tag:blogger.com,1999:blog-19611646106046955112024-03-21T07:53:53.171+05:30COMPUTEROLOGYAnonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comBlogger53125tag:blogger.com,1999:blog-1961164610604695511.post-25117096419047737832014-06-15T13:00:00.000+05:302014-06-15T13:00:37.589+05:30Best Android Keyboard becomes free on the Play Store!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkqkBZ1ScRzFJK4CxzCZ_wEHp731fJCKcqW1tywFQUXXarjIHr1Y4YfcqZtmdLXbO7NhiSr1mXmH-v682-DWxITVpybDlpFt2zjRZz1B53sD5jE-R0ZrIba9LjjVp7yAadETF8xcEjWd9O/s1600/SwiftKey-logo-white-on-black.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkqkBZ1ScRzFJK4CxzCZ_wEHp731fJCKcqW1tywFQUXXarjIHr1Y4YfcqZtmdLXbO7NhiSr1mXmH-v682-DWxITVpybDlpFt2zjRZz1B53sD5jE-R0ZrIba9LjjVp7yAadETF8xcEjWd9O/s1600/SwiftKey-logo-white-on-black.png" height="320" width="314" /></a></div>
<br />
<h4 style="text-align: left;">
<span style="font-family: Verdana, sans-serif;"><b>Swiftkey</b> is an app for<i><b> Android</b></i> (2.2 and above) that replaces your onscreen </span><span style="font-family: Verdana, sans-serif;">keyboard , with an intelligent easy to use and faster keyboard that is guaranteed to increase your typing efficiency.</span></h4>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;">This app delivers smart <i>auto-correct</i></span><span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"> and <i>word prediction </i>in <b>over 60 languages</b>!</span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxbOb2FtDyG3xA16E0McSMiCsZE61WdPADlWdpolRYeN09j23X2yS4whfvW1MB7AOrhgkWvNRPk_h_8i29JqNE30fWj4u2smd_360BK4YHvjT0Rg1gUUtVzZAgMHYWJ2RiK93bbSb39s2w/s1600/screen-shot-2013-04-20-at-22-54-39.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgxbOb2FtDyG3xA16E0McSMiCsZE61WdPADlWdpolRYeN09j23X2yS4whfvW1MB7AOrhgkWvNRPk_h_8i29JqNE30fWj4u2smd_360BK4YHvjT0Rg1gUUtVzZAgMHYWJ2RiK93bbSb39s2w/s1600/screen-shot-2013-04-20-at-22-54-39.png" height="257" width="320" /></a></div>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;">Recently , this app has received many upgrades , and now comes with its own store , which includes over 30 themes and is <b>now available for free on Google Play.</b> </span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://play.google.com/store/apps/details?id=com.touchtype.swiftkey"><span id="goog_504135674"></span><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span>
<span style="background-color: white; color: #222222; font-family: arial, sans-serif; line-height: 38.400001525878906px;"><br /></span></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com0tag:blogger.com,1999:blog-1961164610604695511.post-62529800019847563512014-06-15T12:35:00.000+05:302014-06-15T12:35:20.183+05:30Health Tip - F.lux<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ3cI2IoXF5DZwhBbxPS_p58RvwJg6q2RRTuYjnZb0BkbgZCO95cOPslRuLkHYTJHEHwaGV1LiUiXOE59Kf7Kd6npPEZ379TfWkNdXl-5LfDgPBDWBS6gEbxJ7Ovrxq5LCqNWZbGlybGvl/s1600/flux-icon-big.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQ3cI2IoXF5DZwhBbxPS_p58RvwJg6q2RRTuYjnZb0BkbgZCO95cOPslRuLkHYTJHEHwaGV1LiUiXOE59Kf7Kd6npPEZ379TfWkNdXl-5LfDgPBDWBS6gEbxJ7Ovrxq5LCqNWZbGlybGvl/s1600/flux-icon-big.png" /></a></div>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">Ever stay up late at night to finish some work , and get blinded by the screen?</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><span style="font-size: 15px; line-height: 18px;">During the day, computer screens look good—they're designed to look like the sun. But, at<b> 9PM, 10PM, or 3AM,</b> you probably shouldn't be looking at the sun.</span></span><br />
<br />
<span style="font-family: Verdana, sans-serif;"><b>f.lux</b> fixes this: it makes the color of your computer's display adapt to the time of day, warm at night and like sunlight during the day.</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;">It's even possible that you're staying up too late because of your computer. You could use<b> f.lux</b> because it makes you sleep better, or you could just use it just because it makes your computer look better.</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><b>f.lux</b> makes your computer screen look like the room you're in, all the time. When the sun sets, it makes your computer look like your indoor lights. In the morning, it makes things look like sunlight again.</span><br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"> </span><br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Verdana, sans-serif;"><a href="https://justgetflux.com/dlwin.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></span></div>
<br />
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span>
<span style="font-family: Verdana, sans-serif;"><br /></span></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-36889204459462852202013-10-01T20:34:00.000+05:302013-10-01T20:34:51.959+05:3015K Twitter Accounts Hacked , A True Story ?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; text-align: center;">
<img border="0" height="318" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimnFKpg5zUSSdFPHUQL9AGXXx_nSKDoyA2M24cIuaJqbD8r-NNGT5Gz-ZOp50Ih_sEPjrR0jzJRKf6YjJkCXzOItjpZwovx2zZVv8-XGcxEd1KomPjDxneny7TqFeWnzc85OUDwtJWWA0/s320/ailbje.png" style="border-width: 0px;" width="320" /></div>
<br style="color: #333333; font-family: Verdana; font-size: 12px;" /><span style="color: #333333; font-family: Verdana; font-size: 12px;">Few days back an article was published on techworm.in, where a hacker named "Mauritania Attacker" leaked claimed to leak thousands of twitter accounts, the data was made available for public to use and was uploaded on zippyshare.com. The data contained the twitterid, twitternick, oauthtoken nand oauth_token_secret.</span><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><a href="" name="more" style="color: #a46f38; font-family: Verdana; font-size: 12px;"></a><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br />
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; text-align: center;">
<img border="0" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqVtZNQ9hR80IhbtT3KXWHKN2h3ayyraGrbM5xCQ3BwK7y77pcEIQUXn8w-BUgFX2gl_vFOoalEINTR4cMKTntpGo0ayTWiPInCk2RmmGiQKK0fbfwv5GMaxh1_WxDJndw6FQEofn4PsY/s640/21418_156851031180990_415079354_n.jpg" style="border-width: 0px;" width="640" /></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<br /></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<b>How Was the data breached?</b></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<b><br /></b></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
Well, it seems to me that the database of a third party app was breached which contained the list of Oauth tokens. In laymen terms oauth is used for authorizing the third party applications without the need of giving them the password. </div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<br /></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
The application is granted an access token which it uses to authorize it selves, which means that an attacker having hold of the access token would be able to access the twitter accounts without the need of a password. The Oauth tokens can be easily be by tampering the request with a web application proxy such as Tamper Data, Burp suite etc. Twitter has recently introduced Two step authentication, however it isn't much handy in this case.</div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<br /></div>
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px;">
<b>How Twitter Users Can Protect Themselves? </b></div>
<br style="color: #333333; font-family: Verdana; font-size: 12px;" /><span style="color: #333333; font-family: Verdana; font-size: 12px;">Well, if the attacker keeps compromising database of the third party applications and getting the hold of the oauth tokens, then their is not much that twitter can do, Since they can protect their database from being breached, however they certainly have no hold of the third party application database.</span><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><b style="color: #333333; font-family: Verdana; font-size: 12px;"><u>Twitter users are advised to revoke access to all the third party application and reauthorize them</u></b><span style="color: #333333; font-family: Verdana; font-size: 12px;">, therefore the access tokens would be expired and the attacker would not be able to use them. Twitter users should only use trusted third party applications and when they are not using any of them, they should revoke the access so that the access token would be expired.</span><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><span style="color: #333333; font-family: Verdana; font-size: 12px;">Facebook, has also known issues with their oauth in past, Security reseachers have pointed multiple flaws and all of them relied upon stealing of the oauth tokens, The issue with twitter in this case is a bit different, the access tokens were compromised due to a third party app, whereas in facebook oauth tokens could have been compromised due to a flaw inside it's design.</span><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><span style="color: #333333; font-family: Verdana; font-size: 12px;">Twitter has denied the claims made by an attacker that any part of the twitter's database was compromised, which seems true to me. The Mauritania Attacker has posted a status on his facebook that he will reveal exactly how the access tokens were compromised today to techworm.</span><br style="color: #333333; font-family: Verdana; font-size: 12px;" /><br />
<div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; text-align: center;">
<img border="0" height="280" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiX2Bp41jDvN6BNOg8w-Q_TjhwLFFmjW2IYGOMr6F7zg0sohfQ8HMc4XtNnIE7tjHlSzR5x3Q2unSTESxvQHIzbPEI-2ljYGz9qtT56yaglu5K5El2kzsVnI2Z7cKfx200nBF2Lc2eL96w/s400/Untitled.png" style="border-width: 0px;" width="400" /></div>
</div>
Unknownnoreply@blogger.com1tag:blogger.com,1999:blog-1961164610604695511.post-32506326908916852612013-07-19T19:38:00.002+05:302013-07-19T19:38:46.705+05:30How To Do Direct Download Of Torrent Files For Free Without Using Any App<div dir="ltr" style="text-align: left;" trbidi="on">
Friends, this is an post which lacks of people search everyday, but they get disappointed by seeing the results in which they are asked to download apps and then they can do direct downloads. But how is it called a direct download if they need to install some apps like 1clickdownloader, uTorrent, Bittorrent and other such apps. Now here, there won't be the need to install, download Or use any apps to download or anything. Don't think that it'll go in the same speed as any torrent downloader. It gives out the same speed as if you're downloading a file from mediafire or any other such file hosting websites.<br />
<div>
<br /></div>
<div>
Now,</div>
<div>
I stop my lecture and start saying what you need to do step by step :-)</div>
<div>
<br /></div>
<h2>
Steps For Downloading Torrent Files Without Any App:</h2>
<div>
Step 1:-</div>
<div>
Copy the magnet link of the torrent file you want to download.</div>
<div>
<br /></div>
<div>
Step 2:-</div>
<div>
Go to <a href="http://btcloud.io/">btcloud.io</a> , A Torrent file host from where you can get the link for doing direct download of any thing.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghWD7ELaz5vJG7mAkt6PdNg28DEfchZtAjuokqsRW6MQTqhyphenhyphenD3i_Rz16DKDpdOVMtZdWitKgdXJVcElp5V-aYutFTLwDXZXLHb7sHHpqdGDtplzhq_w9CA5ao8wAYr0QxKRYbQqHcD2NU/s1600/BTcloud.io.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="356" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEghWD7ELaz5vJG7mAkt6PdNg28DEfchZtAjuokqsRW6MQTqhyphenhyphenD3i_Rz16DKDpdOVMtZdWitKgdXJVcElp5V-aYutFTLwDXZXLHb7sHHpqdGDtplzhq_w9CA5ao8wAYr0QxKRYbQqHcD2NU/s640/BTcloud.io.png" width="640" /></a></div>
<br />
