre-downloading of videos for its Android app. That particular feature required you to start watching a video online before allowing you to move offline.It is also worth noting, as The Next Web does, that unveiling the feature on its Creator blog could mean that the people uploading the videos could have ultimate control over whether a video can be viewed offline or not.According to YouTube, you should be able to start watching videos offline by from November of this year.

 Must Read Facebook Buying WhatsApp

Apps Allow  View YouTube Films Offline 

Quite basically, this new operate is based on earlier saved these videos we wish to see right after offline. But keep in head that for this, the person will require to use Net connection to download the gadget cache that video you wish to observe later offline.

On the other hand, from the formal YouTube weblog have produced it very clear that the online video will remain cached for a quick time and restricted, not only to stay away from potential troubles with the copyright of these movies, but also for the very own convenience of consumers .

With this new potential coupled with beautiful facelift cellular app endured this services a couple of weeks back you could say that the apps is in one of his greatest. Also evidently witnessed as Google continues to function difficult to improve their providers and keep introducing new functions that make them even more fascinating.

 Must Read : Add Embed Youtube Video into Blogger

Read More

26 September 2014

Best Way to Earn Online Money with Bitcoin


Way to Earn Online Money with Bitcoin
Earning money online without  investment is always a  dream for everyone.So here today we're going to share one such way which is a global invent of current revolutionary technology,the term is digital currency or crypto currency.This is actually a very simple thought but also a very complex one too,it depends on your way of thinking actually.There are several crypto currency available online but the most popular and famous one is 'Bitcoin'.

 Must Read :  Make Money With Fiverr

What is Bitcoin?

Bitcoin was launched in 2009, the first digital medium of exchange at the time, but now one of many (others have names like Ripple, Litecoin, Peercoin and Namecoin). Being digital, these currencies can be transferred instantly and securely, with no, or very low, transaction fees, between any two people anywhere in the world. Think of it as electronic cash that you can use to pay for goods or services, or give to friends or family, without having to pay the bank to do so.

Is Bitcoin Legit?

Yes it is completely legit over the world.Many online shopping sites like amazon and others do accept payment in bitcoin.So it is a complete legit and most trending digital currency all over the world.

Bitcoin Units

1 Satoshi = 0.00000001 ฿
10 Satoshi = 0.00000010 ฿
100 Satoshi = 0.00000100 ฿ = 1 Bit / ╬╝BTC (you-bit)
1,000 Satoshi = 0.00001000 ฿
10,000 Satoshi = 0.00010000 ฿
100,000 Satoshi = 0.00100000 ฿ = 1 mBTC (em-bit)
1,000,000 Satoshi = 0.01000000 ฿ = 1 cBTC (bitcent)
10,000,000 Satoshi = 0.10000000 ฿

100,000,000 Satoshi = 1.00000000 ฿

Ways to Get Bitcoin

Though there are several ways to get bitcoin but here we'll recommend you the two main way to get bitcoin

  1. Capcha Mining
  2. Cloud Mining

Capcha Mining

There are several websites out there where you just need to log on with your email id and then you just have to clear the capcha and you'll get bitcoin.Here we're going to recommend you one main site to get bitcoin and that is LandofBitcoin.This is one of the most useful site to browse over 70 best bitcoin sites through it.

Get Started with LandofBitcoin

  • First you need to visit the website and sign up here using the sign up icon placed in the top right side of the site

  • Next move onto the account section placed at the top right corner and a similar page like below will open.

  • Here you've to put your email id and bitcoin address but to generate the bitcoin address first you need to visit coinbase and after signing up there you'll have your bitcoin address to your email id.If you're having trouble to sign up with coinbase.com to get your bitcoin address you may also visii blockchain and sign up there.Now you've your bitcoin address.
  • Next you just need to put your bitocin address there along with your email id and click the save button.That's it.your landofbitcoin account just created fully.
  • Now you've to visit the home page of your landofbitcoin sites  and there you'd find various ways to earn bitcoin but we'd recommend you the first one as per the below image as they are most easy and fastest way as well as they don't need any investment.

  • Under 'collect free bitcoin from faucets' section you'll find various sites where you just need to visit and clear the capcha to get free bitcoin.One of the best sites under there is moon bitcoin You must visit that cause they will give you satoshi in free as per time.
NOTE:You've visit those sites atleast one per day and clear the capcha cause they often reduce the free Bitcoin amount to irregular visitors.

