<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5000875997351084685</id><updated>2025-08-26T12:19:01.602+05:30</updated><category term="Bios"/><category term="hack"/><title type='text'>Google tricks  &amp;amp; Other Tutorials</title><subtitle type='html'>Learn how to search in Google! Find anything in Google.com ! You will find here some more other than Google also...</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default?alt=atom'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default?alt=atom&amp;start-index=26&amp;max-results=25'/><author><name>Madhukarah</name><uri>http://www.blogger.com/profile/11517985888295587051</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>75</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-8545384242562635378</id><published>2009-07-22T06:29:00.001+05:30</published><updated>2009-07-22T06:29:40.519+05:30</updated><title type='text'>Why the Twitter hack hurts Google Apps</title><content type='html'>&lt;p&gt;&lt;strong&gt;The world learned a lot about Twitter this week. The most important takeaway: the company doesn&#39;t use the best passwords.&amp;#160; &lt;/strong&gt;&lt;/p&gt;  &lt;p&gt;A hacker broke into a Twitter&#39;s employees email account in May. From there he was able to access the company&#39;s Google Apps account where Twitter shares notes, spreadsheets and financial data within the company. This week, the &lt;a href=&quot;http://www.techcrunch.com/2009/07/15/twitters-financial-forecast-shows-first-revenue-in-q3-1-billion-users-in-2013/&quot;&gt;information&lt;/a&gt; started making its way online.&amp;#160; &lt;/p&gt;  &lt;p&gt;A leak that size has the potential to derail Twitter&#39;s future partnerships, business plans and financial future. &lt;/p&gt;  &lt;p&gt;But it&#39;s also a setback for Google Apps. &lt;/p&gt;  &lt;p&gt;Twitter cofounder Biz Stone wrote on the company&#39;s &lt;a href=&quot;http://blog.twitter.com/2009/07/twitter-even-more-open-than-we-wanted.html&quot;&gt;blog&lt;/a&gt; that while the docs were &amp;quot;not ready for prime time... they&#39;re certainly not revealing some big, secret plan for taking over the world.&amp;quot;&lt;/p&gt;  &lt;p&gt;And nothing too surprising has come out so far. &lt;/p&gt;  &lt;p&gt;Within the documents rested information about when Twitter expected to make money (this quarter), the company&#39;s forecasted revenue ($140 million by 2010), and its user growth (1 billion users by 2013).&lt;/p&gt;  &lt;p&gt;But the entire episode is proving to be bad PR for Google Apps. Individuals have happily been appreciating the free services of Google Apps allowing them to read, edit and share documents in the cloud. But that ease of use also means that it&#39;s easier for other people to get your information from any computer anywhere. And this episode is enough to give companies pause before placing sensitive documents online to share with employees. &lt;/p&gt;  &lt;p&gt;On the Twitter blog today, Stone was adamant that Google Apps were not to blame for the security breach: &amp;quot;This attack had nothing to do with any vulnerability in Google Apps which we continue to use.&amp;quot; &lt;/p&gt;  &lt;p&gt;But his next line gets to the crux of the problem: &amp;quot;This is more about Twitter being in enough of a spotlight that folks who work here can become targets.&amp;quot;&lt;/p&gt;  &lt;p&gt;What company does not have rivals that would want access to private financial data? Sharing documents online will continue to be a problem because individuals will continue to be careless. And while Google Apps may not have any inherent security lapse, the individuals who use the service will continue to screw up and get scared by how easily they may do so.&lt;/p&gt;  &lt;p&gt;As more services move into the cloud, companies have to be very careful about what they are sharing and where. For corporate usage, there is something to be said for paying the fee for software specific to a computer in one location.&lt;/p&gt;  &lt;p&gt;That&#39;s not to say that sharing online isn&#39;t useful for large groups. But online, companies have to remember that they are only as secure as their weakest password. A point proven by this simple lesson from the Twitter debacle: don&#39;t ever use &lt;a href=&quot;http://www.techcrunch.com/2009/07/15/another-security-tip-for-twitter-dont-use-password-as-your-password/?awesm=tcrn.ch_5yF&amp;amp;utm_campaign=techcrunch&amp;amp;utm_content=shorturl&amp;amp;utm_medium=tcrn.ch-copypaste&amp;amp;utm_source=twitter.com&quot;&gt;&amp;quot;password&amp;quot; as your password&lt;/a&gt;.&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/8545384242562635378/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/8545384242562635378?isPopup=true' title='4 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8545384242562635378'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8545384242562635378'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/07/why-twitter-hack-hurts-google-apps.html' title='Why the Twitter hack hurts Google Apps'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>4</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-6689003502489193826</id><published>2009-07-22T06:28:00.001+05:30</published><updated>2009-07-22T06:28:30.443+05:30</updated><title type='text'>Can Google Learn from Microsoft&amp;#39;s Mistakes?</title><content type='html'>&lt;p&gt;Google&#39;s indication (hardly an announcement) that they&#39;re getting into the OS business comes as no surprise. It&#39;s already got Android. It&#39;s got Web-based apps that are now (finally) out of beta. It&#39;s got the right vision, IMHO, for mobility. They have the potential at the very least to put a thumbtack on Microsoft&#39;s chair, if not actually kick them in the butt.    &lt;br /&gt;And that&#39;s because MS thinks that an operating system is a destination rather than simply a facility to abstract hardware and network services into metaphors that programmers and end-users alike can deal with. The two key directions for mobility -- netbooks (or at least lighter clients, which includes handhelds) and Web services -- really don&#39;t require MS&#39;s vision of bloated, complex, buggy, slow, inefficient, unreliable, and expensive operating systems. Because they&#39;ve been competing in the PC, rather than the Web-centric, era,     &lt;br /&gt;Microsoft has only two options to address this opportunity -- Windows Mobile, which I still think is doomed for reasons of cost, and Windows 7, which would need several passes through the shrink-o-tron to work here, leaving it much less than Microsoft&#39;s vision (and, in fact, business and financial requirement) of OS as destination.     &lt;br /&gt;Google may, however, be making the same mistakes as Microsoft has continually made via a strategy of OS diversity. As with Vista, there are way too many versions of Windows 7.     &lt;br /&gt;I&#39;d have to buy Ultimate at an absurdly high price just to get file encryption. As you might guess, I&#39;m not looking forward to giving Microsoft another nickel; I will, of course, buy a new PC with W7 on it to do testing projects for Network World, but this PC will otherwise not be used for production around here.     &lt;br /&gt;I&#39;ve had it with Microsoft&#39;s vision and implementation of the operating system, which is to use bloat to thwart competition, change to the user interface to add to OpEx and TCO via increased training and support costs, and refusal (or outright inability) to address fundamental architectural issues that leave their operating systems insecure, unreliable, and a burden on IT and users alike. I can&#39;t wait for all those XP users out there thinking they can upgrade to W7, and then discovering that (a) they need to do a clean install, and (b) they need W7 Pro for backwards compatibility to XP. Wow! At least Microsoft is being upfront is saying that W7 is &amp;quot;best experienced on a new PC&amp;quot;. &lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/6689003502489193826/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/6689003502489193826?isPopup=true' title='3 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6689003502489193826'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6689003502489193826'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/07/can-google-learn-from-microsoft.html' title='Can Google Learn from Microsoft&amp;#39;s Mistakes?'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>3</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-1926741021860908433</id><published>2009-07-22T06:26:00.001+05:30</published><updated>2009-07-22T06:26:28.159+05:30</updated><title type='text'>Google: Big on Twitter</title><content type='html'>&lt;p&gt;If anything, 2009 is the year of Twitter. With so many companies embracing&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgwqTQDvLJqfrdvAODIEuyNqLC45v_21isqrevqQMR6HK-n2BkrjBw2B3_k6Qq67bi99oGBpSm7d1Wkxck6au7qARZRws6XE4Os9vilZc7wTRV6nfbuEuZTK_ZjaLMTdWqkA8kjSZgDYmQ/s1600-h/twitter_tweet2_300%5B7%5D.jpg&quot;&gt;&lt;img style=&quot;border-bottom: 0px; border-left: 0px; display: inline; margin-left: 0px; border-top: 0px; margin-right: 0px; border-right: 0px&quot; title=&quot;twitter_tweet2_300&quot; border=&quot;0&quot; alt=&quot;twitter_tweet2_300&quot; align=&quot;right&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_UOUxnHaYzZNYfdfm4t8dUDK_k3o0b3XjQj0lorE9lqT9R_Kz-uEySdnO_tIypzsWWlzqMsVwWMvL5MvOrROr3JjMV24RKiO6I6Y2Mh59sI6_gDNnowo6Pb4IE6UV-pti0lT3fLcYcPU/?imgmax=800&quot; width=&quot;244&quot; height=&quot;110&quot; /&gt;&lt;/a&gt; Twitter to improve their external communication, it shouldn’t come as a surprise that Google is riding the wave with a whopping 50 Twitter accounts used to tweet countless stories each day promoting Google’s many products.&lt;/p&gt;  &lt;p&gt;Unless you have been sleeping under a rock lately, you know how big Twitter has become. Despite the fact that the popular micro-blogging service has been around for quite a while, it looks like all stars have aligned for Twitter in 2009, when the service exploded into public consciousness.&lt;/p&gt;  &lt;p&gt;Corporations, media outlets, and users around the world all took advantage of the technology so Twitter links on corporate and personal sites, even blogs, quickly became the norm. Businesses were among the first to realize that Twitter is an effective, instant, and affordable communication channel with a very broad reach. Although corporate Twitter channels are nothing unusual these days, we’ve been surprised discovering popular Twitter has been with Google.&lt;/p&gt;  &lt;p&gt;According to a post on the official Googl e blog, the search giant maintains nearly 50 Twitter accounts, each dedicated to a specific product. In addition, each Google’s account on Twitter is tied to a product’s official blog, tweeting short leads linked to specific blog entries. Official Google accounts on Twitter include Reader, Blogger, Calendar, News, YouTube, Earth, AdSense, and other product-focused accounts, as well as user tips, central Google account, news from Google localized for non-English markets, etc. Here’s how Google justified its assault on Twitter:&lt;/p&gt;  &lt;blockquote&gt;   &lt;p&gt;&lt;em&gt;Like lots of you, we’ve been drawn into Twitter this year. After all, we’re all about frequent updates ourselves, and there’s lots happening around here that we want to share with you. Of course, we enjoy watching, and contributing to, the tweetstream (we hope you find our tweets useful, too). Because there are many programs and initiatives across the company, we’ve got a number of active accounts.&lt;/em&gt;&lt;/p&gt; &lt;/blockquote&gt;  &lt;p&gt;Check out this cherry-picked list of Google accounts on Twitter that you may like:&lt;/p&gt;  &lt;ul&gt;   &lt;li&gt;Central Google - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/Google&quot;&gt;twitter.com/Google&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;Google Reader - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/GoogleReader&quot;&gt;twitter.com/GoogleReader&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;Google Blogger - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/Blogger&quot;&gt;twitter.com/Blogger&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;Google Calendar - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/GoogleCalendar&quot;&gt;twitter.com/GoogleCalendar&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;Google Earth - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/GoogleEarth&quot;&gt;twitter.com/GoogleEarth&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;Google Webmaster Central - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/GoogleWMC&quot;&gt;twitter.com/GoogleWMC&lt;/a&gt; &lt;/li&gt;    &lt;li&gt;YouTube - &lt;a href=&quot;http://www.geek.com/articles/google/google-big-on-twitter-20090714/twitter.com/YouTube&quot;&gt;twitter.com/YouTube&lt;/a&gt; &lt;/li&gt; &lt;/ul&gt;  &lt;p&gt;Complete list available at the &lt;a href=&quot;http://googleblog.blogspot.com/2009/07/google-accounts-on-twitter.html&quot;&gt;official Google blog&lt;/a&gt;.