Category Archives: The Web

How to Unblock Websites

You might have previously encountered trying to visit a particular website, only to find out it has been blocked in your computer. YouTube or any other social media sites are among the commonly blocked websites, mostly because the contents are not properly moderated. Hence, the administrator blocks it to prevent you and other visitors from accessing it.

If you want to gain full access to these websites, there are ways to unblock them. To get you started, you must first analyze how they are blocked.

How Sites Are Blocked

To block a website typically requires software to be installed into your computer. This software must be compatible with the Internet browser you are using, whether Internet Explorer or Firefox. Then, the options are changed so as to prevent accessing a particular website.

For larger networks of computer, such as those used in the office or a school’s computer laboratories, it utilizes a firewall.

Blocking a website is quite simple. However, unblocking it could entail more work so you will have access to the site.

Unblocking a Website

  1. Use proxy servers
  2. You can use proxy servers to retain your anonymity when viewing blocked sites on the Internet. Proxies work as a third party, which accesses computers outside of the firewall through the Internet. Although they may have a different IP address, you can control it using your own computer. Hence, a proxy server is basically an alternate computer that connects to the specific web site that is blocked.

    Once you have used a proxy server, you can easily access a web site just like you normally would.

  3. Change computer settings
  4. If your computer has a direct connection to the Internet, you can easily follow this trick. However, if the blocked website is protected by a firewall, this may not work.

  5. Disable or Change Browser
  6. If software is being used to block the site, you can simply disable the software or change browser options. If a browser is blocking your access to this particular website, go to Tools tab and reconfigure the options or security tab.

    Another tip you can try is by downloading another browser if a particular browser you are using has blocked a web site. For instance, if you are using Explorer, you can download Firefox.

  7. Utilize Google to Unblock a Site
  8. Practically all computers have access to Google. You can use these strategies to access a blocked web site.

    • Google Cache – search a particular website through searching it in Google and access the page there using the cache copy of the page, instead of directly typing the URL
    • Google Mobile Search – as Google translates a web page into a mobile page, certain configurations may be changed, thus preventing the blocking software from recognizing the supposedly blocked page.

    For more information on How to Unblock Websites read:

  9. Unblock Websites
  10. Unblock Websites
  11. Unblock Websites

Make your own Myspace Layout

Myspace is one of the most popular social networking sites online. It has become the venue for millions of registered users to meet old and new friends alike. Just like in the real world where you can make a good first impression by improving the way you look; a user may also modify his or her Myspace layout to express a unique character.

Steps to Make your Myspace Layout

  1. Find a layout generator. To make or change your Myspace layout, you must first find a layout generator. Look for one that is easy to use and navigate, and provides a wide array of choices.
  2. Find a background for your page. When you are already at the homepage of your chosen layout generator, go to the backgrounds section. You can either pick a background that is already in the layout generator’s page or you can make your own by using MS Paint or Photoshop.
  3. If you want to make your own background, you have to upload it to a photo-hosting site, like Photobucket, Imageshack, or Tinypic. To find the URL of your picture background, right-click it, choose Properties and it will display information about the picture (URL is included). Highlight the URL, copy it by pressing Ctrl+C and paste it on the generator’s Background URL text box. Sometimes, it provides you with HTML or CSS codes.
  4. Find network banners and contact tables. Network banners and contact tables are easy to find on Photobucket search or Google search (use “contact tables” as keywords).If you want to make your own contact tables, remember that they should be 150 pixels tall and 300 pixels wide. When you find the one you desire, it comes up with its direct link, so just copy-paste its URL on the generator.

Other Things to Do with Layout Generators

  • Font – Try out different fonts for your text. Choose the easily readable ones since you want your profile display to be reader-friendly.
  • Colors – Try out different colors for your text, background and other elements in your profile page. Choose colors which look good with each other. If you need help, you can simply consult a color wheel.
  • Preview – Always preview your layout before publishing it. Put yourself in the shoes of a stranger and assess your page. Make sure it looks good and the elements are complementary.
  • Practice – Practice page customization, content management and element-matching with layout generators. The content is as important as your Myspace layout.

Error 403

Error 403 is also known as the Forbidden Error. This is an error message that indicates that the user is not allowed to view a certain Web page. This can be because the website is blocked or because browsing permissions have been turned off. It means that the user can communicate with the server, but the server doesn’t allow access to what has been requested.

HTTP protocol allows the Web server to provide this response without giving specific reasons. In short, Error 403 is a ‘No response’ message by the Web server without further argument allowed.

