Showing posts with label Tricks And Tips. Show all posts
Showing posts with label Tricks And Tips. Show all posts

06 February, 2014

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos.
Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort).
But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, keygens, cracks, patches. Even if they worked just for a little while, users were prompted every minute reminding,
idm has been registered with a fake serial number
Internet Download Manager has been registered with a fake serial number
I tried re-patching, reinstalling, but this annoying message was persistent. It was so annoying that it keeps popping up until you exit  IDM.
Many of the users were experiencing the same problem and the most favorite solution was to edit the“c:\windows\system32\drivers\etc\hosts” file and setting the address of http://internetdownloadmanager.com and similar domains to local host 127.0.0.1 [click to see].
I didn’t like the above mentioned way and it felt like having a vasectomy instead of just putting on a condom. :)

The other way is the easiest way. After cracking and patching IDM, just go to the installation folder of IDM “C:\Program Files (x86)\Internet Download Manager” and rename the “IDMGrHlp.exe” to anything you want or just delete it. Done!

rename the "IDMGrHlp.exe" to anything you want or just delete it
Rename the “IDMGrHlp.exe” to anything you want or just delete it
But wait! Every time you run IDM, there would be a new popup box saying “IDM cannot find 1 files that are necessary for browser and system integration. Please reinstall IDM“.

To get rid of it, place anything in that folder “C:\Program Files (x86)\Internet Download Manager and rename it “IDMGrHlp.exe“. I made a copy of the “idmBroker.exe” and renamed it to “IDMGrHlp.exe“.


make a duplicate of idmBroker.exe and rename it to IDMGrHlp.exe.
Make a duplicate of idmBroker.exe and rename it to IDMGrHlp.exe.

No annoying message anymore!!!

27 December, 2013

Finding Serial keys

How to Find SERIAL KEYS from Google:

steps:-

1) go to google.com

2) write the name of the software you want key and add 94FBR at the end.
Eg :- if you want to find key of IDM then write
"IDM 94FBR " (without quotes)


3) search it and you will find many sites with serial keys of that softwares

DONE !!!!

11 December, 2013

Want to check your password’s strength? Try this

Got a secure password? You may have to rethink! 

US software giant Microsoft has developed a new online tool that tells you how vulnerable your passwords may be, helping you choose better passwords in the future. 

The tool 'Telepasswords' tries to predict the next character of your passwords by using knowledge of: common passwords, such as those made public as a result of security breaches, common phrases and common password-selection behaviors. 

The new project from Microsoft Research has a simple premise: you start typing one of your favourite passwords in its little text box, and it tries to guess what the next character is. 

"To guess the next character you will type, we send the characters you have already typed to query our prediction engine. The prediction engine uses a database of common passwords and phrases that is too large for us send to your computer," the project website said. 

To measure how much of an effect Telepathwords has on your behaviour, the tool also sends and maintains a log of your mouse movements and the timings of when characters are added to or removed from your password. 

"This log does not contain the actual characters you type, but it does indicate whether each character was among those predicted by Telepathwords," the project website said. 

Telepathwords uses a log for research intended to increase its understanding of how users choose passwords and how to help them choose better passwords in the future.

06 December, 2013

How to protect your Facebook, Twitter account

Security experts say passwords for more than 2 million Facebook, Google and other accounts have been compromised and circulated online, just the latest example of breaches involving leading Internet companies. 

Some services including Twitter have responded by disabling the affected passwords. But there are several things you can do to minimize further threats -even if your account isn't among the 2 million that were compromised. 

Here are some tips to help you secure your online accounts: 

One thing leads to another
When a malicious hacker gets a password to one account, it's often a stepping stone to a more serious breach, especially because many people use the same passwords on multiple accounts. So if someone breaks into your Facebook account, that person might try the same password on your banking or Amazon account. Suddenly, it's not just about fake messages being posted to your social media accounts. It's about your hard-earned money. 

It's particularly bad if the compromised password is for an email account. That's because when you click on a link on a site saying you've forgotten your password, the service will typically send a reset message by email. People who are able to break into your email account, therefore, can use it to create their own passwords for all sorts of accounts. You'll be locked out as they shop and spend, courtesy of you. 

