<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-3056259525059092513</id><updated>2024-10-24T03:38:32.618-07:00</updated><category term="Tips"/><category term="Hacking Tools"/><category term="Mobile Trick"/><category term="Craks"/><category term="Review"/><category term="Keylogger"/><category term="Software"/><category term="Circuits"/><category term="Scanner"/><category term="Firewall"/><category term="Antivirus"/><title type='text'>EVERYTHING IS PLANNED</title><subtitle type='html'>It is best of all. It is one which belongs to the need of an engineer. We, the engineers are the future. We will be the masters of the world. Here you find all the basics of electronics with programming with hacking tips and much more.</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default?start-index=26&amp;max-results=25&amp;redirect=false'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>157</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-6457785294452318420</id><published>2011-09-04T09:04:00.000-07:00</published><updated>2011-09-04T09:04:30.251-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Best password Hacking Tools 2011</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;Hello Friends , Today I am sharing with you my  latest Collection of &quot;Best Password Hacking Tools 2011&quot;. Using this password  hacking kit you will be able to crack a lot of passwords like Windows Admin  password, pdf passwords, zip files passwords, document passwords, rar passwords  and much more.. I am sure you will like this post.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-family: Arial, Helvetica, sans-serif; text-align: center;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGxMKtz7LavMit4ovCGOg_ElsQrji-j6VEBeUigwj1muXRY8GQFADgs28ARD6cSVb-CWPZAe0TdPr4jlKVb9MqZOVIDFJRmydyE07UOgOv1gC7z0jGej_LJB3I-nIGV6DDJxdRv9j22IPH/s1600/Password+Hacking+and+Breaking+Tools.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;best hacking tools, password crackers, password hacking softwares&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGxMKtz7LavMit4ovCGOg_ElsQrji-j6VEBeUigwj1muXRY8GQFADgs28ARD6cSVb-CWPZAe0TdPr4jlKVb9MqZOVIDFJRmydyE07UOgOv1gC7z0jGej_LJB3I-nIGV6DDJxdRv9j22IPH/s320/Password+Hacking+and+Breaking+Tools.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;This Password Hacking Kit Consists of following  Password Hacking Breaking Tools:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;1. PDF Password Remover&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;2. &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Windows XP&lt;/span&gt;  Admin Password &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD10&quot;&gt;Remover&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;3. &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD9&quot;&gt;Zip File&lt;/span&gt;  Password Cracker.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;4. SQL Password Remover&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;5. Microsoft Office Password  Remover.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;6. Microsoft Windows Vista Password  Remover.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;7. Rar File Password  Cracker&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;8. Windows &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD11&quot;&gt;Password  Recovery&lt;/span&gt; Kit&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;9. Password Changer.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;10. Distributed File Password  Recovery..&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;and much more..&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;As the name of the tools suggests its a complete  password hacking Kit. So guys Enjoy Latest Hacking tools  ..&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span&gt;How to Use it??&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;1. Download the Password Hacking Kit From  Below:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;b&gt;&lt;span&gt;&lt;a href=&quot;http://www.ziddu.com/download/14527424/Password_Cracker_Tools.rar.html&quot;&gt;&lt;span style=&quot;color: #2b98d4;&quot;&gt;DOWNLOAD&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span&gt;2. Extract the file and Install  it.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;3. Then Register them and use  it. ( all tools contains Full serial keys and patches)..&lt;/span&gt;&lt;/span&gt; &lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/6457785294452318420/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/6457785294452318420?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/6457785294452318420'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/6457785294452318420'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/09/best-password-hacking-tools-2011.html' title='Best password Hacking Tools 2011'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGxMKtz7LavMit4ovCGOg_ElsQrji-j6VEBeUigwj1muXRY8GQFADgs28ARD6cSVb-CWPZAe0TdPr4jlKVb9MqZOVIDFJRmydyE07UOgOv1gC7z0jGej_LJB3I-nIGV6DDJxdRv9j22IPH/s72-c/Password+Hacking+and+Breaking+Tools.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-5140835185054569837</id><published>2011-07-02T22:27:00.000-07:00</published><updated>2011-07-02T22:27:09.287-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><title type='text'>XProbe2 v0.3 Released</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=244&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to XProbe2 v0.3 Released&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;xprobe2&quot; src=&quot;http://www.insecure.in/images/xprobe2.jpg&quot; /&gt;&lt;br /&gt;
Xprobe2 is an active os fingerprinting tool with a different approach to operating system fingerprinting. Xprobe2 rely on fuzzy signature matching, probabilistic guesses, multiple matches simultaneously, and a signature database.&lt;br /&gt;
&lt;strong&gt;Xprobe2 includes :&lt;/strong&gt;&lt;br /&gt;
* A TCP fingerprinting module (among the other fingerprinting modules the tool uses)&lt;br /&gt;
* A Port Scanner&lt;br /&gt;
* An automatic receive timeout for Xprobe2’s different modules&lt;br /&gt;
* The ability to completely control the tool’s operation&lt;br /&gt;
* A newly built signature database with over 160 signatures&lt;br /&gt;
* And other enhancements and fixes&lt;br /&gt;
Xprobe2 v0.3 introduces two new application level modules: SMB and SNMP.&lt;br /&gt;
SMB module retrieve Native OS and Native LANMAN parameters from SMB Session Setup and X reply.&lt;br /&gt;
SNMP sends a version 2c get request for the sysDescr.0 OID using community strings specified in xprobe2.con&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://prdownloads.sourceforge.net/xprobe/xprobe2-0.3.tar.gz?download&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;strong&gt;More Info :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://xprobe.sourceforge.net/&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/5140835185054569837/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/5140835185054569837?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/5140835185054569837'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/5140835185054569837'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/xprobe2-v03-released.html' title='XProbe2 v0.3 Released'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-195173011145736555</id><published>2011-07-02T22:26:00.000-07:00</published><updated>2011-07-02T22:26:08.266-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>LCP 5.04</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;a href=&quot;http://blog.insecure.in/?p=246&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to LCP 5.04&quot;&gt;&lt;/a&gt; &lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;LCP 5&quot; height=&quot;300&quot; src=&quot;http://www.insecure.in/images/lcp5.gif&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Overview :&lt;/strong&gt;&lt;br /&gt;
Main purpose of LCP program is &lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: #ed008c 1px solid; color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;user &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: #ed008c 1px solid; color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;account &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: #ed008c 1px solid; color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;passwords&lt;/span&gt;&lt;/span&gt; auditing and recovery in Windows NT/2000/XP/2003.&lt;br /&gt;
General features of this product:&lt;br /&gt;
* Accounts information import:&lt;br /&gt;
o import from local computer;&lt;br /&gt;
o import from remote computer;&lt;br /&gt;
o import from SAM file;&lt;br /&gt;
o import from .LC file;&lt;br /&gt;
o import from .LCS file;&lt;br /&gt;
o import from PwDump file;&lt;br /&gt;
o import from Sniff file;&lt;br /&gt;
* Passwords recovery:&lt;br /&gt;
o dictionary attack;&lt;br /&gt;
o hybrid of dictionary and brute force attacks;&lt;br /&gt;
