<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Lodge 4 Hacker</title><description></description><managingEditor>noreply@blogger.com (Sivasankar)</managingEditor><pubDate>Mon, 14 Jul 2025 07:36:23 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">77</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://lodge4hacker.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Enable Input Field in "tnvelaivaaippu.gov.in" - HTML Hack</title><link>http://lodge4hacker.blogspot.com/2013/08/enable-input-field-in.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Tue, 20 Aug 2013 13:27:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-4521970831867548360</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Department Of Employment and Training&lt;/b&gt; is to convert the Employment Offices into centres of excellence for Empowerment of youth. It’s coverage enables it to play a very pro-active role to achieve the re-defined objectives of Private Sector Placements, Vocational Guidance, Employment Market Information, creation of Study Circles to enhance the competitive skills of Job Seekers, special service to the weaker sections of the society for promotion of Self Employment. In one word, it acts as a one stop shop for all Employment related needs of Job Seekers and Students. The new vision is to convert the Employment Offices into centres of excellence for Empowerment of youth.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3JDvOb8s6T6i2axcv6O2N7r3a7fX-ZXVMPZAw2VLZrBclapzlTEiKrrsG-KjWcfyj2LqbwsYHkAfwfb3uXbiD_fPeogb2zaRSVILDhf-HGTNfiWRktH0W9E3WJK7tHHjRtczoYoNsyBU/s1600/emb.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3JDvOb8s6T6i2axcv6O2N7r3a7fX-ZXVMPZAw2VLZrBclapzlTEiKrrsG-KjWcfyj2LqbwsYHkAfwfb3uXbiD_fPeogb2zaRSVILDhf-HGTNfiWRktH0W9E3WJK7tHHjRtczoYoNsyBU/s200/emb.jpg" width="188" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
Today, I came to renew my employment card at "tnvelaivaaippu.gov.in". But I got some error that some of the mandatory field(*) are in disabled mode .So I unable to save my modified details/add my new qualification. Finally, I got solution by Viewing the source code of the website(tnvelaivaaippu.gov.in), Here are the Steps to enable input field.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to Enable&amp;nbsp;Enable Input Field in "tnvelaivaaippu.gov.in" ?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Step 1 :&lt;/b&gt; Login to &lt;a href="http://tnvelaivaaippu.gov.in/"&gt;TN Velaivaaippu&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Step 2 :&lt;/b&gt; Right Click on the input field(disabled field) then click &lt;b&gt;Inspect Element&lt;/b&gt;, Now the source code for particular input field will be shown.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDNIu-OyFdK3DhsIEEEJ-zHbVLhLYPtRg4GPOrCn9Yn71rAhvgP3xD63mlbjwZ8qfjupRkeeJggyQRaoKlFaRCvXc8VdRzPZ863EPm4R2mj3Th6MpzNtadW1_5WefurfonOoJ99C7hUtM/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgDNIu-OyFdK3DhsIEEEJ-zHbVLhLYPtRg4GPOrCn9Yn71rAhvgP3xD63mlbjwZ8qfjupRkeeJggyQRaoKlFaRCvXc8VdRzPZ863EPm4R2mj3Th6MpzNtadW1_5WefurfonOoJ99C7hUtM/s400/1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Step 3 : &lt;/b&gt;Remove the "&lt;b&gt;disabled&lt;/b&gt;" word/attribute the code.&lt;br /&gt;
&lt;b&gt;Step 4 : &lt;/b&gt;You will get the list of option in input field (i.e, you enabled the input file). Now you can edit and save the data.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFK_MYhyphenhyphenZADyrEbjFvTFqrkAVkByTNK9xE0eyw5o9v_5VOmJYf8pE6YukyY6lLlnOjyvKIjitA6_2qrpxKnBS8WzaGHGhnxjj5lFZAbrWoIWR2GtFO7fQJPU7W7Egl2c4gKiFHJej4foY/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="250" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFK_MYhyphenhyphenZADyrEbjFvTFqrkAVkByTNK9xE0eyw5o9v_5VOmJYf8pE6YukyY6lLlnOjyvKIjitA6_2qrpxKnBS8WzaGHGhnxjj5lFZAbrWoIWR2GtFO7fQJPU7W7Egl2c4gKiFHJej4foY/s400/2.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Some input filed that you can find in disabled mode :&amp;nbsp;Candidate Name, Father Name, Date Of Birth, Gender, Community ID, Caste, Religion, District.&lt;br /&gt;
&lt;br /&gt;
Use Google Chrome for better Developer Experience !!&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;b&gt;IMPORTANT : NOT FOR ANY ILLEGAL PURPOSE. I HAVE SEEN MOST OF THE FORUM
THAT EVERYONE NEED SOLUTION FOR THIS PROBLEM.SO, CONSIDER THIS AS SOLUTION.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;b&gt;How to do Tamil Nadu Employment Exchange Online Registration?&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Step 1 :&lt;/b&gt; Visit the official website of Empower – Employment and Training department Government of Tamilnadu through &lt;a href="http://www.tnvelaivaaippu.gov.in/"&gt;http://www.tnvelaivaaippu.gov.in&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Step 2 :&lt;/b&gt; Once you visited the above link you can find “&lt;b&gt;Click here for new User ID Registration&lt;/b&gt;” Link. Click that link in left site window. If you already registered in that online website then you can use old username and password.&lt;br /&gt;
&lt;b&gt;Step 3 :&lt;/b&gt; Now you can view the “&lt;b&gt;Terms and Conditions&lt;/b&gt;” page with detailed instruction. Once you read that instruction press “&lt;b&gt;I agree&lt;/b&gt;” link.&lt;br /&gt;
&lt;b&gt;Step 4 :&lt;/b&gt; That screen will take you to online registration form. You need to fill the candidate (Student) required details like Candidate name, Gender, Email Id, User Id, Passowrd, Confirm Password, Father Name, etc. Fill all the details and press on “&lt;b&gt;Save&lt;/b&gt;” button.&lt;br /&gt;
