<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7015035317917403047</atom:id><lastBuildDate>Fri, 01 Nov 2024 09:18:13 +0000</lastBuildDate><category>Internet</category><category>Softwares</category><category>News</category><category>Windows</category><category>Security</category><category>Mobiles</category><category>Blogging</category><category>Hacking</category><category>Tools</category><category>Facebook</category><category>Hack Tutorials</category><category>Mac</category><category>Twitter</category><category>Viruses</category><title>Hack Sperm</title><description></description><link>http://hacksperm.blogspot.com/</link><managingEditor>noreply@blogger.com (Junaid)</managingEditor><generator>Blogger</generator><openSearch:totalResults>47</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-7982042956304231173</guid><pubDate>Sun, 29 Aug 2010 10:20:00 +0000</pubDate><atom:updated>2010-08-29T03:20:00.902-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogging</category><title>Useful Online Tools For Bloggers</title><description>These are some useful online tools which can make your work easier and faster because you don&#39;t have to download any software to do your work. Just put in your input and get your work done.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://www.convertfiles.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;1.Convert Files&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;268&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/01_convertfiles.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;01_convertfiles&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Easily convert different file formats. You can convert images, download YouTube video and much more with this web tool.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://www.joongel.com/index.php&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;2. Joongel&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;225&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/02_joongle.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;02_joongle&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Are  you a power searcher? Then this tool this for you. You simultaneously  search different search engines in different categories. It can be very  useful if you are doing an online research.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://quickthumbnail.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;3. Quick Thumbnail&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;327&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/03_quick_thumbnail.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;03_quick_thumbnail&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Simply  create thumbnails in different sizes right from your browser. You can  upload an image from your computer or web directory and choose sizes of  the thumbnails you want.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://screencastle.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;4. ScreenCastle&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;350&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/04_screencastle-500x350.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;04_screencastle&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Have  you ever wondered if you would be able record your screen right from  your computer without any software? Yes you can. This tool would be  useful if you would not want to download any large software or if you  are not at you own computer. This is uses java applet to record your  screen.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://gomockingbird.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;6. Mockingbird&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;338&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/06_mocking_bird.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;06_mocking_bird&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Another  handy tool for project mangers, designers and developers. Simple and  easy wire framing for your project. The interface is very easy to use.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://www.cyclur.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;7.&amp;nbsp; Cyclur&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;265&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/07_cyclur.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;07_cyclur&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;If  you maintain multiple websites and wanted show feeds between you  websites, Cyclur will get the job done with knowing too much coding.  Just simple insert your feeds link and customize the look.&lt;/div&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://flippingtypical.com/&quot; style=&quot;border-bottom: 2px solid rgb(236, 239, 241); font-family: &#39;Century Gothic&#39;,Helvetica,sans-serif; font-weight: 600; text-decoration: none ! important;&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;8. Flipping Typical&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;253&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/08_ft.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;08_ft&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;Filpping  Typical is an useful online utility for web designer to preview a text  in different fonts. Type in the text you want to preview and you will  see it right away and it also gives you the font name.&lt;/div&gt;&lt;h2 style=&quot;font-family: Cambria,Georgia,serif; font-size: 26px; font-style: normal; font-weight: 500; letter-spacing: normal; line-height: 30px; text-transform: uppercase;&quot;&gt;&lt;br /&gt;
&lt;/h2&gt;&lt;h3 style=&quot;font-size: 12pt; line-height: 20px;&quot;&gt;&lt;a href=&quot;http://devcheatsheet.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;9.&amp;nbsp;DevCheatSheet&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;&lt;img alt=&quot;&quot; height=&quot;336&quot; src=&quot;http://desizntech.info/wp-content/uploads/2010/07/11_devchearsheets.jpg&quot; style=&quot;border: 6px solid rgb(243, 243, 243); margin: 10px 0px 10px 80px; padding: 0px;&quot; title=&quot;11_devchearsheets&quot; width=&quot;500&quot; /&gt;&lt;/div&gt;&lt;div style=&quot;font-size: 14px; line-height: 20px; margin: 12px 0px;&quot;&gt;A  collection all kind of cheat sheets for different markup and scripting  languages on the web. Do not need to Google for hours for cheat sheet  you saw last week. You can find it in &lt;a href=&quot;http://devcheatsheets.com/&quot;&gt;DevCheatSheets.com&lt;/a&gt;&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/useful-online-tools-for-bloggers.html</link><author>noreply@blogger.com (Junaid)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-3240854183469233778</guid><pubDate>Sun, 29 Aug 2010 09:40:00 +0000</pubDate><atom:updated>2010-08-29T02:40:51.230-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobiles</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>KEmulator PLAY MOBILE GAMES ON PC</title><description>&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;KEmulator&lt;/strong&gt;&amp;nbsp;is  a mobile java game emulator, KEmulator provides kinds of utilities  making our developers more effectively, and it supports most of the  popular mobile platforms.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Whats  more is that with this application you can even open java apps like  opera mini, ucweb, etc. as such as you open it from your phone  (including net facilities)&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;about KEmulator Lite&amp;nbsp;version&amp;nbsp;: &lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9OLMiwy8k3yoOXv7KXms0v5CLCnXaI3IbXmCKA6VstV9QSm9NbH2evtEaUa37WL6nvt3YloGJEX-y0e9ZO_mQx7j7hH59RMxHOL8cTACyPKEfmFDjJiJjKC1yIyAZbezbRL4kLbQuVPc/s400/KEmulator+Lite.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;157&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9OLMiwy8k3yoOXv7KXms0v5CLCnXaI3IbXmCKA6VstV9QSm9NbH2evtEaUa37WL6nvt3YloGJEX-y0e9ZO_mQx7j7hH59RMxHOL8cTACyPKEfmFDjJiJjKC1yIyAZbezbRL4kLbQuVPc/s200/KEmulator+Lite.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;KEmulator  Lite version is free and it has all the features necessary, like jsr75,  proxy input, screen size adjustment, keypad mapping etc&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;It&#39;s written in java, and the UI is based on SWT win32. Now, the follow APIs are implemented:&amp;nbsp;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;MIDP 2.0(JSR118)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;NokiaUI 1.1&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Samsung 1.0&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Sprint pcs&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;M3G 1.1(JSR184)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;OpenGL ES(JSR239)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;WMA1.0(JSR120)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Bluetooth(JSR82)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;PDA PIM(JSR75)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;System Requirement :&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Windows 2000 or later&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;JDK1.4.2 or later&lt;br /&gt;
&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Run KEmulator.exe&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Menu: Midlet-&amp;gt;Load Jar/Load with console.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Drag a *.jar into the shell, as the Drag &amp;amp; Drop of Windows&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;Useful Tips of KEmulator&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Menu-&amp;gt;Tool&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Zoom in/out, default 200%&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Ticks, design for GD(Game Designer) as a timer.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Capture/Record, save to &quot;/capture&quot; folder.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Speed up/Down, speed up the game rate.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Record keys/Enable Autoplay, refer to the Autoplay.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Menu-&amp;gt;View-&amp;gt;Options...&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Custom settings:&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Key Map:&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;System settings:&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;strong&gt;Auto-play Records&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Select &quot;Tool&quot; -&amp;gt; &quot;Record Keys&quot;.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Select &quot;View&quot; -&amp;gt; &quot;Options&quot; -&amp;gt; &quot;Key Map&quot; -&amp;gt; &quot;Enable Key Cache&quot;. (it makes the key play-back accurately)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Launch a game, and play it. All your key presses are recorded, saved to &quot;/records&quot; folder.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style=&quot;font-size: small;&quot;&gt;Then, your can launch the record from &quot;Midlet&quot; -&amp;gt; &quot;Load auto-play record&quot;. The emulator will play back all your have done.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div style=&quot;font-family: Arial; font-size: 12px;&quot;&gt;&lt;span style=&quot;font-size: medium;&quot;&gt;download KEmulator lite version 0.9.8&amp;nbsp;from &lt;a href=&quot;http://m.umnet.com/Download/software/10621/KEmulator-v0.9.8.zip&quot; target=&quot;_blank&quot;&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/kemulator-play-mobile-games-on-pc.html</link><author>noreply@blogger.com (Junaid)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9OLMiwy8k3yoOXv7KXms0v5CLCnXaI3IbXmCKA6VstV9QSm9NbH2evtEaUa37WL6nvt3YloGJEX-y0e9ZO_mQx7j7hH59RMxHOL8cTACyPKEfmFDjJiJjKC1yIyAZbezbRL4kLbQuVPc/s72-c/KEmulator+Lite.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-655059835547416084</guid><pubDate>Sat, 28 Aug 2010 15:17:00 +0000</pubDate><atom:updated>2010-08-28T08:17:02.449-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogging</category><title>Add Numbered Page Navigation Widget to Your Blog</title><description>Numbering  Navigation Widget is very useful for blogs because it tell the visitors  that how many pages this blog has and from those pages the visitor can  calculate that how much posts this blog contain.&lt;br /&gt;
&lt;br /&gt;
This widget is place at the bottom of the template where &quot;Newer Posts&quot; and &quot;Older Posts&quot; are shown.&lt;br /&gt;
It looks like this:&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga728ztP9fk7-dZ-PLl7NgvWXq-HXWgE-o_rxqwD8nNb_ze9LaTWk7rxNQsZnVabsZY_xexWOEe43OYZpRLVwQRu7ne8hpfc67hHy8XxIrair1NBx18Br-Ovo8cdvBH-prpU1K0qhpLBA/s1600/page-navigation-blogosys-themeappears.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;73&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga728ztP9fk7-dZ-PLl7NgvWXq-HXWgE-o_rxqwD8nNb_ze9LaTWk7rxNQsZnVabsZY_xexWOEe43OYZpRLVwQRu7ne8hpfc67hHy8XxIrair1NBx18Br-Ovo8cdvBH-prpU1K0qhpLBA/s640/page-navigation-blogosys-themeappears.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Follow the instructions to place this widget on your Blog.&lt;br /&gt;
&lt;br /&gt;
1. Go to Your &lt;a href=&quot;http://blogger.com/&quot;&gt;Blogger Dashboard&lt;/a&gt;.&lt;br /&gt;
2. Click on &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Design Page&lt;/span&gt;&lt;/b&gt;.&lt;br /&gt;
3. Now, Navigate to &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Edit HTML&lt;/span&gt;&lt;/b&gt; tab&lt;br /&gt;
&lt;br /&gt;
Better not to check the box &quot;&lt;b style=&quot;color: red;&quot;&gt;Expand Widget Templates&lt;/b&gt;&quot;&lt;br /&gt;
&lt;br /&gt;
