Introduction: | |
The antivirus software is like a guard that identifies and destroys viruses on your system before the virus can cause any serious damage to your system such as deleting important files or formatting your system. Antivirus software can also protect your system from harmful programs such as Trojans and worms. | |
17.1 Types of Computer Viruses | |
Computer virus is a program written that can attach itself to a file when the infected file is opened, infects other files on the system, and also spreads to other systems with the help of infected files. Viruses damage the system by deleting files on the system, increasing the file sizes, or automatically formatting the system | |
17.1.1 Boot Viruses | |
The boot sector virus copies the virus code in the boot sector of the disk, this ensures that the virus is always executed and loaded in the memory when the system starts. Once the virus is loaded in the memory it infects other files. In addition, it also infects the floppy disks that are inserted in the drive and spreads itself to other systems. For example, the virus Tequila infects all the EXE files on the system and also infects the Master Boot Record of the hard disk. | |
17.1.2 Polymorphic Viruses | |
A person can keep on changing the way he looks to disguise himself this makes it difficult to trace a person. Similarly, polymorphic viruses are coded in such a way that they infect a system and change their signature before infecting the next system. As a result, the antivirus software finds it difficult to identify this virus, as it looks different after every infection. For example, the virus Hare copies the virus code in the boot sector of the hard disk and infects floppy disks inserted in the system, it also changes the viruses signature frequently to prevent Antivirus software from detecting it. | |
17.1.3 Macro Viruses | |
Macros are blocks of code written to automate frequently performed tasks and embedded in a program file such as a Word document or an Excel worksheet. When a macro having the virus code is executed, it infects the files on the system. For example, the Love Bug virus erases files on the infected system and emails a copy of the macro virus to contacts from the users address book. | |
17.1.4 Worms | |
Worms are programs that replicate and spread to other systems. A worm resides in the system memory and spreads without attaching itself to a file. They may cause damage to the system such as deleting files from the system and may also slow down the system. For example, the worm Melissa attaches itself to an email and sends the email to all the contacts specified in the users address book, it also clogs email servers. | |
17.1.5 Trojans | |
A Trojan is a program file that claims to do something but it actually does something that is not required. For example, a Trojan may pose as a computer game but when it is executed it may also delete files from your system or email the passwords stored on your system to the Trojan writers email address. Trojans also allow remote users and hackers to gain unauthorized access to your system. The Trojan Subseven allows a hacker to take control of the mouse, eject the CD-ROM drive, and delete/download/upload files from the system. The Trojan.Treb supplies hackers with the infected system information and the systems IP address. | |
17.2 Installing Antivirus Software | |
You must install an antivirus software such as Panda Antivirus, Norton AntiVirus, or PC-cillin on the system to protect it from viruses. You must check the reliability and the features offered by an antivirus software before installing it on the system | |
17.2.1 Norton AntiVirus 2004 | |
You can install Norton AntiVirus 2004 software from the CD to protect the system from viruses, worms, and Trojans. You can also download a shareware copy of the software from the company website or from a download site such as www.download.com. | |
Best practices | |
1. Check if your system has the necessary requirements specified in the software System Requirements. 2. Uninstall any previous version of Norton AntiVirus, or any other antivirus software already installed on the system. Restart the system after uninstalling the software. 3. Open Regedit. Browse to HKEY _ Local Machine _ Software. Delete the entry Symantec. 4. Close all open files and programs before installing the software. | |
Hands on exercise | |
To install Norton AntiVirus 2004 : 1. Insert the Norton AntiVirus 2004 CD in the CD drive. 2. Browse the CD and locate the software setup file such as NAV.exe on the CD. 3. Run the setup file. A dialog box appears prompting to run a preinstall scan. 4. Click Yes to start the Pre-Install Scan. The Symantec Pre-Install Scanner dialog box is displayed. | |
