<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-8208502978594972714</id><updated>2024-10-06T23:00:16.886-07:00</updated><category term="Access Blocked Websites"/><category term="Create your own Proxy Server site"/><category term="Facebook Stalker"/><category term="Facebook users Beware of Hot Girls"/><category term="Video"/><category term="What is Cloud Computing"/><category term="Why Cloud Computing is Dangerous"/><category term="around wanting to date you"/><title type='text'>COMPUTER RELATED INFORMATIONS , KNOWLEDGES , TIPS LIKELY A2Z....</title><subtitle type='html'></subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://karthikcomputer.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default'/><link rel='alternate' type='text/html' href='http://karthikcomputer.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>3</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-8208502978594972714.post-4934429654213137277</id><published>2011-04-13T00:39:00.000-07:00</published><updated>2011-04-13T00:42:15.198-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="around wanting to date you"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook Stalker"/><category scheme="http://www.blogger.com/atom/ns#" term="Facebook users Beware of Hot Girls"/><title type='text'>Facebook users Beware of Hot Girls around wanting to date you! – Facebook Stalker</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;img class=&quot;size-full wp-image-845 alignright&quot; title=&quot;date Hot indian Facebook Stalker Girl&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/12/date-Hot-Facebook-Stalker-Girl.jpg&quot; alt=&quot;date Hot indian Facebook Stalker Girl&quot; width=&quot;185&quot; height=&quot;274&quot; /&gt;&lt;br /&gt;Last week i received a ‘Friend Request’ from an UNKNOWN hot Girl and  being Stupid i quickly added her. and guess what, this Girl turns out to  be a Professional Spammer. After i added her the girl started messaging  me frequently saying hi! hello! and i also started responding her  casually. and then one day she messaged me saying, she wants to send me  her private pictures and for this she needed my email address. the thing  is she could have easily got my email from my profile but instead she  wanted to make sure that i am active on that email ie she wanted my  primary email.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;I have also seen some people commenting on her photos and scraping  cell numbers and even their home addresses,.. people are crazy. You can  read the full message below. Ofcourse i didn’t respond her Back but if  at all i had responded her with my email, lets see what would have  happened. No doubt the Girl is doing this for her own Benefit.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;img class=&quot;aligncenter size-full wp-image-843&quot; title=&quot;Facebook users Beware of Hot Girls around wanting to date you Facebook Stalker&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/12/Facebook-users-Beware-of-Hot-Girls-around-wanting-to-date-you-Facebook-Stalker.png&quot; alt=&quot;Facebook users Beware of Hot Girls around wanting to date you Facebook Stalker&quot; width=&quot;558&quot; height=&quot;304&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;Once i send her my email address, she will email me with a virus  program or a link containing virus. at this moment i will think that  this is something of my interest and i would click that link or install  that program. Since i installed the program, My computer will now act as  a Zombie and in turn i will mail a copy of this email to all my  Contacts automatically. In Short the girl just used me to spread E-mail  spam.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;code&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/arrow.png&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt;&lt;strong&gt;Also read:&lt;/strong&gt; &lt;/code&gt;&lt;/a&gt;&lt;a target=&quot;_blank&quot;&gt;Facebook virus “Koobface” spreading through facebook messages&lt;/a&gt;&lt;/p&gt; &lt;h3&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/Steps.gif&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;-&lt;/span&gt;&lt;strong&gt;What is zombie?&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;img class=&quot;alignright size-full wp-image-842&quot; title=&quot;computer zombie vector&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/12/computer-zombie-vector.png&quot; alt=&quot;computer zombie lokks like&quot; width=&quot;156&quot; height=&quot;171&quot; /&gt;zombie  is a type of computer virus that infects your PC and causes it to send  out spam emails, for a spammer. The spammer controls and uses your pc  without you knowing it. Spammers may be using your computer to send  unsolicited — and possibly offensive — email offers for products and  services. Spammers are using home computers to send bulk emails by the  millions. The Zombie is planted on hundreds of computers belonging to  unsuspecting third parties and then used to spread E-mail spam and  because of this it becomes very difficult to Trace the zombie’s creator.  Zombies can also be used to launch mass attack on any company or  website.