If the compromised password is one you use for work, someone can use it to break in to your employer's network, where there are files with trade secrets or customers' credit card numbers. 

Better passwords
Many breaches occur because passwords are too easy to guess. There's no evidence that guessing was how these 2 million accounts got compromised, but it's still a good reminder to strengthen your passwords. Researchers at security company Trustwave analyzed the passwords compromised and found that only 5 percent were excellent and 17 percent were good. The rest were moderate or worse. 

What makes a password strong?
* Make them long. The minimum should be eight characters, but even longer is better. 

* Use combinations of letters and numbers, upper and lower case and symbols such as the exclamation mark. Try to vary it as much as you can. "My!PaSsWoRd-32" is far better than "mypassword32." 

*Avoid words that are in dictionaries, as there are programs that can crack passwords by going through databases of known words. These programs know about such tricks as adding numbers and symbols, so you'll want to make sure the words you use aren't in the databases. One trick is to think of a sentence and use just the first letter of each word - as in "tqbfjotld" for "the quick brown fox jumps over the lazy dog." 

* Avoid easy-to-guess words, even if they aren't in the dictionary. Avoid your name, company name or hometown, for instance. Avoid pets and relatives' names, too. Likewise, avoid things that can be looked up, such as your birthday or ZIP code. 

One other thing to consider: Many sites let you reset your password by answering a security question, but these answers -such as your pet or mother's maiden name- are possible to look up. So try to make these answers complex just like passwords, by adding numbers and special characters and making up responses. 

A second layer
Many services offer a second level of authentication when you're accessing them from a computer or device for the first time. These services will send you a text message to a phone number on file, for instance. The text message contains a code that you need in addition to your password. The idea is that a hacker may have your password, but won't have ready access to your phone. 

Facebook, Google, Microsoft and Twitter are among the services offering this dual authentication. It's typically an option, something you have to turn on. Do that. It may be a pain, but it will save you grief later. In most cases, you won't be asked for this second code when you return to a computer you've used before, but be sure to decline that option if you're in a public place such as a library or Internet cafe. 

One final thought
Change your passwords regularly. It's possible your account information is already circulating. If you have a regular schedule for changing passwords for major accounts, you reduce the amount of time that someone can do harm with that information. 

You'll need to decide what counts as a major account. Banking and shopping sites are obvious, as are email and social-networking services. It probably doesn't matter much if someone breaks into the account you use to read newspaper articles (unless it's a subscription). 

And strong passwords alone won't completely keep you safe. Make sure your computer is running the latest software, as older versions can have flaws that hackers have been known to exploit. Be careful when clicking on email attachments, as they may contain malicious software for stealing passwords. Use firewalls and other security programs, many of which are available for free.

04 December, 2013

Disable pop up fake serial number IDM

Are Facing IDM has been registered with fake serial number Pop up issue? (But Still You can use IDM)

Here is the way to 

First of all, Go to run and Type "regedit"

Then Click on HKEY_CURRENT_USER > Software > DownloadManager >

Find "CheckUpdtVM" and Change its value data to 0

That's it!!! 

03 December, 2013

IDM Serial Key For All Version 100% Working (Lifetime Activate)

Internet Download Manager is used to download the files from the World Wide Web (Internet). It is widely used as it is capable of catch the download file from the Streaming video and audio as well as from the live streaming. Its very powerfull tool for high speed download. its also automatic config tool which support most all browser. just click on download then IDM automatic take in it.

Must Follow the below steps for activate IDM any version Official Download Link:- 


If you have already IDM then ignore above step.

1.Install any version of IDM and open it.

2. Now click on “registration” on the menu bar.

3. When you click on registration, Now a new window Will be open ask your First Name, Last Name, Email Address and Serial Key.

4. Enter your First name, Last Name, Email address in the required field.

5. In the serial key field enter any of the following given below

RLDGN-OV9WU-5W589-6VZH1

HUDWE-UO689-6D27B-YM28M

UK3DV-E0MNW-MLQYX-GENA1

398ND-QNAGY-CMMZU-ZPI39

GZLJY-X50S3-0S20D-NFRF9

W3J5U-8U66N-D0B9M-54SLM

EC0Q6-QN7UH-5S3JB-YZMEK

UVQW0-X54FE-QW35Q-SNZF5

FJJTJ-J0FLF-QCVBK-A287M

And click on “OK” to register.