o &lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;brute &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;force&lt;/span&gt;&lt;/span&gt; attack;&lt;br /&gt;
* Brute force session distribution:&lt;br /&gt;
o sessions distribution;&lt;br /&gt;
o sessions combining;&lt;br /&gt;
* Hashes computing:&lt;br /&gt;
o LM and NT hashes computing by password;&lt;br /&gt;
o LM and NT response computing by password and server challenge.&lt;br /&gt;
SID&amp;amp;User program is SID and user names getting tool for Windows NT/2000/XP/2003.&lt;br /&gt;
General features of this product:&lt;br /&gt;
* SID getting for a given account name;&lt;br /&gt;
* Getting of an account name for single SID or account names for SID range.&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.lcpsoft.com/english/download.htm&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/195173011145736555/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/195173011145736555?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/195173011145736555'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/195173011145736555'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/lcp-504.html' title='LCP 5.04'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4546246500417990815</id><published>2011-07-02T22:23:00.001-07:00</published><updated>2011-07-02T22:23:53.353-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>TrueCrypt – Free Open-Source Disk Encryption Software</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=248&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to TrueCrypt – Free Open-Source Disk Encryption Software&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;TrueCrypt&quot; height=&quot;345&quot; src=&quot;http://www.insecure.in/images/truecrypt.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink0&quot; jquery1309670564086=&quot;8&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;TrueCrypt&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; is a software system for establishing and maintaining an on-the-fly-encrypted volume (data storage device). On-the-fly encryption means that data are automatically encrypted or decrypted right before they are loaded or saved, without any user intervention. No data stored on an encrypted volume can be read (decrypted) without using the correct password/keyfile(s) or correct encryption keys. Entire file system is encrypted (e.g., file names, folder names, contents of every file, free space, meta data, etc).&lt;br /&gt;
Files can be copied to and from a mounted TrueCrypt volume just like they are copied to/from any normal disk (for example, by simple drag-and-drop operations). Files are automatically being decrypted on-the-fly (in memory/RAM) while they are being read or copied from an encrypted TrueCrypt volume. Similarly, files that are being written or copied to the TrueCrypt volume are automatically being encrypted on-the-fly (right before they are written to the disk) in RAM. Note that this does not mean that the whole file that is to be encrypted/decrypted must be stored in RAM before it can be encrypted/decrypted. There are no extra memory (RAM) requirements for TrueCrypt. For an illustration of how this is accomplished, see the following paragraph.&lt;br /&gt;
&lt;strong&gt;New features :&lt;/strong&gt;&lt;br /&gt;
* Ability to encrypt a non-system partition without losing existing data on the partition. (Windows Vista/2008)Note: To encrypt a non-system partition in place, click ‘Create Volume‘ &amp;gt; ‘Encrypt a non-system partition‘ &amp;gt; ‘Standard volume‘ &amp;gt; ‘Select Device‘ &amp;gt; ‘Encrypt partition in place‘ and then follow the instructions in the wizard. Please note that this is not supported on Windows XP/2000/2003 as these versions of Windows do not natively support shrinking of a filesystem (the filesystem needs to be shrunk to make space for the volume header and backup header).&lt;br /&gt;
* Support for &lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink1&quot; jquery1309670564086=&quot;7&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;security &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;tokens&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; and smart cards (for more information, see section Security Tokens and Smart Cards in chapter Keyfiles).&lt;br /&gt;
* The TrueCrypt boot loader can be prevented from displaying any texts (by selecting Settings &amp;gt; System Encryption and enabling the option ‘Do not show any texts in the pre-boot authentication screen’).&lt;br /&gt;
* The TrueCrypt boot loader can now display a custom message (select Settings &amp;gt; System Encryption and enter the message in the corresponding field) either without any other texts or along with the standard TrueCrypt boot loader texts.&lt;br /&gt;
* Pre-boot authentication passwords can now be cached in the driver memory, which allows them to be used for mounting of non-system TrueCrypt volumes (select Settings &amp;gt; System Encryption and enable the option ‘Cache pre-boot authentication password‘).&lt;br /&gt;
* Linux and Mac OS X versions: The ability to mount a Windows system partition encrypted by TrueCrypt and to mount a partition located on a Windows system drive that is fully encrypted by a Windows version of TrueCrypt.&lt;br /&gt;
Latest Stable Version – 6.1a&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.truecrypt.org/downloads.php&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4546246500417990815/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4546246500417990815?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4546246500417990815'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4546246500417990815'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/truecrypt-free-open-source-disk.html' title='TrueCrypt – Free Open-Source Disk Encryption Software'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4671467675892808340</id><published>2011-07-02T22:22:00.001-07:00</published><updated>2011-07-02T22:22:16.844-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Keylogger"/><title type='text'>SC-KeLog Pro</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=174&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to SC-KeLog Pro&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;SC-KeLog Pro. [Monitor Remote and Local Computer in Stealth]&lt;br /&gt;
&lt;img alt=&quot;SC-Keylog&quot; src=&quot;http://www.insecure.in/images/sc-keylog.png&quot; /&gt;&lt;br /&gt;
SC-KeyLog PRO is a powerful digital surveillance monitor that logs computer activity for later review. Allows you to secretly record computer user activities such as e-mails, chat conversations, visited web sites, clipboard usage and more in a protected logfile. SC-KeyLog PRO even captures Windows user logon passwords!&lt;br /&gt;
Information is captured completely hidden from the user and you even do not need physical access to the computer to be able to record and view its usage. This program allows you to remotely install the monitoring system through an email attachment without the user recognizing the installation at all.&lt;br /&gt;
&lt;strong&gt;Features :&lt;/strong&gt;&lt;br /&gt;
* Extensive logging&lt;br /&gt;
* Remote installation support&lt;br /&gt;
* Password protection&lt;br /&gt;
* Easy to use built-in logfile viewer&lt;br /&gt;
* Incredibly small deployment package, only 100 Kb&lt;br /&gt;
* Sends logfiles by e-mail&lt;br /&gt;
* E-mails are sent invisible&lt;br /&gt;
* Monitors all users, including Remote Desktop users, VNC clients and others&lt;br /&gt;
* Automatic startup&lt;br /&gt;
* Custom alert messages&lt;br /&gt;
* Bypasses local firewalls&lt;br /&gt;
* Export logfiles to HTML files&lt;br /&gt;
* Automatic uninstallation&lt;br /&gt;
&lt;strong&gt;What is recorded?&lt;/strong&gt;&lt;br /&gt;
SC-KeyLog PRO records everything you want to know, including:&lt;br /&gt;
* All websites visited&lt;br /&gt;
* All chat messages typed&lt;br /&gt;
* All e-mails typed&lt;br /&gt;
* All passwords used&lt;br /&gt;
* All applications&lt;br /&gt;
* All keystrokes&lt;br /&gt;
* Text copied to clipboard&lt;br /&gt;
* All mouse clicks&lt;br /&gt;
* And much more!&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://rapidshare.com/files/34347678/SC_keylogg_3.2_Full.rar&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4671467675892808340/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4671467675892808340?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4671467675892808340'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4671467675892808340'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/sc-kelog-pro.html' title='SC-KeLog Pro'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-5593599029679680055</id><published>2011-07-02T22:21:00.001-07:00</published><updated>2011-07-02T22:21:34.843-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>SniffPass v1.07</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=197&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to SniffPass v1.07&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;SniffPass&quot; src=&quot;http://www.insecure.in/images/sniffpass.gif&quot; /&gt;&lt;br /&gt;