&lt;/a&gt;&lt;/p&gt; &lt;h3&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/Steps.gif&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;-&lt;/span&gt;&lt;strong&gt;How do I prevent my computer becoming a zombie?&lt;/strong&gt;&lt;/a&gt;&lt;/h3&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Control What you Share&lt;/span&gt;: &lt;/strong&gt;Spammers  collect e-mail addresses from chatrooms, websites, and nowadays  especially Social Networking websites. So you got to be very careful  about what you share, whom you add as friend, and what you explore on  Facebook. Never Scrap your Phone number or home address on facebook,  this gives rise yet another big thing “Identity theft”.&lt;br /&gt;&lt;strong&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Never open unknown emails&lt;/span&gt;: &lt;/strong&gt; &lt;/a&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;Be  cautious about opening any attachment or downloading any files from  emails you receive. Don’t open an email attachment — even if it looks  like it’s from a friend unless you are expecting it or know what it  contains. If you send an email with an attached file, include a text  message explaining what it is.&lt;br /&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;&lt;strong&gt;Use a Good Antivirus software&lt;/strong&gt;&lt;/span&gt; &lt;/a&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;:  and keep it up to date. Look for anti-virus software that recognizes  current viruses, as well as older ones. I always Recommend use AVG Free  edition – The best (***** from hacker9) And If you have some money to  throw use the Premium version.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;code&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/arrow.png&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt;&lt;strong&gt;Also read:&lt;/strong&gt; &lt;/code&gt;&lt;/a&gt;&lt;a target=&quot;_blank&quot;&gt;How To Get or Register the New Facebook Email Account?&lt;/a&gt;&lt;br /&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/arrow.png&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt; &lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;strong&gt;Below are some Examples of Spam emails:&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt; We carry the most popular medications&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;You’ve been sent an Insta-Kiss (phishing scam)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;STEAMY HOT LESBIAN ACTION LIVE ON CAMERA (peddling pornography)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;FREE 60-Second MORTGAGE qualification (identity theft)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;HURRY HURRY hot stock about to go through the roof (email scams)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;You have 14 new pictures (phishing scam)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;Where are you? (peddling pornography)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;Best Sale Prices on iPhones (phishing scam)&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;All orders shipped from authorized locations&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;V*i*a*g*r*a for cheap.&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;</content><link rel='replies' type='application/atom+xml' href='http://karthikcomputer.blogspot.com/feeds/4934429654213137277/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/facebook-users-beware-of-hot-girls.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/4934429654213137277'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/4934429654213137277'/><link rel='alternate' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/facebook-users-beware-of-hot-girls.html' title='Facebook users Beware of Hot Girls around wanting to date you! – Facebook Stalker'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8208502978594972714.post-1940616138182987555</id><published>2011-04-13T00:35:00.000-07:00</published><updated>2011-04-13T00:36:50.818-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Video"/><category scheme="http://www.blogger.com/atom/ns#" term="What is Cloud Computing"/><category scheme="http://www.blogger.com/atom/ns#" term="Why Cloud Computing is Dangerous"/><title type='text'>What is Cloud Computing? Why Cloud Computing is Dangerous? [Video]</title><content type='html'>&lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;There is a huge Buzz about NeXt generation Cloud computing these  days, But what is it exactly? everyone is asking the same question. the  thing is that you are already in the cloud. Yes if you have a basic Web  mail Account or Facebook account , you are already experiencing the  cloud computing.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;No doubt Google and social networking sites like facebook have taken the cloud computing to completely new level.&lt;br /&gt;&lt;img class=&quot;aligncenter size-medium wp-image-167&quot; title=&quot;What is Cloud Computing Cloud Computing dangerous&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/09/What-is-Cloud-Computing-Cloud-Computing-dangerous-300x214.jpg&quot; alt=&quot;What is Cloud Computing Why Cloud Computing is Dangerous&quot; width=&quot;300&quot; height=&quot;214&quot; /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;strong&gt;What is Cloud Computing?