<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-9073981402005415534</atom:id><lastBuildDate>Sat, 11 Apr 2026 07:16:09 +0000</lastBuildDate><category>Guides</category><category>Hacking</category><category>Tricks</category><category>News</category><category>Linux</category><category>Fun</category><category>Gadgets</category><category>Android</category><category>Google</category><category>Torrents</category><title>Backyard Geek</title><description></description><link>http://backyardgeek.blogspot.com/</link><managingEditor>noreply@blogger.com (Paritosh)</managingEditor><generator>Blogger</generator><openSearch:totalResults>90</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8474640588042359087</guid><pubDate>Sun, 07 Mar 2010 13:55:00 +0000</pubDate><atom:updated>2010-03-07T19:38:55.973+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><category domain="http://www.blogger.com/atom/ns#">Torrents</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>DHT, PEX and Magnet Links Explained</title><atom:summary type="text">Recently The Pirate Bay confirmed it would shut down its tracker for good, instead encouraging the use of DHT, PEX and magnet links. This move confounded many BitTorrent enthusiasts, who although wishing to adapt, were confronted with hard to grasp terminology and technology. Time for some explaining.The Pirate Bay’s recent confirmation that they had closed down their tracker since DHT and Peer </atom:summary><link>http://backyardgeek.blogspot.com/2010/03/dht-pex-and-magnet-links-explained.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4V5nEeydnI-UqZ3J_wx3RRSWFpOoe_jmVzyBeKCmhEzZN_pu_EARlL-Mu3gyMfCbt_bQySDRI7CvmkFJdMZXDGH0CgM7U1H9kcAWnpn1khWI-K7DVtR5XyuzIOTdKzVUrGfnC7WWRKzI/s72-c/dht-pex.jpg" height="72" width="72"/><thr:total>68</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-4802246603203449282</guid><pubDate>Sat, 23 Jan 2010 15:44:00 +0000</pubDate><atom:updated>2010-01-23T21:28:00.357+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Android</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Guides</category><title>Best Android Applications</title><atom:summary type="text">If you have come to love and depend upon your Android-based phone, you’ve no doubt discovered the wealth of applications on the Android Market. But as with the iPhone App store, not every app is a gem. So you’ve probably found yourself installing and quickly removing plenty of apps from your phone, hoping to find ones that are truly useful.To help in this quest, I’ve narrowed the field to 10 </atom:summary><link>http://backyardgeek.blogspot.com/2010/01/best-android-applications.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-2072055527636643107</guid><pubDate>Tue, 05 May 2009 14:44:00 +0000</pubDate><atom:updated>2009-05-07T13:27:07.996+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Ethical Hacking</title><atom:summary type="text">You&#39;re devoted to making your network secure. You&#39;ve applied all the latest patches, updated your virus software, installed an intrusion-detection system, and double-checked the rules on the firewall(s). Nevertheless, you&#39;re still dogged by nagging questions. Have you done enough? Do you know all the weaknesses in your network? Are you truly safe from attackers? How can you know?One way to know </atom:summary><link>http://backyardgeek.blogspot.com/2009/05/ethical-hacking.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>20</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7415614221397273050</guid><pubDate>Sun, 14 Dec 2008 17:41:00 +0000</pubDate><atom:updated>2008-12-14T23:26:09.231+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Most Common Mistakes made by Linux Administrators</title><atom:summary type="text">This article will help you avoid those mistakes by laying out the most typical Linux missteps.  Installing applications from various types This might not seem like such a bad idea at first. You are running Ubuntu so you know the package management system uses .deb packages. But there are a number of applications that you find only in source form. No big deal right? They install, they work. Why </atom:summary><link>http://backyardgeek.blogspot.com/2008/12/most-common-mistakes-made-by-linux.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>16</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-6727666087546877960</guid><pubDate>Mon, 08 Dec 2008 14:00:00 +0000</pubDate><atom:updated>2008-12-08T20:28:18.782+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun</category><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Tried and Tested method to Recover Damaged CD / DVD</title><atom:summary type="text">Well, there are many methods that can be used to recover damaged CDs but to recover DVDs is somewhat tougher, I have come across many software which claim to do the same but when I tried them, none of them was able to achieve the desired result.So after banging my head for some time, I have come across one method that worked for me. I am just going to explain and then hope that maybe it would </atom:summary><link>http://backyardgeek.blogspot.com/2008/12/tried-and-tested-method-to-recover.