Sign up (Log in button serves the same function as Signing in) using any of the given options such as Facebook, Google and other. If it asks some permissions, accept it (Ex : If you sign up using Google, it'll ask to know what you are in google and other stuff).<br />
<br />
Step 3:-<br />
Then you can paste the link in the box given for pasting the magnet link.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxkFSkF4Fc8sF4kmcBnxlIC3gCmXXKxha36juHnOtU1NGd2itowbs95OZBMktDuymIh4UNwk_Fvc820RT7ZOxOebCaGCUnAhp_P8swPBN8xPAbm8_YWS0kp_pluziqiidJpJeVa6rokug/s1600/BTcloud.io+2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxkFSkF4Fc8sF4kmcBnxlIC3gCmXXKxha36juHnOtU1NGd2itowbs95OZBMktDuymIh4UNwk_Fvc820RT7ZOxOebCaGCUnAhp_P8swPBN8xPAbm8_YWS0kp_pluziqiidJpJeVa6rokug/s640/BTcloud.io+2.png" width="640" /></a></div>
After pasting the link, just press Add button at the right side of the box.<br />
<br />
Step 4:-<br />
After pressing Add button the file should have been shown in below. You might see some senseless name of the file and file size, but have patience and wait for a minute. Because the file will be downloaded to your cloud storage and the direct link will be given to you!<br />
<br />
Step 5:-<br />
After the download of the file has got completed, press on the name of the torrent file you have given for download.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLQI-47nOHbxm09GU2w6vre2ws5YlVJo94mwCW90fpFSTYKH6j2Zwz4cIbmkq5YthJ1rx6S-zIcF_Py8pqbZym1K4etM73_7PGFSI3-MmQRwNLF7OfEdQ1RztpSONN-6wReTV7z6ug5qE/s1600/After+Download.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLQI-47nOHbxm09GU2w6vre2ws5YlVJo94mwCW90fpFSTYKH6j2Zwz4cIbmkq5YthJ1rx6S-zIcF_Py8pqbZym1K4etM73_7PGFSI3-MmQRwNLF7OfEdQ1RztpSONN-6wReTV7z6ug5qE/s640/After+Download.png" width="640" /></a></div>
<br />
Step 6:-<br />
Click the ZIP button as highlighted below and download the file<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWQ_euWdMcTFxSHpqcICPeS8dGd6isCJfDTGGSBROfBe3KaBuB_8cmSHiDDAxC7MO9e7kUnSoM6KTGmRwW98AJ0UC98eaucQEwVWz6UJUE9uLERxuHWTochU5LzvJUO8_TqSjmjBm-xSk/s1600/Ddownload.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="358" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWQ_euWdMcTFxSHpqcICPeS8dGd6isCJfDTGGSBROfBe3KaBuB_8cmSHiDDAxC7MO9e7kUnSoM6KTGmRwW98AJ0UC98eaucQEwVWz6UJUE9uLERxuHWTochU5LzvJUO8_TqSjmjBm-xSk/s640/Ddownload.png" width="640" /></a></div>
<br />
Excellent right? You have successfully downloaded a torrent file without using any app! Enjoy and please don't forget to <span style="font-size: large;">SHARE</span></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1961164610604695511.post-20611253267092896972013-07-15T19:30:00.000+05:302013-07-15T19:30:00.413+05:30100 Ways To Become A Better Hacker<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="color: #333333; font-family: Verdana; font-size: 12px;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsVycGkutfKueqKYMm-lqGjB4KvVvxW774Wo6kNlG6O3nqUJqi2ovKuGinctH1i6zf3-jVd1oVnuvBUbjwAsj7eohAiX0YpdVBJRWAqJqaKB0yOK_OXZ0-i58M5dV66QKFCeZASKv7EtA/s640/hacker.jpg" style="border-width: 0px;" width="577" /></div>
<br />Well, The title is self explanatory. This post would not rely upon my input but it would rely upon your input, We will be gathering here <b>100 ways to become a better hacker. </b>In other words 100 ways to improve your skills as a hacker.<br /><a href="http://www.cthacks.com/2013/07/100-ways-to-become-better-hacker.html" name="more" style="color: #a46f38; outline: none;"></a><h2>
Rules</h2>
<b>1) </b>Every person would get the credit for his submission.<br /><br /><b>2) </b>The submissions needs to be precise and should be unique from what others have submitted so far.<br /><br /><b>3) </b>Only the top 100 submissions would be entertained.<br /><br /><b>4)</b> Once we are finished with accepting and publishing 100 submission, you can still submit your <b>answers</b>, What we would do then is overwrite the existing ones with the better ones.<br /><br /><b>5) </b>Only submission via comments would be accepted.</div>
<h2 style="color: #343333; font-family: Arial, Verdana;">
100 ways to become a better hacker</h2>
<div style="color: #333333; font-family: Verdana; font-size: 12px;">
<b>1)</b> Learning scripting languages such as <b>Python</b>, <b>Perl </b>and <b>ruby </b>can help you automate your tasks and for sure improve your skills. ~ <b>Rafay Baloch</b><br /><b><br /></b><b>2) </b>Understanding all possible user inputs is the fastest way to hack into the systems.<b> ~ Shahin Ramezany </b><br /><b><br /></b><b>3) </b>When u gain access to an account or whatever u hacking in to, best practice do not alter anything. just monitor the activity and continue fetching information u need. ~ <b>josh odongo</b><br /><b><br /></b><b>4)</b> Travel and see different countries, it will make you better <b>~ Egor Homakov</b><br /><b><br /></b><b>5)</b> Never hesitate for usage of Google and other resources available i.e. exploit-db, and be updated with versions and bugs in each versions, for example, if I talk about WordPress, then one who is looking to hack WordPress website or pentest, then he should be well aware of at least 3.0+ versions updating, so whichever version is being used on the website, he should know the vulnerabilities in that and their exploitation <b>~ Anonymous</b><br /><br /><b>6)</b> RTFM, don't expect handouts. Educated questions, gets you educated answers<b> ~ TomG</b><br /><b><br /></b><b>7) </b>Move to <b>Linux</b>, learn<b> Programming Languages C</b>, <b>Pearl</b>, <b>Lisp</b>, <b>Java</b> and <b>Html </b>and write open source programs. Improve your functional English. ~ <b>Asfar</b><br /><br /><b>8) </b>The most important factor for becoming a good hacker is, you must have your personal interest with computers. Additionally, you have to be definite in your work, such that you should take exactly interest in One thing at a single time. After covering the appropriate level of theory, the learner should try it practically as much as his satisfaction level. Watching Tutorials only for taking points, not really for following them from a to z exactly, because you have to be a good learner only if you have your personal intention for doing the things creatively.<b> ~ Nasruminallah Zeeshan</b><br /><b><br /></b><b>9) </b>One thing , Learn how old Hackers Started don't focus on new Programs like BACKTRACK , METASPLOIT , Learn Manual Hacking , Learn Coding and be patient ! Knowledge will come with time ! and practice all methods<b> ~ Amie</b><br /><b><br /></b><b>10) </b>Do not rely on tricks for hacking. As they will keep you a script kiddie, get deep understanding about stuffs. And also don't rush from one topic to another. All those combined will make you a better hacker. "Slow and Steady wins the race" <b> ~ Bluff Master </b><br /><b><br /></b><b>11) </b>A support will always lift you up. Join groups, forums. Keep yourself updated with latest hacking news by reading blogs [Like this ;)], tweets etc. <b>~ Sahil Sehgal</b><br /><b><br /></b><b>12) </b>Understand what programming language to use at what moment. You're time is valuable so don't waste it writing something that could have been done faster! (and understand the difference between a scripting language and a programming language, python for example is a programming language. ~ <b>Saikia81</b><br /><br /><b>13) </b>During hacking remain mentally intact and focus on your each step. During a step always remember your next steps and the way you have to link them. Dont always use old methods and tricks, try new one and use your own mind too. and remember one thing that there is no shortcut of Hacking, to became a hacker, you have to give your whole passion to hacking. <b>"Hacking is an Art, and Hacker is an Artist</b>"<b>. ~ Ali</b><br /><b><br /></b><b>14) </b>This Attitude should be there within "SWEAT MORE IN PRACTISE, SO YOU BLEED LESS IN WAR" #defensive #offensive <b>#B31212Y </b><br /><b><br /></b><b>15) </b>Whatever you're going to test,start it with a basic stuff. If you dont know any,start learning.<br />~<b> Ahmed Ashraff </b><br /><b><br /></b><b>16)</b> Enumeration is the key to pwnage, the more you enumerate the more attack surface you get ~ <b>Prakhar Prasad</b><br /><b><br /></b><b>17) </b>Be patient! Learn different protocols and read the RFCs to understand how they work and if there are some "security by design" issues. After that you should try to understand the context you're in and therefore develop an exploit for this particular context. ~ <b>David Viera Kurz</b><br /><b><br /></b><b>18) </b>Sleep less, read more. Learn & Think & Try & Fail & Never give up. Remember, "...imagination will take you everywhere". ~ <b>Gökmen GÜREŞÇİ</b><br /><br /><b>19)</b> Don't compete anyone, never think you are the best, just compete "the you in the past". There will always be a vulnerability waiting for being discovered, by someone who thinks different. Understanding human logic makes things easier. "Hackers realize, kiddies memorize" ;) <b>~ Agd_Scorp</b><br /><b><br /></b><b>20)</b> Learn your own systems inside out, before moving on to other systems. The better you know your own, the more capable you will find yourself when it comes time to make your system work for you<b>. ~ jericho</b><br /><b><br /></b><b>21) </b>To be a good hacker, you need have good social engineering skills. Try to understand your victim's mentality, it will give you the ability to guess his/her confidential information<b> ~ Shakil Hussain</b><br /><b><br /></b><b>22) </b>A great person had said "if i had 8 hours to chop down a tree, I'd spend 6 hours sharpening my axe". Apply this on yourself. Prepare yourself! Learn programming, networking, scripting and all, be passionate, motivate yourself then start hacking with your own ideas...You will surely win!<b> #initinpandey </b><br /><b><br /></b><b>23) </b>Use your inner power to became a great hacker. Just keep reading.. The more you read..the more you understand things behind the scene. ~ <b>nikhilkulkarni </b><br /><b><br /></b><b>24) </b>A startup now can be just a pair of 22 year old guys. A company like that can move much more easily than one with 10 people, half of whom have kids<b>. ~ Anonymous</b><br /><b><br /></b><b>25) </b>Think of all the psychic energy expended in seeking a fundamental distinction between <b>"algorithm" </b>and <b>"program"</b> ~<b> Amit Prakash </b><br /><b><br /></b><b>26) </b>If you don't have time to do it right, when will you have time to do it over? ~<b>Sunny Rockzzzz </b><br /><b><br /></b><b>27) </b>Out in the field, any connection with home just makes you weaker. It reminds you that you were once civilized, soft; and that can get you killed faster than a bullet through the head.”<b>~ Henry Mosquera</b><br /><b><br /></b><b>28) </b>Most hackers are young because young people tend to be adaptable. As long as you remain adaptable, you can always be a good hacker.<b>” ~ Emmanuel Goldstein </b><br /><b><br /></b><b>29) </b>Be very careful. We suggest getting a book on HTML to avoid becoming a real legend in the hacker world. Putting up a web page before you know how to put up a web page is generally a very bad idea. The .gov sites are an exception<b>. ~ th3.d3sty0y3r</b><br /><b><br /></b><b>30) </b>We were addicted to hacking, more for the intellectual challenge, the curiosity, the seduction of adventure; not for stealing, or causing damage or writing computer viruses. <b>~ Defencely.com</b><br /><b><br /></b><b>31) </b>To be a good hacker you have to learn from yourself. Learn from books like "The basics of ethical hacking and pen testing" and "The web app hackers handbook-Ed.2". Once you learnt these books i promise you will be able to hack systems as well as web apps. ~ <b>Aarshit Mittal</b><br /><br /><b>32) </b>Try to see, feel and possibly touch everything that you learn, only then you will be confident about your attacks/defenses. ~ <b>Nishant Das Patnaik</b><br /><b><br /></b><b>33) </b>Adopt the mindset of a hacker ~ <b>Mohamed Shimran</b><br /><b><br /></b><b>34) </b>You may not be there yet but with everyday practice you will be closer than yesterday. ~ Anonymous<br /><br /><b>35)</b> Set of code has to be made by a hacker Don't get caught Learn the basic functionality of a system and network then explore their loop holes Every developer make mistake while developing identify the exploit and notify them to the develop<b> ~ Vinoth Vel o</b><br /><b><br /></b><b>36) </b>Learn Russian. Every infosecurity geek should know Russian<b>. ~ i Sciurus</b><br /><b><br /></b><b>37)</b> When you learn something in this field, always put it to good use .Defacing websites will not make you a better hacker, but, helping someone with their security might earn you a respect even higher than what a blackhat may get<b> . ~ Himanshu Sharma</b></div>
