<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-757635412723877142</atom:id><lastBuildDate>Wed, 09 Apr 2025 13:26:14 +0000</lastBuildDate><category>Fake Login Page</category><category>GRE</category><category>100 Oldest Domains</category><category>AXIOM Gaming Competition</category><category>CCNA</category><category>CCNP</category><category>Counter Strike</category><category>Download FREE</category><category>Hacking</category><category>MCSE</category><category>NFS Most Wanted</category><category>NOVELL</category><category>.Net Helpful links</category><category>10 Sites for Music</category><category>25 Website Mistakes</category><category>32- Bit]</category><category>802.11n</category><category>Avril Lums Pakistan</category><category>BLACK HAT</category><category>Best Gaming URLs</category><category>BitTorrent</category><category>BitTorrent Clients</category><category>Browser</category><category>CCDA Certifications information</category><category>CCDP</category><category>CCIE</category><category>CCIP</category><category>CCSP</category><category>CDS</category><category>Certfication Exams</category><category>Cisco Certification Capsule - CCNA</category><category>Data</category><category>Data Recovery NTFS n FAT32</category><category>Domains</category><category>Download Autodesk Maya v8.5 [64-bit</category><category>Download Key Loggers</category><category>Download PDF2Word v3.0</category><category>Download WinRAR v3.70 Final n Vista Theme</category><category>Download Youtube Videos</category><category>E-mail</category><category>Encylopedia</category><category>Fake Hacking</category><category>Firefox</category><category>Free Downloads</category><category>Free Music Downloads</category><category>Free Tests for SCJP</category><category>FreeLancer Resources</category><category>Freelancers Toolbox</category><category>Friendster Fake Login Page</category><category>Fun</category><category>Gmail</category><category>GooGle</category><category>Hack Window Login Screen</category><category>Hackers</category><category>Hacking Videos</category><category>Hacking Web</category><category>Hi5 Fake Login Page</category><category>Hotmail Fake Login Page</category><category>How to Download Youtube Videos</category><category>Html 4 to Xhtml and CSS</category><category>Humor</category><category>IE</category><category>Imagine Cup 2007</category><category>Info</category><category>Informative wonders</category><category>Job Application Tips</category><category>Key Loggers</category><category>Knowledge</category><category>Limewire Hackers</category><category>MCSD</category><category>McAfee Internet Security Suite 2007</category><category>Mcafee Total Protection 2007</category><category>Music Download</category><category>Myspaces Fake Login Page</category><category>NDA</category><category>Nokia Aeon(concept)</category><category>Norton AntiVirus</category><category>Norton Internet Security 2007</category><category>Online BackUp Storage</category><category>Orkut Fake Login Page</category><category>Orkut Mass Scraper</category><category>Orkut Scrapper</category><category>Orkut Tools</category><category>PSP Downloads</category><category>PTCL DSL Discount Offer for Ravians</category><category>Petition Against Rushdi</category><category>Protect Children</category><category>RapidShare</category><category>Rapidshare Downloader</category><category>Rapidshare Grabber</category><category>Rediff Fake Login Page</category><category>SAT</category><category>SEO</category><category>SQL SERVER</category><category>Search</category><category>Secure</category><category>South Korea</category><category>TOEFL</category><category>TOFEL</category><category>Tips for Good Site Developement</category><category>Top 100 Websites</category><category>Trackers and Downloads</category><category>Virus SVICHOST.exe or SVICHOSSST.exe</category><category>Web apps over Wi-Fi puts data at risk</category><category>Windows Hacking</category><category>Wireless Internet Attackers</category><category>Yahoo</category><category>Yahoo Fake Login Page</category><category>Youtube</category><category>Youtube Video Dowload</category><category>Youtube Videos</category><category>blogging</category><category>clounds</category><category>content writing</category><category>tags</category><category>wireless LAN</category><category>writer</category><title>ravinS cybeR culturE</title><description>Freeware Software Downloads, Freelancer's resources, Resoucres for Developers, Free Web Templates[Joomla,PHP-Fuzon,PHP-Nuke], E-Books, Encryption Scripts, PHP Scripts ,Gadget Reviews, IT News, Job Updates, Online Test for GRE, TOEFL. Prepere for CCNA, MCP etc</description><link>http://cyber-generation.blogspot.com/</link><managingEditor>noreply@blogger.com (SiNNeR*)</managingEditor><generator>Blogger</generator><openSearch:totalResults>73</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><copyright>All Rights Reserved to CyberGeneration.</copyright><itunes:keywords>Music,Downloads,Freeware,Software,Downloads,Freelancer,s,resources,Resoucres,for,Developers,Free,Web,Templates[Joomla,PHP,Fuzon,PHP,Nuke],E,Books,Encryption,Scripts,PHP,Scripts,Gadget,Reviews,IT,News,Job,Updates,Online,Test,for,GRE,TOEFL,Prep</itunes:keywords><itunes:summary>Enrich Treasure of Tech Stuff, Music, Downloads, Software, How To Do Stuff, Hacking, Cracks, Reviews, Gadgets and much much more.....</itunes:summary><itunes:subtitle>Cyber Heaven for Geeks</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:category text="Technology"><itunes:category text="Gadgets"/></itunes:category><itunes:category text="Technology"><itunes:category text="Software How-To"/></itunes:category><itunes:category text="Technology"><itunes:category text="Tech News"/></itunes:category><itunes:category text="Arts"><itunes:category text="Design"/></itunes:category><itunes:author>SiNNeR*</itunes:author><itunes:owner><itunes:email>noreply@blogger.com</itunes:email><itunes:name>SiNNeR*</itunes:name></itunes:owner><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-7244041549719024902</guid><pubDate>Fri, 04 Sep 2009 14:42:00 +0000</pubDate><atom:updated>2009-09-04T20:42:06.043+06:00</atom:updated><title>Mac OS X Snow Leopard | Spy Blogger</title><description>&lt;a href="http://spyblogger.com/2009/09/mac-snow-leopard/"&gt;Mac OS X Snow Leopard | Spy Blogger&lt;/a&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/09/mac-os-x-snow-leopard-spy-blogger.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-1908675667039864824</guid><pubDate>Wed, 08 Jul 2009 08:03:00 +0000</pubDate><atom:updated>2009-07-08T14:03:40.730+06:00</atom:updated><title>GOOGLE SURPRISE: Google Chrome OS | Spy Blogger</title><description>&lt;a href="http://spyblogger.com/2009/07/google-chromse-os/"&gt;GOOGLE SURPRISE: Google Chrome OS | Spy Blogger&lt;/a&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/07/google-surprise-google-chrome-os-spy.html</link><thr:total>1</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-2950522125331068725</guid><pubDate>Wed, 01 Jul 2009 18:18:00 +0000</pubDate><atom:updated>2009-07-02T00:18:47.490+06:00</atom:updated><title>Twitter updates Following and Followers Pages | Spy Blogger</title><description>&lt;a href="http://spyblogger.com/2009/07/twitter-followers-pages/"&gt;Twitter updates Following and Followers Pages | Spy Blogger&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/07/twitter-updates-following-and-followers.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-3179575481258793926</guid><pubDate>Sat, 27 Jun 2009 17:22:00 +0000</pubDate><atom:updated>2009-06-27T23:22:10.371+06:00</atom:updated><title>Download Michael Jackson Tribute Song | Spy Blogger</title><description>&lt;a href="http://spyblogger.com/2009/06/michael-jackson-tribute-song/"&gt;Download Michael Jackson Tribute Song | Spy Blogger&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Shared via &lt;a href="http://addthis.com"&gt;AddThis&lt;/a&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/06/download-michael-jackson-tribute-song.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-2044923744940212041</guid><pubDate>Sat, 27 Jun 2009 17:20:00 +0000</pubDate><atom:updated>2009-06-27T23:20:45.377+06:00</atom:updated><title>Use Case Analysis: How detailed should it be? | Spy Blogger</title><description>&lt;a href="http://spyblogger.com/2009/06/use-case-analysis-how-detailed-should-it-be/"&gt;Use Case Analysis: How detailed should it be? | Spy Blogger&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Shared via &lt;a href="http://addthis.com"&gt;AddThis&lt;/a&gt;&lt;br /&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/06/use-case-analysis-how-detailed-should.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-5529975544117692213</guid><pubDate>Mon, 09 Mar 2009 13:21:00 +0000</pubDate><atom:updated>2009-04-13T11:58:12.372+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">100 Oldest Domains</category><category domain="http://www.blogger.com/atom/ns#">clounds</category><category domain="http://www.blogger.com/atom/ns#">Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">GRE</category><category domain="http://www.blogger.com/atom/ns#">tags</category><title>RSS Post</title><description>This is to check How this topic appears in RSS headlines.&lt;br /&gt;&lt;br /&gt;By: SiNNeR*&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2009/03/test-post.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-4738276941286473840</guid><pubDate>Sat, 01 Nov 2008 05:20:00 +0000</pubDate><atom:updated>2008-11-01T10:23:12.243+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fun</category><category domain="http://www.blogger.com/atom/ns#">Info</category><category domain="http://www.blogger.com/atom/ns#">Yahoo</category><title>Cool About Yahoo</title><description>&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5Q5mpEm_Q-HikHYBvfG7HrT_mqmyeRNDRnjQ7UUqvZDFX8i2ns36-L7sBgoitUJPE3zBONN-56psStReexvX49NMQb_zbrrVlqq0mzLwT5p2332l145fh8d1AN6z3FjOgikBo5HdNfQ/s1600-h/yahoo-homepage-300x196.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5263555156248483794" style="DISPLAY: block; MARGIN: 0px auto 10px; WIDTH: 300px; CURSOR: hand; HEIGHT: 196px; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5Q5mpEm_Q-HikHYBvfG7HrT_mqmyeRNDRnjQ7UUqvZDFX8i2ns36-L7sBgoitUJPE3zBONN-56psStReexvX49NMQb_zbrrVlqq0mzLwT5p2332l145fh8d1AN6z3FjOgikBo5HdNfQ/s400/yahoo-homepage-300x196.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;I came across something about Yahoo! that I can bet 99% of the people don’t even know.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Goto the Yahoo! Main page - &lt;/span&gt;&lt;a href="http://www.yahoo.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;www.yahoo.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;You see the logo of Yahoo! on top? Turn on your speakers/headphone and then click the exclaimation mark i.e. “!”&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Oh yea! you see! I can bet you never noticed this all ever before.&lt;/span&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2008/11/cool-about-yahoo.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik5Q5mpEm_Q-HikHYBvfG7HrT_mqmyeRNDRnjQ7UUqvZDFX8i2ns36-L7sBgoitUJPE3zBONN-56psStReexvX49NMQb_zbrrVlqq0mzLwT5p2332l145fh8d1AN6z3FjOgikBo5HdNfQ/s72-c/yahoo-homepage-300x196.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-655261267079628880</guid><pubDate>Fri, 31 Oct 2008 17:14:00 +0000</pubDate><atom:updated>2008-10-31T23:14:00.624+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">blogging</category><category domain="http://www.blogger.com/atom/ns#">content writing</category><category domain="http://www.blogger.com/atom/ns#">writer</category><title>Five Tips to Improve Content Writing</title><description>&lt;div align="center"&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#cc0000;"&gt;&lt;strong&gt;Five Tips To Improve Your Content Writing in Internet :::&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Statistics show that the average person spends 8 hours a week reading books writing for internetor newspapers, as opposed to 27 hours watching TV. Many of the workforce will also spend another 0 hours a week working at a computer. This shows, how fast are people switching to internet reading in recent days, hence it is important to check your writing style in internet.On the internet, reader-user is the king. The reader continues to read only if the articles that you are logical and within the scope of his understanding.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7AOIcuPJDo_IlkdcwxDmv7RY4R9dtZ3a190taI59wwywC7dx1TN4ZIId9alFCT6qpuVHwLtpUPhMEyEkJbdgWgzwjOc9bhNZg2EYHuIjWz47HsF2UXokZhkbAPqLwKsjUJ0EppnbjwEk/s1600-h/Internet+Writing+Tips+and+Tricks.gif"&gt;&lt;img id="BLOGGER_PHOTO_ID_5263368924520272930" style="FLOAT: right; MARGIN: 0px 0px 10px 10px; WIDTH: 400px; CURSOR: hand; HEIGHT: 185px" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7AOIcuPJDo_IlkdcwxDmv7RY4R9dtZ3a190taI59wwywC7dx1TN4ZIId9alFCT6qpuVHwLtpUPhMEyEkJbdgWgzwjOc9bhNZg2EYHuIjWz47HsF2UXokZhkbAPqLwKsjUJ0EppnbjwEk/s400/Internet+Writing+Tips+and+Tricks.gif" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Offer credibility: Convince readers that you are right in what you say. Give an emphasis in quoting the reliable arguments for your conclusions which creates an impression on the readers that the content-writer is a reliable one. The readers of your website or blog are sole measure of your popularity in the internet. Provide a pay-off, users find something they want or need. So, be very careful in creating the titles, headings and other styles.&lt;br /&gt;Logical sequence: Cultivate the habit of writing the articles in a logical form; many authors don't care about the logical sequence and write articles in a jumbled order, this will hit your site statistics; Viewers don't like to build the logical sequence of your content, they prefer if it is already present in the content. This is because most of the net users are expecting the readymade knowledge&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Promote Action: Get benefit as a result out of their visit. You can go for some reasonably good and simple ads on your site after a few weeks of its presence in the internet. Well, not everyone likes it but I feel this as a small technique that will be an encouragement you to write with more interest. The small ad that you are using today may turn out into a huge success, you can never know how and when will the tree provide the ripen fruits. Take care, that you don't mess up your site with complete ads and it shouldn't dominate your main content.&lt;br /&gt;Make the site sticky: Everyone writes articles, but visitors follow up only the sites that write the articles with an innovation; add humor, debates, discussions in your article to make them more appealing. No one likes reading something that appears as a preaching. Keep variety of articles in your site, blog so that readers find something else to read when they are bored of reading the true technical content. Spice up the content and then write it other than writing it in its original pale form.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Readability: The printed pages have resolution greater than 800 dots per inch, where as most of the computer screens are of 72 or 96 pixels per inch, hence computer screens are 25 percent slower readable. Due use too much technical jargon or don't write it as a high school English sentences, write a mix up, small sentences with two or three clauses. This will make the read to think for a while after the completion of the sentences and he make up an internal link in his mind of what you are trying to convey.&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2008/10/five-tips-to-improve-content-writing.