- Symantec Pre-Install Scanner Dialog Box | |
The Symantec Pre-Install Scanner dialog box scans files on the system. The scan prompts you to delete the files that are infected with viruses. 5. View the scan report displayed in the notepad file after the completion of the pre-installation scan. 6. Close the notepad window to continue the installation. The Norton AntiVirus 2004 Setup wizard screen is displayed. | |
2 Norton AntiVirus 2004 Setup Wizard | |
The wizard requests information from the user required to install the software on the system. The wizard screen displays the following buttons: _ Back -Returns to the previous wizard screen _ Next - Displays the next wizard screen __ Cancel -- Stops the installation 7. ClickNext.- The License Agreement screen is displayed. The wizard screen displays the terms and conditions for using the product. 8. Select theI accept the License Agreementoption and click Next. The Select the destination folder screen is displayed. | |
Select the destination folder Screen | |
The above wizard screen enables you to specify the folder location where the software files must be installed. It displays theDestination Foldertext box to specify the entire folder path, and a Browsebutton to browse the folder for installing the software. _ The wizard prompts for the product activation key before this screen, if the software is a registered copy. This does not appear for the shareware copy of the software. 9. Type the path and name of the destination folder in the text box and clickNext.The Ready to install/configure the application screen is displayed. | |
Ready to install/configure the application Screen | |
The above wizard screen displays the installation folder paths. 10. ClickNextto start the installation. The wizard displays the Readme screen after completing the installation. | |
Readme Screen | |
The above wizard screen displays information about the installed software. 11. ClickNextto display the installation success screen. | |
Installation Success Screen | |
The above wizard screen displays a message confirming the successful installation of the software, information for users installing the software from a CD, and information for Instant Messenger users. 12. ClickFinish to complete the installation. The post installation wizard welcome screen appears. | |
Post Installation Wizard Welcome Screen | |
The Post Installation Wizard enables you to configure additional settings before using the Norton AntiVirus 2004 software. 13. ClickNext.The Online wizard screen appears. | |
Online Wizard Screen | |
The above wizard screen displays option buttons that enables you to select if you want to install the software on a trial basis, purchase the product, or enter the product key to register the product. 14. Select the required option button and click Next. The Tasks wizard screen is displayed. | |
Tasks Wizard Screen | |
The above wizard screen displays checkboxes that enables you to select the tasks that the software must automatically perform after installation. 15. Select the tasks that must be performed and click Next.The Summary wizard screen is displayed. | |
Summary Screen | |
The above wizard screen displays the configuration details selected using the wizard. 16. Click Finish to complete the installation. 17. Restart the system. | |
17.3 Working with the Antivirus Software | |
Norton AntiVirus 2004 software protects and scans your system for viruses, worms, and Trojans. It also scans the web pages displayed in the browser for harmful code that can damage the system, clean viruses in incoming and outgoing emails. It also removes spyware software that slows down the system by tracking your system usage and leaking out important information such as passwords. The Norton AntiVirus window enables you to access and configure the different features of the software. | |
Hands on exercise | |
1. Select Start _ Programs _ Norton AntiVirus _ Norton AntiVirus 2004. The Norton AntiVirus window appears. | |
Norton Antivirus 2004 Window | |
The window displays panes that have options to access and configure the different features. You must click the option from the window that you want to access. The window displays the following: _ LiveUpdate - Displays the LiveUpdate window to update Norton AntiVirus _Options - Displays the Options window to configure Norton AntiVirus _ Help & Support - Displays a drop down menu with different help options _ Norton Antivirus - Lists the different options available: _ Status : Displays the status and a quick way to access the frequently used Norton AntiVirus features _ Scan for Viruses :Displays the different scanning options _ Reports : Displays the scan summaries and virus information | |