Try accessing the following URLs:

  • http://www.checkupdown.com/accounts/grpb/B1394343/
  • http://www.kelloggdirect.com/index.htm
  • http://www.countywidechrysler.com/default.htm
  • http://www.bcpsmyrna.net/reviews_all.htm?bhjs=0
  • http://www.earthcars.com/blog/

The following URLs should fail with an error 403 saying: Forbidden or HTTP ERROR: 403

What To Do

Here are some ways to resolve Error 403:

  • Make sure you entered the correct URL.
  • You have to confirm if you have come across a website with a “No directory browsing” problem. The URL usually ends with a slash (/) rather than a name of a specific Web page, such an HTML or HTM. If this happens, you need to access individual Web pages before arriving at the website through hyperlinks.
  • Go to the Main page of the website and look for a search function.
  • Try changing the file extension for the URL such as PHP, HTM, SHTML and HTML.
  • Go to Google or other search engines, then search for a similar page.
  • Check the error log on the Control Panel for more information and follow the step by step process:
    1. Access the Control Panel.
    2. Click on the Error Log icon. A record of the most recent error messages displayed by your web browser will appear.
    3. In this list you will find detailed information about each error including:
      • information about the client receiving the error
      • time and date of the error
      • information about which folder or file is generating the error
      • description of the error

Widgets

What are Widgets?

Widgets can be any icon or graphical interface element manipulated by a user to execute a desired task on the Internet or on the computer. They are usually pieces of programming code embedded on an image file programmed to react to mouse clicks or keyboard commands.

The icons located on the desktop, including media player buttons, Web browser controls, and email function controls, are considered widgets. When a user clicks or manipulates the widgets with a mouse or a keyboard, the user is interacting with the computer or website, essentially telling the user’s desired action.

Types of Widgets

There are three types of widgets used to accomplish different functions:

Desktop Widgets

Description

Users can download these widgets and may keep them running continuously in the background.

Pros

These widgets provide a pervasive kind of experience for the widget producer, even when the user is offline.

Cons

They must be downloaded and can only be seen by the user who downloaded it.

Personal Web Widgets

Description

These widgets are used to create a personal website by embedding contents from one site into a page on another site.

Pros

The widgets may be viewed continuously by users who have set their personal home pages as their browser’s start page.

Cons

These widgets can only be viewed by the user.

Public Web Widgets

Description

These widgets are publicly posted in social network profiles, online communities, blogs, and other similar sites. They can stay on those pages indefinitely.

Pros

These widgets can be seen by many people, and the user can install it on multiple sites.

Cons

New contents must be provided daily or weekly by the publisher to keep the widgets fresh. They also must be highly interactive so their users can experience them in different ways.

Desktop Widget Choices

Apple Dashboard and Microsoft Windows Vista Sidebar

Pros

Existing codes for a Web page run easily within these environments. They allow the use of special objects in Javascript to reach the underlying system. These widgets provide ease of availability of HTML authoring tools and off-the-shelf usage of AJAX libraries.

Cons

These widgets can potentially take up a significant amount of system resources as each widget is a full-on Web page. These widgets are strongly tied to the operating system (OS).

Yahoo! Widgets

Pros

These widgets have the largest addressable audience. They feature powerful design, animation, and interaction facilities that are based on five years of developer feedback. These widgets have more application-like environments than Google gadgets or DHTML.

Cons

These widgets lack video support. Their familiarity with Yahoo’s XML language over DHTML is an advantage, though.

Google Desktop Gadgets

Pros

With these widgets, background in HTML is needed. However, they are not constrained by the HTML model. Both Javascript and Visual Basic are permissible for these widgets. Their own Gadget Designer development tool is used to aid in designing a gadget. Also, these widgets are not very resource exhaustive.

Cons

These widgets are fairly limited in its abilities as compared to other engines, specifically in the presentation. Their interface is riddled with update flashes and jerky motions and they require the download of the entire Google Desktop package before it can run.

Basic Web Widgets Format

JavaScript

It has remained a popular choice for dynamically changing the content of a Web page and its interaction. It executes as part of the Web page and with access to the page’s current structure and mark-up. It can add additional elements to the page, such as additional scripts, styles, or embeddable objects.

Embedded plugin objects

Browser plugins are small desktop applications integrated with a Web browser environment to provide additional functionality. Widgets powered by plug-ins operate within a specific area of a page, defined by the embedded object or object elements.