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7AOIcuPJDo_IlkdcwxDmv7RY4R9dtZ3a190taI59wwywC7dx1TN4ZIId9alFCT6qpuVHwLtpUPhMEyEkJbdgWgzwjOc9bhNZg2EYHuIjWz47HsF2UXokZhkbAPqLwKsjUJ0EppnbjwEk/s72-c/Internet+Writing+Tips+and+Tricks.gif" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-8717608991964021776</guid><pubDate>Thu, 30 Oct 2008 09:54:00 +0000</pubDate><atom:updated>2008-10-30T16:08:33.797+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Browser</category><category domain="http://www.blogger.com/atom/ns#">Download FREE</category><category domain="http://www.blogger.com/atom/ns#">Firefox</category><category domain="http://www.blogger.com/atom/ns#">IE</category><category domain="http://www.blogger.com/atom/ns#">Search</category><category domain="http://www.blogger.com/atom/ns#">SEO</category><title>Addoursearch: Lets users add your site search into their browser</title><description>&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51);   line-height: 18px; "&gt;&lt;a href="http://www.addoursearch.com/" style="color: rgb(34, 85, 136); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;AddOurSearch&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; is a FREE service that allows your visitors to search your site&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; from anywhere on the internet. The web 2.0 browsers Firefox, Flock and Opera are appreciated due to the &lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: bold; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;quick search facility&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; they provide for the users. In fact, it is one predominant source of earning for the browsers community as they use the &lt;/span&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 153, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Google's custom sear&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: rgb(0, 153, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;ch&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;. Most of the popular websites are providing this feature as they want to make the uses to use their site without coming into their site every time.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span" style=""&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51);   line-height: 18px;"&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"   style="color: rgb(51, 51, 51);   line-height: 18px;font-family:'Trebuchet MS';font-size:48px;"&gt;&lt;span class="Apple-style-span"  style=" ;font-size:13px;"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ4XTpCqsGV7W0IMxgKepJgFfUm86h65u0Lt6x-IlBmNkq1vOgo6yPD0EQuka2mEc-1_Z51I3NL6sKXMoxdZWaVrt5jCQcVwsIVuBK1JmnmB8c2OQ0Z3ovzBLeNSmL_G6CzAHmf1MjDY4/s400/add_to_search_logo.png" style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;width: 320px; height: 88px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5262883393315794706" /&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Addoursearch is a website, that helps the webmasters/bloggers to facilitate this feature in their sites and blogs. It is free and it takes jut 3 minutes to create it. Follow these steps to setup the search engine for your site.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Open your site in a new tab or window.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Do a search for ADDOURSEARCH, one word in all capital letters.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Copy the resulting URL&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Open this &lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.addoursearch.com/widget/start.htm" style="color: rgb(34, 85, 136); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;link&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; and follow the further instructions given in the page.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ol&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;You can keep the "add you search" as a plain text or choose from one of the following type. This will work with Explorer 7+, Firefox 2+, or Flock Browsers. &lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.addoursearch.com/pages/bestpractices.htm" style="color: rgb(34, 85, 136); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;This web page&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; will help you in placing your search engine as an image or text and its placement.&lt;/span&gt;&lt;/span&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6gxwj8UU1rsmzVT6sQxjOo5tJgP2fCQep65jFwDHU5Y_PQ-eKtkDBiNcDyhT_6BaWISNaN6Ktn7qggzYR-OqRiooIVB6O0WTgH_tacjQMOs4_Cj-6skDde4VocUdXa8254enPkVcbIFc/s400/addtosearch_styles.jpg" style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;width: 155px; height: 162px;" border="0" alt="" id="BLOGGER_PHOTO_ID_5262883651760379762" /&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: rgb(255, 102, 0); font-weight: bold; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Advantages&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;:No Registration&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; RequiredIncrease Page Views and Impressions&lt;/span&gt;&lt;/span&gt;&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Increase Brand Recognition&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;I personally did not try this, so I can't tell you the disadvantages, but one thing that I can tell you is that if you really want to level up your traffic, then try this.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2008/10/addoursearch-lets-users-add-your-site.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZ4XTpCqsGV7W0IMxgKepJgFfUm86h65u0Lt6x-IlBmNkq1vOgo6yPD0EQuka2mEc-1_Z51I3NL6sKXMoxdZWaVrt5jCQcVwsIVuBK1JmnmB8c2OQ0Z3ovzBLeNSmL_G6CzAHmf1MjDY4/s72-c/add_to_search_logo.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-3521938691851287650</guid><pubDate>Thu, 30 Oct 2008 09:52:00 +0000</pubDate><atom:updated>2008-10-30T16:06:36.722+06:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Data</category><category domain="http://www.blogger.com/atom/ns#">E-mail</category><category domain="http://www.blogger.com/atom/ns#">Gmail</category><category domain="http://www.blogger.com/atom/ns#">Secure</category><title>Gmail Features: Now You're More Secure</title><description>&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style=" ;font-family:'Times New Roman';"&gt;&lt;div style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 0px; margin-right: 0px; margin-bottom: 0px; margin-left: 0px; padding-top: 3px; padding-right: 3px; padding-bottom: 3px; padding-left: 3px; width: auto; font: normal normal normal 100%/normal Georgia, serif; text-align: left; "&gt;&lt;div style="text-align: center; "&gt;&lt;span class="Apple-style-span" style="font-weight: bold; "&gt;&lt;span class="Apple-style-span" style="color: rgb(255, 0, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;GMAIL&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; More Secure :::&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center; "&gt;&lt;span class="Apple-style-span" style="font-weight: bold; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGl56qVX1-z0Gb4wZNH22rYBHYdv82RsBpxqq9BLC64CATg0G4KkIhj1ban12YV7ctln2f06up1e0Op6bg4C9EDekDeGyicsjIVQ-eCe6EgFBvyGToK5DsGYd2DRwjgFhrxfkEhwmW2Fhh/s1600-h/secure+email+(1).gif"&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGl56qVX1-z0Gb4wZNH22rYBHYdv82RsBpxqq9BLC64CATg0G4KkIhj1ban12YV7ctln2f06up1e0Op6bg4C9EDekDeGyicsjIVQ-eCe6EgFBvyGToK5DsGYd2DRwjgFhrxfkEhwmW2Fhh/s400/secure+email+(1).gif" border="0" alt="" id="BLOGGER_PHOTO_ID_5262877924490303698" style="float: right; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; cursor: pointer; width: 100px; height: 100px; " /&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Gmail now provides an extra option of checking the activity of your Gmail account, this will display accessed time, ip address, access type like browser, mobile, POP. Clicking the Details link next to the Last account activity line at the bottom of any Gmail page shows information about recent activity in your mail.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="color: rgb(204, 102, 0); font-weight: bold; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;How to use this data ?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(204, 102, 0); font-weight: bold; line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(204, 102, 0); font-weight: bold; line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); font-weight: normal; "&gt;&lt;span style="color: rgb(0, 102, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;check the sneakers&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;: If you're concerned about unauthorized access to your mail, you'll be able to use this data to find out if and when someone gained access. If you doubt that someone else is using your account anonymously, you can catch him off with the IP addresses that is present in the recent activity table. If you are using a single computer, then most of the time your IP address don't change, but if you are having a dynamic IP address, it still&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;img src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj1BgEWiqlI0AgpkNA1VY2o0N0k7DQteup3iIpXDfqw-L2Ip5IWSxy7dsg0oEBsCR1kTtJvU40NWMs6ckPOnU3cYEf6bSuQeyAAs9uFN2Z7qg4Bw4QpRyTZW1fApjE0REnouQZecHG-e9TY/s400/secure+gmail.jpg" border="0" alt="" id="BLOGGER_PHOTO_ID_5262879033082787362" style="float: right; margin-top: 0px; margin-right: 0px; margin-bottom: 10px; margin-left: 10px; cursor: pointer; width: 267px; height: 254px; " /&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(204, 102, 0); font-weight: bold; line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); font-weight: normal; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; have first two numbers as same (for example 192.168.xx.xx).&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span style="color: rgb(0, 102, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;close the remote sessions:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; If you have failed to sign out your account when you used it in your office, you can still sign off from anywhere. There is an option sign out all other sessions, by clicking on it you can sign off from other sessions.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="color: rgb(51, 51, 51); line-height: 18px; "&gt;&lt;span style="color: rgb(0, 102, 0); "&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Access time&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;: Sometimes, when you go out, you may not sign off you gmail account and also you may leave the computer on; then people have an opportunity to run through your gmail. The access time given in the last activity table gives complete details of the when was you gmail accessed, using that you can know if someone is using your account when you are away from the computer.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2008/10/gmail-features-now-youre-more-secure.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGl56qVX1-z0Gb4wZNH22rYBHYdv82RsBpxqq9BLC64CATg0G4KkIhj1ban12YV7ctln2f06up1e0Op6bg4C9EDekDeGyicsjIVQ-eCe6EgFBvyGToK5DsGYd2DRwjgFhrxfkEhwmW2Fhh/s72-c/secure+email+(1).gif" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-8465422382441038696</guid><pubDate>Tue, 18 Sep 2007 10:18:00 +0000</pubDate><atom:updated>2007-09-18T15:42:09.841+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download Youtube Videos</category><category domain="http://www.blogger.com/atom/ns#">How to Download Youtube Videos</category><category domain="http://www.blogger.com/atom/ns#">Youtube</category><category domain="http://www.blogger.com/atom/ns#">Youtube Video Dowload</category><category domain="http://www.blogger.com/atom/ns#">Youtube Videos</category><title>Download Videos from YouTube</title><description>&lt;div align="center"&gt;&lt;span style="font-family:verdana;color:#660000;"&gt;&lt;strong&gt;Download Videos from YouTube&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Youtube, the one site that has revolutionized the online videos over the internet. Probably, everyone using internet will listen the word YOUTUBE atleast once in a while. This is similar with Google videos too. You feel comfortable while watching the videos but you have will also have a desire to download them and watch them instantaneously over your PC than going to the site and streaming the video all the time to watch it. The Youtube policy of " stream to see " disgusts me because if you refresh the page unexpectedly, then the video starts streaming from the beginning.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;When we see footage of love, the absence download collections can no longer watch and when they will regret it. Therefore, the best way is to love download video footage preserved. But YouTube itself only provided online viewing functions, but not mentioning the download link. Download video from YouTube easy, if a download tools to help us be better. Youtube should have come up with some idea to solve this. Let that be a side and now we shall see the methods to get a download a youtube video or a google video on to your PC. Four popular techniques are the following &lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;- Online Downloader sites&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;- Greasemonkey scripts&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;- Firefox addons&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;- Softwares &lt;/span&gt;&lt;/p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;br /&gt;Online video Downloader sites: In these sites you have to give the url of the youtube video in the space provided and click on "&lt;strong&gt;download&lt;/strong&gt;" to download the file. A few sites that provide this feature are&lt;br /&gt;&lt;br /&gt;1. &lt;a href="http://www.youtubex.com/"&gt;http://www.youtubex.com/&lt;/a&gt;&lt;br /&gt;2. &lt;/span&gt;&lt;a href="http://downthisvideo.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://downthisvideo.com/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;3. &lt;/span&gt;&lt;a href="http://www.downloadyoutubevideos.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.downloadyoutubevideos.com/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;4. &lt;/span&gt;&lt;a href="http://javimoya.com/blog/youtube_en.php"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://javimoya.com/blog/youtube_en.php&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;and many more...&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;This technique is not reliable as at all the times you will not be able to download from their sites &lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;&lt;br /&gt;Grease monkey Scripts&lt;/span&gt;&lt;/strong&gt;: This works only in Firefox as Greasemonkey is this addon is supported by Firefox only. You have to install some scripts to download the youtube videos. Steps to download using grease monkey,&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;br /&gt;1. You should use a Firefox browser, if you don't have &lt;strong&gt;&lt;a href="http://www.spreadfirefox.com/?q=affiliates&amp;amp;id=192412&amp;amp;t=209"&gt;click here&lt;/a&gt;&lt;/strong&gt; to download the latest version.&lt;br /&gt;&lt;br /&gt;2. Install the Grease monkey addon from &lt;strong&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/748"&gt;here&lt;/a&gt;&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;3. After this install one of the following scripts&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://userscripts.org/scripts/show/2085"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/2085&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://userscripts.org/scripts/show/3982"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/3982&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://userscripts.org/scripts/show/6204"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/6204&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://userscripts.org/scripts/show/7809"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/7809&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://userscripts.org/scripts/show/8177"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/8177&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://userscripts.org/scripts/show/7880"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://userscripts.org/scripts/show/7880&lt;/span&gt;&lt;/a&gt; &lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;4. After doing all this refresh the youutbe or google video page to see an icon "save this file"or "download this file " or "get this video ",...&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;5. Click on it to save the file with a file name.