4. Now, search for the term&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp; &lt;b&gt;]]&amp;lt;/b:skin&amp;gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Copy and paste the following code just before&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt; &lt;span style=&quot;color: red;&quot;&gt;]]&amp;lt;/b:skin&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpageArea a {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:underline;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpageNum a {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;border: 1px solid #cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;margin:0 3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;padding:3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpageNum a:hover {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;border: 1px solid #cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;background-color:#cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpagePoint {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;color:#333;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;border: 1px solid #cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;background: #cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;margin:0 3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;padding:3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpageOf {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;padding:3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;margin: 0 3px 0 0;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpage a {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;border: 1px solid #cccccc;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;padding:3px;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpage a:hover {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;.showpageNum a:link,.showpage a:link {&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;text-decoration:none;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;color:#333333;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br style=&quot;color: black;&quot; /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;}&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/blockquote&gt;&lt;br /&gt;
This is the CSS part of the widget which defines the properties and work of your widget (Navigation Widget).&lt;br /&gt;
&lt;br /&gt;
Now, its time to add the HTML code of the Widget.&lt;br /&gt;
So,&lt;br /&gt;
&lt;br /&gt;
5. Find&amp;nbsp;&amp;nbsp; &lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;&amp;lt;/body&amp;gt;&lt;/span&gt;&lt;/b&gt;. And copy the following code and paste it just before the&amp;nbsp; &lt;b style=&quot;color: red;&quot;&gt;&amp;lt;/body&amp;gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;b&gt;&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;!--Page Navigation Starts--&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;b:if cond=&#39;data:blog.pageType != &quot;item&quot;&#39;&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;b:if cond=&#39;data:blog.pageType != &quot;static_page&quot;&#39;&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;script type=&#39;text/javascript&#39;&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;var pageCount=5;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;var displayPageNum=5;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;var upPageWord =&#39;Previous&#39;;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;var downPageWord =&#39;Next&#39;;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;script src=&#39;http://blogergadgets.googlecode.com/files/blogger-page-navi.v1.js&#39; type=&#39;text/javascript&#39;/&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;/b:if&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;/b:if&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: black;&quot;&gt;&amp;lt;!--Page Navigation Ends --&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;/blockquote&gt;&lt;br /&gt;
Save Your Template and Your are done. You can see the Navigation Template in your Blog.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Customization :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
var pageCount=5; : This code determines the number of posts that displayed on each page&lt;br /&gt;
&lt;br /&gt;
var displayPageNum=5; : This code determines navigation numbers displayed on the page navigation widget(like 1 2 3 4 5 ...).&lt;br /&gt;
&lt;br /&gt;
var upPageWord =&#39;Previous&#39;;&lt;br /&gt;
var upPageWord =&#39;Next&#39;;&lt;br /&gt;
These lines of code is for for Previous and Next page link.(Previous 1 2 3 ... Next)</description><link>http://hacksperm.blogspot.com/2010/08/add-numbered-page-navigation-widget-to.html</link><author>noreply@blogger.com (Junaid)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEga728ztP9fk7-dZ-PLl7NgvWXq-HXWgE-o_rxqwD8nNb_ze9LaTWk7rxNQsZnVabsZY_xexWOEe43OYZpRLVwQRu7ne8hpfc67hHy8XxIrair1NBx18Br-Ovo8cdvBH-prpU1K0qhpLBA/s72-c/page-navigation-blogosys-themeappears.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-1610846051947547103</guid><pubDate>Tue, 24 Aug 2010 15:57:00 +0000</pubDate><atom:updated>2010-08-24T09:12:29.811-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogging</category><title>Watch the Watchers of Your Blog - Web Stat</title><description>Web Stat is a website which monitors your blog/website&#39;s visitors. It can do a lot of works for you such as the location of your visitors, which pages they visit in your blog, how much time they spent in your blog and etc...&lt;br /&gt;&lt;br /&gt;It also provides LIVE streaming. When you log in to your Web Stat account, you will be able to see that who is viewing your blog that time.&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;font-weight: bold;&quot; class=&quot;report_name&quot;&gt;Streaming map of recent visitors:&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;It shows you the recent viewers of your blog. As it locates your visitors, so it can show you the information about each visitor such as their region, country, time of visit etc. It also shows that if a visitor is new or old a&lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;nd if the visitor is old then &lt;/span&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;it can also show you the time when the visitor last visited.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;&lt;a onblur=&quot;try {parent.deselectBloggerImageGracefully();} catch(e) {}&quot; href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwiqtlZuUYldwA8JRD8_jhnsf356C3Zmps_m0EwXW9d8LZsSwYclBAjdhx-EFFy_2GbaB6oCR9Ag-eSbJnf8d58JkNOENPD9_5VUBWKxgisAJoH6DjgbI_3IqFl6P60mSfd6mxyaRywy0/s1600/recent_visitors_map.gif&quot;&gt;&lt;img style=&quot;cursor: pointer; width: 578px; height: 227px;&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwiqtlZuUYldwA8JRD8_jhnsf356C3Zmps_m0EwXW9d8LZsSwYclBAjdhx-EFFy_2GbaB6oCR9Ag-eSbJnf8d58JkNOENPD9_5VUBWKxgisAJoH6DjgbI_3IqFl6P60mSfd6mxyaRywy0/s320/recent_visitors_map.gif&quot; alt=&quot;&quot; id=&quot;BLOGGER_PHOTO_ID_5509009608483002626&quot; border=&quot;0&quot; /&gt;&lt;/a&gt;&lt;br /&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;&lt;br /&gt;I found it very interesting.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-weight: normal;&quot;&gt;You should try &lt;/span&gt;&lt;a href=&quot;http://www.web-stat.net/&quot;&gt;Web Stat&lt;/a&gt; &lt;span style=&quot;font-weight: normal;&quot;&gt;to keep an eye on your watchers.&lt;/span&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/watch-watchers-of-your-blog-web-stat.html</link><author>noreply@blogger.com (Junaid)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwiqtlZuUYldwA8JRD8_jhnsf356C3Zmps_m0EwXW9d8LZsSwYclBAjdhx-EFFy_2GbaB6oCR9Ag-eSbJnf8d58JkNOENPD9_5VUBWKxgisAJoH6DjgbI_3IqFl6P60mSfd6mxyaRywy0/s72-c/recent_visitors_map.gif" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-9061087643261074089</guid><pubDate>Mon, 23 Aug 2010 14:36:00 +0000</pubDate><atom:updated>2010-08-23T07:36:50.965-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Buzzom Has An Awesome Update</title><description>People search is one of the most important and powerful feature of  Buzzom. Since its launch we have been adding advance features to the  system to make people search more interesting and efficient. Recently,  we added &lt;a href=&quot;http://www.buzzom.com/blog/?p=589&quot;&gt;advance filter&lt;/a&gt; option that allowed user to add different search criteria like bio, location and name.&lt;br /&gt;
Today, we are announcing an interesting feature to Buzzom People  search. The new feature allows you to filter the search result according  to :&lt;br /&gt;
&lt;br /&gt;
1. Followers count&lt;br /&gt;
2. Following count&lt;br /&gt;
3. Profile Image present or absent&lt;br /&gt;
These criteria will allow to be more efficient in your people search.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.buzzom.com/blog/wp-content/uploads/2010/08/buzzom_new_search.jpg&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;buzzom_new_search&quot; class=&quot;aligncenter size-full wp-image-804&quot; height=&quot;302&quot; src=&quot;http://www.buzzom.com/blog/wp-content/uploads/2010/08/buzzom_new_search.jpg&quot; title=&quot;buzzom_new_search&quot; width=&quot;578&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
For More Info Visit &lt;a href=&quot;http://www.buzzom.com/blog/?p=803&quot;&gt;Bezzom&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/buzzom-has-awesome-update.html</link><author>noreply@blogger.com (Junaid)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-2327980530777037641</guid><pubDate>Sat, 21 Aug 2010 16:46:00 +0000</pubDate><atom:updated>2010-08-21T09:46:19.152-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Manmohan singh &amp; Sonia Gandhi&#39;s official website hacked by Pak Cyber Army</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvQ71JoEXjDQ5PTRxr8oP_PacwAqkYKruCsfMGfO6ofNS_K-RSc028ZeO5zvrjocOt9W8gnqStRsvWz3hoc9SGjEDHSbbMxYkzmHvwyyA1sJlJv067OcEvozmgiIUdUyJ0THGL4POQxOmf/s1600/Copy+of+Copy+of+2q.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvQ71JoEXjDQ5PTRxr8oP_PacwAqkYKruCsfMGfO6ofNS_K-RSc028ZeO5zvrjocOt9W8gnqStRsvWz3hoc9SGjEDHSbbMxYkzmHvwyyA1sJlJv067OcEvozmgiIUdUyJ0THGL4POQxOmf/s640/Copy+of+Copy+of+2q.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFWvyDfbwPbe5-ea5H63jxDKHyu1jRazM5pWWMah7age1gaXv7sER8hMNkxIg6xm_5rHXVGY-LmBdCtDW9z3Twi9eNhCPwhwRm4EDrlI0N8ztu7ATeOQQaAc901SfWcRhlkfBmpbXmVZeR/s1600/Copy+of+Copy+of+2z.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFWvyDfbwPbe5-ea5H63jxDKHyu1jRazM5pWWMah7age1gaXv7sER8hMNkxIg6xm_5rHXVGY-LmBdCtDW9z3Twi9eNhCPwhwRm4EDrlI0N8ztu7ATeOQQaAc901SfWcRhlkfBmpbXmVZeR/s640/Copy+of+Copy+of+2z.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style=&quot;color: blue;&quot;&gt;21 Aug 2010:&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: blue;&quot;&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Pak Cyber Army has hacked the official  website of primeminister Manmohan Singh &amp;amp; congress president&amp;nbsp; Sonia  Gandhi.Offlate, we saw huge no of pakistani websites getting hacked by  Indian Cyber Army,India Shell.Here are the links&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&amp;nbsp;&lt;/div&gt;Link : &lt;a href=&quot;http://www.manmohansingh.org/documents&quot;&gt;http://www.manmohansingh.org/documents&lt;/a&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;a href=&quot;http://www.soniagandhi.org/documents/&quot;&gt;http://www.soniagandhi.org/documents/&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/manmohan-singh-sonia-gandhis-official.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvQ71JoEXjDQ5PTRxr8oP_PacwAqkYKruCsfMGfO6ofNS_K-RSc028ZeO5zvrjocOt9W8gnqStRsvWz3hoc9SGjEDHSbbMxYkzmHvwyyA1sJlJv067OcEvozmgiIUdUyJ0THGL4POQxOmf/s72-c/Copy+of+Copy+of+2q.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-5448386454083721874</guid><pubDate>Sat, 21 Aug 2010 13:35:00 +0000</pubDate><atom:updated>2010-08-21T06:35:25.475-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Anonymous Surfing - Surf Anonymously and Protect Yourself</title><description>&lt;div id=&quot;body&quot;&gt;   Have you ever wondered how some companies are able to lay hold on  your email address in order to send spam mails to you? Or have you ever  wondered how some sites like Google are able to open pages according to  the country or region you stay? How do you think hackers are able to  have access to the information you share online? These questions will  remain unanswered until you understand what an internet protocol address  is. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://billmullins.files.wordpress.com/2009/05/image43.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;166&quot; src=&quot;http://billmullins.files.wordpress.com/2009/05/image43.png&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;An IP address is a set of numbers, which are in decimal  forms, assigned to each computer in a network. It is a very important  component in internet communication because it determines the  destination of every information sent through this network. It is  usually assigned to each computer by the ISP. Therefore, one can say  that the IP address helps you connect to other people elsewhere on the  internet.&lt;br /&gt;
&lt;br /&gt;
The most prevalent problem of using the internet is  hacking. When hackers get to know your unique address, there is no limit  to the information they can gather on you. In fact, they can get to  know your location, phone numbers and even all your account details.  With this, any hacker can successfully use your identity to access your  private accounts online.&lt;br /&gt;
&lt;br /&gt;
