Facebook users Beware of Hot Girls around wanting to date you! – Facebook Stalker

date Hot indian Facebook Stalker Girl
Last week i received a ‘Friend Request’ from an UNKNOWN hot Girl and being Stupid i quickly added her. and guess what, this Girl turns out to be a Professional Spammer. After i added her the girl started messaging me frequently saying hi! hello! and i also started responding her casually. and then one day she messaged me saying, she wants to send me her private pictures and for this she needed my email address. the thing is she could have easily got my email from my profile but instead she wanted to make sure that i am active on that email ie she wanted my primary email.

I have also seen some people commenting on her photos and scraping cell numbers and even their home addresses,.. people are crazy. You can read the full message below. Ofcourse i didn’t respond her Back but if at all i had responded her with my email, lets see what would have happened. No doubt the Girl is doing this for her own Benefit.

Facebook users Beware of Hot Girls around wanting to date you Facebook Stalker

Once i send her my email address, she will email me with a virus program or a link containing virus. at this moment i will think that this is something of my interest and i would click that link or install that program. Since i installed the program, My computer will now act as a Zombie and in turn i will mail a copy of this email to all my Contacts automatically. In Short the girl just used me to spread E-mail spam.

Also read: Facebook virus “Koobface” spreading through facebook messages

-What is zombie?

computer zombie lokks likezombie is a type of computer virus that infects your PC and causes it to send out spam emails, for a spammer. The spammer controls and uses your pc without you knowing it. Spammers may be using your computer to send unsolicited — and possibly offensive — email offers for products and services. Spammers are using home computers to send bulk emails by the millions. The Zombie is planted on hundreds of computers belonging to unsuspecting third parties and then used to spread E-mail spam and because of this it becomes very difficult to Trace the zombie’s creator. Zombies can also be used to launch mass attack on any company or website.

-How do I prevent my computer becoming a zombie?

Control What you Share: Spammers collect e-mail addresses from chatrooms, websites, and nowadays especially Social Networking websites. So you got to be very careful about what you share, whom you add as friend, and what you explore on Facebook. Never Scrap your Phone number or home address on facebook, this gives rise yet another big thing “Identity theft”.
Never open unknown emails:
Be cautious about opening any attachment or downloading any files from emails you receive. Don’t open an email attachment — even if it looks like it’s from a friend unless you are expecting it or know what it contains. If you send an email with an attached file, include a text message explaining what it is.
Use a Good Antivirus software
: and keep it up to date. Look for anti-virus software that recognizes current viruses, as well as older ones. I always Recommend use AVG Free edition – The best (***** from hacker9) And If you have some money to throw use the Premium version.

Also read: How To Get or Register the New Facebook Email Account?
Below are some Examples of Spam emails:

What is Cloud Computing? Why Cloud Computing is Dangerous? [Video]

There is a huge Buzz about NeXt generation Cloud computing these days, But what is it exactly? everyone is asking the same question. the thing is that you are already in the cloud. Yes if you have a basic Web mail Account or Facebook account , you are already experiencing the cloud computing.

No doubt Google and social networking sites like facebook have taken the cloud computing to completely new level.
What is Cloud Computing Why Cloud Computing is Dangerous

What is Cloud Computing?
Cloud computing is Internet-based computing, whereby shared resources, software and information are provided to computers and other devices on-demand, like electricity.
In Simple words Cloud Computing is a Computing in which services and storage are provided over the Internet (or “cloud”). in another words Cloud Computing is a technology used to access services offered on the Internet cloud. For example: The use of a Web services such as Flickr, Google Docs, Jing (video screencapture service) to perform the functions(editing) that were traditionally done with software installed on an individual computer.

Why Cloud-computing is better way to run your business?
Cloud computing is a better way to run your business. Instead of running your apps yourself, they run on a shared data center. When you use any app that runs in the cloud, you just log in, customize it, and start using it. That’s the power of cloud computing. Businesses are running all kinds of apps in the cloud these days, like CRM, HR, accounting, and custom-built apps. Cloud-based apps can be up and running in a few days they cost less, because you don’t need to pay for all the people, products, and facilities to run them.

Why Cloud Computing is Dangerous?Why Cloud Computing is Dangerous
Normally Cloud Computing services are free. for example services like Facebook and Gmail are totally “free, But at the same time they also cannot assure you that your data will be secure Because of the simple fact that cloud computing services are shared among people and could be shut down at any time.
The basic fact that you’re sharing data with others is a huge security risk. For example, If I have my server with my data than at least I know that I can protect my data, but if I mix my data with hundreds of servers storing others data as well and if there might be one bug in any application, that will allow a virus to move to the others and thus affecting my data.

IT security expert Richard Stallman says:
“One reason you should not use web applications to do your computing is that you lose control, It’s just as bad as using a proprietary program. Do your own computing on your own computer with your copy of a freedom-respecting program. If you use a proprietary program or somebody else’s web server, you’re defenseless. You’re putty in the hands of whoever developed that software.”

Now you Decide, do you wanna live your life in Clouds??