&lt;/strong&gt;&lt;br /&gt;Cloud computing is Internet-based computing, whereby shared resources,  software and information are provided to computers and other devices  on-demand, like electricity.&lt;br /&gt;In Simple words Cloud Computing is a Computing in which services and  storage are provided over the Internet (or “cloud”). in another words  Cloud Computing is a technology used to access services offered on the  Internet cloud.  For example: The use of a Web services such as Flickr,  Google Docs, Jing (video screencapture service) to perform the  functions(editing) that were traditionally done with software installed  on an individual computer.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;strong&gt;Why Cloud-computing is better way to run your business?&lt;/strong&gt;&lt;br /&gt;Cloud computing is a better way to run your business. Instead of running  your apps yourself, they run on a shared data center. When you use any  app that runs in the cloud, you just log in, customize it, and start  using it. That’s the power of cloud computing. Businesses are running  all kinds of apps in the cloud these days, like CRM, HR, accounting, and  custom-built apps. Cloud-based apps can be up and running in a few days  they cost less, because you don’t need to pay for all the people,  products, and facilities to run them.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;strong&gt;Why Cloud Computing is Dangerous?&lt;/strong&gt;&lt;img class=&quot;alignright size-full wp-image-168&quot; title=&quot;cloud-computing-dangerous&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/09/cloud-computing-dangerous.jpg&quot; alt=&quot;Why Cloud Computing is Dangerous&quot; width=&quot;254&quot; height=&quot;400&quot; /&gt;&lt;br /&gt;Normally Cloud Computing services are free. for example services like  Facebook and Gmail are totally “free, But at the same time they also  cannot assure you that your data will be secure Because of the simple  fact that cloud computing services are shared among people and could be  shut down at any time.&lt;br /&gt;The basic fact that you’re sharing data with others is a huge security  risk. For example, If I have my server with my data than at least I know  that I can protect my data, but if I mix my data with hundreds of  servers storing others data as well and if there might be one bug in any  application, that will allow a virus to move to the others and thus  affecting my data.&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;IT security expert &lt;strong&gt;Richard Stallman&lt;/strong&gt; says:&lt;br /&gt;&lt;em&gt;“One reason you should not use web applications to do your computing  is that you lose control, It’s just as bad as using a proprietary  program. Do your own computing on your own computer with your copy of a  freedom-respecting program. If you use a proprietary program or somebody  else’s web server, you’re defenseless. You’re putty in the hands of  whoever developed that software.”&lt;/em&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;Now you Decide, do you wanna live your life in Clouds??&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;&lt;p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;&lt;a href=&quot;http://KARTHIK.ASIA&quot;&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;object width=&quot;480&quot; height=&quot;390&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/QJncFirhjPg?fs=1&amp;amp;hl=en_US&amp;amp;rel=0&quot;&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;param name=&quot;allowscriptaccess&quot; value=&quot;always&quot;&gt;&lt;embed src=&quot;http://www.youtube.com/v/QJncFirhjPg?fs=1&amp;amp;hl=en_US&amp;amp;rel=0&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;480&quot; height=&quot;390&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://karthikcomputer.blogspot.com/feeds/1940616138182987555/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/what-is-cloud-computing-why-cloud.html#comment-form' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/1940616138182987555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/1940616138182987555'/><link rel='alternate' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/what-is-cloud-computing-why-cloud.html' title='What is Cloud Computing? Why Cloud Computing is Dangerous? [Video]'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-8208502978594972714.post-3618182499118393359</id><published>2011-04-12T09:02:00.000-07:00</published><updated>2011-04-12T09:04:04.893-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Access Blocked Websites"/><category scheme="http://www.blogger.com/atom/ns#" term="Create your own Proxy Server site"/><title type='text'>Create your own Proxy Server site and Access Blocked Websites!</title><content type='html'>&lt;p&gt;Proxy site allows you to access Blocked or restricted sites. Normally  Schools, colleges and even some offices block or restrict certain  websites for example “Social Networking” sites like facebook, twitter,  etc. There are thousands of proxy sites available. But the one thing  which is common in all the sites is that they also show you loads of  advertisements, which is quite Frustrating. and also there is  possibility that the admins form schools and offices might have already  blocked some common proxy sites.