Even sites you visit have a way of  copying your address in order to monitor your activities when next you  visit the site. Through this data, they can get personal information on  you such as your email address which can then be sold to marketing  companies. This explains the spam mails you get regularly.&lt;br /&gt;
Sites like Google also use your IP address to know your location so they can give you results related to your region.&lt;br /&gt;
&lt;br /&gt;
Thankfully,  with the improvements in technology, you can be a step ahead of any  hacker by anonymously surfing the web. The only way to do this is by  keeping your personal identity protected. In order to make any malicious  internet worker confounded, you need to hide your real unique data by  masking it with another one so that anyone who tries to trace this  address will end up hitting bags of sand.&lt;br /&gt;
By installing IP-hiding  software on your computer, you can easily surf the web anonymously. The  software will hide your IP by assigning to your computer a different  address of your choice. This will make you go to any website and even  shop online without worries of hacking or spam mails.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;Want to enjoy perfect anonymous web surfing while protecting yourself from hackers and identity thieves? &lt;a href=&quot;http://maskyouripaddress.com/&quot; target=&quot;_new&quot;&gt;CLICK HERE!&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/anonymous-surfing-surf-anonymously-and.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-8445461857582127511</guid><pubDate>Sat, 21 Aug 2010 09:42:00 +0000</pubDate><atom:updated>2010-08-21T02:42:15.656-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Firesay Voice Recognition Controls Firefox</title><description>Where  voice recognition has grown fairly common in the mobile industry,  especially with apps such as Google Voice and Blackberry Voice  Recognition, the same still requires sophisticated software and hardware  solutions to be just as effective in computers. But &lt;b&gt;Fairsay&lt;/b&gt;, an innovative add-on for Firefox changes all this, introducing voice application control to web browsers for the first time ever.&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;more-30031&quot;&gt;&lt;/span&gt;&lt;br /&gt;
It offers voice support for opening and closing websites,  carrying out web searches and broadcasting online TV programs. Though  the voice support is very limited for now, it carries potential to  completely redefine web browsing in future. Just imagine how fascinating  it would be to sit back and surf the internet all with the control of  your voice?&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/firesay-logo.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-30030&quot; height=&quot;114&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/firesay-logo.png&quot; title=&quot;firesay-logo&quot; width=&quot;279&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
As with any other voice recognition software, the developers of this extension  too, emphasize on the importance of quality microphones for a great  voice control experience. The developer has also revealed that the  future versions will focus on extracting the voice commands from  background clutter, an issue that Google has addressed to a certain degree for its handheld product, Android.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/firesay-icon.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; class=&quot;alignnone size-full wp-image-30029&quot; height=&quot;253&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/firesay-icon.png&quot; title=&quot;firesay-icon&quot; width=&quot;432&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Again, the functionality of this beta version is quite limited. For now, you can navigate to 45 different websites and watch 15 TV  programs (on Hulu) that reside in the default pre-programmed list. It  is also capable of carrying out a Web search through commands, such as &lt;i&gt;Search Google Bermuda Triangle &lt;/i&gt;which launches a Google search for keywords &lt;i&gt;Bermuda Triangle.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
Despite  all odds, we find it to be an amazing development that will totally  revolutionize how we surf the Internet. When it comes to voice recognition,  accuracy is of utmost importance. In the developer’s own words,  “Improving recognition accuracy is key area for investment for us moving  forward.”&lt;br /&gt;
It supports Firefox versions 3 – 3.6, and Windows 7 only.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/214791/&quot;&gt;Download Firesay&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/firesay-voice-recognition-controls.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-3215267314043917547</guid><pubDate>Fri, 20 Aug 2010 11:17:00 +0000</pubDate><atom:updated>2010-08-20T04:17:46.734-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Transform Windows 7 Into Mac With Snow Transformation Pack</title><description>Windows 7 is quickly growing as a very popular operating system with  its customizable features and appealing looks. Now, you can even  transform your Windows 7 to give complete look and feel of a Mac operating system. &lt;b&gt;Snow Transformation Pack &lt;/b&gt;enables you to swiftly modify your Windows 7 appearance so it takes on the Snow Leopard skin of OS X.&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;more-29943&quot;&gt;&lt;/span&gt;The  transformation requires just a couple reboots. As soon as your PC  restarts, you will begin to feel the magic of this amazing  transformation. Right from Windows logon screen down to the theme, icons and controls, everything is replaced with a new, fabulous Mac view. It also includes the chic RK Launcher—any MAC user would tell you how incomplete his PC is without this pivotal tool.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://draft.blogger.com/post-create.g?blogID=7015035317917403047&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;snow-transformation-pack&quot; border=&quot;0&quot; height=&quot;342&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/snowtransformationpack.png&quot; style=&quot;border: 0px none; display: inline;&quot; title=&quot;snow-transformation-pack&quot; width=&quot;604&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
At startup, you are greeted with the Welcome Center, which also offers several options, such as &lt;i&gt;Configure user account, Repair system files &lt;/i&gt;and &lt;i&gt;Remove Snow Transformation Pack. &lt;/i&gt;From the &lt;i&gt;Configure user account &lt;/i&gt;link, you can control the desktop enhancements and other 3rd party apps that are to take effect. The settings are confirmed by clicking on the &lt;i&gt;Apply Configuration &lt;/i&gt;button&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://draft.blogger.com/post-create.g?blogID=7015035317917403047&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;snow-transformation-pack-options&quot; border=&quot;0&quot; height=&quot;359&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/snowtransformationpackoptions.png&quot; style=&quot;border: 0px none; display: inline;&quot; title=&quot;snow-transformation-pack-options&quot; width=&quot;604&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
An amazing transformation pack for Windows Vista and Windows 7 that totally changes how your computer looks.&lt;br /&gt;
&lt;br /&gt;
Tested on Windows 7 x86 system.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.winxsoft.com/stp/download.html&quot; target=&quot;_blank&quot;&gt;Download Snow Transformation Pack&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/transform-windows-7-into-mac-with-snow.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-7198071498331050200</guid><pubDate>Fri, 20 Aug 2010 07:42:00 +0000</pubDate><atom:updated>2010-08-20T00:42:37.638-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Punjab BSNL Website Hacked by Pakistani Hacker &quot;Soldier of God&quot;</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8HaYK2U2WFGoqh2lpekXvIgT78jwAO77816ayxgG8trGOW3Wiz5Wob22ta6z6_CHbMbHYQKi8VVjLE2mbBlqnvlhm2ic1QgELZcMz8G4nqS30lJCPn9vGdunRYibVsDS2QjIiF0COPApF/s1600/Copy+of+Copy+of+2q.JPG&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;400&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8HaYK2U2WFGoqh2lpekXvIgT78jwAO77816ayxgG8trGOW3Wiz5Wob22ta6z6_CHbMbHYQKi8VVjLE2mbBlqnvlhm2ic1QgELZcMz8G4nqS30lJCPn9vGdunRYibVsDS2QjIiF0COPApF/s640/Copy+of+Copy+of+2q.JPG&quot; width=&quot;640&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;20 Aug 2010:&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt; Pakistani Hacker who identifies himself as &quot;Soldier of God&quot; has hacked Punjab BSNL website&lt;/span&gt;.&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;Hacker has managed to redirect a page of Punjab BSNL&lt;/span&gt;.&lt;br /&gt;
&lt;span style=&quot;color: blue;&quot;&gt;&amp;nbsp;Here is the url which gets redirected:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.punjab.bsnl.co.in/more_news.php&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;http://www.punjab.bsnl.co.in/more_news.php&lt;/span&gt;&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/punjab-bsnl-website-hacked-by-pakistani.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj8HaYK2U2WFGoqh2lpekXvIgT78jwAO77816ayxgG8trGOW3Wiz5Wob22ta6z6_CHbMbHYQKi8VVjLE2mbBlqnvlhm2ic1QgELZcMz8G4nqS30lJCPn9vGdunRYibVsDS2QjIiF0COPApF/s72-c/Copy+of+Copy+of+2q.JPG" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-7033930647989630766</guid><pubDate>Fri, 20 Aug 2010 02:15:00 +0000</pubDate><atom:updated>2010-08-19T19:15:33.614-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Wake the Computer to Run a Microsoft Security Essentials Scan</title><description>In a recent review of Microsoft Security Essentials  it was discovered that an option to wake the computer to perform a  scheduled scan did not exist. There is a way to force the computer to  wake up and complete a scan but it involves editing the scheduled task  within Windows 7. This tutorial will take you through the steps required  to get this done. &lt;br /&gt;
&lt;br /&gt;
&lt;h2 class=&quot;content&quot;&gt;The Microsoft Security Essentials Scheduler&lt;/h2&gt;Microsoft Security Essentials provides a nice interface for editing a scan schedule. You will find it by selecting &lt;em&gt;&#39;Change my scan schedule&#39;&lt;/em&gt; at the bottom of the &lt;em&gt;Home&lt;/em&gt; tab.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.7tutorials.com/files/img/wake_mse/mse1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Microsoft Security Essentials&quot; border=&quot;0&quot; src=&quot;http://www.7tutorials.com/files/img/wake_mse/mse1.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
From this interface you can set which day and time a scan should be  performed. The default for Microsoft Security Essentials is 2 AM. This  seems like a fine time to perform a scan since the computer is likely  not being used. It&#39;s also likely that your power settings have placed  the computer into a mode of sleep or hibernation. If the latter is true,  the scheduled scan will not run.&lt;br /&gt;
&lt;br /&gt;
In order to force your computer to wake and perform the scan the steps below should be followed.&lt;br /&gt;
&lt;h2 class=&quot;content&quot;&gt;Editing the Scheduled Task&lt;/h2&gt;Open the &lt;em&gt;Task Scheduler&lt;/em&gt;. Within the &lt;em&gt;Task Scheduler&lt;/em&gt; expand the &lt;em&gt;Task Scheduler Library&lt;/em&gt; and then expand &lt;em&gt;Microsoft&lt;/em&gt;. Below the &lt;em&gt;Microsoft&lt;/em&gt; folder you should see another folder called &lt;em&gt;Microsoft Antimalware&lt;/em&gt;. Select it.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.7tutorials.com/files/img/wake_mse/mse2.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Task Scheduler&quot; border=&quot;0&quot; src=&quot;http://www.7tutorials.com/files/img/wake_mse/mse2.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
In the right pane you should see the task for your scheduled scan: &lt;em&gt;&#39;MP Scheduled Scan&#39;&lt;/em&gt;. Next you need to access the task properties. To accomplish this, you may right click on the task and choose &lt;em&gt;Properties&lt;/em&gt; or select the &lt;em&gt;Properties&lt;em&gt; link from the &lt;em&gt;Actions&lt;/em&gt; menu.&lt;/em&gt;&lt;/em&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.7tutorials.com/files/img/wake_mse/mse3.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Task Scheduler&quot; border=&quot;0&quot; src=&quot;http://www.7tutorials.com/files/img/wake_mse/mse3.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Within the task properties select the &lt;em&gt;Conditions&lt;/em&gt; tab. Enable the option to &lt;em&gt;&#39;Wake the computer to run this task&#39;&lt;/em&gt; by selecting the checkbox.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.7tutorials.com/files/img/wake_mse/mse4.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;Task Scheduler&quot; border=&quot;0&quot; src=&quot;http://www.7tutorials.com/files/img/wake_mse/mse4.png&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
The setting will now be applied. Unfortunately, any time you change  the scheduled scan setting via the Microsoft Security Essentials  interface, you will need to update the task again if you continue to  desire the &lt;em&gt;&#39;Wake to Run&#39;&lt;/em&gt; functionality.&lt;br /&gt;
&lt;br /&gt;