&lt;b&gt;Step 5 :&lt;/b&gt; Once you pressed Save button that screen will take you to logged in screen and it will ask the required other details like Contact Details, Qualification Details, Technical, Diploma, Certificate, Courses and skills Details. Fill all the required information and update it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Source:&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.tnvelaivaaippu.gov.in/"&gt;http://www.tnvelaivaaippu.gov.in&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.blogger.com/goog_1395151464"&gt;http://www.complaintboard.in/&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.consumercomplaints.in/"&gt;http://www.consumercomplaints.in/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Thank You !!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Please Feel Free to Contact Me, If Any Queries !!&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3JDvOb8s6T6i2axcv6O2N7r3a7fX-ZXVMPZAw2VLZrBclapzlTEiKrrsG-KjWcfyj2LqbwsYHkAfwfb3uXbiD_fPeogb2zaRSVILDhf-HGTNfiWRktH0W9E3WJK7tHHjRtczoYoNsyBU/s72-c/emb.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Watch Star Wars Movie on MS DOS Prompt</title><link>http://lodge4hacker.blogspot.com/2013/05/watch-star-wars-movie-on-ms-dos-prompt.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 19 May 2013 21:01:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-1834425267490297769</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Star Wars&lt;/b&gt; is an American epic space opera franchise centered on a film series created by George Lucas. The film series has spawned a media franchise outside the film series called the Expanded Universe including books, television series, computer and video games, and comic books.&amp;nbsp;I hope many people might have seen this movie , but if you have &lt;b&gt;Windows &lt;/b&gt;Operating System (&lt;b&gt;XP/Vista/7/8&lt;/b&gt;) , you can watch again the whole movie.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgccFewdw6ZPLRoodWdhmyQ3P9f2a_DWf1QaSTZCQ6At5RcwvddWuKZpMxfJXAcw5UcKLsG1pbKznjWBlqY4j3QXUw5joTehC8HgmghgPLHyozny848Zm8VneYrkJT6oFqz4zCcXukn9to/s1600/star-wars.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgccFewdw6ZPLRoodWdhmyQ3P9f2a_DWf1QaSTZCQ6At5RcwvddWuKZpMxfJXAcw5UcKLsG1pbKznjWBlqY4j3QXUw5joTehC8HgmghgPLHyozny848Zm8VneYrkJT6oFqz4zCcXukn9to/s1600/star-wars.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Steps to watch Star Wars movie :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to &lt;b&gt;Start &lt;/b&gt;&amp;gt; &lt;b&gt;All Programs&lt;/b&gt; &amp;gt; &lt;b&gt;Accessories &lt;/b&gt;&amp;gt; &lt;b&gt;Command Prompt.&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Within command prompt, type &lt;b&gt;telnet towel.blinkenlights.nl&lt;/b&gt;&amp;nbsp;and hit ENTER.&lt;/li&gt;
&lt;li&gt;Now, Enjoy Watching&amp;nbsp;Star Wars Movie in&amp;nbsp;&amp;nbsp;Command Prompt.&lt;/li&gt;
&lt;/ul&gt;
By default, Telnet Client is not enabled in Windows.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Steps to Enable Telnet Client in Windows :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to &lt;b&gt;Control Panel&lt;/b&gt; &amp;gt; &lt;b&gt;Programs&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Under "&lt;b&gt;Programs and Features&lt;/b&gt;" click "&lt;b&gt;Turn Windows Features on and off&lt;/b&gt;"&lt;/li&gt;
&lt;li&gt;From the Windows Features window, select the &lt;b&gt;Telnet Client&lt;/b&gt; &lt;b&gt;checkbox &lt;/b&gt;beside it, then click on OK&lt;/li&gt;
&lt;li&gt;Wait a few minutes while Windows applies the settings.&lt;/li&gt;
&lt;li&gt;Now Telnet is activated in Windows.&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;Thank You !!&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgccFewdw6ZPLRoodWdhmyQ3P9f2a_DWf1QaSTZCQ6At5RcwvddWuKZpMxfJXAcw5UcKLsG1pbKznjWBlqY4j3QXUw5joTehC8HgmghgPLHyozny848Zm8VneYrkJT6oFqz4zCcXukn9to/s72-c/star-wars.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>MS Access Password Recovery Tool - Access PassView</title><link>http://lodge4hacker.blogspot.com/2013/03/ms-access-password-recovery-tool-access.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 17 Mar 2013 19:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-6270328762841130149</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
MS Access is one of the most popular database programs used in millions of offices worldwide. Password protection is an important feature that limits access to authorized personnel only and prevents strangers from obtaining confidential data. Unfortunately, people do lose or forget their passwords, making it impossible to access that data.&lt;br /&gt;
&lt;br /&gt;
Using this(&lt;a href="http://www.nirsoft.net/utils/accesspv.html"&gt;Access PassView&lt;/a&gt;) application I recovered the password in a fraction of a second. The speed at which application cracked the password is really amazing. I was expecting that application is going to use brute force mechanism to crack the password and it will take some time. But the application is so brilliant; it does its job very quickly.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXn40rrEqTqym9u3wiv2IjgyOmDb0s3jYHR0RJj5fDbBc2Rio9mPilWlzXx0I6AcNvCwno4nEeTEnshoCSw0UqX6RgsKrJ0BuNVL2VxnISKJZOcN6RUHPdelNNA-P1CSAFzct27VMTvwQ/s1600/Acess.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXn40rrEqTqym9u3wiv2IjgyOmDb0s3jYHR0RJj5fDbBc2Rio9mPilWlzXx0I6AcNvCwno4nEeTEnshoCSw0UqX6RgsKrJ0BuNVL2VxnISKJZOcN6RUHPdelNNA-P1CSAFzct27VMTvwQ/s1600/Acess.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;br /&gt;
&lt;b&gt;Access PassView Description&lt;/b&gt;&lt;br /&gt;
This utility reveals the database password of every password-protected mdb file that created with Microsoft Access 95/97/2000/XP or with Jet Database Engine 3.0/4.0 . It can be very useful if you forgot your Access Database password and you want to recover it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Access PassView Limitations&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;This utility cannot recover passwords that contains more than 18 characters.&lt;/li&gt;