17.3.1 Configuring | |
You can configure Norton AntiVirus 2004 according to your preferences. This enables you to set the level of protection that the system must be protected with. A higher level of protection increase the system security but may impose restrictions on your activity such as some sites may not display components like animation files that the software suspects could be a virus. It may also disable spyware without which some software may not run. _ It is advisable to set options at the recommended level. To configure Norton AntiVirus, open Norton AntiVirus and click Options. The Norton AntiVirus Options window appears. | |
Norton AntiVirus Options Window | |
The Norton AntiVirus Options window displays the different options and a button in the left pane and the settings for the option in the right pane. The left pane displays the following: _ System - Specifies options for scanning the system _ Internet - Specifies options for scanning emails and messenger activity _ Other - Specifies the different threats that must be identified on the system _ Default All - Resets all the options to the default levels set by Norton To change the settings, you must select the required option from the left pane, and clickOK after changing the settings displayed in the right pane. | |
17.3.2 Using LiveUpdate | |
LiveUpdate connects to the Norton web server, downloads and updates the files required by Norton AntiVirus to identify and delete the latest viruses. _ You can also download the definitions file from http://securityresponse.symantec.com and run the file on the system not connected to the Internet. | |
Hands on exercise | |
To update Norton AntiVirus using LiveUpdate: 1. Open Norton AntiVirus and click LiveUpdate.The LiveUpdate window appears. | |
LiveUpdate Window | |
The LiveUpdate window enables you to view the list of files available for download and configure LiveUpdate. 2. Click Next.LiveUpdate connects to the Norton web server and displays a list of updates available. | |
Displaying Updates Available | |
The window displays the list and the size of updates available for download. You must check the updates you want to download and install and clear the ones you do not want to install. 3. Click Next.LiveUpdate downloads and installs the updates from the Internet. The summary of updates installed appears. | |
Displaying Summary of Installed Updated | |
4. Click Finishto close the LiveUpdate window. | |
17.3.3 Scanning Drives | |
Scanning checks the system for virus infected files. Norton AntiVirus 2004 enables you to select the drives, folders, or files that you want to scan. | |
Best practice | |
1. Update the software using LiveUpdate before scanning. 2. Close all running programs before scanning. | |
Best practice | |
1. Update the software using LiveUpdate before scanning. 2. Close all running programs before scanning. | |
7.1.1 Advanced Technology Attachment | |
The ATA transfers data between the hard disk and the system using | |
Hands on exercise | |
To scan drives: 1. Open Norton AntiVirus and click Scan for Viruses from the left side of the Norton Antivirus window. The Scan for Viruses pane appears. The Scan for Viruses pane displays different panes for scanning the system. The options available are: _ Task - Specifies the location to scan _ Scan my computer : Scans all the drives and folders from My Computer. _ Scan all removable drives : Scans the removable media in drives such as floppy disk drive and CD drive _ Scan all floppy disks : Scans the media in the floppy disk drives _ Scan drives : Displays a dialog box to select the drives to scan __ Scan folders : Displays a dialog box to select the folders to scan _ Scan files : Displays a dialog box to select the files to scan _ Action - Enables you to start a scan and access the Norton AntiVirus Scan Wizard to customized scan _ Scan : Starts the scan selected in the Task pane _ New : Creates a customized scan to scan selected files and folders _ Edit : Modifies the customized scan _ Delete : Removes a customized scan _ Schedule Task - Create a task schedule to scan the system _ Schedule : Enables you to specify a schedule to scan the system 2. Select the required scan from the Task pane such as Scan my computer. 3. Click Scan from the Actions pane. The Norton AntiVirus scan starts displaying the status of the scan and the files scanned. | |
Scanning Files | |
4. Click Finished to complete the scan. | |
17.4 Preventing Virus Attacks | |