[&lt;a href=&quot;http://www.7tutorials.com/wake-computer-run-microsoft-security-essentials-scan?utm_source=feedburner&amp;amp;utm_medium=feed&amp;amp;utm_campaign=Feed%3A+7tutorials%2FKVoP+%287+Tutorials+-+Genuine+Help+for+Windows+7%29&amp;amp;utm_content=Google+Reader&quot;&gt;via&lt;/a&gt;]</description><link>http://hacksperm.blogspot.com/2010/08/wake-computer-to-run-microsoft-security.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-8211167832988500963</guid><pubDate>Fri, 20 Aug 2010 00:47:00 +0000</pubDate><atom:updated>2010-08-19T17:47:47.790-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Use Facebook Places to Connect With People in Real World</title><description>Facebook has launched a new feature called &lt;a href=&quot;http://www.facebook.com/places/&quot; target=&quot;_blank&quot;&gt;Facebook Places&lt;/a&gt;.  It lets you broadcast your current physical location to your friends  and, at the same time, lets you see where your friends are located.  Thus, you can easily find if some of your friends are near you, and  contact them easily.&lt;br /&gt;
&lt;br /&gt;
For example, if you are in a Cinema hall, you can see if any of your  friends’ is also there. And they can also find you via Facebook Places.  Thus this feature is really useful to connect with people in real life.  Check out the video below to get an overview of Facebook Places,&lt;br /&gt;
&lt;br /&gt;
&lt;object height=&quot;385&quot; width=&quot;640&quot;&gt;&lt;param name=&quot;movie&quot; value=&quot;http://www.youtube.com/v/ZfX_ZQag1BM&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowFullScreen&quot; value=&quot;true&quot;&gt;&lt;/param&gt;&lt;param name=&quot;allowScriptAccess&quot; value=&quot;always&quot;&gt;&lt;/param&gt;&lt;embed src=&quot;http://www.youtube.com/v/ZfX_ZQag1BM&amp;color1=0xb1b1b1&amp;color2=0xd0d0d0&amp;hl=en_US&amp;feature=player_embedded&amp;fs=1&quot; type=&quot;application/x-shockwave-flash&quot; allowfullscreen=&quot;true&quot; allowScriptAccess=&quot;always&quot; width=&quot;640&quot; height=&quot;385&quot;&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
Visit the &lt;a href=&quot;http://www.facebook.com/help/?topic=places&quot; target=&quot;_blank&quot;&gt;Facebook Places FAQ&lt;/a&gt;  to learn all about it. Some of the things you can do are location  status updates, tagging your friends at places, and post comments. &lt;br /&gt;
Note – At the time of writing, Facebook Places is available only to  US users who have W3 geolocation support. If you are in US and you have a  supported phone, then go to &lt;a href=&quot;http://touch.facebook.com/&quot;&gt;touch.facebook.com&lt;/a&gt; or &lt;a href=&quot;http://www.facebook.com/iphone&quot; target=&quot;_blank&quot;&gt;Facebook for iPhone&lt;/a&gt;.</description><link>http://hacksperm.blogspot.com/2010/08/use-facebook-places-to-connect-with.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-1800688650708781376</guid><pubDate>Thu, 19 Aug 2010 01:03:00 +0000</pubDate><atom:updated>2010-08-18T18:03:28.060-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mac</category><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Seven maintenance tips to optimize Mac performance</title><description>&lt;div class=&quot;entry&quot;&gt;      &lt;a href=&quot;http://www.linuxwallpapers.org/mac/mac_5.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;150&quot; src=&quot;http://www.linuxwallpapers.org/mac/mac_5.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;Mac systems are pretty trouble free, and OS X is a pretty solid  system. However, as with all things, an ounce of prevention is better  than a pound of cure, and there are some things that you can do with OS X  to keep it running in tip-top shape. &lt;span id=&quot;goog_885891792&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_885891793&quot;&gt;&lt;/span&gt;&lt;a href=&quot;http://draft.blogger.com/&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;#1 Back it up&lt;/h2&gt;The first and most crucial &amp;nbsp;thing to do is to keep a backup of your  important files, or even the entire system. To clone the entire system  (great for backups and quick restoration in the case of hardware  failure), an external hard drive and &lt;a href=&quot;http://www.shirt-pocket.com/superduper/&quot; target=&quot;_blank&quot;&gt;SuperDuper!&lt;/a&gt;  are the best solution as far as I am concerned. SuperDuper! makes a  bootable clone of your hard drive; a great thing to do before performing  large system updates, or something to schedule routinely. Other options  include buying an Apple Time Machine and scheduling backups that way.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#2 Keep software up to date&lt;/h2&gt;Keeping software current is another important thing. Software updates  not only provide new functionality and correct bugs, they often correct  security flaws as well. Keeping your system up to date via the OS X  Software Update is important, but so is keeping the third-party  applications installed current. Many applications “phone home” to check  for updates and will alert you if updates are available. Otherwise, you  can point your RSS feed reader to &lt;a href=&quot;http://www.macupdate.com/&quot; target=&quot;_blank&quot;&gt;MacUpdate&lt;/a&gt;’s  web site to keep you alert of new software releases. You can also elect  to pay MacUpdate’s yearly subscription fee and be alerted via email or  use their desktop application (which is quite useful as well, as it will  inform you of what installed applications are out of date).&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#3 Perform a Permissions Repair&lt;/h2&gt;This can be done by launching Disk Utility, selecting the boot drive,  and clicking Repair Disk Permissions. It is a good habit to repair  permissions before and after large system upgrades (i.e., when upgrading  from OS X 10.6.3 to 10.6.4). As well, in Disk Utility you can use the  “Verify Disk” button to scan the integrity of the filesystem on the hard  drive. If it identifies problems, you will need to boot from the  install disc or a cloned drive (another reason SuperDuper! is useful)  and use Disk Utility to repair them.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#4 Get the right tools&lt;/h2&gt;Tools exist to keep an eye on your system, and free ones are even  better. To be informed of the impending decline of hard drives, use the  free &lt;a href=&quot;http://www.corecode.at/smartreporter&quot; target=&quot;_blank&quot;&gt;SMARTReporter menu bar tool&lt;/a&gt;.  This tool checks the S.M.A.R.T. output of your hard drive(s) and  reports if there are any failures or inconsistencies; however, keep in  mind that this only works with internal SATA/eSATA/IDE drives, and not  external drives.&lt;br /&gt;
Another great monitoring tool is &lt;a href=&quot;http://bjango.com/&quot; target=&quot;_blank&quot;&gt;iStat Menus&lt;/a&gt;.  This is another menu bar app that displays useful information such as a  CPU usage meter, memory usage, disk usage, disk activity, temperature  sensors, and more. If it feels like the system is slowing down, clicking  on the menu bar icons will show you what applications are taking the  most CPU or consuming the most memory.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#5 Beware of memory leaks&lt;/h2&gt;With the stability of OS X, some people may leave their systems  running constantly, or put them to sleep without restarting the system.  If any running software has memory leaks, even small ones, leaving them  open constantly will start to consume more and more system memory. Some  applications that use a lot of memory, such as Safari and other  browsers, may not fully release that used memory when tabs are closed,  and it isn’t uncommon to see Safari using far more memory than a browser  warrants.&lt;br /&gt;
I’ve seen Safari consume over 1GB of memory all on its own. Quitting and  restarting these memory hogs will reduce memory consumption, at least  for a time. Restarting the entire computer will reset OS X’s virtual  memory system and clean things up; after restarting, the system should  typically feel snappier.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#6 Watch your hard drive&lt;/h2&gt;Another common sense tips include keeping an eye on hard drive space.  Generally speaking, you should always ensure you have about 10% of your  drive available as free space; if you find yourself filling the drive  quickly or often, consider replacing it with a larger drive, delete some  unused applications or files, off-loading some archive data to an  external drive, or simply emptying the trash every once in a while will  help.&lt;br /&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;#7 Check Login Items&lt;/h2&gt;Finally, a lot of programs like to run little helpers in the  background, or think that if you run them once, you want to run them all  the time. Firing up System Preferences and looking in the Accounts  pane, then selecting the Login Items tab for your account can be a real  eye opener. These programs start when you log in, so if there are  applications here that you do not want running, here is where you can  remove them. Simply highlight the application you no longer want  starting at login and click the “-” button to remove it.&lt;br /&gt;
These are all fairly straightforward tips, but continuing to keep  them in mind will keep your system running at an optimal level of  performance.&lt;br /&gt;
&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/seven-maintenance-tips-to-optimize-mac.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-8302566482638179362</guid><pubDate>Thu, 19 Aug 2010 00:41:00 +0000</pubDate><atom:updated>2010-08-18T17:41:33.890-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>5 Useful Add Ons for Bloggers</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.thecookblog.com/images/firefox.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;229&quot; src=&quot;http://www.thecookblog.com/images/firefox.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
If you need some convincing, then read on my gathered list of 5  add-ons  which will greatly help you do your job once you switch over to   Firefox. If Firefox is already your default browser of choice, then just   read each entry carefully and see how each add-on can enhance Firefox   for your web tasks.&lt;br /&gt;
&lt;br /&gt;
You are welcome if you want to share more must have firefox extensions that our readers/viewers may like.&lt;br /&gt;
&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/684&quot; target=&quot;_blank&quot;&gt;FireFTP&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;fireftp&quot; class=&quot;size-full wp-image-8151 aligncenter&quot; height=&quot;359&quot; src=&quot;http://www.smashingapps.com/wp-content/uploads/2010/04/fireftp.png&quot; width=&quot;544&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
If  you are not using FireFTP, then there is a good chance that you  are  using a full-fledged FTP client (because lightweight ones simply do  not  offer complete FTP features). FireFTP however, is one light FTP  client  in the form of a Firefox add-on. Along with transferring your  files  quickly and efficiently, FireFTP also includes more advanced  features  such as directory comparison, syncing directories while  navigating,  SFTP, SSL encryption, search/filtering, integrity checks,  remote  editing, drag &amp;amp; drop, and file hashing. The best part is that  is  does not slow down Firefox at all.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/3036&quot; target=&quot;_blank&quot;&gt;SeoQuake&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;seoquake&quot; class=&quot;size-full wp-image-8152 aligncenter&quot; height=&quot;252&quot; src=&quot;http://www.smashingapps.com/wp-content/uploads/2010/04/seoquake.png&quot; width=&quot;549&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
This  extension is a must-have for anybody whose work involves search  engine  optimization. SeoQuake obtains and investigates many important  SEO  parameters of the internet project under study. We can save these   parameters for future work and compare them with the results obtained   for other competitive projects.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/7255&quot; target=&quot;_blank&quot;&gt;Domain Availability Search&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;Domain Availability&quot; class=&quot;size-full wp-image-8153 aligncenter&quot; height=&quot;307&quot; src=&quot;http://www.smashingapps.com/wp-content/uploads/2010/04/Domain-Availability.png&quot; width=&quot;501&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
A  website’s name is a very important factor to consider while  creating a  website. We cannot simply think of a name, we have to check  for its  availability as well. Doman Availability Search add-on lets us  do so  easily. Supported TLDs include COM, NET, ORG, BIZ, CO.UK, ORG.UK,  MOBI,  INFO, TV, WS, IN, ME, US, CC, BZ, CA, CN, EU, and DE.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/5457&quot; target=&quot;_blank&quot;&gt;Shareaholic&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;img alt=&quot;shareaholic&quot; class=&quot;size-full wp-image-8154 aligncenter&quot; height=&quot;403&quot; src=&quot;http://www.smashingapps.com/wp-content/uploads/2010/04/shareaholic.png&quot; width=&quot;482&quot; /&gt;&lt;/div&gt;&lt;br /&gt;
Promoting  our site or blog over social media networks could not get  any easier  with Shareaholic. It is an award-winning add-on that has been   downloaded over 1 million times by people looking for a customizable,   light-weight method of sharing virtually any web page. The supported   range of networks is more than impressive and we can share on them with   simple mouse clicks.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;https://addons.mozilla.org/en-US/firefox/addon/5791&quot; target=&quot;_blank&quot;&gt;Flagfox&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;&lt;b&gt;&lt;img alt=&quot;maps&quot; class=&quot;size-full wp-image-8155 aligncenter&quot; height=&quot;379&quot; src=&quot;http://www.smashingapps.com/wp-content/uploads/2010/04/maps.png&quot; width=&quot;512&quot; /&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