SniffPass is small freeware utility that listens to your network, capture the passwords that pass through your network adapter, and display them on the screen instantly.&lt;br /&gt;
SniffPass can capture the passwords of the following Protocols: POP3, IMAP4, SMTP, FTP, and HTTP (basic authentication passwords).&lt;br /&gt;
You can use this utility to recover lost Web/FTP/Email passwords.&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.nirsoft.net/utils/sniffpass.zip&lt;/span&gt;&lt;/code&gt;&lt;br /&gt;
&lt;strong&gt;More Info :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.nirsoft.net/utils/password_sniffer.html&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/5593599029679680055/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/5593599029679680055?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/5593599029679680055'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/5593599029679680055'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/sniffpass-v107.html' title='SniffPass v1.07'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4908628489044144648</id><published>2011-07-02T22:20:00.001-07:00</published><updated>2011-07-02T22:20:37.017-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><title type='text'>GFI LANguard 9</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=250&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to GFI LANguard 9&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;GFI LANguard&quot; height=&quot;320&quot; src=&quot;http://www.insecure.in/images/gfi-langaurd.png&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink0&quot; jquery1309670251595=&quot;8&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;GFI &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;LANguard&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; is an award-winning network and security scanner used by over 20,000 customers that allows you to scan your network and ports to detect, assess and rectify &lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink1&quot; jquery1309670251595=&quot;7&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: #ed008c 1px solid; color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;security &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;background-color: transparent; border-bottom: #ed008c 1px solid; color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;vulnerabilities&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; with minimal administrative effort. As an administrator, you have to deal separately with problems related to &lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink2&quot; jquery1309670251595=&quot;6&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;vulnerability&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; issues, patch management and network auditing, at times using multiple products.&lt;br /&gt;
However, with GFI &lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink3&quot; jquery1309670251595=&quot;5&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;LANguard&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; these three pillars of vulnerability management are addressed in one package, allowing you to have a complete picture of your network set-up and maintain a secure network state faster and more effectively.&lt;br /&gt;
&lt;strong&gt;Vulnerability management:&lt;/strong&gt;&lt;br /&gt;
GFI LANguard performs network scans using vulnerability check databases based on OVAL and SANS Top 20, providing over 15,000 &lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink4&quot; jquery1309670251595=&quot;4&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;vulnerability &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 400; position: relative;&quot;&gt;assessments&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; when your network, including virtual environments, is scanned. GFI LANguard allows you to analyze your network security state and take action to secure the network before it is compromised.&lt;br /&gt;
&lt;strong&gt;&lt;a class=&quot;kLink&quot; href=&quot;http://www.blogger.com/post-create.g?blogID=3056259525059092513#&quot; id=&quot;KonaLink5&quot; jquery1309670251595=&quot;3&quot; style=&quot;position: static; text-decoration: underline !important;&quot;&gt;&lt;span style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 700; position: static;&quot;&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 700; position: relative;&quot;&gt;Patch &lt;/span&gt;&lt;span class=&quot;kLink&quot; style=&quot;color: #ed008c !important; font-family: Verdana, Arial, Helvetica, sans-serif; font-weight: 700; position: relative;&quot;&gt;management&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;:&lt;/strong&gt;&lt;br /&gt;
When a network scan is complete, GFI LANguard’s patch management capabilities give you all the functionality and tools you need to effectively deploy and manage patches on all machines across different Microsoft operating systems and products in 38 languages. Apart from automatically downloading missing Microsoft security updates, you can also automatically deploy the missing Microsoft patches or service-packs throughout your network at the end of scheduled scans.&lt;br /&gt;
&lt;strong&gt;Network auditing:&lt;/strong&gt;&lt;br /&gt;
GFI LANguard’s network auditing function tells you all you need know about your network by retrieving hardware information on memory, processors, display adapters, storage devices, motherboard details, printers, and ports in use. Using baseline comparisons you can check whether any hardware was added/removed since last scan. GFI LANguard can also identify and report on unauthorized software installations and provide alerts or else automatically uninstall these unauthorized applications whenever they are detected on the network.&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.gfi.com/downloads/downloads.aspx?pid=lanss&amp;amp;lid=en&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4908628489044144648/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4908628489044144648?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4908628489044144648'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4908628489044144648'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/gfi-languard-9.html' title='GFI LANguard 9'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4294637814152394434</id><published>2011-07-02T22:19:00.001-07:00</published><updated>2011-07-02T22:19:30.335-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Evil-DisConnect-V1.0 Update V2.0</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=268&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Evil-DisConnect-V1.0 Update V2.0&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;Evil Disconnect&quot; src=&quot;http://www.insecure.in/images/evil-disc.png&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
http://www.2shared.com/file/3642119/f2d54b3e/Evil_Disconnect_v10_Fixed.html&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4294637814152394434/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4294637814152394434?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4294637814152394434'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4294637814152394434'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/evil-disconnect-v10-update-v20.html' title='Evil-DisConnect-V1.0 Update V2.0'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-1044302430957860564</id><published>2011-07-02T22:18:00.001-07:00</published><updated>2011-07-02T22:18:38.400-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Terror Begin</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=270&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Terror Begin&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;terror-begin&quot; height=&quot;400&quot; src=&quot;http://www.insecure.in/images/terror-begin.gif&quot; width=&quot;264&quot; /&gt;&lt;br /&gt;
6 YM Option&lt;br /&gt;
6 Client Option&lt;br /&gt;
1 yahelite Lagger Option&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;code&gt;http://www.2shared.com/file/4227318/60fed6cc/T-Begin1.html&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;http://rapidshare.com/files/161202363/T-Begin1.zip.html&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;http://www.4shared.com/file/70005998/bc2973aa/T-Begin1.html&lt;/code&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/1044302430957860564/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/1044302430957860564?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/1044302430957860564'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/1044302430957860564'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/terror-begin.html' title='Terror Begin'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4452463580923039292</id><published>2011-07-02T22:16:00.003-07:00</published><updated>2011-07-02T22:16:31.872-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><title type='text'>Snort – Open Source IDS</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=256&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Snort – Open Source IDS&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;Snort&quot; src=&quot;http://www.insecure.in/images/snort.png&quot; /&gt;&lt;br /&gt;