Blog Plugins

Blog plug-ins are considered as an integrated part of each blog. They are executed on the server and are delivered as a single HTML file to a blog viewer’s browser.

Frame content

Widgets within frame content do not have direct access to the full content of the parent page or its user data. They connect the contents and preferences of a main page with the framed widget content.

Myspace Countdown

Myspace Countdown is a feature of Myspace.com. It shows the number of days left before a specific event to your page visitors. This is displayed through an animated timer.

Once you have set up a Myspace Countdown in your profile page, you can show everyone the remaining days before your wedding, birthday, or graduation. You can also show the remaining days before Christmas, Halloween, or New Year’s Day.

Myspace Countdown also lets you show how many days there are after a specific event. For example, you can use a Myspace Countdown to show how many days you have worked for your company from your first day on the job.

Myspace Countdowns are very customizable. You can place all sorts of graphics suitable for the event which the countdown is referring to. You can put a cake and balloons around the timer for your birthday, or ghosts and a grinning pumpkin around your Halloween timer.

Aside from these graphics, famous cartoon characters such as Mickey Mouse and The Simpsons can be included in the images in your countdown. Myspace Countdowns also have text boxes wherein you can place a specific message about the event you made your timer for.

Setting a Myspace Countdown is relatively easy. Follow these steps:

  1. Search for a Myspace Countdown in the Myspace.com home page. There are also other online sites offering these countdowns.
  2. Once you have found a countdown, you need to choose a skin or a theme for it.
  3. You can set the date for the event you choose by indicating the year, month, and day.
  4. You have the option of adding a message in the timer.

For more information on Myspace Countdown Generator read:

  • Myspace Countdown Generator
  • Myspace Countdown Generator
  • Delete Internet History

    Deleting your Internet History erases the records of websites you have accessed.

    What is Internet History?

    Your computer records all your Internet activity by saving them in your Internet History. It also saves other computer activities in your hard drive.

    Your browser notes all actions while you surf the Internet. Every URL typed in the address bar and every word/phrase or search string in a search engine (Google, MSN, Yahoo, etc.) is saved.

    Windows also retains a list of your recently-accessed files, documents, and programs.

    The various applications you use keep track of your activity to add convenience to your computer experience. Conversely, this data can also compromise your security and privacy. Other users can access your private data.

    Delete Internet History in Internet Explorer

    1. Go to the Tools Menu. Bring up the Internet Options tab. Select ‘Delete all.’ You can delete separate items after accessing them through the View Files button
    2. From the same tab, select ‘Delete Cookies’
    3. From the same tab, select ‘Delete Files’
    4. From the same tab, one can also erase saved form and password information. Click on AutoComplete located on the Content tab. Click on Clear Forms and Clear Passwords.

    Delete Internet History in Firefox

    1. Press the ctrl-shift-delete keystrokes and check for information to erase. This information may be in the form of cookies, form/password data, passwords, or temporary files. For example, you can delete specific items by going to Tools and clicking on Options, Privacy, Cookies, and View Cookies.

    Note that not all history tracks can be cleared manually. Some need special software because they are stored in different areas that are not visible through standard means, and thus cannot be pinpointed and deleted manually.

    For these cases, various free tools that remove such information (such as Spybot) are available on the Internet.

    For more information on deleting Internet history read:

    Delete Yahoo Account

    If you have a Yahoo account which you do not use anymore, you have the option to delete it. Before actually deleting your Yahoo account, you have to be sure that you really do not need this service. You should know the consequences of the deletion of your account in Yahoo.

    If you delete your Yahoo account, you will not be able to access your Yahoo ID, your Yahoo Mail, and the additional profiles you created, if there are any. You will also not be able to access the account settings and data you have in the Yahoo Network. These include the contents you may have in Yahoo Address Book, Geocities, Yahoo Groups, and Yahoo Briefcase. You will not be able to reactivate your Yahoo account after deleting it.

    If you decide to terminate your Yahoo account after these considerations, follow the steps below.

    Steps in Deleting Your Yahoo Account

    1. Go to the account deletion page of Yahoo.
    2. Sign in or enter your password to proceed. The account deletion page will appear.
    3. Yahoo will ask you if you are sure you want to delete your account. Yahoo will also provide an explanation of the content you will not be able to access after terminating your account.
    4. After reading the statements, you have to enter your password to confirm. There is also a code in a box which you have to enter in a field.
    5. Click the Terminate This Account button when you have entered the password for your account and the code.
    6. Yahoo will then display a page confirming that you have successfully removed your account.