Finding  out about the location of a site can be helpful in  eliminating doubts  regarding security. On the Firefox address bar,  Flagfox places the  country flag of the currently open website’s server.  We can click on  this Flag to pull up a geographical map of that location  and other  information regarding the site such as the city and IP  address.&lt;br /&gt;
&lt;div_prefs id=&quot;div_prefs&quot;&gt;&lt;/div_prefs&gt;</description><link>http://hacksperm.blogspot.com/2010/08/5-useful-add-ons-for-bloggers.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-4803057830724570741</guid><pubDate>Wed, 18 Aug 2010 15:11:00 +0000</pubDate><atom:updated>2010-08-18T08:11:14.477-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Microsoft Arc Touch Mouse Has Been Finally Unveiled !!</title><description>Microsoft Arc Touch Mouse has been finally been unveiled to the world. It is one sexy looking mouse  by Microsoft with a design very similar to the last-generation Arc  Mouse by Microsoft, except that this one has touch-sensitive shell on  top, and you can curve and straighten it anyway you like! awesome isn’t  it?&lt;br /&gt;
&lt;br /&gt;
&lt;img alt=&quot;microsoft-arc-touch-mouse-1282132397-crop&quot; border=&quot;0&quot; height=&quot;353&quot; src=&quot;http://www.redmondpie.com/wp-content/uploads/2010/08/microsoftarctouchmouse1282132397crop1.jpg&quot; style=&quot;background-image: none; border-width: 0px; display: block; float: none; margin: 0px auto; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;microsoft-arc-touch-mouse-1282132397-crop&quot; width=&quot;449&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
Of course it hasn’t been announced by Microsoft yet. These images were taken off from a &lt;a href=&quot;http://translate.google.com/translate?hl=en&amp;amp;ie=UTF8&amp;amp;langpair=de%7Cen&amp;amp;sl=de&amp;amp;tl=en&amp;amp;u=http://www.notebooksbilliger.de/microsoft%2Barc%2Btouch%2Bmaus&quot; target=&quot;_blank&quot;&gt;German online store&lt;/a&gt; which is displaying it for October 13th availability. It was first earlier this month when &lt;a href=&quot;http://twitter.com/msfthardware/status/20238691420&quot; target=&quot;_blank&quot;&gt;Twitter account&lt;/a&gt; of Microsoft Hardware teased a couple of images of this mysterious looking “flat” and “touchy” device. &lt;br /&gt;
According to the German online store, features of Arc Touch mouse are as follows:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Touch Scrolling &lt;/li&gt;
&lt;li&gt;Battery Indicator &lt;/li&gt;
&lt;li&gt;The ability to track on any sort of surface (glass, wood etc.) &lt;/li&gt;
&lt;li&gt;2.4 GHz nano transceiver which plugs into USB&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;img alt=&quot;atmafrontcurvedfy11&quot; border=&quot;0&quot; height=&quot;394&quot; src=&quot;http://www.redmondpie.com/wp-content/uploads/2010/08/atmafrontcurvedfy111.jpg&quot; style=&quot;background-image: none; border-width: 0px; display: block; float: none; margin: 0px auto; padding-left: 0px; padding-right: 0px; padding-top: 0px;&quot; title=&quot;atmafrontcurvedfy11&quot; width=&quot;520&quot; /&gt;&lt;br /&gt;
&lt;br /&gt;
You will be able to grab Microsoft Arc Touch mouse for a price of €69.99 in Europe, or for $69.95 in US. &lt;em&gt;[&lt;/em&gt;&lt;a href=&quot;http://www.engadget.com/2010/08/18/microsofts-arc-touch-revealed/&quot; target=&quot;_blank&quot;&gt;&lt;em&gt;via&lt;/em&gt;&lt;/a&gt;&lt;em&gt; Engadget]&lt;/em&gt;</description><link>http://hacksperm.blogspot.com/2010/08/microsoft-arc-touch-mouse-has-been.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-6929427634326999687</guid><pubDate>Wed, 18 Aug 2010 15:07:00 +0000</pubDate><atom:updated>2010-08-18T08:07:00.218-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>ESET NOD32 Antivirus Business Edition v4.2.64.12 (32bit) - Final (Incl. Key Till 2015)</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://i37.tinypic.com/w2m5w3.jpg&quot; onclick=&quot;return hs.expand(this)&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;ESET NOD32 Antivirus Business Edition v4.2.64.12 (32bit) - Final (Incl. Key Till 2015)&quot; height=&quot;494&quot; src=&quot;http://i37.tinypic.com/w2m5w3.jpg&quot; title=&quot;ESET NOD32 Antivirus Business Edition v4.2.64.12 (32bit) - Final (Incl. Key Till 2015)&quot; width=&quot;310&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;!--dle_image_end--&gt;&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;&lt;strong&gt;ESET NOD32 Antivirus Business Edition v4.2.64.12 (32bit) - Final (Incl. Key Till 2015) | 37 MB&lt;/strong&gt;&lt;/div&gt;&lt;br /&gt;
&lt;strong&gt;ESET NOD32 Antivirus System&lt;/strong&gt; - Integrated, Real-Time &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD4&quot;&gt;Protection&lt;/span&gt; against viruses, worms, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD2&quot;&gt;trojans&lt;/span&gt;, spyware, adware, &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD5&quot;&gt;phishing&lt;/span&gt;, and hackers. Best detection, fastest performance &amp;amp; smallest footprint. NOD32 &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD1&quot;&gt;Antivirus&lt;/span&gt; System provides well balanced, state-of-the-art protection against threats endangering your PC and enterprise systems running various platforms from &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD6&quot;&gt;Microsoft&lt;/span&gt; Windows, through a number of UNIX/Linux, Novell, MS DOS operating systems to Microsoft Exchange Server, Lotus Domino and other mail servers.&lt;br /&gt;
&lt;br /&gt;
ESET  solutions are built on ESET’s one-of-a-kind ThreatSense technology.  This advanced heuristics engine enables proactive detection of malware  not covered by even the most frequently updated signature-based products  by decoding and analyzing executable code in real time, using an  emulated environment.&lt;br /&gt;
By allowing malware to execute in a secure  virtual world, ESET is able to clearly differentiate between benign  files and even the most sophisticated and cleverly-disguised malware.&lt;br /&gt;
&lt;br /&gt;
Users of Microsoft®  Windows® can experience the power and elegance of NOD32&#39;s ThreatSense  Technology with ease and comfort. Our single optimized engine offers the  best protection from viruses, spyware, adware, phishing attacks, and more. Keep tomorrow&#39;s threats at bay with our proactive detection technology.&lt;br /&gt;
&lt;br /&gt;
If  you are interested in computer security and would like to get a chance  to influence the development of ESET&#39;s security systems, we invite you  to join our Early Access &lt;span class=&quot;IL_AD&quot; id=&quot;IL_AD3&quot;&gt;program&lt;/span&gt;. Gain early access to the latest technology in beta and release candidate stages.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Changes in NOD32 Antivirus 4.2.64.12:&lt;/strong&gt;&lt;br /&gt;
* Fix: Computer hangs when going to sleep/hibernate on Windows 7 (usually in combination with Dropbox)&lt;br /&gt;
* Fix: Sysrescue Wizard cannot detect the Czech version of Windows Automated Installation Kit&lt;br /&gt;
* Fix: Enhanced support of scanning of virtual drives used by Office 2010&lt;br /&gt;
* Fix: Opening Office documents from Novell shared folder is not possible&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;OS: &lt;/strong&gt;Windows 2K / XP / Vista / XP X64 / Vista64 / 7 / 7 x64&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Note: Updated Keys Which expire in The Year 2015-December.&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;Homepage:&lt;/strong&gt; http://www.eset.com/&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;Download from Hotfile:&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt; &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;a href=&quot;http://hotfile.com/dl/62947914/d9eebd3/NOD32.Antivirus.Business.Edition.v4.2.64.12.rar.html&quot;&gt;Download Here&lt;/a&gt;&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/eset-nod32-antivirus-business-edition.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i37.tinypic.com/w2m5w3_th.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-2144501038007736429</guid><pubDate>Wed, 18 Aug 2010 14:57:00 +0000</pubDate><atom:updated>2010-08-18T07:57:30.295-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Thread: Corel PaintShop Pro X2 Ultimate Plus Cracked</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;/div&gt;&lt;div style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;320&quot; onclick=&quot;window.open(this.src)&quot; src=&quot;http://i49.tinypic.com/2liv888.jpg&quot; style=&quot;max-width: 800px;&quot; width=&quot;298&quot; /&gt;&lt;br /&gt;
&lt;b&gt;Corel PaintShop Pro X2 Ultimate Plus Crack | 325MB&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt; Paint Shop Pro Photo X2 has everything you need to create stunning  photos. The integrated Learning Center and a selection of one-click  photo-fixing tools make it easy to correct common photo flaws such as  red eye, color and sharpness. Unique makeover tools let you whiten  teeth, remove blemishes and paint on a tan, so you can make everyone  look their best before printing or posting photos online.&lt;br /&gt;
&lt;br /&gt;
As your skills and confidence grow, you can harness the power of  professional-quality features such as HDR Photo Merge, Histogram, Curves  and Levels Adjustment tools to make precision edits. You can even get  creative with artistic effects and filters to turn your favorite photos  into fun projects to share with family and friends.&lt;br /&gt;
&lt;br /&gt;
* Import pictures from your camera automatically&lt;br /&gt;
* Instantly fix common problems such as red eye, color and sharpness&lt;br /&gt;
* Add special effects to photos, text and projects with a few simple clicks&lt;br /&gt;
* Use advanced editing tools to fine-tune images on your own&lt;br /&gt;
* Print, email and share photos&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&lt;br /&gt;
&lt;b&gt;System Requirements&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
* Windows Vista? or Windows? XP, with latest service packs installed&lt;br /&gt;
* 512 MB RAM (768 MB recommended)&lt;br /&gt;
* 768 MB RAM required if using Windows Vista&lt;br /&gt;
* 1 GHz processor (2 GHz recommended)&lt;br /&gt;
* 1.5 GB hard disk space&lt;br /&gt;
* 24-bit color display, 1024x768 resolution&lt;br /&gt;
* Microsoft DirectX? 9.0c or higher (included in Windows Vista and XP)&lt;br /&gt;
* DVD drive&lt;br /&gt;
&lt;br /&gt;
Additional requirements for select features&lt;br /&gt;
&lt;br /&gt;
* Microsoft? Outlook?, Outlook Express, WordPerfect? MAIL or other MAPI-compliant email software (to email from the product)&lt;br /&gt;
* Apple? QuickTime? 7 or higher (to play .mov movie files)&lt;/div&gt;&lt;div style=&quot;text-align: left;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;Downloads: &lt;/div&gt;&lt;div style=&quot;text-align: center;&quot;&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/bYrPt4z/Corel%20PaintShop%20Pro%20X2%20Ultimate%20Plus%20Crack.rar.001&quot;&gt;Part 1&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/5chxfqb/Corel%20PaintShop%20Pro%20X2%20Ultimate%20Plus%20Crack.rar.002&quot;&gt;Part 2&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.fileserve.com/file/ptuthqy/Corel%20PaintShop%20Pro%20X2%20Ultimate%20Plus%20Crack.rar.003&quot;&gt;Part 3&lt;/a&gt;&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/thread-corel-paintshop-pro-x2-ultimate.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="http://i49.tinypic.com/2liv888_th.jpg" height="72" width="72"/></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-1320642669822609711</guid><pubDate>Wed, 18 Aug 2010 11:39:00 +0000</pubDate><atom:updated>2010-08-18T04:39:55.586-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>Silent Windows 7 Start Up Sound Tips</title><description>&lt;div id=&quot;_mcePaste&quot;&gt;When every time windows 7 startup, most of windows 7 user will listen  windows start sound appear if your computer sound system is activated.  However,&amp;nbsp;Windows start up sound is some thing which you may not want to  hear every time, specially when you are booting your computer in room  and it may disturb others, or in some cases there are people who are  annoyed by the sound everytime windows boots up.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://t3.gstatic.com/images?q=tbn:yF8bb9xNfyBxXM:http://img.photobucket.com/albums/v374/vishaal_here/Sound_Setting_for_PC_Calls_in_Win_7.png&amp;amp;t=1&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://t3.gstatic.com/images?q=tbn:yF8bb9xNfyBxXM:http://img.photobucket.com/albums/v374/vishaal_here/Sound_Setting_for_PC_Calls_in_Win_7.png&amp;amp;t=1&quot; width=&quot;179&quot; /&gt;&lt;/a&gt;For all those who would like to remove the Windows 7 start up sound  and make windows silent. Below is some simple step to silent Windows  Startup sound. &lt;br /&gt;
&lt;h2&gt;How to silent Windows Start Up Sound:&lt;/h2&gt;1. Once windows 7 is loaded, press Window Key+R or locate Start Menu  button-&amp;gt; Navigate to “Run” and type in “mmsys.cpl”. Then press Enter  key or clock ok button.&lt;br /&gt;
&lt;br /&gt;
2. A windows sound dialogue window will be open, click on Sound tab  then locate the checkbox which says Play Windows start up sound at the  bottom of the dialogue window and uncheck the checkbox as shown in the  image below.&lt;br /&gt;
&lt;br /&gt;