&lt;br /&gt;&lt;br /&gt;Add &lt;strong&gt;.flv&lt;/strong&gt; to the file name, like if abc is file name, rename the downloaded file as abc.flv &lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Now use a &lt;a href="http://www.martijndevisser.com/2005/10/flv_player_updated.html"&gt;&lt;strong&gt;flv player&lt;/strong&gt;&lt;/a&gt; to view it or download a flv converter like (&lt;strong&gt;&lt;a href="http://forum.videohelp.com/viewtopic.php?t=259578"&gt;Riva FLV Encoder&lt;/a&gt;&lt;/strong&gt; &lt;strong&gt;&lt;a href="http://www.effectmatrix.com/total-video-converter/"&gt;Total Video Converter&lt;/a&gt;&lt;/strong&gt; ) into mpeg or avi or wmv format and watch it with normal video player like vlc or windows media player. &lt;/span&gt;&lt;/p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;p align="justify"&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;&lt;br /&gt;Firefox addons:&lt;/span&gt;&lt;/strong&gt; Here a few addons of Firefox that will directly download the youtube or Google videos&lt;br /&gt;&lt;/p&gt;&lt;p align="justify"&gt;1. &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/2254"&gt;Unplug&lt;/a&gt; &lt;/p&gt;&lt;p align="justify"&gt;2. &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/3516"&gt;Get video&lt;/a&gt; &lt;/p&gt;&lt;p align="justify"&gt;3. &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/3590"&gt;Fast video download&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;4. &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/2390"&gt;Video Downloader&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;5. &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/3242"&gt;Video Download&lt;/a&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="color:#ff0000;"&gt;&lt;strong&gt;&lt;br /&gt;Software to download Youtube or Google videos :&lt;/strong&gt; &lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;1. &lt;/span&gt;&lt;a href="http://www.zillatube.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.zillatube.com/&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;2. &lt;/span&gt;&lt;a href="http://www.amazebrowser.com/flvdownload/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.amazebrowser.com/flvdownload/&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;3. &lt;a href="http://superdownloads.uol.com.br/download/132/youtube-video-accelerator/"&gt;Youtube Accelerator&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Note 1 :&lt;/strong&gt; Of all the techniques described above, using grease monkey is the mosty effeciient one and also the most reliable one.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Note 2 :&lt;/strong&gt; The same technique is applicable to Google videos too but the scripts and ddons and softwares my be different.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/download-videos-from-youtube.html</link><thr:total>1</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-5513642257557576531</guid><pubDate>Tue, 18 Sep 2007 09:27:00 +0000</pubDate><atom:updated>2007-09-18T15:48:57.123+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Friendster Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Hi5 Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Hotmail Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Myspaces Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Orkut Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Rediff Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Fake Login Page</category><title>Fake Login Scripts/Tools</title><description>&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;Fake Login scripts and tools&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;Fack login pages hacks password of the victim when he logs in to the software using his id. This tool sends the victim`s id &amp;amp; password to your yahoo id or Google that you specify in the tool.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;a href="http://www.darfun.net.tc/"&gt;&lt;strong&gt;Darfun Incorporation - Software Research Portal&lt;/strong&gt;&lt;/a&gt; made a fake login pages for Yahoo!, Hotmail/MSN, Orkut, MySpace, Rediff mail, Hi5, Friendster&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;Those fake login pages are like photo copy of real pages, hats off to Darfun Inc,this is the link for the pages to download fack login pages&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/yahoo.zip"&gt;Yahoo Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/hotmail.zip"&gt;Hotmail/MSN Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/orkut.zip"&gt;Orkut login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/myspace.zip"&gt;Myspace Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/rediff.zip"&gt;Rediff mail Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/hi5.zip"&gt;Hi5 Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://freewebtown.com/darfun/fake-logins/friendster.zip"&gt;Friendster Fake login script&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;IF YOU WANT TO USE FAKE LOGIN FOR ANY OTHER SERVICEJust fallow the instructions on the Readme.txt and Howto.txt in zip file&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;Darfun Inc says:&lt;/div&gt;&lt;div align="justify"&gt;THIS HELP IS PROVIDED FOR EDUCATIONAL PURPOSES ONLY, WE ARE NOT RESPONSIBLE OF ANY PASSWORD THEFT USING THISFAKE LOGIN PAGE, We also apologies to the third party forusing their e mail form in this script. :(&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;After downloading the zip file just change the Html as instructed in help files and upload the edited file and publish it (&lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/create-fake-login-in-15-steps.html"&gt;Help on publishing and uploading&lt;/a&gt;&lt;/strong&gt;)&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;&lt;br /&gt;Related Posts:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/create-fake-login-in-15-steps.html"&gt;&lt;strong&gt;&lt;br /&gt;Create Fake Login Page in 15 Steps&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/fake-login-scriptstools.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-2549404460870356697</guid><pubDate>Tue, 18 Sep 2007 09:14:00 +0000</pubDate><atom:updated>2007-09-18T15:14:30.260+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Fake Hacking</category><category domain="http://www.blogger.com/atom/ns#">Fake Login Page</category><category domain="http://www.blogger.com/atom/ns#">Hacking Web</category><title>Create Fake Login in 15 Steps</title><description>&lt;div align="center"&gt;&lt;span style="font-family:verdana;color:#993300;"&gt;&lt;strong&gt;Create Fake Login in 15 Steps&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;color:#993300;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{1} Open &lt;/span&gt;&lt;a href="http://www.jotform.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;www.jotform.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; and Sign Up.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{2} Then Login there with your newly registered account.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{3} Now click on ' Create your first form'.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{4} Now delete all the pre-defined entries, just leave 'First Name:'. (To delete entries, select the particular entry and then click on the cross sign.)&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{5} Now Click on 'First Name:' (Exactly on First Name). Now the option to Edit the First Name is activated, type there "username:" (for gmail) or YahooId: (for Yahoo)&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{6} Now Click on 'Power Tool' Option (In right hand side...)&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{7} Double click on 'PasswordBox'. Now Click the newly form password entry to edit it. Rename it as 'Password:'&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{8} Now Click on 'Properties' Option (In right hand side...). These are the form properties.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{10} Now in ThankYou URL you must put some link, like &lt;/span&gt;&lt;a href="http://www.google.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.google.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; or anything. Actually after entering username &amp;amp; password, user will get redirect to this url.(Don't leave it blank...)&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{11} Now Click on 'Save'. After saving, click on 'Source' Option.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{12} Now you can see two Options, namely 'Option1' &amp;amp; 'Option2'. Copy the full code of 'Option2'.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{13} Now open Notepad text editor and write the following code their.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Paste the Option2 code here&lt;br /&gt;&lt;br /&gt;{14} And now save this as index.html. Now we have to put this index.html on internet. I mean now we are going to host this file. For this we will use FREE hosting provider service. You can try the following FREE hosting providers. Make a free hosting account and come back here...&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;a href="http://www.webng.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.webng.com&lt;/span&gt;&lt;/a&gt;&lt;a href="http://www.atspace.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.atspace.com&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{15} I hope u have succesfully created a free hosting account. Now Login in your hosting account. And then Open 'File Manager'.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;{16} Upload this index.html there... now u can see your index.html online by typing the url (url will be given to you by your free hosting provider..)FINISHED&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;&lt;br /&gt;Related Posts:&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/fake-login-scriptstools.html"&gt;&lt;strong&gt;&lt;br /&gt;Fake Login Scripts &amp;amp; Tools&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/create-fake-login-in-15-steps.html</link><thr:total>2</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-454381531496379122</guid><pubDate>Tue, 11 Sep 2007 12:31:00 +0000</pubDate><atom:updated>2007-09-11T17:34:32.750+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">RapidShare</category><category domain="http://www.blogger.com/atom/ns#">Rapidshare Downloader</category><category domain="http://www.blogger.com/atom/ns#">Rapidshare Grabber</category><title>Rapidshare Downloader</title><description>&lt;div align="center"&gt;&lt;div align="center"&gt;&lt;span style="font-family:verdana;"&gt;&lt;strong&gt;&lt;span style="font-size:100%;"&gt;&lt;span style="color:#660000;"&gt;.:: Rapidshare Downloader ::.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;br /&gt;CMS Grabber is the best tool I ever found on internet, this tool made me stun when I started using this, many rapid share users are still searching for free premium account, this tool make it useless. Using this tool we can download files from rapid share without any download limitations, multiple files at once, this is more than rapid share premium account. L&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;ets see it in brief&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;/span&gt;&lt;div align="center"&gt;&lt;a href="http://3downloads.blogspot.com/2007/09/rapidshare-downloader.html"&gt;&lt;img id="BLOGGER_PHOTO_ID_5108889174774518274" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKCpS2XrHoRXHcOPlbAXExlVUKDPqdZfFANUGQPIcXAJnftOFN8FmqEyN0R3aubed5DPA74D58ho9LdlxS8HT7N7BUBujX7rEt6Ocp4BfnCWsSnJmcMAioGeUn12l1eK3fSGzdjTuN7-bR/s400/1179502055478306_grabber.jpg" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;strong&gt;THE ONLY LEGAL PROGRAM FOR DOWNLOADS FROM RAPIDSHARE !!!&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;div align="center"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color:#ff0000;"&gt;&lt;a href="http://3downloads.blogspot.com/2007/09/rapidshare-downloader.html"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&gt;&gt;&gt; Topic Moved Here &gt;&gt;&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/rapidshare-downloader.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKCpS2XrHoRXHcOPlbAXExlVUKDPqdZfFANUGQPIcXAJnftOFN8FmqEyN0R3aubed5DPA74D58ho9LdlxS8HT7N7BUBujX7rEt6Ocp4BfnCWsSnJmcMAioGeUn12l1eK3fSGzdjTuN7-bR/s72-c/1179502055478306_grabber.jpg" width="72"/><thr:total>1</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-2655819221741358951</guid><pubDate>Tue, 11 Sep 2007 10:27:00 +0000</pubDate><atom:updated>2007-09-11T15:43:09.354+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Download FREE</category><category domain="http://www.blogger.com/atom/ns#">Download Key Loggers</category><category domain="http://www.blogger.com/atom/ns#">Key Loggers</category><title>Key Loggers</title><description>&lt;p align="center"&gt;&lt;span style="font-family:verdana;color:#660000;"&gt;&lt;strong&gt;.:::. Key Loggers .:::.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others.&lt;br /&gt;Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker.&lt;br /&gt;lets see some of the key logger's what I known&lt;/span&gt;&lt;/p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;Local Keylogger Pro 3.1&lt;/span&gt;&lt;/strong&gt; - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.&lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://www.key-logger.biz/download/lkinstall.exe"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;][&lt;/strong&gt;&lt;a href="http://rapidshare.com/files/49680069/Local.Keylogger.Pro.3.1.patch-SND.rar.html"&gt;&lt;strong&gt;Crack&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;XP Advanced Keylogger 2.5&lt;/span&gt;&lt;/strong&gt; - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} &lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://www.xp-tools.com/download/xpadvancedkeylogger.exe"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;][&lt;/strong&gt;&lt;a href="http://rapidshare.com/files/49513833/XP.Advanced.Keylogger.2.5.cracked-SND.rar.html"&gt;&lt;strong&gt;Crack&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;Blazing Tools Perfect Keylogger 1.67&lt;/span&gt;&lt;/strong&gt; - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings.&lt;br /&gt;Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list.&lt;br /&gt;Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager!&lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://www.blazingtools.com/downloads/i_bpk2007.exe"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;][&lt;/strong&gt;&lt;a href="http://rapidshare.com/files/48884433/Blazing.Tools.Perfect.Keylogger.1.67.keygen-SND.rar.html"&gt;&lt;strong&gt;Crack&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;SC Keylogger Pro V3.2&lt;/span&gt;&lt;/strong&gt; - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.&lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://my-sl.net/?BJOVJ"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;Hook Keylogger v2.1&lt;/span&gt;&lt;/strong&gt; - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing &lt;span style="color:#cc0000;"&gt;Ctrl+Shift+F7&lt;/span&gt; &lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://deeptide.com/new/fullkeylogger.exe"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;][&lt;/strong&gt;&lt;a href="http://www.midload.com/en/file/14216/DeepTide-Hook-Keylogger-v2-1-Incl-Keygen-Lz0-zip.html"&gt;&lt;strong&gt;Crack&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#993300;"&gt;Advanced Invisible Keylogger 1.8&lt;/span&gt;&lt;/strong&gt; - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords.&lt;br /&gt;Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM.&lt;br /&gt;All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running!&lt;br /&gt;The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.&lt;strong&gt;[&lt;/strong&gt;&lt;a href="http://rapidshare.com/files/21148911/Advanced_Invisible_Keylogger_1.8.rar"&gt;&lt;strong&gt;Download&lt;/strong&gt;&lt;/a&gt;&lt;strong&gt;]&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/key-loggers.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author><enclosure length="243273" type="application/x-msdownload" url="http://www.blazingtools.com/downloads/i_bpk2007.exe"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>.:::. Key Loggers .:::.Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others. Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker. lets see some of the key logger's what I known Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack] XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack] Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings. Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list. Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack] SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download] Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack] Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords. Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM. All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running! The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]by SpyBloggers.