<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8011690838344073778</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:22:36 +0000</lastBuildDate><category>Tips N Tricks</category><category>Windows</category><category>How To Be A hacker || Ultimate Guide</category><category>windows hacking</category><category>Gmail tips N tricks</category><category>Command Prompt</category><category>FTP Guide</category><category>Facebook Tips</category><category>Mozilla Firefox</category><category>SOFTWARE SECURITY</category><category>Scansafe Web Security</category><category>Security Threat Report 2012</category><category>Using Wireless Technology Securely</category><category>w</category><title>Google Make Me Smart</title><description></description><link>http://v-r-rock.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>38</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-219222665783483612</guid><pubDate>Tue, 27 Mar 2012 20:19:00 +0000</pubDate><atom:updated>2012-03-27T13:19:53.510-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security Threat Report 2012</category><title>Security Threat Report 2012</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="" style="clear: both; text-align: left;"&gt;The year 2011 was characterized by major data breaches&amp;nbsp;and targeted attacks on high-profile companies and&amp;nbsp;agencies. Cybercriminals diversified their targets to&amp;nbsp;include new platforms, as business use of mobile devices&amp;nbsp;accelerated. And we saw a number of politically motivated&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;“hacktivist” groups take the media spotlight, even as the&amp;nbsp;more common threats to our cyber security grew&lt;/div&gt;&lt;a name='more'&gt;&lt;/a&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="text-align: left;"&gt;Security experts and the media liked talking about hacktivist groups Lulz Security&amp;nbsp;&lt;/span&gt;&lt;span style="text-align: left;"&gt;(LulzSec) and Anonymous as they sowed chaos by leaking documents and&lt;/span&gt;&lt;/div&gt;&lt;div&gt;attacking websites. And we watched with interest and concern as targeted attacks&amp;nbsp;hit high-profile organizations like RSA and defense contractors.&amp;nbsp;Cybercriminals are becoming more professionalized through the availability of&amp;nbsp;commercial crimeware kits like the increasingly popular Blackhole kit. The result&amp;nbsp;is mass generation of new malicious code and exploits, and a significant increase&lt;/div&gt;&lt;div&gt;in the volume of malware. In the coming year, businesses will be challenged to&amp;nbsp;manage these threats alongside new ways of accessing applications and data,&amp;nbsp;like mobile and cloud services.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2012/03/security-threat-report-2012.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2767436658515757916</guid><pubDate>Tue, 27 Mar 2012 20:13:00 +0000</pubDate><atom:updated>2012-03-27T13:13:03.984-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">SOFTWARE SECURITY</category><title>SOFTWARE SECURITY</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
software security is the idea of engineering software&amp;nbsp;so that it continues to function correctly under&lt;br /&gt;
malicious attack. Most technologists acknowledge&amp;nbsp;this undertaking’s importance, but they need some&lt;br /&gt;
help in understanding how to tackle it. This new department&amp;nbsp;aims to provide that help by exploring&lt;br /&gt;
software security best practices.&amp;nbsp;The software security field is a relatively&amp;nbsp;new one. The first books and&amp;nbsp;academic classes on the topic appeared&amp;nbsp;in 2001, demonstrating how recently&amp;nbsp;developers, architects, and computer&amp;nbsp;scientists have started systematically&amp;nbsp;studying how to build secure software.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;The field’s recent appearance is one&amp;nbsp;reason why best practices are neither&amp;nbsp;widely adopted nor &lt;br /&gt;
obvious.&amp;nbsp;A central and critical aspect of the&amp;nbsp;computer security problem is a software&amp;nbsp;problem. Software defects with&amp;nbsp;security ramifications—including&amp;nbsp;implementation bugs such as buffer&amp;nbsp;overflows and design flaws such as&amp;nbsp;inconsistent error handling—&amp;nbsp;promise to be with us for years. All&amp;nbsp;too often, malicious intruders can&amp;nbsp;hack into systems by exploiting software&amp;nbsp;defects.1 Internet-enabled software&amp;nbsp;applications present the most&amp;nbsp;common security risk encountered&amp;nbsp;today, with software’s ever-expanding&amp;nbsp;complexity and extensibility&amp;nbsp;adding further fuel to the fire. By any&amp;nbsp;measure, security holes in software&amp;nbsp;are common, and the problem is&amp;nbsp;growing: CERT Coordination&amp;nbsp;Center identified 4,129 reported&amp;nbsp;vulnerabilities in 2003 (a 70 percent&amp;nbsp;increase over 2002, and an almost&amp;nbsp;fourfold increase since 2001).2,3&amp;nbsp;Software security best practices&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2012/03/software-security.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-7925074459711744992</guid><pubDate>Tue, 27 Mar 2012 20:05:00 +0000</pubDate><atom:updated>2012-03-27T13:05:28.402-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Using Wireless Technology Securely</category><title>Using Wireless Technology Securely</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
In recent years, wireless networking has become more available, affordable, and easy to use. Home users are adopting wireless technology in great numbers. On-the-go laptop users often find free wireless connections in places like coffee shops and airports.&lt;br /&gt;
If you’re using wireless technology, or considering making the move to wireless, you should know about the security threats you may encounter. This paper highlights those threats, and explains what you need to know to use wireless safely, both in the home and in public. You will find definitions of underlined terms in the glossary at the end of this paper.&lt;br /&gt;
_____________________________________________________________________&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;Home Wireless Threats&lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
By now, you should be aware of the need to secure traditional, wired internet connections.* If you’re planning to move to a wireless connection in your home, take a moment to consider what you’re doing: You’re connecting a device to your DSL or cable modem that broadcasts your internet connection through the air over a radio signal to your computers. If traditional wired connections are prey to security problems, think of the security problems that arise when you open your internet connection to the airwaves. The following sections describe some of the threats to home wireless networks.&lt;br /&gt;
_______________________________________________________________________&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;Piggybacking&lt;/span&gt;&lt;br /&gt;
If you fail to secure your wireless network, anyone with a wireless-enabled computer within range of your wireless access point can hop a free ride on the internet over your wireless connection. The typical indoor broadcast range of an access point is 150 – 300 feet. Outdoors, this range may extend as far as 1,000 feet. So, if your neighborhood is closely settled, or if you live in an apartment or condominium, failure to secure your wireless network could potentially open your internet connection to a surprising number of users.&lt;br /&gt;
_______________________________________________________________________&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;Wardriving&lt;/span&gt;&lt;br /&gt;
Wardriving is a specific kind of piggybacking. The broadcast range of a wireless access point can make internet connections possible outside your home, even as far away as your street. Savvy computer users know this, and some have made a hobby out of driving through cities and neighborhoods with a wireless-equipped computer—sometimes with a powerful antenna—searching for unsecured wireless networks. This practice is nicknamed “wardriving.” Wardrivers often note the location of unsecured wireless networks and publish this information on web sites. Malicious individuals wardrive to find a connection they can use to perpetrate illegal online activity using your connection to mask their identities. They may also directly attack your computer, as noted in the “Piggybacking” section above.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2012/03/using-wireless-technology-securely.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-1988820112340287931</guid><pubDate>Tue, 27 Mar 2012 19:58:00 +0000</pubDate><atom:updated>2012-03-27T12:58:26.836-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Scansafe Web Security</category><title>Scansafe Web Security</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
As the Internet transforms from a static resource to a utility platform enabling two-way&lt;br /&gt;
communications, malicious threats have increased in volume and shifted their focus toward&lt;br /&gt;
the Web. Hackers are exploiting the vulnerabilities of an open and dynamic web to distribute&lt;br /&gt;
their malware rather than creating their own malicious websites. Web malware infection from&lt;br /&gt;
reputable websites that have been compromised is now not only a reality, but is now the&lt;br /&gt;
preferred route to infect victims. This change has made traditional methods of control such&lt;br /&gt;
as anti-virus less effective and requires an alternative approach to security.&lt;br /&gt;
___________________________________________________________________&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Cloud-based Web Security&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;Cloud-based Web Security, the award-winning solution from ScanSafe, offers protection&lt;br /&gt;
for organizations of all sizes against known and zero-day malware attacks. Enabled in-thecloud,&amp;nbsp;ScanSafe Web Security enhances security while enabling cost savings of up to 40% by&amp;nbsp;eliminating the need to purchase, deploy and maintain hardware required for on-premise&lt;br /&gt;
solutions.&lt;br /&gt;
&lt;br /&gt;
ScanSafe Web Security allows organizations to build a granular global policy for all web&amp;nbsp;traffic, including SSL encrypted communications. Security policy can be created based on&amp;nbsp;categories, content, file types, schedules, and quotas to suit your organization. Coupled with&amp;nbsp;this, integrated outbound policy ensures that confidential data, such as customer details or&amp;nbsp;credit card numbers, does not leave the network.&amp;nbsp;ScanSafe Web Security analyzes every web request to determine if content is malicious,&amp;nbsp;inappropriate or acceptable based on the defined security policy. This offers effective&amp;nbsp;protection against threats including zero-day threats that would otherwise be successful.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2012/03/scansafe-web-security.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2748182758227088032</guid><pubDate>Sat, 24 Dec 2011 04:27:00 +0000</pubDate><atom:updated>2012-01-16T02:28:51.333-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gmail tips N tricks</category><title>How to Track Email [Gmail tips N tricks]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Read Notify is the original tracking service of its kind, and remains the most powerful and reliable email and document tracking service in the world today. In short – Read Notify tells you when your tracked emails and documents are opened / re-opened / forwarded and so much more.&lt;br /&gt;
&lt;br /&gt;
Step 1:&amp;nbsp;First sign up in &lt;a href="http://www.readnotify.com/" target="_blank"&gt;www.readnotify.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshYyQKX3tYnBuKIX3gg21tM2C8NN_osWvuKKJZO6HrBRcMo48-tWIp8DzfSqz36ufdLSiVP9EVHIvXsDUUGLMbIcFsrIvEhyphenhyphenNuCyFKuxIJa_vgJv3KKksEaTTpnvy0i-woTDfggse8hA/s1600/Capture.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="209" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshYyQKX3tYnBuKIX3gg21tM2C8NN_osWvuKKJZO6HrBRcMo48-tWIp8DzfSqz36ufdLSiVP9EVHIvXsDUUGLMbIcFsrIvEhyphenhyphenNuCyFKuxIJa_vgJv3KKksEaTTpnvy0i-woTDfggse8hA/s400/Capture.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Register there. &lt;b&gt;Once registered&lt;/b&gt;, send a mail to &lt;b&gt;your victim&lt;/b&gt; by the &lt;b&gt;email id&lt;/b&gt; you registered at&lt;b&gt; readnotify.com&lt;/b&gt; But before sending the mail just add &lt;b&gt;“.readnotify.com” &lt;/b&gt;with the victims id.. for example &lt;b&gt;xxxxx@gmail.com.readnotify.com&lt;/b&gt;&amp;nbsp; And then send it.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; text-align: left;"&gt;And Then&amp;nbsp;Check Your Mail Inbox for Read Notification Details.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIvq8q0xt_qh5zpnwZUVeRWk2vsWIf9ns-tNd5dTA0G6onEd4bsLwnQRlCDQ7_GcQvk_51VUTmiAT0Nk3196tPD_yNQpspskDYjKyDf9wXiZ-y5iSpumK3nlLkn2Yh2BQFVKGp3iwFskU/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="123" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIvq8q0xt_qh5zpnwZUVeRWk2vsWIf9ns-tNd5dTA0G6onEd4bsLwnQRlCDQ7_GcQvk_51VUTmiAT0Nk3196tPD_yNQpspskDYjKyDf9wXiZ-y5iSpumK3nlLkn2Yh2BQFVKGp3iwFskU/s400/Capture.JPG" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/how-to-track-email-gmail-tips-n-tricks.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjshYyQKX3tYnBuKIX3gg21tM2C8NN_osWvuKKJZO6HrBRcMo48-tWIp8DzfSqz36ufdLSiVP9EVHIvXsDUUGLMbIcFsrIvEhyphenhyphenNuCyFKuxIJa_vgJv3KKksEaTTpnvy0i-woTDfggse8hA/s72-c/Capture.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-256167925635994644</guid><pubDate>Sat, 24 Dec 2011 03:16:00 +0000</pubDate><atom:updated>2011-12-23T19:21:47.956-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gmail tips N tricks</category><title>How to Send Self Destructing Email [Gmail Tips N Tricks]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiw6hvWS6VlQq8n3quwYR0HqBeoI-6rcArq1yYSG9uEWHn-l5veumL2VAwKh9Ct52CKaRlDxgmQbqMRJUWCfuL2O32d_kE-EfkdNIoOWE6p30DJLHhhLjBtsyC0rLAVlyRd44QmOB6n0MM/s1600/C.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsvxmk-glqbuFk_pupaZiXDeI3Q5iUbjIyiLs_tEfS0oYw8LiJjUM0AeDLwjWK_vOfzMHqq98ySGUD7_IRJjOj65AEbdY52uEQje-VvsLsI-WFF9U4PjC55SsrsShUJVESeAqAG2CRAgU/s1600/C.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="203" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsvxmk-glqbuFk_pupaZiXDeI3Q5iUbjIyiLs_tEfS0oYw8LiJjUM0AeDLwjWK_vOfzMHqq98ySGUD7_IRJjOj65AEbdY52uEQje-VvsLsI-WFF9U4PjC55SsrsShUJVESeAqAG2CRAgU/s400/C.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Self-Destructing-Email lets you decide what happens to your email after sending&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-weight: bold;"&gt;&lt;br /&gt;