</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-1961164610604695511.post-42438963643369303012013-06-05T22:52:00.001+05:302013-06-05T22:52:33.036+05:30How To Download Games From Miniclip.com<div dir="ltr" style="text-align: left;" trbidi="on">
The most popular Flash Games Website Miniclip.com games can be downloaded. Using one simple app called SWF opener. It is a app that can help you view the browser cache (where all the loaded miniclip games get saved). It doesn't just saves it even play or open it at the same time.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimO1LeGGDbwP9vCWCROWK2ZzOPWFzi0nBUw0hvsPPz2m2LeAg-6Z4SFpoOaarc5dLgc2GgszzsOBgTu4t8qOlDI8ZGtH7Xiio_QQpGIdEZFTP6uMrlMICxr-hqdeNhdF4E3uI13LE20xSl/s1600/miniclip.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="385" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEimO1LeGGDbwP9vCWCROWK2ZzOPWFzi0nBUw0hvsPPz2m2LeAg-6Z4SFpoOaarc5dLgc2GgszzsOBgTu4t8qOlDI8ZGtH7Xiio_QQpGIdEZFTP6uMrlMICxr-hqdeNhdF4E3uI13LE20xSl/s400/miniclip.PNG" width="400" /></a></div>
<br />
So here is the download link for the SWF opener:-<br />
<a href="http://www.mediafire.com/download/rgz368bk2a8b7xw/SWFOpenerSetup.exe">http://www.mediafire.com/download/rgz368bk2a8b7xw/SWFOpenerSetup.exe</a><br />
<br />
And here are the simple steps you will have to follow to get the SWF (miniclip game) for your own:-<br />
<br />
1. After downloading install it.<br />
<br />
2. Then open the app and go to View option from above, then View SWF Cache<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlpX8j6bksnVC3mgS1MfY_ns3gTx4vBMzL6fG0mhRtKsPythpPZDBVsJBueB7iAlr1ggzprcPmlaNzoaTmBAnipmBzmB1avOrGbnGbX3fmNHeydFFTvv3389Kag40i0UzFlkGQhFjHLtOD/s1600/View.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlpX8j6bksnVC3mgS1MfY_ns3gTx4vBMzL6fG0mhRtKsPythpPZDBVsJBueB7iAlr1ggzprcPmlaNzoaTmBAnipmBzmB1avOrGbnGbX3fmNHeydFFTvv3389Kag40i0UzFlkGQhFjHLtOD/s640/View.png" width="640" /></a></div>
<br />
3. As I know this doesn't support Chrome. Now choose which browser you are using to open Miniclip games.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTfi0eLb8khlf3VWhrvSskXAdtd1valFXhyphenhyphen8qC9QNd4N9yTkrJ-L8I8igXtor7nHvlAiWf_GP-MHhdi2uw76_8ZVvKn-vt9TSPcocEjintz8Q-lNWoz3g9V6kcgt2FF36o5PxsrkjHezw3/s1600/View2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="516" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgTfi0eLb8khlf3VWhrvSskXAdtd1valFXhyphenhyphen8qC9QNd4N9yTkrJ-L8I8igXtor7nHvlAiWf_GP-MHhdi2uw76_8ZVvKn-vt9TSPcocEjintz8Q-lNWoz3g9V6kcgt2FF36o5PxsrkjHezw3/s640/View2.png" width="640" /></a></div>
<br />
4. After the game in miniclip.com completely you can use refresh button in Swf opener to refresh and to see the items in cache.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik9GQ_9hHc_yJgHN9q5sc0QKdY_dC3A6WAu5EQI4XKwKL-N7DN_l_G1matgGfrZuUE9A76OrdBj80jpk2kco5INb0cTM0mzo3XaJQ6NeZ31NWRNwPQpxRKF_ZXD9cH-7TJ-u8_8ngzF8LV/s1600/Loading.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="416" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik9GQ_9hHc_yJgHN9q5sc0QKdY_dC3A6WAu5EQI4XKwKL-N7DN_l_G1matgGfrZuUE9A76OrdBj80jpk2kco5INb0cTM0mzo3XaJQ6NeZ31NWRNwPQpxRKF_ZXD9cH-7TJ-u8_8ngzF8LV/s640/Loading.PNG" width="640" /></a></div>
<br />
5. Now one of the SWF file in the list shown in SWF opener will be the game, click on it, there will be a short preview shown at right side, so there wont be much problem identifying the game.<br />
<br />
6. Click Save as and save it with the name you wish, do not change any other option, the saved files will probably go to C:\ (In Win 7, And Win 8).<br />
<br />
7. Enjoy playing the game offline!</div>
Unknownnoreply@blogger.com6tag:blogger.com,1999:blog-1961164610604695511.post-57894754844618354172013-04-17T21:24:00.003+05:302013-04-17T21:24:59.665+05:30Remove Other Users of any Wi-Fi using an Android mobile!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEilSEkI2B1hOBRGhVqtwzUmAV2nzk2IJGMjTOr-l3rOWg_LGk1J8eGC0_r2aX9WzHRVAGhVxO0mfciK6D9S4KvkoRBVnf4iqRohJHNZOTpCZmx3DMEuAkFS9372Z3GjjfP9HU7WO2kbrRJ6IO86" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://faceniff.ponury.net/wifikill/promo.png" id="irc_mi" style="margin-top: 137px;" /></a></div>
<br />
<span style="font-size: large;">Wifi Kill:</span><br />
<span style="font-size: large;"> </span><span style="font-size: large;"><br style="border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-align: left;" /><span style="font-size: small;"><span style="font-size: small;">Well, with this app you can disable internet connection for a device on the same network.<br /><br /> So if someone (anyone) is abusing the internet wasting precious bandwidth for a Justin Bieber videoclips you could just kill their connection and stay happy with a full bandwidth just for yourself.<br /><br /> Well, with this app you can disable internet connection for a device on the same<span style="font-size: small;"> </span>network.</span></span></span><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: small;"><br /> After a long long delay, I present to you brand new <b>WiFiKill</b>.</span></span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<span style="font-size: small; margin-left: 1em; margin-right: 1em;"><img alt="WifiKill 2.2 Apk App" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZGXbm6DdhWT08Yo9R6hXjJlRaYzfPJWFpHP_MfbaUI0a3k0DMXjHE2nkwg4aro2yEgl97R-zJd4uFhLkCednIv8ZYbWyvDZBB57KLcAvP0qV4h3cmwgzXv7UJW8aoozZWAaB4-z6P_315/s1600/wfk_2_thumb.png" style="border: 0px none; list-style: none outside none; margin: 0px; outline: 0px none; padding: 0px;" title="WifiKill 2.2 Apk App" /> </span></div>
<span style="font-size: large;"><span style="font-size: small;"></span></span><br />
<span style="font-size: large;"><span style="font-size: small;"><span style="font-size: small;"><img alt="WifiKill 2.2 Apk App" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi433R4dn2YYZMPKpAA9QPSn8GxK61H07OS37vApAvdITOCa6pHatnhYJB409PsPq3WHImmr1IS5OgrzBf9DUGQuAu1XflRAmaO9OxHM0Nm0_BlvSCEzdxe-j9lyPuG05DXZpt4rp5Qy7-Q/s1600/wfk_3_thumb.png" style="border: 0px; list-style: none; margin: 0px; outline: 0px; padding: 0px;" title="WifiKill 2.2 Apk App" /> </span></span></span><br />
<br />
<div style="text-align: center;">
<span style="background-color: red;"><span style="color: #f3f3f3;"><span style="font-size: large;"><span style="font-size: small;"><span style="font-size: small;"><span style="color: red;"><span style="background-color: #f3f3f3;"> *ROOTE</span></span><span style="font-size: small;"><span style="background-color: #f3f3f3;"><span style="color: red;">D PHONE REQUIRED*</span></span><span style="background-color: #f3f3f3;"></span></span></span></span></span></span></span></div>
<br />
<span style="font-size: large;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: large;"><span style="background-color: white;">Requirements :<b><span style="font-size: small;"> Android 4.0 or above</span></b></span></span></span></span></span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www67.zippyshare.com/v/63735597/file.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
<span style="font-size: large;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: large;"><span style="background-color: white;"><b><span style="font-size: small;"> </span></b></span></span> </span></span><span style="text-align: left;"></span></span></span>
<br />
<div class="separator" style="background-color: white; border: 0px; clear: both; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 13px; list-style: none; margin: 0px; outline: 0px; padding: 0px; text-align: center;">
<span style="text-align: left;"><br /></span></div>
<span style="font-size: large;"> </span><br />
<br />
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;">
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;">
</div>
<br /></div>
</div>
<!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Ffaceniff.ponury.net%2Fwifikill%2Fpromo.png&container=blogger&gadget=a&rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEilSEkI2B1hOBRGhVqtwzUmAV2nzk2IJGMjTOr-l3rOWg_LGk1J8eGC0_r2aX9WzHRVAGhVxO0mfciK6D9S4KvkoRBVnf4iqRohJHNZOTpCZmx3DMEuAkFS9372Z3GjjfP9HU7WO2kbrRJ6IO86" -->Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com2tag:blogger.com,1999:blog-1961164610604695511.post-14823701395240866122013-04-17T18:24:00.001+05:302013-04-17T18:24:31.712+05:30Hack Whatsapp using Android Mobile<div dir="ltr" style="text-align: left;" trbidi="on">
<img height="320" id="irc_mi" src="https://encrypted-tbn3.gstatic.com/images?q=tbn:ANd9GcRwJ9p8IPsgD9dEdn-4xibap3a8MzF2FzexwvTTHrzSBOndOpnx" style="margin-top: 0px;" width="320" /><br />
<br />
<span style="font-size: large;">WhatsApp Sniffer : </span><br />
<span style="font-size: large;"><span style="font-size: small;"><b> WhatsAppSniffer</b> is a tool for root terminals to read <b>WhatsApp</b> conversations of a <b>WIFI</b> network (<b>Open, WEP</b>, <b>WPA/WPA2</b>). It captures the conversations, pictures / videos and coordinates that are sent or received by an <b><span class="IL_AD" id="IL_AD4">Android</span></b> phone, i<b>Phone </b>or<b> Nokia</b> on the same <b>WIFI</b> network. It has not been tested <span class="IL_AD" id="IL_AD11">with W</span>indows Phone terminals. It can't read the messages written or received
by the <b>BlackBerry's</b>, as they use their own servers and not<b> WhatsApp's</b>.</span></span><br />
<span style="font-size: large;"><span style="font-size: small;"><br />
This <span class="IL_AD" id="IL_AD9">application</span> is designed to demonstrate that the <span class="IL_AD" id="IL_AD1">security</span>
of <b>WhatsApp's</b> communications is null. <b>WhatsAppSniffer</b> just use the<b>
TCPDump</b> program which reads all the <b>WIFI</b> network packets and filters
those which has origin or destination <b>WhatsApp's</b> servers. All messages
are in plain text, so it does not decrypt anything, complying fully with
the <span class="IL_AD" id="IL_AD10">legal terms</span> of <b>WhatsApp
</b>(3.C: "While we do not disallow the use of sniffers Such as <b>Ethereal</b>,
<b>tcpdump</b> or <b>HttpWatc</b>h in general, Any we do going efforts to disallow
reverse-engineer our system, our protocols, or explore outside the
boundaries of the ordinary requests made by clients <b>WhatsAp</b>p .... ")<br />
For <b>WPA/WPA2</b> encrypted networks, i<span style="font-size: small;">t </span>uses the tool <b>ARPSpoof</b> (optional).</span></span><br />
<br />
<span style="font-size: large;"><span style="font-size: small;"><span style="font-size: large;">Features:</span><br />
- For now, there is only support for this characters:<br />
- Read conversations outgoing and incoming to <b>Android, iPhone and Nokia</b> phones.<br />
- They are separated <span class="IL_AD" id="IL_AD7">by phone number</span><br />
- Notify when a message has been captured<br />
- Ability <span class="IL_AD" id="IL_AD6">to start</span> a debug session saving all logs</span></span><br />
<span style="font-size: large;"><span style="font-size: small;"> - It matches phone numbers captured with agenda for coincidences </span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.4shared.com/android/8nPvWtHI/WhatsApp_Sniffer_103.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