</itunes:subtitle><itunes:author>SiNNeR*</itunes:author><itunes:summary>.:::. Key Loggers .:::.Keystroke logging (often called keylogging) is a diagnostic tool used in software development that captures the user's keystrokes. It can be useful to determine sources of error in computer systems and is sometimes used to measure employee productivity on certain clerical tasks. Such systems are also highly useful for law enforcement and espionage—for instance, providing a means to obtain passwords or encryption keys and thus bypassing other security measures. However, keyloggers are widely available on the Internet and can be used by private parties to spy on the computer usage of others. Writing software applications for keylogging is trivial, and like any computer program can be distributed as a trojan horse or as part of a virus. What is not trivial however, is installing a keystroke logger without getting caught and downloading data that has been logged without being traced. An attacker that manually connects to a host machine to download logged keystrokes risks being traced. A trojan that sends keylogged data to a fixed e-mail address or IP address risks exposing the attacker. lets see some of the key logger's what I known Local Keylogger Pro 3.1 - Local Keylogger Pro allows you to monitor all users' activity on any computers in real time and record each computer's usage history. Local Keylogger Pro makes it easy to view, in real time, the screenshots of the any computers, all typed keystrokes, visited Web sites, used programs. You can view a list of running processes and terminate undesirable ones. Local Keylogger Pro can record all user activity to the log file. This information can be exported to HTML for convenient viewing in your web browser, or exported to MHT file for analysis. This allows you to see how long users worked with particular programs, how much time they spent on Internet, what sites they visited, what they typed in e-mails or chats.[Download][Crack] XP Advanced Keylogger 2.5 - XP Advanced Keylogger is a top-rated invisible easy-to-use surveillance tool that records every keystroke to a log file. The log file can be sent secretly with email or FTP to a specified receiver. It can also detection specified keywords and take a screenshot whenever one is typed, displaying findings in a tidy log viewer. It causes no suspicious slowdowns and takes very few system resources. all this is happening in full stealth mode so the person you are monitoring will never be aware of it.{Windows 95, NT4, 98, Me, 2000, XP} [Download][Crack] Blazing Tools Perfect Keylogger 1.67 - Perfect Keylogger is a new generation keylogger which is absolutely undetectable. It was created as an alternative to very expensive commercial products like iSpyNow, Spector Keylogger or E-Blaster. It has the same functionality, but is significantly easier to use. Complex internal mechanisms are hidden from the user behind the friendly interface. You can install Keylogger and immediately use it without changing of its settings. Perfect Keylogger is an extremely compact, award-winning tool. It is translated into 20 languages and is increasingly popular around the world! It lets you record all keystrokes, the time they were made and the application where they were entered. It works in the absolutely stealth mode. Stealth mode means that no button or icon is present in the Task Bar, and no process title is visible in the Task Manager list. Also, Perfect Keylogger can carry out visual surveillance. It periodically makes screenshots in invisible mode and stores the compressed images on the disk so you can review them later.Perfect Keylogger was the first keylogging software solution which can be absolutely invisible in the Windows NT/2000/XP/Vista Task Manager![Download][Crack] SC Keylogger Pro V3.2 - A Commercial Key Logger is a program that captures and logs keystrokes as they are entered on the computer for the purpose of monitoring the user. The logged data, which may be encrypted, is saved or sent to the person who installed the key logger. These applications often run in stealth mode and are invisible to the user that is being monitored. Such key loggers are sold commercially and may be used legitimately if deployed by authorized administrators and disclosed to the persons being monitored, as in a business environment. The use of a key logger to monitor persons without their knowledge has been ruled illegal in at least one jurisdiction.[Download] Hook Keylogger v2.1 - Small and stealth keylogger without an installer; simplest keylogger possible Specify log file location Uses a WH_JOURNALRECORD hooking procedure to capture everything typed Hide and unhide the interface by pressing Ctrl+Shift+F7 [Download][Crack] Advanced Invisible Keylogger 1.8 - Advanced Invisible Keylogger is an stealth spy tool, the best spy software offered by ToolAnywhere! Advanced Invisible Keylogger runs silently at the lowest level of Windows capturing every keystroke including usernames and windows log-on passwords. Advanced Invisible Keylogger can also capture active window text, text typed in all popular instant messengers including AOL, YAHOO, ICQ, MSN and AIM. All Desktop activity will be recorded through Advanced Invisible Keylogger’s secret! Have reports sent to your email address at anytime secretly! Advanced Invisible Keylogger is so stealthy and hides so well that not even a computer technician with years of experience can detect it running! The most powerful stealth program at a most affordable price! An easy-to-use stealth solution for PC and Internet surveillance. Purchase your copy today and feel safe and secure.[Download]by SpyBloggers.</itunes:summary><itunes:keywords>Music,Downloads,Freeware,Software,Downloads,Freelancer,s,resources,Resoucres,for,Developers,Free,Web,Templates[Joomla,PHP,Fuzon,PHP,Nuke],E,Books,Encryption,Scripts,PHP,Scripts,Gadget,Reviews,IT,News,Job,Updates,Online,Test,for,GRE,TOEFL,Prep</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-8574809829647227325</guid><pubDate>Tue, 11 Sep 2007 09:05:00 +0000</pubDate><atom:updated>2007-09-11T19:08:33.454+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Orkut Mass Scraper</category><category domain="http://www.blogger.com/atom/ns#">Orkut Scrapper</category><category domain="http://www.blogger.com/atom/ns#">Orkut Tools</category><title>OrkutScrapper 2.0.4</title><description>&lt;div align="center"&gt;&lt;div align="left"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;strong&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="color:#660000;"&gt;Hello Orkutters,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Here is a good news for ya. Here's one smart addon that will help you to do all those cool things that you just wanted to do on orkut.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;1 - Scrapping in regional languages/Changing the look of your profile/Drawing special character images in scraps/Colour effects in scraps and a wide variety of other tools too - all with a simple firefox addon(all tools at one place! wow! Thanks to Binny Mathew)&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;The most significant feature of this addon is that it integrates all the features into one simple toolbar that neatly fits to your scrapbook like the microsoft windows tooolbar.Easy to use,minimum clicks and excellent usability. here are the features.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;2 - Now you can scrap in a variety of Different Languages(even those which you don't know) like Tamil, Malayalam,Sanskirt, Oriya,Punjabi,Telugu,Gujarati,Bengali,Kannada etc with ease - just select the scrap text and select the language from the menu - simple as that. No going to other sites or using heavy translators-Thank God(and Binny)!&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZG_3M9AK22RleoZVqqHFRRjTZWyk8xssj85VPUZfg_z6btjfk_Z81OKs69s_RIN_PUB8vjpMwEBR5nW_c7-ZA4kLsqsgK-VJoRW5N869sfwRlqL0nFVagwCoAFdjj0FJad5_eIBHzGcY/s1600-h/orkut-background.gif.png"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;div align="center"&gt;&lt;img id="BLOGGER_PHOTO_ID_5108870427242271218" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZG_3M9AK22RleoZVqqHFRRjTZWyk8xssj85VPUZfg_z6btjfk_Z81OKs69s_RIN_PUB8vjpMwEBR5nW_c7-ZA4kLsqsgK-VJoRW5N869sfwRlqL0nFVagwCoAFdjj0FJad5_eIBHzGcY/s400/orkut-background.gif.png" border="0" /&gt;&lt;/div&gt;&lt;/a&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;3 - Change the background of your profile/scrapbook so that your profile stands out from others.This is more like the Myspace layout customization. Really cool and one that all of us was looking forward to.All you need to do is select any picture you like and upload it to an online image storage -like imageshack or photobucket.Copy the direct link url and add it in the options box(From Firefox's Tools&gt;Addons&gt;Options). Simple! So every time somebody visits you profile they see a totally different profile - enough reason for you to be a star among your friends. ;)Selecting a random image will give you a tiled image, but picking a good one that will fit your profile is upto your creativity. ;)&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;4 - You can also use character messages in the scrap like Heart, Rainbow coloured text etc. Just select the scrapt text and select the appropriate button. The buttons are all arranged well like the microsoft word buttons - anybody would know how to use them.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;5 - Secret Scrapping - This is one significant tool where you can private message your friend and only he can read your scrap. Use the "golden key" near the scrap box to get this done.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;span style="color:#996633;"&gt;Installation Help&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&lt;span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color:#993300;"&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;OrkutScrapper 2.0.4 can only be installed in Firefox 1.5 and above versions.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Step 1: Download the &lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&lt;a href="http://scraptest.googlepages.com/OrkutScrapper2.0.4.xpi"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;OrkutScrapper 2.0.4&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt; and save it on the desktop.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Step 2: Open the Firefox ( If u dont have Firefox , &lt;/span&gt;&lt;/span&gt;&lt;strong&gt;&lt;a href="http://www.mozilla.com/en-US/firefox/"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Download from here&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;)&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Step 3: Drag and drop the downloaded (.xpi) file in the firefox window.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Step 4: An installation window will pop-up, just click install.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Step 5: Restart the Firefox by closing and reopening it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/orkutscrapper-204.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZG_3M9AK22RleoZVqqHFRRjTZWyk8xssj85VPUZfg_z6btjfk_Z81OKs69s_RIN_PUB8vjpMwEBR5nW_c7-ZA4kLsqsgK-VJoRW5N869sfwRlqL0nFVagwCoAFdjj0FJad5_eIBHzGcY/s72-c/orkut-background.gif.png" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author><enclosure length="143453" type="application/octet-stream; charset=UTF-8" url="http://scraptest.googlepages.com/OrkutScrapper2.0.4.xpi"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Hello Orkutters, Here is a good news for ya. Here's one smart addon that will help you to do all those cool things that you just wanted to do on orkut. 1 - Scrapping in regional languages/Changing the look of your profile/Drawing special character images in scraps/Colour effects in scraps and a wide variety of other tools too - all with a simple firefox addon(all tools at one place! wow! Thanks to Binny Mathew) The most significant feature of this addon is that it integrates all the features into one simple toolbar that neatly fits to your scrapbook like the microsoft windows tooolbar.Easy to use,minimum clicks and excellent usability. here are the features. 2 - Now you can scrap in a variety of Different Languages(even those which you don't know) like Tamil, Malayalam,Sanskirt, Oriya,Punjabi,Telugu,Gujarati,Bengali,Kannada etc with ease - just select the scrap text and select the language from the menu - simple as that. No going to other sites or using heavy translators-Thank God(and Binny)! 3 - Change the background of your profile/scrapbook so that your profile stands out from others.This is more like the Myspace layout customization. Really cool and one that all of us was looking forward to.All you need to do is select any picture you like and upload it to an online image storage -like imageshack or photobucket.Copy the direct link url and add it in the options box(From Firefox's ToolsAddonsOptions). Simple! So every time somebody visits you profile they see a totally different profile - enough reason for you to be a star among your friends. ;)Selecting a random image will give you a tiled image, but picking a good one that will fit your profile is upto your creativity. ;) 4 - You can also use character messages in the scrap like Heart, Rainbow coloured text etc. Just select the scrapt text and select the appropriate button. The buttons are all arranged well like the microsoft word buttons - anybody would know how to use them. 5 - Secret Scrapping - This is one significant tool where you can private message your friend and only he can read your scrap. Use the "golden key" near the scrap box to get this done. Installation Help OrkutScrapper 2.0.4 can only be installed in Firefox 1.5 and above versions. Step 1: Download the OrkutScrapper 2.0.4 and save it on the desktop. Step 2: Open the Firefox ( If u dont have Firefox , Download from here) Step 3: Drag and drop the downloaded (.xpi) file in the firefox window. Step 4: An installation window will pop-up, just click install. Step 5: Restart the Firefox by closing and reopening it. by SpyBloggers.</itunes:subtitle><itunes:author>SiNNeR*</itunes:author><itunes:summary>Hello Orkutters, Here is a good news for ya. Here's one smart addon that will help you to do all those cool things that you just wanted to do on orkut. 1 - Scrapping in regional languages/Changing the look of your profile/Drawing special character images in scraps/Colour effects in scraps and a wide variety of other tools too - all with a simple firefox addon(all tools at one place! wow! Thanks to Binny Mathew) The most significant feature of this addon is that it integrates all the features into one simple toolbar that neatly fits to your scrapbook like the microsoft windows tooolbar.Easy to use,minimum clicks and excellent usability. here are the features. 2 - Now you can scrap in a variety of Different Languages(even those which you don't know) like Tamil, Malayalam,Sanskirt, Oriya,Punjabi,Telugu,Gujarati,Bengali,Kannada etc with ease - just select the scrap text and select the language from the menu - simple as that. No going to other sites or using heavy translators-Thank God(and Binny)! 3 - Change the background of your profile/scrapbook so that your profile stands out from others.This is more like the Myspace layout customization. Really cool and one that all of us was looking forward to.All you need to do is select any picture you like and upload it to an online image storage -like imageshack or photobucket.Copy the direct link url and add it in the options box(From Firefox's ToolsAddonsOptions). Simple! So every time somebody visits you profile they see a totally different profile - enough reason for you to be a star among your friends. ;)Selecting a random image will give you a tiled image, but picking a good one that will fit your profile is upto your creativity. ;) 4 - You can also use character messages in the scrap like Heart, Rainbow coloured text etc. Just select the scrapt text and select the appropriate button. The buttons are all arranged well like the microsoft word buttons - anybody would know how to use them. 5 - Secret Scrapping - This is one significant tool where you can private message your friend and only he can read your scrap. Use the "golden key" near the scrap box to get this done. Installation Help OrkutScrapper 2.0.4 can only be installed in Firefox 1.5 and above versions. Step 1: Download the OrkutScrapper 2.0.4 and save it on the desktop. Step 2: Open the Firefox ( If u dont have Firefox , Download from here) Step 3: Drag and drop the downloaded (.xpi) file in the firefox window. Step 4: An installation window will pop-up, just click install. Step 5: Restart the Firefox by closing and reopening it. by SpyBloggers.