&lt;br /&gt;
Step 1&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp;: First Create an Account here&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.self-destructing-email.com/" style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.self-destructing-email.com&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Step 2 :&lt;/span&gt;&amp;nbsp;NOW&amp;nbsp;&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Compose your email as usual in your own email program –&amp;gt; &lt;b&gt;&lt;span style="font-size: large;"&gt;type:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;.self-destructing-email.com&lt;/b&gt; on the end of your recipients email address (they won’t see this) eg; &lt;b&gt;prabhjeet@googlemms.in.self-destructing-email.com&lt;/b&gt; –&amp;gt; send the Email.&lt;/span&gt; &lt;/div&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTLZiJUaCTRHWVd6z6wdYrlrti-IKkQqu_K-2fNeIjm3Nk_Zu6Z61f1tUJnh5mgyZOE7rb-xw0j30HqRyMRqHJB0hiR0bP6aJRv-4aF2y4AA2Kr7w6lIBy9CvcraHD0PnrLr8fgErp3o4/s1600/po.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhTLZiJUaCTRHWVd6z6wdYrlrti-IKkQqu_K-2fNeIjm3Nk_Zu6Z61f1tUJnh5mgyZOE7rb-xw0j30HqRyMRqHJB0hiR0bP6aJRv-4aF2y4AA2Kr7w6lIBy9CvcraHD0PnrLr8fgErp3o4/s1600/po.png" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;When recipient get the mail &amp;amp; click on it then automatically a message will come &amp;amp; message will self destruct with in 1 minute.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
After that sender will get the report mail regarding the&lt;b&gt;&lt;span style="font-size: large;"&gt; date, time &amp;amp; location&lt;/span&gt;&lt;/b&gt; from where recipient has read the mail.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_ra9kbOGjVptx8jA4cJ0V_eZ9M5k_iGkzTya9oxldmd2DjEfCOXnlz-rpPijLvUDJ0fjCqQYzMIxB-mfz331bFyGy2R3lvmC7pYPTU2iSjMqtVi1iXZmqlYTwzj_vg6aZ-s3vrDww5M/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJ_ra9kbOGjVptx8jA4cJ0V_eZ9M5k_iGkzTya9oxldmd2DjEfCOXnlz-rpPijLvUDJ0fjCqQYzMIxB-mfz331bFyGy2R3lvmC7pYPTU2iSjMqtVi1iXZmqlYTwzj_vg6aZ-s3vrDww5M/s1600/Capture.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/how-to-send-self-destructing-email.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsvxmk-glqbuFk_pupaZiXDeI3Q5iUbjIyiLs_tEfS0oYw8LiJjUM0AeDLwjWK_vOfzMHqq98ySGUD7_IRJjOj65AEbdY52uEQje-VvsLsI-WFF9U4PjC55SsrsShUJVESeAqAG2CRAgU/s72-c/C.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-7806305184207997027</guid><pubDate>Sat, 24 Dec 2011 02:16:00 +0000</pubDate><atom:updated>2011-12-23T18:16:18.686-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gmail tips N tricks</category><title>Open Multiple Account in Same Browser[Gmail tips N tricks]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;STEP 1&lt;/span&gt;&lt;/b&gt; : First, Open Gmail Account. Then, Go to Account Setting. AS Given &amp;nbsp;Below :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDKUVxuBEQDQHqukGcSFO-8U1fjuJReobuBwPicittUHeiPe67n6OkOddkF3NDeL9hPPMGvCL-xsPcNi4AQY2XrraA7I0862-IGUvvfuOpfr3UnisxPjsm_GFttnCeLh2l96g4DhySDJA/s1600/cc.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDKUVxuBEQDQHqukGcSFO-8U1fjuJReobuBwPicittUHeiPe67n6OkOddkF3NDeL9hPPMGvCL-xsPcNi4AQY2XrraA7I0862-IGUvvfuOpfr3UnisxPjsm_GFttnCeLh2l96g4DhySDJA/s400/cc.JPG" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;step 2:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijW0usqEYNxCw6g_Eqmnq1ANRpGCpDF9nNo11idFACBRgAb5-XoICsF5tXa_AXSd2rayiwBZEBAkHJfUfp7kizCUZOQ1yStL66KW0FM_u593SAGIeLYQe0viwhnqGDAfXl5QqqPPwxN1A/s1600/V.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="110" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijW0usqEYNxCw6g_Eqmnq1ANRpGCpDF9nNo11idFACBRgAb5-XoICsF5tXa_AXSd2rayiwBZEBAkHJfUfp7kizCUZOQ1yStL66KW0FM_u593SAGIeLYQe0viwhnqGDAfXl5QqqPPwxN1A/s640/V.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;step 3:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7nQtWkcOMffi63h_wL93zapuJSbeGgr3uyumC06oSMh1lMmqQaPkSQzIX8DrvJDS3SvlYORaGQOyYyuZRwcMlkuhuQSopbyXb0LDV-2Ek4SAVLE0c3-eJBXSromGTmWN0WObb6iCHFI/s1600/S.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7nQtWkcOMffi63h_wL93zapuJSbeGgr3uyumC06oSMh1lMmqQaPkSQzIX8DrvJDS3SvlYORaGQOyYyuZRwcMlkuhuQSopbyXb0LDV-2Ek4SAVLE0c3-eJBXSromGTmWN0WObb6iCHFI/s640/S.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;Step 4:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvk3lNjRuLWA38OOw1TxAJ_uPTzrwqj9BZqcbZ8IQbadJ0lW6kdii03RB7A6-lFD1hstNv71zQClQztEMStfFWXf0UtiKizut1U8ZhXneGmib0a3Kasf7ogYYLwJuTT_R3vN46sh09mlg/s1600/Untitled.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="268" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvk3lNjRuLWA38OOw1TxAJ_uPTzrwqj9BZqcbZ8IQbadJ0lW6kdii03RB7A6-lFD1hstNv71zQClQztEMStfFWXf0UtiKizut1U8ZhXneGmib0a3Kasf7ogYYLwJuTT_R3vN46sh09mlg/s640/Untitled.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/open-multiple-account-in-same.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDKUVxuBEQDQHqukGcSFO-8U1fjuJReobuBwPicittUHeiPe67n6OkOddkF3NDeL9hPPMGvCL-xsPcNi4AQY2XrraA7I0862-IGUvvfuOpfr3UnisxPjsm_GFttnCeLh2l96g4DhySDJA/s72-c/cc.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-6074312548800015165</guid><pubDate>Thu, 22 Dec 2011 10:16:00 +0000</pubDate><atom:updated>2011-12-22T02:16:26.668-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>[ How To change windows Startup Music to Anyting you want.]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;How To change windows startup music to anyting you want.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Did you ever want to change the way your Pc starts up?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;did you ever want it playing Dubstep while Booting up?&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Well now you can. &lt;/span&gt;YAY!&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;First what we must do is find a song which is converted in a .wave file&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;you can download a Windows startup Dubstep remix converted in a wave file &lt;a href="http://www.mediafire.com/?1h55x9pzu9dlvap" target="_blank"&gt;here.&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Now what you have to do is follow &lt;b&gt;these simply instructions&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;For Windows 7 and Vista&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;From the Start menu, select Control Panel.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Click Hardware and Sound. Under "Sound", click Change system sounds&lt;/span&gt;.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Under &lt;b&gt;"Program"&lt;/b&gt;, click &lt;b&gt;Windows Logon&lt;/b&gt;. You can select a sound from the &lt;b&gt;"Sounds:"&lt;/b&gt; drop-down menu , or click Browse... to select a &lt;b&gt;.wav file&lt;/b&gt;. If you don't want Windows to play any sound during startup, either uncheck Play Windows Startup sound or choose (None) in the "Sounds:" drop-down menu.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikNq5ON2-hSN2JdltFsFuYO2XC47aApL56w5Yh_OWA-QdE6ROdLb85gJlIWHOLk-QDGFquOYKQpT_qOk1_eZPeyV5QvUlRdWXcBlDwBrEaAaMs0ISRly6ooPnyITIZlxQgjfCh3skzoWo/s1600/Capturevvvv.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="221" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikNq5ON2-hSN2JdltFsFuYO2XC47aApL56w5Yh_OWA-QdE6ROdLb85gJlIWHOLk-QDGFquOYKQpT_qOk1_eZPeyV5QvUlRdWXcBlDwBrEaAaMs0ISRly6ooPnyITIZlxQgjfCh3skzoWo/s320/Capturevvvv.JPG" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;However if you want to convert your own Mp3 song to a .wave sound then you can simply download&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://www.mediafire.com/?r5orjxk16c2h6fo" target="_blank"&gt;This Mp3 to wave converter.&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;This is a trial so you can only convert 30 files&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/how-to-change-windows-startup-music-to.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEikNq5ON2-hSN2JdltFsFuYO2XC47aApL56w5Yh_OWA-QdE6ROdLb85gJlIWHOLk-QDGFquOYKQpT_qOk1_eZPeyV5QvUlRdWXcBlDwBrEaAaMs0ISRly6ooPnyITIZlxQgjfCh3skzoWo/s72-c/Capturevvvv.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2787299794714628779</guid><pubDate>Thu, 22 Dec 2011 09:40:00 +0000</pubDate><atom:updated>2011-12-22T01:40:12.489-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>[Watch Blocked Youtube Videos Even If It is Blocked IN Your Country]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;There are many such videos like &lt;b&gt;&lt;a href="http://www.youtube.com/watch?v=JA4W1EwtyRM" target="_blank"&gt;Armor for sleep&lt;/a&gt;&lt;/b&gt; – Hold the door is not available outside &lt;b&gt;USA and BBC’s clip&lt;/b&gt; Stop calling it a Honeymoon can only be watched in the UK.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Bypass Youtube Region Filtering&lt;/b&gt; To Watch &lt;b&gt;Blocked Youtube Videos .&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Youtube determine your physical location (country) from the IP address of your computer. This trick can bypass this country-specific limitation.&lt;br /&gt;
&lt;br /&gt;
So&amp;nbsp;If the URL of Youtube Video is:&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; border-bottom-color: rgb(100, 100, 100); border-bottom-style: solid; border-bottom-width: 0px; border-image: initial; border-left-color: rgb(100, 100, 100); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(100, 100, 100); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(100, 100, 100); border-top-style: solid; border-top-width: 0px; margin-bottom: 2px; margin-left: 2px; margin-right: 2px; margin-top: 2px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;"&gt;&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3" style="font-size: 11px;"&gt;http://www.youtube.com/watch?v=JA4W1EwtyRM&lt;/textarea&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Then Replace the &amp;nbsp;&lt;b&gt; /watch?v= &amp;nbsp;&lt;/b&gt;part with &lt;b&gt;/v&lt;/b&gt;&amp;nbsp; so that your new URL is now:&lt;/span&gt;&lt;/div&gt;&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;Download&lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.youtube.com/v/JA4W1EwtyRM&lt;/textarea&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/watch-blocked-youtube-videos-even-if-it.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-4940088513033040974</guid><pubDate>Thu, 22 Dec 2011 02:28:00 +0000</pubDate><atom:updated>2011-12-21T18:28:13.680-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook Tips</category><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>Ultimate Guide [How to trace pictures back to FaceBook]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;In This&lt;/b&gt;&lt;/span&gt;&lt;span style="font-size: large; font-weight: bold;"&gt; Tutorial&lt;/span&gt;&lt;b&gt;&amp;nbsp;in Two Step We Will Trace A Pic BACK To Facebook&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Step 1&lt;/b&gt;&amp;nbsp;.. Select Any Pic Downloaded From Facebook From&amp;nbsp;your Computer.&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;After Selecting Pic go to there Properties or press &amp;nbsp;(ALT+ENTER) on the pic .&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;As Given Below :&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxpI4IOkxyen5NceYgVvkFWHdel-QbrUSn4Sd3T55VvIyr5RnXhmfSJyTxJWR8QydnUR_M8zL_hLwYU_e3Wk83Eyux-qmMHUEbOSVXBEIhol_Cb5G9XsLwr-YuiXGtOyqxANgqNc-ypag/s1600/r.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxpI4IOkxyen5NceYgVvkFWHdel-QbrUSn4Sd3T55VvIyr5RnXhmfSJyTxJWR8QydnUR_M8zL_hLwYU_e3Wk83Eyux-qmMHUEbOSVXBEIhol_Cb5G9XsLwr-YuiXGtOyqxANgqNc-ypag/s320/r.png" width="238" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;and After That &amp;nbsp;see the pic name &amp;nbsp;if it is&amp;nbsp;like&amp;nbsp;something .. &lt;span style="text-align: left;"&gt;371672_&lt;b&gt;100001639868264&lt;/b&gt;_965537282_n.jpg&lt;br /&gt;
&lt;br /&gt;
then select the second one which is&amp;nbsp;&lt;/span&gt; &lt;b&gt;100001639868264&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;Step 2.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&amp;nbsp;Paste it into &lt;b&gt;&lt;/b&gt;&lt;span style="text-align: left;"&gt;&lt;br /&gt;
&lt;br /&gt;