&lt;/p&gt;  &lt;h6&gt;Christian’s opinion:&lt;/h6&gt;  &lt;p&gt;As a reporter, I’ve noticed this new trend emerging a while ago, with companies using official Twitter accounts to communicate with journalists and PR agencies. Media, corporations, and consumers all benefit from the Twitter technology. News items beamed via Twitter get out of the door fast, reaching subscribed journalists and PR agencies instantly. Needless to say, instantaneous short messaging is exactly how journalist prefer getting the latst information. Because each tweet is linked to an official press release on a company’s web site, these tweets augment other communication channels already in place, rather than replace them.&lt;/p&gt;  &lt;p&gt;Because the media gets news items as they happen, they can react swiftly, providing consumers with up-to-date information. In fact, it’s my personal opinion that tweets will overtake RSS feeds down the road as a preferred technology used by journalists for staying up-to-date.&lt;/p&gt;  &lt;p&gt;However, the real problem with Twitter, in my opinion, is this information overload. With so many channels to follow, Twitter.com should offer tools for organizing subscribed tweets into folders. I only use one Twitter account to track all business and personal tweets but I’m finding it increasingly difficult to keep up with it. Dozens of iPhone developers, tech companies and PR agencies to whose Twitter channel I’ve subscribed to beam dozens of tweets a day. Yet, Twitter.com lacks tools that would help me bring order to this mess. I simply don’t have the time to waste on sorting through so many different tweets.&lt;/p&gt;  &lt;p&gt;Hey Twitter, can we have some kind of folders or categories that automatically file specific tweets? Yes, I know, there are countless desktop and mobile Twitter clients that bring such a functionality but I’d really like to see this implemented on the Twitter.com website as the default feature.&lt;/p&gt;  </content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/1926741021860908433/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/1926741021860908433?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/1926741021860908433'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/1926741021860908433'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/07/google-big-on-twitter.html' title='Google: Big on Twitter'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_UOUxnHaYzZNYfdfm4t8dUDK_k3o0b3XjQj0lorE9lqT9R_Kz-uEySdnO_tIypzsWWlzqMsVwWMvL5MvOrROr3JjMV24RKiO6I6Y2Mh59sI6_gDNnowo6Pb4IE6UV-pti0lT3fLcYcPU/s72-c?imgmax=800" height="72" width="72"/><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-2070563880738216641</id><published>2009-01-07T10:03:00.000+05:30</published><updated>2009-01-07T10:04:09.877+05:30</updated><title type='text'>Google targeted in Chinese Internet crackdown</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: rgb(68, 68, 68); font-family: Verdana; font-size: 12px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: 18px; orphans: 2; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;Google, alongside other popular web portals, was warned on Monday that they must do more to block pornographic content from reaching Chinese users, in the latest in a series of crackdowns on Internet content by the Chinese government.&lt;br /&gt;&lt;br /&gt;Chinese authorities published a list of 19 websites that have failed to get rid of unsuitable material. The list includes American search giant Google and China&#39;s top search engine Baidu.&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;&lt;a href=&quot;http://news.bbc.co.uk/1/hi/world/asia-pacific/7811550.stm&quot; target=&quot;_blank&quot; style=&quot;outline-style: none; color: rgb(51, 102, 153); cursor: pointer; text-decoration: none;&quot;&gt;According to the BBC&lt;/a&gt;, one Chinese official said that the websites could be closed down if they fail to delete the offending material.&lt;br /&gt;&lt;br /&gt;Speaking on Chinese Central Television Cai Mingzhao said, &quot;we will continue to expose, punish or close down websites that have a lot of vulgar content.&quot;&lt;br /&gt;&lt;br /&gt;However, the list also contained Tianya, a site that is popular amongst people who criticise the Chinese government, suggesting that the crackdown is not just about &quot;vulgar content.&quot;&lt;br /&gt;&lt;br /&gt;Charles Freeman, a specialist on China at the Center for Strategic and International Studies based in Washington, reckons that the pornography is just a decoy. &quot;They&#39;re looking extensively at political speech, the sort of things traditionally cast under the First Amendment in this country,&quot; Freeman said.&lt;a href=&quot;http://hosted.ap.org/dynamic/stories/A/AS_CHINA_PORNOGRAPHY?SITE=NVLAS&amp;amp;SECTION=HOME&amp;amp;TEMPLATE=DEFAULT&quot; target=&quot;_blank&quot; style=&quot;outline-style: none; color: rgb(51, 102, 153); cursor: pointer; text-decoration: none;&quot;&gt;According to the Associated Press&lt;/a&gt;, Freeman also said that 2009 is a &quot;very sensitive year politically in China,&quot; with it being 50 years since the Dalai Lama fled Tibet, 30 years after the democracy wall movement, and 20 years since Tiananmen Square.&lt;br /&gt;&lt;br /&gt;Cui Jin, a spokeswoman for Google in China said that the search engine does not generatre any pornographic content and obeys Chinese law. &quot;If we find any violation, we will take action. So far, I haven&#39;t seen any examples of violations,&quot; she said.&lt;br /&gt;&lt;br /&gt;California-based company spokesman, Scott Rubin, added that Google has no control over the content of the billions of pages in its index.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/2070563880738216641/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/2070563880738216641?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2070563880738216641'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2070563880738216641'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/01/google-targeted-in-chinese-internet.html' title='Google targeted in Chinese Internet crackdown'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-8972641564075644863</id><published>2009-01-07T09:32:00.002+05:30</published><updated>2009-01-07T09:35:20.994+05:30</updated><title type='text'>Google ranked as #3 spammer&#39;s paradise</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2Xn_6xwHj7NedOAQxQiXxcfILm-BjxiO9F1Fl64F1STqxvgyUXbPtXb3yLO3JwV9N2mIZzO5C6kAaIloKuKYrKO4qwjZ6Lq7FgFtdJphGJ2DQxWgfCrC8LEXNz50EAWNKDi64kwjDww4/s1600-h/asdasd.jpg&quot;&gt;&lt;img style=&quot;margin: 0pt 0pt 10px 10px; float: right; cursor: pointer; width: 200px; height: 84px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2Xn_6xwHj7NedOAQxQiXxcfILm-BjxiO9F1Fl64F1STqxvgyUXbPtXb3yLO3JwV9N2mIZzO5C6kAaIloKuKYrKO4qwjZ6Lq7FgFtdJphGJ2DQxWgfCrC8LEXNz50EAWNKDi64kwjDww4/s200/asdasd.jpg&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5288397851782417650&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;As of today (6 January 2009), Google has been ranked as the third worst &quot;spam service ISP&quot; by Spamhaus.org.&lt;br /&gt;&lt;br /&gt;Besides not doing enough to stop dodgy drug companies redirecting unwary consumers through Google Docs, the company has been serving as a major host to those intent on committing advance-fee fraud (one example being the &quot;Nigerian&quot; or &quot;419 letter&quot;), mule fraud (in this case, setting up an email account as a fake &quot;intermediary&quot; or escrow service to dupe an unsuspecting punter), and excessive spamvertising through its Gmail and Blogger services.&lt;br /&gt;&lt;br /&gt;No respectable ISP wants to be seen as pro-spam, but the fact is that some companies permit spammers and scammers to operate through their networks. Simple greed could be the motive, or it could be that some companies simply are not targetting their resources effectively to minimise the abuse of their networks.&lt;br /&gt;&lt;br /&gt;Microsoft used to be a regular visitor to Spamhaus&#39;s dubious top ten, but they seem to have sorted themselves out. According to Richard Cox of Spamhaus, &quot;Microsoft got rid of the bad guys, and off they went to Google, which is now hosting a lot of the stuff that was on Microsoft&#39;s domains.&quot;&lt;br /&gt;&lt;br /&gt;Google, it seems, has a way to go.</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/8972641564075644863/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/8972641564075644863?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8972641564075644863'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8972641564075644863'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/01/google-ranked-as-3-spammers-paradise.html' title='Google ranked as #3 spammer&#39;s paradise'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2Xn_6xwHj7NedOAQxQiXxcfILm-BjxiO9F1Fl64F1STqxvgyUXbPtXb3yLO3JwV9N2mIZzO5C6kAaIloKuKYrKO4qwjZ6Lq7FgFtdJphGJ2DQxWgfCrC8LEXNz50EAWNKDi64kwjDww4/s72-c/asdasd.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-8158452246572643336</id><published>2009-01-02T17:19:00.000+05:30</published><updated>2009-01-02T17:21:47.698+05:30</updated><title type='text'>Google Browser Security Handbook Available For Download</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: &#39;Trebuchet MS&#39;; font-size: 13px; &quot;&gt;&lt;p style=&quot;line-height: 1.5em; text-align: justify; &quot;&gt;To assist web developers, browser engineers and information security researchers further, Google has released a Browser Security Handbook. This handbook is meant to furnish a one-stop reference to key security properties of contemporary web browsers. Google has commented: “Insufficient understanding of these often poorly-documented characteristics is a major contributing factor to the prevalence of several classes of security vulnerabilities”.&lt;br /&gt;&lt;span id=&quot;more-17787&quot;&gt;&lt;/span&gt;&lt;br /&gt;The Browser Security Handbook covers almost all the browsers available, e.g. Microsoft Internet Explorer, Mozilla Firefox, Apple Safari, Opera, Google Chrome as well as Android embedded browser. The content of this handbook is generally divided into three main part: “Basic concepts behind web browsers”, “Standard browser security features” and “Experimental and legacy security mechanisms”. It has also included many practical examples for downloading.&lt;/p&gt;&lt;p style=&quot;line-height: 1.5em; text-align: justify; &quot;&gt;&lt;strong&gt;Direct Link&lt;/strong&gt;:&lt;br /&gt;&lt;a href=&quot;http://code.google.com/p/browsersec/wiki/Main&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/outbound/article/http://code.google.com/p/browsersec/wiki/Main&#39;);&quot; style=&quot;color: rgb(0, 0, 255); text-decoration: none; &quot;&gt;Browser Security Handbook&lt;/a&gt;&lt;br /&gt;&lt;a href=&quot;http://browsersec.googlecode.com/files/browser_tests-1.03.tar.gz&quot; onclick=&quot;javascript:pageTracker._trackPageview(&#39;/outbound/article/http://browsersec.googlecode.com/files/browser_tests-1.03.tar.gz&#39;);&quot; style=&quot;color: rgb(0, 0, 255); text-decoration: none; &quot;&gt;Test Cases&lt;/a&gt;&lt;/p&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/8158452246572643336/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/8158452246572643336?