This lightweight network intrusion detection and prevention system excels at traffic analysis and packet logging on IP networks. Through protocol analysis, content searching, and various pre-processors, Snort detects thousands of worms, vulnerability exploit attempts, port scans, and other suspicious behavior. Snort uses a flexible rule-based language to describe traffic that it should collect or pass, and a modular detection engine. Also check out the free Basic Analysis and Security Engine (BASE), a web interface for analyzing Snort alerts.&lt;br /&gt;
Open source Snort works fine for many individuals, small businesses, and departments. Parent company SourceFire offers a complimentary product line with more enterprise-level features and real-time rule updates. They offer a free (with registration) 5-day-delayed rules feed, and you can also find many great free rules at Bleeding Edge Snort.&lt;br /&gt;
&lt;strong&gt;Latest Release :&lt;/strong&gt; Snort 2.8.3.1&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.snort.org/dl/&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4452463580923039292/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4452463580923039292?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4452463580923039292'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4452463580923039292'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/snort-open-source-ids.html' title='Snort – Open Source IDS'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-2898936504734124181</id><published>2011-07-02T22:15:00.001-07:00</published><updated>2011-07-02T22:15:37.207-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>PHP mbstring Buffer Overflow Vulnerability</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=294&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to PHP mbstring Buffer Overflow Vulnerability&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;strong&gt;Summary :&lt;/strong&gt;&lt;br /&gt;
PHP is “a scripting language extensively used in web application development. The package contains a number of language extensions aside from the language core”.&lt;br /&gt;
A heap buffer overflow was found in mbstring extension that is bundled in the standard distribution. mbstring extension provides a set of functions for the manipulation of multibyte / Unicode strings.&lt;br /&gt;
The vulnerability occurs in the part of the encoding conversion facility that decodes strings that contain HTML entities into Unicode strings. Due to the decoder’s incorrect handling of error conditions, the bounds check for a heap-allocated buffer is effectively bypassed. An attacker can exploit this vulnerability to transfer arbitrary data to a specific region of the heap if he gains control over the input of the decoder.&lt;br /&gt;
&lt;strong&gt;Credit :&lt;/strong&gt;&lt;br /&gt;
The information has been provided by Moriyoshi Koizumi. [mozo at mozo.jp]&lt;br /&gt;
&lt;strong&gt;Vulnerable Systems :&lt;/strong&gt;&lt;br /&gt;
* PHP version 4.3.0 or newer&lt;br /&gt;
&lt;strong&gt;Immune Systems :&lt;/strong&gt;&lt;br /&gt;
* PHP versions prior to 4.3.0&lt;br /&gt;
* PHP version 5.2.7&lt;br /&gt;
* PHP version 5.3 alpha 3&lt;br /&gt;
&lt;strong&gt;Details :&lt;/strong&gt;&lt;br /&gt;
The following pieces are excerpts from the HTML-entity decoder code in question (mbfilter_htmlent.c), where the decoder is implemented as a callback function that is called against each characters of the input string sequentially with a structure (mbfl_convert_filter) containing the state of the decoder.&lt;br /&gt;
mbfl_convert_filter has a field named “output_function” that points to a function to which the decoded data is passed on a per-character basis. The function is supposed to return a negative value on error. It will most likely fail if the argument is an Unicode value that is not designated to any character.&lt;br /&gt;
In particular, since the signature of the output_function is int(*)(int, void *) though the buffer is an array of unsigned char, every character code that is greater than 127 gets passed to the function with its value negated and leads to unconditional failure.&lt;br /&gt;
&lt;strong&gt;Impact :&lt;/strong&gt;&lt;br /&gt;
Since mbstring functions make use of the facility in various places, almost all of those can be considered vulnerable. The functions listed below should be particularly noted according to their primary usage:&lt;br /&gt;
- mb_convert_encoding()&lt;br /&gt;
- mb_check_encoding()&lt;br /&gt;
- mb_convert_variables()&lt;br /&gt;
- mb_parse_str()&lt;br /&gt;
The following functions are supposed to be safe in their nature.&lt;br /&gt;
- mb_decode_numericentity() *&lt;br /&gt;
- mb_detect_encoding()&lt;br /&gt;
- mb_detect_order()&lt;br /&gt;
- mb_ereg()&lt;br /&gt;
- mb_ereg_match()&lt;br /&gt;
- mb_ereg_replace()&lt;br /&gt;
- mb_ereg_search()&lt;br /&gt;
- mb_ereg_search_pos()&lt;br /&gt;
- mb_ereg_search_regs()&lt;br /&gt;
- mb_ereg_search_init()&lt;br /&gt;
- mb_ereg_search_getregs()&lt;br /&gt;
- mb_ereg_search_getpos()&lt;br /&gt;
- mb_ereg_search_setpos()&lt;br /&gt;
- mb_ereg_set_options()&lt;br /&gt;
- mb_eregi()&lt;br /&gt;
- mb_eregi_replace()&lt;br /&gt;
- mb_get_info()&lt;br /&gt;
- mb_http_input()&lt;br /&gt;
- mb_http_output()&lt;br /&gt;
- mb_internal_encoding()&lt;br /&gt;
- mb_language()&lt;br /&gt;
- mb_list_encodings()&lt;br /&gt;
- mb_preferred_mime_name()&lt;br /&gt;
- mb_regex_encoding()&lt;br /&gt;
- mb_regex_set_options()&lt;br /&gt;
- mb_split()&lt;br /&gt;
- mb_substitute_character()&lt;br /&gt;
(*) Based on the different code while providing similar functionality.&lt;br /&gt;
Besides these scriptable functions, mbstring provides functionality that automatically filters the form values given through a request URI or POSTed content. Because browsers may send characters of the form data that cannot be represented in the encoding used in the HTML document as HTML entities, it should be no surprise that an user has a PHP installation configured as&lt;br /&gt;
follows:&lt;br /&gt;
mbstring.encoding_translation=on&lt;br /&gt;
mbstring.http_input=HTML-ENTITIES&lt;br /&gt;
mbstring.internal_encoding=UTF-8&lt;br /&gt;
The vulnerability would be remotely exploitable in such a case.&lt;br /&gt;
&lt;strong&gt;Solution :&lt;/strong&gt;&lt;br /&gt;
Upgrade to version 5.2.8. Note that the maintenance of 4.x series was discontinued.&lt;br /&gt;
&lt;strong&gt;Source : SecuriTeam&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.securiteam.com/unixfocus/6X00P0ANFM.html&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/2898936504734124181/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/2898936504734124181?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/2898936504734124181'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/2898936504734124181'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/php-mbstring-buffer-overflow.html' title='PHP mbstring Buffer Overflow Vulnerability'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4453475675657824930</id><published>2011-07-02T22:12:00.001-07:00</published><updated>2011-07-02T22:12:26.311-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Firewall"/><title type='text'>Firekeeper – IDS For Firefox</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;FireKeeper&quot; src=&quot;http://www.insecure.in/images/firekeeper.png&quot; /&gt;&lt;br /&gt;
Firekeeper is an Intrusion Detection and Prevention System for Firefox.&lt;br /&gt;
It is able to detect, block and warn the user about malicious sites. Firekeeper uses flexible rules similar to Snort ones to describe browser based attack attempts.&lt;br /&gt;
Rules can also be used to effectively filter different kinds of unwanted content.&lt;br /&gt;
&lt;strong&gt;Features :&lt;/strong&gt;&lt;br /&gt;
* Ability to scan HTTP(S) request URL, response headers and body, and to cancel processing of suspicious requests&lt;br /&gt;
* Encrypted and compressed responses are scanned after decryption/decompression&lt;br /&gt;
* Privacy friendly – no data is send to external servers, all scanning is done on the local computer&lt;br /&gt;
* Very fast pattern matching algorithm (taken directly from Snort).&lt;br /&gt;
* Interactive, verbose alerts that give an ability to choose a response to detected attack attempt.&lt;br /&gt;
* A detailed view of suspicious response headers and body&lt;br /&gt;
* Event logging&lt;br /&gt;