here&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;div style="background-color: white; border-bottom-color: rgb(100, 100, 100); border-bottom-style: solid; border-bottom-width: 0px; border-image: initial; border-left-color: rgb(100, 100, 100); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(100, 100, 100); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(100, 100, 100); border-top-style: solid; border-top-width: 0px; margin-bottom: 2px; margin-left: 2px; margin-right: 2px; margin-top: 2px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;"&gt;&lt;div style="font-size: 11px;"&gt;&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.facebook.com/profile.php?id=###########&lt;/textarea&gt;&lt;/div&gt;&lt;/div&gt;&lt;span style="text-align: left;"&gt;Replace "#########" with your numbers. Which is &amp;nbsp;&lt;b&gt;100001639868264&lt;/b&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: left;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: left;"&gt;Enjoy :)&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: left;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/ultimate-guide-how-to-trace-pictures.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxpI4IOkxyen5NceYgVvkFWHdel-QbrUSn4Sd3T55VvIyr5RnXhmfSJyTxJWR8QydnUR_M8zL_hLwYU_e3Wk83Eyux-qmMHUEbOSVXBEIhol_Cb5G9XsLwr-YuiXGtOyqxANgqNc-ypag/s72-c/r.png" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-6812717180659706216</guid><pubDate>Wed, 21 Dec 2011 01:15:00 +0000</pubDate><atom:updated>2011-12-20T17:28:02.137-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">FTP Guide</category><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><title>Easy Tutorial[ How To Hack FTP Username and Password ]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;In this tutorial&lt;/b&gt; , i would like to show you how to crack a &lt;b&gt;FileZilla FTP Server.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Anyway,this FTP server is belong to me.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;I have three computers in my house.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;I am using Computer A to attack the FTP server hosted on Computer B.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Normally,FTP server will be running on Port 21.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;When we want to login to a FTP Server,we will be prompted for a username and password.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;This will be the picture.&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhycjgXYVM6yQKyXGFqKPQM3otn_xekzLABuEn-zw0YdQbfGrqiQAylpI92qauOAZO8vrBgkqr5vzDTTASnh7xFSyXyZq0-TaUhW0lu3A9FzAiGQgmWBfhn_W2AmTSgjCJNYWlTopa_Kag/s1600/CaptureVV.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhycjgXYVM6yQKyXGFqKPQM3otn_xekzLABuEn-zw0YdQbfGrqiQAylpI92qauOAZO8vrBgkqr5vzDTTASnh7xFSyXyZq0-TaUhW0lu3A9FzAiGQgmWBfhn_W2AmTSgjCJNYWlTopa_Kag/s320/CaptureVV.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
I have input the&lt;b&gt; ftp://xxxxx.myftp.org &lt;/b&gt;in my address bar and it will prompt me for username and password.&lt;/span&gt; &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Now,i will use Brutus to crack the FTP server.&lt;/span&gt;&amp;nbsp;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
(click on pic to enlarge)&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6m_8i91AxCUJRTvAQgHijBxY9bK2ZhkNbp_sOSnMH6LlyJx2oPqb7IGwslMGvSfL1sF7x-gfjXvOBkgqGt5F29QO3_RvwFfw3ELEd8sJ8GDydwG_0u67NnBtgv74XH-snrMFUWFYq2Po/s1600/CaptureVV.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="232" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6m_8i91AxCUJRTvAQgHijBxY9bK2ZhkNbp_sOSnMH6LlyJx2oPqb7IGwslMGvSfL1sF7x-gfjXvOBkgqGt5F29QO3_RvwFfw3ELEd8sJ8GDydwG_0u67NnBtgv74XH-snrMFUWFYq2Po/s320/CaptureVV.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;This will be my Brutus &lt;/b&gt;and i have everything well-configured.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;I have launch it and Brutus will start bruteforcing my FTP server.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;It will take up some time.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Wait for Brutus to finish cracking,and this is what you will get.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
(click on pic to enlarge)&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfocPeI_xLR5Hw3I168aWzmUSpoAcN0BrCUtswQ0-XOiQoO2ZgZB_HItBwnbT9zA5QV4BVyaNEPEceOj1knCDY2MzRg-4h_eYJxkL4Gvgk-t6RLs1z_FXwRyhdFeIP51iDDPFwrrUuSkM/s1600/Capturevvv.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="191" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfocPeI_xLR5Hw3I168aWzmUSpoAcN0BrCUtswQ0-XOiQoO2ZgZB_HItBwnbT9zA5QV4BVyaNEPEceOj1knCDY2MzRg-4h_eYJxkL4Gvgk-t6RLs1z_FXwRyhdFeIP51iDDPFwrrUuSkM/s320/Capturevvv.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Now You have get the username and password into the FTP server&lt;/b&gt;.&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Just go to the website,which is ftp://xxxxx.myftp.org and input the username and password.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt24xCRt5T89Klj828rJq1EHGhc9bY-XMj64eJxcOrLzymPTESjQnyXPYbcs-OlyhG64dedKW9YfofVLRuJOx2lO7zmgb2VK5JFNA_Z85KmA7vpxk-TN3kG9CWkKqf8cgr80JoVdR5ku0/s1600/CaptureVV.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgt24xCRt5T89Klj828rJq1EHGhc9bY-XMj64eJxcOrLzymPTESjQnyXPYbcs-OlyhG64dedKW9YfofVLRuJOx2lO7zmgb2VK5JFNA_Z85KmA7vpxk-TN3kG9CWkKqf8cgr80JoVdR5ku0/s320/CaptureVV.JPG" width="320" /&gt;&lt;/a&gt;This will be the files on the &lt;b&gt;FTP server.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Sometime,depend on your luck,maybe you will get some juicy information.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;The cracking tutorial for FileZilla FTP Server will finish.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Anyway There is lot of ways(method) to hack FTP SERVER To Which We Will Discuss in next Tutorial .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;Time to have some questions.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;b&gt;Someone&lt;/b&gt; may ask:&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;1.'If I use Brutus to bruteforce the FTP server,will the Admin know that?"&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;-The answer will be yes.Let me show you the proof.Just now,i am saying that i am using Computer A to attack FTP server hosted on Computer B.&lt;/div&gt;&lt;div&gt;Therefore Computer A will be the attacker and Computer B will be the Admin.&lt;/div&gt;&lt;div&gt;The Admin on Computer B will see this screen.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7fxfK9RjZjzXa6WjIGzJiLhT7I-jpnZpxaziMcVzz_4nRFOj5jok1kA0zT_5SliTqLdrpVpeQk4r4zuEvkiZH7eAepZcPFi2lB_cTuVIbFokFWD64Gn7-QTM9KzojeoDpx3zGioCbIBw/s1600/Capturevvv.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="92" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg7fxfK9RjZjzXa6WjIGzJiLhT7I-jpnZpxaziMcVzz_4nRFOj5jok1kA0zT_5SliTqLdrpVpeQk4r4zuEvkiZH7eAepZcPFi2lB_cTuVIbFokFWD64Gn7-QTM9KzojeoDpx3zGioCbIBw/s640/Capturevvv.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;b&gt;The Admin on Computer B will know that the IP 60.51.xx.xx is bruteforcing his FTP server.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;Therefore,be careful and use proxy when bruteforcing the FTP server.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;b&gt;Brutus has an option that let you to use proxy.&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;2. How to prevent this from happening on my FTP server ?&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;-The solution will be use strong passwords.&lt;/div&gt;&lt;div&gt;A strong password may contain capital letter,small letter,special characters,long password (more than 10 character),and numbers.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;b&gt;For example:&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;-@v3g3t3BL3# (look something like this,it will took a very very very long time to crack it.)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;Hope you like it...&lt;/div&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;For the download link:  &lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.hoobie.net/brutus/brutus-download.html&lt;/textarea&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/easy-tutorial-how-to-hack-ftp-username.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhycjgXYVM6yQKyXGFqKPQM3otn_xekzLABuEn-zw0YdQbfGrqiQAylpI92qauOAZO8vrBgkqr5vzDTTASnh7xFSyXyZq0-TaUhW0lu3A9FzAiGQgmWBfhn_W2AmTSgjCJNYWlTopa_Kag/s72-c/CaptureVV.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2627547667762193249</guid><pubDate>Tue, 20 Dec 2011 23:26:00 +0000</pubDate><atom:updated>2011-12-20T15:26:15.478-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Command Prompt</category><title>How To Access C Drive In School When It's Blocked</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="font-size: large;"&gt;Today&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;, I am going to show you how to access C Drive . A lot of schools&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;have blocked C DRIVE from hacking attempts to the school systems/machines. &lt;br /&gt;
There are many ways to access the drive. Including CMD, Firefox/Google Chrome etc. &lt;br /&gt;
Please follow all your local laws. Read their Legal.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;I REPEAT DO NOT DELETE ANY SYSTEM FILES FROM ANY EDUCATIONAL COMPUTERS, IT WILL END BADLY!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Ok&lt;/b&gt; that is all over and done with, n&lt;b&gt;ow for the tutorial.&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Now Let us Start&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Open &lt;b&gt;Firefox or Google Chrome&lt;/b&gt; and &lt;b&gt;type&lt;/b&gt; the following in the URL;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;c:\&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;this will not only allow &amp;nbsp;you to open the files, but also download them.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;With &amp;nbsp;Command Prompt &amp;nbsp;for win xp user&lt;/b&gt;&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;First of all look for CMD in the search bar in start and see if it is unblocked.&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;if it is blocked then&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;open the notepad and type &amp;nbsp; command.com a&lt;br /&gt;
nd save as anyfile.bat&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;or type in notepad &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Code:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;@echo off&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;start&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;and save as anyfile.bat&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;For&lt;/span&gt;&lt;/b&gt; &lt;b&gt;win 7 user&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;type in notepad&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;@echo off&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;title CMD&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;:1&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;set /p a=%cd%^&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;%a%&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;goto :1&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;and save as &lt;b&gt;anyfile.bat&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;then after that it will open your &lt;b&gt;command prompt&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;now access your C drive by simply typing &amp;nbsp;&lt;b&gt;C:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;So now you are in C drive. hope this helps&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/how-to-access-c-drive-in-school-when.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-4852215739692074421</guid><pubDate>Tue, 20 Dec 2011 03:53:00 +0000</pubDate><atom:updated>2011-12-19T19:57:10.989-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>The Ultimate Facebook Status Prank</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&amp;nbsp;Oftenly&lt;/b&gt;&lt;/span&gt; when we need a&amp;nbsp;&lt;b&gt;facebook Status Prank&lt;/b&gt; . Then we Prefer to go &lt;b&gt;Google&lt;/b&gt; and searching a some attracting sites which are &lt;b&gt;offering &amp;nbsp;prank status .&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Mostly &lt;/b&gt;these sites are &lt;b&gt;fake&lt;/b&gt; and following you after when you used their &lt;b&gt;Prank status&lt;/b&gt; .In Some Cases &lt;b&gt;Your Facebook ID got hacked&lt;/b&gt; .&amp;nbsp;you are here guys and &amp;nbsp;no need to go any sites .&lt;br /&gt;
&lt;br /&gt;
So I am Sharing &amp;nbsp;this trick.&lt;br /&gt;
&lt;br /&gt;
when you want to post&lt;b&gt; prank facebook status &lt;/b&gt;on your wall .&lt;br /&gt;
&lt;br /&gt;
Then Go To this link&lt;/div&gt;&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;GO HERE  &lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;https://www.facebook.com/connect/prompt_feed.php?preview=true&amp;amp;api_key=XX&lt;/textarea&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
It will show you &lt;b&gt;invalid api code.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
after that replace the 'XX' with one of the desired codes, given bellow.&lt;br /&gt;