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8158452246572643336'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8158452246572643336'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2009/01/google-browser-security-handbook.html' title='Google Browser Security Handbook Available For Download'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-5202678526004060587</id><published>2008-12-09T10:54:00.005+05:30</published><updated>2008-12-09T10:57:47.428+05:30</updated><title type='text'>Everything you wanted to know about Google</title><content type='html'>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(68, 68, 68);   line-height: 18px; font-family:Verdana;font-size:12px;&quot;&gt;&quot;Everything you always wanted to know about Google, but were afraid to ask&quot; was the title of &lt;a href=&quot;http://www.techcrunch.com/2008/12/02/everything-you-always-wanted-to-know-about-google/&quot; target=&quot;_blank&quot; style=&quot;outline-style: none; outline-width: initial; outline-color: initial; color: rgb(51, 102, 153); cursor: pointer; text-decoration: none; &quot;&gt;this very interesting 34-slide presentation on Google&lt;/a&gt; prepared by &lt;a href=&quot;http://www.fabernovel.com/&quot; target=&quot;_blank&quot; style=&quot;outline-style: none; outline-width: initial; outline-color: initial; color: rgb(51, 102, 153); cursor: pointer; text-decoration: none; &quot;&gt;FaberNovel&lt;/a&gt;, a french consulting firm. &lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot;   style=&quot;color: rgb(68, 68, 68);   line-height: 18px; font-family:Verdana;font-size:12px;&quot;&gt;&lt;br /&gt;It is hard to realize the real nature of this just 10 years old giant given the number of services it has continuously released, updated (and sometimes shut down) or acquired. The presentation gives a great overview of the company&#39;s overall strategy and the reasons it has become what it is today. &lt;br /&gt;&lt;br /&gt;It addresses some key questions about the company&#39;s future, how Google won&#39;t be affected by the crisis, its relation with Microsoft and its advantages on Facebook, its footprint in the infrastructure and mobile world and &lt;a href=&quot;http://www.slideshare.net/misteroo/all-about-google-presentation/v1&quot; target=&quot;_blank&quot; style=&quot;outline-style: none; outline-width: initial; outline-color: initial; color: rgb(51, 102, 153); cursor: pointer; text-decoration: none; &quot;&gt;more&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlABegkJtis5ZcCXF5fEleslnazMh7WLVhlHIlmZIKLeKmfeDnC67zGRTcpdbtFIKF9K-NxLMiXN-2Y-PCz2Ze4GUco2iguFHGeCZ4c03DRL6kSc6Cuw1jybU6LH9lTV71Y4JIkelvSl8/s1600-h/3079452536_c5156e23cd_o.jpg&quot;&gt;&lt;img style=&quot;cursor:pointer; cursor:hand;width: 400px; height: 250px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlABegkJtis5ZcCXF5fEleslnazMh7WLVhlHIlmZIKLeKmfeDnC67zGRTcpdbtFIKF9K-NxLMiXN-2Y-PCz2Ze4GUco2iguFHGeCZ4c03DRL6kSc6Cuw1jybU6LH9lTV71Y4JIkelvSl8/s400/3079452536_c5156e23cd_o.jpg&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5277657667275308834&quot; /&gt;&lt;/a&gt;&lt;div&gt;&lt;br /&gt;&lt;br /&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;color: rgb(68, 68, 68);  line-height: 18px;font-family:Verdana;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/5202678526004060587/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/5202678526004060587?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5202678526004060587'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5202678526004060587'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/12/everything-you-always-wanted-to-know.html' title='Everything you wanted to know about Google'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjlABegkJtis5ZcCXF5fEleslnazMh7WLVhlHIlmZIKLeKmfeDnC67zGRTcpdbtFIKF9K-NxLMiXN-2Y-PCz2Ze4GUco2iguFHGeCZ4c03DRL6kSc6Cuw1jybU6LH9lTV71Y4JIkelvSl8/s72-c/3079452536_c5156e23cd_o.jpg" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-8087340160990788397</id><published>2008-11-14T11:56:00.001+05:30</published><updated>2008-11-14T11:56:53.225+05:30</updated><title type='text'>How to Access Blocked Websites?</title><content type='html'>&lt;span style=&quot;font-size:100%;&quot;&gt;Blocking access to undesirable Web sites through the use of Internet protocol filters has been a common government tactic since commercial Internet access first became available here in 1995. China and Saudi Arabia are believed to extend greater censorship over the net than any other country in the world under the pretext of information control.&lt;br /&gt;&lt;br /&gt;Most of the blacklisted sites in Saudi Arabia are either sexually explicit or about religion, women, health, drugs and pop culture. They even block access to websites about bathing suits. So if you want to buy something to swim in, they seem to treat that as if it were pornographic in Saudi Arabia.&lt;br /&gt;&lt;br /&gt;In China, webites containing sexually explicit content were among those blocked, but they also included sites on sensitive topics such as Tibet, Taiwan, and dissident activity. China also blocks access to Google News, Typepad and Blogger hosted blogs.&lt;br /&gt;&lt;br /&gt;But what if an innocent website is accidentally blocked by your ISP or your government. There are always legitimate reasons to visit these blocked websites. We have listed a few methods to help you access blocked websites in school, college, office or at home.&lt;br /&gt;&lt;br /&gt;Approach 1: There are websites Anonymizer who fetch the blocked site/ page from their servers and display it to you. As far as the service provider is concerned you are viewing a page from Anonymizer and not the blocked site.&lt;br /&gt;&lt;br /&gt;Approach 2: To access the blocked Web site. type the IP number instead of the URL in the address bar. But if the ISP software maps the IP address to the web server (reverse DNS lookup), the website will remain blocked.&lt;br /&gt;&lt;br /&gt;Approach 3: Use a URL redirection service like tinyurl.com or snipurl.com. These domain forward services sometimes work as the address in the the url box remain the redirect url and do not change to the banned site.&lt;br /&gt;&lt;br /&gt;Approach 4: Use Google Mobile Search. Google display the normal HTML pages as if you are viewing them on a mobile phone. During the translation, Google removes the javascript content and CSS scripts and breaks a longer page into several smaller pages. [link] View this website in Google Mobile&lt;br /&gt;&lt;br /&gt;Approach 5: Enter the URL in Google or Yahoo search and then visit the cached copy of the page. To retrieve the page more quickly from Google&#39;s cache, click &quot;Cached Text Only&quot; while the browser is loading the page from cache.&lt;br /&gt;&lt;br /&gt;Approach 6: A recent Oreilly story on accessing blocked websites suggested an approach to access restricted web sites using Google language tools service as a proxy server. Basically, you have Google translate your page from English to English (or whatever language you like). Assuming that Google isn’t blacklisted in your country or school, you should be able to access any site with this method. Visit this site via Google Proxy&lt;br /&gt;&lt;br /&gt;Approach 7: Anonymous Surfing Surf the internet via a proxy server. A proxy server (or proxies) is a normal computer that hides the identity of computers on its network from the Internet. Which means that only the address of the proxy server is visible to the world and not of those computers that are using it to browse the Internet. Just visit the proxy server website with your Web browser and enter a URL (website address) in the form provided.&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/8087340160990788397/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/8087340160990788397?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8087340160990788397'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8087340160990788397'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/11/how-to-access-blocked-websites.html' title='How to Access Blocked Websites?'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-5220224468799344686</id><published>2008-11-13T18:58:00.002+05:30</published><updated>2008-11-13T19:00:55.562+05:30</updated><title type='text'>This is Your Own Password Protected Folder</title><content type='html'>&lt;div&gt;Copy the below text into a  Notepad and save it as *.bat  in your  folder.&lt;/div&gt;&lt;div&gt;Then in the  bolded text (see the 22nd line) enter your own password. Thats all !&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;enjoy :)&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Arial; font-size: 13px; line-height: 16px; &quot;&gt;cls&lt;br /&gt;@ECHO OFF&lt;br /&gt;title Folder Passworder [Beta Test] by zXara &lt;br /&gt;if EXIST &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot; goto UNLOCK&lt;br /&gt;if NOT EXIST Locker goto MDLOCKER&lt;br /&gt;:CONFIRM&lt;br /&gt;echo Are you sure u want to Lock the folder(Y/N)&lt;br /&gt;set/p &quot;cho=&gt;&quot;&lt;br /&gt;if %cho%==Y goto LOCK&lt;br /&gt;if %cho%==y goto LOCK&lt;br /&gt;if %cho%==n goto END&lt;br /&gt;if %cho%==N goto END&lt;br /&gt;echo Invalid choice.&lt;br /&gt;goto CONFIRM&lt;br /&gt;:LOCK&lt;br /&gt;ren Locker &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;attrib +h +s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;echo Folder locked&lt;br /&gt;goto End&lt;br /&gt;:UNLOCK&lt;br /&gt;echo Enter password to Unlock folder&lt;br /&gt;set/p &quot;pass=&gt;&quot;&lt;br /&gt;if NOT %pass%== &lt;span class=&quot;Apple-style-span&quot; style=&quot;font-weight: bold;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: medium;&quot;&gt;password&lt;/span&gt;&lt;/span&gt; goto FAIL&lt;br /&gt;attrib -h -s &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot;&lt;br /&gt;ren &quot;Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}&quot; Locker&lt;br /&gt;echo Folder Unlocked successfully&lt;br /&gt;goto End&lt;br /&gt;:FAIL&lt;br /&gt;echo Invalid password&lt;br /&gt;goto end&lt;br /&gt;:MDLOCKER&lt;br /&gt;md Locker&lt;br /&gt;echo Locker created successfully&lt;br /&gt;goto End&lt;br /&gt;:End&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/5220224468799344686/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/5220224468799344686?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5220224468799344686'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5220224468799344686'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/11/this-is-your-own-password-protected.html' title='This is Your Own Password Protected Folder'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-7460393057566689406</id><published>2008-10-28T19:25:00.002+05:30</published><updated>2008-10-28T19:29:34.313+05:30</updated><title type='text'>Browser Password Revealer - Firefox, IE7, Opera, Safari</title><content type='html'>&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3sRGGIUh-v-53rFHR52USYbVMrtLtrvoTIu1dUGsCWLJK8H1spp6n1FmZrGzpwMxnE-3y8tbZmh_oMPP9fmkxyfZ9GtndIvYxvXjC022kbXDZpv0dWNf9aeeq5BbpxQxQQuRiImcLPDI/s1600-h/asterisk+revealer.png&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;Here is a simple text  to reveal the  Asterisk password  just enter this  javascript code in address bar and get the password !!!  &lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 238); &quot;&gt;&lt;img src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3sRGGIUh-v-53rFHR52USYbVMrtLtrvoTIu1dUGsCWLJK8H1spp6n1FmZrGzpwMxnE-3y8tbZmh_oMPP9fmkxyfZ9GtndIvYxvXjC022kbXDZpv0dWNf9aeeq5BbpxQxQQuRiImcLPDI/s320/asterisk+revealer.png&quot; border=&quot;0&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5262203893035498706&quot; style=&quot;display: block; margin-top: 0px; margin-right: auto; margin-bottom: 10px; margin-left: auto; text-align: center; cursor: pointer; width: 320px; height: 121px; &quot; /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Have fun revealing random useless passwords, don&#39;t get into trouble!  ;)&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;a href=&quot;http://aksn1p3r.googlepages.com/RevealIt.txt&quot; target=&quot;_blank&quot;&gt;grab this code&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/7460393057566689406/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/7460393057566689406?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/7460393057566689406'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/7460393057566689406'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/10/browser-password-revealer-firefox-ie7.html' title='Browser Password Revealer - Firefox, IE7, Opera, Safari'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi3sRGGIUh-v-53rFHR52USYbVMrtLtrvoTIu1dUGsCWLJK8H1spp6n1FmZrGzpwMxnE-3y8tbZmh_oMPP9fmkxyfZ9GtndIvYxvXjC022kbXDZpv0dWNf9aeeq5BbpxQxQQuRiImcLPDI/s72-c/asterisk+revealer.png" height="72" width="72"/><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-1778393167054969968</id><published>2008-10-27T17:56:00.000+05:30</published><updated>2008-10-27T17:58:09.645+05:30</updated><title type='text'>How to Extend Your Wireless Network’s Range</title><content type='html'>&lt;span class=&quot;Apple-style-span&quot; style=&quot;border-collapse: separate; color: rgb(51, 51, 51); font-family: Verdana; font-size: 11px; font-style: normal; font-variant: normal; font-weight: normal; letter-spacing: normal; line-height: normal; orphans: 2; text-align: justify; text-indent: 0px; text-transform: none; white-space: normal; widows: 2; word-spacing: 0px;&quot;&gt;&lt;p&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;&lt;br /&gt;Wi-Fi networking range&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;is like money, candy, and free time. You can never have too much of it. Getting more range out of your wireless networking gear can be a challenge, but it isn’t impossible. Here are some pointers on how to extended your Wi-Fi range, hopefully letting you cover your entire house or office.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Upgrade to 802.11n&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;- OK, it’s not a free solution, but it’s the best one there is. The new 802.11n gear (even though it has yet to be finalized by the standards body in charge of it) has dramatically better range, speed, and stability than 802.11b or g: After simply upgrading your router to an 802.11n model, you will likely find that your signal is stronger and more reliable in every room, plus you’ll experience faster throughput all around (especially if your laptop has 802.11n technology in it). I’ve also found that 802.11n routers crash less frequently, another big bonus. A new 802.11n router will set you back from $60 to $180.