Viruses are dangerous software that can cause great damage to your system. The antivirus software can protect your system from virus, however at times they may not detect the new viruses. The best way to protect your system from viruses is to prevent viruses from getting into your system, as the virus mostly causes damage only after you run the virus infected file on your system. | |
Best practice | |
1. Install an AntiVirus software. 2. Configure the antivirus software to provide adequate protection by increasing the level of protection. 3. Regularly update the AntiVirus software. 4. Scan floppy disks and emails messages before opening them. 5. Be careful before executing files that you receive by email with the extension .exe, .com, or .vbs on the system, as they can be infected with viruses. 6. Open email attachment files only if you are expecting the attached file, or the sender is known and has confirmed sending the file.. 7. Inform the sender of an email of you suspect that someone has sent you a virus. 8. Store a fake contact in your system address book such as hfueosjh@jhfidci.com. So that you will get the bounced email if your system is infected and a worm or virus tries to send out emails using your account. 9. Try to avoid downloading and installing software from the Internet. If you have to download files, download them from trusted sources. 10. Install only registered copies of software on the system. 11. Visit the antivirus websites and refer to news websites to know the latest viruses affecting systems. 12. Download and run virus removal tools for the latest viruses available on trusted antivirus websites, such as www.norton.com. 13. Disconnect an infected system from the network, and then scan it. In addition, to prevent the Boot Sector Viruses, you can use a write-protected floppy disk as the virus cannot copy itself to a write-protected disk. To protect your system from macro viruses, disable the execution of macros on your system. | |
Hands on exercise | |
To disable macros in Word: 1. Select Start _ Programs _ Microsoft Word to open Word. 2. Select Tools _ Macro _ Security. The Security dialog box appears. The Security dialog box enables you to set the options for executing macros. This dialog box displays the following tabs: _ Security Level -Sets the security level for executing unsigned macros that are not from the trusted sources _ High : Does not executes unsigned macros _ Medium : Prompts the user for executing or disabling unsigned macros _ Low :Executes unsigned macros _ Trusted Sources - Lists the trusted sources for executing macros 3. Select the Highoption from the Security Level tab. 4. Click OK. |
CHAPTER 17 ANTIVIRUS SOFTWARE
Subscribe to:
Post Comments (Atom)
Other Posts >>
Transforming Numerical Systems
(5)
What is
(3)
Features
(2)
"मैग्नेटिक हिल" साइंस के पास भी नहीं है जवाब
(1)
'43
(1)
'घाघरा' गाने पर इस बाला के ठुमके देख माधुरी भी रह जाएंगी दंग
(1)
10 Amazing Animal Disguises (w/ video)
(1)
10 Point Checklist for creating a WordPress Theme
(1)
10 Ways to Get Traffic for Free
(1)
10 ऐसे क्रिकेटर जो खेलते-खेलते मैदान से ही दुनिया छोड़ गये
(1)
1000 से ज्यादा लोगों को कोर्ट में घसीटा
(1)
2 मुंह वाला सांप
(1)
20 Creepiest Ghost
(1)
200' बार हुआ युवती से रेप
(1)
25 हजार रुपये में ओला में रजिस्टर करें
(1)
302/Day And You Will Not Believe How He's Doing It! India News investigates Work From Home Opportunities.
(1)
33 साल पुराने मर्डर का रहस्य खुला जब खूनी ने खुद फ़ोन कर के अपना जुर्म कबूला
(1)
4 साल में देश के 11 परमाणु वैज्ञानिकों की संदिग्ध हालात में मौत
(1)
40 Magic Tricks in 4 Minutes - Day 279 of 365
(1)
4G से मत होइए खुश
(1)
4जी की 10 जरूरी बातें जो आपको भी जाननी चाहिए
(1)
5 Prestashop Theme Generators
(1)
5 जगहों से जुड़े सच जानकर आपके रोंगटे खड़े हो जाएंगे
(1)
5 बातें और हर लड़की आपके पीछे आएगी
(1)
8 Ways to Spot a Liar
(1)
8085 Microprocessor
(1)
ADBMS
(1)
Aishwarya Rai Photos Gallery
(1)
Aishwarya Rai Sexy look
(1)
Alia bhatt Bollywood Actress Hot Images
(1)
All Banks Official Missed call balance enquiry number
(1)
Amazing Magic Show: One Of The Best Magic Shows
(1)
Amisha Patel Hottest Photos
(1)
Amitabh Bachchan
(1)
Architechture of 8085
(1)
Architecture of Database Systems
(1)
Artisteer 4.2 RC v4.2.0 build 60559...
(1)
Ayesha takia Bollywood Actress Hot Images
(1)
BREAKING NEWS: New Delhi Man Makes Rs.6
(1)
Best Answer to explain OOPS
(1)
Best Free WordPress Hosting options
(1)
Best Love Shayari
(1)
Best Tool for Freelancers in Web Development
(1)
Binary 2 Decimal
(1)
Binary Numbers
(1)
Blog Directories To Submit Your Blog for geting traffic
(1)
Bollywood Actress Bipasha Basu Romantic Photos
(1)
Bollywood Actress Kareena Kapoor Hot Photos
(1)
Bollywood Actress Sonam Kapoor Hot Photos
(1)
Boost WiFi Modem speed
(1)
Browser
(1)
C++ Program To display the half pyramid of *
(1)
Casting Director: Dharmendra K.
