November 2013
best sinhala blog in sri lanka
I. What is Malware?
The word Malware is short for malicious software, and is a
general term used to describe all of the viruses, worms,
spyware, and pretty much anything that is specifically
designed to cause harm to your PC or steal your

II. Viruses --> Wreak Havoc On Your Files
The term computer virus is often used interchangeably
with malware, though the two don’t actually have the
same meaning. In the strictest sense, a virus is a program
that copies itself and infects a PC, spreading from one file
to another, and then from one PC to another when the files
are copied or shared.
Most viruses attach themselves to executable files, but
some can target a master boot record, autorun scripts, MS
Office macros, or even in some cases, arbitrary files. Many
of these viruses, like CIH, are designed to render your PC
completely inoperable, while others simply delete or
corrupt your files—the general point is that a virus is
designed to cause havoc and break stuff.
You can protect yourself from viruses by making certain
your antivirus application is always updated with the
latest definitions and avoiding suspicious looking files
coming through email or otherwise. Pay special attention
to the filename—if the file is supposed to be an mp3, and
the name ends in .mp3.exe, you’re dealing with a virus.

III. Spyware --> Steals Your Information
Spyware is any software installed on your PC that collects
your information without your knowledge, and sends that
information back to the creator so they can use your
personal information in some nefarious way. This could
include keylogging to learn your passwords, watching your
searching habits, changing out your browser home and
search pages, adding obnoxious browser toolbars, or just
stealing your passwords and credit card numbers.
Since spyware is primarily meant to make money at your
expense, it doesn’t usually kill your PC—in fact, many
people have spyware running without even realizing it, but
generally those that have one spyware application
installed also have a dozen more. Once you’ve got that
many pieces of software spying on you, your PC is going
to become slow.
What many people don’t realize about spyware is that not
every antivirus software is designed to catch spyware. You
should check with the vendor to make sure the application
you are using to protect you from malware is actually
checking for spyware as well. If you come across a PC that
is already heavily infected, run a combination of
MalwareBytes and SuperAntiSpyware to clean it

IV. Trojan Horses --> Install a Backdoor
Trojan horses are applications that look like they are doing
something innocuous, but secretly have malicious code
that does something else. In many cases, trojans will
create a backdoor that allows your PC to be remotely
controlled, either directly or as part of a botnet—a network
of computers also infected with a trojan or other malicious
software. The major difference between a virus and a trojan
is that trojans don’t replicate themselves—they must be
installed by an unwitting user.
Once your PC has been infected with the trojan, it can be
used for any number of nefarious purposes, like a denial of
service (DoS) attack against a web site, a proxy server for
concealing attacks, or even worse—for sending out
buckets of spam. Protection against trojans works the
same way as viruses—make sure that your antivirus
application is up to date, don’t open suspicious
attachments, and think long and hard before you try and
use a downloaded crack for Photoshop—that’s one of
malware authors’ favorite spots to hide a trojan.

V. Worms --> Infect Through the Network
Computer worms use the network to send copies of
themselves to other PCs, usually utilizing a security hole
to travel from one host to the next, often automatically
without user intervention. Because they can spread so
rapidly across a network, infecting every PC in their path,
they tend to be the most well-known type of malware,
although many users still mistakenly refer to them as
Because worms often exploit a network vulnerability, they
are the one type of malware that can be partially prevented
by making sure your firewall is enabled and locked down.
best sinhala blog in sri lanka
android කළු කඩේ..... android තියන අයට ඔය google play එකේ $$$ ගණන් තියන apps නිකන් ගන්න එක android app එකක් අරන් අවා ගොඩක් අය ගාව තිබුනත් නැති අයටත් දැනගන්න එක්ක මේක download කරගන්න ගොඩක් වැදගත් වෙයි.....