</itunes:summary><itunes:keywords>Music,Downloads,Freeware,Software,Downloads,Freelancer,s,resources,Resoucres,for,Developers,Free,Web,Templates[Joomla,PHP,Fuzon,PHP,Nuke],E,Books,Encryption,Scripts,PHP,Scripts,Gadget,Reviews,IT,News,Job,Updates,Online,Test,for,GRE,TOEFL,Prep</itunes:keywords></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-9149396878981275995</guid><pubDate>Sat, 08 Sep 2007 12:27:00 +0000</pubDate><atom:updated>2007-09-08T17:42:19.679+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack Window Login Screen</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Windows Hacking</category><title>Hack Window Login Screen</title><description>&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:verdana;color:#ff0000;"&gt;Hack Window Login Screen&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="font-family:verdana;color:#ff0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Windows Logon Screen is something many people doesn't like but just go with it as many don't know how to change it, for this there are two methods, I prefer the second one as it is more easy and but first one is a bit lengthy process, there is no harm in using any of the method but firstly you need to create a &lt;strong&gt;&lt;em&gt;&lt;span style="color:#990000;"&gt;logonui.exe&lt;/span&gt;&lt;/em&gt;&lt;/strong&gt;.&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;here we go....&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;first, get a program like regedit (Google it)&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;look for logonui.exe in your windows/system32 folder.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;MAKE A COPY OF THIS FILE AND PUT IT IN YOUR ROOT FOLDER FOR EASY ACCESS!!!!&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;open it with regedit or another registry key editor, and look around in it. if you want to spend hours painstakingly figuring out how to edit it on your own, be my guest. I haven't bothered even doing that yet... just go to &lt;/span&gt;&lt;a href="http://www.themexp.org/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.themexp.org/&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; and you can find tons of custom themes.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;After you have downloaded your new logon screen, put that somewhere safe, and name it logonui.exe. DON'T try and copy it onto your real logonui while still in the windows envornment!&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;Method I:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;- You can re-start in safemode and try this from the command line, but i have had amazing luck with BartPE. &lt;/span&gt;&lt;a href="http://www.nu2.nu/pebuilder"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://www.nu2.nu/pebuilder&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; if you can't find a new best friend who has a PE disk, you can make your own with the pebuilder on that website. if you don't have it, and you plan on doing a lot of hacks, i would totally recommend this, you'll use it. A LOT...&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;- Assuming you now have something like bartPE, just boot that up (hit F12 or whatever key at the boot screen to bring up your menu. select to boot from cd, and you're good to go.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;- Open the file explorer and copy your new logonui.exe.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;- Go to windows/system32, and delete the original (&lt;strong&gt;&lt;span style="color:#993300;"&gt;make absolutley sure you have your backup&lt;/span&gt;&lt;/strong&gt;) and look for any backups that windows made. (i found only one on my computer: 'logonui.exe.mainframe')&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;- Put your edited file in place (make sure you named it right) and restart.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;the extra file you need to delete is 'logonui.exe.manifest'&lt;br /&gt;There you go.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;Method II:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;get up to the point where you have created or selected your preferred logonui.exe. just rename YOUR logon screen whatever you want (&lt;em&gt;we'll use personallogon.exe&lt;/em&gt;) and put it in the same &lt;em&gt;&lt;span style="color:#660000;"&gt;C:\windows\system32 folder.&lt;/span&gt;&lt;/em&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;open up registry editor (go to start, run, type 'regedit')&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;navigate to this key:&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;select 'Shell'&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;you will notice that the value for this key is C:/Windows/System32/&lt;em&gt;logonui.exe&lt;/em&gt;&lt;/div&gt;&lt;div align="justify"&gt;change this value to (&lt;em&gt;&lt;span style="color:#993300;"&gt;&lt;strong&gt;C:/Windows/System32/personallogon.exe&lt;/strong&gt;&lt;/span&gt;&lt;/em&gt;)&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;bam! far easier than before. log off and you'll see if it worked or not.&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;for more information, &lt;a href="http://www.g4tv.com/attackoftheshow/index.html"&gt;see here&lt;/a&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;br /&gt;Look for more windows hack tutorials in the future!&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;span style="color:#006600;"&gt;&lt;br /&gt;Related Posts:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/limewire-hackers.html"&gt;&lt;br /&gt;LimeWire Hackers&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/hacking-videos.html"&gt;&lt;br /&gt;Extreme Hacking Videos&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/wireless-network-attackers.html"&gt;&lt;br /&gt;Wirless Network Attackers&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/advanced-google-searching-google.html"&gt;&lt;br /&gt;Google Advanced Search KeyWord Hacking&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/hack-window-login-screen.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-460166751552033455</guid><pubDate>Sat, 08 Sep 2007 10:53:00 +0000</pubDate><atom:updated>2007-09-08T16:10:40.523+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Norton AntiVirus</category><title>Norton Anti-virus Sux!</title><description>&lt;p align="center"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#006600;"&gt;&lt;strong&gt;.:: SVICHOSSST Virus ::.&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;When this &lt;strong&gt;&lt;span style="color:#cc0000;"&gt;SVICHOSST Virus&lt;/span&gt;&lt;/strong&gt; infected my computer i was using Norton Antivirus 2007 Full Version. But it didn't &lt;span style="color:#993300;"&gt;detect/remove&lt;/span&gt; it.&lt;br /&gt;Then after getting to remove this virus as mentioned in previous post in this blog &lt;/span&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/07/svichossstexe-virus-guide.html" rel="bookmark"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Guide to Fix SVICHOST.exe or SVICHOSSST.exe&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; again the virus came back. I was like &lt;strong&gt;:S&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;It created an .exe file in all the folders of my C drive (nearly around 3000 files) and slowed down my system. &lt;/span&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Then I installed &lt;strong&gt;&lt;span style="color:#33ccff;"&gt;Kaspersky Anti-virus&lt;/span&gt;&lt;/strong&gt; and I was amazed, it removed all those infected files. So i would suggest you guys to use this Anti-Virus aswell. I'm using it for so many months and it is so effective.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align="center"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;&lt;span style="font-size:100%;color:#336666;"&gt;Download Kaspersky Anti-Virus 7.0.0.125 Full&lt;/span&gt;&lt;br /&gt;&lt;a href="http://3downloads.blogspot.com/2007/08/kaspersky-anti-virus-7.html"&gt;http://3downloads.blogspot.com/2007/08/kaspersky-anti-virus-7.html&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;color:#660000;"&gt;Or&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;color:#336666;"&gt;Download Kaspersky Anti-Virus 6.0&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#660000;"&gt;&lt;a href="http://tryfile.com/content/view/476/26/"&gt;http://tryfile.com/content/view/476/26/&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Hope it help you guys aswell.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#ff0000;"&gt;Related Post:&lt;/span&gt;&lt;/strong&gt; &lt;strong&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/07/svichossstexe-virus-guide.html"&gt;Removal Guide for Svichossst Virus&lt;/a&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/norton-anti-virus-sux.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-2192804377722616795</guid><pubDate>Sat, 08 Sep 2007 09:26:00 +0000</pubDate><atom:updated>2007-09-08T14:57:20.683+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">10 Sites for Music</category><category domain="http://www.blogger.com/atom/ns#">Free Music Downloads</category><category domain="http://www.blogger.com/atom/ns#">Music Download</category><title>10 Sites for Legal Music Downloads</title><description>&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:verdana;color:#cc0000;"&gt;.:: 10 Sites for Legal Music Downloads ::.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#009900;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#663333;"&gt;Nowadays there is much reported about the rise of illegally copied music being made available on the Internet. However, there is also plenty of music on the web that is free and legal. In this post we look at ten sites or services that offer free legal music to download.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="font-size:85%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;a href="http://www.artistserver.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107764739451523250" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRNcB1MuLrBsDRVW11Qdo91gGfk2ZfC-Ty84xreqNZhR3SjAx5FixaQvq_8kyNMIfB7kGzXi7Rb16jc_HSY2uifI_sCiFZ252yIID2I9_mj9aw0hruxR0ikvKdw3M1uLdy6IZGU-fqhS0/s400/artistserver.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;strong&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;ArtistServer.com&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://www.artistserver.com/"&gt;&lt;/a&gt;&lt;a title="ArtistServer.com" href="http://www.artistserver.com/" modo="false"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;ArtistServer&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#663300;"&gt;has been around since 2001, albeit under the name ElectronicScene.com. In 2005 they transformed the site to widen their scope and incorporate social networking features. At its core is a database of over 7,000 songs that can be downloaded for free. An artist’s catalog also has an RSS feed that can be subscribed to like any other feed, allowing the user to keep up to date with any new additions. Photos, videos and blogs from artists complete this interesting site.&lt;/span&gt;&lt;/span&gt;&lt;a id="more-491"&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;a href="http://www.archive.org/browse.php?collection=etree&amp;field=%2Fmetadata%2Fcreator"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107764739451523266" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZxK19KA5S0EXRjDQ60y1gTPba4nushjYaC5ZI7-nDODUXxCeef3DE1yC6dr0AUU-tJsbl8UJ55A0KUroRHcecefV7qexuTbZuA4jnohBE_2ythCqEEQ2LcgNU-lRNqM07jPkebCGOSx4/s400/archive.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Live Music Archive&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://www.archive.org/browse.php?collection=etree&amp;field=%2Fmetadata%2Fcreator"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;The Live Music Archive&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#663333;"&gt;has a large collection of live recordings from a wide range of artists, from David Gray to Mogwai, and there is also a lot of music from lesser known bands. The site runs a policy which does not adhere to any particular set of laws, and states so in its Terms and Conditions, and makes the user responsible for making sure that the content is legal in their own country.&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;/div&gt;&lt;/span&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Archive.org&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;span style="color:#663300;"&gt;Hand in hand with the Live Music Archive is archive.org’s&lt;/span&gt; &lt;/span&gt;&lt;a href="http://www.archive.org/details/audio_music"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;collection of regular mp3s&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;, &lt;span style="color:#663333;"&gt;including a good selection of out-of-copyright music. Although only hardcore fans of pre-1950s music will find this interesting for now, I expect this to become more and more important as time goes on — the early Beatles tracks are due to become public domain in only five years! Update: aside from out of copyright music, there are lots of contemporary tracks available, released under a Creative Commons license.&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://www.epitonic.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107764743746490578" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHKylsWJAGFPnKUrxhw4xVOKfJoDBjSJZSkMNQw3MjKJ2-K-17g3nrm0Briq005LlshkO9y1KK97fz-Fs0aF49W-QEGdbsbKjaN9HYC2fMo7YGK3hyphenhyphen3v1krasibOVxfCvLijMuvcfudlA/s400/epitonic.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Epitonic&lt;/strong&gt;&lt;br /&gt;&lt;span style="color:#993300;"&gt;&lt;a href="http://www.epitonic.com/"&gt;Epitonic&lt;/a&gt; has a great selection of free tunes, ranging from Grandaddy and Mercury Rev, through to Carl Cox, Mr Scruff, Badly Drawn Boy and TV On The Radio. The site is a little confusing at first, but once you work out where the genre and artist lists are, its fairly simple from there on in. Epitonic also has a large number of online radio stations based on several genres and subgenres that are worth a listen.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://garageband.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107764743746490594" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhk3GOg8VhKZB8ZQWwqCyq-k_PnHTVCUDoRF539_O10QfyARKoh3TVCGGL6MuTtjDH7IH_BDGUPKlScocVfZwDVH-cukGJ2KqdrhBwLlLQIBj4NL4G1_V8Rd8dGl0N6BeTjHqV6-RC3uZA/s400/garageband.png" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;strong&gt;GarageBand The mighty&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;a href="http://garageband.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;GarageBand&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;, &lt;span style="color:#666666;"&gt;the unsigned band promotion and social review network, has proved to be the catalyst for success for a few bands in the States. After uploading their tracks on GarageBand and then being favourably rated, they have gone on to be offered contracts and even made it to the Billboard charts (the band “10 Years” hit number one with “Wasteland” in 2006 by doing just this). The site covers a wide range of genres and offers a large number of tunes for download. The majority of artists will be unknown to most people, due to the nature of the site, but the review and rating system makes it easy to pinpoint and listen to the most popular tracks.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a href="http://music.download.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107764743746490610" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhQxZvUEFgjwTsmVo2-PtF1G7PdLgUe5lJNPsv0eA6rQtH7SUpACApMxfpDt-xtO4TtzeizoJBLawN_JS9_0cPKjfiCsTAOoWH2YGt5d9ie7FyLYroPeraE2HOSLrkO1Cl0vMW_n-61HyE/s400/download.png" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Download.com&lt;/strong&gt;&lt;/span&gt;&lt;a href="http://www.last100.com/2007/08/17/10-sites-for-free-legal-music/{http://music.download.com/3608-5_32-0.html?tag=MDL_all_songs&amp;searchType=3608&amp;amp;orderby=-uoRating"&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;CNET’s&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;a title="Download.com" href="http://music.download.