(1)
Choosing an Internet service
(1)
Configure Your PC to a Local Area Network
(1)
Create your own Ethernet cables with this simple training
(1)
DBMS Architecture
(1)
DBMS Concurrency Control
(1)
DBMS Normalization
(1)
Data Warehouse Design Approaches
(1)
Decimal 2 Binary
(1)
Decimal 2 Decimal Transforming Numerical Systems
(1)
Decimal 2 Hexadecimal
(1)
Decimal System
(1)
Differences or Compare Data Warehouse database and OLTP database?
(1)
Discus
(1)
Discuss the top down vs bottom up approach to data warehouse
(1)
Display ads and Make Money
(1)
Download Artisteer 4.3 Full Version + Keygen Crack Patch
(1)
E-mail
(1)
ER Diagram Representation
(1)
Easy Magic Tricks for Everyone
(1)
Email Messages
(1)
Email protocols: POP
(1)
English Hindi Vocabulary….
(1)
Example
(1)
Explain The structure of E-mail addresss ?
(1)
Explain various protocols used in E-mails
(1)
FREE SMS collection... “You only live once
(1)
FREE WordPress Plugins
(1)
Features and types
(1)
Features of Java Programming Language
(1)
First live video at Facebook head quarter by Facebook CEO Mark Zuckerberg
(1)
Free Acting Audition In Ajmer
(1)
Funny Pictures
(1)
General Post Office(GPO)
(1)
Ghost Photos
(1)
Hansika motwani latest hot unseen photos
(1)
Hardware needed
(1)
Hex 2 Binary 2 Octal Transforming Numerical Systems
(1)
Hexadecimal 2 Decimal Transforming Numerical Systems
(1)
Hot & Sexy Wallpaper
(1)
Hot Photos and Wallpapers
(1)
How To Submit Blogger Sitemap To Google Webmaster Tools?
(1)
How a Browser Retrieves a Web Page
(1)
How do I connect to the Internet
(1)
How do I disable the video autoplay ?
(1)
How to Get Free Wi-Fi Access Anywhere
(1)
How to Hack Wi-Fi Passwords
(1)
How to Make Money Online with Google Adsense
(1)
How to Make Popcorn at Home
(1)
How to Make a Website without Learning HTML and CSS
(1)
How to Make an Ethernet Cable - Cat5
(1)
How to Read Minds
(1)
How to Spot a Liar
(1)
How to get Traffic from Social Bookmarking sites
(1)
How to register a free domain name?
(1)
IMAP and MAPI
(1)
ISO 32 Bit and 64 Bit 2015
(1)
ISP
(1)
Indian girls in saree
(1)
Indian glamour actress sunny leone hot Images-Sexy Wallpapers
(1)
Internet Service Provider
(1)
Is data warehouse normalized or denormalized
(1)
Java characteristics & features
(1)
Kajol
(1)
Kangna Ranaut Indian Actress hot Wallpapers Pictures
(1)
Katrina Kaif Hot Photo
(1)
Katrina Kaif Images
(1)
Katrina Kaif Pics
(1)
Katrina Kaif Pictures
(1)
Katrina Kaif Sexy Photos
(1)
Katrina Wallpapers
(1)
Keyboard
(1)
Latest Hot Photos of Sonakshi Sinha ~ Bollywood
(1)
Local Area Network
(1)
Lose 3 kgs of Stomach Fat EVERY Week with Just 2 Diet Tips. Bollywood Stars use this simple trick to melt fat off their bodies!
(1)
Love
(1)
Lucknow
(1)
MMC Console Window Keyboard
(1)
Madhuri Dixit Hot Sexy Photo Gallery
(1)
Make free internet calls
(1)
Mallika Sherawat Photo Gallery
(1)
Mars planet facts news & images
(1)
Most Beautiful Photos of Deepika Padukone
(1)
NASA confirms that liquid water flows on Mars
(1)
Nasa scientists find evidence of flowing water on Mars
(1)
Negative Binary Numbers
(1)
OOPS Concept
(1)
Octal System
(1)
Online transaction processing
(1)
Open X Ad Server
(1)
PHP Script.
(1)
PHP-based online shopping cart
(1)
Phir Jee Le Zara Ye Zindagi
(1)
Photos
(1)
Photos For Smile
(1)
Pics ...