For example, if you want to post by Telegram, you will need to replace the XX with 140881489259157 .&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Here Are The list of apps&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Xbox LIVE (5747726667)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; iPad (112930718741625)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Foursquare (86734274142)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Telegram (140881489259157)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Carrier Pigeon (130263630347328)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Morse Code (134929696530963)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Message in a Bottle (123903037653697)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Commodore 64 (138114659547999)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Your moms computer (132386310127809)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; TRS-80 (134998549862981)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; K.I.T.T. (129904140378622)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Mind Computer Interface (121184600360)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; eyePhone (110455835670222)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; toaster (203192803063920)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; microwave (0a5266c8844a1b09211e7eb38242ac2f)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Super Nintendo Entertainment System (235703126457431)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Gameboy Color (180700501993189)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; GoD (256591344357588)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Glade Air Freshner (4aeb4db2e8df1cdb7f952b2269afb560)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Strawberry (a4c9fb1708a848c2241674531176209b)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The moon (221826277855257)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Dr. Pepper (eea90d40e1d12565695dbbbdbd5e965b)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Nintendo wii (243870508973644)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Alcohol (250335888312118)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Cheese (218791271497130)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; iPod Nano (142039005875499)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Nintendo 64 (236264753062118)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Microsoft Excel (242740155751069)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Linux Ubuntu (220593361311050)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; iPhone 5g (211333348912523)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; My Bedroom (174811032586879)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Your Mums Bedroom (5f64bbc9ac2f12b983200925da461322)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Lamp (230755826955133)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Your moms anus (b625297b655f0b46c86b68f754b82121)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Refrigerator (250828364944350)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; A potato (127926427295267)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Nasa Satellite (31d608d30292175bf7703149699ccb39)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Vibrator (eb4c6d1a60e19a7795da501e1f468035)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Sperm Whale (170318539700306)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Pogo Stick (185103391549701)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Banana Phone (1477a4cd29ec724a3de19be5d26e0389)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Google+ (4d8243dbb7064f88351fe6c809582320)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The Future (108372819220732)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Smoke Signal (134138923334682)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; tin cans connected by string (242191299125647)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Stephen Hawking's Wheelchair: 129985073756521&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Head Antenna: 221107014598348&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; UPS: 258012620879655&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Fedex: 232029733497914&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Raven from King's Landing: 193094050743722&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Harbinger of Doom: 180354375362451&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Mind Meld: 186993071361881&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Unspeakable Ritual: 174903625908095&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; A Van down by the River: 119883641439994&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Pony Express: 186359518090057&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Sub-Etha: 120168391409358&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Myspace: 119920871434786&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Friendster: 247310815280913&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Zombocom: 195518590504787&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Postcard: 213487932030106&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Toilet: 173687282696461&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Minecraft: 231623746870852&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Accident: 211312955581644&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Mystery Machine: 259314457416472&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Magic: 181277448602956&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Hell: 148841558523990&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The afterlife: 220816157954138&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Heaven: 245437548809330&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The Event Horizon: 119999311425820&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The Laughing Man: 222077737828487&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; The Lexx: 123356437754169&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Microsoft Zune: 232440566786698&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Pokedex (de3da265cf6976745bb1d60a8c198151)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Telepathy (ea01a57edb26cf1de143f09d45cfa913)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Typewriter (d3d554bf60297cb2c384e3d7cf5a066d)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Harry Potter (b8ebeb983f45eaa0bd5f4f66cad97654)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; TARDIS (200439256674396)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Pip Boy (142806259133078)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Mind Control (1dc633368924b3b0b4d08e3f83230760)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Jedi Mind Control (240597869302110)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Telekinesis (224139600960217)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Post-It Note (115227201900831)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; GLaDOS (246126362083515)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Ansible (185474028180003)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; W.O.P.R (228373497202865)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Airwolf (123944137696757)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; HMCS Belafonte (222345601140304)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Hogwarts (2dc1d3004dbc4a67c4b552be3c25ccb0)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; Enjoy :)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/ultimate-facebook-status-prank.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-8235696012008567192</guid><pubDate>Mon, 19 Dec 2011 23:34:00 +0000</pubDate><atom:updated>2014-01-18T21:40:25.684-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><category domain="http://www.blogger.com/atom/ns#">Mozilla Firefox</category><title>[Ultimate Guide] How To Make FireFox Much Faster</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s1600/b.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s640/b.JPG" height="50" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;br /&gt;
Overview:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;This is a tutorial on how to make FireFox much faster. There are a couple of similar tutorials on HF, but they're not too good. So as way of giving back to the HF community, I'm writing this more-complete guide. I'll cover:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&amp;nbsp; &amp;nbsp; &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Optimizing Memory&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; Optimizing TCP/IP Related Settings&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; Page Rendering &amp;amp; Related Settings&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; Optional &amp;amp; Miscellaneous Settings&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;Before We Start:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&amp;nbsp; &lt;span style="color: #274e13;"&gt;&amp;nbsp; Check your Firefox add-ons. Update or remove any unwanted or old add-ons/extensions.&lt;/span&gt;&lt;span style="color: #274e13;"&gt;&amp;nbsp; &amp;nbsp; Disable any unused Firefox plugins (plugin, not add-on).&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="font-size: large;"&gt;Throughout the tutorial&lt;/span&gt;, you will be creating Integer and Boolean values in FireFox's config page. To enter the &lt;b&gt;config page&lt;/b&gt;, type &lt;b&gt;about:config&lt;/b&gt; in the &lt;b&gt;address bar&lt;/b&gt; of your browser. You'll get a &lt;b&gt;warning message&lt;/b&gt;, just click &lt;b&gt;"I'll be careful, I promise".&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Helvetica, sans-serif;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1xVy9XylIDqxJTJ1lub-t016m7EPOOe8kcgmNFdabu88rkxN_Q6HN5IrmWjVZZbFQS-qoYhsfDpKHAlMRx0xCyruY4_Coy-COWnsOvm-RurL1TekV8TsDLKX7T84Yqe1M8bMXywSCiVg/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1xVy9XylIDqxJTJ1lub-t016m7EPOOe8kcgmNFdabu88rkxN_Q6HN5IrmWjVZZbFQS-qoYhsfDpKHAlMRx0xCyruY4_Coy-COWnsOvm-RurL1TekV8TsDLKX7T84Yqe1M8bMXywSCiVg/s400/Capture.JPG" height="126" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;Optimizing Memory:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;1. First we're going to create a new Boolean called&amp;nbsp;&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;config.trim_on_minimize&amp;nbsp;&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;. Right-click anywhere in the&amp;nbsp;&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;config window&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;, go to New, then click&amp;nbsp;&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;Boolean&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;. Copy and paste&amp;nbsp;&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;config.trim_on_minimize&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp;into the box that just popped up, click OK, then select True.&lt;br /&gt;
&lt;/span&gt; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOH42y0gFmKL9k5KYc5OjrXWd0gLZEM0nmDm-CdShH1Yu_PL5H_oiaRae-LuzQPzO_nCO6LvjlNaUV6EqPZKzUsGPqg5lyV0k2l0vnDapeEb8orWxNLZV16Qd7YUE6TYVNX8OyKIkxRgY/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgOH42y0gFmKL9k5KYc5OjrXWd0gLZEM0nmDm-CdShH1Yu_PL5H_oiaRae-LuzQPzO_nCO6LvjlNaUV6EqPZKzUsGPqg5lyV0k2l0vnDapeEb8orWxNLZV16Qd7YUE6TYVNX8OyKIkxRgY/s400/Capture.JPG" height="160" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;br /&gt;
&amp;nbsp; &amp;nbsp; 2. &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Create a new Boolean called &lt;b&gt;browser.cache.memory.enable&lt;/b&gt; - Value = True.&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; 3. &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Next we're going to create a &lt;b&gt;new Integer.&lt;br /&gt;
&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObsG4sgRctJ2-MVjwdYC-hCWfRGh2-hkNcj-LGcbijMKJJ88jYXp1vk1185C-wUoqPfpeN9NSewgXGHnk3o9CsEs5saxJbwspPDEUO6hY6jwQI-B4HTHUYpTXOIiCDso6DzPAppffZKM/s1600/u.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgObsG4sgRctJ2-MVjwdYC-hCWfRGh2-hkNcj-LGcbijMKJJ88jYXp1vk1185C-wUoqPfpeN9NSewgXGHnk3o9CsEs5saxJbwspPDEUO6hY6jwQI-B4HTHUYpTXOIiCDso6DzPAppffZKM/s400/u.JPG" height="227" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Just like before, right-click anywhere in the &lt;b&gt;config window&lt;/b&gt;, go to New, then click &amp;nbsp; &amp;nbsp;&lt;b&gt;Integer.&lt;/b&gt; Copy and paste &lt;b&gt;browser.cache.memory.capacity&lt;/b&gt; into the box that just popped &amp;nbsp; up, click OK then &lt;b&gt;enter 65536&lt;/b&gt; if you have&lt;b&gt; 2GB of RAM&lt;/b&gt; or more. Enter &lt;b&gt;24576&lt;/b&gt; or&lt;b&gt; 18432&lt;/b&gt; if &amp;nbsp; you have&lt;b&gt; 1GB RAM&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; 4. &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Create&lt;/b&gt; an Integer &lt;b&gt;browser.history_expire_days&lt;/b&gt; - Set it's value to &lt;b&gt;7&lt;/b&gt;.&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; 5. &lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Next&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; we want to change the &lt;b&gt;browser.cache.disk.enable&lt;/b&gt; value to &lt;b&gt;False.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp;Copy and paste &lt;b&gt;browser.cache.disk.enable&lt;/b&gt; into the &lt;b&gt;config window's search bar&lt;/b&gt;. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Change the value to&lt;b&gt; False&lt;/b&gt; by double-clicking it. Note: Only do this if you have 2GB of RAM &amp;nbsp; &amp;nbsp;or more.&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp;6 .&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Now change these to &lt;b&gt;False&amp;nbsp;&lt;/b&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt;browser.cache.disk.smart_size.first_run&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; &amp;nbsp; browser.cache.disk.smart_size.enabled&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;&lt;br /&gt;