6. After you click “OK”, it will show an error message ” IDM has been registered with a fake Serial Number or the Serial number has been blocked IDM is exiting” .

7. Go to C:\Windows\System32\drivers\etc

8. in the Etc folder you will see the “hosts” file. Open the file with notepad. Now copy the below lines of code and add to hosts file as shown below the image box :

127.0.0.1 tonec.com

127.0.0.1 www.tonec.com

127.0.0.1 registeridm.com

127.0.0.1 www.registeridm.com

127.0.0.1 secure.registeridm.com

127.0.0.1 internetdownloadmanager.com

127.0.0.1 www.internetdownloadmanager.com

127.0.0.1 secure.internetdownloadmanager.com

127.0.0.1 mirror.internetdownloadmanager.com

127.0.0.1 mirror2.internetdownloadmanager.com

9. After adding these codes, save the notepad file. And exit from there. Now again repeat the 2nd step to 5th step. Restart your PC. After restart Now open your IDM it will be full version and not ask you to register.
Done! Enjoy the Full Version of IDM !


01 December, 2013

How to set video as desktop wallpaper

Set video as desktop wallpaper.

1. Open VLC Media Player.

2. Then Go to Tools > Preference Or press CTRL P and Select Video from left panel.

3. Then Choose DirectX video output from output drop down list.


4. Save the changes ans restart VLC Media Player.


5. Play any video you would like to set as your desktop wallpaper.


6. Then click on Video and select DirectX Wallpaper from the dropdown list.


7. Now Minimize vlc player and you will see your video running on your desktop as wallpaper.


8. If you want your default wallpaper back then uncheck DirectX Wallpaper from video dropdown list.

29 November, 2013

Survey confirms, Facebook affects your career

NEW DELHI: The digital world is influencing career graphs as firms embrace technology and turn to specialised job searches and social media platforms to aid in recruitment, a survey byHeadHonchos said.
About 89 per cent of the professionals surveyed are of the view that social profiles are "important" for their careers, according to a snap poll conducted by the job and career portal.
Just over 49 per cent agreed that profiles on online platforms such as LinkedIn and Facebook, or even a personal blog, are "very important" for one's career.
"The digital world offers a perfect opportunity to project your image to influencers and gives candidates an outreach that they have not had before," said HeadHonchos CEO Uday Sodhi.
Social media has emerged as an important platform for personal branding, Sodhi said.
During the hiring process, a strong social presence can tilt the balance in an applicant's favour, especially at senior levels, where reputation and stature are often reflected in the social profile, he added.
About 40 per cent of the participants in the poll believe their social profiles are "somewhat important" for career progression, although not a make or break factor, the survey showed.
Only 11 per cent of those surveyed indicated that their social profile is "not important" for careers.
The online snap poll had a sample size of 129 respondents.

28 November, 2013

Resize Image without loosing Quality

People hate to visit websites which require more time for loading. So one should always seek to improve the webpage load time, so to do so you have to look at many things like loading sources, page cache, media files etc. One among such media file is images, adding beauty to your page, but at the same time, it is regarded as the most bulky resources which takes much time to load on the page, thereby causing inconvenience to the visitors.
But one can improve the page loads time by cutting the size of an image to a significant amount. But even resizing the image without any proper knowledge may be troublesome as you may lose the quality it had. Though photoshop provides a nice feature to save the original quality of the pic, it is not preferred much as it’s too expensive to purchase the photoshop application for desktop or web version. So here I’m going to provide you with free online tools to Resize Image without loosing Quality

Web Based Tools to Resize Image without loosing Quality


1.Kraken.io :

JPEG, PNG, GIF, SIV are some of the image formats that can be compressed with this online application. This reduces the image to a quite considerable point without losing the image size. This application is also available in Chrome and Firefox extensions

2.Imageoptimizer.net:

After uploading the image from your computer, give the size of the image and quality you wish to have after processing. This provides only some control of the output and compression ratio But Greatly Helps to Resize Image without loosing Quality.

3.Smush.it:

Smush.it is the best and popular online application you can have to compress images. It is present with an up-loader as well as URL box to have the image. In this you will not be provided with the ‘enter’ option to enter the image quality as that of previous one because it automatically optimizes the image by compressing it to a limit.