(1)
Priyanka chopra bollywood
(1)
Programming Language
(1)
Protect Your Facebook Account from Spam and Scams
(1)
Protect Your WordPress Website against Spamming
(1)
RARE PHOTOS
(1)
RJ45 Connectors
(1)
Rani Mukherjee Hot Sexy Bikini Images
(1)
Rare Bollywood Pics You’ve Never Seen! Part
(1)
Reasons for creating a data mart
(1)
Relational Algebra
(1)
SEXY भारतीय लड़किया साड़ी में
(1)
Sexy Bollywood Actress Anushka Sharma Hot Pics
(1)
Sexy Celina Jaitley Photos and Pictures
(1)
Sexy Photos Gallery
(1)
Shayari Collections
(1)
Shayari on Human Feeling
(1)
Shortcuts
(1)
Speech In English / Hindi
(1)
Sri Divya Latest Hot Stills
(1)
Stills
(1)
Sweet and Sexy Pics Of Bollywood Actress Shilpa Shetty ...
(1)
Switching from decimal to binary numbers
(1)
TAX saving
(1)
TELNET
(1)
TELecommunication NETwork
(1)
Teachers' Day
(1)
Thank you teacher
(1)
Top 5 Animation/VFX Tools of the Year
(1)
Top 5 Joomla Template Generators
(1)
Top Sexy Pictures of Preity Zinta
(1)
Toshiba launches Android-powered TV
(1)
Uniform Resource Locator
(1)
Unity 4.6.1 Final + Patch Free Download
(1)
Untold stories of postmortem room
(1)
VFX
(1)
Very Sad Love Shayari for Broken Heart हिंदी में ...
(1)
Video Full video
(1)
Vidya balan bollywood actress hot and sexy image gallery
(1)
Web
(1)
What are the responsibilities of a data warehouse project manager?
(1)
What do you understand by Business intelligence
(1)
What do you understand by OLTP ?
(1)
What is FTP
(1)
What is GOPHER ?
(1)
What is a Search Engine?
(1)
What is a Web Browser
(1)
What is the Data mart
(1)
Which CMS is best as Content Manager ?
(1)
While You’re in Your 20s
(1)
Why
(1)
Why To Use Content Management System ?
(1)
Why You Hate the Sound of Your Own Voice
(1)
Windows 10 All Editions
(1)
Windows 10 Free Download
(1)
Wish you a Happy Teachers Day.
(1)
Wordpress Plugins
(1)
Xara Web Designer Premium v9.2.3.29638 (x32bit / x64bit) Full With Crack
(1)
Xender For PC free download Windows XP/7/8/8.1
(1)
and how do I use it to transfer files?
(1)
bollywood actress
(1)
bollywood actress hot and sexy image gallery
(1)
but if you do it right
(1)
ca
(1)
data-warehouse
(1)
denormalization process for creating data warehouse
(1)
designs
(1)
explain with example
(1)
fb
(1)
form
(1)
ftp
(1)
hot indian bride pictures
(1)
hot alia bhatt
(1)
hot and sexy photos
(1)
hot sexy indian actress
(1)
how-attract-shy-girl-dating
(1)
indian
(1)
information life cycle management (ILM) definition
(1)
java
(1)
latest
(1)
learn english
(1)
linux
(1)
mehndi
(1)
mysql
(1)
numbers and character C++ Program to print half pyramid as using * as shown in figure below.
(1)
once is enough.” “In three words I can sum up everything I've
(1)
online dating tips
(1)
or OLTP
(1)
ost
(1)
php
(1)
pics and wallpapers collection ...
(1)
save tax
(1)
shah rukh khan house
(1)
spoken English
(1)
structure
(1)
the concept of information life cycle
(1)
tips-for-save-internet-data-pack
(1)
top down vs bottom up
(1)
trans
(1)
types of Database Users in Oracle or data base
(1)
watch Magic..Video
(1)
webking
(1)
webking host
(1)
website hosting cheep hosting
(1)
what is ISP
(1)
what is url
(1)
windows 10 key
(1)
www.webkinghost.in
(1)
you have never seen
(1)
अगर लड़की को हुआ है आपसे प्यार तो करेगी ये चीज़ें
(1)
अगले जन्म में क्या होंगे
(1)
अब मात्र 45 मिनट में बनेगा पासपोर्ट जानिए कैसे?