<span style="background-color: #f3f3f3;"><span style="font-size: large;"><span style="color: red;"> (ROOT REQUIRED)</span></span></span><br />
<br />
<span style="background-color: #f3f3f3;"><span style="font-size: large;"><span style="color: red;">Legal Terms:</span></span></span><br />
<span style="background-color: #f3f3f3;"><span style="color: red;"> <b>WhatsAppSniffer</b> comes with absolutely no warranty. You use this
software on your own risk. The developer is not responsible for any
damages caused by <b>WhatsAppSniffer</b> or it´s usage. It´s only the users
responsibility to check his country's laws in order to make sure that the
usage of <b>WhatsAppSniffer</b> is permitted by law in his country. In some
countries stealing someones conversations might be prohibited by law. Always think about what you´re doing! Stealing someones conversations can cause real trouble for him and maybe for you.</span></span>
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com32tag:blogger.com,1999:blog-1961164610604695511.post-91262056428396798502013-04-17T14:26:00.000+05:302013-04-17T14:28:00.327+05:30 Download Thousands of Applications for your Android for free - Android BlackMarket<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;">
</div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="margin-left: 1em; margin-right: 1em;">
<br /></div>
<br />
<br />
<img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJw3tohlM6_jv0FE3zaDpwG5RimwrYCmdOC2AEwkKLeY-mZnbck1iwHEEIq7UN_SpGsVascFhdAqTXKa6AkpVdeKllb-mk6AHQhw9jK-eqhhQIdXox4Op8SWzhvhBvfx4wD0GZfXI6HIQ/s320/blackmart.jpg" height="240" id="irc_mi" style="margin-top: 9px;" width="320" /><br />
<br />
<span style="font-size: large;">Android Blackmarket : </span><br />
<b>Blackmart</b> is a tools to get all <span class="IL_AD" id="IL_AD5">android</span> <span class="IL_AD" id="IL_AD9">application for</span> free. You can use this <span class="IL_AD" id="IL_AD8">apps</span> to get various apps without paying for them. Maybe you have using similar application such as <b>appbrain, bestmartket</b>, and other, but <b>blackmart</b> is different.<br />
Also used to update your device apps search for paid apps or upload apps from your device to host so others can download them.<br />
Also this app is updated quickly you'll be notified if there is an update. <br />
Stop thinking where you will find money to pay any paid app.This app is
the answer of your problem.Now get any app you want for FREE.Try it now!<br />
<br />
<span style="font-size: large;">Requirements : </span><br />
<b><span class="IL_AD" id="IL_AD4">Android 2.2+</span></b><br />
<span class="IL_AD" id="IL_AD4"><br /></span>
<span style="font-size: large;">Download Instructions:</span><br />
- Download file<br />
- Put the <b>.apk</b> file in your <b>sd</b> card<br />
- Install .<b>apk</b> file in <span class="IL_AD" id="IL_AD3">your phone</span> <span class="IL_AD" id="IL_AD1">by click</span>ing on it<br />
- Finished! Enjoy thousands of free apps for your <b>Android</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://lh5.googleusercontent.com/-B9xaaLQ1yOA/T3TlsOlEP-I/AAAAAAAAAWQ/sPvsSMRfuJ4/1333060996620.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="400" id="irc_mi" src="https://lh5.googleusercontent.com/-B9xaaLQ1yOA/T3TlsOlEP-I/AAAAAAAAAWQ/sPvsSMRfuJ4/1333060996620.png" style="margin-top: 0px;" width="266" /></a><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOYRy0RN5qBVWdU9qHYOamBdTWnliYNDRAEuw-F1hKjlEIouLn4TDvDRxSglgkHc0_cU8BeVMB629T5EIR7lSEmJ9DECaBLqTJqWJQBRsbfnM9bjQjArLWK0iB3zfoZoa_M8RD6YMKfXI/s1600/1300534802_blackmart-0.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhOYRy0RN5qBVWdU9qHYOamBdTWnliYNDRAEuw-F1hKjlEIouLn4TDvDRxSglgkHc0_cU8BeVMB629T5EIR7lSEmJ9DECaBLqTJqWJQBRsbfnM9bjQjArLWK0iB3zfoZoa_M8RD6YMKfXI/s400/1300534802_blackmart-0.png" height="400" width="277" /></a></div>
<br />
<div style="text-align: center;">
<br /></div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div style="text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www66.zippyshare.com/v/31887444/file.html" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com1tag:blogger.com,1999:blog-1961164610604695511.post-54756596393319365622013-04-16T19:50:00.000+05:302013-04-16T19:50:30.257+05:30FaceNiff - Facebook Session Hijacker for Android <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="margin-left: 1em; margin-right: 1em; text-align: left;">
<img src="http://faceniff.ponury.net/icon_256.png" height="200" width="200" /></div>
<br />
<br />
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span style="background-color: white;"><br /></span></div>
<div style="text-align: left;">
<span style="background-color: white;"><br /></span></div>
<div style="text-align: left;">
<span style="background-color: white;"><span style="font-size: large;"><b>FaceNiff</b></span> is an <b>Android</b> app that allows you to sniff and intercept web session profiles over the <b>WiFi</b> that your mobile is connected to.<br /> </span></div>
<div style="text-align: left;">
<span style="background-color: white;">It is possible to hijack sessions only when <b>WiFi</b> is not using <b>EAP</b>, but it should work over any private networks (<b>Open/WEP/WPA-PSK/WPA2-PSK</b>)<br /> </span></div>
<div style="text-align: left;">
<span style="background-color: white;">It's kind of like<b> Firesheep</b> for android. Maybe a bit easier to use (and it works on <b>WPA2</b>!).</span></div>
<div style="text-align: left;">
<span style="background-color: white;">Please note that if web user uses<b>
SSL</b> this application won't work.</span></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span style="background-color: white;"><span style="background-color: #f3f3f3;"><span style="color: red;"><b><i>*Legal notice: this application is for educational purposes only. Do not try to use it if it's not legal in your country.*</i></b></span></span></span></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span style="background-color: white;"><span style="background-color: #f3f3f3;"><span style="color: red;"><b><i>*Rooted Phone is required* </i></b></span></span></span></div>
<div style="text-align: left;">
<br /></div>
<div style="text-align: left;">
<span style="background-color: white;"><span style="background-color: white;"><span style="color: red;"><b><i> </i></b></span></span></span><span style="font-size: large;">Supported services (new coming soon):</span></div>
<ul style="text-align: left;">
<li>FaceBook</li>
<li>Twitter</li>
<li>Youtube</li>
<li>Amazon</li>
<li>VKontakte</li>
<li>Tumblr</li>
<li>MySpace</li>
<li>Tuenti</li>
<li>MeinVZ/StudiVZ</li>
<li>Blogger</li>
</ul>
<div style="text-align: left;">
<span style="font-size: large;"> </span>
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://faceniff.ponury.net/"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBc4__OAMRmePGMhMfn0QoEm3wu4W_6_aqCJ8WrIWRF8Va9t4ZD-AXymUlj1N8z-O01Zjc05dw8DkneGDzEVzcKjyKciL_se9rFpcbf4FWxYFV5ko2KA6r7BVZHwr2KN_1WLDgrjK4SKF5/s1600/cooltext515450871.png" height="98" width="320" /></a></div>
<br />
<div>
<div style="text-align: left;">
<span style="background-color: white;"><span style="background-color: white;"><span style="color: red;"><b><i><span style="background-color: white;"></span></i></b></span></span> </span></div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com0tag:blogger.com,1999:blog-1961164610604695511.post-61790293283878877322013-04-16T19:03:00.000+05:302013-04-16T19:03:50.299+05:30Free Keylogger 3.6<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<span style="font-size: large;"><span> </span></span><img height="218" id="irc_mi" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcRFniGdXczonKUFqVw0D3dxli0WbuP7EF_Aa-zPxulSeOmzj1mV" style="margin-top: 27px;" width="400" /></div>
<br />
<br />
<span style="font-size: large;"><span>What is Keylogging?</span></span><br />
<br />
<b>Keylogging</b> is recording what exactly has been typed on your keyboard.<br />
<b>Keylogging</b> can be used for security measures or for finding out your friends passwords if the login to anything using your pc.<br />
<br />
<span style="font-size: large;">How it works?</span><br />
<b> </b><br />
<b>Keylogging</b> can be done in 2 ways- 1.<b>Hardware keylogging</b> , 2.<b>software keyloggers</b><br />
<b>Keyloggers</b> usually just store the data that is typed by your keyboard<br />
<br />
<b><span class="style53"> <span style="font-size: large;"> </span></span></b><span class="style53"><span style="font-size: large;">Free Keylogger 3.6</span></span> can record every
keystroke typed on keyboard in covert, invisible mode. In addition to
standard function, this key logger is able to scan clipboard for changes
and monitor Internet navigation (visited websites). With this program
you will know what other users are doing on a computer while you are
away. Download and begin spying right now, because it is
completely free! <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://download.cnet.com/Free-Keylogger/3000-2162_4-10419683.html?part=dl-&subj=dl&tag=button"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
<br /></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com4Southern Asia25.03764 76.456308700000022-28.286541000000003 -6.1608787999999777 78.361821 159.07349620000002tag:blogger.com,1999:blog-1961164610604695511.post-10715069807699328882013-03-17T10:31:00.005+05:302013-03-17T10:31:35.252+05:30The Matrix Live Wallpaper for PC<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<img height="256" src="http://tv-facts.net/wp-content/uploads/2012/10/Matrix_wallpaper_.jpg" width="320" /></div>
<div style="text-align: center;">
<b><u> The Matrix</u></b></div>
<br />
This is the distribution page for <b>ZMatrix.</b> <b>ZMatrix</b> is an animated desktop background which displays streaming characters in a style similar to what was used in the movie '<b>The Matrix</b>'. The program was based off of source code for a screen saver found at www.elouai.com, and is entirely free.<br />
<br />
<br />
Requirements:<br />
<br />
-Windows 98, Me, 2000 or Higher<br />
-2.0 Megs of Disk Space<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://prdownloads.sourceforge.net/zmatrix/ZMatrixSetupNT_1_5_2.exe?download" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2vp7vQWSAZREHPTsC7tyBSCFhWUtq7zO6N9QYMiJq9MHdvcjuUz5b1OiGLHJuAH2a1omI2X7r4Norh6TLmTU41hiIG7Z2z29Gp8ZnbwVG50153GIqT58UNiCuUmRH8ppmjQUz5zC3g6ny/s1600/cooltext957209491.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
The Matrix Live Wallpaper is also available for Android => <a href="https://play.google.com/store/apps/details?id=simosoftprojects.matrixlivewallpaper&feature=search_result" target="_blank">Click here</a> </div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div class="separator" style="clear: both; text-align: left;">
<br /></div>
<div style="text-align: center;">
<br /></div>
<br />
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com13tag:blogger.com,1999:blog-1961164610604695511.post-62145868070198106812013-03-16T09:56:00.002+05:302013-03-17T10:32:56.088+05:30Swiftkey Keyboard apk<div dir="ltr" style="text-align: left;" trbidi="on">
<img height="320" src="http://screenshots.en.sftcdn.net/en/scrn/6655000/6655229/swiftkey-tablet-03-535x535.png" width="320" /><br />
<span style="background-color: white; font-size: 13px; line-height: 19.5px;"><b><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"> </span></b></span> <span style="font-family: inherit;"> </span><span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"> <b>SwiftKey </b>– the
best-selling keyboard on Android</span><br />
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"> <b>SwiftKey </b>replaces the
touchscreen keyboard on your phone with one that understands how words work