&lt;/li&gt;&lt;/ul&gt;&lt;ul&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Try a Range Extender or Repeater&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;- You’ll find lots of hardware like this on the market. Some of it works well, some doesn’t. In general, I’ve had the best luck with extenders when they are made by the same company who made your router. Some vendors also offer “high-gain” antennas as a replacement for the little ones on your router. They’re worth a try.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Move Your Router&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;- Got DSL or a cable modem? You can attach your network hardware to any working phone line or cable outlet, respectively, in the house. Obviously, picking someplace central to connect your equipment will give you the best overall coverage throughout the house. But even if you can’t move the equipment to another location, minor changes can have drastic effects. Wi-Fi signals are blocked by thick metal and concrete, so try picking the router up off the floor and putting it on a table or mounting it on the wall. Pulling the router out from behind your monster TV or entertainment center can also boost the signal dramatically. Experiment by watching your Wi-Fi client’s signal meter to see if something helps.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Tweak Those Antennas&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;- They’re not just for decoration: Orienting your antennas (try horizontal, vertical, and/or a 45-degree angle) differently can offer decent results with minimal effort. In general, all antennas should be oriented the same way. Again, experiment to see what works best.&lt;/li&gt;&lt;li&gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;Change Channels&lt;/span&gt;&lt;span class=&quot;Apple-converted-space&quot;&gt; &lt;/span&gt;- For this tweak you’ll need to get into your router’s management screen, either through an installed application or by typing the IP address of the router into a web browser. You’ll find a “Wireless Channel” (or similar) setting in the wireless configuration portion of your router. Most routers default to channel 1, 6, or 11, but if your neighbors are all on channel 6, then you might be seeing slow speed and lower range due to interference. Try one of the other channels (start with 1, 6, and 11, but other channel numbers are worth a shot, too), to see if you get a better signal with them. Remember that your neighbors may also replace their equipment at some point, so if you see a sudden drop in range or speed, try a new channel.&lt;/li&gt;&lt;/ul&gt;&lt;br /&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/1778393167054969968/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/1778393167054969968?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/1778393167054969968'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/1778393167054969968'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/10/how-to-extend-your-wireless-networks.html' title='How to Extend Your Wireless Network’s Range'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-6631144816654094345</id><published>2008-09-26T18:30:00.000+05:30</published><updated>2008-09-26T18:32:02.937+05:30</updated><title type='text'>Fix a corrupt system Windows XP O/S</title><content type='html'>Windows XP has the ability to repair itself from 3rd party software overwriting important system files. To fix this we will use a utility called System File Checker or sfc for short&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Parameters &lt;/b&gt;&lt;br /&gt;/scannow : Scans all protected system files immediately.&lt;br /&gt;/scanonce : Scans all protected system files once.&lt;br /&gt;/scanboot : Scans all protected system files every time the computer is restarted.&lt;br /&gt;/revert : Returns the scan to its default operation.&lt;br /&gt;/purgecache : Purges the Windows File Protection file cache and scans all protected system files immediately.&lt;br /&gt;/cachesize=x : Sets the size, in MB, of the Windows File Protection file cache.&lt;br /&gt;/? : Displays help at the command prompt.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Things You&#39;ll Need&lt;/b&gt;&lt;br /&gt;Windows XP Home/Pro system depends on your Operation System (O/S)&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Steps&lt;/b&gt;&lt;br /&gt;1 Step One&lt;br /&gt;Go to Start then run and then type sfc /scan now. It will Prompt you to insert a cd&lt;br /&gt;2 Step Two&lt;br /&gt;Insert the cd and let the SFC utility run&lt;br /&gt;3 Step Three&lt;br /&gt;Whats going on? the SFC will check your changes to the main system files.</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/6631144816654094345/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/6631144816654094345?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6631144816654094345'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6631144816654094345'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/09/fix-corrupt-system-windows-xp-os.html' title='Fix a corrupt system Windows XP O/S'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-6430300358170004164</id><published>2008-08-06T12:08:00.001+05:30</published><updated>2008-08-06T12:11:29.421+05:30</updated><title type='text'>How to uninstall Internet Explorer 8 Beta from the computer</title><content type='html'>Steps to uninstall Internet Explorer 8 Beta from the computer:&lt;br /&gt;&lt;br /&gt;Note: These steps are only for Windows XP with Service Pack 3.&lt;br /&gt;&lt;br /&gt;1) Click on Start, click on my computer.&lt;br /&gt;2) Browse to C:\WINDOWS\&lt;br /&gt;&lt;br /&gt;Note: You will have to unhide the files and folders: 1. Start Windows Explorer. To do this, go to &quot; My Computer &quot;.&lt;br /&gt;  2. Click Tools, and then click Folder Options.&lt;br /&gt;  3. Click the View tab.&lt;br /&gt;4. click Show hidden files and folders, click to clear the Hide Protected Operating System files (recommended) check box, and then click OK.&lt;br /&gt;5.  Double click on the folder “ie8″.&lt;br /&gt;6.  Double click on the folder “spuninst”.&lt;br /&gt;7.  Double click on the executable “spuninst.exe”.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Follow the prompts and then click on “Finish” to restart the computer.</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/6430300358170004164/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/6430300358170004164?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6430300358170004164'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/6430300358170004164'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/08/how-to-uninstall-internet-explorer-8.html' title='How to uninstall Internet Explorer 8 Beta from the computer'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-4028950515896148980</id><published>2008-08-03T14:36:00.002+05:30</published><updated>2008-08-03T14:41:15.800+05:30</updated><title type='text'>Connect Two Computers Using LAN</title><content type='html'>&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(51, 51, 51); font-family: Tahoma; font-size: 13px;&quot;&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: rgb(0, 0, 0); &quot;&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;&lt;div&gt;Fully functional Ethernet Adapters (Network Cards) installed on both computers systems.&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;   1. Be sure that both computers are logged in to Windows.&lt;/div&gt;&lt;div&gt;   2. Connect each end of the cat5 crossover cables in to the network cards of each computer.&lt;/div&gt;&lt;div&gt;   3. Bootup both computers and sign them both on to Windows.&lt;/div&gt;&lt;div&gt;   4. In order for both PC&#39;s to be able to communicate together, the Ethernet adapters will need to be configured with a static IP address and a common Subnet mask. As an example, assign one PC an IP address of 192.198.0.1 and assign the second PC an IP address of 192.198.0.2. Both machines should use the Subnet mask 255.255.255.0. Here&#39;s how to configure your Network Card: Go to Start&gt;&gt; Control Panel&gt;&gt; Network Connections&gt;&gt; Right click your Local Area Connection and select Properties. Scroll the list for the entry titled: Internet Protocol (TCP/IP). Click the entry and select Properties. Under the General tab, tick the box titled: Use the following IP address. Enter the IP address and Subnet mask that you would like to use. Repeat the steps above for the second computer system.&lt;/div&gt;&lt;div&gt;   5. Be sure that both PC&#39;s have a common workgroup name of 15 characters or less. Here&#39;s how: Go to Start&gt;&gt; Control Panel&gt;&gt;System. Select the Computer Name tab. Click the Change button. Change the Workgroup name. Repeat these instructions on the second computer ensuring that both computers are named exactly the same.&lt;/div&gt;&lt;div&gt;   6. Reboot both computer systems.&lt;/div&gt;&lt;div&gt;   7. Next, open a command prompt on one of the computers by going to Start&gt;&gt;Run. Type in: command [Enter] or click OK.&lt;/div&gt;&lt;div&gt;   8. Type: ping 192.198.0.2 (if you are using the computer assigned with 192.198.0.01) press Enter.&lt;/div&gt;&lt;div&gt;   9. Five replies to your ping should be indicated.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Note: If you receive a &quot;timed out&quot; message when attempting to ping your selected IP address. It is possible that the Internet Connection Firewall is interfering. Try right clicking on &quot;My Network Places&quot;, then select Properties. Right click your Local Area Connection and select Properties once again. Click the Advanced tab. Uncheck the box titled: &quot;Protect my computer and network by limiting or preventing access to this computer from the Internet&quot;. Click OK. Now, try pinging the selected IP address again.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;  10. Once you get the two computers to communicate successfully together, you can now enjoy the benefits of file sharing, printer sharing and Internet connection sharing. Nice work!&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol start=&quot;10&quot; style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;&lt;/ol&gt;&lt;ol style=&quot;font-family: Tahoma; color: rgb(255, 255, 204); font-size: 10pt;&quot;&gt;  &lt;/ol&gt;    &lt;/span&gt;&lt;/div&gt;&lt;blockquote&gt;&lt;/blockquote&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/4028950515896148980/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/4028950515896148980?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4028950515896148980'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4028950515896148980'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/08/connect-two-computers-using-lan.html' title='Connect Two Computers Using LAN'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-3553457827641819014</id><published>2008-07-29T17:45:00.000+05:30</published><updated>2008-07-29T17:46:43.353+05:30</updated><title type='text'>Find IP info using Gmail/Yahoo/Hotmail</title><content type='html'>When you recieve an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;First of all, the IP address is generally found in the headers enclosed beween square brackets, for instance, [129.130.1.1]&lt;br /&gt;Finding IP address in Gmail&lt;br /&gt;&lt;br /&gt;1. Log into your Gmail account with your username and password.&lt;br /&gt;2. Open the mail.&lt;br /&gt;3. To display the email headers,&lt;br /&gt;&lt;br /&gt;* Click on the inverted triangle beside Reply. Select Show Orginal.&lt;br /&gt;&lt;br /&gt;4. manually find the IP address, proceed to 5.&lt;br /&gt;5. Look for Received: from followed by the IP address between square brackets [ ].&lt;br /&gt;&lt;br /&gt;Received: from [69.138.30.1] by web4587.mail.***.yahoo.com&lt;br /&gt;&lt;br /&gt;6. If you find more than one Received: from patterns, select the last one.&lt;br /&gt;7. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;Finding IP address in Yahoo! Mail&lt;br /&gt;&lt;br /&gt;1. Log into your Yahoo! mail with your username and password.&lt;br /&gt;&lt;br /&gt;2. Click on Inbox or whichever folder you have stored your mail.&lt;br /&gt;&lt;br /&gt;3. Open the mail.&lt;br /&gt;&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on General Preferences&lt;br /&gt;* Scroll down to Messages where you have the Headers option&lt;br /&gt;* Make sure that Show all headers on incoming messages is selected&lt;br /&gt;* Click on the Save button&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;&lt;br /&gt;5. You should see similar headers like above&lt;br /&gt;&lt;br /&gt;Or if you want to manually find the IP address, proceed to 6.&lt;br /&gt;&lt;br /&gt;6. Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.&lt;br /&gt;&lt;br /&gt;That is be the IP address of the sender.&lt;br /&gt;If there are many instances of Received: from with the IP address, select the IP address in the last pattern. If there are no instances of Received: from with the IP address, select the first IP address in X-Originating-IP.