4.Compressjpg.com & Compresspng.com :

I would suggest you to have these application, for more control of the image quality. A slider appears as soon as you upload an image to auto control the quality of the last image. A preview panel is provided for showcasing the changes according to the quality slider change. So before downloading the image you can have the review of your final image. This application is available on different domains for JPG and PNG images.

5.Punypng.com :

This application is available to compress the PNG files. Upload an image and you can get a compressed size of the image. Besides this, tinypng.com , a quick tool to compress the PNG images to the best level without affecting the image quality.

Desktop tool to Resize Image without loosing Quality


If you need a Desktop tool to do this task then i would suggest you to have PNG Gauntlet as your first choice, You will need .Microsoft Net Framework 4.0 to run this tool on your Windows.
Resize Image without loosing Quality
You won’t Face any difficulty in Using this tool as it is very User Friendly. While Optimizing the images PNG Gauntlet will show you older size and Optimized size of the image. this Program is not that Fastest at it work but Usefull.

26 November, 2013

How can I convert Gmail from standard view to basic HTML view?

Hi there Everyone! Supppose if anybody Needs to  convert Gmail from standard view to basic HTML view

Click The direct link to basic HTML view is:

 https://mail.google.com/mail/?ui=html&zy=h



23 November, 2013

6 tips to improve your laptop's battery life

Working on the go and your laptop has run out of juice? This problem plagues most laptops as they tend to lose their battery capacity over time. But worry not, as there are several ways to improve laptops' battery life without too much trouble.

 So, here are 6 ways to improve your laptop's battery life.

1. Display

Similar to phones, laptop screen is also a power guzzler. Keep the brightness as low as possible. Also, If you also have keyboard backlighting, turn it off.

2. External Devices

Any external device plugged in the USB port constantly draws power from your laptop. Removing them after use conserves battery.

3. Overheating

Overheating leads to the internal fans to run faster - which in turn consume more battery. Use a laptop cooler to keep the temperature at bay.

4.Hibernate

Instead of putting your computer on standby, choose to hibernate - it saves the state of your computer and shuts down the computer and saves battery.

5. Windows Power Plans

Laptops running windows have built-in power plan settings. You can choose various items such as display brightness, when to turn off the display/hard-drives and USB power. Use these to improve your laptop battery life.

6.BatteryCase

Laptops running windows have built-in power plan settings. You can choose various items such as display brightness, when to turn off the display/hard-drives and USB power. Use these to improve your laptop battery life.

21 November, 2013

How to increase storage on Windows 8.1 with SD cards

Windows 8.1 devices arefull PCs — yes, even the tablets — and often support SD cards. This allows you to easily expand your PC's storage. Just an SD card and you can treat it as a "permanent" part of your device. The SD card will likely be slower than your device's built-in storage, but it's a great way to store music, videos, pictures, and other files.


The original release of Windows 8 didn't have very good support for SD cards. You couldn't easily access themWindows 8-style apps without going through some obscure tricks on the desktop. This has changed with the Windows 8.1 upgrade, which offers much improved support for SD and micro-SD cards.

an SD card

To get started, pick up an SD card or micro-SD card. Be sure to get one that your device supports, as some devices may only support smaller micro-SD cards and not the larger SD cards.

After you the SD card, it will appear as another drive with its own drive letter. You can use it normally from desktop applications and the File Explorer window. If you're using Windows 8-style apps, you'll need to do some more tweaking.

Set default save locations

The new PC settings app allows you to easily set a removable drive as your default save location for pictures, music, and videos. This is the easiest way to set up an SD card as the main location for your media files, but it's limited. For example, you can't set it as your default documents folder here.

To do this, press Windows Key + I and click Change PC settings. PC & Devices, Devices, and then scroll down until you see the Default save locations section. Click the Setup button and the removable drive you want to use as your default save location.

This creates Music, Pictures, and Videos folders on your SD card. Windows then adds these folders to your Music, Pictures, and Videos libraries and sets them as the default save location. Your default save locations are used bothWindows 8-style apps and when saving a file to a librarya desktop application.