3. Click apply button, that’s it done. Windows 7 will now boot up silently every time you boot it.&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/silent-windows-7-start-up-sound-tips.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-8225777192911169616</guid><pubDate>Wed, 18 Aug 2010 11:16:00 +0000</pubDate><atom:updated>2010-08-18T04:16:47.083-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">News</category><title>Apple.com Hit In Latest Mass Hack Attack</title><description>A hack attack that can expose users to malware exploits has infected  more than 1 million webpages, at least two of which belong to Apple. &lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://images.dailyradar.com/media/uploads/gizmo/story_preview/2009/06/11/hackers_hack_apple_com_online_store_to_buy_iphone_.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://images.dailyradar.com/media/uploads/gizmo/story_preview/2009/06/11/hackers_hack_apple_com_online_store_to_buy_iphone_.jpg&quot; /&gt;&lt;/a&gt;The SQL injection attacks bombard the websites of legitimate  companies with database commands that attempt to add hidden links that  lead to malware exploits. While most of the sites that fell prey appear  to belong to mom-and-pop operations, two of the infections hit pages  Apple uses to promote iTunes podcasts. The malicious links appear to  have been removed since Google last indexed the pages in early August.&lt;br /&gt;
In all, at least 538,000 pages have been compromised by the same attack.  Attacks the bear similar fingerprints but point to different domains   have claimed close to 500,000 more.&lt;br /&gt;
&lt;br /&gt;
“These attacks have been ongoing and are changing pretty often,” said  Mary Landesman, a senior researcher with ScanSafe, a Cisco-owned  service that provides customers with real-time intelligence about  malicious sites. “Interestingly, many of the sites compromised have been  involved in repeated compromises over the past few months. It’s not  clear whether these are the work of the same attackers or are competing  attacks.”&lt;br /&gt;
SQL injection attacks succeed because web applications don’t properly  filter search queries and other user-supplied input for malicious text.  When the data is processed, commands are passed to a website’s backend  server, causing it to add links or cough up sensitive information.&lt;br /&gt;
&lt;br /&gt;
The attacks that hit Apple used highly encoded text strings to sneak  past web-application filters. They are only the latest in a series of  hack attacks to hit large numbers of websites.&lt;br /&gt;
&lt;br /&gt;
The exploits used this time around weren’t as effective as they might  have been. According to Landesman, many of the iframes buried into the  websites contained HTML that couldn’t be rendered.</description><link>http://hacksperm.blogspot.com/2010/08/applecom-hit-in-latest-mass-hack-attack.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-5306300305635243002</guid><pubDate>Wed, 18 Aug 2010 10:52:00 +0000</pubDate><atom:updated>2010-08-18T03:52:26.178-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>How to secure a ZIP archive?</title><description>&lt;div style=&quot;color: black;&quot;&gt;WinZip  (www.winzip.com) offers the ability to protect a zip archive with a  password. The result is an encrypted zip archive that can only be opened  if the correct password is entered. An encrypted zip archive provides  confidentiality, it cannot be viewed by persons who don&#39;t have the  password.&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;It is possible to encrypt files when  they are added to the archive, but it&#39;s also possible to encrypt the  whole archive at once. That&#39;s done by clicking &#39;Actions&#39; in the menu and  then choose &#39;Encrypt&#39;.&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: blue; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.oraxcel.com/projects/encoffice/help/img/winzip1.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;302&quot; src=&quot;http://www.oraxcel.com/projects/encoffice/help/img/winzip1.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;winzip encrypt option&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Encryption options in WinZip&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Now a dialogue asks you to enter a password and choose a proper encryption algorithm.&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;winzip encrypt option&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: blue; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.oraxcel.com/projects/encoffice/help/img/winzip2.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;263&quot; src=&quot;http://www.oraxcel.com/projects/encoffice/help/img/winzip2.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;* The Zip 2.0 encryption format is known  to be relatively weak, and cannot be expected to provide protection  from individuals with access to specialized password recovery tools.&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;*  AES is the Advanced Encryption Standard. This encryption method, also  known as Rijndael, has been adopted by the U.S. Government&#39;s National  Institute of Standards (NIST) as a Federal Information&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Processing  Standard. WinZip supports AES encryption in two different strengths: 128  bit AES and 256 bit AES. These numbers refer to the size of the  encryption keys that are used to encrypt the data. 256 bit AES is  stronger than 128 bit AES, but both provide significantly greater  security than the standard Zip 2.0 method. An advantage of 128 bit AES  is that it is slightly faster than 256 bit AES, that is, it takes less  time to encrypt or decrypt a file. Both 128- and 256-bits encryption are  considered strong encryption by the security community.&lt;/div&gt;&lt;div style=&quot;color: blue;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Now click &#39;OK&#39; and it&#39;s done.&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Availability of zip AES decryption software is not standard&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Not  every zip program is able to decrypt an AES encrypted zip archive. The  receiver needs to have a recent version of Winzip (or a compatible zip  program) installed to open the document. However, WinZip is not standard  software at the office and there are many free alternatives to create  and open zip archives.&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Encrypted zip files are blocked by e-mail scanners&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;&amp;nbsp;&lt;/div&gt;&lt;div style=&quot;color: black;&quot;&gt;Anti-virus  scanners at e-mail gateways cannot scan the content of an encrypted  file. Virus builders have abused this fact and distributed malware via  password protected zip archives. This is the reason why many companies  block e-mails containing encrypted zip files. As a result, it is  unlikely that one can use encrypted zip files in order to exchange  sensitive information between companies.&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/how-to-secure-zip-archive.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-4185058491053225443</guid><pubDate>Wed, 18 Aug 2010 10:42:00 +0000</pubDate><atom:updated>2010-08-18T03:42:20.752-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>Association for Computing Home Security</title><description>&lt;a href=&quot;http://riyadhschools.net/memoalkhani/files/2009/04/computerchaineddown.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;155&quot; src=&quot;http://riyadhschools.net/memoalkhani/files/2009/04/computerchaineddown.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;There are several things that must be taken to ensure that the use of  computers at home (home computing) can be run safely and comfortably. &lt;br /&gt;
&lt;span id=&quot;formatbar_Buttons&quot; style=&quot;display: block;&quot;&gt;&lt;span class=&quot;&quot; id=&quot;formatbar_JustifyFull&quot; onmousedown=&quot;CheckFormatting(event);FormatbarButton(&#39;richeditorframe&#39;, this, 13);ButtonMouseDown(this);&quot; onmouseout=&quot;ButtonHoverOff(this);&quot; onmouseover=&quot;ButtonHoverOn(this);&quot; onmouseup=&quot;&quot; style=&quot;display: block;&quot; title=&quot;Justify Full&quot;&gt;&lt;img alt=&quot;Justify Full&quot; border=&quot;0&quot; class=&quot;gl_align_full&quot; src=&quot;http://www.blogger.com/img/blank.gif&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;color: #33cc00; font-size: 180%;&quot;&gt;Three Easy Steps&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
As  a computer user at home, in accessing the Internet through a broadband  connection or traditional dial-up use, you should do at least the three  following basic security measures to protect the comfort of your home  computing process:&lt;a href=&quot;&quot; name=&quot;more&quot;&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
1. Antivirus Software installation and maintenance&lt;br /&gt;
There  are several anti-virus software packages available on the market. This  software detects the virus that are recognized by the computer memindal  periodically. Most will also check for viruses on incoming email. It is  important to update anti-virus software regularly.&lt;br /&gt;
&lt;br /&gt;
2. Update Antivirus&lt;br /&gt;
Nearly  every day found a new virus. At least once a week you should check the  web site vendor that makes anti-virus software to determine whether  there is an update available.&lt;br /&gt;
&lt;br /&gt;
3. Do not Open File Unknown or Email&lt;br /&gt;
Many  viruses and worms are called &quot;social engineering&quot;. The point is that  these viruses or worms to manipulate you in the process of spreading.  Latest virus can appear disguised as an email terkirimdari address, so  that it looks like delivered by a person, not by a computer that  menginfeksinya. If there was an email from someone you do not know, the  easiest way is to immediately delete it without looking. If the email  appears to be from someone you know, you should read it carefully before  opening any attached files. Viruses and worms often have bad English  and grammar. Consider whether the person who you know would write a  message or send the attached file. If in doubt, contact the person who  you know to confirm they actually sent it before opening the attachment.&lt;br /&gt;
&lt;br /&gt;
Make  sure your computer is protected from harmful things. As new viruses are  discovered, new vulnerabilities are found. Many of them are in the  operating system, like Windows. But viruses are also found in other  applications such as web browsers, email software, and various other 3rd  party applications. Leaving the computer is open to anyone without a  security-protected securities may result in such computers easily  disturbed by hackers.&lt;br /&gt;
&lt;br /&gt;
Staying up to date can be difficult. Some  software vendors, like Microsoft, have automated utilities that detects  whether there is any updates and notify you of other vendors who have a  mailing list where you can join and they will notify you of any new  updates. If your vendor does not offer one of these solutions, we  encourage you to frequently visit the support web site regularly to see  if any new patches or updates.</description><link>http://hacksperm.blogspot.com/2010/08/association-for-computing-home-security.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-8334417997433654497</guid><pubDate>Tue, 17 Aug 2010 19:49:00 +0000</pubDate><atom:updated>2010-08-17T12:49:45.889-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><category domain="http://www.blogger.com/atom/ns#">Viruses</category><title>Why people create computer viruses? 7 Reasons</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://creativebits.org/files/virus2.jpeg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://creativebits.org/files/virus2.jpeg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;One of the most common questions we get asked by our tech support  customers who hire us for virus removal is this: why do people create  computer viruses? The answer is a complicated one that involves  psychology and the darker side of human nature. &lt;br /&gt;
&lt;br /&gt;
In the interest of simplicity, the word “virus” may sometimes be  referring to other types of malware including worms, trojan horses,  spyware, adware, and rootkits.&lt;br /&gt;
&lt;br /&gt;
The seven deadly reasons for creating a computer virus:&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Boredom:&lt;/b&gt; Young people, in this first level of severity, can sometimes  simply make poor choices. The ones with inquisitive minds sometimes try  their hand at hacking, or “playfully” tinker with joke viruses.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Curiosity:&lt;/b&gt; They know it killed the cat, but some people just “need”  to find out if their virus will spread. They don’t always realize the  damage they do until the virus is “in the wild” and it’s too late.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Revenge: &lt;/b&gt;People with very basic coding or hacking skills sometimes  join a cause and their motivation is to get back at an individual,  corporation, or government.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Greed: &lt;/b&gt;Much of the most common malware is designed to get people to  pay for bogus software, steal credit card numbers, or even get passwords  to take money from bank accounts.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Power: &lt;/b&gt;The need for it can be a compelling and destructive force.  Hacking and creating viruses to take over computers is never enough;  they will always need a bigger thrill.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Aggression:&lt;/b&gt; When unchanneled, excessive aggressive traits can be very  dangerous to humanity. Think of the videos we have all seen of baseball  players with “roid rage.”&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Sociopaths: &lt;/b&gt;The people likely to create the most destructive types of  malware, although they prefer causing physical violence to animals and  eventually to people.[1, 2]&lt;br /&gt;
&lt;br /&gt;