&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;&lt;em&gt;Our Proxy Site:&lt;/em&gt; &lt;a href=&quot;http://www.surf.hacker9.com/&quot; target=&quot;_blank&quot;&gt;Surf.hacker9.com&lt;/a&gt;&lt;/p&gt;&lt;/blockquote&gt; &lt;p&gt;&lt;img class=&quot;aligncenter size-full wp-image-735&quot; title=&quot;Create your own Proxy Server site and Access Blocked Websites at college school office proxy sites 2010 2011&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/11/Create-your-own-Proxy-Server-site-and-Access-Blocked-Websites-proxy-sites-2010-2011.png&quot; alt=&quot;Create your own Proxy Server site and Access Blocked Websites at college school office proxy sites 2010 2011&quot; width=&quot;530&quot; height=&quot;324&quot; /&gt;In  this Tutorial am going to show you how you can create your own proxy  server site and unlock all the restricted sites. we will see two  methods. you can try whichever you feel easy to go with.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;1. Using Glype proxy script (Free Proxy Project)&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;2. Using Google Apps engine (inbuilt project)&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;So lets start with Method #1 since it is easy and quick.&lt;/p&gt; &lt;h3&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/Steps.gif&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt; &lt;strong&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;-&lt;/span&gt;Using Glype proxy script&lt;/strong&gt;&lt;/h3&gt; &lt;p&gt;This method requires you to have a “&lt;a href=&quot;http://www.000webhost.com/380931.html&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;Webhosting account&lt;/a&gt;” (which is free and quite simple to register) and a “&lt;a href=&quot;http://hacker9.com/downloads/glype-1.1.zip&quot; target=&quot;_blank&quot;&gt;Glype proxy script&lt;/a&gt;” file.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;note:&lt;/strong&gt; The Problem with free hosting is that, as soon  as they come to know that you are using Proxy Script, they will Ban  you. so the Smart choice is to Get a&lt;a href=&quot;http://secure.hostgator.com/%7Eaffiliat/cgi-bin/affiliates/clickthru.cgi?id=offer29&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt; Paid hosting&lt;/a&gt; account for 1 month, costs just $4/month ( $25 in Discount, for 1 year)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 1. &lt;/strong&gt;Just download the &lt;a href=&quot;http://hacker9.com/downloads/glype-1.1.zip&quot; target=&quot;_blank&quot;&gt;Glype proxy script Zip file&lt;/a&gt; and don’t bother to unzip it.&lt;/p&gt; &lt;p&gt;&lt;strong&gt; Step 2. &lt;/strong&gt;The next step is to Get a Web-hosing account with Subdomain.  In this tutorial i have used &lt;a href=&quot;http://www.000webhost.com/380931.html&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;000webhost&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;em&gt;Recommended:&lt;/em&gt;&lt;/strong&gt; &lt;a href=&quot;http://secure.hostgator.com/%7Eaffiliat/cgi-bin/affiliates/clickthru.cgi?id=offer29&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;Hostgator WebHosting&lt;/a&gt; (&lt;strong&gt;20%&lt;/strong&gt; off coupon code- &lt;strong&gt;Spring&lt;/strong&gt;)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;em&gt;note:&lt;/em&gt; &lt;/strong&gt;Do not use ‘proxy’ word in the subdomain while registering for &lt;a href=&quot;http://www.000webhost.com/380931.html&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;free webhosting account&lt;/a&gt;, you will get banned. instead use your name.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 3&lt;/strong&gt;. After your account gets Active, just Login  to your “Control Panel” and Click on “File manager”. This will Show you  the directories.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;aligncenter size-full wp-image-747&quot; title=&quot;12-10-2010 7-29-44 PM&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/11/12-10-2010-7-29-44-PM.png&quot; alt=&quot;&quot; width=&quot;465&quot; height=&quot;115&quot; /&gt;&lt;img class=&quot;aligncenter size-full wp-image-748&quot; title=&quot;12-10-2010 7-32-19 PM&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/11/12-10-2010-7-32-19-PM.png&quot; alt=&quot;&quot; width=&quot;477&quot; height=&quot;97&quot; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 4&lt;/strong&gt;. Click Open “&lt;em&gt;Public_html&lt;/em&gt;” Directory and then click “&lt;em&gt;Upload&lt;/em&gt;” button.&lt;/p&gt; &lt;p&gt;&lt;img class=&quot;aligncenter size-full wp-image-746&quot; title=&quot;12-10-2010 7-35-56 PM&quot; src=&quot;http://www.hacker9.com/wp-content/uploads/2010/11/12-10-2010-7-35-56-PM.png&quot; alt=&quot;&quot; width=&quot;572&quot; height=&quot;130&quot; /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 5.&lt;/strong&gt; Now in the Archives(zip,tar) Section, browse and locate your downloaded glype-1.1.zip file and Click “&lt;em&gt;Green Check Button&lt;/em&gt;” (&lt;a href=&quot;http://www.hacker9.com/wp-content/uploads/2010/11/12-10-2010-7-38-14-PM.png&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;&lt;strong&gt;See the Screen Snap&lt;/strong&gt;&lt;/em&gt;&lt;/a&gt;)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step &lt;/strong&gt;&lt;strong&gt;6. &lt;/strong&gt;After Uploading Just visit your website in the new tab and You should now see your own Proxy site.