* Ability to use any number of files with rules and to automatically load files from remote locations&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://firekeeper.mozdev.org/&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4453475675657824930/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4453475675657824930?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4453475675657824930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4453475675657824930'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/firekeeper-ids-for-firefox.html' title='Firekeeper – IDS For Firefox'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-343028752382364204</id><published>2011-07-02T22:11:00.000-07:00</published><updated>2011-07-02T22:11:07.026-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Google Chrome Browser (ChromeHTML://) remote parameter injection POC</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=292&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Google Chrome Browser (ChromeHTML://) remote parameter injection POC&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;blockquote&gt;&amp;lt;!–&lt;br /&gt;
Google Chrome Browser (ChromeHTML://) remote parameter injection POC&lt;br /&gt;
by Nine:Situations:Group::bellick&amp;amp;strawdog&lt;br /&gt;
Site: http://retrogod.altervista.org/&lt;br /&gt;
tested against: Internet Explorer 8 beta 2, Google Chrome 1.0.154.36, Microsoft Windows XP SP3&lt;br /&gt;
List of command line switches:&lt;br /&gt;
http://src.chromium.org/svn/trunk/src/chrome/common/chrome_switches.cc&lt;br /&gt;
Original url: http://retrogod.altervista.org/9sg_chrome.html&lt;br /&gt;
click the following link with IE while monitoring with procmon&lt;br /&gt;
–&amp;gt;&lt;br /&gt;
&amp;lt;a href=’chromehtml:www.google.com”%20–renderer-path=”c:\windows\system32\calc.exe”%20–”‘&amp;gt;click me&amp;lt;/a&amp;gt;&lt;br /&gt;
# milw0rm.com [2008-12-23]&lt;/blockquote&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/343028752382364204/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/343028752382364204?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/343028752382364204'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/343028752382364204'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/google-chrome-browser-chromehtml-remote.html' title='Google Chrome Browser (ChromeHTML://) remote parameter injection POC'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-2077375506184327168</id><published>2011-07-02T22:10:00.001-07:00</published><updated>2011-07-02T22:10:17.109-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Scanner"/><title type='text'>Acunetix Web Vulnerability Scanner Enterprise v6.0</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=274&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Acunetix Web Vulnerability Scanner Enterprise v6.0&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;Acunetix 6&quot; height=&quot;276&quot; src=&quot;http://www.insecure.in/images/acunetix_6e.jpg&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: x-small;&quot;&gt;&lt;code&gt;http://rapidshare.com/files/168152531/edgeawvsee6.rar&lt;/code&gt;&lt;br /&gt;
&lt;code&gt;http://www.megaupload.com/?d=36CS8FRO&lt;/code&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;Password :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;theseekersoasis.org&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/2077375506184327168/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/2077375506184327168?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/2077375506184327168'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/2077375506184327168'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/acunetix-web-vulnerability-scanner.html' title='Acunetix Web Vulnerability Scanner Enterprise v6.0'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-8052161303319777416</id><published>2011-07-02T22:09:00.001-07:00</published><updated>2011-07-02T22:09:29.875-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Hacking Tools"/><title type='text'>Nuclear RAT 2.1.0</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h2&gt;&lt;a href=&quot;http://blog.insecure.in/?p=176&quot; rel=&quot;bookmark&quot; title=&quot;Permanent Link to Nuclear RAT 2.1.0&quot;&gt;&lt;/a&gt;&amp;nbsp;&lt;/h2&gt;&lt;div class=&quot;entry&quot;&gt;&lt;img alt=&quot;Nuclear Rat&quot; height=&quot;284&quot; src=&quot;http://www.insecure.in/images/nuclear-rat.jpg&quot; width=&quot;400&quot; /&gt;&lt;br /&gt;
* Programmed by: Caesar2k&lt;br /&gt;
* Date added / updated: September 4th 2007&lt;br /&gt;
* Downloads: 80685&lt;br /&gt;
* File size: 1.26MB&lt;br /&gt;
* Coded in: Delphi&lt;br /&gt;
* Section: Remote Administration Tools &amp;amp; Spy&lt;br /&gt;
* Compatibility: Windows NT, 2K, XP, Vista&lt;br /&gt;
&lt;strong&gt;Download :&lt;/strong&gt;&lt;br /&gt;
&lt;code&gt;&lt;span style=&quot;font-size: x-small;&quot;&gt;http://www.nuclearwintercrew.com/Products-View/21/Nuclear_RAT_2.1.0/&lt;/span&gt;&lt;/code&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/8052161303319777416/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/8052161303319777416?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8052161303319777416'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8052161303319777416'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/nuclear-rat-210.html' title='Nuclear RAT 2.1.0'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4602242091154946199</id><published>2011-07-01T23:36:00.000-07:00</published><updated>2011-07-01T23:36:13.951-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Trick"/><title type='text'>Skype 2.0 for Android with video calling</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;!-- Featured Content Slider Started --&gt;&lt;!-- Featured Content Slider End --&gt;&lt;br /&gt;
&lt;div class=&quot;main section&quot; id=&quot;main&quot;&gt;&lt;div class=&quot;widget HTML&quot; id=&quot;HTML4&quot;&gt;&lt;div class=&quot;clear&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;widget Blog&quot; id=&quot;Blog1&quot;&gt;&lt;div class=&quot;blog-posts hfeed&quot;&gt;&lt;div class=&quot;wrapfullpost&quot;&gt;&lt;div class=&quot;post hentry&quot;&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6kcO59fGO9bpgOw0V334fVx-BUxyupQT3AXTRBha4Ley3AOEmyaHXZTdi55KDP6cKZf_OoqQLM1I4GP3stoD3yX146i9aiNLMfuItPNKh2wj9lcowWsdu1VPbJ6SbP3A1Izbj7LPBzB0/s1600/skype.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6kcO59fGO9bpgOw0V334fVx-BUxyupQT3AXTRBha4Ley3AOEmyaHXZTdi55KDP6cKZf_OoqQLM1I4GP3stoD3yX146i9aiNLMfuItPNKh2wj9lcowWsdu1VPbJ6SbP3A1Izbj7LPBzB0/s1600/skype.jpeg&quot; /&gt;&lt;/a&gt;Skype has recently released its new version for Android Phones. The name of this Android Skype app is &lt;b&gt;Skype 2.0&lt;/b&gt;. This app has features like video calling and SMS. You can make video calling and connect with your friends via your android phone. Google Nexus S, HTC Desire S, Sony Ericsson Xperia neo, and Sony Ericsson Xperia pro support video calling.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;One can download Skype 2.0 android app form android market. www.market.android.com&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4602242091154946199/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4602242091154946199?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4602242091154946199'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4602242091154946199'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/skype-20-for-android-with-video-calling.html' title='Skype 2.0 for Android with video calling'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6kcO59fGO9bpgOw0V334fVx-BUxyupQT3AXTRBha4Ley3AOEmyaHXZTdi55KDP6cKZf_OoqQLM1I4GP3stoD3yX146i9aiNLMfuItPNKh2wj9lcowWsdu1VPbJ6SbP3A1Izbj7LPBzB0/s72-c/skype.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-6566051785435542410</id><published>2011-07-01T23:30:00.000-07:00</published><updated>2011-07-01T23:30:19.382-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Review"/><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Google is going to launch GOOGLE PLUS a social networking website</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;widget Blog&quot; id=&quot;Blog1&quot;&gt;&lt;div class=&quot;blog-posts hfeed&quot;&gt;&lt;div class=&quot;wrapfullpost&quot;&gt;&lt;div class=&quot;post hentry&quot;&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix_1wRT9BDBLQoXP0HWA0Id_S7yS9SeS2kRwYqQgKdgv0Qs6dWKGc34hM6RLFXp3QO7t2NtpPBTL_iPkhFPHTY2JwWpf-4-MZ_LyjGGmOFXwMH2jjUKeTaXeGkuPlXG2RgP4NhFi9qBjo/s1600/google+plus.jpg&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;144&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix_1wRT9BDBLQoXP0HWA0Id_S7yS9SeS2kRwYqQgKdgv0Qs6dWKGc34hM6RLFXp3QO7t2NtpPBTL_iPkhFPHTY2JwWpf-4-MZ_LyjGGmOFXwMH2jjUKeTaXeGkuPlXG2RgP4NhFi9qBjo/s200/google+plus.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;The god of Internet Google is now going to launch its new social networking site named &lt;b style=&quot;color: blue;&quot;&gt;Google Plus&lt;/b&gt;. It is simple to use and will be loaded with content sharing and privacy. Google will try to dominate the social network world with that site. &lt;br /&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix_1wRT9BDBLQoXP0HWA0Id_S7yS9SeS2kRwYqQgKdgv0Qs6dWKGc34hM6RLFXp3QO7t2NtpPBTL_iPkhFPHTY2JwWpf-4-MZ_LyjGGmOFXwMH2jjUKeTaXeGkuPlXG2RgP4NhFi9qBjo/s1600/google+plus.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red; font-size: medium;&quot;&gt;&lt;u&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Profile information like about me, gender, occupation, relationship etc.&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;News feed named STREAM (for information about friend&#39;s update)&amp;nbsp; &lt;/li&gt;