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgAVKY4zsB-0gbAgK5048dnAwxY3vI9p3Y2lyCXZmH4YvumBbn8DpsxzIEX4QWRRWbvE5QqacFIwUtT628VyVHEEesYUfcrfyUHBVndXJTAgiJHurRJRQ78HGFVt7L6z2xebL3n0sZ3nkE/s72-c/SC1.jpg" height="72" width="72"/><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7104013847153955813</guid><pubDate>Thu, 04 Dec 2008 15:29:00 +0000</pubDate><atom:updated>2008-12-04T21:33:45.334+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Minimize removable media headaches in Linux</title><atom:summary type="text">For many new Linux users, removable media can be a deal-breaker. Anyone coming over from Windows knows you simply insert the CD, use it, and eject it. With Linux, it isn&#39;t always that simple. In fact, with Linux, removable media has always held a completely different philosophy.In the old days of UNIX, removable media was seen in the same light as the PC itself -- multi-user. So when you inserted</atom:summary><link>http://backyardgeek.blogspot.com/2008/12/minimize-removable-media-headaches-in.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>20</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-4810212223409814431</guid><pubDate>Mon, 02 Jun 2008 09:18:00 +0000</pubDate><atom:updated>2008-06-02T15:05:24.677+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Cut down on Linux command-line typing with these 10 handy bash aliases</title><atom:summary type="text">The Linux desktop has come a long, long way, but there are still times when I have to use the command line. (I am a hardcore user, after all.) But even though I&#39;m used to typing, spending hours upon hours with my fingers at the keyboard, I still grow tired of typing the same commands over and over. To reduce that tedium, I always add aliases to my .bashrc fileWhat is an alias?An alias is </atom:summary><link>http://backyardgeek.blogspot.com/2008/06/cut-down-on-linux-command-line-typing.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8161469486678977120</guid><pubDate>Fri, 30 May 2008 11:22:00 +0000</pubDate><atom:updated>2008-05-30T18:10:01.072+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>10 ways to secure your Linux desktop</title><atom:summary type="text">A Linux desktop is far more secure than most others. But this level of security doesn&#39;t necessarily involve typical security-focused software or techniques. Sometimes, the easiest means to security are those measures that are the easiest to forget. Let&#39;s take a look at 10 things you can do to secure a Linux desktop.Note that we&#39;re talking about the desktop, not a server. Linux server security is </atom:summary><link>http://backyardgeek.blogspot.com/2008/05/10-ways-to-secure-your-linux-desktop.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>18</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-3097802874274615311</guid><pubDate>Wed, 12 Mar 2008 06:13:00 +0000</pubDate><atom:updated>2008-03-12T12:34:36.203+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>How Hackers Breach Security</title><atom:summary type="text">Hacking, cracking, and cyber crimes are hot topics these days and will continue to be for the foreseeable future. However, there are steps you can take to reduce your organization&#39;s threat level. The first step is to understand what risks, threats, and vulnerabilities currently exist in your environment. The second step is to learn as much as possible about the problems so you can formulate a </atom:summary><link>http://backyardgeek.blogspot.com/2008/03/how-hackers-breach-security.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-2894020668957674869</guid><pubDate>Fri, 07 Mar 2008 07:16:00 +0000</pubDate><atom:updated>2008-03-07T13:19:37.772+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Windows Vista: Is it secure enough for business?</title><atom:summary type="text">Microsoft’s latest desktop operating system, Windows Vista, contains a wide range of new features, from the user interface to the heart of the operating system. However, it is the new security-related technologies which were given top priority by Microsoft in response to the many criticisms of the vulnerabilities in Vista’s forerunner, Windows XP. Developments include improved monitoring and </atom:summary><link>http://backyardgeek.blogspot.com/2008/03/windows-vista-is-it-secure-enough-for.