(1)
अभिनव से श्वेता ने की थी दूसरी शादी
(1)
अमेरिकी स्पेस एजेंसी नासा
(1)
अस्पताल जहां भूत-प्रेत करते हैं इलाज
(1)
आ रही है
(1)
आंखो की रोशनी बढ़ाने के 10 टिप्स
(1)
आत्माओं से बात करने का चौथा तरीका आप भी जानिए..
(1)
आत्माओं से बात करने का तीसरा तरीका आप भी जानिए..
(1)
आत्माओं से बात करने का दूसरा तरीका आप भी जानिए..
(1)
आत्माओं से बात करने का पहला तरीका आप भी जानिए...
(1)
आत्माओं से बात करने का पांचवां तरीका आप भी जानिए..
(1)
आत्माओं से बात करने के सरल तरीके आप भी जानिए...
(1)
आदमी की पर्सनालिटी उसके
(1)
आपबीती
(1)
इन देशों में चल रहा है 10G
(1)
इन महिलाओं के इशारे पर नाचता था अंडरवर्ल्ड.
(1)
इस झील में बहता है झाग
(1)
इस तरह से पता चलता है कि होने वाली हैं आपकी मौत...
(1)
उबालने पर दोगुना पोषण देंगी यह 10 सब्जियां
(1)
ऊप्स: एक ही समय में दीपिका की इतनी अदाएं
(1)
एक सैनिक की आत्मा जो कर रही 50 साल से देश की रक्षा
(1)
एकसाथ भेजें मेसेज
(1)
एमेजॉन
(1)
ऐसे पार्टनर ढ़ूंढ़ती हैं महिलाएं
(1)
ऐसे बढ़ाएं अपनी सेविंग
(1)
ऑनलाइन डेटिंग के लिये 5 टिप्स
(1)
काला नहीं हरा जादू है VFX
(1)
कुंभ
(1)
कुरुक्षेत्र
(1)
कैसे पाएं निजात मुंहासों से
(1)
क्या आप जानते है
(1)
क्रिकेट इतिहास के वे सुनहरे पल
(1)
खुलेआम हो रही है लूट
(1)
गंजेपन का नया इलाज
(1)
गले लगकर सोने के लिए 1 घंटे में लेती हैं 3 हजार रुपये
(1)
घड़ी बनाकर गिरफ्तार हुए छात्र ने छोड़ा अमेरिका
(1)
घर की गरीबी ने बना दिया था बार डांसर
(1)
घर-परिवार में झगड़ों का कारण बनते हैं ये 9 वास्तु दोष
(1)
चल रहा है 10G internet
(1)
चेहरे की चमक बढ़ाने के लिए
(1)
जानने के लिए जरूर पढ़ें
(1)
जानवरों को इंसानों से ज़्यादा फ़ोटो खिंचवाने का शौक
(1)
जानिए VFX की हकीकत
(1)
जानिए कैसे...
(1)
जानें कब पढ़ा गया आपका मेसेज
(1)
जुगाड़ के तो भईया हम ही हैं किंग
(1)
जो बन गए बेहद खास
(1)
टैक्स छूट पाने के हैं कई रास्ते
(1)
ट्रीटमेंट के 10 दिन बाद शुरू हो जाएगी बालों की ग्रोथ
(1)
डिलीट हुए मेसेज वापस पाएं
(1)
तीन साल बाद कार आपकी
(1)
तुलसी
(1)
तुलसी किस तरह
(1)
थप्पड़ मारती है आत्मा
(1)
दिमाग भी लेता है सांस
(1)
दीपावली
(1)
दुनिया का पहला अमर इंसान
(1)
दुनिया की ‘सबसे सेक्सी महिला’
(1)
देखिए लोट-पोट करती तस्वीरें
(1)
नागा साधु
(1)
निराशा से निकलने और खुद को motivate करने के 16 तरीके
(1)
पत्नी का आरोप
(1)
पब्लिक ट्रांसपोर्ट में कैसे नमूने सफ़र करते हैं
(1)
पहली बार किसी लड़की से बात कैसे करें
(1)
पहली बार लड़कियाँ लड़को में क्या देखती हैं ?