Cloud Mining

Physical bitcoins do exist, with a number embedded in them, but ultimately, a bitcoin is just a number associated with a bitcoin address. The “mining” that creates them uses PC processing power to solve complicated cryptographic problems that get progressively harder to crack as time goes by. This is the geeky, maths bit. But even computer novices can do it, using software that is free to download and run and which can be left to run 24/7 in search of the magic code that will unearth more bitcoins. Obviously, the more powerful the computer, the more chance there is of reaping a reward in a given time.

When a computer mining bitcoins hits the jackpot (after 1 789 546 951 attempts, on average), a box appears on the screen confirming that all the code crunching has produced, not one newly minted bitcoin, but a block of 25, because bitcoins do not emerge singly. At the moment, a block is being found by some computer every seven to eight minutes – which gives you an idea how many people are mining them.

But unless you wanna invest and take the risk to loose your money then earning bitcoin through visiting bitcoin faucets websites are much better than bitcoin mining.

How to Collect and Sell Bitcoin

whether you're doing bitcoin mining or visiting faucet the total amount of earned bitcoin will automatically store onto your coinbase or blockchain account on every sunday,using which you made the sign up.You'll also get a mail notification on your email id too.Under there you'll find a 'my wallet' option and there you can see the total amount of your bitcoin you've earned.Under that account you've also a sell option.as soon as your bitcoin reached the threshold amount.So then you can choose whether you're willing to sell it or should keep it on your account and wait for a better price.

Read More

16 September 2014

EaseUS Todo Backup


EaseUS Todo BackupEaseUS Todo Backup  is the most comprehensive free backup software currently available in market. The backup software allows users to create backups of your important files or the entire workstation through its simple, intuitive and streamline interface.

Users can start their backup by just selecting few options from the interface and the software will do the rest. The application supports both file and image backup.The application is a freeware with enough functionality compared to the pro version of the software, that it can be used very efficiently without worrying if they are missing something or not.

 Must Read : OLX App for Android

The application integrates well with windows and works seamlessly over other platforms as well. The interface is clean and provides intuitive reasoning about the functionality the backup software offers.
Recovering is very easy, once you have made any backup. You can either double-click any Todo backup file and it opens as if it were a folder. Similarly, you can restore the full backup through fully integrated restore function.
Ease US Todo backup software sports several different options for creating a backup using the application. The backup options are

  1. Disk/Partition Backup
  2. System Backup
  3.  File Backup
  4. Smart Backup

Cloning of the whole hard disk is also supported and switches it out for a new one. You can also choose to recover their files to the original location or a separate drive or folder, and whether or not they want to replace existing files.

Read More

14 September 2014

Simple Ways to Transfer Contacts From iPhone to Android

How to Transfer Contacts From iPhone to AndroidThere was a time when moving from one phone to another meant an incredibly painful exercise. A task as simple as moving your contacts was excruciating, to the point that many people would just pay their carrier for a transfer fee (on top of buying their new phone). This process have grown easier and easier over the years, and now it takes no time at all. If you need to transfer contact from an iPhone to Android, it’s really simple to do now.so here we will show you how you can transfer your contacts from an iPhone to an Android.

 Must Read : Android Phone from Nokia

Manual Sharing

First off is the fashioned manual way but it will take up a lot of your time as through this method you can only share one contact at a time. To share a contact simply open the ‘Contacts’ app and then select the contact to go to the contact info page. On that page, scroll down and then select ‘Share Contact’. You will then have the option to share the contact either through email or message.
This method is only good if you want to share one of two contacts, however if you are looking to share your entire phonebook then we suggest you check out these alternative methods discussed below.

Using ITunes

If you have a Google account and manually backup your iPhone to your computer using iTunes, here’s an easy way to export your iPhone contacts to your Google account.

  1. First, open iTunes and plug in your iPhone to your computer via USB cable. Select your iPhone in iTunes. Under the ‘Info’ tab, choose to Sync Contacts with Google Contacts.
  2. It will prompt you to enter your Gmail username and password. Wait for it to sync. Once it is done, head to Gmail and log in to your account. Then go to Gmail > Contacts.
  3. You’ll find that your contacts will have been imported to your Google Contacts

Via iCloud

If you’ve enabled the iCloud service on your iPhone, your phone contacts have most likely been backed up to your iCloud account.  You can then export those contacts into a file that can be imported into Android directly, or indirectly through Google Contacts.

  1. Using your desktop Internet browser, go to https://www.icloud.com/ and sign in with your iCloud account.
  2. Click Contacts to view a list of contacts.
  3. Select the contact(s) that you want to export.
  4. Click the cog wheel icon at the lower left and select Export vCard.
  5. Your computer will download a VCF file containing the exported contact(s).
  6. Import this VCF file to Google Contacts or copy the VCF to your Android phone’s /sdcard directory and import it to your phone through the People app or Contacts app.