Luckily, there are many tech support and antivirus companies trying  to put a stop to, or at least slow down the cavalcade of new viruses.  There are well over one million viruses now “in the wild.”[3] Computer  repair is becoming increasingly more difficult due to rootkit and  stealth viruses. To combat these threats, tech support workers must know  the inner workings of various versions of Microsoft Windows and have  the ability to detect malware without relying on software scanners.&lt;br /&gt;
&lt;br /&gt;
The outsourcing of unqualified support technicians by many of the  largest providers is certainly not helping the situation. Unfortunately,  virus scanners will never be able to detect all of the current threats,  especially since so many people catch them from one wrong click.  http://www.youtube.com/watch?v=rnFHMjj5Ly0&lt;br /&gt;
Yesterday’s playful teenage hackers are today stealing billions and  trying to shut down power grids. [4] [5] That said, there are plenty of  “white-hat” hackers who certainly don’t mean any harm. They tend to be  bright and not necessarily bad kids who can make some bad decisions,  hopefully growing out of it before something bad happens. However, there  are no “white-hat” computer virus coders. It is taboo for security  firms to write malicious code even to test antivirus software. They are  written by those who choose to destroy rather than create.</description><link>http://hacksperm.blogspot.com/2010/08/why-people-create-computer-viruses-7.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-6394711448618678419</guid><pubDate>Tue, 17 Aug 2010 19:27:00 +0000</pubDate><atom:updated>2010-08-17T12:27:08.976-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Security</category><title>The Top Ten Most Dangerous Things You Can Do Online</title><description>&lt;!-- google_ad_section_start --&gt;   &lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://cache.gawkerassets.com/assets/images/4/2010/08/500x_tentaclecomputerfinal.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;The Top Ten Most Dangerous Things You Can Do Online&quot; border=&quot;0&quot; class=&quot;left image500 image_0&quot; src=&quot;http://cache.gawkerassets.com/assets/images/4/2010/08/500x_tentaclecomputerfinal.jpg&quot; width=&quot;500&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;i&gt;Researchers at Internet security service provider &lt;a href=&quot;http://www.cyberdefender.com/&quot;&gt;CyberDefender&lt;/a&gt;  looked at some of the most dangerous things you can do online and  explained how to protect yourself if you&#39;re not quite ready to give up  things like Internet porn completely.&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2&gt;Checking the &quot;Keep me signed in&quot; box on public PCs&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;NEVER, ever, check the &quot;keep me signed in&quot; box if you&#39;re not using your personal laptop or home desktop&lt;/li&gt;
&lt;li&gt;Be careful with work computers. Your office PC might feel &quot;yours&quot;  but others can easily snoop when you&#39;re away from your desk. They could  do something as simple as forward all your messages to their own private  email account&lt;/li&gt;
&lt;li&gt;If you just signed IN to Google, eBay, Amazon or other site from a public PC, make sure to sign OFF once you&#39;re done&lt;/li&gt;
&lt;li&gt;Delete your browser history from the browser tools when completed to protect your privacy&lt;/li&gt;
&lt;li&gt;Using your browser&#39;s privacy mode while browsing prevents  information such as the websites you visited from being stored. Internet  Explorer 8 calls it &quot;InPrivate Browsing&quot; and Google Chrome calls it a  &quot;New incognito window&quot;&lt;/li&gt;
&lt;li&gt;Never save passwords even when prompted to do so by your browser  because someone else using your computer later would have access to your  accounts &lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Failing to update Microsoft Windows OS /Java / Adobe Reader / Adobe Flash&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Java / Adobe Reader / Adobe Flash are responsible for an astounding  number of PC infections due to security exploits. The best way to avoid  becoming a target is to update all three pieces of software as often as  you can. Flash will prompt you automatically, but you can tell Java to  search for updates daily, instead of bi-monthly. Sign in for automatic  updates with Adobe Reader as well&lt;/li&gt;
&lt;li&gt;Make sure to update your windows operating system. One way to do  this is to set your windows updates to install automatically. This will  reduce your exposure to hackers exploiting vulnerabilities in the  windows operating system&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Searching for celebrity gossip, incriminating material (i.e. sex tapes)&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;This one is a no-brainer. Always be cautious while accessing this  material. Malware authors know that people naturally gravitate towards  the sex/celebrity combo, so new attacks are targeted specifically  towards this crowd&lt;/li&gt;
&lt;li&gt;If you must, search for your news on Google News, Bing News or other  aggregator. These services do a basic triage of sites, so chances are  you&#39;ll be kept from reaching infected blogs/web pages&lt;/li&gt;
&lt;li&gt;When searching on Google use https://www.google.com instead of the  common http://www.google.com, which will send your search request  through an encrypted SSL connection. CyberDefender has found that doing  so reduces the risk of being infected from search results. &lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Using BitTorrent to download copyrighted software/film/TV shows&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Stick to official downloads/streams such as iTunes, Hulu and  legitimate websites. Avoid torrent sites at all costs – even if legit  (not malicious), some of the ads found in torrent sites could be  compromised. Drive-by downloads are often found in compromised ads and  can infect computers without any sort of user input. Visit site -&amp;gt;  get infected automatically&lt;/li&gt;
&lt;li&gt;Do not download pirated material&lt;/li&gt;
&lt;li&gt;Do not download pirated material :)&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Searching for free porn&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Like everything else &quot;free&quot; on the Internet, free adult content  might turn out to be quite expensive. Free porn sites can be downright  shady in the way they treat users. That&#39;s what makes them ideal targets  for bad guys&lt;/li&gt;
&lt;li&gt;Similar to our advice re: torrent sites. The same principle applies  here: stick to paid sites. They&#39;re interested in keeping users happy, so  security will be better. You&#39;ll be considerably less exposed to malware  this way&lt;br /&gt;
Invest in a high-quality security suite such as CyberDefender&#39;s Early Detection Center 3.0, which includes&lt;/li&gt;
&lt;li&gt;CyberDefender&#39;s Link Patrol toolbar. This browser-based utility automatically scans links for malware before users click on them&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Online gaming (free to play, social games on Facebook and beyond)&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Be careful when downloading free to play (F2P) clients. If the  client software is malicious – or quality assurance happens to be spotty  – you could be putting your PC at risk&lt;/li&gt;
&lt;li&gt;Don&#39;t give out your login information to strangers. In fact, don&#39;t  give out ANY kind of information, personal or not, to people you meet  gaming. At the very least, you could have your virtual items stolen. At  worst, you could lose real money&lt;/li&gt;
&lt;li&gt;Avoid falling for the old &quot;FarmVille Secrets&quot; scam. You will either  download a Trojan or expose your Facebook login info to criminals&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Leaving Facebook privacy settings wide open, therefore exposing personal info to all&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Carefully review your privacy settings on Facebook. Err on the side  of caution – don&#39;t let &quot;friends of friends&quot; see your birthday, cell  phone number, etc. All of these could be used in an attempt to  impersonate you to credit cards, credit unions, etc&lt;/li&gt;
&lt;li&gt;Only friends should have access to the more personal layer of  information we all have. So choose your friends wisely – &quot;serial  friending&quot; would expose you just as well&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Connecting to unknown wireless networks&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;In public places, like airports and hotels, be careful about logging  into unknown (private) wireless networks. In a hotel for instance, be  sure you choose the official one, not another in the neighborhood. Bad  guys can eavesdrop as you use your computer, &quot;imitating&quot; a real, safe  environment&lt;/li&gt;
&lt;li&gt;Public settings for your laptop are a whole lot more secure – e.g. no file sharing, increased firewall settings, etc&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Using the same password for every single online account&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;It&#39;s hard work to remember several different passwords, so no wonder  some use the same password over and over again. But if that one  password leaks out to cybercriminals, your entire online life is  suddenly open to the world&lt;/li&gt;
&lt;li&gt;Keep different passwords for different purposes. Keep email and social media passwords separate, for example&lt;/li&gt;
&lt;li&gt;Certain browsers can also help with a &quot;master password&quot; that keeps a  multitude of passwords in check. So even if you have different  passwords for different services, you only have to remember the master  password Using a tool (Roboform or Password Vault) for this purpose that  encrypts password information and uses best practices to generate  passwords is an even better idea&lt;/li&gt;
&lt;/ul&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;&lt;h2&gt;Trying to get a free iPad, PlayStation 3 or similar gadgets (scams/phishing)&lt;/h2&gt;&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;How to protect yourself:&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Oldie but goodie: there&#39;s no such thing as a free lunch&lt;/li&gt;
&lt;li&gt;If an online offer sounds too good to be true, it usually is&lt;/li&gt;
&lt;li&gt;Avoid any kind of giveaway that&#39;s not supported in a big way by a  known brand, even if it happens to be an online brand (like Zappos, for  example)&lt;/li&gt;
&lt;li&gt;Keep a security suite fully updated, since most of them can catch phishing attempts resulting from this kind of scam&lt;/li&gt;
&lt;/ul&gt;</description><link>http://hacksperm.blogspot.com/2010/08/top-ten-most-dangerous-things-you-can.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-5358946782338939162</guid><pubDate>Tue, 17 Aug 2010 17:09:00 +0000</pubDate><atom:updated>2010-08-17T10:09:49.534-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Windows</category><title>15 Things Every PC User Should Know</title><description>&lt;div class=&quot;articleBodyContent&quot;&gt;    Think you know tech? If you don&#39;t have a handle on every single one of  these 15 tech facts, habits, and efficiency tricks, you&#39;re not living up  to your potential.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;1. Don&#39;t double-click everything.&lt;/strong&gt; Windows 101:  Double-clicking is how you open items in Windows. It&#39;s not how you open  links in your Web browser, click buttons in dialog boxes, or do pretty  much anything else--and if you reflexively double-click, you might  accidentally zip right past something important or submit a form twice.  If you don&#39;t need this reminder yourself, chances are you know someone  who does.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;2. Use slashes and backslashes in the appropriate situations.&lt;/strong&gt;  Let&#39;s get it straight: / is a slash (or forward slash, if you must),  and \ is a backslash. Backslashes are conventionally used for Windows  file paths (C:\Program Files\Whatever), while slashes are used for  Internet addresses (http://www.pcworld.com/howto.html).&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;3. Record the exact error message.&lt;/strong&gt; When your PC  crashes, it&#39;ll usually try to tell you why it is doing so--albeit with a  string of numbers and letters that you won&#39;t understand. Write the  message down in its entirety (or take a screenshot, if possible) so you  can later plug it into Google or give it to your tech support agent. If  your PC didn&#39;t provide an error message, go to Action Center (in the  Control Panel) and see if it shows up under &#39;View archived messages&#39; or  &#39;View problems to report&#39;.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;4. Bring deleted files back from the dead.&lt;/strong&gt; When you  delete a file from your PC or memory card, you&#39;re not wiping it off the  actual hard drive. Instead, you&#39;re simply removing the index information  that tells your PC where the file is, at which point the PC is free to  treat the part of your disk that contain that file as empty space that  it can write something else to. If you&#39;ve accidentally deleted  something, undelete utilities such as &lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,67538-order,4/description.html&quot;&gt;Recuva&lt;/a&gt; can help you find those files again as long as you haven&#39;t already written over that file with something new.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.pcworld.com/zoom?id=203395&amp;amp;page=1&amp;amp;zoomIdx=1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;DBAN; click for full-size image.