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 7. &lt;/strong&gt;Just type in any web address and see if it works, that’s it.&lt;/p&gt; &lt;h3&gt;&lt;img src=&quot;http://img.hacker9.com/hacker9/Steps.gif&quot; alt=&quot;&quot; align=&quot;left&quot; /&gt; &lt;strong&gt;&lt;span style=&quot;color: rgb(255, 255, 255);&quot;&gt;-&lt;/span&gt;Using Google Apps engine&lt;/strong&gt;&lt;/h3&gt; &lt;p&gt;This method is quite difficult but doesn’t require a “webhosting account” account. all you need to have is ‘Google account’.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 1. &lt;/strong&gt;Download &lt;a href=&quot;http://www.python.org/download/releases/2.6.4/#download&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;Python 2.6.4&lt;/a&gt; from &lt;a href=&quot;http://www.python.org/download/releases/2.6.4/#download&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;here &lt;/a&gt;and Install it. Google Apps engine requires “Python” to Run, which acts as a platform.&lt;/p&gt; &lt;p&gt;(&lt;em&gt;Windows user’s click on “Windows x86 MSI installer(2.6.4)(sig)”&lt;/em&gt;)&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step &lt;/strong&gt;&lt;strong&gt;2. &lt;/strong&gt;Once you install Python 2.6.4 on your PC, the next step is to download the “&lt;a href=&quot;http://code.google.com/appengine/downloads.html&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;Google apps engine SDK&lt;/a&gt;” for python  (&lt;a href=&quot;http://code.google.com/appengine/downloads.html&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;URL&lt;/a&gt;):&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 3. &lt;/strong&gt;Now launch the “Google apps engine” that you just installed on your PC.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;&lt;strong&gt;Step&lt;/strong&gt; 4.&lt;/strong&gt; This step is to Download “&lt;a href=&quot;http://hacker9.com/downloads/hacker9_proxy.zip&quot; target=&quot;_blank&quot;&gt;Python proxy Script&lt;/a&gt;” which you can load &lt;a href=&quot;http://hacker9.com/downloads/hacker9_proxy.zip&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;. After downloading just extract it to “Desktop”.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step &lt;/strong&gt;&lt;strong&gt;5.&lt;/strong&gt; After doing step4 just Go to &lt;a href=&quot;http://appengine.google.com/&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;http://appengine.google.com&lt;/a&gt; and sign in with your Google account.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 6. &lt;/strong&gt;Click on “Create an application”(verify your account) and give a name and title to your app and save it.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 7. &lt;/strong&gt;Now go back to your “Google  apps engine” that you launched in step3 and click on file &amp;gt;&amp;gt; Add  existing application. Now in the pop-up box select the extracted “Python  proxy Script” file that you just created in step4 and click “ADD”.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step &lt;/strong&gt;&lt;strong&gt;8.&lt;/strong&gt; After clicking “ADD”,  select ‘your_app_id’ and Click on ‘Edit’ icon. In the Application field  replace “your_app_id” with the name of your app that you saved in step6.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 9.&lt;/strong&gt; After editing, close the Edit window and Click on “Diploy” icon. Now enter your Google account and click Ok.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step&lt;/strong&gt;&lt;strong&gt; 10.&lt;/strong&gt; Now Go back to your web Browser and Enter your App URL for example mine is &lt;a href=&quot;http://hacker9proxy.appspot.com/&quot; target=&quot;_blank&quot; class=&quot;external&quot; rel=&quot;nofollow&quot;&gt;hacker9proxy.appspot.com&lt;/a&gt;. you should now see your proxy server.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; Keep your proxy site secret. Never tell your  proxy URL to your Classmates or Colleagues because if admin of your  organization comes to know about this, he will certainly block or  restrict your proxy site.&lt;br /&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;I hope you are done with your proxy server. If Any doubts or difficulties, your comments are appreciated.&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;</content><link rel='replies' type='application/atom+xml' href='http://karthikcomputer.blogspot.com/feeds/3618182499118393359/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/create-your-own-proxy-server-site-and.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/3618182499118393359'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/8208502978594972714/posts/default/3618182499118393359'/><link rel='alternate' type='text/html' href='http://karthikcomputer.blogspot.com/2011/04/create-your-own-proxy-server-site-and.html' title='Create your own Proxy Server site and Access Blocked Websites!'/><author><name>Unknown</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>