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiba6QTo48t7HeUNTtdb3DXifyegw_QgsBgkjxs1HcdmvFBoeRgZNYYZTyGcCP1chjcRRWO9LuM9zfhTcaIrjITpeqpwgyeAKqAWgyew6VYMqrgykCU4RH8TapeuSAZyO9N8yZrttVB6sY/s72-c/1.JPG" height="72" width="72"/><thr:total>16</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8961936050055267587</guid><pubDate>Wed, 05 Mar 2008 07:55:00 +0000</pubDate><atom:updated>2008-03-05T14:29:14.040+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><title>How Does Ping Really Work?</title><atom:summary type="text">IntroductionPing is a basic Internet program that most of us use daily, but did you ever stop to wonder how it really worked? I don’t know about you, but it bugs me when I do not know how something really works. The purpose of this paper is to resolve any lingering questions you may have about ping and to take your understanding to the next level. If you do not happen to be a programmer, please </atom:summary><link>http://backyardgeek.blogspot.com/2008/03/how-does-ping-really-work.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3dANn2CZOonOoq97MIsgfZoKPYpLRBX_ofMrpBXvKLhqXHR_Q9XOKyfpZzHNffuN-io4fhvJtciDW2mi4eUQ3OnzBbFG6pDh7ATo6R4TqD0vo4NJQ4FO3eJsuPQeac6dDBAJI8qSQZE8/s72-c/tmp.JPG" height="72" width="72"/><thr:total>148</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8866958923835761492</guid><pubDate>Thu, 10 Jan 2008 08:44:00 +0000</pubDate><atom:updated>2008-01-10T14:16:58.981+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>10 security blunders</title><atom:summary type="text">While one of the following links is actually from early 2008, they all refer to issues that arose during the year of 2007. The UK privacy breach: An employee of Her Majesty’s Revenue and Customs Office mailed two CDs containing confidential data on about 25 million UK citizens, including names, addresses, insurance account numbers, and bank account details for claimants in the national child </atom:summary><link>http://backyardgeek.blogspot.com/2008/01/10-security-blunders.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>17</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-6762807823619114115</guid><pubDate>Thu, 13 Dec 2007 08:45:00 +0000</pubDate><atom:updated>2007-12-13T17:12:29.801+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Configuring a Samba Server</title><atom:summary type="text">If you deploy a Linux-based machine to serve up files in a Windows network, you’re not going to get very far without the help of Samba. Samba is an Open source software suite that offers seamless file and print services to SMB/CIFS clients.Basically, Samba can fool a Windows machine into thinking a Linux machine is a Windows machine. A bit of trickery yes, but it gets the job done.Before YaST, </atom:summary><link>http://backyardgeek.blogspot.com/2007/12/configuring-samba-server.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhPds_juMcz6tvk7cqkJa4OONg33CBetulPkwYwczFhTDekbKbhSnXYHsH_zCCVbQFQnT_DEOBPyMt6zi67yEBV1YjarMcelEquRTGQqGJxzlfOUttJw5IJh2g4qCgTLAelg6FYFBoVgZM/s72-c/1.JPG" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-2639460650137823991</guid><pubDate>Tue, 11 Dec 2007 10:47:00 +0000</pubDate><atom:updated>2007-12-11T17:54:35.966+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Configuring Linux using a GUI</title><atom:summary type="text">Many hardcore Linux users would shudder at the thought of configuring Linux network services using a GUI. A solid argument could be made that a GUI has no place being on a server in the first place. Servers are just supposed to sit quietly in the corner and do their job by themselves without user interaction. GUIs, by definition, are designed to make user interaction easier. A GUI adds needless </atom:summary><link>http://backyardgeek.blogspot.com/2007/12/configuring-linux-using-gui.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6MXVPg5ifND_o1kH3poMlzs4rbwUQ5anc3bf9zqgQpAp6qtCMC9-p2wT1wQFEyVh8m8DTBaMVUB_bAQTfYK7wqsGmxEZfsFFZ9HnMWqSal-niEYFXl3cWKtk47O0PMzOMAU0bgflwN4M/s72-c/1.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8281115250903688038</guid><pubDate>Tue, 11 Dec 2007 08:59:00 +0000</pubDate><atom:updated>2007-12-11T15:16:35.539+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><title>Install and configure Windows Server 2008 core</title><atom:summary type="text">With the imminent launch of Microsoft Windows Server 2008 coming on February 27, 2008, I want to show you a feature I am fond of in this new operating system. With Windows Server 2008, you have the option of performing a Windows Server Core installation, which provides you with the minimum set of tools to run Windows.You are provided with a kernel and a command line to manage the server. It is </atom:summary><link>http://backyardgeek.blogspot.com/2007/12/install-and-configure-windows-server.