මෙන්න ලින්ක් එක ගිහින් ගන්න

ඊටපස්සේ ඉතින් ඉන්ස්ටෝල් කරලා open කරගන්න

මේකට රූට් ඕනි නෑ

no image
best sinhala blog in sri lanka

Access Point: ISP
WAP Settings
- Data bearer: Packet data
- Access point name: isp
- Authentication: Normal
- Homepage:
- Network type : IPv4
- Phone ip address : Atomatic
- Proxy serv. address :
- Proxy port number : 0
MMS Settings
- Connection name – MobitelMMS
- Data bearer – Packet data
- Access point name – wapmms
- Authentication – Normal
- Homepage –
- Network type : IPv4
- Phone ip address : Atomatic
- Name server : Atomatic
- Proxy serv. address :
- Proxy port number : 8080
Get your own settings Dial 222 on your Mobitel phone

The settings relevant to your phone would be identified by the system and sent via SMS to your phone
Then save the settings upon receipt of the SMS
Some phone models may require a password to be entered prior to saving the settings, in which case you need to enter the default password: 1234 as explained in the portal

Manual settings
You can activate it by entering the settings yourself. 

Enter the Access Point Name (APN)
Prepaid Customer: ppwap
Postpaid Customer:
Enter Session mode as Permanent with no user name and password
Enter website as (separation should be full stop not comma)GPRS settings vary from phone to phone. On a case by case basis you can add the following settings:
Case 1: Enter the Gateway IP as
Case 2: Enter the Proxy IP as and port 8080
Case 3: Enter the Gateway IP as and port 9201
Configuring MMS Using the Data Accounts Created

1. Open Messages.
2. Open MMS.
3. Open Message Settings.
4. Open Server Profile.
5. Create/Edit a Profile and enter the following values:
For Dialog MMS Profile:
Rename Profile: Dialog MMS
Data Account: Dialog MMS (this data account is the one you have created)
Connection Type: HTTP
Proxy Address:
Proxy Port: 8080
Username: leave it blank
Password: leave it blank
6. Save the Profile.
7. Activate the Profile.
8. MMS services now ready to use. In case you encounter errors, double check the Data Account and Profile created. In some cases you need to restart the phone.


Manual GPRS settings:
Home page URL :
IP Address :
Port No : 9401
APN : wap / web : Applicable for Pre paid
wap / internet : Applicable for Post paid
Data barer : GPRS / Packet data 
Manual MMS settings:
MMS server URL :
IP Address :
Port No : 9401
APN : mms - Applicable for both Post paid and Pre paid
Data barer : GPRS / Packet data 

Airtel Live (GPRS)
Connection Name : Airtel Live
Data bearer : Packet Data
Access Point Name : Airtel Live
Prompt Password : No
Authentication : Normal
Proxy Serv. Address :
Proxy Port : 8080

Airtel MMS
Connection Name : Airtel MMS
Data bearer : Packet Data
Access Point Name : Airtel MMS
Prompt Password : No
Authentication : Normal
Proxy Serv. Address :
Proxy Port : 8080


Connection Name : hutchlanka
Data bearer : Packet Data
Access Point Name : htwap
Username : 9478******* (Replace With your Phone Number)
Password :
Prompt Password : No
Authentication : Normal
Homepage :
Proxy Serv. Address :
Proxy Port : 8080
no image
best sinhala blog in sri lanka
එදිනෙදා පරිගණක කටයුතු වලදී අපිට හමුවන විවිද attacks කිහිපයක්....
on different blogs : 

Ddos -

Distributed denial of service attack. This is where a website is flooded with packets of data from multiple sources and the server basically overloads. Ddos attacks are often confused with Dos attacks.

Dos - 

Denial of service attack. This is where a site is flooded with packets of data from a single source. A Dos isn't as effective as a ddos, but it is a lot easier, as you can Dos straight from cmd.

cmd - 

Command prompt. This is basically MS-Dos, except it's now just a program with some commands rather than an OS. Cmd can be used to perform tasks using commands. 

.bat - 

Batch file extension. This is the file type which is opened in cmd. Most .bat's that you will see online will be malicious. Some are good though. 

RAT - 
Remote Administration Tool. RAT's are the most commonly used tools by beginner hackers. RAT's are favored because they are easy to use and they perform many functions. They also allow control over of the infected computer, which makes them very popular. 

Slave - 
A user which has been infected with your keylogger/RAT. 

Keylogger - 
A program which logs the keystrokes of a computer. These are usually the first things that beginner hackers learn to use. They have a lot of functions but they aren't as good as RAT's.

Crypter - 

A program used to change the hash sum of a malicious program so that it is undetectable by anti-virus programs. 

FUD - 

Fully UnDetectable. A program which is FUD cannot be detected by ANY anti-virus program. 