&lt;li&gt;This utility shows only the main database password. It cannot recover the user-level passwords.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;a href="http://www.nirsoft.net/utils/accesspv.html"&gt;Download&amp;nbsp;Access PassView Download (Freeware)&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXn40rrEqTqym9u3wiv2IjgyOmDb0s3jYHR0RJj5fDbBc2Rio9mPilWlzXx0I6AcNvCwno4nEeTEnshoCSw0UqX6RgsKrJ0BuNVL2VxnISKJZOcN6RUHPdelNNA-P1CSAFzct27VMTvwQ/s72-c/Acess.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Android Secret Codes For Samsung, HTC, Motorola, Sony, LG And Other Devices</title><link>http://lodge4hacker.blogspot.com/2013/03/android-secret-codes-for-samsung-htc.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Wed, 6 Mar 2013 10:27:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-2534371867225583594</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Any device with &lt;b&gt;Android OS&lt;/b&gt; support several secret codes common to the Android platform. When those codes are typed manually through the phone dialer, the hidden menus will unlock with more options and information for your device. You can try them out on your Samsung, HTC, Motorola, Sony and other devices.&lt;br /&gt;
&lt;br /&gt;
This code can give you access to a whole multitude of hidden menus, diagnostic tests and much more. Smartphones don’t hake exclusivity though – these codes can be found on both dumb and feature phones as well. Android devices have codes that are capable of being shared across a whole range of devices. Here we are going to tell you what some of these codes are. &lt;b&gt;All are entered in the same way – input the code into the phone dialer and away you go.&lt;/b&gt; &amp;nbsp;As there are so many different manufacturers though there is no guarantee that all codes will work on all android devices but feel free to try them on Samsung, HTC, Sony, LG and Motorola devices, among others.
&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaB4I-yIjNfizw_938tWaMLmuGoors587oqV8-CcisAfMAN7Uel2noZc0qxZS8nf0wUB7YIp3diz4cOYU25zN3I1on1My1FA-uaLLaK5DTiog3WZ-ZBUaZKTcKVrmAc84xM2J-Wd8ylX0/s1600/PhoneDialer.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaB4I-yIjNfizw_938tWaMLmuGoors587oqV8-CcisAfMAN7Uel2noZc0qxZS8nf0wUB7YIp3diz4cOYU25zN3I1on1My1FA-uaLLaK5DTiog3WZ-ZBUaZKTcKVrmAc84xM2J-Wd8ylX0/s320/PhoneDialer.png" width="180" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Warning: &lt;/b&gt;For some of those secret codes can cause serious changes to your device’s configuration, so don’t play with something that you don’t fully understand.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#06# – IMEI number&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#0*# – Enter the service menu on newer phones like Galaxy S III&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#4636#*#* – Phone information, usage statistics and battery&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#34971539#*#* – Detailed camera information&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#273282*255*663282*#*#* – Immediate backup of all media files&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#197328640#*#* – Enable test mode for service&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#232339#*#* – Wireless LAN tests&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#0842#*#* – Backlight/vibration test&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#2664#*#* – Test the touchscreen&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#1111#*#* – FTA software version (1234 in the same code will give PDA and firmware version)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#12580*369# – Software and hardware info&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#9090# – Diagnostic configuration&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#872564# – USB logging control&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#9900# – System dump mode&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#301279# – HSDPA/HSUPA Control Menu&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#7465625# – View phone lock status&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*#*#7780#*#* – Reset the /data partition to factory state&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;*2767*3855# – Format device to factory state (will delete everything on phone)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;##7764726 – Hidden service menu for Motorola Droid&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Thank You !!&lt;br /&gt;
Join With Us!!&lt;/div&gt;
&lt;/span&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaB4I-yIjNfizw_938tWaMLmuGoors587oqV8-CcisAfMAN7Uel2noZc0qxZS8nf0wUB7YIp3diz4cOYU25zN3I1on1My1FA-uaLLaK5DTiog3WZ-ZBUaZKTcKVrmAc84xM2J-Wd8ylX0/s72-c/PhoneDialer.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Shutdown Timer Using Command In Windows</title><link>http://lodge4hacker.blogspot.com/2012/07/shutdown-timer-using-command-in-windows.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 29 Jul 2012 11:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-2896713417775077957</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Command Prompt&lt;/b&gt; (executable name cmd.exe) is the Microsoft-supplied command-line interpreter on OS/2, Windows CE and on Windows NT-based operating systems (including Windows 2000, XP, Vista, 7, Server 2003 and Server 2008).&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5NgM6cOYRJ4jNbDeUbtGPmrEW7h6X_T8YjksI0pChriH9P0fqxddxd8QDMXNGwE_2rSFzuqCsYN1kMYHbufoJdTqN6m4xspKEPl-x9AW3H8xZVM5uH3jTGmUYPFgww4FSFiKUqfJk1tM/s1600/Shutdown+timer.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5NgM6cOYRJ4jNbDeUbtGPmrEW7h6X_T8YjksI0pChriH9P0fqxddxd8QDMXNGwE_2rSFzuqCsYN1kMYHbufoJdTqN6m4xspKEPl-x9AW3H8xZVM5uH3jTGmUYPFgww4FSFiKUqfJk1tM/s1600/Shutdown+timer.png" /&gt;&lt;/a&gt;&lt;/div&gt;
Sometimes its a big convenience if you can set a timer to shutdown Windows &lt;b&gt;after a specific amount of time.&lt;/b&gt; This helps when you are waiting for a download or an installation to finish. Personally I find a shutdown timer very useful when waiting for downloads to complete or listening to music while dozing off.&lt;br /&gt;
&lt;br /&gt;&lt;span class="fullpost"&gt;