&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;Optimizing TCP/IP Settings:&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Create a new Boolean called&lt;b&gt; network.http.pipelining.firstrequest&lt;/b&gt; - Set it's value to &lt;b&gt;True&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; Change the value of these:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;network.http.max-connections&lt;/b&gt; to &lt;b&gt;48&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;network.http.max-connections-per-server&lt;/b&gt; to &lt;b&gt;16&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;network.http.max-persistent-connections-per-proxy &lt;/b&gt;to&lt;b&gt; 8&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.http.max-persistent-connections-per-server&lt;/b&gt; to&lt;b&gt; 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.http.pipelining&lt;/b&gt; to&lt;b&gt; true&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.http.pipelining.maxrequests &lt;/b&gt;to&lt;b&gt; 8&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.http.proxy.pipelining &lt;/b&gt;to&lt;b&gt; True&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.http.request.timeout &lt;/b&gt;to&lt;b&gt; 300&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; network.dns.disableIPv6 &lt;/b&gt;to&lt;b&gt; True&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;&lt;u&gt;Page Rendering &amp;amp; Related Settings&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Create a new Integer for:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt; content.notify.backoffcount&lt;/b&gt; - Value =&lt;b&gt; 5&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&lt;b&gt; &amp;nbsp; content.notify.interval&lt;/b&gt; - Value = &lt;b&gt;500&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;content.max.tokenizing.time&lt;/b&gt; - Value = &lt;b&gt;2250000&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;content.maxtextrun&lt;/b&gt; - Value = &lt;b&gt;8191&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; nglayout.initialpaint.delay&lt;/b&gt; - Value = &lt;b&gt;50&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;ui.submenuDelay&lt;/b&gt; - Value = &lt;b&gt;0&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Create a new Boolean for:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;content.notify.ontimer&lt;/b&gt; - Value =&lt;b&gt; True&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; plugin.expose_full_path&lt;/b&gt; - Value = &lt;b&gt;True&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; javascript.options.jit.chrome&lt;/b&gt; - Value = &lt;b&gt;True&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;javascript.options.jit.content&lt;/b&gt; - Value = &lt;b&gt;True&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;u&gt;Optional &amp;amp; Miscellaneous Settings&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;browser.sessionhistory.max_total_viewers&lt;/b&gt; - The value determines how many recently visited pages will be stored in the cache. Lowering this value causes less memory to be used but also causes more previously visited pages to have to be re-parsed (increasing their load time). Raising it has the opposite effect. One page will on average take 4MB of memory. The default value of -1 automatically stores 8 pages for users with 1GB of RAM or more. You can change this to suit you preference.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;b&gt;browser.urlbar.maxRichResults&lt;/b&gt; - The value determines the maximum number of entries that can appear in the Location Bar auto-complete drop-down.&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &lt;b&gt;browser.sessionstore.max_tabs_undo &lt;/b&gt;- The value determines how many closed tabs FireFox remembers. You can restore a closed tab by clicking the orange button in the top left-hand corner, then History, then Recently Closed Tabs.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; Keep Firefox Up to date - I recommended keeping your browser, extensions and plugins up to date.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;Final Notes:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Restart Firefox and you're done.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;If you found this useful, please help keep it alive by sharing.&lt;/span&gt;&lt;/div&gt;
</description><link>http://v-r-rock.blogspot.com/2011/12/ultimate-guide-how-to-make-firefox-much.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s72-c/b.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-3130456173679922855</guid><pubDate>Mon, 19 Dec 2011 21:07:00 +0000</pubDate><atom:updated>2011-12-20T10:43:30.158-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>How to get your computer to have an FBI login screen</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgttlZXiB9OLopp1RQQobnpxL1QvxDcCxw_KsPNCZRoqiIbiCDCQavs187VG5hxCd1YFHsQhsrBwX9F8nPRwqKei1CNRKGi1o2OSO7gYnIWjA2ZvFtPGIwRa5Op8IUd0x_q2N7rIX9snbc/s1600/u.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="218" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgttlZXiB9OLopp1RQQobnpxL1QvxDcCxw_KsPNCZRoqiIbiCDCQavs187VG5hxCd1YFHsQhsrBwX9F8nPRwqKei1CNRKGi1o2OSO7gYnIWjA2ZvFtPGIwRa5Op8IUd0x_q2N7rIX9snbc/s320/u.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border-bottom-color: rgb(100, 100, 100); border-bottom-style: solid; border-bottom-width: 0px; border-image: initial; border-left-color: rgb(100, 100, 100); border-left-style: solid; border-left-width: 0px; border-right-color: rgb(100, 100, 100); border-right-style: solid; border-right-width: 0px; border-top-color: rgb(100, 100, 100); border-top-style: solid; border-top-width: 0px; margin-bottom: 2px; margin-left: 2px; margin-right: 2px; margin-top: 2px; padding-bottom: 2px; padding-left: 2px; padding-right: 2px; padding-top: 2px;"&gt;&lt;div style="font-size: 11px;"&gt;1) Download LogonStudios&amp;nbsp;&lt;/div&gt;&lt;/div&gt;&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.stardock.com/products/logonstudio/downloads.asp&lt;/textarea&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;2) You can download the FBI file here&lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.wincustomize.com/explore/logonstudio_xp/9606/&lt;/textarea&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;or &lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://skins19.wincustomize.com/24/79/2479496/26/9859/preview-26-9859.jpg&lt;/textarea&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/how-to-get-your-computer-to-have-fbi.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgttlZXiB9OLopp1RQQobnpxL1QvxDcCxw_KsPNCZRoqiIbiCDCQavs187VG5hxCd1YFHsQhsrBwX9F8nPRwqKei1CNRKGi1o2OSO7gYnIWjA2ZvFtPGIwRa5Op8IUd0x_q2N7rIX9snbc/s72-c/u.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-7283711781431836986</guid><pubDate>Mon, 19 Dec 2011 21:00:00 +0000</pubDate><atom:updated>2011-12-19T13:43:29.656-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>Download Any Premium E-book From Google for Free</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: large;"&gt;just try this search in Google: with modification&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
site:*.com intitle:"Thank You For Your Purchase" intext:Click Here to Download&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;so modify this acc. to your requirement like :&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
site:*.com intitle:"backtrack tutorials" intext:Click Here to Download&lt;br /&gt;
&amp;nbsp;site:*.com intitle:"sql injection" intext:Click Here to Download&lt;br /&gt;
&lt;br /&gt;
site:*.com intitle:"Thank You For Your Purchase" intext:Click Here to Download&lt;br /&gt;
&lt;br /&gt;
intitle:Thank you for your Purchase! intext:PLR OR MRR OR Package OR Bonus&lt;br /&gt;
&lt;br /&gt;
intitle:Thank you for your order! intext:PLR OR MRR&lt;br /&gt;
&lt;br /&gt;
intitle:Thank you for your Purchase! intext:PLR OR MRR&lt;br /&gt;
&lt;br /&gt;
inurl:/thankyou*.html intitle:Thank you for your order! intext:Click Here to Download&lt;br /&gt;
&lt;br /&gt;
inurl:thanks intext:"Thank You For Your Order!" "Click Here" filetype:html&lt;br /&gt;
&lt;br /&gt;
intitle:Thank You For Your Order! intext:Private Label&lt;br /&gt;
&lt;br /&gt;
intitle:Thank You For Your Purchased! intext:Private Label&lt;br /&gt;
&lt;br /&gt;
intext:"Thank You For Your Order" intext:PLR&lt;br /&gt;
&lt;br /&gt;
"Thank You For Your Order!" intext:Master Resell filetype:html&lt;br /&gt;
&lt;br /&gt;
"Thank You For Your Order! Your Credit Card Will Show A Charge From"&lt;br /&gt;
&lt;br /&gt;
intitle:"Thank You For Your Order!" intext:download&lt;br /&gt;
&lt;br /&gt;
intitle:"Thank You For Your Order" intext:Click Here To Download Now&lt;br /&gt;
&lt;br /&gt;
intitle:Thank you for your purchase! intext:Click Here to Download&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;you&lt;/b&gt; will get tons of &lt;b&gt;Premium e-book download links&lt;/b&gt; in &lt;b&gt;google&lt;/b&gt; like this ..only need some &lt;b&gt;modification&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
Thank your for download!&lt;br /&gt;
Thank your for your order!&lt;br /&gt;
save target as...&lt;br /&gt;
(Note this trick may work with only those pages which are indexed by google )&lt;br /&gt;
Plz post your reply... :)&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/download-any-premium-e-book-from-google.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2017815833110839861</guid><pubDate>Mon, 19 Dec 2011 20:19:00 +0000</pubDate><atom:updated>2011-12-19T13:46:20.891-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>Download From Filesonic &amp; Wupload as a premium User</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;Hello Friends,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;I have found a site from where you can able to download any link from filesonic and wupload as a premium user for free.....You don't need any account or anything just paste the id &amp;amp; your download begins in seconds.....&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;Site Link -&lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;http://www.linkpremiumgenerator.com/&lt;/textarea&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;thats a pretty cool site for bypassing limit times and speed limits&lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;&amp;lt;br /&amp;gt; http://leechtube.com/&lt;/textarea&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/download-from-filesonic-wupload-as.html</link><author>noreply@blogger.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-2946110294771977734</guid><pubDate>Mon, 19 Dec 2011 20:09:00 +0000</pubDate><atom:updated>2011-12-19T12:12:23.618-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>Send Sms From Friends MobileTo Any Number(SMS Spoofing)</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;Hello Friends&lt;/span&gt;&lt;/b&gt;, &lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;i am sharing an trick with you all. Today i will tell you how to send anonymous SMS i.e. How to send SMS from any mobile number to any mobile number that means how to send SMS from your friend's mobile to your mobile or your friends mobile to your friends mobile or any other number. Basically this technique is call &lt;b&gt;SMS spoofing&lt;/b&gt;. By SMS spoofing we can send SMS to any mobile using anyone's mobile number. How this trick can be helpful?? its simple it is helpful when you wanna prank your friends, enemies or simply you want to send free SMS to your friends using their numbers only. So friends read on...&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;Feature's of SMS spoofing:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Spoofed sms (any mobile number to any mobile number)&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;100% anonymous messages&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Worldwide Network (i.e. we can send SMS all over the world)&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;No advertisements&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Instant Delivery of SMS&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&amp;nbsp; How to use this Hack?&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;div style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; 1. First of all, register &lt;a href="http://smsglobal.com/signup/signup_page.php" target="_blank"&gt;here&lt;/a&gt; . This website looks like this . Fill as i shown below:&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(click on pic to enlarge)&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic30uBQm0Z98DI1tI8GvGAPmTsv1ArXj8v06_Gf95rgNGBhwzeTvyro4mMmmoMw796GC_5kzuL6jhHh7EY0apFubTuS_HqxhdWLXRfPuWv062me8JcuNuLf41Q9reH-viEN00EOCVSx4Y/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="233" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic30uBQm0Z98DI1tI8GvGAPmTsv1ArXj8v06_Gf95rgNGBhwzeTvyro4mMmmoMw796GC_5kzuL6jhHh7EY0apFubTuS_HqxhdWLXRfPuWv062me8JcuNuLf41Q9reH-viEN00EOCVSx4Y/s400/Capture.JPG" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;2. After Registering you will get 25 free credits that means you can send 25 free SMS from any number to any number. For using it again register another mobile and email ID HERE . 25 SMS is the limitation of this trick from one registered number.. Usually people have two to three sims.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;3. Now after registering you will receive password on registered mobile number.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;4. Now login with that password that you got on mobile.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;5. Now go to Send SMS to number .&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;(click on pic to enlarge)&lt;/div&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTWVm4v9fmgXVhCC64NAYDIlugyVORUEl_rh2ci4EO1lq95kgx4zn5tpfEywMRKeFalc_V-D-OW7eIJIjjL65_SMeZLNspfS2dh1clKLIN5atCwgwXAArnZUYNfMHjmJM6Ofg3bzMFE9c/s1600/t.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTWVm4v9fmgXVhCC64NAYDIlugyVORUEl_rh2ci4EO1lq95kgx4zn5tpfEywMRKeFalc_V-D-OW7eIJIjjL65_SMeZLNspfS2dh1clKLIN5atCwgwXAArnZUYNfMHjmJM6Ofg3bzMFE9c/s400/t.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;6. After entering the details as explained in snapshot above. Click on send.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;7. That's all the hack. I know its limited but its awesome...Isn't It..&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;I hope you all have enjoyed it.. Keep visiting friends for more such hacks...&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/send-sms-from-friends-mobileto-any.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEic30uBQm0Z98DI1tI8GvGAPmTsv1ArXj8v06_Gf95rgNGBhwzeTvyro4mMmmoMw796GC_5kzuL6jhHh7EY0apFubTuS_HqxhdWLXRfPuWv062me8JcuNuLf41Q9reH-viEN00EOCVSx4Y/s72-c/Capture.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-8128238082446677061</guid><pubDate>Mon, 19 Dec 2011 17:08:00 +0000</pubDate><atom:updated>2011-12-19T09:08:08.346-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><title>Easy Tutorial [ Hack Any Email Account Using Google]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s1600/b.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="50" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s640/b.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;br /&gt;