    Websense

    Websense is an Internet content-control software used as a Web-filtering tool. It was created by a San Diego, California based company of the same name as the software. Websense is designed to limit the access of a user to specific sites on the Web. The term “websensed” was coined to refer to a user being blocked from a specific site.

    Websense Technologies

    Reporting tools

    This software does not only filter websites, Websense also tracks them. It generates comprehensive reports that include the URL, user, category, dates, risk class, application, workstation, etc. Websense makes it very easy for systems administrators to track Internet activity of other users.

    Threat Seeker

    Websense has a Threat Seeker feature designed to protect the user from anticipated Web-based security threats. The software mainly uses its integrated anti-virus and anti-intrusion prevention systems. Threat Seeker scans about 600 million sites every week to look for security threats on the Internet. It also evaluates firewall and security protection.

    Deep Content Control

    Websense monitors the whereabouts of data and controls who can visit specific sites to protect confidential information.

    Why Many Organizations Use Websense

    Websense is one of the most commonly used filtering software packages. Numerous types of organizations use it for various reasons. It is used by businesses, schools, libraries, and other large entities such as the government.

    The governments in Yemen and China use it as part of the government enforced censorship program, denying citizens from visiting certain sites.

    Many local and state governments use Websense for their offices and libraries where the public can gain access to information on government computers.

    Business organizations can block the access to adult material and other sites that may hold back the company’s efficiency and productivity.

    Schools can block access to sites with adult content to prevent students from visiting sites such sites.

    Households use Websense to block certain sites to protect family members from Internet scam sites and predators. Parents also employ Websense to prevent their children from visiting adult sites.

    What Website Categories it Can Block

    The software allows system administrators to block access to websites based on categories. These categories have lists of sites that can be blocked at all times or only during specific times of the day. There are more than three dozens of these categories. Websense users can create their own list of sites that can be blocked. Most common categories include:

    • Adult Material;
    • Streaming Video Sites;
    • Gambling Sites;
    • Game Sites;
    • Freeware and Shareware Download Sites;
    • Peer-to-Peer Networks;
    • Dating and Personals;
    • Proxy Sites;
    • Hate Sites; and
    • Sites that Promote Illegal Activity.

    Install ActiveX

    ActiveX is a set of technologies used to facilitate the interaction of software components in one network. It is installed by default using Internet Explorer. You may still need to configure its settings. To configure:

    1. Open Internet Explorer. Click on the Tools menu located at the upper right portion.

    2. Click Internet Options.

    3. Go to the Security tab. The Internet zone will be chosen by default.

    4. Select the security level for the Internet Zone. Move the slider bar up and down.

    5. Click the Custom Level button.

    6. Check on the buttons to select security settings; and then, click OK.

    Self-sufficient components of ActiveX, called Active controls, may be required by some websites for the user to view the page or execute particular tasks. When you visit such sites, Internet Explorer will ask if you would like to install ActiveX control. Active controls are also called add-ons. These are small programs used on the Internet to enhance your browsing experience.

    A Security Warning dialog box will come out and will show the name of the publisher. It will then give you the option to “Install” or “Don’t Install.” If you want to perform a certain function in the Web page, for instance view videos, you will have to click on the Install button.

    Unfortunately, ActiveX controls can be misused. They might allow websites to collect your personal information and monitor your browsing habits without you knowing it. They might impede the proper functioning of your computer and might also give you content that you don’t want, like pop-up ads. To prevent this from happening, you can choose to accept content only from trusted sites or publishers.

    Websites should inform you what the ActiveX control is for. It should also display important details on the Web page when you see the warning. You should decide if you’re willing to entrust your personal information to the publisher of the site.

    Firefox, however, does not support ActiveX controls. For individuals who use Firefox as their Web browser, you can download a third-part Mozilla ActiveX Plug-in, developed specifically to support ActiveX.

    ActiveX is built on Microsoft’s Component Object Model (COM) technology. It is chiefly used to develop programs and desktop applications. It is also widely used to develop interactive content on the Internet. It can be embedded into web pages to produce multimedia effects, like animation.

    Additional Reading on Install Active – x

    Reset MySQL Password

    MySQL is a database management system. It can house a number of files that can occupy a large part of the memory. Users can add a password to their database to restrict access. The password can be given to a number of people for shared access.

    Users can also change their passwords after they have been set. Regularly changing passwords can be done for added security. This change can also be made if the user suspects that his password is no longer secure.

    How Do You Reset the Password?