together, giving the world’s most accurate autocorrect - and predicting your
next word before you press a key.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">The keyboard learns as you use it to make corrections and
predictions based on the way that you write. It can learn from your <b>Gmail,
Facebook, Twitter </b>or blog to make its insights even more personalized. You can
also enable up to three languages simultaneously, for true multi-lingual
typing.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Switch seamlessly between tapping and gesture typing with
our new <b>SwiftKey Flow</b> feature. It combines the mind-reading capabilities of
<b>SwiftKey </b>with the speed of gliding your fingers across the screen. With <b>‘Flow
Through Space’</b>, you can also enter entire phrases without lifting your finger
from the screen, simply by sliding to the space bar between words.<o:p></o:p></span></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Language support (enable up to three at once):<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">English (US)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">English (UK)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">English (AU)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Afrikaans<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Albanian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Arabic<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Armenian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Azerbaijani<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Basque<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Bosnian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Bulgarian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Catalan<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Croatian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Czech<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Danish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Dutch<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Estonian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Finnish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">French (CA)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">French (FR)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Galician<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Georgian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">German<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Greek<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hebrew<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hindi<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hinglish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Hungarian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Icelandic<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Indonesian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Irish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Italian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Javanese<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Kazakh<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Korean<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Latvian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Lithuanian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Macedonian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Malay<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Norwegian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Persian (Farsi)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Polish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Portuguese (BR)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Portuguese (PT)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Romanian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Russian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Serbian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Slovak<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Slovenian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Spanish (ES)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Spanish (US)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Spanish (LA)<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Sundanese<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Swedish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Tagalog<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Thai<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Turkish<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Ukrainian<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Urdu<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;">Vietnamese<o:p></o:p></span></div>
<span style="background-color: white; font-family: Roboto, Arial, sans-serif; font-size: 13px; line-height: 19.5px;"><br /></span>
<img src="https://lh6.ggpht.com/g68MNVSDhKtzDksMyAL3O48UzXYZOrQ5PycMCvoQhVzF2RHV1ApnGQojWfLv2TDLOYQ" /> <img src="https://lh6.ggpht.com/dZtefT3iP88unHpZV67H-ZaZNAErXkrx99aUjS3BkX95TdfxnJh8dw6mLO05xpFvdw" /><br />
<br />
<br />
<br />
<img src="https://lh5.ggpht.com/_CSSruEHVECcLnsAkGXlvc4iY40_U4dUT9_QnNfTDJjqcfBlhJnfuQPOLESs7RuKIN8" /> <img src="https://lh5.ggpht.com/upEwTqkA5i3fElZ6Mjwr8JVIbplNfO1NUCj-0f0L9GeLXcSPnesbyG41M2o-dLGRha0r" /><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www51.zippyshare.com/v/45193102/file.html" target="_blank"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_gIxklQb-29rGtNff5oS3_8CekYcyDtCZEv0fVMz7NS12dOfVAQ32gH9I2TRH2EcSOhAKkBL8_qhBQRej6cZ4cR7Qgu9I5HiCb6ObsPn0dXyS1FLsYfXZHKaEpcWDy-Eyi3TycVjuZpbW/s1600/cooltext957209491.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<span style="font-family: Verdana, sans-serif;">(6.5 MB)</span></div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com3tag:blogger.com,1999:blog-1961164610604695511.post-1375356041267298402012-12-13T18:50:00.001+05:302013-04-16T16:34:08.043+05:30How To Protect Image Theft from Website<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="MsoNormal" style="text-align: center;">
<img src="http://repoindustry.com/article-images/44/repo-agent-theft-repossession.gif.gif" /></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
You can’t prevent everyone from using your posts. If you
don’t want the users to download or steal your images, the best and most
effective way is not upload them online! You can’t completely eliminate others
from using your images. However, you can work on a few techniques to make it
really hard for others who try to steal your images.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<h2 style="text-align: left;">
1. Add Watermark </h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
Watermark is possibly the most effective and simple way of
ensuring image protection. Watermark is a visual copyright placed on an image.
The bigger the watermark is, the harder it becomes to steal the image or
download them without authorization. However, it is a visual distraction for
users who try to view the image.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<h2 style="text-align: left;">
2. Post Low Resolution Image</h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
Posting a low resolution image is another way of protecting
the images. Uploading an image with 550 pixels saved with <span style="font-family: "Courier New",Courier,monospace;">72</span> <b>dpi</b> is a perfect
size to upload and makes it look decent while viewing online. At the same time,
the image leaves more or less no room to work on for people who download.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<h2 style="text-align: left;">
3. Disable Right-Click on Webpages</h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
Most people copy images by just right clicking and
downloading the images. If you post images on your website, you can prevent
“right clicking” by placing the images as background to tables. You can do it
easily by following a simple code in CSS. Alternate way to prevent right clicks
by using a JavaScript. These scripts override the right clicks when someone
tries to copy the image.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<h2 style="text-align: left;">
4. Indexing Technique</h2>
<div class="MsoNormal">
<o:p></o:p></div>
<div class="MsoNormal">
People can misuse your images only when it comes under the
search engine indexing. You can protect your images from being indexed by the
search engine spiders. Using a non-index (<b>noindex</b>) and <b>un-follow </b>(<b>nofollow</b>)
tags eliminates the entire webpage from getting indexed. However, if you want
only the content to be indexed and not the image all you need is a Meta tag.
The Meta information prevents the spiders from indexing just the image.<o:p></o:p></div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
These are some of the techniques you can follow to protect
your images from online thefts! If you really wish to share your images on a
public forum, you have to take all the possible steps to protect them. Though
these take time, you will not get a nasty surprise when you see your image on a
different website!<o:p></o:p></div>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-40980001665773209912012-12-13T18:41:00.001+05:302013-04-16T16:35:47.979+05:30How To Speed-up Windows<div dir="ltr" style="text-align: left;" trbidi="on">
<img src="http://oneadamclaude.com/it-blog/wp-content/uploads/2012/05/cost-of-a-slow-computer.png" /><br />
<br />
<div class="MsoNormal">
<h2 style="text-align: left;">
<span style="font-family: inherit;"><b>1. Speeding up your Windows PC startup time :</b></span></h2>
</div>
<div class="MsoNormal">
<span style="font-family: inherit;">You can optimize your computer’s startup speed by launching
Run on your Windows computer and typing “<b>msconfig</b>” without the quotes. This
will take you to the System Configuration Settings which has five tabs –
<b>General, Boot, Services, Startup, and Tools.</b><o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Under the General tab, you’ll find 3 startup selections:
<b>normal, diagnostic, and selective.</b> During normal startup, all device drivers
and services will be loaded by your computer. If this is ticked, it may be the
reason why your computer is taking long. Choose either <b>diagnostic</b> or <b>selective</b>
startup to speed up the starting time of your Windows computer. Diagnostic
startup only loads basic devices and services whereas with selective startup,
you can choose to load neither system services nor startup items. After making
a selection select “<b>Apply</b>.”<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Under the Boot tab, select Advanced options so you can
choose the number of processors to facilitate boot speed. If you have a
dual-core or quad-core processor, assigning more than one of them to help with
the start-up process can significantly boost your computer’s speed.
Unfortunately, this optimization tweak is not so efficient on power so if
you’re using a laptop, expect some battery drain after startup.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Finally, there’s the Services and Startup tab where you can
specifically choose which services and startup items are going to load.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<h2 style="text-align: left;">
<span style="font-family: inherit;"><b>2. Speeding up your Windows Start Menu :</b></span></h2>
</div>
<div class="MsoNormal">
<span style="font-family: inherit;">The Start Menu is another serious offender as it often takes
time to load. Once again you need to open Run but this time, you will type
“<b>regedit.exe</b>” to launch the Registry Editor. Go to the <b>HKEY_CURRENT_USER</b> folder
and find <b>Control Panel</b> –> <b>Desktop</b> –> <b>MenuShowDelay</b>. Then, double click
<b>MenuShowDelay</b> to edit its value. Type in the numbers on the blank and hit “OK.”