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;7. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;Finding IP address in Hotmail&lt;br /&gt;&lt;br /&gt;1. Log into your Hotmail account with your username and password.&lt;br /&gt;&lt;br /&gt;2. Click on the Mail tab on the top.&lt;br /&gt;&lt;br /&gt;3. Open the mail.&lt;br /&gt;&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on Mail Display Settings&lt;br /&gt;* In Message Headers, make sure Advanced option is checked&lt;br /&gt;* Click on Ok button&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;&lt;br /&gt;5. You should see the email headers now.&lt;br /&gt;&lt;br /&gt;6. manually find the IP address, proceed to 7.&lt;br /&gt;&lt;br /&gt;7. If you find a header with X-Originating-IP: followed by an IP address, that is the sender’s IP address&lt;br /&gt;&lt;br /&gt;Hotmail headers&lt;br /&gt;&lt;br /&gt;In this case the IP address of the sender is [68.34.60.59].&lt;br /&gt;&lt;br /&gt;8. If you find a header with Received: from followed by a Gmail proxy like this&lt;br /&gt;&lt;br /&gt;Hotmail headers&lt;br /&gt;&lt;br /&gt;Look for Received: from followed by IP address within square brackets[&lt;br /&gt;In this case, the IP address of the sender is [69.140.7.58].&lt;br /&gt;&lt;br /&gt;9. Or else if you have headers like this&lt;br /&gt;&lt;br /&gt;Hotmail headers&lt;br /&gt;&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [61.83.145.129] (Spam mail).&lt;br /&gt;&lt;br /&gt;10. If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.&lt;br /&gt;&lt;br /&gt;11. Track the IP address of the sender</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/3553457827641819014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/3553457827641819014?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/3553457827641819014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/3553457827641819014'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/07/find-ip-info-using-gmailyahoohotmail.html' title='Find IP info using Gmail/Yahoo/Hotmail'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-4455018288111539410</id><published>2008-07-29T17:22:00.001+05:30</published><updated>2008-07-29T17:22:50.396+05:30</updated><title type='text'>Google Hits 1 Trillion URLs</title><content type='html'>&lt;span name=&quot;intelliTxt&quot; id=&quot;intelliTxt&quot;&gt;If the web were a vast savanna of content and webpages, search engines might be our safari guides, helping us navigate through miles and miles of barren wastes. At the moment, Google seems to be the guide of choice for most web travellers, and for good reason too: Google has reached over one trillion unique indexed URLs, according to a post on the company weblog by Jesse Alpert &amp;amp; Nissan Hajaj. Contrast this to the paltry 26 million URLs Google had in 1998 when it first started out, and even the one billion the company had attained in 2000.&lt;br /&gt;&lt;br /&gt;According to the blog: &quot;&lt;i&gt;Over the last eight years, we&#39;ve seen a lot of big numbers about how much content is really out there. Recently, even our search engineers stopped in awe about just how big the web is these days -- when our systems that process links on the web to find new content hit a milestone: 1 trillion (as in 1,000,000,000,000) unique URLs on the web at once!&lt;/i&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/4455018288111539410/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/4455018288111539410?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4455018288111539410'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4455018288111539410'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/07/google-hits-1-trillion-urls.html' title='Google Hits 1 Trillion URLs'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-2901857983764819998</id><published>2008-07-23T00:24:00.000+05:30</published><updated>2008-07-23T00:25:33.829+05:30</updated><title type='text'>Google Gets 70% of U.S. Searches</title><content type='html'>Seventy percent of U.S. searches in June were done on Google Inc.&#39;s search engine, according to Web measurement figures from market research company Hitwise Pty. Ltd.&lt;br /&gt;&lt;br /&gt;In the four weeks ending June 28, Google accounted for 69.17% of all U.S. searches, up from 63.92%, or 8%, from the same period a year ago, according to Hitwise.&lt;br /&gt;&lt;br /&gt;But Google&#39;s gain led to lower numbers for other search companies. Yahoo Inc. received 19.62% of U.S. searches in June, down from 21.31% last year, while MSN Search received 5.46%, down from 9.85% in June 2007.&lt;br /&gt;&lt;br /&gt;Ask.com , on the other hand, had better news, collecting 4.17% of searches, up from 3.42% a year ago, according to Hitwise.&lt;br /&gt;&lt;br /&gt;&quot;Google just continues to grab market share,&quot; said Hitwise spokesman Matt Tatham. &quot;There&#39;s just no ceiling for them.&quot; And when searches on Google go up, searches on the other search engines go down, he said.&lt;br /&gt;&lt;br /&gt;The jump in searches at Ask.com was probably because it redesigned its home page and added some new functions to its search that may have drawn people in, Tatham said.&lt;br /&gt;&lt;br /&gt;&quot;Search engines continue to be the primary way Internet users navigate to key industry categories,&quot; Hitwise said. Year over year, the travel, news and media, entertainment, business and finance, sports, online video and social networking categories had double digit growth in traffic coming from search engines, the company said.</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/2901857983764819998/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/2901857983764819998?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2901857983764819998'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2901857983764819998'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/07/google-gets-70-of-us-searches.html' title='Google Gets 70% of U.S. Searches'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-5748325877878363919</id><published>2008-06-18T10:40:00.001+05:30</published><updated>2008-06-18T10:45:45.157+05:30</updated><title type='text'>Administrator and User Passwords in Windows XP</title><content type='html'>&lt;span style=&quot;color:#3333ff;&quot;&gt;Direct Bootup Without Typing Password&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1. At a command prompt, type &quot;control userpasswords2&quot; and press Enter to open the Windows 2000-style User Accounts    application.2. On the Users tab, clear the Users Must Enter A User Name And Password To Use This Computer check box and then    click OK.3. In the Automatically Log On dialog box that appears, type the user name and password for the account you want to be    logged on each time you start your computer.&lt;br /&gt;Remove Login Password&lt;br /&gt;Control Panel/Administrative Tools/Local Security Settings/Minimum Password Length/Reduce it to 0 (No password required). Control Panel/User Account/Your Account/Remove Password. &lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q298/2/52.asp&quot;&gt;Cannot Change the Administrator Password in Control Panel&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After you log on as an administrator to a computer that is not a member of a domain, when you double-click User Accounts in Control Panel to change the password for the built-in Administrator account, the Administrator account may not appear in the list of user accounts. Consequently, you cannot change its password.This behavior can occur because the Administrator account logon option appears only in Safe mode if more than one account is created on the system. The Administrator account is available in Normal mode only if there are no other accounts on the system.  To work around this behavior:- If you are running Windows XP Home Edition, restart the computer and then use a power user account to log on to the  computer in Safe mode.- If you are running Windows XP Professional, reset the password in the Local Users and Groups snap-in in Microsoft  Management Console (MMC):1. Click Start, and then click Run.2. In the Open box, type &quot;mmc&quot; (without the quotation marks), and then click OK to start MMC.3. Start the Local Users and Groups snap-in.4. Under Console Root, expand &quot;Local Users and Groups&quot;, and then click Users.5. In the right pane, right-click Administrator, and then click Set Password.6. Click Proceed in the message box that appears.7. Type and confirm the new password in the appropriate boxes, and then click OK.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q149/4/27.asp&quot;&gt;How to Change User Password at Command Prompt&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;How to use the net user command to change the user password at a Windows command prompt. Only administrators can change domain passwords at the Windows command prompt.  To change a user&#39;s password at the command prompt, log on as an administrator and type:  &quot;net user &lt;user_name&gt; * /domain&quot; (without the quotation marks)When you are prompted to type a password for the user, type the new password, not the existing password. After you type the new password, the system prompts you to retype the password to confirm. The password is now changed.Alternatively, you can type the following command:  net user &lt;user_name&gt; &lt;new_password&gt;.  When you do so, the password changes without prompting you again. This command also enables you to change passwords in a batch file.Non-administrators receive a &quot;System error 5 has occurred. Access is denied&quot; error message when they attempt to change the password.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q310/5/84.asp&quot;&gt;How to Enable Automatic Logon in Windows &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;If you set a computer for auto logon, anyone who can physically obtain access to the computer can gain access to all of the computer contents, including any network or networks it is connected to. In addition, if you enable autologon, the password is stored in the registry in plaintext. The specific registry key that stores this value is remotely readable by the Authenticated Users group.&lt;br /&gt;As a result, this setting is only appropriate for cases where the computer is physically secured, and steps have been taken to ensure that untrusted users cannot remotely access the registry.&lt;br /&gt;1. Start/Run/Regedit, and then locate the following registry subkey:    HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\Winlogon2. Using your account name and password, double-click the DefaultUserName entry, type your user name, and then click    OK.3. Double-click the DefaultPassword entry, type your password, and then click OK.NOTE: The DefaultPassword value may not exist. If it does not:a. Click Add Value on the Edit menu.b. In the Value Name box, type DefaultPassword, and then click REG_SZ for the Data Typec. Type your password in the String box, and then save your changes.Also, if no DefaultPassword string is specified, Windows automatically changes the value of the AutoAdminLogon key from 1 (true) to 0 (false), thus disabling the AutoAdminLogon feature.4. Click Add Value on the Edit menu, enter AutoAdminLogon in the Value Name box, and then click REG_SZ for the Data    Type.5. Type &quot;1&quot; (without the quotation marks) in the String box, and then save your changes.6. Quit Regedit.7. Click Start, click Shutdown, and then click OK to turn off your computer.8. Restart your computer and Windows. You are now able to log on automatically.NOTE: To bypass the AutoAdminLogon process, and to log on as a different user, hold down the SHIFT key after you log off or after Windows restarts.Note that this procedure only applies to the first logon. To enforce this setting for subsequent logoffs, the administrator must set the following registry key:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\WindowsNT\CurrentVersion\WinlogonValue: ForceAutoLogonType: REG_SZData: 1&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q305/9/06.asp&quot;&gt;Windows XP Inherits Autologon Setting After Upgrade from Win2000&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After you upgrade a Microsoft Windows 2000-based computer, Windows XP Professional may start directly to the desktop without stopping at the Welcome screen or requiring you to type a username and password. If you then create a new user account, you may not receive any option that allows you to log on by using the new account.&lt;br /&gt;This behavior can occur if Windows 2000 was configured for automatic logon (Autologon). Windows XP inherits this configuration setting. &lt;br /&gt;To resolve this behavior, turn off the automatic logon feature and require a username and password at logon:1. Click Start on the Windows taskbar, and then click Run.2. In the Open box, type control userpasswords2, and then click OK.3. In the dialog box that appears, click to select the &quot;Users must enter a user name and password to use this computer&quot;     check box, and then click OK.To work around this behavior, log off from the Autologon account, and then log on by using the new account.