(1)
पार्टनर के साथ ईजी हो जाएगी लाइफ
(1)
पूर्व जन्म में क्या थे
(1)
पेन ड्राइव से करें डाटा रिकवरी
(1)
पोस्टमॉर्टम रूम के भीतर की सच्चाई क्या है
(1)
पढ़ें ये टिप्स
(1)
फ्री मिलेगा यह फोन
(1)
बना दिया प्राइवेट पार्ट
(1)
बस के सामने दिखा भूत! फोटो हुई वायरल
(1)
बिग बी
(1)
बिग बी (Amitabh Bachchan) की लाइफ के RARE PHOTOS
(1)
बिना VISA 59 देशों में ट्रैवल
(1)
बिना मेकअप ऐसी नजर आती हैं बॉलीवुड एक्ट्रेसेस
(1)
बिना सिम के कैसे एक और फ़ोन नंबर रखें
(1)
बियर के खाली कैन से भी ऐसे बढ़ाई जा सकती है WIFI मॉडम की स्पीड...
(1)
बुजुर्ग की पिटाई कर टाइपराइटर तोड़ने वाला दारोगा
(1)
भारतीय दुल्हन
(1)
मंगल ग्रह पर बहता पानी होने के संकेत
(1)
मंगेतर ने न्यूड सेल्फ़ी भेजने से किया इंकार तो लड़के ने तोड़ी शादी
(1)
मछुआरे और मगरमच्छ में अनूठी दोस्ती बच्चों की तरह मगरमच्छ के साथ खेलता है
(1)
मजेदार तस्वीरें
(1)
मरे हुए बच्चों को फिर जिंदा करने का दावा!
(1)
महाभारत काल में परमाणु बम
(1)
महाभारत काल्पनिक नहीं
(1)
महिलाएं भी करतीं है यह गंदा काम...
(1)
माथा देखकर जानिए आप बनेंगे अधिकारी या भाग्य करेगा कंजूसी
(1)
मुर्गी पहले आई या अंडा
(1)
यह फोटोशॉप का कमाल नहीं है
(1)
यह है दो मुंह वाला व्यक्ति
(1)
यहां जुड़वां बच्चों का जन्म होना आम बात है
(1)
यहां हमले हुए तो खत्म हो जाएगा इंटरनेट
(1)
यूपी पुलिस ने महिला को निर्वस्त्र कर
(1)
ये बात लड़के भी नहीं जानते!
(1)
रखें इन 10 बातों का ध्यान
(1)
रहस्यमयी है यह मंदिर अंग्रेज भी नहीं खोज पाए इसके पीछे का राज
(1)
लग जाती है आग
(1)
लड़की पटाने के टिप्स या तरीके
(1)
लड़की पटाने के तरीके
(1)
लड़कों की ये 11 अदाएं लड़कियों के दिल को छू जाती हैं
(1)
लड़कियाँ क्या करती है जब वो किसी को पसंद करती है !
(1)
वैज्ञानिकों के उड़े होश
(1)
वो 5 खजाने....जो बन गए रहस्य
(1)
शर्मीली लड़की को कैसे करें आकर्षित?
(1)
शादी से पहले पार्टनर से पूछे ये 5 सवाल...
(1)
शाहरुख के बंगले ( 'मन्नत' ) की INSIDE PHOTOS
(1)
शिष्यों की पत्नियां भी हड़प लेता था नारायण सांई
(1)
संकट के संकेत
(1)
संगीत सेरेमनी में बेटी ने किया था डांस
(1)
संपत्ति ही नहीं
(1)
सचिन तेंदुलकर
(1)
सड़कों पर दौड़ाई बिना ड्राइवर वाली बसें!
(1)
सरकार आपके अकाउंट पर रखेगी नज़र तो फेसबुक करेगा आगाह
(1)
सरकार देती है इसकी इजाजत
(1)
साउथ अफ्रीका की गुफा में मिला इंसान का नया 'रिश्तेदार'
(1)
सावधान! आसमान से आ रही है बड़ी आफत
(1)
सुलझ गई है पहेली
(1)
सैकड़ों सालों से इस नदी से निकल रहा है सोना
(1)
हर लड़की आपके पीछे आएगी
(1)
हिंदी में शायरी
(1)
हैरतअंगेज सीन्स
(1)
No comments:
Post a Comment