REQUIREMENT :&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&amp;nbsp; &lt;br /&gt;
&lt;span style="font-size: large;"&gt;1.&lt;a href="http://www.google.co.in/" target="_blank"&gt; www.google.com&lt;/a&gt;&lt;br /&gt;
2. A tool Download&amp;nbsp; From &lt;a href="http://uppit.com/gzvdcrc0rikp/Email_Hacker.zip" target="_blank"&gt;here&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; View virus scan&lt;a href="http://www.virustotal.com/file-scan/report.html?id=709df0ae2f57564c900b7bc78244989f92d27835b45db67a0dbc0ceee1578c1d-1322067716" target="_blank"&gt; here&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b style="color: #cc0000;"&gt;So let Us Start &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;-&lt;/b&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;b&gt;First Step&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;The first thing we want to do is find a suitable database.&lt;br /&gt;
We can do this by using the google dork below.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;script type="text/javascript"&gt;
createSummaryAndThumb("summary1883030098649130042");
&lt;/script&gt;&lt;br /&gt;
&lt;div style="background-color: white; border: 0px solid #646464; font-size: 11px; margin: 2px 2px; padding: 2px 2px;"&gt;Code:&lt;br /&gt;
&lt;textarea cols="73" id="bloglinking" name="bloglinking" onclick="this.focus();this.select()" onfocus="this.select()" onmouseover="this.focus()" readonly="readonly" rows="3"&gt;filetype:sql intext:@hotmail.com&lt;/textarea&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;Type this code into google you may change the email provider but do not change the file type. Now Move ON Second Step . &lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;-Second step&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
Once you have found a database you would like to use, then select the URL and paste it into the program where it asks for the database url then click load.&lt;br /&gt;
Give it some time to load up the database then once it is loaded move on to the next step.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;-Third Step&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Once the &lt;b&gt;database &lt;/b&gt;has loaded into the program click on the second tab which is named &lt;b&gt;"Extract Accounts"&lt;/b&gt; then click the&lt;b&gt; Extract button&lt;/b&gt;. Once you see all the &lt;b&gt;emails and password hashes&lt;/b&gt; in the list boxes save both&lt;b&gt; emails and passwords&lt;/b&gt;, if you are only creating an email list then you have no need to save the passwords.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;-Fourth step&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Once you have both&lt;b&gt; emails.txt and passwords.txt files&lt;/b&gt; open them both up, select an email you would like to hack and match up the &lt;b&gt;email and password hash&lt;/b&gt; (they will be on the same line number) then copy the &lt;b&gt;hash&lt;/b&gt; and go into&lt;b&gt; google&lt;/b&gt; and find a &lt;b&gt;MD5 Decrypting website&lt;/b&gt;, i like to use &lt;a href="http://www.md5decrypter.co.uk/" target="_blank"&gt;this one&lt;/a&gt;, paste your &lt;b&gt;hash into the textbox&lt;/b&gt; enter the captcha and you then have the decrypted password! &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Hope you Like it :)&amp;nbsp; &lt;br /&gt;
Enjoy || &lt;span style="font-size: large;"&gt;&lt;span style="font-family: &amp;quot;Courier New&amp;quot;,Courier,monospace;"&gt;ULTIMATE GUIDE&lt;/span&gt;&lt;/span&gt;|| bY &lt;b&gt;GMMS&lt;/b&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/easy-tutorial-hack-any-email-account.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s72-c/b.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-9217251419088279720</guid><pubDate>Mon, 19 Dec 2011 16:12:00 +0000</pubDate><atom:updated>2011-12-19T08:12:02.582-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><category domain="http://www.blogger.com/atom/ns#">windows hacking</category><title>Customize Window Boot Screen [window hacking]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div align="center"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;In This Tutorial We Will Customize Window Boot Screen &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;Now We are going to use a Amzing Tool &lt;a href="http://www.coderforlife.com/projects/win7boot/" target="_blank"&gt;Windows 7 Boot Updater&lt;/a&gt;&lt;br /&gt;
see this video &lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-size: large;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div align="center"&gt;&lt;iframe allowfullscreen="" frameborder="0" height="315" src="https://www.youtube.com/embed/-LKaT6qQpK8" width="420"&gt;&amp;amp;amp;lt;p&amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;lt;p&amp;amp;amp;amp;amp;amp;amp;gt;lt;/div&amp;amp;amp;amp;amp;amp;amp;amp;amp;;lt;/p&amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;amp;amp;amp;amp;lt;/p&amp;amp;amp;amp;amp;amp;amp;gt;&amp;amp;amp;lt;/p&amp;amp;amp;gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/customize-window-boot-screen-window.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/-LKaT6qQpK8/default.jpg" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-6354573458600314586</guid><pubDate>Mon, 19 Dec 2011 06:36:00 +0000</pubDate><atom:updated>2011-12-19T02:24:36.717-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><title>Tutorial 4 b.[Introduction To Rats|Worms|Proxies And VPN'S] Be Anonymous on Internet</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-weight: bold;"&gt;&lt;span style="color: #0c343d; font-family: 'Helvetica Neue', Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;
This is the second part of 4th tutorial &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;&lt;span style="color: #990000; font-size: large;"&gt;&lt;br /&gt;
What is an VPN ?&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;A &lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;Virtual Private Network (VPN)&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; is a network technology that creates a secure network connection over a public network such as the Internet or a private network owned by a service provider. Not only is data encrypted when you use a VPN, but the originating and receiving network addresses are also&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt; encrypted&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;. This adds an extra layer of security.&lt;/span&gt;&lt;b style="font-family: Georgia, 'Times New Roman', serif;"&gt;VPNs&lt;/b&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; may serve any network functionality that is found on any network, such as sharing of data and access to network resources, printers, databases, websites, etc.&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b style="color: #990000; font-size: x-large;"&gt;How many types of VPN'S/proxies we have?&lt;/b&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;div style="font-size: x-large;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://cyberghostvpn.com/en/product/download.html?slider_en" target="_blank"&gt;For CyberGhost VPN&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is CyberGhost VPN&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;a href="http://cyberghostvpn.com/en/product/download.html?slider_en" target="_blank"&gt;CyberGhost VPN&lt;/a&gt;&lt;/b&gt; is a personal &lt;b&gt;VPN&lt;/b&gt; client and online service that lets users browse the Internet anonymously by acting as a firewall and server between your&lt;b&gt; PC and your ISP&lt;/b&gt;. It lets you surf the Web normally while hiding your IP address and displaying a dead-end address. It's available in free and premium versions&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkVJY63igULWq6IwoTUgCGWExZhK0rCaAkdVf1LjpQV5kbLvb9eabLQsyhCPokhzXzNLiHajB1T6lIrWcYxFYfm0FZNzbOY_a0DNNqxCYQuCR6apJtfgwi8D8ULaWKtnnckIP9buvbfS4/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="288" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkVJY63igULWq6IwoTUgCGWExZhK0rCaAkdVf1LjpQV5kbLvb9eabLQsyhCPokhzXzNLiHajB1T6lIrWcYxFYfm0FZNzbOY_a0DNNqxCYQuCR6apJtfgwi8D8ULaWKtnnckIP9buvbfS4/s400/Capture.JPG" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/UltraVPN/3000-2144_4-10917371.html" target="_blank"&gt;For UltraVPN&lt;/a&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is UltraVPN&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;span style="color: #990000; font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;b style="text-align: left;"&gt;&lt;a href="http://download.cnet.com/UltraVPN/3000-2144_4-10917371.html" target="_blank"&gt;UltraVPN&lt;/a&gt;&amp;nbsp;&lt;/b&gt;&lt;span style="text-align: left;"&gt;provides a free&amp;nbsp;&lt;/span&gt;&lt;b style="text-align: left;"&gt;&lt;a href="http://download.cnet.com/UltraVPN/3000-2144_4-10917371.html" target="_blank"&gt;OpenVPN&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;span style="text-align: left;"&gt;with the standard off the shelf Open source configuration. The protocol is enabled by the OS of your computer as UltraVPN does not provide any software of its own so it’s not user friendly. UltraVPN has a tiny network of servers (France and USA) with no server switching and one IP!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDm9qD1v-pMT3-pY5kf2oLLifOpPxtEQPwiL1tIgYB4IR97Udi8K7XW2vsY_tDGAxh_yiXzw4JBEhBTo2bWgTwPgPhj-LUabumOEUivomOtMGU1t9XtGwCAOwHCoNfXR0_Gtc6QiQhKsw/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="217" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDm9qD1v-pMT3-pY5kf2oLLifOpPxtEQPwiL1tIgYB4IR97Udi8K7XW2vsY_tDGAxh_yiXzw4JBEhBTo2bWgTwPgPhj-LUabumOEUivomOtMGU1t9XtGwCAOwHCoNfXR0_Gtc6QiQhKsw/s320/Capture.JPG" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;
&lt;li&gt;&lt;a href="http://download.cnet.com/Loki-VPN-Client/3000-2648_4-10804862.html" target="_blank"&gt;For LokiVPN&amp;nbsp;&lt;/a&gt;&lt;/li&gt;
&lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is LokiVPN&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #990000;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp;&lt;a href="http://download.cnet.com/Loki-VPN-Client/3000-2648_4-10804862.html" target="_blank"&gt;Loki Network &lt;/a&gt;allows you to surf the Internet anonymously&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;and hides your real location (IP address). Everything you do through the Loki Network is done from the name of the Loki Network server and from its IP address. Connection between your computer and Loki Network is secured with SSL.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkNT5loKqxgI-nuF_3sMOLqAKVb2rXLP8c6UpiOO4ioRaoGIoh_zAANbuNzrCzzaycK7NWnNkDrPIKLST6pcOQzh5CDLS-HynBgvTrcEhnQiSsvAy-Vc40HSJ_9TV2ByLfQGJRRgi7_4o/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjkNT5loKqxgI-nuF_3sMOLqAKVb2rXLP8c6UpiOO4ioRaoGIoh_zAANbuNzrCzzaycK7NWnNkDrPIKLST6pcOQzh5CDLS-HynBgvTrcEhnQiSsvAy-Vc40HSJ_9TV2ByLfQGJRRgi7_4o/s200/Capture.JPG" width="112" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://openvpn.net/index.php/open-source/downloads.html" target="_blank"&gt;For OpenVPN&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is OpenVPN&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;a href="http://openvpn.net/index.php/open-source/downloads.html" target="_blank"&gt;OpenVPN&lt;/a&gt;&amp;nbsp;&lt;/b&gt;is a full-featured SSL VPN solution which can accomodate a wide range of configurations, including remote access, site-to-site VPNs, WiFi security, and enterprise-scale remote access solutions with load balancing, failover, and fine-grained access-controls.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fkQY4LKNkf1ab5E3YrEvx4bp7147MxiWQ9ROw3BktKsI2bTHIFolwcsVe7W-InnZnltrhqk1RHV9_AToszkRZaK2TkD1TfARxD5Le1k1lHfrMJpHW-BhGSvgtEZoro2cIO8dwRX4icQ/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="126" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-fkQY4LKNkf1ab5E3YrEvx4bp7147MxiWQ9ROw3BktKsI2bTHIFolwcsVe7W-InnZnltrhqk1RHV9_AToszkRZaK2TkD1TfARxD5Le1k1lHfrMJpHW-BhGSvgtEZoro2cIO8dwRX4icQ/s200/Capture.JPG" width="200" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/hotspot-shield/" target="_blank"&gt;For Hotspot Shield&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is Hotspot Shield&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/hotspot-shield/" target="_blank"&gt;Hotspot Shield&lt;/a&gt;&lt;span style="color: black;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: black;"&gt;protects your entire web surfing session; securing your connection at both your home Internet network &amp;amp; Public Internet networks (both wired and wireless). Hotspot Shield protects your identity by ensuring that all web transactions (shopping, filling out forms, downloads) are secured through HTTPS.&amp;nbsp;&lt;/span&gt; &lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvjVwI0cenMNw6xc4H-fmQPwdb8VISyUkUrD2KOCrh85Zil8RcKpt93isVPYj6NhaYj9qz5UYBlN2XsMbIWT2-ibwu9FCVmDKMRC3ybhQSGVcmC_0nfJnqYeUTv8977gWM3-mj8rIE00E/s200/Capture.JPG" width="191" /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://torvpn.com/downloads.html" target="_blank"&gt;For TorVPN&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;What is TorVPN&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://torvpn.com/downloads.html" target="_blank"&gt;TorVPN&lt;/a&gt; is a VPN service provider offering a quick and simple solution for accessing the internet without content filters.&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;TorVPN is great for bypassing strict content filters, browsing the web anonymously, securing your VOIP communications or remote access to your home/office workstation.