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Download.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#660000;"&gt;offers a music section which combines an online store and a repository for free and less widely known music. Fortunately they’ve realised that a lot of people come by solely for the free tracks and have provided a&lt;/span&gt; &lt;/span&gt;&lt;a href="http://music.download.com/3608-5_32-0.html?tag=MDL_all_songs&amp;searchType=3608&amp;amp;orderby=-uoRating"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;direct link&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;. &lt;span style="color:#660000;"&gt;Again, the music is generally from unknown and unsigned artists, but the range and quantity of material here is staggering — at the last count it stood at 75,425 free MP3s!&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGtEw9nm_refILInb4mrrgFijejjdejLw-n7lXf3VP30iXZ2YXa4hhpdxHZrz8Tx-G_LMeUmFEO-ThM1v9qYxejr0cm4aLoGlHa869WeML21t5wccs8qbLj_NFYSCPTXquHSUTJmv4238/s1600-h/spiralfrog.jpg"&gt;&lt;/a&gt;&lt;span style="font-family:verdana;"&gt;&lt;div align="justify"&gt;&lt;br /&gt;&lt;/div&gt;&lt;span style="font-size:85%;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.spiralfrog.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107763974947344498" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnMKX1d0Uf95czIe8uH0wQql-j8G4UedyEw-ky8M7t2yDMgsKKeKlLPd9Sg_BhnPC-i3kop0qvf9t3yLdaL7ASFSgALA7P7yPG0U4hPzr9NJpLeiAbDNG9HVudZ2vgTxA26zCvJpKkH30/s400/spiralfrog.jpg" border="0" /&gt; &lt;p align="justify"&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;SpiralFrog&lt;/strong&gt;&lt;/span&gt;&lt;a href="http://www.spiralfrog.com/"&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;span style="color:#993399;"&gt;Bit of a blind recommendation this one, but&lt;/span&gt; &lt;/span&gt;&lt;a href="http://www.spiralfrog.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;SpiralFrog&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#663366;"&gt;has just entered limited beta, with a view to launch later this year. Its proposed model is interesting — downloads will be free, from a number of labels (Universal seems to be the biggest backer at the moment) with a potential catalogue of 700,000+ tracks, but users will be made to view advertisements while each track is downloading. I dont know how this will work in practice (i.e. will download speeds be throttled back to give more advertising time) but in theory it sounds like a good deal. Unfortunately the service is only available in the US and Canada at the moment, but I expect it to be available in other countries if it takes off in North America.&lt;/span&gt; &lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;a href="http://www.amazon.com/Digital-Music-Downloads/b/ref=sv_j_7/105-6563252-0471642?ie=UTF8&amp;node=468646"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107763974947344514" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2REiOSSwmzgiBDNUQat7S2tHrzEXhu1SGSkWx_vIVfRBcI-tvmyeWlCdp45qLTFFUdJywYITXt7BaE7I9N5e1Mrms6sB-CCtYuceCXT5kMlJXT_3dXtd2lMxCiJBec24cl4b6QI4Vx6I/s400/amazon.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Amazon.com&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://www.amazon.com/Digital-Music-Downloads/b/ref=sv_j_7/105-6563252-0471642?ie=UTF8&amp;node=468646"&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;The popular one-stop-shop has a small &lt;/span&gt;&lt;a href="http://www.amazon.com/Digital-Music-Downloads/b/ref=sv_j_7/105-6563252-0471642?ie=UTF8&amp;amp;node=468646" modo="false"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;selection of tracks available for download for free&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;. These are changed regularly, but are often by known artists.&lt;/span&gt;&lt;/p&gt;&lt;div align="justify"&gt;&lt;a href="http://www.apple.com/itunes/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107763979242311826" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjtOBfepr80Dh6BpgQS9s_wISPjbZzFH9QjzCaqgdq29BlygKcDOJMRaESSCxrI8A0UVC_VXk61QpbxpkanAG5x3UniIu-Zl0G6p1eCgwg325O09ZcuHNodMNBVWrvCbJW-1ITHupBeOmA/s400/itunes.jpg" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;strong&gt;iTunes&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://www.apple.com/itunes/"&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;&lt;span style="color:#660000;"&gt;Its also worth mentioning that&lt;/span&gt; &lt;/span&gt;&lt;a href="http://www.apple.com/itunes/"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Apple’s music store&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#660000;"&gt;also offers free tracks, usually by up and coming artists. The list varies depending on which country you are in. [Ed.&lt;/span&gt; &lt;/span&gt;&lt;a href="http://www.itsfreedownloads.com/" modo="false"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;this website&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#660000;"&gt;keeps track of what music is being offered for free on iTunes each week.] &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#cc0000;"&gt;&lt;/span&gt; &lt;/div&gt;&lt;div align="justify"&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#66cccc;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="justify"&gt;&lt;/div&gt;&lt;a href="http://www.emusic.com/lyra"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;img id="BLOGGER_PHOTO_ID_5107763979242311842" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdkZvVe8f2kn18wMbvYn9ndVN3Es-Atc8PDoELq4hxqKxRXV3fPveIoE7JSFRmv1lpQeJpi8vnZ-3mxIw7sBB3Er7tz3dl3xMLkMCQN5pjIG0KrxZcZGVfzC7vyvqi9eptqhO8571oKfo/s400/emusic.gif" border="0" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;eMusic&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;div align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#006600;"&gt;eMusic is a digital music store that doesn’t offer free downloads per se, but I thought it was worth including because some of the introductory offers let you &lt;/span&gt;&lt;a href="http://www.emusic.com/lyra" modo="false"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;download 100 free tracks&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; &lt;span style="color:#006600;"&gt;in the first month, after which you’re free to can cancel your membership and it wont cost a penny!&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p align="justify"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;Note:&lt;/strong&gt;&lt;span style="color:#cc0000;"&gt;We’ve probably only scratched the surface, so if you know of any more places on the web where you can download free and legal music, please add those in the comments.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/10-sites-for-legal-music-downloads.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjRNcB1MuLrBsDRVW11Qdo91gGfk2ZfC-Ty84xreqNZhR3SjAx5FixaQvq_8kyNMIfB7kGzXi7Rb16jc_HSY2uifI_sCiFZ252yIID2I9_mj9aw0hruxR0ikvKdw3M1uLdy6IZGU-fqhS0/s72-c/artistserver.jpg" width="72"/><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-7142934163154445362</guid><pubDate>Sat, 08 Sep 2007 07:58:00 +0000</pubDate><atom:updated>2007-09-08T14:17:31.663+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Protect Children</category><title>Protect Childen</title><description>&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:verdana;color:#cc0000;"&gt;Protect Your Childen From Inappropriate Internet Content&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#663300;"&gt;The Internet has become an indispensable tool for our lives. Nowadays it is very common for families to have a computer at home with Internet access. But many parents are worried about what their children are able to see on the Internet.&lt;br /&gt;The Internet can help children to learn and do research on school subjects. But unfortunately, children can also be exposed to the negative content of the Internet. There have been studies showing that many children have been accidentally exposed to obscene pop-up ads or other type of negative content.&lt;br /&gt;A good effort to minimize the exposure of your children to this negative content is installing a parental control and Internet filtering software. The one I can recommend is called K9 Web Protection. This is a free software.&lt;br /&gt;After installing this software, it can detect negative content and block it. Access to inappropriate content is controlled using a password.&lt;br /&gt;By default, it will protect from adult content, security threats, illegal activity, sexually-related sites and online community sites. But it can be configured to different levels of protection depending on your choices of categories.&lt;br /&gt;You can also view a list of all the sites that have been visited, even those that were blocked.&lt;br /&gt;There is even a time restriction feature. You can decide the time and days of the week that the computer can have web access.&lt;br /&gt;Additionally, you can allow access to certain sites and block other sites as well.&lt;br /&gt;You can even setup a dog to bark every time a negative content is blocked. And don't forget, it's free for home use. All you will need is to register your email address so they can send you a License to install it.&lt;br /&gt;If you decide to download it please visit &lt;/span&gt;&lt;a href="http://www.k9webprotection.com/" target="_blank"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#3366ff;"&gt;the K9 Web Protection site&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;span style="color:#663300;"&gt;If you want to learn more about how to make the Internet safer for your family, there are lots of website with information about this. One I found is www.safekids.com. They have a list called Kids Rules for Online Safety that you can read there.&lt;br /&gt;The purpose of my articles is to share my experience on computers and technology with you. My free advice might help you on your business or home computer. There is a lot we can do with computers nowadays and many of the software I recommend mostly is available for free. Please visit my website.&lt;br /&gt;&lt;/span&gt;Article Source: &lt;/span&gt;&lt;a href="http://ezinearticles.com/?expert=Aaron_Garcia"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://EzineArticles.com/?expert=Aaron_Garcia&lt;/span&gt;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/protect-childen.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-309774111295513388</guid><pubDate>Sat, 08 Sep 2007 07:52:00 +0000</pubDate><atom:updated>2007-09-08T14:16:19.132+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Free Downloads</category><category domain="http://www.blogger.com/atom/ns#">PSP Downloads</category><title>Free PSP Downloads</title><description>&lt;p align="center"&gt;&lt;span style="font-family:verdana;font-size:130%;color:#3333ff;"&gt;&lt;strong&gt;::: Free PSP Downloads :::&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#cc6600;"&gt;There is a big myth about getting free &lt;strong&gt;&lt;span style="color:#999999;"&gt;PSP downloads&lt;/span&gt;&lt;/strong&gt; without paying any cent online. But is it that true? I mean it sounds way too good to be true, doesn't it? Well, in some cases in is true, you CAN get free PSP downloads but not the way you think you would. The problem is they are not really that free.&lt;br /&gt;All the ads you see about free PSP downloads, on Yahoo, Google, MSN, everywhere they say it's all free. Not really. Most of these PSP download services charge a lifetime fee which costs around $35, that's like $0.43/year in case you will live for 80 years. Though, is it really worth?&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#cc0000;"&gt;I think it is, I mean I am pretty much sure it is worth it, just imagine how many free PSP downloads you can get over such long period? Despite that fact that free PSP downloads are not really free, I still think it's a good deal and every PSP fan should have a membership.&lt;br /&gt;And it's not just that you get free PSP downloads for 40 cents a year, but there are also amazing bonuses which can improve your PSP dramatically, for example PSP video converter can convert your DVD's so you can watch them on your PSP and you get that for free after you join.&lt;/span&gt;&lt;/p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;span style="color:#660000;"&gt;Are there any pros and cons having a free PSP download service? Here's what I've discovered during my two month membership period. Yes, I have been a member of a free PSP download service for two months now.&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Pros:&lt;/strong&gt; &lt;span style="color:#cc0000;"&gt;You can free PSP download at any time, any day, any minute, they are pretty fast, the member area has lot's of cool bonuses and features. The staff will respond as fast as possible. Took them about 12 hours to answer me. They have video instructions about how to start your free PSP downloads. Plus they have a money back guarantee so you can quit within 8 weeks.&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Cons:&lt;/strong&gt; I&lt;span style="color:#660000;"&gt; have to pay the membership fee, hmm, strange, but I can't tell any other cons, I am pretty happy with them.&lt;br /&gt;&lt;/span&gt;&lt;span style="color:#ff6666;"&gt;So which free PSP download service would I recommend? I actually have tried only one, which you can read review about below.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Read detailed review about &lt;/span&gt;&lt;a href="http://pspmonster.blogspot.com/" target="_new"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;PSP Blender&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; and get &lt;/span&gt;&lt;a href="http://pspmonster.blogspot.com/" target="_new"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;FREE PSP downloads&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt; instantly. Walter Seth is a PSP addict and loves to download movies and games on his PSP.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Article Source: &lt;/span&gt;&lt;a href="http://ezinearticles.com/?expert=Walter_Seth"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;http://EzineArticles.com/?expert=Walter_Seth&lt;/span&gt;&lt;/a&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/free-psp-downloads.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-4196302050206916613</guid><pubDate>Mon, 03 Sep 2007 15:34:00 +0000</pubDate><atom:updated>2007-09-03T20:49:43.497+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">100 Oldest Domains</category><category domain="http://www.blogger.com/atom/ns#">Domains</category><title>100 Oldest Domains On Internet</title><description>&lt;div align="center"&gt;&lt;span style="font-family:verdana;color:#660000;"&gt;&lt;strong&gt;The 100 oldest domains on the internet&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;To satisfy my curiosity, I went in search of the earliest adopters of the World Wide Web as we know it today and to my surprise there were WWW dns entries that go back as far as 1985…can you believe that…now who was browsing the internet back in 1985 (other than Al Gore). Anyways, the list below represents the 100 first domains ever registered on the internet…it includes some expected names, some unexpected names and some notable missing names.(NB. Entries registered on the same days are in random order on that day.)&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:Verdana;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;1. 15-Mar-1985 &lt;a href="http://www.symbolics.com/"&gt;http://www.symbolics.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;2. 24-Apr-1985 &lt;a href="http://www.bbn.com/"&gt;http://www.bbn.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;3. 24-May-1985 &lt;a href="http://www.think.com/"&gt;http://www.think.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;4. 11-Jul-1985 &lt;a href="http://www.mcc.com/"&gt;http://www.mcc.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;5. 30-Sep-1985 &lt;a href="http://www.dec.com/"&gt;http://www.dec.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;6. 07-Nov-1985 &lt;a href="http://www.northrop.com/"&gt;http://www.northrop.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;7. 09-Jan-1986 &lt;a href="http://www.xerox.com/"&gt;http://www.xerox.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;8. 17-Jan-1986 &lt;a href="http://www.sri.com/"&gt;http://www.sri.com/&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;9&lt;/span&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;. 