&lt;b&gt;How To Use Shutdown Timer&amp;nbsp;Using Command In Windows :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Open the command prompt by pressing&amp;nbsp;&lt;b&gt;Windows Key + R&lt;/b&gt; then type the "&lt;b&gt;cmd&lt;/b&gt;" and hit &lt;b&gt;OK,&amp;nbsp;&lt;/b&gt;This will open the command prompt.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now, Type the code below and Press Enter :&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;shutdown -s -t 3600&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;span style="font-size: xx-small;"&gt;
(Above command is use for 1 hour (3600 seconds) you can change it according to your demand)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_Vmy8Z8CxuRtzyEAsuTR5bkc9P9OdLX04_fYNjjkCnYq18d5ctZHqJ9e25Re38hIwGT9WE1fTpYvwpk0-dp2tCuWrcX3_u9UXn2gvAthYk9a_PfRMhZXuJs3JdeaabFZ0UMqolK8Q0k/s1600/shutdown2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="116" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjx_Vmy8Z8CxuRtzyEAsuTR5bkc9P9OdLX04_fYNjjkCnYq18d5ctZHqJ9e25Re38hIwGT9WE1fTpYvwpk0-dp2tCuWrcX3_u9UXn2gvAthYk9a_PfRMhZXuJs3JdeaabFZ0UMqolK8Q0k/s400/shutdown2.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;How To Cancel Shutdown Timer&amp;nbsp;Using Command In Windows :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;If you need to cancel a shutdown in progress.You need to&amp;nbsp;Open the command prompt again by pressing &lt;b&gt;Windows Key + R&lt;/b&gt; then type the "&lt;b&gt;cmd&lt;/b&gt;" and hit OK.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now, Type the code below and Press Enter &lt;br /&gt;&lt;b&gt;&lt;span style="color: red;"&gt;shutdown -a&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: left;"&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyHxaXde3asMn1nCFjmsyT1GB1ZLrRQtq_a_HSW_0LNnBmE5AcV1Y5n4rizfh2Dtw7FmQ6DzUfdZVFdZWUcbdaeOr2tM0obLFveX4VPEtDUoCxEcaROTW2A7ccc9P44GLLSTRYO2Lceig/s1600/shutdown1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="93" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyHxaXde3asMn1nCFjmsyT1GB1ZLrRQtq_a_HSW_0LNnBmE5AcV1Y5n4rizfh2Dtw7FmQ6DzUfdZVFdZWUcbdaeOr2tM0obLFveX4VPEtDUoCxEcaROTW2A7ccc9P44GLLSTRYO2Lceig/s400/shutdown1.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;Advance Description of Shutdown Command In Windows:&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;Command :&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;shutdown [/i | /l | /s | /r | /g | /a | /p | /h | /e] [/f]&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;&amp;nbsp; &amp;nbsp; [/m \\computer][/t xxx][/d [p|u:]xx:yy [/c "comment"]]&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;b&gt;Description:&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;table border="1" cellpadding="0" cellspacing="0" class="MsoNormalTable" style="mso-cellspacing: 0in; mso-yfti-tbllook: 1184; width: 100.0%;"&gt;
 &lt;tbody&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
No args&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Display help. This is the same as typing /?.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-i&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Display the graphical user interface (GUI).This must be
  the first option.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-l&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Log off. This cannot be used with /m or /d options.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-s&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Shutdown the computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-r&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Shutdown and restart the computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-g&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Shutdown and restart the computer. After the system is rebooted,
  restart any registered applications.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-a&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Abort a system shutdown. This can only be used during
  the time-out period.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-p&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Turn off the local computer with no time-out or warning.
  Can be used with /d and /f options.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-h&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Hibernate the local computer. Can be used with the /f
  option.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-e&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Document the reason for an unexpected shutdown of a
  computer.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-f&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Force running applications to close without forewarning
  users.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
The /f parameter is implied when a value greater than 0
  is specified for the /t parameter.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-m \\computername&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Instruct a remote computer to shutdown (can be used
  with the restart &amp;amp; abort switches)&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-t xx&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Set the time-out period before shutdown to xxx seconds.
  The valid range is 0-315360000 (10 years), with a default of 30. If the
  timeout period is greater than 0, the /f parameter is implied.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-c “comment”&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
Comment on the reason for the restart or shutdown. Maximum
  of 512 characters allowed.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;tr&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 25.16%;" valign="top" width="25%"&gt;&lt;div class="MsoNoSpacing"&gt;
-d [u] [p]:xx:yy&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
  &lt;td style="padding: .75pt .75pt .75pt .75pt; width: 74.84%;" width="74%"&gt;&lt;div class="MsoNoSpacing"&gt;
yy&amp;nbsp; Provide the
  reason for the restart or shutdown.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
p indicates that the restart or shutdown is planned.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
u indicates that the reason is user defined.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
If neither p nor u is specified the restart or shutdown
  is unplanned.&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
xx is the major reason number (positive integer less
  than 256).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNoSpacing"&gt;
yy is the minor reason number (positive integer less
  than 65536).&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;/td&gt;
 &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;
To get more details about shutdown command go to Command prompt and type &lt;b style="color: red;"&gt;shutdown -help &lt;/b&gt;&lt;b&gt;or&amp;nbsp;&lt;/b&gt;&lt;b style="color: red;"&gt;shutdown&amp;nbsp;&lt;/b&gt;you will get more information about shutdown&amp;nbsp;
command&amp;nbsp;. If you have any queries regarding "Shutdown Timer Using Command In Windows" post it in below comment box.
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj5NgM6cOYRJ4jNbDeUbtGPmrEW7h6X_T8YjksI0pChriH9P0fqxddxd8QDMXNGwE_2rSFzuqCsYN1kMYHbufoJdTqN6m4xspKEPl-x9AW3H8xZVM5uH3jTGmUYPFgww4FSFiKUqfJk1tM/s72-c/Shutdown+timer.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Facebook Status to Redirect People to their Profile</title><link>http://lodge4hacker.blogspot.com/2012/07/facebook-status-to-redirect-people-to.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 15 Jul 2012 07:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-6427344117233708525</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: left;"&gt;
Facebook. It’s a term we are all familiar with, we have heard the name, it has a bigger branding than just about any major company you can think of, in fact Facebook is referred to more than Google. Being one of the most popular social networking site is one of the best place for playing pranks with friends on Facebook. Here I’m sharing a Facebook status prank which you can use to have fun with your Facebook friends.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia8c2eOaArjRTYByMMHjUM-WXgGvUCfzZUZkXfKpB-e0AJVAVykfooeEKBR1LvMTc9diH_f2fw2Ucx-wwEYKExlwHdm3UXe1rgCM2YzRndm4z5z7GWpRLrCbP0eZfAe5JFTF_1XCkmbZY/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia8c2eOaArjRTYByMMHjUM-WXgGvUCfzZUZkXfKpB-e0AJVAVykfooeEKBR1LvMTc9diH_f2fw2Ucx-wwEYKExlwHdm3UXe1rgCM2YzRndm4z5z7GWpRLrCbP0eZfAe5JFTF_1XCkmbZY/s1600/Capture.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;How to do?&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to facebook.com&lt;/li&gt;
&lt;li&gt;Login to your account&lt;/li&gt;
&lt;li&gt;Paste below link to your status&amp;nbsp;&lt;/li&gt;
&amp;nbsp;&lt;span style="color: red;"&gt;www.facebook.com/profile.php?=lodge4hacker&lt;/span&gt;&lt;br /&gt;
&lt;li&gt;Now, your prank status is updated&lt;/li&gt;
&lt;li&gt;Now, Whenever your friends click on this link, while they are logged into their facebook account, this link will redirect them to their Own Profile page&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;Note:&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;You can add anything after this link "www.facebook.com/profile.php?"&lt;/span&gt;&lt;/li&gt;
&lt;b style="background-color: white;"&gt;&lt;span style="font-size: x-small;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;Example:&lt;/b&gt;&lt;br /&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span style="color: blue;"&gt;www.facebook.com/profile.php?=lodge4hacker&lt;/span&gt;&lt;/span&gt;&lt;span style="color: blue;"&gt;&lt;br /&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; www.facebook.com/profile.php?=9940963235&lt;/span&gt;&lt;br /&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; www.facebook.com/profile.php?=loveyou&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Facebook automatically turns the link into an attachment with your name and your profile picture as a thumbnail. You need to close the attachment by clicking the blue X icon in the upper right corner before posting your status!&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;br /&gt;
Using only prank link&amp;nbsp;will&amp;nbsp;not make more attention to people , So use your creativity to get more likes and comments. Look at my&amp;nbsp;&lt;span style="background-color: white;"&gt;above&lt;/span&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white;"&gt;image like that you have to add some attractive text with link.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;!!Thank You!!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;!!Make Fun With Your Friends!!&lt;/b&gt;&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia8c2eOaArjRTYByMMHjUM-WXgGvUCfzZUZkXfKpB-e0AJVAVykfooeEKBR1LvMTc9diH_f2fw2Ucx-wwEYKExlwHdm3UXe1rgCM2YzRndm4z5z7GWpRLrCbP0eZfAe5JFTF_1XCkmbZY/s72-c/Capture.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Type your Text Upside Down|Flip|Rotate</title><link>http://lodge4hacker.blogspot.com/2012/07/type-your-text-upside-down-fliprotate.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Mon, 9 Jul 2012 06:52:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-6332177886759856915</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;style type="text/css"&gt;
textarea { font-family: "Arial Unicode MS", Batang }
h1 { margin-bottom: 2px;}
&lt;/style&gt;
&lt;script&gt;
function flip() {
 var result = flipString(document.f.original.value.toLowerCase());
 document.f.flipped.value = result;
}