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q281/6/99.asp&quot;&gt;Not Prompted to Create Password with New XP User Account&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;When you create a new user on a Microsoft Windows XP Home Edition-based computer, you are not prompted to create a password.  To create a password for a user account, click the icon for the account, and then click &quot;Create a Password&quot;.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/directory/article.asp?ID=KB;EN-US;q287536&quot;&gt;Stored User Names and Passwords Feature Interoperability at a Command Prompt&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;By default, the Stored User Names and Passwords feature creates a &quot;key&quot; for any connection that you make in the graphical user interface (GUI) that requires alternate credentials. When you make a connection at a command prompt by using the net use command and by passing alternate credentials, a key is not created.&lt;br /&gt;For the net use command to save the credentials in Credential Manager, use the /savecred switch. When you use the /savecred switch, any credentials that you are prompted for when you use the net use command are saved as a key.&lt;br /&gt;Therefore, if you are prompted for the user name and password (or if you are prompted only for the password) when you use the net use command (but not because you used an asterisk [*] in the net use command for password prompting) and the /savecred switch, the credentials are saved.&lt;br /&gt;When you type the net use * \\ computer_name \ share_name /savecred command, the user is prompted for a user name, and then the user is prompted for a password. When you type the net use * \\ computer_name \ share_name /u: domain_name \ user_name /savecred command, the user is prompted for a password. However, when you type one of the following commands, a key is not created: net use * \\ computer_name \ share_name * /user: domain_name \ user_name /savecred -or- net use * \\ computer_name \ share_name * /savecred /user: domain_name \ user_name If you type net help use at a command prompt, more information is displayed about the net use command.&lt;br /&gt;Password Has Expired Message&lt;br /&gt;Start/Programs/Administrative Tools/Local Security Policy/Account Policies/Password Policy.  In the right pane, right click, properties, modify (use accordingly). And Start/Programs/Administrative Tools/Computer Management/Local Users and Groups/Right Click &quot;User&quot;(intended)/Properties...Or with Admin privileges, at a command prompt type: net accounts /maxpwage:unlimited.&lt;br /&gt;To Create a Password Reset Disk&lt;br /&gt;The Forgotten Password Wizard lets you create a password reset disk that you can use to recover your user account and personalized computer settings if you forget your password.  The steps to perform this task differ depending on whether your computer is a member of a network domain or is part of a workgroup (or is a stand-alone computer).My Computer is on a DomainPress CTRL+ALT+DELETE to open the Windows Security dialog box.  Click Change Password. Click Backup to open the Forgotten Password Wizard. Click Next and then follow the instructions as they appear on the screen. My Computer is not on a DomainThe steps to perform this task differ depending on the type of user account you have. If you have a computer administrator account:  Open User Accounts in Control Panel. Click your account name. Under Related Tasks located on the left side of the window, click Prevent a forgotten password. In the Forgotten Password Wizard, follow the instructions as they appear on the screen. If you Have a Limited AccountOpen User Accounts in Control Panel. Under Related Tasks located on the left side of the window, click Prevent a forgotten password. In the Forgotten Password Wizard, follow the instructions as they appear on the screen. Notes:  To open User Accounts, click Start, point to Settings, click Control Panel, and then click User Accounts.&lt;br /&gt;     Certain Programs Do Not Work Correctly If You Log On Through a Limited User Account. &lt;br /&gt;     After you log on to a computer by using a Limited User Account, you may observe one or more of the following      behaviors when you try to use a program that is not expressly designed for Windows XP. Information &lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/default.aspx?scid=kb;EN-US;q307091&quot;&gt;here&lt;/a&gt;.&lt;br /&gt;Password Reset Disk OverviewTo protect user accounts in the event that the user forgets the password, every local user should make a password reset disk and keep it in a safe place. Then, if the user forgets his or her password, the password can be reset using the password reset disk and the user is able to access the local user account again.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/default.aspx?scid=kb;EN-US;q290260&quot;&gt;Resetting the Password&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After you reset the password of an account on a Windows XP-based computer that is joined to a workgroup, you may lose access to the user&#39;s:  Web page credentials, File share credentials, EFS-encrypted files, Certificates with private keys (SIGNED/ENCRYPTed e-mail). &lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/default.aspx?scid=kb;EN-US;q290260&quot;&gt;More information in detail here.&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;I assume no responsibility for the purpose to which this information is used. This includes employees attempting to bypass restrictions put into place by System Administrators on corporate machines.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://windows.about.com/library/tips/bltip115.htm&quot;&gt;Delete Admin Password&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Boot up with DOS and delete the sam.exe and sam.log files from Winnt\system32\config in your hard drive. Now when you boot up in NT the password on your built-in administrator account will be blank (No password). This solution works only if your hard drive is FAT.  [Editor&#39;s note: Use with caution, there may be other ramifications from performing this tip.]&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://home.eunet.no/%7Epnordahl/ntpasswd/&quot;&gt;Forgot your Admin Password&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This is a utility to (re)set the password of any user that has a valid (local) account on your NT system, by modifying the crypted password in the registrys SAM file.  You do not need to know the old password to set a new one. It works offline, that is, you have to shutdown your computer and boot off a floppydisk. The bootdisk includes stuff to access NTFS partitions and scripts to glue the whole thing together. Note: It will now also work with SYSKEY, including the option to turn it off!  &lt;a href=&quot;http://home.eunet.no/%7Epnordahl/ntpasswd/&quot;&gt;More information here.&lt;/a&gt;  &lt;a href=&quot;http://home.eunet.no/%7Epnordahl/ntpasswd/bootdisk.html&quot;&gt;Download here&lt;/a&gt;.&lt;br /&gt;All Passwords-Master Copy&lt;br /&gt;With Darn! Passwords! Just one password opens the safe that holds all those other ones for programs and web sites that require you to log in.  &lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://www.wugnet.com/shareware/spow.asp?ID=174&quot;&gt;Download Here.&lt;/a&gt;Just pick the password, and drag it and it&#39;s log-in (if there is one) into the program that uses it. No retyping is necessary (even in programs that do not accept the drag, you can just paste the password in). Go to the URL of a password protected site with the click of a button.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q295/0/50.asp&quot;&gt;Information on System Restore and Password Restoration&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Passwords That Are Restored:1. Program passwords are restored, such as Hotmail Messenger, AOL Messenger, Yahoo Messenger, and other Web server-based passwords. This behavior is by design: The programs simply cache these passwords; the actual passwords arestored on a Web server. System Restore does not actually change the password, but it changes the password that is remembered by the program. You can use the current password for the program to log on to the server.2. Domain and Computer passwords are restored. This behavior is by Design and is a limitation of System Restore. System Restore only rolls back the local machine state. Part of the information about joining domains resides in Active Directory, and Active Directory is not rolled back by System Restore.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q281/8/03.asp&quot;&gt;Migration Wizard Does Not Migrate Passwords &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The Migration Wizard does not migrate passwords. Passwords for Dial-Up Networking connections, Microsoft Outlook Express accounts, Microsoft Internet Explorer saved passwords, mapped drives, and so on will need to be reconfigured once the migration is complete.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q281/2/44.asp&quot;&gt;Administrator Account Not Used for Logon&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The administrator account and password created during Setup are used to log on in Safe Mode only. To create a password for user accounts, double-click Manage Users in Control Panel.&lt;br /&gt;Therefore, if you are prompted for the user name and password (or if you are prompted only for the password) when you use the net use command (but not because you used an asterisk [*] in the net use command for password prompting) and the /savecred switch, the credentials are saved.&lt;br /&gt;When you type the net use * \\ computer_name \ share_name /savecred command, the user is prompted for a user name, and then the user is prompted for a password. When you type the net use * \\ computer_name \ share_name /u: domain_name \ user_name /savecred command, the user is prompted for a password. However, when you type one of the following commands, a key is not created: net use * \\ computer_name \ share_name * /user: domain_name \ user_name /savecred -or- net use * \\ computer_name \ share_name * /savecred /user: domain_name \ user_name If you type net help use at a command prompt, more information is displayed about the net use command.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q283/1/11.asp&quot;&gt;Logon Name Not in Task Manager or Under Documents &amp;amp; Settings &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;When the Welcome screen is appears, the names that are displayed do not match any of the names of users&#39; folders under the Documents and Settings folder or any of the names on the Users tab in Task Manager.This behavior may occur if you have changed the name of the account in the User Accounts tool in Control Panel. By doing so, the new name appears on the Welcome screen, but the actual account name remains the same. The folders under the Documents and Settings folder and the names that are listed in Task Manager show the actual account name.To resolve this behavior, if the display name for a user account has been changed, you can find out which account the new display name belongs to by logging on as that user, starting Task Manager, and then clicking the Users tab.The user account that is marked as active is the one that is currently logged on. Also, you can find out which of the folders under Documents and Settings belongs to the currently logged-on user by right-clicking Start, and then clicking Explore. Windows Explorer will then start in the Start Menu folder of the currently logged-on user&#39;s folder.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q242/9/17.asp&quot;&gt;Administrator Unable to Unlock a &quot;Locked&quot; Computer&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This behavior can occur for either of the following reasons:  When the default screen saver is set to use a non-existent screen saver program. And/or When you use a corrupted screen saver that is password protected.  &lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q242/9/17.asp&quot;&gt;More Information&lt;/a&gt;.&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q281/2/50.asp&quot;&gt;Information About Unlocking a Workstation&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The following registry setting is received every time the computer is locked:  Start/Run/RegeditHKEY_LOCAL_MACHINE\Software\Microsoft\Windows NT\CurrentVersion\WinlogonForceUnlockLogonREG_DWORD0 - Do not force authentication inline (default)1 - Require online authentication to unlockThe preceding value controls whether a full logon is performed during the unlock process. This can force a validation at the domain controller for the user attempting the unlock process.NOTE: If the value is not present, it functions as if it had been set to 0 (zero).