One fleeting moment

My mind was clouded For a moment my hopes were shrouded. It was as if spirits I consumed, Consumed my own spirit.

Demons Of The Past

I am running,passing endless train of lights on the ceiling . and passing people with different emotions

Blackle Energy Saving Search

Blackle was created by Heap Media to remind us all of the need to take small steps in our everyday lives to save energy. Blackle searches are powered by Google Custom Search.

Wings of a broken angel !

I once knew an angel a happy go luck one . Sweet charming hopping from one happiness to another one , just like a honey bee. Then I saw her again no more an angel like she used to be ... She changed. .... Her happiness was taken away ... Her wings were taken away ..

What we are!!

What is right what is wrong ... A question , a thought , a truth.. Whole world

Monday, June 21, 2010

demons of the past !!




















I am running ,


passing endless train of lights on the ceiling . 
and passing people with different emotions , 
different me in different situations , 

scenes are changing every second 
and yet feels like they have played for eternity .
for there i see myself , saying- doing- reacting -  
just the things which i should have never said 
never done and they ways i should have not reacted.





for sweat trickles down my neck ,
i can feel the pain through my leg.
but the horrors of the past the mistakes 
of the years do not let me stop .

for past never is past , it will 
haunt you , it will come back !
i fought it and fought hard , 
but today is the day when i run 
all i wish is i can run away .





my blank eyes contain a world 
of sorrow , my facade of smile 
hides all these  miles , 
all the miles that i run , 
that i run away .





acceptance is the only solace 
for how long will i race , 
but for now i run 
run away !!


Saturday, June 12, 2010

rain struck city


www.miteshk.blogspot.com
summer struck city ,
wasn't so pretty.
yes the grand fort of dreams
some fulfilled others
yet working overtime ,were drenched in sweat
and irritation was a logical fate.
yes the summer truck city
wasn't so pretty :Mumbai

and then the legions of dark cloud came ,
oh yes they came .
they came and sent a jolt of joy in hearts .
but alas .
they stood their ground
like the mock dumb warriors.

i gave a cry "dont just leave us high and dry "
and after few or a lot of round of abuses

one of them took looked offended .
he sneaked and opened itself beyond midnight .
other took his clue and came down jostling not just with dew.

and then it rained , it rained so mighty that
joy finally took over me again .

oh , rain struck city u look so beautiful.
you look so beautiful.

its just not my opinion , all hail thee "the rain gods"
all friends and foes alike .

greens and rains hold the sight
its just became more beautiful through the night .

though i miss few ,
but i rejoice the new.
thats the thing with rains
they  give you joy and pain .






Enhanced by Zemanta

Friday, June 11, 2010

Beware of these 6 social networking scams!

A techie recently fell prey to a spammer and lost thousands of rupees from his bank account. And he is not alone, despite many warnings issued to users, scamsters continue spread havoc.
At a time when the gap between the virtual and the real world is thinning down, it is your duty to protect yourself from fraudsters online.
With more people logging on to networking sites, there is a flurry of activity. Spammers are now devising innovative methods to abuse and cheat online users. An Accenture survey has revealed that India has the second-highest number of people (85 per cent) who use social networking at least occasionally.
Global consumers spent more than five and half hours on social networking sites like Facebook and Twitter in December 2009, an 82 per cent increase from the same time last year when users were spending just over three hours on social networking sites, according to The Nielsen Company. In addition, the overall traffic to social networking sites has grown over the last three years.
Cyber criminals are thus exploiting this huge growth. They lure users across social networking sites to open spam 
email, and steal personal data in order to understand what subjects would tempt the user. If you are not careful about protecting vital information, the loss would be beyond your imagination.
Symantec has listed top 6 ways that spammers leverage social networking sites

1. Trojan.Twebot
Symantec has detected a new Trojan botnet creator tool, called "TwitterNet Builder". The threat, called Trojan.Twebot, uses a Twitter account to issue instructions to the Trojans created by the builder. When building Trojan.Twebot, the user is able to supply a public
Twitter account for Trojan. Twebot to follow. As Trojan.Twebot does not try to obfuscate commands on Twitter, it will not be difficult for Twitter security staff to find and close accounts abusing their service in this way.
Botmasters tweet their commands to zombie The threat, called Trojan.Twebot, uses a Twitter account to issue instructions to the Trojansputers, through smart phones
Trojan. Twebot has a number of the usual commands you would expect to see, such as ".DOWNLOAD" to download additional files and ".DDOS" to perform a distributed denial-of-service attack. However, it also has the interesting command ".SAY". This command allows an attacker to get a compromised computer to use the operating system's Text-to-Speech function to read aloud any messages sent by the attacker.
Symantec recreated the attack in a controlled environment (in the lab) to show how Twitter is used as a command-and-control server for Trojan.Twebot and how by using smart phones, attackers can easily issue commands to their botnet.