function flipString(aString) {
 var last = aString.length - 1;
 var result = new Array(aString.length)
 for (var i = last; i &gt;= 0; --i) {
  var c = aString.charAt(i)
  var r = flipTable[c]
  result[last - i] = r ? r : c
 }
 return result.join('')
}

var flipTable = {
a : '\u0250',
b : 'q',
c : '\u0254',
d : 'p',
e : '\u01DD',
f : '\u025F',
g : '\u0183',
h : '\u0265',
i : '\u0131',
j : '\u027E',
k : '\u029E',
//l : '\u0283',
m : '\u026F',
n : 'u',
r : '\u0279',
t : '\u0287',
v : '\u028C',
w : '\u028D',
y : '\u028E',
'.' : '\u02D9',
'[' : ']',
'(' : ')',
'{' : '}',
'?' : '\u00BF',
'!' : '\u00A1',
"\'" : ',',
'&lt;' : '&gt;',
'_' : '\u203E',
'\u203F' : '\u2040',
'\u2045' : '\u2046',
'\u2234' : '\u2235',
'\r' : '\n'
}
for (i in flipTable) {
  flipTable[flipTable[i]] = i
}
&lt;/script&gt;
Have you ever noticed flipped text at friend's Status updates? Ever wonder how people flip their text upside down?&lt;br /&gt;
It is very simple. Step given below to "Type your Text Upside Down|Flip|Rotate".
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWcF67BvD92kTkDqLG-N64eFSKWp0xSq2j_ywGFrN7ecy7kFn-YkoTEoH_UCSBPNPOMtjM4886RcT0RC_qjnnYFogAYvy15Kcn_G3MRD2Fr6OK7SVYTcQSPMQW_ct2wQVb9kSs8wS1p0/s1600/Flip.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWcF67BvD92kTkDqLG-N64eFSKWp0xSq2j_ywGFrN7ecy7kFn-YkoTEoH_UCSBPNPOMtjM4886RcT0RC_qjnnYFogAYvy15Kcn_G3MRD2Fr6OK7SVYTcQSPMQW_ct2wQVb9kSs8wS1p0/s1600/Flip.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
Below is a upside down text generator that allows you to type upside down text instantly. It flips your font, rotating every (lowercase) letter 180 degrees (not just reversed or backwards) as well as special characters, like an upside down question mark and an upside down exclamation point.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Example:&lt;/b&gt;&lt;br /&gt;
”lodge4hacker” will become “ɹǝʞɔɐɥ4ǝƃpol”&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;br /&gt;
&lt;b&gt;Flip Your Text Here:&lt;/b&gt;&lt;br /&gt;
&lt;form name="f"&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Original:
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;textarea cols="50" name="original" onkeyup="flip()" rows="5"&gt;&lt;/textarea&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;Flipped:
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;textarea cols="50" name="flipped" rows="5"&gt;&lt;/textarea&gt;&lt;/form&gt;
&lt;br /&gt;
&lt;b&gt;How to do ?&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;To flip your text upside down simply enter anything in the first box.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Your words will automatically be flipped upside down in the second box.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b style="background-color: white;"&gt;Where Can You Use this?&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Use the upside down text in your status updates and wall posts in Facebook&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Use a flipped word as your ultra-strong password.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;You can use this text to make your profile Anonymous,its difficult to search you...&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Post upside down text on Facebook chat, Twitter, blogs, comments, forums, MySpace, Netlog, Bebo, Hi5, Yahoo! Messenger, Flickr, AIM, eBuddy, Meebo, Windows Live Messenger, Google Talk, etc.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;How it works?&lt;/b&gt;
&lt;div&gt;
JavaScript program converts English letters to&amp;nbsp;Unicode&amp;nbsp;characters and symbols that look inverted, to make it look like you've created upside-down text on the computer. Most of them come from the character sets "Latin Extended" and "International Phonetic Alphabet". Unfortunately there are no upside down numbers and not enough upside down capital letters, so this tool supports lowercase letters only. This page uses the font "Arial Unicode MS" to display the flipped text. You can learn the letter mapping behind this upside down text generator by viewing this page's html source code.&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidWcF67BvD92kTkDqLG-N64eFSKWp0xSq2j_ywGFrN7ecy7kFn-YkoTEoH_UCSBPNPOMtjM4886RcT0RC_qjnnYFogAYvy15Kcn_G3MRD2Fr6OK7SVYTcQSPMQW_ct2wQVb9kSs8wS1p0/s72-c/Flip.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Remote File Inclusion/Upload Vulnerability On RTE Webwiz</title><link>http://lodge4hacker.blogspot.com/2012/07/remote-file-inclusionupload.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Fri, 6 Jul 2012 11:35:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-5235913982752258420</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
We already discussed about "&lt;a href="http://www.lodge4hacker.com/2012/06/remote-file-inclusionupload.html"&gt;Remote File 