Remember, the lower the value the faster the Start Menu will load.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;">Another trick for speeding up your Windows Start Menu would
be to limit the number of shortcuts on your desktop. It could be that you just
have too many icons on your desktop and that’s what is causing your computer to
take long when loading the Start Menu.<o:p></o:p></span></div>
<div class="MsoNormal">
<span style="font-family: inherit;"><br /></span></div>
<div class="MsoNormal">
<h2 style="text-align: left;">
<span style="font-family: inherit;">3. Speeding up the Right Click Menu :</span></h2>
</div>
<div class="MsoNormal">
<span style="font-family: inherit;">Yet another disappointing slow-down that Windows users
experience is the time it takes the Menu to show up when hitting the right
click. Installing third-party programs that allow you to remove items from the
context menu should speed it up.<o:p></o:p></span></div>
<span style="font-family: inherit;"><br /></span>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-32867225475911613612012-10-25T12:35:00.002+05:302013-04-16T16:37:53.182+05:30Speed up your downloads with IDM<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="margin-left: 1em; margin-right: 1em;">
<img src="http://itechbook.net/wp-content/uploads/2012/08/IDM-Logo.gif" /></div>
<br />
<br />
<div style="text-align: left;">
<span style="font-size: large;">Speed up your downloads with IDM :</span><br />
<b><u><span style="font-size: x-large;"><br /></span></u></b></div>
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"><b> Internet Download Manager</b> is a tool for increasing download speeds by up to 5 times, and for resuming, scheduling, and organizing downloads.</span><br />
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"><br /></span>
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"> The program will resume unfinished downloads due to network problems, or unexpected power outages. </span><br />
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"><br /></span>
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;">The program features a full-fledged site grabber that downloads files that are specified with filters, for example, all pictures from a Web site, different parts of Web sites, or complete Web sites for offline browsing. </span><br />
<b><span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"><br /></span>
</b><span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;">The program supports<b> HTTP, HTTPS, FTP </b>and <b>MMS</b> protocols, and has an adaptive download accelerator for <b>MP3</b> audio, <b>FLV</b> and <b>MPEG</b> video files. </span><br />
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;"><br /></span>
<span style="background-color: white; font-family: Helvetica, Arial, sans-serif; font-size: 15px;">The program also features Download Video and Audio Panels for <b>Internet Exporer, Chrome, Opera, Safari, Firefox</b> and other <b>Mozilla</b> based browsers that appears on top of a web-player and can be used to download flash videos from sites like<b> YouTube, MySpaceTV, Google Videos</b></span><span style="border: 0px; font-size: 15px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"><br /><span style="font-family: Courier New, Courier, monospace;"><br /><a href="http://dw.com.com/redir?edId=3&siteId=4&oId=3000-2071_4-10071618&ontId=2071_4&spi=040f2cfd38e5dc9dc28763407854efc5&lop=link&tag=tdw_dltext&ltype=dl_dlnow&pid=12773216&mfgId=108512&merId=108512&pguid=UIjjmwoOYJIAABUQHdwAAAJa&destUrl=http%3A%2F%2Fdownload.cnet.com%2F3001-2071_4-10071618.html%3Fspi%3D040f2cfd38e5dc9dc28763407854efc5"><b>Click here to download!!</b></a></span></span><br />
<div class="shr_rd">
</div>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-8416093883199554452012-10-15T19:40:00.003+05:302012-12-03T18:21:03.319+05:30How to increase Virtual RAM<div dir="ltr" style="text-align: left;" trbidi="on">
<img height="213" src="http://writers-pavilion.com/wp-content/uploads/2012/08/Types-of-Computer-Memory.jpg" width="320" /><br />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"><br /></span>
<span style="background-color: #f9f9f7; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana; font-size: x-large;"><u><br /></u></span></span>
<br />
<span style="background-color: #f9f9f7; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana; font-size: x-large;"><u>How to increase Virtual RAM</u></span></span><br />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"><br /></span>
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"><br /></span>
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">1) Hold down the 'Windows' Key and Press the 'Pause/Break' button at the top right of your keyboard.</span><br />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">Another way is Right-Clicking 'My Computer' and then Select 'Properties'.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">2) Click on the '<b>Advanced</b>' tab.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">3) Under '<b>Performance</b>', click '<b>Settings</b>'.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">4) Then click the '<b>Advanced</b>' tab on the button that pops up.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">5) Under 'Virtual Memory' at the bottom, click '<b>Change</b>'.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">6) Click the '<b>Custom Size</b>' button.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">7) For the initial size (depending on your HD space), type in anywhere from 3000-4500 , and for the Maximum size type in anywhere from 3000-4500 .</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">8) Click 'Set', and then exit out of all of the windows.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">9) Finally, Restart your computer.</span><br />
<br style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" />
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">10) You now have a faster computer and 1-2GB of Virtual RAM..!</span><div class="shr_rd"></div></div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-32870112965241212932012-10-15T19:02:00.002+05:302013-04-16T16:30:18.608+05:30How to quickly change your IP address <div dir="ltr" style="text-align: left;" trbidi="on">
<span style="background-color: #f9f9f7; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana; font-size: x-large;"><u><br /></u></span></span>
<span style="background-color: #f9f9f7; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana; font-size: x-large;"><u><br /></u></span></span>
<br />
<div style="text-align: center;">
<img src="http://www.itu.int/net/ITU-T/ipv6/images/ipv6-v2.jpg" style="text-align: left;" /></div>
<div style="text-align: justify;">
<span style="background-color: #f9f9f7; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana; font-size: x-large;"><u><br /></u></span></span></div>
<div style="text-align: justify;">
<span style="background-color: white;"><span style="font-size: large; line-height: 15px; text-align: justify;"><span style="color: #333333; font-family: Verdana;"> To quickly change your IP address :</span></span></span></div>
<span style="background-color: #f9f9f7; color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"><br /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"> </span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">1. Click on "<b>Start</b>" in the bottom left hand corner of screen</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">2. Click on "<b>Run</b>"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">3. Type in "<b>Command</b>" and hit ok</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">1. Click on "<b>Start</b>" in the bottom left hand corner of screen</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">2. Click on "<b>Run</b>"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">3. Type in "<b>command</b>" and hit ok</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">You should now be at an<b> MSDOS </b>prompt screen.</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">4. Type "<b>ipconfig /release</b>" just like that, and hit "enter"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">5. Type "<b>exit</b>" and leave the prompt</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">6. Right-click on "<b>Network Places</b>" or "<b>My Network Places</b>" on your desktop.</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">7. Click on "<b>properties</b>"</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">You should now be on a screen with something titled "Local Area Connection", or something close to that, and, if you have a network hooked up, all of your other networks.</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">8. Right click on "<b>Local Area Connection</b>" and click "properties"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">9. Double-click on the "<b>Internet Protocol (TCP/IP)</b>" from the list under the "General" tab</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">10. Click on "Use the following IP address" under the "General" tab</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">11. Create an IP address (It doesn't matter what it is. I just type 1 and 2 until i fill the area up).</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">12. Press "Tab" and it should automatically fill in the "<b>Subnet Mask</b>" section with default numbers.</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">13. Hit the "Ok" button here</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">14. Hit the "Ok" button again</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">You should now be back to the "<b>Local Area Connection</b>" screen.</span></span><br />
<span style="background-color: white;"><br style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;" /></span>
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">15. Right-click back on "<b>Local Area Connection</b>" and go to properties again.</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">16. Go back to the "<b>TCP/IP</b>" settings</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">17. This time, select "<b>Obtain an IP address automatically</b>"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;"> 18. Hit "Ok"</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">19. Hit "Ok" again</span></span><br />
<span style="background-color: white;"><span style="color: #333333; font-family: Verdana; font-size: 11px; line-height: 15px; text-align: justify;">20. You now have a new IP address</span></span><br />
<div class="shr_rd">
</div>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-20575146607103235492012-10-10T19:12:00.002+05:302012-10-10T19:12:57.786+05:30Tor Browser : Used for Hardcore Hacking And for opening Hidden and blocked Websites on the Internet<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Jl_3MkOHaRxxAH3-df8jXO7EZgqe6hMDJFTYJcpUW3e4uRYZYd8U6ZLGh66JmCj-ZrrB1V_rgLUT39ZQm3yRlLzynZcG_R0rKu6QPqGTHcq99dCRxIng1yWHObJPsm2FzCrddDPn0js/s1600/onion.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><span style="font-family: inherit;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8Jl_3MkOHaRxxAH3-df8jXO7EZgqe6hMDJFTYJcpUW3e4uRYZYd8U6ZLGh66JmCj-ZrrB1V_rgLUT39ZQm3yRlLzynZcG_R0rKu6QPqGTHcq99dCRxIng1yWHObJPsm2FzCrddDPn0js/s1600/onion.jpg" /></span></a></div>
<div style="text-align: center;">
<span style="font-family: inherit;"><br /></span></div>
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit;">You wont believe, but this is used to open hidden websites which were banned after analyzing that those websites had working hacks. It mainly includes websites with domain .onion just similar to .com, .in, .org and others</span><br />
<span style="font-family: inherit;"><br /></span>
<span style="font-family: inherit; font-size: large;">What is tor??</span><br />
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit;">Tor is a network of virtual tunnels that allows people and groups to improve their privacy and security on the Internet. It also enables software developers to create new communication tools with built-in privacy features. Tor provides the foundation for a range of applications that allow organizations and individuals to share information over public networks without compromising their privacy.</span></span><br />
<span style="background-color: white; color: #1a1a1a; font-size: 13px; line-height: 20px;"><span style="font-family: inherit;"><br /></span></span>
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit; font-size: large;">Why Tor is needed??</span></span><br />
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit;">Using Tor protects you against a common form of Internet surveillance known as "traffic analysis." Traffic analysis can be used to infer who is talking to whom over a public network. Knowing the source and destination of your Internet traffic allows others to track your behavior and interests. This can impact your checkbook if, for example, an e-commerce site uses price discrimination based on your country or institution of origin. It can even threaten your job and physical safety by revealing who and where you are. For example, if you're travelling abroad and you connect to your employer's computers to check or send mail, you can inadvertently reveal your national origin and professional affiliation to anyone observing the network, even if the connection is encrypted.</span></span><br />
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit;"><br /></span></span>
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit;">A basic problem for the privacy minded is that the recipient of your communications can see that you sent it by looking at headers. So can authorized intermediaries like Internet service providers, and sometimes unauthorized intermediaries as well. A very simple form of traffic analysis might involve sitting somewhere between sender and recipient on the network, looking at headers.</span></span><br />
<span style="background-color: white; color: #1a1a1a; font-size: 13px; line-height: 20px;"><span style="font-family: inherit;"><br /></span></span>
<h2>
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit; font-size: large;">How Tor Works??</span></span></h2>
<div>
<span style="background-color: white; color: #1a1a1a; line-height: 20px;"><span style="font-family: inherit; font-size: large;"><br /></span></span></div>
<div>