Read More

29 August 2014

Some Best Ways to Secure Your Gmail

Some Best Ways to Secure Your Gmail
Gmail is a web mail service provider run by the internet search engine giant Google inc. As of June 2012, it is the most widely used web-based email provider with over 425 million active users worldwide. Gmail is used by a wide variety of people starting from children to business officials, for both personal and formal purposes. We use mail services for online transactions, purchases and much more. So, mails in and out of our account could carry sensitive and private information such as our address, contact no, Bank account details & etc. If the security of our account is compromised by a third party, we could lose all our important information and would face serious consequences. To avoid this, one must ensure the security of his/her accounts thoroughly for not leaving any chance for hackers.So here we're going to provide some tips to secure your gmail account from hackers.

 Must Read : Google Secrets and Tricks

  • Use A Strong Password

The image speaks for itself. Of course, choosing a strong password is the very first step in protecting your account from hackers. For best results, use a combination of numbers, special characters, uppercase and lowercase letters that would be really hard to guess! Also avoid using the same password for all your online accounts because if one of your account gets hacked, you might lose all your other accounts that uses the same password. So try having an unique password for every online account you maintain.
  • Make A Strange Security Question Answer

You will be surprised to the fact that hackers love to hack into your account from your mail recovery’s security question, than to confront your already strong password directly. It’s really reasonable though, since most websites teach you to create a strong password, but they didn’t tell you to spawn a tricky recovery question and/or answer.
For this one we will like to have our personal trick exposed to you: create a question with an absolutely wrong answer. It’s really simple, let’s say you made a question, “Who is the lover of my mother?” (please don’t use the combination of this question and the answer below since we covered it here), then you can put the answer as “my mother loves to eat burger“. Make it as nonsensical as possible, but keep the answer strongly related with your past, so you can remember it easily and only you will know the answer to it.

Once you got your own tricky question and answer, you can change your password recovery question by accessing your Gmail, clicking on the gear-like icon > Settings > Accounts and Import > Change password recovery options, then click “Edit” on the Security question option and replace it with your new question. One more job is done to fortify your Gmail account.

  • Be Alert from Phishers

Phishing is the act of attempting to acquire information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Read more about it in Wiki. Phishing is said to be the most successful type of online attacks. Major websites, high profile emails and many others have fallen victim to phishing. So, let’s learn some ways by which a phishing attack can be identified and avoided.

Whenever you receive an email from an unknown entity or a friend,  asking you to sign in to your Social Network, email or any other online account you maintain, stay alert because there is a good chance that it might be a phishing attack .
The picture above is a sample phishing page where once you enter your log in credentials, an email will be sent containing your username & password straight away to the attacker. So, check the url of the page before signing in. At first, it may appear to be a legit url. But at the end, you will find some unknown website which is not related to the original website. For eg, in this picture, you can find the url to be http://googleverification.110mb.com/verifymyaccount/try where 110mb.com is the site where this phishing script is hosted. So never give in your credentials before confirming the authenticity of the source.
You may also receive emails claiming to be from reputed organisations such as coca cola, informing you that your email has been selected for some prize money and you need to enter your personal information in order to claim your award. Never fall for that! Its 100% phishing.
The above said points are the most common types of phishing attacks. So, stay alert and stay safe!

  • 2-Step Verification 

To combat the growing account theft issues, Google has introduced a security feature which will greatly strengthen your account: 2-step Verification. In general, it adds an extra layer of security by enquiring a code that will be sent to your phone every time you request for the account access, thus making it impossible for anyone to hack into your account without your phone.

Sounds problematic? Probably not. The awesome thing is that the setup is fairly easy, you just need to visit the setup page and follow a series of simple instructions, and that’s all, you are good to go! In case you need any troubleshooting in the future, you can also visit the Help page to seek for a solution.

With this 2-step verification, you can even create a backup phone number and printable backup codes as alternatives to access your account if you lose your phone. For applications that cannot request for the verification code, you can also create an application-specific password for them. So basically your account will be inpenetrable, unless your closed ones betray you.

It might feel a bit annoying the first few times, but it beats getting your account hacked and then getting blackmailed to regain access to your own email account, doesn’t it?

  • Never Trust Anyone

Even (and especially) when you receive emails from your loved ones, because their account might be hacked and those emails are actually sent not by them and without their permission.We believe that most people already know about this but we feel it important to list this advice down nonetheless.

The fact is that we can’t really count how many scam or phishing mails we’ve received from my friends’ hacked accounts. Fortunately we was calm enough to not open the “I love you” email, but there could be certain mails like “Robbed in China” scams in which "your friend" asks for your emergency help, and these are the ones that could really trick you as the request for help is coming from your dear friend.