Inclusion/Upload Vulnerability on phUploader&lt;/a&gt;" in previous post, Today we are going to discuss about&amp;nbsp;Remote File 

Inclusion/Upload Vulnerability On RTE Webwiz.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgRJ85vdUzj91vn8jy7Yar7Aew0Rj39bgoXsvodH0desPBVfMXgTxiZmaOIh1h0QlvikNNcnpNTTbEIV0mGd4aFPvh9_-pGx-n-byuam0MEKHuL6NTtJ4B1z-y8-xfW4dEYZx6jLDNnOzA/s1600/web_wiz_logo.jpg" imageanchor="1" 

style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://2.bp.blogspot.com/--SBk8C4ys-

w/T_Z8dz2hxcI/AAAAAAAAAkc/NKlAhH4sPe0/s1600/web_wiz_logo.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
Web Wiz Rich Text Editor (RTE) is a free WYSIWYG HTML RTE that replaces standard text areas with an advanced Word-style HTML 

area.&lt;br /&gt;
Using this tool you can change any text area on your site into an HTML area with real-time WYSIWYG formatting. Useful for 

many purposes from basic submission forms to advanced CMS (Customer Management Systems).
&lt;span class="fullpost"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhvu1VcGd-IqTPhOCO03cH4Ftr4Ku_QsA4yBQSwnp60e4Fg5TEXQPSbdl06tDQXgJioG2oJt_0qBMX9A0qVlB6Jc_RzfY5lLUr_r3QWze60oIaE_inEFLo7GpZDADCqoJNk5hNxD0dFmAc/s1600/RTE.jpg" imageanchor="1" 

style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://1.bp.blogspot.com/-

9lmAMpdels4/T_Z8U36_k7I/AAAAAAAAAkU/dMAytvFRkJs/s400/RTE.jpg" width="500" /&gt;&lt;/a&gt;
&lt;span style="font-size: x-small;"&gt;(Click on the image to view in full size)&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Steps :&lt;/b&gt;&lt;br /&gt;
1. Go to Google and Enter anyone of dork from below :&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style="color: 

red;"&gt;inurl:rte/my_documents/my_files/&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 

&amp;nbsp;inurl:/my_documents/my_files/&lt;/span&gt;&lt;br /&gt;
2. Select any website from search result, Exploit site looks like below link&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;span style="color: red;"&gt;http://

{site.com}/rte/RTE_popup_file_atch.asp&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;http://

{site.com}/admin/RTE_popup_file_atch.asp&lt;/span&gt;&lt;br /&gt;
3. Now you will see a screen like above image,In that you can upload your file&lt;br /&gt;
4. You can see your file link after upload link.&lt;br /&gt;
5. Done!! "&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Example:&lt;/b&gt;&lt;br /&gt;
&lt;a 

href="http://www.leinsterdancing.com/admin/rte/RTE_popup_file_atch.asp"&gt;http://www.leinsterdancing.com/admin/rte/RTE_popup_fi

le_atch.asp&lt;/a&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Hacked Site:&lt;/b&gt;&lt;br /&gt;
&lt;a 

href="http://www.leinsterdancing.com/admin/rte/my_documents/my_files/5Z2_lodge4hacker.html"&gt;http://www.leinsterdancing.com/ad