    1. End the process called mysqld daemon.
    2. Restart the process with the ‘skip-grant-tables’ option.
    3. Use the –u root option to start mysql client.
    4. Set the new password with this command: UPDATE mysql.user SET Password=PASSWORD(‘place the new password here’) WHERE User=’root’.
    5. Save the changes with the FLUSH PRIVILEGES command.

    Following these steps will reset your password immediately. However, if you want an entirely different password, simply change the variables within the single quotes in step 4.

    Safety in Passwords

    Remember to be careful with your password. Keep your passwords as unrelated to you as possible. This is because people will often try to look for something related to you in order to get your password.

    Try using a sequence of unrelated characters. Mix letters, numbers, and special characters to make your password harder to guess. The longer the password is, the harder it is to guess. If it is possible, use a mix of lowercase and uppercase letters.

    Do not use proper nouns when making a password. They are easily cracked, as they are also associated with the important elements of your life.

    If you can, use a passphrase. A passphrase uses a number of words written as one word without spaces. It can be something that means something to you yet would be harder to guess by other people.

    Yahoo Password Recovery

    Yahoo! offers several services for free. A user just have to create an account to avail of email, instant messaging, and other services. The account is locked by the user’s ID and password. This is to protect the user’s personal information and account.

    Passwords often contain significant words or characters so the users can easily remember them. Some use a sequence of random characters for maximum security. In any case, passwords can be forgotten. Yahoo! has specific methods for resetting your password online.

    Online Password Resetting

    1. Visit the Yahoo! homepage. Look for the Sign In button and click it. The button is usually found at the upper right side of the page.
    2. You will be led to a page where you are supposed to enter your username and your password. Since you forgot your password, click “Forget your ID or password?”
    3. You will be led through a verification process. First, click the circle beside “Yes, my Yahoo! ID is”. Enter your Yahoo! ID in the field beside the “Do you know your Yahoo! ID?” text located below the clicked circle.
    4. Below the text box, you will see a distorted but readable code. Type the code on the text box below it. This is done to ensure that you are a real human being instead of a spammer.
    5. Click on the “Next” button.
    6. You will be asked to answer a personal question correctly. This question is the one which you chose to be your “security question” when you first registered in Yahoo. If you answer it right, your password will be given to you and you will be given the option to reset it if you want to.

    You can also recover your password by logging in to the Yahoo! Sign In Problems page.

    Some browsers also allow you to store your password. Internet Explorer stores this information in Microsoft Protected Storage. You can access this storage system by clicking on the Tools link. Choose the Internet Options option then click Content then AutoComplete.

    Viewing the protected storage may not be an easy task. There may be some security measures you were not informed about when you installed Internet Explorer. Some programs are able to help you access it by bypassing a few procedures.

    ICQ Password Recovery

    ICQ is a computer program allowing users to send and receive instant messages. The name ‘ICQ’ was derived from the phrase ‘I Seek You.’ ICQ requires users to create user accounts to avail of the service. These accounts are protected by a user ID and password. For users to access their accounts, they have to log in with their user ID ad password.

    If you lost or forgot your ICQ password, you can recover it in a number of ways such as:

    • resetting your ICQ password online;
    • recovering your stored ICQ password; and
    • using brute force.

    Resetting Your ICQ Password Online

    If you forgot your password, you can recover it by going to the ICQ Password page. Enter the URL https://www.icq.com/password/ on the address field.

    Enter your ICQ number in the assigned field. The site will forward your password to the email account you used when you signed up for ICQ.

    If you also forgot your ICQ number, you must enter some personal information. These are those you provided when you registered on ICQ. These information may include your nickname, first name, family name, and email address. This will be used to locate your ICQ number in the directory. Once you’ve confirmed your identity, your password and ICQ number will be sent to your email address.

    Recovering a Stored ICQ Password

    There are several ICQ password recovery tools that can be used if the password is stored somewhere in the system. Passwords can be saved or encrypted in the system.

    Password recovery programs can read the encryption. They can search the system and look for the passwords. They can also identify if the password is for ICQ or not.

    When using these programs, follow the steps used for each of the programs. These programs often have easy-to-use Graphic User Interfaces (GUIs). The instructions for using the application can also be found in the developer’s website and in the help files found in the software.

    It will help minimize the search if you know the specific folder or directory where the password is saved.

    Mounting a Brute Force Attack

    It is possible to set up a brute force attack to retrieve an ICQ password. There are manuals that can help you in mounting a brute force attack. However, an automated tool like IPDbrute is simpler to use.