03-Mar-1986 &lt;a href="http://www.hp.com/"&gt;http://www.hp.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;10. 05-Mar-1986 &lt;a href="http://www.bellcore.com/"&gt;http://www.bellcore.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;11. 19-Mar-1986 &lt;a href="http://www.ibm.com/"&gt;http://www.ibm.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;12. 19-Mar-1986 &lt;a href="http://www.sun.com/"&gt;http://www.sun.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;13. 25-Mar-1986 &lt;a href="http://www.intel.com/"&gt;http://www.intel.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;14. 25-Mar-1986 &lt;a href="http://www.ti.com/"&gt;http://www.ti.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;15. 25-Apr-1986 &lt;a href="http://www.att.com/"&gt;http://www.att.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;16. 08-May-1986 &lt;a href="http://www.gmr.com/"&gt;http://www.gmr.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;17. 08-May-1986 &lt;a href="http://www.tek.com/"&gt;http://www.tek.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;18. 10-Jul-1986 &lt;a href="http://www.fmc.com/"&gt;http://www.fmc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;19. 10-Jul-1986 &lt;a href="http://www.ub.com/"&gt;http://www.ub.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;20. 05-Aug-1986 &lt;a href="http://www.bell-atl.com/"&gt;http://www.bell-atl.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;21. 05-Aug-1986 &lt;a href="http://www.ge.com/"&gt;http://www.ge.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;22. 05-Aug-1986 &lt;a href="http://www.grebyn.com/"&gt;http://www.grebyn.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;23. 05-Aug-1986 &lt;a href="http://www.isc.com/"&gt;http://www.isc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;24. 05-Aug-1986 &lt;a href="http://www.nsc.com/"&gt;http://www.nsc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;25. 05-Aug-1986 &lt;a href="http://www.stargate.com/"&gt;http://www.stargate.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;26. 02-Sep-1986 &lt;a href="http://www.boeing.com/"&gt;http://www.boeing.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;27. 18-Sep-1986 &lt;a href="http://www.itcorp.com/"&gt;http://www.itcorp.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;28. 29-Sep-1986 &lt;a href="http://www.siemens.com/"&gt;http://www.siemens.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;29. 18-Oct-1986 &lt;a href="http://www.pyramid.com/"&gt;http://www.pyramid.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;30. 27-Oct-1986 &lt;a href="http://www.alphacdc.com/"&gt;http://www.alphacdc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;31. 27-Oct-1986 &lt;a href="http://www.bdm.com/"&gt;http://www.bdm.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;32. 27-Oct-1986 &lt;a href="http://www.fluke.com/"&gt;http://www.fluke.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;33. 27-Oct-1986 &lt;a href="http://www.inmet.com/"&gt;http://www.inmet.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;34. 27-Oct-1986 &lt;a href="http://www.kesmai.com/"&gt;http://www.kesmai.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;35. 7-Oct-1986 &lt;a href="http://www.mentor.com/"&gt;http://www.mentor.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;36. 7-Oct-1986 &lt;a href="http://www.nec.com/"&gt;http://www.nec.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;37. 27-Oct-1986 &lt;a href="http://www.ray.com/"&gt;http://www.ray.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;38. 27-Oct-1986 &lt;a href="http://www.rosemount.com/"&gt;http://www.rosemount.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;39. 27-Oct-1986 &lt;a href="http://www.vortex.com/"&gt;http://www.vortex.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;40. 05-Nov-1986 &lt;a href="http://www.alcoa.com/"&gt;http://www.alcoa.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;41. 05-Nov-1986 &lt;a href="http://www.gte.com/"&gt;http://www.gte.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;42. 17-Nov-1986 &lt;a href="http://www.adobe.com/"&gt;http://www.adobe.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;43. 17-Nov-1986 &lt;a href="http://www.amd.com/"&gt;http://www.amd.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;44. 17-Nov-1986 &lt;a href="http://www.das.com/"&gt;http://www.das.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;45. 17-Nov-1986 &lt;a href="http://www.data-io.com/"&gt;http://www.data-io.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;46. 17-Nov-1986 &lt;a href="http://www.octopus.com/"&gt;http://www.octopus.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;47. 17-Nov-1986 &lt;a href="http://www.portal.com/"&gt;http://www.portal.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;48. 17-Nov-1986 &lt;a href="http://www.teltone.com/"&gt;http://www.teltone.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;49. 11-Dec-1986 &lt;a href="http://www.3com.com/"&gt;http://www.3com.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;50. 11-Dec-1986 &lt;a href="http://www.amdahl.com/"&gt;http://www.amdahl.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;51. 11-Dec-1986 &lt;a href="http://www.ccur.com/"&gt;http://www.ccur.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;52. 11-Dec-1986 &lt;a href="http://www.ci.com/"&gt;http://www.ci.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;53. 11-Dec-1986 &lt;a href="http://www.convergent.com/"&gt;http://www.convergent.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;54. 11-Dec-1986 &lt;a href="http://www.dg.com/"&gt;http://www.dg.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;55. 11-Dec-1986 &lt;a href="http://www.peregrine.com/"&gt;http://www.peregrine.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;56. 11-Dec-1986 &lt;a href="http://www.quad.com/"&gt;http://www.quad.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;57. 11-Dec-1986 &lt;a href="http://www.sq.com/"&gt;http://www.sq.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;58. 11-Dec-1986 &lt;a href="http://www.tandy.com/"&gt;http://www.tandy.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;59. 11-Dec-1986 &lt;a href="http://www.tti.com/"&gt;http://www.tti.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;60. 11-Dec-1986 &lt;a href="http://www.unisys.com/"&gt;http://www.unisys.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;61. 19-Jan-1987 &lt;a href="http://www.cgi.com/"&gt;http://www.cgi.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;62. 19-Jan-1987 &lt;a href="http://www.cts.com/"&gt;http://www.cts.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;63. 19-Jan-1987 &lt;a href="http://www.spdcc.com/"&gt;http://www.spdcc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;64. 19-Feb-1987 &lt;a href="http://www.apple.com/"&gt;http://www.apple.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;65. 04-Mar-1987 &lt;a href="http://www.nma.com/"&gt;http://www.nma.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;66. 04-Mar-1987 &lt;a href="http://www.prime.com/"&gt;http://www.prime.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;67. 04-Apr-1987 &lt;a href="http://www.philips.com/"&gt;http://www.philips.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;68. 23-Apr-1987 &lt;a href="http://www.datacube.com/"&gt;http://www.datacube.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;69. 23-Apr-1987 &lt;a href="http://www.kai.com/"&gt;http://www.kai.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;70. 23-Apr-1987 &lt;a href="http://www.tic.com/"&gt;http://www.tic.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;71. 23-Apr-1987 &lt;a href="http://www.vine.com/"&gt;http://www.vine.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;72. 30-Apr-1987 &lt;a href="http://www.ncr.com/"&gt;http://www.ncr.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;73. 14-May-1987 &lt;a href="http://www.cisco.com/"&gt;http://www.cisco.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;74. 14-May-1987 &lt;a href="http://www.rdl.com/"&gt;http://www.rdl.com/&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;75. 20-May-1987 &lt;a href="http://www.slb.com/"&gt;http://www.slb.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;76. 27-May-1987 &lt;a href="http://www.parcplace.com/"&gt;http://www.parcplace.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;77. 27-May-1987 &lt;a href="http://www.utc.com/"&gt;http://www.utc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;78. 26-Jun-1987 &lt;a href="http://www.ide.com/"&gt;http://www.ide.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;79. 09-Jul-1987 &lt;a href="http://www.trw.com/"&gt;http://www.trw.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;80. 13-Jul-1987 &lt;a href="http://www.unipress.com/"&gt;http://www.unipress.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;81. 27-Jul-1987 &lt;a href="http://www.dupont.com/"&gt;http://www.dupont.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;82. 27-Jul-1987 &lt;a href="http://www.lockheed.com/"&gt;http://www.lockheed.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;83. 28-Jul-1987 &lt;a href="http://www.rosetta.com/"&gt;http://www.rosetta.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;84. 18-Aug-1987 &lt;a href="http://www.toad.com/"&gt;http://www.toad.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;85. 31-Aug-1987 &lt;a href="http://www.quick.com/"&gt;http://www.quick.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;86. 03-Sep-1987 &lt;a href="http://www.allied.com/"&gt;http://www.allied.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;87. 03-Sep-1987 &lt;a href="http://www.dsc.com/"&gt;http://www.dsc.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;88. 03-Sep-1987 &lt;a href="http://www.sco.com/"&gt;http://www.sco.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;89. 22-Sep-1987 &lt;a href="http://www.gene.com/"&gt;http://www.gene.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;90. 22-Sep-1987 &lt;a href="http://www.kccs.com/"&gt;http://www.kccs.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;91. 22-Sep-1987 &lt;a href="http://www.spectra.com/"&gt;http://www.spectra.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;92. 22-Sep-1987 &lt;a href="http://www.wlk.com/"&gt;http://www.wlk.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;93. 30-Sep-1987 &lt;a href="http://www.mentat.com/"&gt;http://www.mentat.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;94. 14-Oct-1987 &lt;a href="http://www.wyse.com/"&gt;http://www.wyse.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;95. 02-Nov-1987 &lt;a href="http://www.cfg.com/"&gt;http://www.cfg.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;96. 09-Nov-1987 &lt;a href="http://www.marble.com/"&gt;http://www.marble.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;97. 16-Nov-1987 &lt;a href="http://www.cayman.com/"&gt;http://www.cayman.com/&lt;/a&gt; &lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;97. 16-Nov-1987 &lt;a href="http://www.entity.com/"&gt;http://www.entity.com/&lt;/a&gt; &lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;99. 24-Nov-1987 &lt;a href="http://www.ksr.com/"&gt;http://www.ksr.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#990000;"&gt;100. 30-Nov-1987 &lt;a href="http://www.nynexst.com/"&gt;http://www.nynexst.com/&lt;/a&gt; &lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;span style="font-size:85%;color:#990000;"&gt;&lt;/span&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/09/100-oldest-domain-on-internet.html</link><thr:total>1</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-995075793686026965</guid><pubDate>Thu, 23 Aug 2007 15:11:00 +0000</pubDate><atom:updated>2007-09-08T17:44:41.970+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">GooGle</category><title>Advanced Google Searching (Google Hacking)</title><description>&lt;div align="justify"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg249TpodtzPjUUcEV6APqJIkHPEeRPhcO837JebztiAtV-VIFWW2sgnMWd8_fEPtY0cBAyamCHkP_2G8CLRtRtUHdQ6T9DR1Ku8ODDC09fJByH3PmiBZ-CaXrF7Mjk5nSq0nVbbjVffd8/s1600-h/googlething.jpg"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914349749276690" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg249TpodtzPjUUcEV6APqJIkHPEeRPhcO837JebztiAtV-VIFWW2sgnMWd8_fEPtY0cBAyamCHkP_2G8CLRtRtUHdQ6T9DR1Ku8ODDC09fJByH3PmiBZ-CaXrF7Mjk5nSq0nVbbjVffd8/s400/googlething.jpg" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt; Google is a powerful search engine that hackers often use it to find passwords, and confidential or sensitive documents that companies do not realize are even available to the public. Most computer people use Google, but do not know how to use all of its search parameters. The term "google hacking" is a method used by unscrupulous people to not only uncovers sensitive data, but also to expose web server vulnerabilities. Here I list several Google search parameters and examples.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6aKqyQEkX4fbpSs3AEJT_W2JSUfi2qCBr_H7p9DtKa1U7A_RGw7QhjKgBwFC9OBBXmw6Cr3Yg5uWs5lyrwiJfTJiZbzwBC7w4Qi9OlMwnWlv9xO7VKciOcIi5j2nW7KzDBjT-Cgw4-E4/s1600-h/1.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914354044244002" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi6aKqyQEkX4fbpSs3AEJT_W2JSUfi2qCBr_H7p9DtKa1U7A_RGw7QhjKgBwFC9OBBXmw6Cr3Yg5uWs5lyrwiJfTJiZbzwBC7w4Qi9OlMwnWlv9xO7VKciOcIi5j2nW7KzDBjT-Cgw4-E4/s400/1.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="color:#660000;"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;The syntax "filetype:" instructs Google to search for files on the Internet with specific extensions. For example: filetype:doc site:gov confidential Google will produce all the word documents, from all the gov domains that may contain the word confidential. Another example is, filetype:pdf site:com access-list. You may use any domain type, (com, gov, edu…)&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0sOdYmu4hIgg43eisNtb2ZB08iJhNH4WSP2lu5iQwf0XxePFglT7OKFqFJRcJIY-YlVLnS_f-CVN9apZvc5pFLHIJ38Ylc07EqCJ3G44GrWh5p-VBz1Y93Jwu_YtO6EJ85zUXfwW6ODY/s1600-h/2.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914354044244018" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0sOdYmu4hIgg43eisNtb2ZB08iJhNH4WSP2lu5iQwf0XxePFglT7OKFqFJRcJIY-YlVLnS_f-CVN9apZvc5pFLHIJ38Ylc07EqCJ3G44GrWh5p-VBz1Y93Jwu_YtO6EJ85zUXfwW6ODY/s400/2.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="color:#660000;"&gt; &lt;span style="font-family:verdana;font-size:85%;"&gt;The syntax "cache:" will display the version of the web page that Google has in its cache. For Example: "cache:www.microsoft.com" will display Google's cache of the Microsoft homepage.&lt;/span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLFgTrDj9pQYkBhV274nSu4CUP4RPo7dT6h8Qf_W7_ickduPNN85RCNHGCh57z39n144YDFjJD2u_9gGk3Se6eIkDFCmT-zE6RaLiKFnGua1-zXoozyirH2nxaVqIK7dG2QLK98kxRGsg/s1600-h/3.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914358339211330" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLFgTrDj9pQYkBhV274nSu4CUP4RPo7dT6h8Qf_W7_ickduPNN85RCNHGCh57z39n144YDFjJD2u_9gGk3Se6eIkDFCmT-zE6RaLiKFnGua1-zXoozyirH2nxaVqIK7dG2QLK98kxRGsg/s400/3.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;The syntax "intext" searches for the words within a specific website and ignores the URLs and page titles. For example: intext:confidential will return only links to those web pages that has the search keyword " confidential " in its webpage.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI7KPXGiaBTBpjGVaqPcjbS1L6kPVLLJi4ta7lSWdViXuSHj4xWNAl_F4l0GxmSKV0yvxIGAIkppw1Y8oXgBTB2u8Fqs0gbr2UIr9tbpcGqtrkhiVCzh6Ft3SD5GCkYaWgk2kjhIgrISE/s1600-h/4.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914358339211346" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhI7KPXGiaBTBpjGVaqPcjbS1L6kPVLLJi4ta7lSWdViXuSHj4xWNAl_F4l0GxmSKV0yvxIGAIkppw1Y8oXgBTB2u8Fqs0gbr2UIr9tbpcGqtrkhiVCzh6Ft3SD5GCkYaWgk2kjhIgrISE/s400/4.JPG" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;The syntax "intitle:" instructs Google to search for pages that contain the words behind intitle: For example intitle:index of master.passwd will return pages within Unix or Linux where the master.passwd files are. /etc/passwd "allintitle:" will produce a list of all words in the title. Google will ignore the slashes.