min/rte/my_documents/my_files/5Z2_lodge4hacker.html&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;!! Thank You !!&lt;/b&gt;&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://2.bp.blogspot.com/--SBk8C4ys-w/T_Z8dz2hxcI/AAAAAAAAAkc/NKlAhH4sPe0/s72-c/web_wiz_logo.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hack Website|Web Server Using b374k Shell</title><link>http://lodge4hacker.blogspot.com/2012/07/hack-websiteweb-server-using-b374k.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Mon, 2 Jul 2012 20:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-1834099397137547869</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Web server&lt;/b&gt; can refer to either the hardware (the computer) or the software (the computer application) that helps to deliver Web content that can be accessed through the Internet&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWanVry3VO2HgUFtfOnis2jRViEw9bu78kHNwufAHj-faeWWPkh9utWf5HKy6MJLVawkC0YSOr29tn7BIEYWL4ao6K_pW582AbKZNVDxZ-e09N5upiOC6WDCZ7oDJ2V5X1XapiCbrAWYc/s1600/b374k+Shell.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWanVry3VO2HgUFtfOnis2jRViEw9bu78kHNwufAHj-faeWWPkh9utWf5HKy6MJLVawkC0YSOr29tn7BIEYWL4ao6K_pW582AbKZNVDxZ-e09N5upiOC6WDCZ7oDJ2V5X1XapiCbrAWYc/s1600/b374k+Shell.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Web shell &lt;/b&gt;is a shell (like bash or dos) that runs over web (http protocol). Every web programming language like PHP, ASP, CGI, and others are supporting a system interaction. Through this interaction method, we can access to system shell, but in this case, we just need a Web Browser.&lt;br /&gt;
Here, we going to see about b374k shell...&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;br/&gt;
&lt;b&gt;b374k Shell Features :&lt;/b&gt;&lt;br /&gt;
With b374k shell, we can manage any data or folder, or even system command easily over Web GUI Interface. In this case, we use webshell for good purpose, just for learning and developing. Some features are :&lt;br /&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Easily Managing Folder and Files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Executing shell command&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Database Manager&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Backdooring over Netcat&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPrYjgt-9aabKodVzeRrKqpMUpFhNU1Lj8FdHnw1AAofdQw7erZTDhom2j06s93J-TQd4BseRF6fgtz_v8t4KG5mFv13tZxyMjoTfh2BQj3Oo23L6iwbRWmlP0ouINkr122Z_9RZJAnT4/s1600/b374k+Shell+Screen+Shot.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="235" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgPrYjgt-9aabKodVzeRrKqpMUpFhNU1Lj8FdHnw1AAofdQw7erZTDhom2j06s93J-TQd4BseRF6fgtz_v8t4KG5mFv13tZxyMjoTfh2BQj3Oo23L6iwbRWmlP0ouINkr122Z_9RZJAnT4/s400/b374k+Shell+Screen+Shot.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: xx-small;"&gt;(Click to View Image in&amp;nbsp;Full-size)&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;How to use&amp;nbsp;&lt;span style="background-color: white;"&gt;b374k shell :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
b374k shell is a single file(.php) that you can upload easily like other file. There are various ways to upload shell in web server like,&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Cross-site scripting&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;SQL Injection&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Remote File Inclusion&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;Shell Jumping , etc...,&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
b374k shell can be used by all&amp;nbsp;types&amp;nbsp;of hacker such as Black Hat Hacker,&amp;nbsp;Grey Hat Hacker,White Hat Hacker. Even some people use to upload this shell for managing their file/folder easily.&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;b style="background-color: white;"&gt;Download:&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://code.google.com/p/b374k-shell/"&gt;Mirror1 - (Google Code)&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://adf.ly/AHdyV"&gt;Mirror2 - (Lodge4Hacker)&lt;/a&gt;&amp;nbsp; &amp;nbsp;: &amp;nbsp;b374k-2.2&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Visit Also :&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.lodge4hacker.com/2012/06/remote-file-inclusionupload.html"&gt;Remote File Inclusion/Upload Vulnerability on phUploader&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.lodge4hacker.com/2012/05/google-dork-for-remote-file-inclusion.html"&gt;Google Dork For "Remote File Inclusion"&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.lodge4hacker.com/2012/02/sql-injection-using-havij.html"&gt;SQL Injection Using Havij&lt;/a&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWanVry3VO2HgUFtfOnis2jRViEw9bu78kHNwufAHj-faeWWPkh9utWf5HKy6MJLVawkC0YSOr29tn7BIEYWL4ao6K_pW582AbKZNVDxZ-e09N5upiOC6WDCZ7oDJ2V5X1XapiCbrAWYc/s72-c/b374k+Shell.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Remote File Inclusion/Upload Vulnerability on phUploader</title><link>http://lodge4hacker.blogspot.com/2012/06/remote-file-inclusionupload.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Fri, 8 Jun 2012 22:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-115637169540045818</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;phUploader&lt;/b&gt; is a very simple script for uploading one or many files or images to your website. You can specify the file types accepted, file size and even control the file name. This script was build with PHP5 in mind and is not platform dependant. This script is very useful for temporary file storage or simple forum signature and avatar hosting.&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-YFruv1znPHcgfL2k-cVTl6-f_dSzNZc5M_8P_pDB1Sy3iHgjIJPjkKXbMnnwzPB5d76XeFF4Nlnm0h7EAYi5hpBBokOQDyA5JCw_UWo26Ko1zB6P-lqAz0yv8xCgiiVE4wX4Pb7pvg/s1600/Capture.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-YFruv1znPHcgfL2k-cVTl6-f_dSzNZc5M_8P_pDB1Sy3iHgjIJPjkKXbMnnwzPB5d76XeFF4Nlnm0h7EAYi5hpBBokOQDyA5JCw_UWo26Ko1zB6P-lqAz0yv8xCgiiVE4wX4Pb7pvg/s1600/Capture.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;div style="text-align: left;"&gt;
We already discussed about&amp;nbsp;&lt;a href="http://www.lodge4hacker.com/2012/05/google-dork-for-remote-file-inclusion.html"&gt;Google Dork For "Remote File Inclusion"&lt;/a&gt;&amp;nbsp;in previous post, Now let we see&amp;nbsp;Remote File Inclusion/Upload Vulnerability on phUploader&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;b&gt;Steps :&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Go to Google and Enter this dork "&amp;nbsp;&lt;span style="color: red;"&gt;intitle:Powered By phUploader&lt;/span&gt; "&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Select any website from search result, Exploit site looks like below link&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;http://{site.com}/ path/upload.php&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;http://site.com/upload.php&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Now you will see a screen like above image,In that you can upload your file&lt;/li&gt;