Normally your first reaction would be to ignore the mail, but if you’re really curious about the situation, then reach out to the friend or his/her family members to verify the crisis before extending any help . Otherwise, you’re the one who will face the crisis, so please keep the warning in at the back of your mind any time!

  • Avoid checking Emails at Public Places

A Keylogger is a computer program which can be used to record what you are typing in the keyboard. The Keylogger records your keystrokes, saves them in a simple text file and sends it to an email address or to an FTP server. And you are completely unaware of the whole process, running in the background.

You never know which programs are installed in a public computer. Consider a simple scenario: You went to a local internet cafe to check emails from your Gmail account. The cafe staff has installed a Keylogger in every computer and when you type the username and password, the Keylogger script comes into action, records both your username and password and sends it to another email address. You leave the cafe after checking emails and the cafe staff  retrieves your username and password and hacks your account.

Hence, never check emails at a local cafe or at public places or in any computer where you don’t have control.

  • Never Click On Any Suspicious Links

There are some websites which let’s anyone send fake emails to any email address. And the worst part is that the sender can customize the “From” address to anything – noreply@gmail.com or gmailteam@google.com.

Consider a scenario: Mr X uses some website and sends an email to you asking you to change your Gmail password due to security reasons. You see the from address field as something like “support@gmail.com” and think that it’s from Gmail. No, it’s not.

When you receive any emails which asks you to change your account password or enter login credentials, STOP. Do not ever click on any suspicious links from your inbox.

Note: Gmail will never ask you to change your password or enter login credentials without any reason. Hence, if you receive any email which claims to be from Google and wants you to change your password, be rest assured someone is trying to fool you and hack your email account.

  • Always Enable HTTPS Security

When it comes to accessing your Gmail account in public wireless or non-encrypted networks, HTTPS could mean your security. Leaving HTTPS disabled will only make it easier for attackers to crack open a path into your Gmail account. HTTPS is enabled by default, but past experience has taught me that it’s always better to perform a check to ensure that the HTTPS option is on.

To do the check, log into your Gmail account. A big gear-like icon will appear on the top right side of the interface. Click on the gear icon > Settings > General > Browser Connection and see whether the option, “Always use HTTPS” is checked. Remember to save the changes!

By doing this, your account is potected by a secure protocol that provides authenticated and encrypted communication. Oh, if you’re doing this on public computer, do remember to log out of your Gmail account after using it.

  • Check Your Filter, Forwarding And POP/IMAP

In 2007, a famous designer, David Airey’s Gmail account is hijacked. To make the long story short, the hacking started when the user has its account signed on and he went to visit a bad site. The site added a backdoor to extract information from the Gmail account, and the backdoor is the Filter. Filters can potentially transfer emails as long as the victim has the filter in his account.

Therefore, it’s vital for you to actually check your account settings to delete suspicious filters. The check is real easy. As usual, you just need to log into your Gmail account, then after clicking the gear-like icon, choose Settings > Filters to check and delete the Filter you didn’t put there before.

You will also need to check the “Forwarding and POP/IMAP” tab as well to confirm that there is no foreign forwarding address included in this tab apart from those assigned by you. Do perform a check on these stuff when you feel that something unusual is going on in your account. Your prevention methods will save you from experiencing problems in the future.

  • Embrace Security Plugins

In the end, no matter how strong your security is, you might end up getting tricked by phishers and scammers. To combat these tricky situation, you can adopt browser plugins which will greatly strengthen your online security by aiding you in recognizing phishing sites and by removing threats, at the cost of hundreds of kilobytes!

Web of Trust (WOT) is an awesome browser plugin that checks whether you are accessing a bad site. When you entered a potentially bad site, WOT will show you a dark page covering the front page of the site, and inform you that the site has poor reputation, while blocking you from accessing the page. WOT is available for major browsers like Firefox, Google Chrome, Safari, and more!

On that matter, there is a double-edge sword called cookies. It stores certain user information and preferences for convenient site information access in future, but it also leaves a path for attackers to infiltrate your computer. That’s when BetterPrivacy comes to the rescue. Basically it removes special long-term cookies, thus greatly eliminating the chances for attackers to hack into your account.

Better Privacy is only available for Firefox, but you can get similar plugins by searching your browser’s plugin store with the term “privacy“. Other than that, you can browse the Firefox Add-ons Page, Chrome Web Store, Safari Extension Gallery or any other browser’s plugin store to get more security tools for your browser. But always remember to check the plugin before adopting it, as you might know, sometimes the help could be the culprit itself.

Read More