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhm405F_K1l4oUEg56jNTbkc3bZ-pCvkoxc0DsEu0qeNRMhQdm060Wx874Oxo3in0ZK_pyknCio80Zth-mJisUcf6DiX7KfgnagrB-wCc6Cjedr63QyiE7IdlzBhTdnlQxVZmgWsed7oUg/s72-c/1.jpg" height="72" width="72"/><thr:total>56</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7344054094054491390</guid><pubDate>Thu, 06 Dec 2007 10:00:00 +0000</pubDate><atom:updated>2007-12-06T16:14:50.942+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Tweaks, tricks, and hacks to make Windows Vista faster</title><atom:summary type="text">Every operating system could stand some tweaking. No matter how many developers you throw at an OS as complicated as Windows Vista, power users will always find something they can modify or hack to make it run faster, or better, or just differently. Here are just a few of the Windows Vista tweaks, tricks, and hacks discovered so far.1. Add the Run command to the Start MenuBeginning way back with </atom:summary><link>http://backyardgeek.blogspot.com/2007/12/tweaks-tricks-and-hacks-to-make-windows.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjK3ejScRP7-M0bePOWIhF9JfQgXw25KZaUlQR9eSTRCCrKI-6DRBr_dHZRpXICt55e16IbuSd35w8FvJcg8HN00xibr-e9NwTEbdmcXHvWtX7duFKsv3q28N8gfGdkFL1s0K8iLRK8Lmo/s72-c/1.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-6177652737749364421</guid><pubDate>Wed, 05 Dec 2007 09:04:00 +0000</pubDate><atom:updated>2007-12-05T14:56:46.348+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun</category><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>The 10 worst geek gift ideas for the holidays</title><atom:summary type="text">This post is based on the CNET News.com photo gallery “Holiday tech gifts we don’t recommend,” #10: Pointless USB add-onsWe’ve had enough of these. Stupid gadgets that plug into your USB ports are not only a waste of space, they’re totally 2006–come on, USB 2.0 is no longer a novelty! So, for the sake of humanity, please don’t stuff stockings with USB rocket launchers (pictured), noodle strainers</atom:summary><link>http://backyardgeek.blogspot.com/2007/12/10-worst-geek-gift-ideas-for-holidays.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiOMw98FD983LGJna1XCNkCwdGvtNyxrzGGPZIr1dHTWZKj0qNyIUkpCXWt10NpyjmhP3rhPadp_WOFDSr9MZuCubrCiz-2xtgeT0Jl_GA8lbcrsKBKwwQ7rBL4Urz1NlLbCW4PGEkNAto/s72-c/10.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-3481879387796793998</guid><pubDate>Wed, 05 Dec 2007 06:33:00 +0000</pubDate><atom:updated>2007-12-05T12:25:54.685+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>How to Overcome multimedia hurdles in Linux</title><atom:summary type="text">For many, one of the biggest hurdles preventing them from adopting Linux is the difficulties that arise when it comes to dealing with multimedia. In most cases, the Linux multimedia experience is still not like Windows or OS X, where you can click on a file and the player just opens and plays the video or audio clip. In the Linux world, you need to ensure the proper software is installed. When </atom:summary><link>http://backyardgeek.blogspot.com/2007/12/how-to-overcome-multimedia-hurdles-in.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8-_gVPj0grLZN38qy84OC13epAYcwqBp3659wUUDmkAW5l1Ge75-vkdyZat1IO9KN8Xmv4q9_fQX6gV78Q2RfuwqyA4b6VXGrqa3Kf6G3PwliLVhKNAvKWRrnput7-341XPSD47RYeYQ/s72-c/1.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8375999434102579090</guid><pubDate>Thu, 29 Nov 2007 05:44:00 +0000</pubDate><atom:updated>2007-11-29T12:44:56.302+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>Technology never stops growing... Amazing</title><atom:summary type="text">Cell PhoneSprout UmbrellaiPod detachable speakersChair/Mat/Bed...Laptops....Shoe...Cellphone...Umbrella Lights...Notebook Lamp...Laptop...Tablet PC Made Of WoodUSB Flash Drive WatchRubik Cube Mp3 PlayerOryx, The Bike From The FutureSkyLift - Boarding System for AircraftA Phone That Really Hangs UpCellphone Inspired By Chinese ScrollsBYB Balance Cell Phone (touchscreen)Dual Music Player That Plays</atom:summary><link>http://backyardgeek.blogspot.com/2007/11/technology-never-stops-growing-amazing.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyKJLqksXU1rDegy0tKN8CT-XGPrKSzSkiSZxjQ9YmSRn0aUoNmDJ27wM0R0jpCBWouBTin9czgNniyMvh_I6ebvpWaYUBvpvXk0FzvosanlhdTpYgxCypXuEUe1XEeVZJkRX0gLMD5fc/s72-c/1.JPG" height="72" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-8486638705505607179</guid><pubDate>Thu, 22 Nov 2007 08:57:00 +0000</pubDate><atom:updated>2007-11-22T14:39:59.027+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>World&#39;s first arrests for &#39;virtual theft&#39;</title><atom:summary type="text">Dutch police are to charge five teenagers with &quot;virtual theft&quot; of furniture from rooms in the Habbo Hotel, a popular networking website for youngsters. Officers believe that the arrest of one online thief, a 17-year-old accused of computer fraud and stealing, and the questioning of four other 15-year olds represents a first for policing on the internet. An Amsterdam police spokesman confirmed </atom:summary><link>http://backyardgeek.blogspot.com/2007/11/worlds-first-arrests-for-virtual-theft.