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgNEcO2MrlZKpTod0kwAv_bNxy_BwOvAh2EdLecZo-J9lQnb_dv23WqbxiyHPoeCXlJeFIUs1FfavyI7ulkbuSs8IT430D5nKrP7MMaAhyphenhyphen_zmIYiWb2AGZBVScAInwCaccr8GWkvHZlw0/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgNEcO2MrlZKpTod0kwAv_bNxy_BwOvAh2EdLecZo-J9lQnb_dv23WqbxiyHPoeCXlJeFIUs1FfavyI7ulkbuSs8IT430D5nKrP7MMaAhyphenhyphen_zmIYiWb2AGZBVScAInwCaccr8GWkvHZlw0/s200/Capture.JPG" width="173" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;For &lt;a href="http://www.softpedia.com/get/Internet/Servers/Proxy-Servers/JAP.shtml" target="_blank"&gt;Jap/JonDo&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;&lt;br class="Apple-interchange-newline" /&gt;What is Jap/JonDo&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://www.softpedia.com/get/Internet/Servers/Proxy-Servers/JAP.shtml" target="_blank"&gt;JAP &lt;/a&gt;(called JonDo in the scope of the commercial JonDonym anonymous proxy servers - AN.ON remains free of charge) makes it possible to surf the internet anonymously and unobservably.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtrfX5e-ho8cRUPpfbjSTA6QSDz622HKzvxGzSRwbnuBmAx95jRJ8qwzp7yMn4URZe4hi7rQJAscgwQyfy02MQfdh59IZc9qjtYR154uQRbJGJQ3SG6XDd7-fqQsAJWBPDy-a_SlSuC8/s1600/u.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="195" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjtrfX5e-ho8cRUPpfbjSTA6QSDz622HKzvxGzSRwbnuBmAx95jRJ8qwzp7yMn4URZe4hi7rQJAscgwQyfy02MQfdh59IZc9qjtYR154uQRbJGJQ3SG6XDd7-fqQsAJWBPDy-a_SlSuC8/s200/u.JPG" width="200" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;For&lt;a href="http://ultrasurf.en.softonic.com/" target="_blank"&gt; UltraSurf&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;What is UltraSurf&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://ultrasurf.en.softonic.com/" target="_blank"&gt;Ultrasurf &lt;/a&gt;is a freeware proxy application. It works as a free VPN without installation. It tunnels all the http(s) traffic on the port 9666 through SSL to an american server. By using it, one can bypass censorship as well as stay anonymous on the internet.&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvkgkRIfhDmKWbQsMZsYTJx1PC_eC4-doREt1U1WI_vV1VkajXf8No8HXqAPx-wqwmEIPdRjZoKW1QB-xQHGZUHjK2hwgFhyhgn5BCk9lKMklQ0IonLR5sRfhc8ZOgNsukwqbOfOxqHLY/s1600/u.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvkgkRIfhDmKWbQsMZsYTJx1PC_eC4-doREt1U1WI_vV1VkajXf8No8HXqAPx-wqwmEIPdRjZoKW1QB-xQHGZUHjK2hwgFhyhgn5BCk9lKMklQ0IonLR5sRfhc8ZOgNsukwqbOfOxqHLY/s320/u.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;For &lt;a href="http://download.cnet.com/FreeProxy/3000-2381_4-11355914.html" target="_blank"&gt;FreeProxy&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is FreeProxy&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/FreeProxy/3000-2381_4-11355914.html" target="_blank"&gt;FreeProxy&lt;/a&gt; is professional freeware which enables many users to share an internet connection. In addition, FreeProxy includes authentication to both an internal user database or to a windows domain, extensive reporting, comprehensive control of resource permissions, URL filtering, IP address filtering, local port binding, demand dialing, calendar control, proxy chaining, and includes a functional Web server, plus numerous other features.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM-HTPcsUIusRDWt9H4tCb_nx7vWplQxeW5J5-cZ5-L_Ri_SEifLObB75GM8oEbpWAaa6WziV0OuByjf8DbWKevOrLyKbS5GMxtdRA4GDRu14bfOgWiNhWH05c0sxJEaIopAgGl0vxqZo/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="212" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgM-HTPcsUIusRDWt9H4tCb_nx7vWplQxeW5J5-cZ5-L_Ri_SEifLObB75GM8oEbpWAaa6WziV0OuByjf8DbWKevOrLyKbS5GMxtdRA4GDRu14bfOgWiNhWH05c0sxJEaIopAgGl0vxqZo/s320/Capture.JPG" width="320" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;For &lt;a href="http://download.cnet.com/ProxyWay/3000-2144_4-10907872.html" target="_blank"&gt;ProxyWay&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is ProxyWay&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Want to change your IP address on fly? &lt;a href="http://download.cnet.com/ProxyWay/3000-2144_4-10907872.html" target="_blank"&gt;ProxyWay&lt;/a&gt; is free proxy software you need. Don't waste time searching, checking and changing proxies manually. Just run ProxyWay Auto Configuration and you are ready to surf anonymously. ProxyWay will find and check proxy servers and make all necessary configurations to change IP automatically. You can use ProxyWay with browsers and different applications to stay anonymous when you visit web sites, download files, send emails, etc&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQuAhD_GpuJBQNdawwo30B16uDbYmB_GV4NT4I8fyuKefiZVEfUHbABu5r9Yht9MOKwMpaf-xek_sqJw0qS5vNvhIxvfvRRIxl-LX4fT01ikJxJrA4poUcD-3lGG9dFYssNaLgyFks2QE/s1600/u.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="165" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQuAhD_GpuJBQNdawwo30B16uDbYmB_GV4NT4I8fyuKefiZVEfUHbABu5r9Yht9MOKwMpaf-xek_sqJw0qS5vNvhIxvfvRRIxl-LX4fT01ikJxJrA4poUcD-3lGG9dFYssNaLgyFks2QE/s320/u.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;For &lt;a href="http://download.cnet.com/ProxyMaster/3000-2381_4-10968824.html" target="_blank"&gt;ProxyMaster&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;What is ProxyMaster&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/ProxyMaster/3000-2381_4-10968824.html" target="_blank"&gt;ProxyMaster&lt;/a&gt; is an Internet utility to let you browse the Web anonymously by hiding your IP address. When you surf the Internet your unique identification number (IP number) can be detected by any Website you visit. ProxyMaster lets you use another IP number which is provided by a server called anonymous proxy server as a unique.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDw4O2DeQA7-YVFSqrwNI7des76Wvm-WMn-CXahb8uEIsTmrlxNuwtJ7qXc9AXsjifXkeHv8ecOpY9AEluukkc2pbWnuigSJZOWzOaDihC8A3rvb39AAM-x51X7UJuI2NCBD340V0IUxo/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="172" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDw4O2DeQA7-YVFSqrwNI7des76Wvm-WMn-CXahb8uEIsTmrlxNuwtJ7qXc9AXsjifXkeHv8ecOpY9AEluukkc2pbWnuigSJZOWzOaDihC8A3rvb39AAM-x51X7UJuI2NCBD340V0IUxo/s320/Capture.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/tutorial-4-bproxies-and-vpns-be.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkVJY63igULWq6IwoTUgCGWExZhK0rCaAkdVf1LjpQV5kbLvb9eabLQsyhCPokhzXzNLiHajB1T6lIrWcYxFYfm0FZNzbOY_a0DNNqxCYQuCR6apJtfgwi8D8ULaWKtnnckIP9buvbfS4/s72-c/Capture.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-6086102090496435031</guid><pubDate>Mon, 19 Dec 2011 05:30:00 +0000</pubDate><atom:updated>2011-12-18T21:30:59.612-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><title>Tutorial 4 a.[Proxies And VPN'S]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s1600/b.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="50" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s640/b.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;In This &lt;b&gt;Tutorial &lt;/b&gt;We will Discuss about &lt;b&gt;Proxies&lt;/b&gt; and &lt;b&gt;VPN'S Servers&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;What is a proxy server ?.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;Types of proxy.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;How can i find proxies ?.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;How can i make proxies work in my browser ?&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;What is an vpn ?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;How many types of VPN'S/proxies we have ?&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;span style="color: #990000; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-weight: bold;"&gt;What is a proxy server&amp;nbsp;?&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;A &lt;b&gt;proxy server &lt;/b&gt;is computer that functions as an intermediary between a&lt;b&gt; web browser&lt;/b&gt; (such as IE,Chrome,Safari,Opera,Firefox,Maxthon etc.) and &lt;b&gt;the Internet.&lt;/b&gt; &lt;b&gt;Proxy servers&lt;/b&gt; help improve web performance by storing a copy of frequently used webpages. When a &lt;b&gt;browser&lt;/b&gt; requests a &lt;b&gt;webpage&lt;/b&gt; stored in the &lt;b&gt;proxy server's &lt;/b&gt;collection (its cache), it is provided by the &lt;b&gt;proxy server,&lt;/b&gt; which is faster than going to the web. &lt;b&gt;Proxy servers&lt;/b&gt; also help improve security by &lt;b&gt;filtering out &lt;/b&gt;some web content and malicious software.In other words once you keep browsing using proxies, you are protected and your real &lt;b&gt;IP address&lt;/b&gt; is not being logged.&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;b style="color: #990000; font-size: x-large;"&gt;Types of proxy .&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;div style="text-align: left;"&gt;&lt;ul&gt;&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;Anonymous Proxy&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
This type of proxy server indentifies itself as a proxy server, but does not make the original IP address available. This type of proxy server is detectable, but provides reasonable anonymity for most users.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;Distorting Proxy&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
This type of proxy server identifies itself as a proxy server, but make an incorrect original IP address available through the http headers.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;b&gt;High Anonymity Proxy&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
This type of proxy server does not identify itself as a proxy server and does not make available the original IP address.&lt;/span&gt;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0c343d; font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Transparent Proxy&lt;/b&gt;&lt;/span&gt;&lt;br style="font-family: Georgia, 'Times New Roman', serif;" /&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;Transparent proxying means that the presence of the proxy is invisible to the user. Transparent proxying however requires kernel support.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: center;"&gt;&lt;span style="color: #990000; font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;span style="font-weight: 800;"&gt;How can i find proxies ?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="text-align: left;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;There is a list of site where you can find proxies&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://spys.ru/free-proxy-list/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://proxy.org/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.xroxy.com/proxylist.htm&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://atomintersoft.com/free_proxy_list&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.atproxy.net/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://hidemyass.com/proxy-list/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://aliveproxy.com/proxy-list/proxies.aspx/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.proxynova.com/proxy-server-list/&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.proxz.com/proxy_list_anonymous_us_0.html&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span style="font-family: Georgia, 'Times New Roman', serif;"&gt;http://www.google.com&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #990000; font-size: large;"&gt;&lt;b&gt;How can i make proxies work in my browser?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;b&gt;For &amp;nbsp;Firefox&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp;(Lastest Version)&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp;Go to&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB9GFY8-IdtsQ3hBlPnCA8UBYDVHUHPLQuSNLrSNvfR5FrdEWRFEathGCliEXHp2_rcBQCEFkG4TnJx1mUQJIPSxYstAuBPDhbbyvi48wbQsYMGvPHdZ5pEnA8w1nXCvBUJ-1_3KJxZO0/s1600/cc.JPG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp; Tools&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Options&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Advanced&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Network&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Settings&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Manual Proxy Configuration&lt;br /&gt;