Note that this won't move any existing music, pictures, or videos to your SD card. You'll have to do that manually, if you want to — check the next section for more information.

Manage librariesthe desktop

Windows 8-style apps use libraries. For example, a music app gets its musicthe Music library, while a photo-editing application accesses its imagesthe Pictures library. To manageWindows stores such files used by Windows 8-style apps, you'll have to manage your libraries. Read our overview of the Windows libraries feature for more information about how they work.

Confusingly, Microsoft has hidden the libraries by default in Windows 8.1, even though they're required by Windows 8-style apps and now work properly with SD cards. To access libraries, open the File Explorer on the desktop, click the View tab on the ribbon, Navigation pane, and Show libraries.

a library and you'll see the folders inside it. If you made an SD Card your default save location earlier, you'll see a folder on the SD card and a folder on your computer. You can move folders between the computer and the SD cardhere using cut and paste.

To modify your libraries — for example, perhaps you want to use the SD card as your default save location for documents — right-click a library and Properties. You'll be able to add and remove foldersthe library, in addition to choosing which folder is your default save location.

Unlike on Windows 8 and previous versions of Windows, you can easily add foldersa removable drive to your libraries without using third-party programs for managing your libraries.

Save downloads to an SD card

Your Downloads folder can also be moved to your SD card. To do this, simply right-click the Downloads folder in the File Explorer window and Properties. Click the Location tab and specify a location on the SD card for the Downloads folder.

Whenever a program downloads something to your downloads folder, it will be stored in the Downloads folder on your SD card instead.

Move SkyDrive to an SD card

In the final version of Windows 8.1, your SkyDrive folder can also be stored on an SD card. SkyDrive uses "smart files" to save space, but it can still use quite a bit of space if you choose to download files for offline use. Move the SkyDrive folder to an SD card and you can free up space on your system drive.

This is as simple as moving your downloads folder. Just right-click the SkyDrive folder in the File Explorer window, Properties, the Location tab, and choose a new location for it.

This entire process demonstrates the evolution of Windowsa desktop operating system to one designed with mobile devices in mind. Windows 8 had poor support for SD cards, requiring tricks to add them to libraries. Windows 8.1 offers improved support for SD cards with an option in the PC settings app, but many other settings still require drilling down to the desktop — even if you're using a small, 8-inch Windows tablet.

18 November, 2013

Candy Crush Saga installed by half a billion people

NEW YORK: The hugely addictive game 'Candy Crush Saga' has been installed by half a billion people, it has been revealed. 

According to developer King, the game has been installed more than 500 million times across Facebook, iOS, and Android, The Verge reported.

The game, which is expected to file for an initial public offering soon, has become so popular that one out of every 23 Facebook users is a fan of the game.

15 November, 2013

What to do if your iPhone gets lost?

If your iPhone is no longer in your possession, you might never see it again and the last thing you want to worry about is data security. Here's what you need to do.

Data theft can be just as damaging (if not more so) than losing a very expensive gadget. Your iPhone might be your pride and joy, but just imagine if someone gained access to your email, bank or social media accounts - wouldn't that potentially be worse?

Here's what to do when the unthinkable happens.

Use Find My iPhone

With the power of iCloud it's now possible to locate your device provided it still has access to some sort of data connection (cellular or Wi-Fi). This won't work if your device is not using the Find My Phone service (by default you have to opt out), has run out of battery or was last seen in Airplane Mode, but it's certainly worth a shot.

Head over to iCloud.com, login with your Apple ID and the same password you use to authorise app purchases and click on Find My iPhone. iCloud will attempt to locate your device, if found you can take a note of whether it's moving, whether it's down the back of the sofa or indeed whether it appears somewhere entirely different toyou last had it - in which case, it's probably been stolen.

Using iCloud.com it's possible to initiate a remote wipe of the phone, which will cause the phone to reset itself to factory settings and preserve your data. Do this by logging in, clicking on Find My iPhone then selecting the device and enabling Lost Mode. Don't forget to leave a message and a phone number in the hope that whoever took it might actually return it (or leave it somewhere, at least).If your phone has been stolen but remains traceable, you may want to hand the information over to the police. There have been a few exampleslaw enforcement have used Apple's Find My iPhone location data to recover stolen devices, though be prepared that this may not be the case.