&lt;br /&gt;&lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q294/3/17.asp&quot;&gt;Lock Your Computer and Use Other Windows Logo Shortcut Keys&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;To use the shortcut, press the Windows logo key+L. The following list has different computer lock-up scenarios that are available to you, as well as other ways to lock the computer: &lt;a style=&quot;TEXT-DECORATION: none&quot; href=&quot;http://support.microsoft.com/support/kb/articles/q294/3/17.asp&quot;&gt;Click Here&lt;/a&gt;.&lt;br /&gt;Create a Shortcut to Lock Computer&lt;br /&gt;Right click a blank space on the desktop, select new, shortcut. Copy and Paste this line: &quot;rundll32.exe user32.dll,LockWorkStation&quot; in the program location box. Click next and create a name for your shortcut, click finish.&lt;br /&gt;Lock the Taskbar&lt;br /&gt;This restriction is used to force the locking of the taskbar and restrict users from making any changes to its position. Start/Run/Regedit:  Navigate to this key and create a new DWORD value, or modify the existing value, called &#39;LockTaskbar&#39; and edit the value according to the settings below.  Exit your registry, you may need to restart or log out of Windows for the change to take effect.&lt;br /&gt;[HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer]Value Name: LockTaskbarData Type: REG_DWORD (DWORD Value)Value Data: (0 = Unlocked, 1 = Locked)&lt;br /&gt;&lt;br /&gt;[&lt;a href=&quot;http://www.kellys-korner-xp.com/win_xp_passwords.htm&quot;&gt;link&lt;/a&gt;]</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/5748325877878363919/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/5748325877878363919?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5748325877878363919'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5748325877878363919'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/06/administrator-and-user-passwords-in.html' title='Administrator and User Passwords in Windows XP'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-4535209239660357782</id><published>2008-06-10T09:27:00.005+05:30</published><updated>2008-06-12T09:59:35.806+05:30</updated><title type='text'>How to download from RAPIDSHARE LIKE PREMIUM</title><content type='html'>&lt;h3 class=&quot;post-title entry-title&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;text-decoration: underline;font-size:13;&quot; &gt;&lt;/span&gt;&lt;/h3&gt;&lt;div&gt;The easiest way is to  buy a  premium account from here   ( &lt;a href=&quot;http://rapidshare.com/premium.html&quot;&gt;LINK&lt;/a&gt; ). If you have  a PAYPAL account,  buy it.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The another way is using some sites which makes  premium rapidshare links and allows to download from rapidshare like premium. The speed depends on your ISP.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Here are some collection of sites which generates premium links.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1.  &lt;a href=&quot;http://rhost.cz/&quot;&gt;http://rhost.cz/&lt;/a&gt;     - My fav... The decent site. &lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-family:&#39;-webkit-sans-serif&#39;;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:small;&quot;&gt; &lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;span class=&quot;Apple-style-span&quot;  style=&quot;font-size:small;&quot;&gt;allows you to download 3 premium files per day&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;;font-family:-webkit-sans-serif;font-size:13;&quot;  &gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;;font-family:-webkit-sans-serif;font-size:13;&quot;  &gt;2. &lt;a href=&quot;http://www.rapid4free.com/&quot;&gt;http://www.rapid4free.com/&lt;/a&gt;  -  &lt;span class=&quot;Apple-style-span&quot; style=&quot;;font-family:Georgia;font-size:16;&quot;  &gt;In the last 24 hours you can Download 100 MB. &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;3. &lt;a href=&quot;http://www.rapidshare-premium.com/&quot;&gt;http://www.rapidshare-premium.com/&lt;/a&gt;  - Many ads.. offers free downloads by Registering to that site..&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: rgb(255, 102, 102);font-size:180%;&quot; &gt;&lt;span style=&quot;font-weight: bold;&quot;&gt;(Update)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;4. &lt;a href=&quot;http://www.rslinker.com/&quot;&gt;http://www.rslinker.com&lt;/a&gt; . Nice one. &lt;span style=&quot;font-weight: bold;&quot;&gt;You can download &lt;/span&gt;&lt;b&gt; 5&lt;/b&gt; premium files per day. Many rapidshare accounts are there !&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;If you have the dynamic  IP  then no problem of the limitations. Just change the ip adress download more and more  ...unlimited !!!&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/4535209239660357782/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/4535209239660357782?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4535209239660357782'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/4535209239660357782'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/06/how-to-download-from-rapidshare-like.html' title='How to download from RAPIDSHARE LIKE PREMIUM'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-8380624895850099408</id><published>2008-04-19T18:01:00.000+05:30</published><updated>2008-04-19T18:05:02.313+05:30</updated><title type='text'>Simple Utorrent Guide For New Users</title><content type='html'>&lt;span style=&quot;;font-family:arial;font-size:100%;&quot;  &gt;&lt;span style=&quot;line-height: 100%;&quot;&gt;Though this guide is based on the Utorrent 1.5, i think the settings on the version 1.6 are similar&lt;br /&gt;&lt;br /&gt;The Simple uTorrent Guide for New Users&lt;br /&gt;New 1.5 Client Download Here : &lt;a set=&quot;yes&quot; href=&quot;http://www.utorrent.com/download.php&quot; target=&quot;_blank&quot;&gt;uTorrent&lt;/a&gt;&lt;br /&gt;Since it&#39;s conception, uTorrent has slowly become a premiere client packed with features, throttled by a growing install base. This guide is here to help users who are having trouble configuring the client.&lt;br /&gt;&lt;br /&gt;Bear in mind this guide will be updated when felt needed or necessary.&lt;br /&gt;&lt;br /&gt;Preferences &gt; Network&lt;br /&gt;&lt;br /&gt;Port used for incoming connections&lt;br /&gt;- If you are experiencing slow speeds, this could very well be the culprit - especially under routers.&lt;br /&gt;- Make sure you have either DMZ or Port Forwarding for the same port no. enabled for connections.&lt;br /&gt;- If you are a Rogers, or Shaw user, you could very well be already &#39;throttled&#39; which would result in very slow upload and download speeds. For Rogers users, for certain geographical areas, selecting port 1720 or 1755 resolves any problems with speeds for the moment.&lt;br /&gt;&lt;br /&gt;Add uTorrent to Windows Firewall Exceptions&lt;br /&gt;- Windows Firewall is an excellent built-in firewall option if you are just surfing around, and do not care much about extending your online experience through means of downloading, playing games, etc. Otherwise, I would advise disabling it completely to fully take advantage of your connection. However, if you do have the Firewall still enabled, make sure you have this checked on to include in the list of applications capable of accessing your connection.&lt;br /&gt;&lt;br /&gt;Global Maximum Upload Rate&lt;br /&gt;- Typically, the general rule is to set this to about 80-85% of your capable upload speed.&lt;br /&gt;e.g., If you upload speed is 100 kB/s, you would set this setting to either 80 or 85.&lt;br /&gt;- Others prefer to just keep it at &#39;0&#39;, which signifies it will fully use your upload speed when available to do so. Keep in mind that general surfing, and browsing may become slower.&lt;br /&gt;&lt;br /&gt;Protocol Encryption***&lt;br /&gt;- With more and more ISP&#39;s throttling the BT Protocol, users are experiencing significantly slower upload speeds. As a result of slower uploads, slower downloads are also very commonly experienced. North America ISP&#39;s such as Rogers, Shaw, among others, have already implimented such questionable tactics.&lt;br /&gt;- By enabling this option, you will be sending encrypted headers out to other users who have also enabled this feature. This will bypass any current known throttling technics, and will often yield significantly faster speeds.&lt;br /&gt;- With Azureus and uTorrent co-operating to impliment Protocol Encryption, it only means the end user benefits. Please keep in mind that this is a very important feature, and for it to be fully implimented and maximized, it takes the co-operation of it&#39;s users to enable this feature.&lt;br /&gt;&lt;br /&gt;Preferences &gt; Advanced&lt;br /&gt;&lt;br /&gt;net.low.cpu&lt;br /&gt;- By default, this setting is set to &#39;true&#39;. By switching this to &#39;false&#39;, you are telling uTorrent that you are allowing it to use more of your CPU power. This will help yield better speeds. If you are worried of it using too much CPU power, just keep in mind, no matter what you do, it will use less CPU power &amp;amp; memory than BitComet will - ever.&lt;br /&gt;&lt;br /&gt;net.max_halfopen***&lt;br /&gt;- This is an absolute make or break for your Bit Torrent speeds. With the advent of SP2, Windows XP limited your open TCP/IP connections to 10. Originally, this value was set to 50.&lt;br /&gt;- Thankfully, there is an application you can download that can modify this value on your Windows system. Please direct yourself to: [url] Here[/url] and follow to the &#39;Download&#39; section to download the DOS-based application that wil modify your TCPIP.SYS system file.&lt;br /&gt;- I would recommend setting the value to about 50. In uTorrent, it is up to you whether you would like to take full advantage of this value or not. My personal general rule is setting it to about 3/4 of your open connections in your TCPIP.SYS.&lt;br /&gt;- It should be noted that this is also the culprit for a lot of modem disconnects, and bad resetting connections. Because of SP2 limiting the TCP/IP connections, there is often an overflow of data that cannot be successfully transferred.&lt;br /&gt;- Please be diligent in setting this value inside uTorrent.&lt;br /&gt;&lt;br /&gt;peer.disconnect_inactive_interval&lt;br /&gt;- Change this value to about 600.&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/8380624895850099408/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/8380624895850099408?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8380624895850099408'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/8380624895850099408'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/04/simple-utorrent-guide-for-new-users.html' title='Simple Utorrent Guide For New Users'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-5590350250519121516</id><published>2008-04-19T18:00:00.000+05:30</published><updated>2008-04-19T18:01:45.701+05:30</updated><title type='text'>Daemon Tools Tutorial</title><content type='html'>Daemon Tools Tutorial&lt;br /&gt;&lt;br /&gt;Daemon Tools Is An Advanced Application For Microsoft Windows.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Where To Find:&lt;br /&gt;&lt;br /&gt;You Can Get Daemon Tools From Its Original &lt;a href=&quot;http://www.daemon-tools.cc/dtcc/download.php?mode=ViewCategory&amp;amp;catid=5&quot;&gt;Website&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;After Installation Comes Mounting:&lt;br /&gt;&lt;br /&gt;1. After Installation, An Icon Shows On Your Desktop&lt;br /&gt;&lt;br /&gt;2. Double Click It, Look At Bottom Right Corner&lt;br /&gt;&lt;br /&gt;3. An Red Lightning Bolt Should Show Up&lt;br /&gt;&lt;br /&gt;4. Right Click It&lt;br /&gt;&lt;br /&gt;Upon Right Clicking It:&lt;br /&gt;1. 5 Sections Will Pop Up (Virtual CD/DVD Rom, Emulation, Options, Help, And Exit)&lt;br /&gt;&lt;br /&gt;Only Need To Focus Mainly On The Virtual CD/DVD ROM Part.&lt;br /&gt;&lt;br /&gt;Mounting Process:&lt;br /&gt;1. As You Move Your Mouse Over Virtual CD/DVD Rom, More Options Appear&lt;br /&gt;&lt;br /&gt;A. Device 0 – No Media&lt;br /&gt;B. Unmount All Drives&lt;br /&gt;C. Set Number Of Devices&lt;br /&gt;&lt;br /&gt;2. Go To Set Number Of Devices, Hit 4 And You Notice Now That There Are Device 0, 1, 2, And 3&lt;br /&gt;&lt;br /&gt;3. You Can Mount .Iso, .Bin, .Mdf Files With Daemon Tools&lt;br /&gt;&lt;br /&gt;4. So Now You Go To Virtual CD/DVD Rom, Device 0, And Select Mount Image&lt;br /&gt;&lt;br /&gt;5. Now Find The Iso Or Bin Or Mdf And Click Open&lt;br /&gt;&lt;br /&gt;6. An Autoplay Should Pop Up, Allowing You To Install The Game Or Application&lt;br /&gt;&lt;br /&gt;That’s The Process Of Daemon Tools.&lt;br /&gt;&lt;br /&gt;*Remember Games Need To Be Cracked In Order To Be Played&lt;br /&gt;&lt;br /&gt;Cracks Available At :  &lt;a href=&quot;http://www.gamecopyworld.com&quot;&gt;gamecopyworld&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Enjoy This Tutorial</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/5590350250519121516/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/5590350250519121516?