UD - 

UnDetectable. A program which is UD is mostly undetectable but can be detected by some anti-virus programs. 

JDB - 

Java Driveby. A fake site which contains a java applet. This java applet is used to download and execute (run) a certain program. The victim as to click the 'allow plugin to run' button to start the applet. 

Silent Java Driveby - 

A java driveby that's downloads and executes a file without the user seeing any pop-ups. These are more effective than normal java driveby's as they are less suspicious. 

Direct link - 

The direct download link to a certain file. When you download a file from a site (e.g. Mediafire), you are given a download link which redirects you to a page with a download button. However a direct link is a link which leads directly to the file. There is no download button, the download starts straight away. 

FTP - 

File Transfer Protocol. An FTP server is a server used to store and send files. 

OS - 
Operating system 

vb - 
Microsoft Visual Basic. 

.NET - 

Microsoft .NET framework. 

C/C+/C++/C# -
Commonly use coding languages. They are often used to code games. 

IP address - 
The address used to identify your network while on the Internet. Every computer has a different IP address, and therefore every IP address is unique. 

VPN - 
Virtual Private Network. This is a network you can connect to on a computer. It will give you anonymity while online. A VPN will hide your IP address by tricking sites and programs into thinking you are somewhere you are not. 

Proxy - 
A proxy redirects web traffic through a virtual tunnel to another IP address. A proxy is like a VPN but only tricks websites, not the whole computer.
no image
best sinhala blog in sri lanka
Android phone තියන අපේ කට්ටියට ගොඩක් වැදගත් වේයි කියල හිතනවා.....
1. Phone Information, Usage andBattery – *#*#4636#*#*

2. IMEI Number – *#06#

3. Enter Service Menu On NewerPhones – *#0*#

4. Detailed Camera Information –*#*#34971539#*#*

5. Backup All Media Files –*#*#273282*255*663282*#*#*

6. Wireless LAN Test –*#*#232339#*#*

7. Enable Test Mode for Service –*#*#197328640#*#*

8. Back-light Test – *#*#0842#*#*

9. Test the Touchscreen –*#*#2664#*#*

10. Vibration Test – *#*#0842#*#*

11. FTA Software Version –*#*#1111#*#*

12. Complete Software andHardware Info – *#12580*369#

13. Diagnostic Configuration –*#9090#

14. USB Logging Control –*#872564#

15. System Dump Mode – *#9900#

16. HSDPA/HSUPA Control Menu –*#301279#

17. View Phone Lock Status –*#7465625#

18. Reset the Data Partition toFactory State – *#*#7780#*#*
best sinhala blog in sri lanka

ඔන්න අද නම් සුපිරිම පොස්ට් එකක් හොදේ....
මෙච්චර කල් අඩ අඩ හිටපු dialog i35 හා i43 phone root කරන්න මෙන්න software එක...
ඒ phone විටරක් නෙමේ හැම phone එකක් ම පළුවන් හැබැයි android හොදේ....
>>>>>Link Here<<<<<<<

best sinhala blog in sri lanka

What’s new in version 6.23 Build 23

(Released: Sep 30, 2015)
, 2015)
  • Fixed the problem with repeating quality lines in video download panel
  • Fixed the problem with erroneous video interceptions from web players
  • Fixed the problem with keyboard focus in Google Chrome
  • Fixed bugs

How to Install: (Note: Please instructions strictly to get IDM registered)
1. ඉස්සෙල්ලම Install කරන්න idm මේ file එක “idman623build23.exe”
Note: no need to exit / close idm if running.
2. Copy කරන්න crack එක installation directory එකට
3. ඔන්න වැඩේ ගොඩ

Download Here

best sinhala blog in sri lanka

මේක තමා හොඳම විදිහ ඒ තමා seeder

මේකෙන් ගිහින් ලොග් වෙන්න ඔයාලට 500 mb 

වැඩියෙන් හම්බවෙනවා

නැත්තම් හම්බවෙන්නේ 2 gb

 දැන් earn free space කියන එක click කරන්න

දැන් ඔයාගේ යාළුවොන්ටත් කියල space එක වැඩි කරගන්න

මේකෙත් paste torrent url කියන එක උඩ address එක
දෙන්න තියෙන්නේ

නිකන්ම seeder එකට එනෝ

මේක තමා ලේසිම විදිහ ඉතින්