<span style="font-family: inherit;"><img alt="How Tor works" height="326" src="https://www.torproject.org/images/htw1.png" style="background-color: white; border: 0px; color: #1a1a1a; font-size: 13px; line-height: 13px; margin: 0px; max-width: 710px; outline: 0px; padding: 0px; vertical-align: baseline;" width="510" /><span style="background-color: white; color: #1a1a1a; font-size: 13px; line-height: 13px;"></span></span><div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Tor helps to reduce the risks of both simple and sophisticated traffic analysis by distributing your transactions over several places on the Internet, so no single point can link you to your destination. The idea is similar to using a twisty, hard-to-follow route in order to throw off somebody who is tailing you — and then periodically erasing your footprints. Instead of taking a direct route from source to destination, data packets on the Tor network take a random pathway through several relays that cover your tracks so no observer at any single point can tell where the data came from or where it's going.</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">To create a private network pathway with Tor, the user's software or client incrementally builds a circuit of encrypted connections through relays on the network. The circuit is extended one hop at a time, and each relay along the way knows only which relay gave it data and which relay it is giving data to. No individual relay ever knows the complete path that a data packet has taken. The client negotiates a separate set of encryption keys for each hop along the circuit to ensure that each hop can't trace these connections as they pass through.</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;"><img alt="Tor circuit step two" height="326" src="https://www.torproject.org/images/htw2.png" style="border: 0px; font-style: inherit; margin: 0px; max-width: 710px; outline: 0px; padding: 0px; vertical-align: baseline;" width="510" /></span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Once a circuit has been established, many kinds of data can be exchanged and several different sorts of software applications can be deployed over the Tor network. Because each relay sees no more than one hop in the circuit, neither an eavesdropper nor a compromised relay can use traffic analysis to link the connection's source and destination. Tor only works for TCP streams and can be used by any application with SOCKS support.</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">For efficiency, the Tor software uses the same circuit for connections that happen within the same ten minutes or so. Later requests are given a new circuit, to keep people from linking your earlier actions to the new ones.</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;"><img alt="Tor circuit step three" height="326" src="https://www.torproject.org/images/htw3.png" style="border: 0px; font-style: inherit; margin: 0px; max-width: 710px; outline: 0px; padding: 0px; vertical-align: baseline;" width="510" /></span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; font-size: 13px; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;"><br /></span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-size: large;">Hidden Services In Tor</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Tor also makes it possible for users to hide their locations while offering various kinds of services, such as web publishing or an instant messaging server. Using Tor "rendezvous points," other Tor users can connect to these hidden services, each without knowing the other's network identity. This hidden service functionality could allow Tor users to set up a website where people publish material without worrying about censorship. Nobody would be able to determine who was offering the site, and nobody who offered the site would know who was posting to it. Learn more about <a href="https://www.torproject.org/docs/tor-hidden-service.html.en" style="border: 0px; color: #4e6a20; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">configuring hidden services</a> and how the <a href="https://www.torproject.org/docs/hidden-services.html.en" style="border: 0px; color: #4e6a20; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">hidden service protocol</a> works.</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-size: 13px;"><br /></span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit; font-size: large;">Browse or surf the internet as Anonymous</span></div>
<div style="background-color: white; border: 0px; color: #1a1a1a; line-height: 20px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Tor can't solve all anonymity problems. It focuses only on protecting the transport of data. You need to use protocol-specific support software if you don't want the sites you visit to see your identifying information. For example, you can use Torbutton while browsing the web to withhold some information about your computer's configuration.</span></div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Also, to protect your anonymity, be smart. Don't provide your name or other revealing information in web forms. Be aware that, like all anonymizing networks that are fast enough for web browsing, Tor does not provide protection against end-to-end timing attacks: If your attacker can watch the traffic coming out of your computer, and also the traffic arriving at your chosen destination, he can use statistical analysis to discover that they are part of the same circuit.</span></div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit; font-size: large;">The Future of Tor</span></div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Providing a usable anonymizing network on the Internet today is an ongoing challenge. We want software that meets users' needs. We also want to keep the network up and running in a way that handles as many users as possible. Security and usability don't have to be at odds: As Tor's usability increases, it will attract more users, which will increase the possible sources and destinations of each communication, thus increasing security for everyone. We're making progress, but we need your help. Please consider <a href="https://www.torproject.org/docs/tor-doc-relay.html.en" style="border: 0px; color: #4e6a20; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">running a relay</a> or <a href="https://www.torproject.org/getinvolved/volunteer.html.en" style="border: 0px; color: #4e6a20; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">volunteering</a> as a <a href="https://www.torproject.org/docs/documentation.html.en#Developers" style="border: 0px; color: #4e6a20; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;">developer</a>.</span></div>
<div style="border: 0px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;">Ongoing trends in law, policy, and technology threaten anonymity as never before, undermining our ability to speak and read freely online. These trends also undermine national security and critical infrastructure by making communication among individuals, organizations, corporations, and governments more vulnerable to analysis. Each new user and relay provides additional diversity, enhancing Tor's ability to put control over your security and privacy back into your hands.</span></div>
<div style="border: 0px; font-size: 13px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
<span style="font-family: inherit;"><br /></span></div>
<div style="border: 0px; font-size: 13px; margin-bottom: 18px; outline: 0px; padding: 0px; vertical-align: baseline;">
</div>
<span style="font-family: inherit;">Download Link:</span><br />
<a href="https://www.torproject.org/download/download-easy.html.en"><span style="font-family: inherit;">https://www.torproject.org/download/download-easy.html.en</span></a><br />
</div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-81617070992967942552012-10-10T18:26:00.001+05:302012-10-10T18:26:13.012+05:30Create a Dangerous virus in 10 seconds<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">Here is a simple and easy trick to </span><b style="background-color: white; color: #333333; line-height: 19.200000762939453px;">make a virus </b><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">in less than 10 seconds.</span><br /></span><br />
<div style="background-color: white; color: #cc0000; line-height: 19.200000762939453px;">
<b><span style="font-family: Arial, Helvetica, sans-serif;">CAUTION: DO NOT RUN THE PROGRAM ON YOUR COMPUTER OR YOU WILL LOSE YOUR WINDOWS.</span></b></div>
<div style="background-color: white; color: #3d85c6; line-height: 19.200000762939453px;">
<span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="background-color: white; color: #333333; line-height: 19.200000762939453px;"><span style="color: #3d85c6;">HERE'S THE Trick To Make the virus:</span></b><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">1.Go to notepad, </span><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">2. Type </span></span><br />
<span style="background-color: white; color: #333333; line-height: 19.200000762939453px;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">erase C:\WINDOWS</span></span><br />
<span style="background-color: white; color: #333333; line-height: 19.200000762939453px;"><span style="font-family: Arial, Helvetica, sans-serif;"><br /></span></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">3. Save IT AS SOMETHING.cmd , </span><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">4. Send to victim, once the victim opens it, the map WINDOWS will be gone and have to install WINDOWS again...</span><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /></span><br />
<div style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;">Note: <span style="color: #990000;">This works only if he has installed Windows OS and if it is installed in C derive only.</span></span></div>
<br />
<div style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif;"> If you know in which drive he has installed Windows OS just change the code like , if he has installed it D drive, put the code as some thing like below</span></div>
<div style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; text-align: left;"><br /></span></div>
<div style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; text-align: left;"><br /></span></div>
<div style="text-align: center;">
<span style="font-family: Arial, Helvetica, sans-serif; text-align: left;">erase D:\WINDOWS</span></div>
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="background-color: white; line-height: 19.200000762939453px;"><u><br /></u></b></span>
<span style="font-family: Arial, Helvetica, sans-serif;"><b style="background-color: white; line-height: 19.200000762939453px;"><u>How does this works?</u></b><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; line-height: 19.200000762939453px;">The working of this virus is very simple,Once the victim runs the .cmd file on his computer,This virus will just erase the windows file causing the computer to crash.</span><br style="background-color: white; color: #333333; line-height: 19.200000762939453px;" /></span><br />
<div style="background-color: white; color: #cc0000; line-height: 19.200000762939453px;">
<b><span style="font-family: Arial, Helvetica, sans-serif;">Take care, it is a simple but powerful virus.</span></b></div>
</div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-43076998775291880642012-10-10T18:16:00.000+05:302012-10-10T18:16:24.778+05:30How can your location be traced Via your IP<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibuojf_GLSSo4n-Owj7NH5y12ajifYDdm3JXaxyMwO95XXoGQ_8v5CyuaMadj_-hNyp7zSYji1IFLl3Bp2tc90bSS2IVoCt_uLn0hBY-Pv1XNjRiSJuhE9kUvm9DFEODFjwiYHrASzueQ/s1600-h/vroute.JPG" style="background-color: white; border: none; color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;"><img alt="Ip gives it all" border="0" id="BLOGGER_PHOTO_ID_5317566746594507634" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibuojf_GLSSo4n-Owj7NH5y12ajifYDdm3JXaxyMwO95XXoGQ_8v5CyuaMadj_-hNyp7zSYji1IFLl3Bp2tc90bSS2IVoCt_uLn0hBY-Pv1XNjRiSJuhE9kUvm9DFEODFjwiYHrASzueQ/s320/vroute.JPG" style="border-width: 0px; cursor: pointer; display: block; height: 281px; margin: 0px auto 10px; padding: 10px; text-align: center; width: 320px;" /></a><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Most people wonder how do websites come to know of your location from IP.Now you too can find out.Forget users you can even sneak up on websites. Just enter IP/URL/mailid and vola all the details of are given.</span><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">This has some great tools that will help you. You can enter IP/URL/Domain name and much more.</span><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Above is a pic of what it can do (It gives your location. who is your internet provider, how you are connected to him.</span><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">This software costs about 60$. What if you dont want to buy the software you can use the lite version. This give only how the data is sent., how are you connected yo him</span><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">What if you dont want to download any thing. then there are some </span><a class="kLink" href="http://www.rafayhackingarticles.net/2009/03/ip-gives-it-all.html#" id="KonaLink1" style="background-color: white; background-image: none !important; border: 0px none transparent !important; bottom: 0px; color: blue; cursor: pointer; display: inline !important; font-family: inherit !important; font-size: inherit !important; left: 0px; line-height: 19.200000762939453px; margin: 0px; outline: none; padding: 0px; position: static; right: 0px; top: 0px;"><span style="color: blue; font-family: inherit !important; font-size: inherit !important; position: static;"><span class="kLink" style="background-color: transparent; background-image: none; border-bottom-style: solid; border-bottom-width: 1px; border-left-style: none !important; border-left-width: 0px !important; border-right-style: none !important; border-right-width: 0px !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit !important; font-size: inherit !important; padding: 0px 0px 1px !important; position: static; width: auto !important;">online </span><span class="kLink" style="background-color: transparent; background-image: none; border-bottom-style: solid; border-bottom-width: 1px; border-left-style: none !important; border-left-width: 0px !important; border-right-style: none !important; border-right-width: 0px !important; border-top-style: none !important; border-top-width: 0px !important; display: inline !important; float: none !important; font-family: inherit !important; font-size: inherit !important; padding: 0px 0px 1px !important; position: static; width: auto !important;">tools</span></span></a><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><b style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Samspade.org</b><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><b style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;"><br /></b><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><b style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">net4domain.com</b><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><b style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;"><br /></b><br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" /><b style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">visualware.com and more.</b></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-49289621680422492902012-10-04T13:37:00.000+05:302012-10-04T13:37:27.512+05:3083 Million Accounts Are Found Fake in Facebook<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2wpwf45bu2Mx5d-p8rMkWM_gs2sWtodqnlPWHiZpd8u5S9NNGVKsk62rokdiHer-usv5AaAFle_6HJAjMHDr-t-tBqisQGxpIv5rCFX5-nnurzB7SWRY0DrfGgKSYykq0HpbezE5q4jA/s1600/facebook-has-83m-fakes-1343930671-6159.jpg" style="border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" height="218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2wpwf45bu2Mx5d-p8rMkWM_gs2sWtodqnlPWHiZpd8u5S9NNGVKsk62rokdiHer-usv5AaAFle_6HJAjMHDr-t-tBqisQGxpIv5rCFX5-nnurzB7SWRY0DrfGgKSYykq0HpbezE5q4jA/s400/facebook-has-83m-fakes-1343930671-6159.jpg" style="border-width: 0px; padding: 10px;" width="400" /></a></div>
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">According to Facebook, there are about 83 million accounts on their network that they believe to be fake.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTDbhaVSRvksnxID85tnzYdblJaQC-G1WrVHHexjDec6GzCDAbn6veDqS7lsHlmD-USLG9ubi8GpaFGkz7zouJQQ3NQ-HjIOxOHW3w7yblgY984J3E73EvobktKkr48CC1hxunNaHjFi4/s1600/facebook-fake-infographic.jpg" style="border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjTDbhaVSRvksnxID85tnzYdblJaQC-G1WrVHHexjDec6GzCDAbn6veDqS7lsHlmD-USLG9ubi8GpaFGkz7zouJQQ3NQ-HjIOxOHW3w7yblgY984J3E73EvobktKkr48CC1hxunNaHjFi4/s640/facebook-fake-infographic.jpg" style="border-width: 0px; padding: 10px;" width="350" /></a></div>
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-align: center;">
<br /></div>
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Earlier this week, Facebook produced </span><a href="http://www.sec.gov/Archives/edgar/data/1326801/000119312512325997/d371464d10q.htm" style="background-color: white; border: none; color: #666666; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-decoration: none;" target="_blank">documents </a><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">in
front of the Securities and Exchange Commission that stated that out of
the social network's 955 million users 8.5% are thought to be bogus.