2. Twitter accounts with celebrity names
Twitter is also increasingly being hijacked for spam, using celebrity names. For example, a Chinese retailer has used David Beckam to push sales , tricking users into believing that the football star is following them.
The credibility of the fake account is bolstered by other fraudulent accounts linking back to it and by cross-following legitimate Twitter accounts, which will probably have been hacked earlier. In this particular case, the false David followed over a thousand accounts with a single common link - the account name contains the word "candid".
This malicious activity is fast becoming common practice nowadays. Attackers are creating Twitter accounts as a vehicle for spam advertising and, sometimes, they even include
So is David Beckham following your tweets? Probably not. Unfortunately, the spammers often succeed because many people allow their curiosity to get the better of them and click on nearly every link they see without thinking about the consequences.
Remember, always be sceptical if someone you don't know starts following you or sends you strange direct messages. Also, always check the account carefully. It is not always easy to determine if you are reading the official Twitter account of someone real or that of a clever impostor.
3. Facebook toolbar
Spam e-mails have been doing the rounds on the Internet hoping to lure recipients into downloading a Facebook toolbar. If you download the file by clicking on "Download Here", you'll see a file with the icon shown below:
If you take a closer look at the icon, "darkSector" is shown inside of it. How strange. Is this actually a Facebook toolbar? If we take a look at the property of the file, the details mentioned are for a program called HijackThis (a Dropping Trojans through social networking downloads security software). This is even stranger.
Well, the file is neither a Facebook toolbar nor HijackThis. It's a malware detected by Symantec software as Trojan.Dropper.
Whenever you come across oddities like this, you can take similar steps to check if something could potentially have malicious intentions.

4. The Koobface worm
This worm infects users by using social engineering attacks. It spreads by abusing social networking websites or by employing search engine optimisation techniques to lure potential victims to malicious sites.
The infrastructure used by the Koobface gang is relatively simple: a central server redirects victims to one of the infected bots where the social engineering attack takes place. While the central redirection point has been actively targeted by take-down requests, the Koobface gang has so far been quick.
A year has passed since Koobface was first detected; yet, this worm and the people behind it are still very active in keeping their infrastructure up to date, finding new means of propagating the infection, and taking advantage of their victims.
In just three weeks, Symantec observed 17,170 distinct infected IP addresses. Several Indian cities 

5) Symantec has witnessed a malicious spam campaign against Facebook, accompanied by a phishing attack. These messages look like an official Facebook invite or password reset confirmation mail. If we place the cursor over the update button in the message, we can actually see the phishing URL in the status bar.
If a user clicks on the "Update" button, he or she is redirected to a Facebook look-alike phishing site. Here, users are asked to enter a password to complete the update procedure.
Unfortunately, the user's password will be stolen if they try to log in on this page. Similarly, another malware or phishing attack using URLs in the coming day(s) on MySpace. Social networking sites with huge user bases are targeted to infect maximum machines or gather passwords for more malicious activities in future.
Users need to be extra careful of suspicious attachments, especially those including a "password reset" request because legitimate websites will not send an attachment for resetting a password.

6) In the past, spammers would register their own accounts and then send unsolicited messages through the social networking site. By default, the site generated automated email to let the user know that there is a new message.
While such notifications are technically legitimate, the user would have most likely considered the messages as spam, due to the unsolicited content. For spammers, this technique had a shortcoming - the message sent to the user was from an unknown person/entity.
Recently, Symantec has observed a rise in a newer technique of social networking site abuse. Symantec has confirmed that this account was not created for spamming purposes. Instead, the sender's account was hijacked and this message was sent to everyone who is "connected" (direct friend, friend of a friend, etc).
If the user navigates to the Web page provided in the message, Bloodhound.PDF.10 tries to load. In the example, the sender was not a direct friend with the user. However, it is highly likely that the user could receive such messages from a direct friend. This could give the user a false sense of confidence, which may lead to malware being installed on the user's machine.
It is a good reminder to all social networking site users that the message really may not be from a friend, even if it is from a friend.



Its getting day by day more difficult to keep ur self safe on net - try to be more prudent and it might help you a long way.



Enhanced by Zemanta

Wednesday, June 9, 2010

SOLACE IN EVENINGS

www.miteshk.blogspot.com   To new beginnings. To the pursuit of...somethingnes

The human heart has hidden treasures,
In secret kept, in silence sealed;--
The thoughts, the hopes, the dreams, the pleasures,
Whose charms were broken if revealed.
And days may pass in gay confusion,
And nights in rosy riot fly,
While, lost in Fame's or Wealth's illusion,
The memory of the Past may die.
But there are hours of lonely musing,
Such as in evening silence come,
When, soft as birds their pinions closing,
The heart's best feelings gather home.
Then in our souls there seems to languish
A tender grief that is not woe;
And thoughts that once wrung groans of anguish
Now cause but some mild tears to flow.
And feelings, once as strong as passions,
Float softly back--a faded dream;
Our own sharp griefs and wild sensations,
The tale of others' sufferings seem.
Oh! when the heart is freshly bleeding,
How longs it for that time to be,
When, through the mist of years receding,
Its woes but live in reverie!
And it can dwell on moonlight glimmer,
On evening shade and loneliness;
And, while the sky grows dim and dimmer,
Feel no untold and strange distress--
Only a deeper impulse given
By lonely hour and darkened room,
To solemn thoughts that soar to heaven
Seeking a life and world to come.

Frozen moments

www.miteshk.blogspot.com  - to new beginnings , to pursuit of some thingness 


Gentle dewdrops
gliding on lotus leaf, 
Earth smiles with pearl lips
when sun shines
waves are gushed
to kiss thirsting banks, 
Butterfly boozes
the nectar of flowerBirds chanting eternal song
in the lap of the tree
This is present
Pleasant melody of nature
Oh! Time stop
Let this moment be freezed.