&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;"&gt;&lt;strong&gt;intitle: examples:&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"Index of" .sh_history&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"Index of" .bash_history&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" passwd&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" people.lst&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" pwd.db&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" etc/shadow&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" spwd&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" master.passwd&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" htpasswd&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" members OR accounts&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;intitle:"index of" user_carts OR user_cart&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;allintitle: sensitive filetype:doc&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;allintitle: restricted filetype :mail&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;&lt;strong&gt;allintitle: restricted filetype:doc site:gov&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN1YSkZGlmfKaw43tqNPG58uZ1fuQXF1wiBcMHPyCb73cZIDzHtDRN__cc8fNU8hVEfYjKqxUnKcu_90D5e5bFn_rJD43tGaCzo3_hh3QYr7dLkwWquPcAOhYN6R1mQtmrtuSW71tsMWw/s1600-h/5.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101913997561958338" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN1YSkZGlmfKaw43tqNPG58uZ1fuQXF1wiBcMHPyCb73cZIDzHtDRN__cc8fNU8hVEfYjKqxUnKcu_90D5e5bFn_rJD43tGaCzo3_hh3QYr7dLkwWquPcAOhYN6R1mQtmrtuSW71tsMWw/s400/5.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;The syntax "inurl:" instructs Google to search for pages that contain specific words or characters included in the URL such as this inurl:windows. The results of this query will produce such pages that have the word "windows" in it. allinurl: will produces the results of URLs with all of the specified words in its query. allinurl:windows/cracks.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:Verdana;font-size:85%;color:#660000;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;inurl: examples:&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span style="font-family:Verdana;font-size:85%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:admin filetype:txt&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:admin filetype:db&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:admin filetype:cfg&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:mysql filetype:cfg&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:passwd filetype:txt&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:iisadmin&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:auth_user_file.txt&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:orders.txt&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:"wwwroot/*."&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:adpassword.txt&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:webeditor.php&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:file_upload.php&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;inurl:gov filetype:xls "restricted"&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlod7xtHK885kT7eNwtvyAWkI0JMnhY-EaoEx7oms3Ah7yo4GF4HZx8ziZg0xq5lbRfXaBOGAZhjxSQRhY0jJ2XK2-6JLmNcDJnfa0XLNAyiLCmqLLsFg3hDnEPRDSzgIYXPJcYf4lPTA/s1600-h/6.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914001856925650" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlod7xtHK885kT7eNwtvyAWkI0JMnhY-EaoEx7oms3Ah7yo4GF4HZx8ziZg0xq5lbRfXaBOGAZhjxSQRhY0jJ2XK2-6JLmNcDJnfa0XLNAyiLCmqLLsFg3hDnEPRDSzgIYXPJcYf4lPTA/s400/6.JPG" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;The syntax "link:" will produce a list of webpages that have a link to a specified webpage. For example: link:www.thenetworkadministrator.com will create a Google list of websites with links to &lt;/span&gt;&lt;a href="http://www.thenetworkadministrator.com/"&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;www.thenetworkadministrator.com&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;.&lt;/span&gt; &lt;/p&gt;&lt;p&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg9-X3EpbWOP33kTJ1_oyvtsNjdNjr6UGKzFAQdO7-DdKGS3hYZ-arAFD-Hgyw2PGwwwmGg6jhpk4F5JQvIhcATahGp3LaXGgXJarA6lUJX3WCP-aTfe5S7eARGKDQ9mPc3b9SWoTY7NU/s1600-h/7.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914001856925666" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgg9-X3EpbWOP33kTJ1_oyvtsNjdNjr6UGKzFAQdO7-DdKGS3hYZ-arAFD-Hgyw2PGwwwmGg6jhpk4F5JQvIhcATahGp3LaXGgXJarA6lUJX3WCP-aTfe5S7eARGKDQ9mPc3b9SWoTY7NU/s400/7.JPG" border="0" /&gt;&lt;/a&gt; &lt;span style="font-size:85%;color:#660000;"&gt;The Google syntax "phonebook" searches for U.S. street addresses and phone number information. For Example: "phonebook:James+FL" will list down all names of person having "James" in their names and located in "Florida (FL)".&lt;/span&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji-viDrpNQ0DBO2oG4pgCZQt6GbmufEXb96TSZabZd3gglnhSD0_AbHGRj0xlAh9DX3YYYlRSfA5Zt31emFbghyZdpGgakCpO-GWLEdh5sPenzmBbeTJGEHDnmDV69hz4iA-rNAKzKaPc/s1600-h/8.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914001856925682" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEji-viDrpNQ0DBO2oG4pgCZQt6GbmufEXb96TSZabZd3gglnhSD0_AbHGRj0xlAh9DX3YYYlRSfA5Zt31emFbghyZdpGgakCpO-GWLEdh5sPenzmBbeTJGEHDnmDV69hz4iA-rNAKzKaPc/s400/8.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:verdana;font-size:85%;color:#660000;"&gt;The syntax related: lists web pages that are "similar" to a specific web page. For Example: related:www.thenetworkadministrator.com will list web pages that are similar to that of TheNetworkAdministrator's homepage.&lt;/span&gt;&lt;br /&gt;&lt;/p&gt;&lt;p&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNlo8YVHo84moTRTfxhyjXfVO7WuPAYfnGFMbZIso9m5pnOjhygMG4Mi4Znwe7Kv2mJoRV_UtGykJwP5O72jRaiO4rjyCEr5OCQAfTPoEFbY8_aejBBSFQEp1RN3O10BUijxGaz7qjwm8/s1600-h/9.JPG"&gt;&lt;img id="BLOGGER_PHOTO_ID_5101914006151892994" style="DISPLAY: block; MARGIN: 0px auto 10px; CURSOR: hand; TEXT-ALIGN: center" alt="" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgNlo8YVHo84moTRTfxhyjXfVO7WuPAYfnGFMbZIso9m5pnOjhygMG4Mi4Znwe7Kv2mJoRV_UtGykJwP5O72jRaiO4rjyCEr5OCQAfTPoEFbY8_aejBBSFQEp1RN3O10BUijxGaz7qjwm8/s400/9.JPG" border="0" /&gt;&lt;/a&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="color:#660000;"&gt;&lt;br /&gt;&lt;span style="font-size:85%;"&gt;The syntax site: instructs Google to search for keywords in a particular site or domain. For example: exchange site:microsoft.com will search for the keywords "exchange" in those web pages in all the links of the domain microsoft.com.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;&lt;br /&gt;Related Posts:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/limewire-hackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;LimeWire Hackers&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/hacking-videos.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Extreme Hacking Videos&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/wireless-network-attackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Wirless Network Attackers&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/hack-window-login-screen.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Hacking Login Windows Screen&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/08/advanced-google-searching-google.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg249TpodtzPjUUcEV6APqJIkHPEeRPhcO837JebztiAtV-VIFWW2sgnMWd8_fEPtY0cBAyamCHkP_2G8CLRtRtUHdQ6T9DR1Ku8ODDC09fJByH3PmiBZ-CaXrF7Mjk5nSq0nVbbjVffd8/s72-c/googlething.jpg" width="72"/><thr:total>2</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-1842318232986822123</guid><pubDate>Tue, 14 Aug 2007 14:31:00 +0000</pubDate><atom:updated>2007-09-08T17:49:25.881+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Videos</category><title>Hacking Videos</title><description>&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;.:: &lt;span style="color:#333399;"&gt;rea&lt;/span&gt;L &lt;span style="color:#333399;"&gt;hackin&lt;/span&gt;G &lt;span style="color:#333399;"&gt;video&lt;/span&gt;S ::.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="left"&gt;&lt;strong&gt;&lt;span style="font-size:130%;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;p align="center"&gt;&lt;embed src="http://www.youtube.com/v/-bJwfv2ZyfM" width="425" height="350" type="application/x-shockwave-flash" wmode="transparent"&gt;&lt;/embed&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;Hacking Internet Security Cameras&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;p align="center"&gt;&lt;embed src="http://www.youtube.com/v/FGASR4npbQ8" width="425" height="350" type="application/x-shockwave-flash" wmode="transparent"&gt;&lt;/embed&gt;&lt;/p&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;div align="center"&gt;&lt;strong&gt;&lt;span style="font-size:130%;color:#cc0000;"&gt;Extortion Spyware&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;&lt;br /&gt;Related Posts:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/limewire-hackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;LimeWire Hackers&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/hacking-videos.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/wireless-network-attackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Wirless Network Attackers&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/hack-window-login-screen.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Hacking Login Windows Screen&lt;/span&gt;&lt;/a&gt; &lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/advanced-google-searching-google.html"&gt;Advanced Google Search Keyword Hacking&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/08/hacking-videos.html</link><thr:total>1</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-757635412723877142.post-6849963591269903970</guid><pubDate>Tue, 14 Aug 2007 13:32:00 +0000</pubDate><atom:updated>2007-09-08T17:52:58.793+05:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hackers</category><category domain="http://www.blogger.com/atom/ns#">Wireless Internet Attackers</category><title>Wireless Network Attackers</title><description>&lt;div align="center"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;.::&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color:#999999;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt; Wireless Network Attackers &lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:100%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;::.&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Wireless hacking, or "Wardriving" is when someone from outside your home accesses your wireless network. In most case it is because the victim doesn't have security enabled on their wireless access point. The dangers of having a non-secure wireless access-point are: Spammers can send junk mail from your home, hackers and criminals can hack remote locations that are tracked back to you, your confidential information is exposed to anyone that parks outside your home with a laptop. You may also suffer some liability because attacks were launched from your home by the bad guys. Here is a video of Joe and I as we drove around the local new station, showed them hundreds of open wireless networks in minutes&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;Listed below are 8 Tips to&lt;/strong&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Top 8 Tips for Wireless Home Network Security&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;1) Change Default Administrator Passwords (and Usernames)&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Changing the default password is important because everyone that purchases the same Wireless access device, knows your password. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="color:#cc0000;"&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;2) Turn on (Compatible) WPA / WEP Encryption&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;By default, your Wireless device comes without the encryption enables. WPA / WEP are security programs that forced your computer to provide an encrypted password before you are allowed access to the wireless access point. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;3) Change the Default SSID&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;SSID is the network name of your wireless network; most people leave the default name, such as, Linksys or NetGear. By changing the name, intruders have a more difficult time identifying your system and use known vulnerabilities. (And of course, use the unchanged default password.) One mistake people make is naming their home network their family name and or address. When cruising a neighborhood of wireless devices, its always scary to see Smithfamily201Elm. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;4) Disable SSID Broadcast&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;In Wi-Fi networking, the access point or router typically broadcasts the network name (SSID) over the air at regular intervals. This feature was designed for businesses and mobile hotspots where Wi-Fi clients may come and go. In the home, this feature is unnecessary, and it increases the likelihood an unwelcome neighbor or hacker will try to log in to your home network. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;5) Assign Static IP Addresses to Devices&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Most home networkers gravitate toward using dynamic IP addresses. This means that the IP Address, (the IP Address is needed to participate on a network.) is typically assigned automatically. A dynamic IP address on an unsecure system can also supply a hacker with a IP Address. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;6) Enable MAC Address Filtering&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Each piece of Wi-Fi gear possesses a unique identifier called the "physical address" or "MAC address." Access points and routers keep track of the MAC addresses of all devices that connect to them. Many such products offer the owner an option to key in the MAC addresses of their home equipment that restricts the network to only allow connections from those devices. Do this, but also know that the feature is not so powerful as it may seem. Hacker software programs can fake MAC addresses easily.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;7) Turn Off the Network During Extended Periods of Non-Use&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;The ultimate in security measures for any wireless network is to shut down, or turn office your wireless access point when you are not using. You are the most vulnerable at work or asleep, and mischief minded people know it. &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#cc0000;"&gt;8) Position the Router or Access Point Safely&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family:verdana;"&gt;&lt;span style="font-size:85%;"&gt;Wi-Fi signals normally reach to the exterior of a home. A small amount of "leakage" outdoors is not a problem, but the further this signal reaches, the easier it is for others to detect and exploit. Wi-Fi signals often reach across streets and through neighboring homes. When installing a wireless home network, the position of the access point or router determines it's reach. Try to position these devices near the center of the home rather than near windows to minimize this leakage.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;strong&gt;&lt;span style="color:#660000;"&gt;&lt;br /&gt;Related Posts:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;&lt;/span&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/limewire-hackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;LimeWire Hackers&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/hacking-videos.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;Extreme Hacking Videos&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/wireless-network-attackers.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/09/hack-window-login-screen.html"&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;Hacking Login Windows Screen&lt;/span&gt;&lt;/a&gt; &lt;p&gt;&lt;span style="font-family:verdana;font-size:85%;"&gt;&lt;a href="http://cyber-generation.blogspot.com/2007/08/advanced-google-searching-google.html"&gt;Advanced Google Search Keyword Hacking&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;&lt;div class="blogger-post-footer"&gt;by SpyBloggers.&lt;/div&gt;</description><link>http://cyber-generation.blogspot.com/2007/08/wireless-network-attackers.html</link><thr:total>0</thr:total><author>noreply@blogger.com (SiNNeR*)</author></item></channel></rss>