&amp;nbsp;OK.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB9GFY8-IdtsQ3hBlPnCA8UBYDVHUHPLQuSNLrSNvfR5FrdEWRFEathGCliEXHp2_rcBQCEFkG4TnJx1mUQJIPSxYstAuBPDhbbyvi48wbQsYMGvPHdZ5pEnA8w1nXCvBUJ-1_3KJxZO0/s1600/cc.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="394" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgB9GFY8-IdtsQ3hBlPnCA8UBYDVHUHPLQuSNLrSNvfR5FrdEWRFEathGCliEXHp2_rcBQCEFkG4TnJx1mUQJIPSxYstAuBPDhbbyvi48wbQsYMGvPHdZ5pEnA8w1nXCvBUJ-1_3KJxZO0/s400/cc.JPG" width="400" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0NdIFe6eE3QcyeuE7m7xC3ml3oIW8dQuzdKs0cXO0cYANN2O_iKfJK_4941mgxv4HD-4SzR0ABUu2R3zf4km18Xe3xZdzT1L3tkgHa1WG5-RxSqup2oRmq6MyX4yeDizQ7EJPbFrrDyQ/s1600/ccc.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0NdIFe6eE3QcyeuE7m7xC3ml3oIW8dQuzdKs0cXO0cYANN2O_iKfJK_4941mgxv4HD-4SzR0ABUu2R3zf4km18Xe3xZdzT1L3tkgHa1WG5-RxSqup2oRmq6MyX4yeDizQ7EJPbFrrDyQ/s400/ccc.JPG" width="390" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&lt;br class="Apple-interchange-newline" /&gt;&lt;b&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;b&gt;For Chrome&lt;/b&gt;&lt;/div&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;b&gt;(Lastest Version)&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Options&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Search box(Proxy)&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Change Proxy Settings&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Lan Settings&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; Tick Proxy Server&lt;/div&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp; OK.&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="margin-left: 1em; margin-right: 1em; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2J_4KzncdeQ7mSk950M7pZBoIx6rGfRiNiQBxLeM2QxrnTkZ1c8_nw_vL9fAqou-cOayTxEY7wVHrhUyZp9G6kWPMxFfMsxsfHgxxORq0Sm74q3o44N0cY-fF62JoTauT9tku6LtKslk/s1600/ff.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2J_4KzncdeQ7mSk950M7pZBoIx6rGfRiNiQBxLeM2QxrnTkZ1c8_nw_vL9fAqou-cOayTxEY7wVHrhUyZp9G6kWPMxFfMsxsfHgxxORq0Sm74q3o44N0cY-fF62JoTauT9tku6LtKslk/s1600/ff.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixr4_5DncZKHUrLzGM3d40gic3z-sJLkcRFYrlh3JOJTCiONLC5rlgRNhV9N_5pNaTqXZvyZ4e__DWdkwhYpcAoC_pSU3IBle533BIno_55Z1Wlo3pY4NjvL5NqEUcPvw3XZvJgurBoCw/s1600/fff.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="121" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixr4_5DncZKHUrLzGM3d40gic3z-sJLkcRFYrlh3JOJTCiONLC5rlgRNhV9N_5pNaTqXZvyZ4e__DWdkwhYpcAoC_pSU3IBle533BIno_55Z1Wlo3pY4NjvL5NqEUcPvw3XZvJgurBoCw/s320/fff.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilGAvJ7w9PgdeYDMUcH3M1g0uf9ehE8oWwoCUZ1hUFbZIe0wcTK5Pfo1xKAroOXpsdVH3fJjIMgBbPh_3As1QYNh82XlXHml_pQVTSOsX5kfakBt9fgLA3qviW_lWbvespnVpMjYTjV1s/s1600/ffff.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="272" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEilGAvJ7w9PgdeYDMUcH3M1g0uf9ehE8oWwoCUZ1hUFbZIe0wcTK5Pfo1xKAroOXpsdVH3fJjIMgBbPh_3As1QYNh82XlXHml_pQVTSOsX5kfakBt9fgLA3qviW_lWbvespnVpMjYTjV1s/s320/ffff.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;div style="text-align: center;"&gt;&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;div&gt;&lt;b&gt;For Safari&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;b&gt;(Lastest Version)&lt;/b&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; Preferences&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; Advanced&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; Proxies:Change Settings&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; Lan Settings&lt;/div&gt;&lt;div&gt;&amp;nbsp; &amp;nbsp; Tick Proxy Server&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC8obitFcPcWh1iEGPvtMFq-ye9N8b1WruKvTjHX1K5LfP7JLqckJ207TgEp2j-yiNX7-i30ec9aPA-gbw_kSaxSTWxmtMC6tdehiKHbU6QvJ1Ood4wRAceLNkJQRe2zmT3_zOuaI45l4/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgC8obitFcPcWh1iEGPvtMFq-ye9N8b1WruKvTjHX1K5LfP7JLqckJ207TgEp2j-yiNX7-i30ec9aPA-gbw_kSaxSTWxmtMC6tdehiKHbU6QvJ1Ood4wRAceLNkJQRe2zmT3_zOuaI45l4/s200/Capture.JPG" width="185" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6Ys0FIa3x-Rp0NK0mx170d6mWDDf1gq0CPwtCi4I9WMWCWRDEQuPXNdO1kP3B-ToPpgE4BO-AZy0NFSfgs5x1LCTT2uDnT9wYDh9d7hRSm0i62H9gI41F131BmRkVECxdhBlSWgLOvBk/s1600/c.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="196" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6Ys0FIa3x-Rp0NK0mx170d6mWDDf1gq0CPwtCi4I9WMWCWRDEQuPXNdO1kP3B-ToPpgE4BO-AZy0NFSfgs5x1LCTT2uDnT9wYDh9d7hRSm0i62H9gI41F131BmRkVECxdhBlSWgLOvBk/s400/c.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbBkCRIKP_7tddWZ7vifyhfdMd6DKrCoJIcU-Ts_H09XZS34JdeZB5u3elpfR6vnST45pyiWUO2b_myUJC8Ik-zTOhf9lJzWY-uusgfg0EAiifUAbmh0yuLix14TiZU7_3SZZPZbRV9Qs/s1600/v.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="269" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbBkCRIKP_7tddWZ7vifyhfdMd6DKrCoJIcU-Ts_H09XZS34JdeZB5u3elpfR6vnST45pyiWUO2b_myUJC8Ik-zTOhf9lJzWY-uusgfg0EAiifUAbmh0yuLix14TiZU7_3SZZPZbRV9Qs/s320/v.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div&gt;&amp;nbsp; &lt;br /&gt;
&amp;nbsp; OK.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
For Internet Explorer same like this&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/tutorial-4-aproxies-and-vpns.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibFtnGFi1prYW_k_T1Nec99iBPxe69J01LuJoJN-dKgyC7LRQ0P-dn1urJ3pNL9VXuw28PDjQeY6U4YVqNkqKKTZu9n86474F5cG3JlHPD9mAVf0OoQSmNkbHAi9es1nmVR8UbXJtZC-s/s72-c/b.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-8624894730483097650</guid><pubDate>Mon, 12 Dec 2011 13:59:00 +0000</pubDate><atom:updated>2011-12-18T17:29:59.069-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Can't Delete A File Folder !!!</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;blockquote class="tr_bq"&gt;&lt;span class="Apple-style-span" style="font-family: 'Courier New', Courier, monospace;"&gt;&lt;b&gt;&lt;i&gt;I am having trouble deleting a folder, every time I try it says it doesn't exist. Could someone please explain to me how to fix the problem?&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;/div&gt;&lt;ol&gt;&lt;li&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;a href="http://download.cnet.com/Unlocker/3000-2248_4-10493998.html" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Unlocker&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Ever had such an annoying &lt;b&gt;message&lt;/b&gt; given by &lt;b&gt;Windows&lt;/b&gt;: &lt;b&gt;Cannot delete file&lt;/b&gt;: &lt;b&gt;Access is denied.&lt;/b&gt; There has been a sharing &lt;b&gt;violation.&lt;/b&gt; The source or destination file may be in use or the file is in use by another program or user. Make sure the disk is not full or write-protected and that the file is not currently in use. &lt;a href="http://download.cnet.com/Unlocker/3000-2248_4-10493998.html" target="_blank"&gt;&lt;b&gt;Unlocker&lt;/b&gt;&lt;/a&gt; is the solution.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="margin-left: 1em; margin-right: 1em; text-align: left;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyds9efNooYdv3kJo8TfBMChEg6ZKUiG4bxPdMklMbDVbif8c3XUXlHjUwINmPLrIQUnuSDzH2iGD_J1OXOC9yo0oFH1jpSxgdVyfzuw2_ALNJyhpHEZutJahcllR07j78siPQMdqKbT8/s1600/d.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="188" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyds9efNooYdv3kJo8TfBMChEg6ZKUiG4bxPdMklMbDVbif8c3XUXlHjUwINmPLrIQUnuSDzH2iGD_J1OXOC9yo0oFH1jpSxgdVyfzuw2_ALNJyhpHEZutJahcllR07j78siPQMdqKbT8/s320/d.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;&lt;div style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;a href="http://download.cnet.com/FileAssassin/3000-2094_4-10639988.html" style="font-family: Georgia, 'Times New Roman', serif;" target="_blank"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;FileAssassin's&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;This efficient freeware&lt;/b&gt; application terminates &lt;b&gt;process, unloads modules, and closes &lt;/b&gt;remote handles to rid your system of suspected malware files. &lt;/span&gt;&lt;a href="http://download.cnet.com/FileAssassin/3000-2094_4-10639988.html" style="font-family: Georgia, 'Times New Roman', serif;" target="_blank"&gt;FileAssassin's&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt; clear-cut interface includes drag-and-drop functionality to easily select the desired files. Or you can simply browse through your&lt;b&gt; folders and select the process &lt;/b&gt;you want to terminate.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/li&gt;
&lt;li style="text-align: left;"&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;a href="http://www.purgeie.com/delinv/" target="_blank"&gt;&lt;b&gt;DelinvFile.exe&lt;/b&gt;&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.purgeie.com/delinv/" target="_blank"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;DelinvFile.exe&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;is a&lt;b&gt; Windows program&lt;/b&gt; that provides a convenient &lt;b&gt;User Interface&lt;/b&gt; for selecting the file that you need to delete and provides for a choice of two delete methods.You use the standard controls for &lt;b&gt;Drives, Folders, and Files&lt;/b&gt; to navigate to the Folder and Select the file to be deleted.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/cant-delete-file-folder.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyds9efNooYdv3kJo8TfBMChEg6ZKUiG4bxPdMklMbDVbif8c3XUXlHjUwINmPLrIQUnuSDzH2iGD_J1OXOC9yo0oFH1jpSxgdVyfzuw2_ALNJyhpHEZutJahcllR07j78siPQMdqKbT8/s72-c/d.JPG" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-4287227988707585325</guid><pubDate>Mon, 12 Dec 2011 13:30:00 +0000</pubDate><atom:updated>2011-12-18T17:29:59.069-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>PROTECT YOUR EYES FROM COMPUTER SCREEN JUST IN 1 STEP</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpRSPm6ZV6aKT7MY9jkB9olEsiTI4MyO0APjQFgZ6mo81uUMKMYJD1Fjwxbef2yPtOt7QUc9fv1ufy7DsR8dVoSSzYFUTVrewTQUh7bJoUoUfpPAr7AoxI4pDw5j09qciIBjppNImdJbI/s1600/k.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpRSPm6ZV6aKT7MY9jkB9olEsiTI4MyO0APjQFgZ6mo81uUMKMYJD1Fjwxbef2yPtOt7QUc9fv1ufy7DsR8dVoSSzYFUTVrewTQUh7bJoUoUfpPAr7AoxI4pDw5j09qciIBjppNImdJbI/s320/k.jpg" width="285" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif; font-size: large;"&gt;&lt;u&gt;PROTECT YOUR EYES FROM COMPUTER SCREEN JUST IN 1 STEP&lt;br /&gt;
&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;b&gt;Hey guys&lt;/b&gt; i want to introduce you to this &lt;b&gt;awesome software&lt;/b&gt; which i use everyday and really &lt;b&gt;helps!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;b&gt;Ever notice &lt;/b&gt;how people texting at night have that eerie blue glow?&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;a href="http://stereopsis.com/flux/" target="_blank"&gt;F.lux fixes&lt;/a&gt; this: it makes the color of your computer's display adapt to the time of day, warm at night and like sunlight during the day.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;It's even possible that you're staying up too late because of your c&lt;b&gt;omputer&lt;/b&gt;. You could use f.lux because it makes you sleep better, or you could just use it just because it makes your computer look better.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;b&gt;f.lux&lt;/b&gt; makes your computer screen look like the room you're in, all the time. When the sun sets, it makes your computer look like your indoor lights. In the morning, it makes things look like sunlight again.&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both;"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia,'Times New Roman',serif;"&gt;&lt;a href="http://stereopsis.com/flux/" target="_blank"&gt;Tell f.lux &lt;/a&gt;what kind of lighting you have, and where you live. Then forget about it. F.lux will do the rest, automatically.&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/protect-your-eyes-from-computer-screen.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpRSPm6ZV6aKT7MY9jkB9olEsiTI4MyO0APjQFgZ6mo81uUMKMYJD1Fjwxbef2yPtOt7QUc9fv1ufy7DsR8dVoSSzYFUTVrewTQUh7bJoUoUfpPAr7AoxI4pDw5j09qciIBjppNImdJbI/s72-c/k.jpg" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8011690838344073778.post-4186405257647821832</guid><pubDate>Fri, 09 Dec 2011 23:28:00 +0000</pubDate><atom:updated>2011-12-19T14:04:05.517-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">How To Be A hacker || Ultimate Guide</category><category domain="http://www.blogger.com/atom/ns#">Tips N Tricks</category><title>Find An Email Adress Of Facebook Friend[Even If They Created Privacy]</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;This&lt;/b&gt;&lt;/span&gt; &lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;is so simple And&lt;b&gt; Short tutorial&lt;/b&gt; in which i will show you how to get an &lt;b&gt;email address &lt;/b&gt;of&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Facebook Friend .&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Facebook&lt;/span&gt; &lt;/b&gt;has an advance and smart privacy setting and you can easily hide your email and other information from any person. So let suppose your friend is a master of Facebook privacy and you want to know his/her email address for whatever purpose.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;So Let us Follow The Step :-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;&lt;b&gt;Requirement :&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;yahoo account (Dont worry if u have not)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;The person should be your Friend on facebook.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt;and Some Brain :D&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif;"&gt; Go to this&amp;nbsp;&lt;b&gt;&lt;a href="https://login.yahoo.com/config/login_verify2?.src=ab&amp;amp;.done=http%3A%2F%2Faddress.yahoo.com%2F%3FVPC%3Dcontact_import_landing" target="_blank"&gt;Address at yahoo&lt;/a&gt;&amp;nbsp;&lt;/b&gt;and follow the step&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJO7YKWlgnGFq8zmMJ3gw-bDb7FGtSfg9x5xewy5QfB880eSY76hrlYehdi9EJmMGCEPa806MOCeSbym5dowAlDqf1PHk2cVr3_lLE-O-VKJyWZ36AWdFRH9L_otL38ALZ171KPLWW8NM/s1600/J.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="394" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJO7YKWlgnGFq8zmMJ3gw-bDb7FGtSfg9x5xewy5QfB880eSY76hrlYehdi9EJmMGCEPa806MOCeSbym5dowAlDqf1PHk2cVr3_lLE-O-VKJyWZ36AWdFRH9L_otL38ALZ171KPLWW8NM/s640/J.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;Step 2.&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6XkVfBqioJg-MVv8wNSU9VGpl_wvLEhI3pvKlp6ZgOAZNfCQx_GembEjx-RNrMZMKK2xqRtRPLTxrz-gADdJmnS0XCdULXmTDZvxQKTxmKniaRXzD1EiF-nacOz6rIzBG7rGQ_Zq1o6s/s1600/F.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg6XkVfBqioJg-MVv8wNSU9VGpl_wvLEhI3pvKlp6ZgOAZNfCQx_GembEjx-RNrMZMKK2xqRtRPLTxrz-gADdJmnS0XCdULXmTDZvxQKTxmKniaRXzD1EiF-nacOz6rIzBG7rGQ_Zq1o6s/s400/F.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Georgia, 'Times New Roman', serif; font-size: large;"&gt;then a msg will show&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsTgJ1-hXC2gAoeAO6DCO73TLwrlObZ-MKZl0jiUoL0gj41F7peip05DFHwAu9lofT6iqb1fnm3PC3TbSb-ySn4zp0OzsEDvhuIbjhdOoDf_NZ-cSi_8Q12jTklph57nB4nJHjPf-mmZw/s1600/g.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsTgJ1-hXC2gAoeAO6DCO73TLwrlObZ-MKZl0jiUoL0gj41F7peip05DFHwAu9lofT6iqb1fnm3PC3TbSb-ySn4zp0OzsEDvhuIbjhdOoDf_NZ-cSi_8Q12jTklph57nB4nJHjPf-mmZw/s400/g.JPG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&amp;nbsp;+++++++++++++++++++++++++++++THE END+++++++++++++++++++++++++&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://v-r-rock.blogspot.com/2011/12/this-is-so-simple-and-short-tutorial-in.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJO7YKWlgnGFq8zmMJ3gw-bDb7FGtSfg9x5xewy5QfB880eSY76hrlYehdi9EJmMGCEPa806MOCeSbym5dowAlDqf1PHk2cVr3_lLE-O-VKJyWZ36AWdFRH9L_otL38ALZ171KPLWW8NM/s72-c/J.JPG" width="72"/></item></channel></rss>