&quot; src=&quot;http://images.pcworld.com/howto/graphics/203395-dban_180.jpg&quot; title=&quot;DBAN; click for full-size image.&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;Don&#39;t leave your personal data on your old PC&#39;s hard drive. Nuke it completely with Darik&#39;s Boot and Nuke.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;5. Wipe your hard drive before getting rid of it.&lt;/strong&gt;  Because your PC doesn&#39;t immediately get rid of the files you delete, you  can&#39;t just reformat your hard drive before recycling or selling your  old computer--because someone might be able to use an undelete app to  recover your sensitive data.Use &lt;a href=&quot;http://www.dban.org/&quot; target=&quot;_blank&quot;&gt;Darik&#39;s Boot and Nuke&lt;/a&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.pcworld.com/zoom?id=203395&amp;amp;page=1&amp;amp;zoomIdx=2&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Uncheck the boxes; click for full-size image.&quot; src=&quot;http://images.pcworld.com/howto/graphics/203395-java611yahoo_180.jpg&quot; title=&quot;Uncheck the boxes; click for full-size image.&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;image ltmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image ltmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;Want a totally worthless toolbar added to your browser? No? Then uncheck the box for that option before you install updates.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;6. Uncheck the boxes before you install.&lt;/strong&gt; Lots of  helpful apps out there give you the option of installing search toolbars  and other add-ons--and some of them are so pushy about being helpful  that their installers are configured to install the uninvited extras  unless you check a box saying you don&#39;t want them. Not only is each  add-on another thing that your PC needs to load, but you have no idea  what kind of data it could be sending out. They come bundled with the  app because they make money for the app developer, not because they&#39;re  particularly useful. So take a close look at what you&#39;re installing  before you click Install--and in return, the installer won&#39;t change your  search engine or install apps you don&#39;t need.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;7. Beware of viruses living in Office docs.&lt;/strong&gt;  Experienced Microsoft Office users can take advantage of its built-in  Visual Basic for Applications support to automate complex tasks with  macros. However, malicious coders can use those same tools to design  viruses that may interfere with your work and that of your colleagues.  By default, Office is set to disable all macros and notify you when a  doc you&#39;re reading contains them (to toggle this setting, in Word,  select &lt;em&gt;Word Options, Trust Center, Trust Center Settings, Macro Settings&lt;/em&gt;), so you should already be safe on this score.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;articleBodyContent&quot;&gt;       &lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;Don&#39;t  spend a bunch of money on dubious disk-cleaning  software. Windows&#39;  built-in Disk Cleanup utility has all the cleaning  power most users  need.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;   &lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.pcworld.com/zoom?id=203395&amp;amp;page=2&amp;amp;zoomIdx=1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Disk Cleanup; click for full-size image.&quot; src=&quot;http://images.pcworld.com/howto/graphics/203395-diskcleanup_180.jpg&quot; title=&quot;Disk Cleanup; click for full-size image.&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;strong&gt;8. Be skeptical of &quot;cleaning&quot; apps.&lt;/strong&gt; Apps that make  vague claims about improving your PC&#39;s performance and clearing out its  clutter (Registry cleaners, I&#39;m looking at you) will generally do more  harm than good (if they do anything at all). To clean up your system,  simply run Disk Cleanup (to reach it, select &lt;em&gt;Start Menu, All programs, Accessories, System Tools&lt;/em&gt;); it comes with every Windows installation and it won&#39;t mess up your PC.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;9. Uninstall your old apps.&lt;/strong&gt; If you regularly  download and install new apps from the Internet, you should get in the  habit of pruning your collection every now and then. To do so, open the &lt;em&gt;Programs and Features&lt;/em&gt; control panel, scroll through the list, and click &lt;em&gt;Uninstall&lt;/em&gt;  to ditch items you no longer want. You may need to take a trip into  your C:/Program Files/ folder to hunt down a few additional unused apps.  The less stuff you have on your PC, the less things are to go wrong.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;10. Don&#39;t let a spilled drink ruin your laptop.&lt;/strong&gt; If  you keep your cool when a spill occurs, you may be able to prevent your  data from disappearing and your motherboard from frying. Instead of  panicking, quickly but methodically unplug the power cord and yank out  the battery--don&#39;t wait for Windows to power off. Next, detach anything  connected to the PC (network cables, USB devices) and pull out any  readily removable components such as an optical drive. Tilt the laptop  to try to drain the liquid in the direction that it spilled onto your  PC, but be careful--you don&#39;t want to tilt the laptop in a direction  that would allow the liquid to seep even deeper in. If you see liquid on  the surface of the laptop, dab it off with a towel. At this point,  unless you&#39;re comfortable disassembling your PC and cleaning it with  electronics cleaner, you&#39;ll probably want to take it to a tech.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;11. Turn down UAC.&lt;/strong&gt; Both Windows 7 and Windows Vista  include a security function called User Account Control, which dims the  screen and flashes a dialog box whenever you install an app or change  your system settings. Though this arrangement can be useful for catching  sneaky apps that are trying to install or change things without your  knowledge, it can also be annoying. If you use Vista, grab &lt;a href=&quot;http://www.pcworld.com/downloads/file/fid,67530-order,1-page,1/description.html&quot;&gt;TweakUAC&lt;/a&gt;  to make it less annoying without turning it off. If you use Windows 7,  the default settings aren&#39;t too bad, but I recommend that you go into  the User Accounts control panel, click &lt;em&gt;User Account Control settings&lt;/em&gt;, and change the setting to the third notch down, so UAC will still warn you but it won&#39;t dim the screen.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;12. Don&#39;t work in your admin account.&lt;/strong&gt; Many PC users  are accustomed to doing their everyday work while logged in to their  PC&#39;s administrator account--especially in Windows XP. Doing so can save  you the hassle of having to log in and out when you want to install apps  or make changes, but it also leaves you much more vulnerable to viruses  and malware--so don&#39;t do it.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.pcworld.com/zoom?id=203395&amp;amp;page=2&amp;amp;zoomIdx=2&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Icon View; click for full-size image.&quot; src=&quot;http://images.pcworld.com/howto/graphics/203395-iconview_180.jpg&quot; title=&quot;Icon View; click for full-size image.&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;image ltmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image ltmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;The Control Panel is far easier to navigate when you can see all the icons at a glance.&lt;/span&gt;&lt;/span&gt;    &lt;strong&gt;&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;13. Keep your Control Panel in Icon View.&lt;/strong&gt; The  Control Panel&#39;s Categories view can be useful if you&#39;re intimidated by  the many different options available, but it can also make finding what  you&#39;re looking for more difficult (especially if you&#39;re following  detailed instructions that refer to the control panels by name). Click &lt;em&gt;Classic view&lt;/em&gt; on the left (in Vista) or choose &lt;em&gt;Large Icons&lt;/em&gt; from the &lt;em&gt;View by&lt;/em&gt; dropdown menu in the upper right (in Windows 7), and you&#39;ll have ready access to all of the control panels.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.pcworld.com/zoom?id=203395&amp;amp;page=2&amp;amp;zoomIdx=3&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot; target=&quot;_blank&quot;&gt;&lt;img alt=&quot;Notification Area Icons; click for full-size image.&quot; src=&quot;http://images.pcworld.com/howto/graphics/203395-notarea_180.jpg&quot; title=&quot;Notification Area Icons; click for full-size image.&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;Limit the clutter in your system tray by paring down the list of icons that occupy it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class=&quot;image rtmd&quot;&gt;&lt;span class=&quot;artCaption&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;strong&gt;14. Clear your system tray.&lt;/strong&gt; Apps often park  themselves in the system tray (the row of icons on the right side of  your taskbar) and stay open without your realizing it. Take the time to  clear it out occasionally. Open the &lt;em&gt;Notification Area Icons&lt;/em&gt; control panel, and check the box on the bottom that says &lt;em&gt;Always show all icons and notifications on the taskbar&lt;/em&gt; to get a sense of how cluttered your system tray is; then right-click each one you don&#39;t need and choose &lt;em&gt;Close&lt;/em&gt;. Your RAM will thank you.&lt;br /&gt;
&lt;br /&gt;
&lt;strong&gt;15. Manage your power settings.&lt;/strong&gt; If you&#39;re using a  laptop, you&#39;ll want to know how to change your power settings so your PC  doesn&#39;t waste battery when you need to conserve it, doesn&#39;t slow down  when you need to go fast, and doesn&#39;t go to sleep at an inopportune  moment. Open the &lt;em&gt;Power Options&lt;/em&gt; control panel, and choose from  among several presets containing different configurations for when  you&#39;re plugged in and when you&#39;re mobile--or feel free to create your  own. To access the advanced settings, click &lt;em&gt;Change plan settings&lt;/em&gt;, &lt;em&gt;Change advanced settings&lt;/em&gt;; there you&#39;ll find detailed options related to your battery, Wi-Fi radio, graphics card, and more. &lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><link>http://hacksperm.blogspot.com/2010/08/15-things-every-pc-user-should-know.html</link><author>noreply@blogger.com (Unknown)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7015035317917403047.post-2368236122618255341</guid><pubDate>Tue, 17 Aug 2010 16:54:00 +0000</pubDate><atom:updated>2010-08-17T09:54:50.674-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Softwares</category><title>Recycle, Delete And Shred Files With Multi Trash Gadget [Windows 7]</title><description>Generally, there are three ways of getting rid of unwanted files and  junk data. Of these, the two common options are to send the files to the  Recycle Bin or use &lt;em&gt;shift + del &lt;/em&gt;to  remove them permanently. However, the task isn’t completed at this  point, and you still need to execute a third option of shredding the  file so it cannot be restored via any means, such as, using &lt;strong&gt;&lt;/strong&gt;Freeraser and Moo0 File Shredder. These file-removing options are commonly found in different software applications, but &lt;strong&gt;Multi Trash &lt;/strong&gt;combines all three tasks to offer a combo file remover gadget that can recycle, delete and shred files at one platform.&lt;br /&gt;
&lt;br /&gt;
&lt;span id=&quot;more-29720&quot;&gt;&lt;/span&gt;&lt;br /&gt;
Open single or multiple instances of the gadget. Use the left or right arrow to switch from &lt;em&gt;Recycle Bin, &lt;/em&gt;&lt;em&gt;Delete &lt;/em&gt;and &lt;em&gt;Shred &lt;/em&gt;options. To remove a file, just drag&amp;amp;drop it into the application.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/multitrash.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;multi-trash&quot; border=&quot;0&quot; height=&quot;140&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/multitrash_thumb.png&quot; style=&quot;border: 0px none; display: inline;&quot; title=&quot;multi-trash&quot; width=&quot;432&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
You can access the settings by clicking on &lt;em&gt;Options &lt;/em&gt;from the sidebar. From &lt;em&gt;Options&lt;/em&gt;,  click on Function tab. If you want to be prompted before recycling,  deleting or shredding, then just check the appropriate option. You can  also adjust the size of recycle bin imaged interface when  docked/undocked.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/multitrashoptions.png&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img alt=&quot;multi-trash-options&quot; border=&quot;0&quot; height=&quot;546&quot; src=&quot;http://www.addictivetips.com/wp-content/uploads/2010/08/multitrashoptions_thumb.png&quot; style=&quot;border: 0px none; display: inline;&quot; title=&quot;multi-trash-options&quot; width=&quot;356&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
It supports Windows Vista and Windows 7, testing was carried out on Windows 7 x86 system.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://homecookedgadgets.com/gadgets.php?id=21&quot;&gt;Download Multi Trash&lt;/a&gt;</description><link>http://hacksperm.blogspot.com/2010/08/recycle-delete-and-shred-files-with.html</link><author>noreply@blogger.com (Unknown)</author></item></channel></rss>