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxnu3GNFm6wWARiPfjgssXsXph1P4898EzLlWgMN-wsrp7Z677IPxlhok7Mn2AzRQ0T48vsyZwQTqiLThphWOAH5_X1ZXLNaXQ-eSlDWgZhUR6oQL0W2iuw6ayCZYtpl3SgCm4R5eDid0/s72-c/dltheft114.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7465817877814398787</guid><pubDate>Thu, 22 Nov 2007 07:53:00 +0000</pubDate><atom:updated>2007-11-22T13:27:10.657+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>Open Web proxies, the base for malware attacks</title><atom:summary type="text">Advertising and click-through fraud is currently topping the list of malicious activity funnelled through open proxy servers, followed by junk email, according to a research project deploying fake open proxies to catch crooks The research was carried out by the Web Application Security Consortium (WASC) using a network of virtual Apache proxy servers running on VMware and deploying an array of </atom:summary><link>http://backyardgeek.blogspot.com/2007/11/open-web-proxies-base-for-malware.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7634213145191884529</guid><pubDate>Thu, 22 Nov 2007 05:18:00 +0000</pubDate><atom:updated>2007-11-22T12:11:26.487+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Linux</category><title>Get familiar with alternative Linux desktops</title><atom:summary type="text">Linux has proven amazingly flexible: after nearly 10 years of use, I&#39;m still impressed by how the Linux operating system does exactly what I want on any type of hardware. Desktop customization is no exception; from the ultra-modern KDE and GNOME window managers to with the likes of Fluxbox and AfterStep, there&#39;s a Linux desktop to suit everyone.Like the majority of window managers (WMs), Fluxbox </atom:summary><link>http://backyardgeek.blogspot.com/2007/11/get-familiar-with-alternative-linux.html</link><author>noreply@blogger.com (Paritosh)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWeZ0XMm8xTKgEHKqxiP3cLMxT9rYK-32TopvmnXKXQKrr5Z1G7oQf4SDCgvMjYocvxP6blFlCZEb7ricT2z_HofTOvZrrnU4ej_NFQrXWDmRURiuA3Fj2Mh4XaZ7JXoXZEEzgDb-JE_U/s72-c/1.jpg" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-5694589724737987047</guid><pubDate>Thu, 15 Nov 2007 06:54:00 +0000</pubDate><atom:updated>2007-11-15T12:25:27.820+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Tricks</category><title>Cafe Latte and AP-less WEP cracking</title><atom:summary type="text">During the ToorCon 9 conference-where security experts get together with the hacking community to discuss new vulnerabilities-security researcher Viviek Ramachandran demonstrated an innovative technique used to compromise networks encrypted with WEP. I can just hear the comments “old news, nobody uses that anymore.” Surprisingly, WEP is still used by many businesses due to legacy applications and</atom:summary><link>http://backyardgeek.blogspot.com/2007/11/cafe-latte-and-ap-less-wep-cracking.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-7713053768716509042</guid><pubDate>Thu, 15 Nov 2007 06:06:00 +0000</pubDate><atom:updated>2007-11-15T11:46:02.425+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">News</category><title>Bug Labs: Open-sourcing hardware</title><atom:summary type="text">Bug Labs, a start-up from New York City, hopes to bring the goodness of open source to hardware with a modular device that users can customize to their own specifications. At the core of Bug Labs business model is a hardware appliance called the “Bug.” About the size of an iPhone, the Bugbase device is a fully featured Linux PC (IT Management) with ports that allow up to four modules to be fitted</atom:summary><link>http://backyardgeek.blogspot.com/2007/11/bug-labs-open-sourcing-hardware.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-9073981402005415534.post-6304830408271507410</guid><pubDate>Fri, 02 Nov 2007 11:19:00 +0000</pubDate><atom:updated>2007-11-02T17:08:24.361+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guides</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><title>Pop-up windows: Know the difference between the good, the bad, and the annoying</title><atom:summary type="text">There&#39;s been a lot of publicity about pop-up windows, and most of it hasn&#39;t exactly been rave reviews. But it hasn&#39;t always been this way.In fact, pop-up windows were a positive component in the beginning. Created long before tabbed browsers, their purpose was to present information without interfering with the current browser window.These days, due to security risks as well as the annoyance </atom:summary><link>http://backyardgeek.blogspot.com/2007/11/pop-up-windows-know-difference-between.html</link><author>noreply@blogger.com (Paritosh)</author><thr:total>33</thr:total></item></channel></rss>