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5590350250519121516'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/5590350250519121516'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/04/daemon-tools-tutorial.html' title='Daemon Tools Tutorial'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-3594591143119478329</id><published>2008-04-19T17:57:00.001+05:30</published><updated>2008-04-19T17:59:24.956+05:30</updated><title type='text'>VLC Player Shortcuts</title><content type='html'>In this tutorial you can fix sync problems etc. using your keyboard.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;VLC is a very versatile media player that can play anything you throw on it, but very so often you really won’t be able to figure out the controls. If you didn’t know, you can get a lot of things done on VLC Player just by using keyboard shortcuts.&lt;br /&gt;&lt;br /&gt;Here goes a list of keyboard shortcuts for VLC player:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Space Play/Pause&lt;br /&gt;s Stop&lt;br /&gt;+ Play faster&lt;br /&gt;- Play Slower&lt;br /&gt;t Position&lt;br /&gt;n Next Item&lt;br /&gt;p Previous Item&lt;br /&gt;f Fullscreen&lt;br /&gt;m Mute&lt;br /&gt;Shift+Rt Arrow Forward 3 seconds&lt;br /&gt;Shift+Lt Arrow Backward 3 seconds&lt;br /&gt;Alt+Rt Arrow Forward 10 seconds&lt;br /&gt;Alt+Lt Arrow Backward 10 seconds&lt;br /&gt;Ctrl+q Quit&lt;br /&gt;Ctrl+Up Arrow Volume up&lt;br /&gt;Ctrl+Dn Arrow Volume down&lt;br /&gt;Ctrl+Rt Arrow Forward 1 minute&lt;br /&gt;Ctrl+Lt Arrow Backward 1 minute&lt;br /&gt;&lt;br /&gt;Ctrl+r Record&lt;br /&gt;Alt+Ctrl+S Video Snapshot&lt;br /&gt;Ctrl+m DVD Menu&lt;br /&gt;Ctrl+p Select Previous DVD Title&lt;br /&gt;Ctrl+n Select Next DVD Title&lt;br /&gt;&lt;br /&gt;Ctrl+B Bookmarks&lt;br /&gt;Ctrl+P Playlist&lt;br /&gt;Ctrl+I Stream, Media Info&lt;br /&gt;Ctrl+S Preferences&lt;br /&gt;Ctrl+G Extended GUI&lt;br /&gt;&lt;br /&gt;ctrl + l&lt;br /&gt;ctrl + k&lt;br /&gt;&lt;br /&gt;incrementally add or remove delay (in case the movie is out of sync)&lt;br /&gt;&lt;br /&gt;For your note, all these shortcuts are customizable. You can play with them in the Edit &gt;&gt; Preferences Dialog.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Get VLC player -    &lt;a href=&quot;http://www.videolan.org/vlc/&quot;&gt;link&lt;/a&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/3594591143119478329/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/3594591143119478329?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/3594591143119478329'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/3594591143119478329'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/04/vlc-player-shortcuts.html' title='VLC Player Shortcuts'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-2314585914174060460</id><published>2008-04-19T12:32:00.000+05:30</published><updated>2008-04-19T12:33:36.242+05:30</updated><title type='text'>Join serveral movie files., Batch file</title><content type='html'>Join Multiple video files ( flv, mpg, vob, etc...)&lt;br /&gt;&lt;br /&gt;This worked fantastic for me I had six vob video files and all you have to do is.&lt;br /&gt;&lt;br /&gt;1 - open notepad&lt;br /&gt;&lt;br /&gt;2 - type   copy /b*.mpg  FullMovie.mpg&lt;br /&gt;&lt;br /&gt;3 - save the file as      .bat         Ex - TheGoodFellas.bat&lt;br /&gt;&lt;br /&gt;4 - now copy and paste the bat file in the folder where you are    holding all the movie files you want to join. Ex -   &lt;br /&gt;C:\TheGoodFellas\Movie_VOB.etc...&lt;br /&gt;&lt;br /&gt;5 - Now double click the bat file you made and give it some time to join, it took my movie around 3 min.&lt;br /&gt;&lt;br /&gt;This might be a super newb batch file but enjoi anyway</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/2314585914174060460/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/2314585914174060460?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2314585914174060460'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/2314585914174060460'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/04/join-serveral-movie-files-batch-file.html' title='Join serveral movie files., Batch file'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-173185446417004929</id><published>2008-03-16T19:04:00.000+05:30</published><updated>2008-03-16T19:05:33.423+05:30</updated><title type='text'>How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail</title><content type='html'>How to find the IP adress of the sender in Gmail, Yahoo! mail or Hotmail&lt;br /&gt;&lt;br /&gt;When you receive an email, you receive more than just the message. The email comes with headers that carry important information that can tell where the email was sent from and possibly who sent it. For that, you would need to find the IP address of the sender. The tutorial below can help you find the IP address of the sender. Note that this will not work if the sender uses anonymous proxy servers.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Finding IP address in Gmail&lt;br /&gt;&lt;br /&gt;1. Log into your Gmail account with your username and password.&lt;br /&gt;2. Open the mail.&lt;br /&gt;3. To display the headers,&lt;br /&gt;* Click on More options corresponding to that thread. You should get a bunch of links.&lt;br /&gt;* Click on Show original&lt;br /&gt;4. You should get headers like this:&lt;br /&gt;Gmail headers : name&lt;br /&gt;Look for Received: from followed by a few hostnames and an IP address between square brackets. In this case, it is&lt;br /&gt;&lt;br /&gt;65.119.112.245.&lt;br /&gt;That is be the IP address of the sender!&lt;br /&gt;5. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Finding IP address in Yahoo! Mail&lt;br /&gt;&lt;br /&gt;1. Log into your Yahoo! mail with your username and password.&lt;br /&gt;2. Click on Inbox or whichever folder you have stored your mail.&lt;br /&gt;3. Open the mail.&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on General Preferences&lt;br /&gt;* Scroll down to Messages where you have the Headers option&lt;br /&gt;* Make sure that Show all headers on incoming messages is selected&lt;br /&gt;* Click on the Save button&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;5. You should see similar headers like this:&lt;br /&gt;Yahoo! headers : name&lt;br /&gt;Look for Received: from followed by the IP address between square brackets [ ]. Here, it is 202.65.138.109.&lt;br /&gt;That is be the IP address of the sender!&lt;br /&gt;6. Track the IP address of the sender&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Finding IP address in Hotmail&lt;br /&gt;&lt;br /&gt;1. Log into your Hotmail account with your username and password.&lt;br /&gt;2. Click on the Mail tab on the top.&lt;br /&gt;3. Open the mail.&lt;br /&gt;4. If you do not see the headers above the mail message, your headers are not displayed. To display the headers,&lt;br /&gt;* Click on Options on the top-right corner&lt;br /&gt;* In the Mail Options page, click on Mail Display Settings&lt;br /&gt;* In Message Headers, make sure Advanced option is checked&lt;br /&gt;* Click on Ok button&lt;br /&gt;* Go back to the mails and open that mail&lt;br /&gt;5. If you find a header with X-Originating-IP: followed by an IP address, that is the sender&#39;s IP address&lt;br /&gt;Hotmail headers : name ,In this case the IP address of the sender is [68.34.60.59]. Jump to step 9.&lt;br /&gt;6. If you find a header with Received: from followed by a Gmail proxy like this&lt;br /&gt;Hotmail headers : name&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [69.140.7.58]. Jump to step 9.&lt;br /&gt;7. Or else if you have headers like this&lt;br /&gt;Hotmail headers : name&lt;br /&gt;Look for Received: from followed by IP address within square brackets[].&lt;br /&gt;In this case, the IP address of the sender is [61.83.145.129] (spam mail). Jump to step 9.&lt;br /&gt;8. * If you have multiple Received: from headers, eliminate the ones that have proxy.anyknownserver.com.&lt;br /&gt;9. Track the IP address of the sender Cool</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/173185446417004929/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/173185446417004929?isPopup=true' title='1 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/173185446417004929'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/173185446417004929'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/03/how-to-find-ip-address-of-sender-in.html' title='How to find the IP address of the sender in Gmail, Yahoo! mail or Hotmail'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>1</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5000875997351084685.post-7678114107961093208</id><published>2008-03-16T18:55:00.000+05:30</published><updated>2008-03-16T18:57:27.441+05:30</updated><title type='text'>How to add Watermarks to a video?</title><content type='html'>&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color:DarkRed;&quot;&gt;&lt;span style=&quot;color:Red;&quot;&gt;his guide will help you to place a watermark or TEXT on a video (AVI, MPEG, etc...) If you want to add a watermark, you must re-encode your video.&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;u&gt;&lt;i&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color:DarkRed;&quot;&gt;Tools Required:&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/u&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color:DarkRed;&quot;&gt;1. VirtualDubMod a free ware, available here:&lt;a href=&quot;http://www.videohelp.com/tools/VirtualdubMOD&quot;&gt; &lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;http://www.videohelp.com/tools/VirtualdubMOD&quot;&gt;&lt;span style=&quot;text-decoration: underline;&quot;&gt;Download&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;color:DarkRed;&quot;&gt;&lt;br /&gt;&lt;br /&gt;2. Image creation software (Windows Paint will do the job)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;u&gt;&lt;span style=&quot;font-size:100%;&quot;&gt;&lt;span style=&quot;color:Sienna;&quot;&gt;STEPS&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-size:130%;&quot;&gt;&lt;span style=&quot;font-family:Lucida Sans Unicode;&quot;&gt;&lt;span style=&quot;color:Blue;&quot;&gt;1. PREPARE YOUR WATERMARK IMAGE&lt;br /&gt;&lt;br /&gt;If your are creating a text watermark:&lt;br /&gt;&lt;br /&gt;Open your image making software and make the background BLACK (you have to make it black to make it look translucent in ur movie) and create the text you wish to appear in the watermark, and place it on the black background. Save your image as. BMP or a .TGA file. Try to make it 200 (width) x 20 (height).&lt;br /&gt;&lt;br /&gt;If u are putting an existing Image:&lt;br /&gt;&lt;br /&gt;Simply open the image in Windows Paint and save it as a BMP or TGA file.&lt;br /&gt;&lt;br /&gt;I am using This Image:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;You can also use some picture but keep it in small size.&lt;br /&gt;&lt;br /&gt;Now we are ready let us start&lt;br /&gt;&lt;br /&gt;1: Open VirtualDubMod go to &quot;Open Video File&quot;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This is what you will get after file is loaded:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now Go to VIDEO and Filters:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now press Add:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Choose logo from list:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now select your settings and position of your logo, To see output video click on preview.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;After that Press OK and OK again.&lt;br /&gt;&lt;br /&gt;Now Press File again and click on File Save as.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now choose Your codec and compression mode: By pressing &quot;Change&quot; You can change codec and compression.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;I usually Use Xvid:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Press OK and then SAVE:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now give it some time, it will depend on speed of your processor and size of file you are converting.&lt;br /&gt;&lt;br /&gt;Enjoy Movies with you watermarked Name on it.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://goolge-search.blogspot.com/feeds/7678114107961093208/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment/fullpage/post/5000875997351084685/7678114107961093208?isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/7678114107961093208'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5000875997351084685/posts/default/7678114107961093208'/><link rel='alternate' type='text/html' href='http://goolge-search.blogspot.com/2008/03/how-to-add-watermarks-to-video.html' title='How to add Watermarks to a video?'/><author><name>Madhukar</name><uri>http://www.blogger.com/profile/02544287706795987742</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>