&lt;/ul&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAxFiX1IVcEtpViRclAxxAQTwaILXMAuQhnXdUjciDqLHLSy6hZ0E_IuNvcIiTaC87PivS__uLyPR20m1Av9aDnngrWaItUe_dXxHUqyUJQHccw13Xs3PQBFPXVOjUe4u36U8BUxJ9rI8/s1600/b1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;296&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAxFiX1IVcEtpViRclAxxAQTwaILXMAuQhnXdUjciDqLHLSy6hZ0E_IuNvcIiTaC87PivS__uLyPR20m1Av9aDnngrWaItUe_dXxHUqyUJQHccw13Xs3PQBFPXVOjUe4u36U8BUxJ9rI8/s320/b1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Video chat option name HANGOUTS&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Direct photo sharing on Picasa&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Content sharing&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Control over sharing with better Privacy&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Search engine named SPARKS to find your interests&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Photo tagging &amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;Google also going to introduce two mobile apps for that site &lt;/li&gt;
&lt;/ul&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;&amp;nbsp;For liking something you can &quot;+1&quot; it&amp;nbsp; (as Facebook Like button)&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Google Plus has many more functions and just wait and watch&lt;br /&gt;
You can see the demo at &lt;b&gt;www.google.com/+/demo&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/6566051785435542410/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/6566051785435542410?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/6566051785435542410'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/6566051785435542410'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/google-is-going-to-launch-google-plus.html' title='Google is going to launch GOOGLE PLUS a social networking website'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEix_1wRT9BDBLQoXP0HWA0Id_S7yS9SeS2kRwYqQgKdgv0Qs6dWKGc34hM6RLFXp3QO7t2NtpPBTL_iPkhFPHTY2JwWpf-4-MZ_LyjGGmOFXwMH2jjUKeTaXeGkuPlXG2RgP4NhFi9qBjo/s72-c/google+plus.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-7275805867617331996</id><published>2011-07-01T23:27:00.001-07:00</published><updated>2011-07-01T23:27:29.488-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>How to use pendrive as ram?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Some time it’s very disappointing that you are using an outdated computer system which has very low ram and that’s why we can’t use application and games that want high ram. So what to do. There is a solution you can use your pen drive as ram. But how?&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaUfFlCj5nsT8aC4lFFQ8F5sHuzRJgDx1_PEGFY0q2uiRQUth3kFcZ1DeovyvxZ_XqbDEKE2u-xHIaXSo4M3MYNwQUn9EVFu7g2Pv5J0JAA3qYkPGtqUDkxXnSZp4_Kp4iFwV1Pkj1pxg/s1600/ram+pendrive.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;122&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaUfFlCj5nsT8aC4lFFQ8F5sHuzRJgDx1_PEGFY0q2uiRQUth3kFcZ1DeovyvxZ_XqbDEKE2u-xHIaXSo4M3MYNwQUn9EVFu7g2Pv5J0JAA3qYkPGtqUDkxXnSZp4_Kp4iFwV1Pkj1pxg/s320/ram+pendrive.JPG&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;Window vista gives you the option to use pen drive as ram but this option is not available in window xp and window 7. So what to do? a software can help you to use your pen drive as ram in xp and it is eboostr. This software will help you to use your pen drive as ram and enhance the speed your system.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;To download this software go to &lt;b&gt;&lt;a href=&quot;http://www.eboostr.com/&quot;&gt;http://www.eboostr.com/&lt;/a&gt; &lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class=&quot;postmeta&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/7275805867617331996/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/7275805867617331996?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/7275805867617331996'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/7275805867617331996'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/how-to-use-pendrive-as-ram.html' title='How to use pendrive as ram?'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaUfFlCj5nsT8aC4lFFQ8F5sHuzRJgDx1_PEGFY0q2uiRQUth3kFcZ1DeovyvxZ_XqbDEKE2u-xHIaXSo4M3MYNwQUn9EVFu7g2Pv5J0JAA3qYkPGtqUDkxXnSZp4_Kp4iFwV1Pkj1pxg/s72-c/ram+pendrive.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-7701451679868086360</id><published>2011-07-01T23:24:00.001-07:00</published><updated>2011-07-01T23:24:55.977-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>How to send voice message on Facebook?</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div&gt;Suppose you could send voice messages on Facebook Here we are introducing a Facebook app which will help you to send voice messages on Facebook. This amazing application helps you to update you status with your voice and send post on your friends’ wall.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://2.bp.blogspot.com/-LW28HJByZTE/TgXvC7JIKlI/AAAAAAAAAHk/B-uKQ2ypHXQ/s1600/voice.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://2.bp.blogspot.com/-LW28HJByZTE/TgXvC7JIKlI/AAAAAAAAAHk/B-uKQ2ypHXQ/s1600/voice.JPG&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;This fabulous app is &lt;b style=&quot;color: red;&quot;&gt;MyMic&lt;/b&gt;. This app is available on Facebook and allows you to record a voice message with 20 second of duration for free. You can record one minute long message by paying for it.&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;Just visit to that application from your Facebook profile and like that app. To record your message you just need a microphone. Once your message is recorded the application will ask you to send it on your friends wall or on your own wall. After that you can see your voice message on yours r on your friend’s wall as you will select. Your friend can easily listen to your message if they are not using this app. &lt;/div&gt;&lt;div style=&quot;text-align: justify;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;text-align: justify;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/7701451679868086360/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/7701451679868086360?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/7701451679868086360'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/7701451679868086360'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/how-to-send-voice-message-on-facebook.html' title='How to send voice message on Facebook?'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://2.bp.blogspot.com/-LW28HJByZTE/TgXvC7JIKlI/AAAAAAAAAHk/B-uKQ2ypHXQ/s72-c/voice.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-4758751404360830854</id><published>2011-07-01T23:23:00.001-07:00</published><updated>2011-07-01T23:23:24.468-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Mobile Trick"/><title type='text'>Mozilla Firefox for Android phones download</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Mozilla Firefox is one of the famous web browsers. Now it is available for android phones for free with amazing features.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX9WujvNCXEgE2f3E3m_NV2dmStZzOSmqh6iVPlBTzzV2eb781PI-3WQEiAhhVXHQJfldUBLsv4Ah76tMCAwNzXr3V6MVuC4vzWMYuBdLdcPWS80fWeL5ADYy5PMWfmhSDT6QORZqgnmg/s1600/mozila.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX9WujvNCXEgE2f3E3m_NV2dmStZzOSmqh6iVPlBTzzV2eb781PI-3WQEiAhhVXHQJfldUBLsv4Ah76tMCAwNzXr3V6MVuC4vzWMYuBdLdcPWS80fWeL5ADYy5PMWfmhSDT6QORZqgnmg/s320/mozila.JPG&quot; width=&quot;185&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;color: red;&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/div&gt;&lt;ul style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Easy personalization&lt;/li&gt;
&lt;li&gt;Friendly to the touch&lt;/li&gt;
&lt;li&gt;Advance security&lt;/li&gt;
&lt;li&gt;Mobile add-ons&lt;/li&gt;
&lt;li&gt;Easy customization&lt;/li&gt;
&lt;/ul&gt;&lt;b style=&quot;color: red;&quot;&gt;Reqirement: &lt;/b&gt;Android 2.0 or above&lt;br /&gt;
&lt;br /&gt;