If your phone has been updated to iOS 7, you've got another safety net in place in the form of Activation Lock. Even after wiping the device, it will require your own personal Apple ID and password to be usable. Until these credentials are provided, the phone will refuse to work as intended. It's useless to the thief, and not even Apple will unlock it.

You can tell if your phone has been updated to iOS 7 first and foremost by the graphical style. Apple introduced a new, cleaner interface. You can see the difference at-a-glance in the screenshot above (iOS 7 is on the right). You can also head over to Settings > General > About and look at the number under Version.

If you're reading this before your phone has been stolen (touch wood, it won't be) this is just another compelling reason to upgrade to the latest and greatest.

What if you can't find it?

If you can't find your phone (and for the very security conscious out there, even if you can) there are still a few things you should do to ensure your most important accounts remain safe.

Your personal email address is probably more important than you realise. It'syour password resets go, quite possibly your Apple ID is registered there and I bet you've got a bank account or similar financial service that uses it too. Access to this (and any, connected work email addresses could be just as devastating) should be revoked immediately upon noticing your phone has gone walkies.

Changing your password is often enough to require a re-authentication for your various devices, though if you're using an application-specific password for logging in (such as those provided with Gmail's two-factor authentication) then you can just revoke access under security settings.

Twitter and Facebook (among others) integrate with iOS 7 too. Revoke Twitter access by visiting Settings > Apps on Twitter's main website (above), then clicking Revoke next to each entry. If you have core integration that won't allow you to revoke access, simply change your main Twitter password and your phone's login will then be outdated. Facebook's approved apps can be revoked under Account Settings > Apps (below).It's especially important you do this as soon as physically possible if you were walking around without a passcode lock.

Onceaccount access has been revoked, you'll probably want to cross your fingers that the thief or police are able to return your device. Having access to the IMEI (Settings > General > About) makes it easy to initialise a carrier-block, but iOS 7 takes care of much of the problem of stolen phones through Activation Lock.

Preventing problems

At present, the best thing you can do is to lock your phone with a passcode or more adventurous password to any potential security breaches. Making sure you've got Find My iPhone running under Settings > iCloud will ensure your iPhone is traceable should it go missing. Upgrading to iOS 7 provides some peace of mind in the form of Activation Lock, rendering the phone useless even after it has been erased.

Even if you think your phone is secure, there's always a chance the thief will guess and gain access. For best security, don't choose easy "1234″ passcodes. You can read more about how disabling Control Centre may help protect your phone, as well as a breakdown of the current vulnerabilities faced by the iPhone 5S in our Touch ID security article.

14 November, 2013

Google releases official waitlist Glass users

WASHINGTON: Google Glass Exlporer 
website has introduced a formal waitlist for consumers, who want to book the device before its launch sometime next year.

The new option gives users a chance to declare a spot in the programme to become Glass explorers, as soon as it becomes available, provided they're willing to pay the steep 1,500 dollars entry fee, the Verge reports.

Earlier, the only way to get the device was either to be selected by Google, or get in through the Explorer invite programme, which opened to the friends of the initial explorers.

However, Google did not disclose the number of Glass units that might be given out through the waitlist.

12 November, 2013

How to identify fake accounts on Facebook, Twitter, Google+

Almost everyone who matters in some way is on one or more social networks. But on the flipside, there are many miscreants, who masquerade as celebrities or put up fake pages of well-known institutions. If you aren't careful you may end up following an imposter, instead of the real Aamir Khan or Katrina Kaif.

The real person may not even have a social networking account. So, how do you ensure you are following the right person?

On Twitter
 and Google+, some well-known individuals and organizations have got their accounts stamped with a "Verified" sign. On Twitter, it's a green tick mark, on G+, it's a grey tick mark. That indicates the social networking site has proactively verified the genuineness of the account. But all genuine accounts don't have the "verified" badge.

The only other definite way to confirm the genuineness of an account is to find out the Twitter page from the official web page of the individual or institution. But there could be fake web pages as well, and you may not know which is the authentic one.

In that case, the only option is to combine your gut instincts with common sense and logic. One way is to see who the followers or mutual friends are. Two, take a close look at the type of status updates or tweets. Look for something that is odd or inconsistent. Then that may be a fake site.