Out of these 8.5% accounts 4.8% belong to users who maintain duplicate
accounts.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<a href="http://www.blogger.com/blogger.g?blogID=2654807904144560192#editor/target=post;postID=5162035006375722268" name="more" style="background-color: white; color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;"></a><span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Maintaining
duplicate accounts does violate the terms and conditions of Facebook
but the largest proportion of fake accounts is comprised of it. Users
usually prefer two accounts in order to keep their personal and social
life separate. Totally understandable, right? No one wants to mingle
these two parallel universes to collide with each other.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtVHWvWV-WgZV2KNCO1P-nrHuA_M3tF_k-vcSzATgzZQ48n7Hu9TGfjPTCem0a5pGezBDo6cg6WTJk2uH1w4Qp7RFBMdutiA-e28aPIvutnHIzOIVyELOphmel82rlLxOIDqEr136tIbk/s1600/fake-facebook-account.jpg" style="border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" height="290" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtVHWvWV-WgZV2KNCO1P-nrHuA_M3tF_k-vcSzATgzZQ48n7Hu9TGfjPTCem0a5pGezBDo6cg6WTJk2uH1w4Qp7RFBMdutiA-e28aPIvutnHIzOIVyELOphmel82rlLxOIDqEr136tIbk/s400/fake-facebook-account.jpg" style="border-width: 0px; padding: 10px;" width="400" /></a></div>
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">The
second largest proportion of bogus accounts comprises of
'user-misclassified' accounts. These accounts have been created by
people in honour of their cat, dog, business, favourite soccer team and
what not. Basically, some 2.4% of 8.5% accounts are 'user-misclassified'
and created in adoration of a 'non-human entity'. We wonder if making a
Facebook page is too complicated a process for the 2.4%.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">The
third and final award goes to a group of people that we admire the most
because Rafay's Geniuses are paid to write about these mean, green,
viral machines! 1.5% or 14 million of 83 million fake accounts are
categorised as 'undesirable' by Facebook. These accounts are created for
the purpose of sending out spam or malicious content and links to other
Facebook users.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">872
million users on Facebook are genuine and legit. These users need to be
able to breathe freely on Facebook without the fear of getting attacked
by viruses. I mean, c'mon! We choose to socialize on our laptops rather
than face to face so that we wouldn't have to bear the extra baggage
that comes along with it. We deserve to feel safe, as safe as heaven, on
a site where we spend hours and share our life's ''status'' on! It only
makes sense that companies running businesses and advertising on
Facebook through pages would want genuine 'likes' from genuine profiles
too. Hence, telling us why these accounts are known as 'undesirable'.</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<div class="separator" style="background-color: white; clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-R-64zZkELg1xphwOJ-hJF3197ZPEhGfJxn_C4maK1dCngRmds9ack8efqPawYWG9iTOZeM3clDFbISvkhm3cTejXVpRBt5t11Azy9DR7f_Rn-04eLLyCi6NCGvh0cS5vlNvcCCEDTM0/s1600/fake-accounts.jpg" style="border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-R-64zZkELg1xphwOJ-hJF3197ZPEhGfJxn_C4maK1dCngRmds9ack8efqPawYWG9iTOZeM3clDFbISvkhm3cTejXVpRBt5t11Azy9DR7f_Rn-04eLLyCi6NCGvh0cS5vlNvcCCEDTM0/s1600/fake-accounts.jpg" style="border-width: 0px; padding: 10px;" /></a></div>
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Facebook
also states that these fake accounts are 'customary' in countries where
Facebook isn't as established, for example, Turkey and Indonesia. But
the real question is, is Facebook going to 'face' an issue regarding
these bogus accounts (pun intended).</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Bogus
or not, its going to be very difficult for Facebook to separate the
fake from the real as very few credentials are needed to create Facebook
accounts. Whatever the case maybe, enjoy while you still can dear
Fakers!</span><br />
<br style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;" />
<span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;">Cheers!</span></div>
Unknownnoreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-24735404479659080362011-07-12T17:42:00.001+05:302012-09-25T08:30:38.001+05:30Advantages of a Linux OS<div dir="ltr" style="text-align: left;" trbidi="on">
<img height="320" src="http://www.psychocats.net/ubuntucat/wp-content/uploads/tux2.png" width="292" /><br />
Most windows users may be wondering how Linux is useful and/or whether it is user friendly.<br />
OF COARSE !!! Linux is user-friendly and has many advantages.<br />
<br />
<span class="Apple-style-span" style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15px;"></span><br />
<h2>
<b><span class="Apple-style-span" style="color: #666666;">1. </span>Free of Cost</b></h2>
<div id="_mcePaste">
Many might of already known Linux is a free of charge.Anyone can download and distribute the Os to their friends and family members.Using a free operating system means not having to spend for even major upgrade or install a new version of your OS.</div>
<div id="_mcePaste">
<b>Download & These Linux Popular Linux Distributions,</b></div>
<div id="_mcePaste">
<b><span style="text-decoration: underline;">1. Ubuntu Linux</span></b></div>
<div id="_mcePaste">
Easy installation, a massive package repository and a dedicated user community help keep Ubuntu a great choice for newcomers.</div>
<div id="_mcePaste">
<b><span style="text-decoration: underline;">2. PCLinuxOS</span></b></div>
<div id="_mcePaste">
One of the few distributions to dramatically change the look of the default KDE desktop.</div>
<div id="_mcePaste">
<b><span style="text-decoration: underline;">3. Fedora</span></b></div>
<div id="_mcePaste">
The result of a fusion between a noble cause and an uncompromisingly corporate business plan.</div>
<div id="_mcePaste">
<b><span style="text-decoration: underline;">4. Mint Linux</span></b></div>
<div id="_mcePaste">
Blows a breath of fresh air across a world dominated by brown, blue and purple.</div>
<div id="_mcePaste">
<b><span style="text-decoration: underline;">5. Suse Linux</span></b></div>
<div id="_mcePaste">
SUSE Linux Enterprise Desktop gives businesses greater flexibility.</div>
<div style="color: #666666;">
<br /></div>
<div style="color: #666666;">
<h2>
<b> Security</b></h2>
</div>
<span class="Apple-style-span" style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15px;">Though security experts identified viruses in Linux.Generally speaking Linux is <b>Virus FREE</b>.Linux is well protected and are designed to be secure.</span><br />
<span class="Apple-style-span" style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15px;"><br />
</span><br />
<span class="Apple-style-span" style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15px;"></span><br />
<h2 style="color: #666666;">
<b>Efficiency</b></h2>
<div id="_mcePaste">
Linux is a boon for system with <b>Lower configuration</b>.If your PC can’t cope up with the latest version of Windows i.e <b>Windows 7</b>, then you should try the <b>latest version of Ubuntu</b>. That is because Linux is efficient and will run faster on old hardware when compared to Windows.</div>
<div id="_mcePaste">
<h2 style="color: #666666;">
<b>Free Pre-loaded Applications</b></h2>
<div id="_mcePaste">
Most of the Linux distributions are pre-loaded with essential applications that are also free such as <b>Open office, GIMP(Image Editor), DVD-ripper, </b>and <b>more. </b>So that means you can keep your savings intact. You can also fire up your <b>software</b> or <b>package manage</b>r anytime and get more free applications that you want. I’ve been using Linux for past 3 years, and not having to worry about paying for software is priceless.</div>
</div>
<div id="_mcePaste">
<br /></div>
<div id="_mcePaste">
<b>Basically, I hope you are interested to try Open Source stuff whether its Linux or even Open Office</b></div>
<h3 style="text-align: left;">
<b><span class="Apple-style-span" style="font-family: 'Lucida Grande', Arial, Helvetica, sans-serif; font-size: 12px; line-height: 15px;">I personally recommend <a href="http://http%3b//www.ubuntu.com">Ubuntu</a></span></b></h3>
</div>
Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.comtag:blogger.com,1999:blog-1961164610604695511.post-47382419603584212212011-06-15T16:46:00.000+05:302011-06-15T16:46:48.480+05:30How To Increase Computer Speed?<div dir="ltr" style="text-align: left;" trbidi="on"><u><b>How To Increase Computer Speed</b></u><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.hugepedia.com/wp-content/uploads/2010/12/check-computer-speed.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="231" src="http://www.hugepedia.com/wp-content/uploads/2010/12/check-computer-speed.jpg" width="320" /></a></div><b>1. First open you notepad and just copy/paste this below code there.</b> <b></b><b><i><span style="background-color: orange;"></span></i></b><br />
<div style="color: black;"><b><i><span style="background-color: orange;"><span style="background-color: white;"> <span style="background-color: white;"> </span></span><span style="background-color: white; color: white; font-size: large;"> <span style="color: black;"> mystring=(80000000)</span></span></span><span style="background-color: red; font-family: inherit; font-size: medium;"></span></i></b></div><b>2. Now save this notepad as " ram.vbe " ( without quotes )<br />
3. Now click on " ram.vbe " and you are done, you can realize the Boost Instantly<br />
4. This trick is found to give approx. 25% </b><b>Increase In Pc Speed.<br />
<br />
</b><br />
<br />
</div>Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com0tag:blogger.com,1999:blog-1961164610604695511.post-74369610778692220232011-05-25T20:17:00.000+05:302012-04-05T13:54:11.151+05:30Free Keylogger 3.2 Download<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://img.brothersoft.com/screenshots/softimage/f/free_keylogger-243313-1243908955.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="215" src="http://img.brothersoft.com/screenshots/softimage/f/free_keylogger-243313-1243908955.jpeg" width="320" /></a></div>
<br />
<br />
<span style="font-size: x-large;"><u><b>What is Keylogging?</b></u></span><br />
<br />
Keylogging is recording what exactly has been typed on your keyboard.<br />
Keylogging can be used for security measures or for finding out your friends passwords if the login to anything using your pc.<br />
<br />
<span style="font-size: x-large;"><u><b>How it works?</b></u></span><br />
Keylogging can be done in 2 ways- 1.Hardware keylogging , 2.software keyloggers<br />
Keyloggers usually just store the data that is typed by your keyboard<br />
<br />
<span style="font-size: x-large;"><u><b>Where to get the best one?</b></u></span><br />
I prefer downloading Free keylogger 3.2 , its user friendly and (obviously) free.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://download.cnet.com/Free-Keylogger/3000-2162_4-10419683.html"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigeUCW-aHq9o78EbL3QHSumbNul75_DS3FcY8R_kcERKVAmbpEKcJ5d_q2gtJ9Ym1hZKG6XiUVBYzkkMtE-mYUNqHmi7aSQb6Ws9qy1rhqNj2rIVVlllDoQB5DGGNe2PWL5JfGn4dI_l0/s400/download_button.jpg" /></a></div>
<br />
<br /></div>Anonymoushttp://www.blogger.com/profile/07845157494966977617noreply@blogger.com