To download it on your android phone go to www.firefox.com/m from your Android phone or go to android market.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/4758751404360830854/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/4758751404360830854?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4758751404360830854'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/4758751404360830854'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/mozilla-firefox-for-android-phones.html' title='Mozilla Firefox for Android phones download'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhX9WujvNCXEgE2f3E3m_NV2dmStZzOSmqh6iVPlBTzzV2eb781PI-3WQEiAhhVXHQJfldUBLsv4Ah76tMCAwNzXr3V6MVuC4vzWMYuBdLdcPWS80fWeL5ADYy5PMWfmhSDT6QORZqgnmg/s72-c/mozila.JPG" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-8327610547089206087</id><published>2011-07-01T23:22:00.000-07:00</published><updated>2011-07-01T23:22:08.960-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Free Google Chrome themes download</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;widget HTML&quot; id=&quot;HTML4&quot;&gt;&lt;div class=&quot;widget-content&quot;&gt;Now customize your Google Chrome web browser with trendy themes. These Themes will make your chrome stylish. To use themes follow these steps.&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;widget Blog&quot; id=&quot;Blog1&quot;&gt;&lt;div class=&quot;blog-posts hfeed&quot;&gt;&lt;div class=&quot;wrapfullpost&quot;&gt;&lt;div class=&quot;post hentry&quot;&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipNoLPmCJv3EmIR0NGDmHUpz78WoeliMnOWefqeMZsLUwqJTb8gmNK7n_CCELB5Q3mU3CE9m-ajXbGofLAeFkSrsGW9pWBrZHrRPzp6QlAdtV1YXiSPsm4dt5xydsQhEJBAgkY7hXJ9no/s1600/Theme.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipNoLPmCJv3EmIR0NGDmHUpz78WoeliMnOWefqeMZsLUwqJTb8gmNK7n_CCELB5Q3mU3CE9m-ajXbGofLAeFkSrsGW9pWBrZHrRPzp6QlAdtV1YXiSPsm4dt5xydsQhEJBAgkY7hXJ9no/s1600/Theme.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;ol style=&quot;text-align: left;&quot;&gt;&lt;li&gt;Go to https://tools.google.com/chrome/intl/en/themes/index.html&lt;/li&gt;
&lt;li&gt;Now select your desirous theme and click on apply&lt;/li&gt;
&lt;li&gt;After that enjoy the new look of your chrome browser&lt;/li&gt;
&lt;/ol&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/8327610547089206087/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/8327610547089206087?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8327610547089206087'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8327610547089206087'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/free-google-chrome-themes-download.html' title='Free Google Chrome themes download'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipNoLPmCJv3EmIR0NGDmHUpz78WoeliMnOWefqeMZsLUwqJTb8gmNK7n_CCELB5Q3mU3CE9m-ajXbGofLAeFkSrsGW9pWBrZHrRPzp6QlAdtV1YXiSPsm4dt5xydsQhEJBAgkY7hXJ9no/s72-c/Theme.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-589824595147442727</id><published>2011-07-01T23:19:00.000-07:00</published><updated>2011-07-01T23:19:00.104-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>VLC keyboard shortcut List</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;VLC is the most poplar media player which supports many file formats. Now we are giving you some keyboard shortcuts to use VLC easily. &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw5vyvBdDKw5YiAGlgcyTQ7uZaHkO-Nx5_-381OwRF8nz7iRNKeT2p4P_9puvpdczUW34q4XvtonWWHDfW0AQ_NWwHxg5kL-UxHErhMa1jt2m_Nd07uF72Jsahdx5z0uCFkv_NnueFOHk/s1600/vlc.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw5vyvBdDKw5YiAGlgcyTQ7uZaHkO-Nx5_-381OwRF8nz7iRNKeT2p4P_9puvpdczUW34q4XvtonWWHDfW0AQ_NWwHxg5kL-UxHErhMa1jt2m_Nd07uF72Jsahdx5z0uCFkv_NnueFOHk/s1600/vlc.jpeg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;List of Shortcut keys&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;nbsp; &lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Space&lt;/b&gt; Play/Pause&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;s&lt;/b&gt; Stop&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;+&lt;/b&gt; Play faster&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;-&lt;/b&gt; Play Slower&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;t&lt;/b&gt; Position&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;n&lt;/b&gt; Next Item&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;p&lt;/b&gt; Previous Item&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;f&lt;/b&gt; Fullscreen&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;m&lt;/b&gt; Mute&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Shift+Rt Arrow&lt;/b&gt; Forward 3 seconds&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Shift+Lt Arrow&lt;/b&gt; Backward 3 seconds&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Alt+Rt Arrow&lt;/b&gt; Forward 10 seconds&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Alt+Lt Arrow&lt;/b&gt; Backward 10 seconds&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+q&lt;/b&gt; Quit&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+Up Arrow&lt;/b&gt; Volume up&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+Dn Arrow&lt;/b&gt; Volume down&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+Rt Arrow&lt;/b&gt; Forward 1 minute&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+Lt Arrow&lt;/b&gt; Backward 1 minute&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+r&lt;/b&gt; Record&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Alt+Ctrl+S&lt;/b&gt; Video Snapshot&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+m&lt;/b&gt; DVD Menu&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+p&lt;/b&gt; Select Previous DVD Title&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+n&lt;/b&gt; Select Next DVD Title&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+B&lt;/b&gt; Bookmarks&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+P&lt;/b&gt; Playlist&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+I&lt;/b&gt; Stream, Media Info&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+S&lt;/b&gt; Preferences&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Ctrl+G&lt;/b&gt; Extended GUI&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/589824595147442727/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/589824595147442727?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/589824595147442727'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/589824595147442727'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/vlc-keyboard-shortcut-list.html' title='VLC keyboard shortcut List'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw5vyvBdDKw5YiAGlgcyTQ7uZaHkO-Nx5_-381OwRF8nz7iRNKeT2p4P_9puvpdczUW34q4XvtonWWHDfW0AQ_NWwHxg5kL-UxHErhMa1jt2m_Nd07uF72Jsahdx5z0uCFkv_NnueFOHk/s72-c/vlc.jpeg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-8257970893892820250</id><published>2011-07-01T23:17:00.000-07:00</published><updated>2011-07-01T23:17:08.403-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Tips"/><title type='text'>Increase traffic and page rank of your blog</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;Creation of a blog or a website is not every thing, its promotion is every thing. Because without promotion you will not get visitors for your blog or website and without the readers (visitors) there is no use of a blog. You can use search engine optimization (SEO) technique to increase you blog’s page rank. If you have a high page rank it means your blog is visible in search engines on high position. To this you should follow these steps&lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHPEE6BjsedU0x_bR3PC613Y0uClYetOgQYQOAqzG2PP8bUtBX5MrCj48nSYGS6_FU9b3NkXoULNNgU_I9fm2Sb6M9QQzPe1GY3_gLD1rimZYjazMOtTLNQjcuHULC5DibZQaWJl89MZ8/s1600/google-page-rank-important-or-just-another-numbe.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHPEE6BjsedU0x_bR3PC613Y0uClYetOgQYQOAqzG2PP8bUtBX5MrCj48nSYGS6_FU9b3NkXoULNNgU_I9fm2Sb6M9QQzPe1GY3_gLD1rimZYjazMOtTLNQjcuHULC5DibZQaWJl89MZ8/s1600/google-page-rank-important-or-just-another-numbe.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;ol style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Submit you blog to search engine directories. Search engine directories send your blog address to popular search engine. They are useful way to get more visitors for your blog. &lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 0.25in;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;2&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Use original contents on your blog because search engines like originality. If your blog will be original it will reach on high position rapidly. &amp;nbsp;&lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;3&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Publish your articles daily. &lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;4&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Use Meta tag keywords on your blog so that your blog’s visibility in search engines will be increased.&lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;5&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Join forums to promote your articles and get traffic form there.&lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;6&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;If you are visiting to other sites just comments on there articles and leave your blog name on it.&lt;/li&gt;
&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ol start=&quot;7&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;li class=&quot;MsoNormal&quot;&gt;Add you blog in you email signature.&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 8.&amp;nbsp; Join social media websites like facebook, twitter and promote your blog to generate traffic.&lt;br /&gt;
&lt;br /&gt;
&lt;ol start=&quot;7&quot; style=&quot;margin-top: 0in;&quot; type=&quot;1&quot;&gt;&lt;/ol&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; 9.&amp;nbsp; Use social bookmarking sites like digg, stumbleupon etc. these site will help you to increase traffic.&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;These are some step I hope this will help you to increase traffic and page rank of your blog.&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/8257970893892820250/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/8257970893892820250?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8257970893892820250'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8257970893892820250'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/increase-traffic-and-page-rank-of-your.html' title='Increase traffic and page rank of your blog'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHPEE6BjsedU0x_bR3PC613Y0uClYetOgQYQOAqzG2PP8bUtBX5MrCj48nSYGS6_FU9b3NkXoULNNgU_I9fm2Sb6M9QQzPe1GY3_gLD1rimZYjazMOtTLNQjcuHULC5DibZQaWJl89MZ8/s72-c/google-page-rank-important-or-just-another-numbe.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-8551089845782011144</id><published>2011-07-01T23:16:00.000-07:00</published><updated>2011-07-01T23:16:01.554-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Review"/><title type='text'>LG Optimus 3D glasses Specifications</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;widget HTML&quot; id=&quot;HTML4&quot;&gt;&lt;div class=&quot;widget-content&quot;&gt;&lt;script type=&quot;text/javascript&quot;&gt;
&lt;!--
google_ad_client = &quot;pub-2408611597526018&quot;;
google_ad_host = &quot;pub-1556223355139109&quot;;
/* Ctrick racbig */
google_ad_slot = &quot;1674405694&quot;;
google_ad_width = 336;
google_ad_height = 280;
//--&gt;
&lt;/script&gt;&lt;script src=&quot;http://pagead2.googlesyndication.com/pagead/show_ads.js&quot; type=&quot;text/javascript&quot;&gt;
&lt;/script&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class=&quot;widget Blog&quot; id=&quot;Blog1&quot;&gt;&lt;div class=&quot;blog-posts hfeed&quot;&gt;&lt;div class=&quot;wrapfullpost&quot;&gt;&lt;div class=&quot;post hentry&quot;&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;LG has recently launched its new 3D phone LG Optimus 3D powered by dual-core processor. It’s a latest smart phone of Optimus series with high resolution and new 3D technology. &lt;br /&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVJ4elEQQpqueEhoQHXy3SZxShfx4OiyO4DeDE86rbSFOXfrXeXrQ3QySVp58AEj3-0Cm6INZtJR19vrzp6jciZ-z8Nvbs9v5b8BXp1axeb8YbmXflULyi78KirZ85v7mhtEpl4LDLbcA/s1600/lg-optimus-3d.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVJ4elEQQpqueEhoQHXy3SZxShfx4OiyO4DeDE86rbSFOXfrXeXrQ3QySVp58AEj3-0Cm6INZtJR19vrzp6jciZ-z8Nvbs9v5b8BXp1axeb8YbmXflULyi78KirZ85v7mhtEpl4LDLbcA/s320/lg-optimus-3d.png&quot; width=&quot;211&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;color: blue;&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style=&quot;margin-top: 0in;&quot; type=&quot;disc&quot;&gt;&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Android 2.3 Gingerbread&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Dual-core 1GHz ARM Cortex A9 processor&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Supported by a PowerVR SGX540 GPU&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;4.3 inch capacitive touch screen with 480x800 pixels of resolution&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;5 mp camera with LED flash, autofocus and digital zoom&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;HD video recording&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;3D video recording with resolution 1280*720&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Connectivity – Bluetooth v3.0, Micro USB v2.0, Wi-Fi 802.11 b/g/n, GPS&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;3G, GPRS, EDGE, HTML Internet Browsing&lt;/li&gt;
&lt;li class=&quot;MsoNormal&quot; style=&quot;mso-list: l0 level1 lfo1; tab-stops: list .5in;&quot;&gt;Expandable Memory upto 32 GB Micro/SD card slot&lt;/li&gt;
&lt;/ul&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/8551089845782011144/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/8551089845782011144?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8551089845782011144'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/8551089845782011144'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/lg-optimus-3d-glasses-specifications.html' title='LG Optimus 3D glasses Specifications'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVJ4elEQQpqueEhoQHXy3SZxShfx4OiyO4DeDE86rbSFOXfrXeXrQ3QySVp58AEj3-0Cm6INZtJR19vrzp6jciZ-z8Nvbs9v5b8BXp1axeb8YbmXflULyi78KirZ85v7mhtEpl4LDLbcA/s72-c/lg-optimus-3d.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-3056259525059092513.post-1591464144243131513</id><published>2011-07-01T23:14:00.000-07:00</published><updated>2011-07-01T23:14:45.598-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Software"/><title type='text'>Mozilla Firefox 5 beta released</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;h3 class=&quot;post-title entry-title&quot;&gt;&amp;nbsp;&lt;/h3&gt;&lt;div class=&quot;post-header-line-1&quot;&gt;&lt;/div&gt;&lt;div class=&quot;postdate&quot; style=&quot;margin-bottom: -15px; position: relative; width: 100%;&quot;&gt;&lt;/div&gt;&lt;div class=&quot;post-body entry-content&quot;&gt;&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;MsoNormal&quot;&gt;Good news for Firefox’s fans the new version beta 5 has been launched. To update your Firefox with new Firefox 5 just go to &lt;b&gt;Help&amp;gt; About Firefox &lt;/b&gt;and click on update&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1n_godNHpFRUdvqydd_u_6TLLsLrKBk9QXVIrBgO6doIXWBfCpa4AaE2mN7wcTw8SXJenSNGKZvKY7Fmq8VfNv4lFOC_knYrY6K85ES0sXOZyZQZ2eM0WT1mVMpQqHNoU9p4hdD5Q1Q/s1600/firefox-5-final-400x255.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;204&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1n_godNHpFRUdvqydd_u_6TLLsLrKBk9QXVIrBgO6doIXWBfCpa4AaE2mN7wcTw8SXJenSNGKZvKY7Fmq8VfNv4lFOC_knYrY6K85ES0sXOZyZQZ2eM0WT1mVMpQqHNoU9p4hdD5Q1Q/s320/firefox-5-final-400x255.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;b&gt;Features:&lt;/b&gt;&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot;&gt;&lt;strong&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/strong&gt;&amp;nbsp;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;SU&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;pport for CSS animations&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;Improved canvas, JavaScript, memory, and networking performance&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;Improved standards support for HTML5, XHR, MathML, SMIL, and canvas&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;Improved spell checking for some locales&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;Improved desktop environment integration for Linux users&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;WebGL content can no longer load cross-domain textures&lt;/div&gt;&lt;div class=&quot;MsoNormal&quot; style=&quot;margin-left: 48pt; mso-list: l0 level1 lfo1; tab-stops: list 48.0pt; text-indent: -0.25in;&quot;&gt;&lt;span style=&quot;font-family: Symbol;&quot;&gt;·&lt;span style=&quot;font: 7pt &amp;quot;Times New Roman&amp;quot;;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;Background tabs have setTimeout and setInterval clamped to 1000ms to improve performance&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://engineering-s-best.blogspot.com/feeds/1591464144243131513/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/3056259525059092513/1591464144243131513?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/1591464144243131513'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/3056259525059092513/posts/default/1591464144243131513'/><link rel='alternate' type='text/html' href='http://engineering-s-best.blogspot.com/2011/07/mozilla-firefox-5-beta-released.html' title='Mozilla Firefox 5 beta released'/><author><name>Karanpal Singh</name><uri>http://www.blogger.com/profile/09271036909286212773</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgp1n_godNHpFRUdvqydd_u_6TLLsLrKBk9QXVIrBgO6doIXWBfCpa4AaE2mN7wcTw8SXJenSNGKZvKY7Fmq8VfNv4lFOC_knYrY6K85ES0sXOZyZQZ2eM0WT1mVMpQqHNoU9p4hdD5Q1Q/s72-c/firefox-5-final-400x255.jpg" height="72" width="72"/><thr:total>0</thr:total></entry></feed>