&lt;li&gt;You can see your file link after upload link.&lt;/li&gt;
&lt;li&gt;Done!! "&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;b&gt;Example:&lt;/b&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;a href="http://fidelityprintquick.com/phUploader.php"&gt;http://fidelityprintquick.com/phUploader.php&lt;/a&gt;
&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5-YFruv1znPHcgfL2k-cVTl6-f_dSzNZc5M_8P_pDB1Sy3iHgjIJPjkKXbMnnwzPB5d76XeFF4Nlnm0h7EAYi5hpBBokOQDyA5JCw_UWo26Ko1zB6P-lqAz0yv8xCgiiVE4wX4Pb7pvg/s72-c/Capture.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Dork For "Remote File Inclusion"</title><link>http://lodge4hacker.blogspot.com/2012/05/google-dork-for-remote-file-inclusion.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Thu, 10 May 2012 20:25:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-9129325503930518049</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;Google dork&lt;/b&gt;s are the center of the Google Hacking. Many hackers use google to find vulnerable webpages and later use these vulnerabilities for hacking.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Remote File Inclusion (RFI)&lt;/b&gt; is a type of vulnerability most often found on websites. It allows an attacker to include a remote file, usually through a script on the web server. The vulnerability occurs due to the use of user-supplied input without proper validation.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg34S1aX0rHTCHHPlUOVmN5aOK0C7QfeNcg__QyltiuZDVdqhTtrQOrJ6rDkot6ls3eKHF7JG9yKJIOAOKPCRKDbXenPkMO70ZrOzMYjFTOvFNBKpgIzAk0I6PTLjOgxU_X8vh1yUjy9LU/s1600/doodle-010512.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg34S1aX0rHTCHHPlUOVmN5aOK0C7QfeNcg__QyltiuZDVdqhTtrQOrJ6rDkot6ls3eKHF7JG9yKJIOAOKPCRKDbXenPkMO70ZrOzMYjFTOvFNBKpgIzAk0I6PTLjOgxU_X8vh1yUjy9LU/s320/doodle-010512.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;b&gt;List Of Google Dork&amp;nbsp;For Remote File Inclusion:&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:rte/my_documents/my_files&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/my_documents/my_files/&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/shoutbox/expanded.php?conf=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/main.php?x=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/myPHPCalendar/admin.php?cal_dir=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php/main.php?x=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?include=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?x=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?open=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?visualizar=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/template.php?pagina=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?pagina=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/index.php?inc=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:"index.php?page=contact.php"&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:"template.php?goto="&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:"video.php?content="&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:"pages.php?page="&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:"index1.php?choix="&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:tinybrowser/upload.php&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:examples/uploadbutton.html&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/include/new-visitor.inc.php?lvc_include_dir=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/_functions.php?prefix=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/cpcommerce/_functions.php?prefix=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/modules/coppermine/themes/default/theme.php?THEME_DIR=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/modules/agendax/addevent.inc.php?agendax_path=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/ashnews.php?pathtoashnews=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/eblog/blog.inc.php?xoopsConfig[xoops_url]=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/pm/lib.inc.php?pm_path=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/b2-tools/gm-2-b2.php?b2inc=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/modules/agendax/addevent.inc.php?agendax_path=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/includes/include_once.php?include_file=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;inurl:/e107/e107_handlers/secure_img_render.php?p=&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #0b5394;"&gt;intitle:index of? inurl:kindeditor&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;b&gt;How to Use&lt;/b&gt;&lt;b&gt;&amp;nbsp;Google Dork&amp;nbsp;For Remote File Inclusion:&lt;/b&gt;&lt;br /&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: red;"&gt;Copy &lt;/span&gt;anyone of the&amp;nbsp;Google&amp;nbsp;dork from above list&lt;/li&gt;
&lt;li&gt;&lt;span style="color: red;"&gt;Paste&lt;/span&gt; it in Google Search textbox and click &lt;span style="color: red;"&gt;Search&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Now, the&amp;nbsp;&lt;span style="color: red;"&gt;Vulnerable Websites&lt;/span&gt; are listed in search result&lt;/li&gt;
&lt;li&gt;Click anyone of the link,You will find &lt;span style="color: red;"&gt;upload&lt;/span&gt; option on it&amp;nbsp;&lt;/li&gt;
&lt;li&gt;Now, you can upload your files like &lt;span style="color: red;"&gt;Images,HTML files,Document,Shell,RAT,etc.. ,&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;
This is a simple method to find Remote File Inclusion(RFI) Vulnerable Websites using Google Dork. For an hacker google is not only a search engine its also a tool for hacking. Thank you!!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Visit also:&lt;/b&gt;&lt;br /&gt;
&lt;span style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 18px; text-align: -webkit-auto; text-decoration: none;"&gt;&lt;a href="http://www.lodge4hacker.com/2011/06/disable-googlecom-from-redirecting-to.html" style="font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 18px; text-align: -webkit-auto; text-decoration: none;"&gt;&lt;span style="color: #0b5394;"&gt;Disable Google.com From Redirecting To Local Country Google Domain&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (To Get more&amp;nbsp;Vulnerable Websites)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Please&amp;nbsp;leave&amp;nbsp;your Comment/Suggestion below. . .&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg34S1aX0rHTCHHPlUOVmN5aOK0C7QfeNcg__QyltiuZDVdqhTtrQOrJ6rDkot6ls3eKHF7JG9yKJIOAOKPCRKDbXenPkMO70ZrOzMYjFTOvFNBKpgIzAk0I6PTLjOgxU_X8vh1yUjy9LU/s72-c/doodle-010512.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>SQL Injection Using Havij</title><link>http://lodge4hacker.blogspot.com/2012/02/sql-injection-using-havij.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Fri, 3 Feb 2012 21:55:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-4966065210687509816</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;SQL injection&lt;/b&gt; is a code injection technique that &lt;b&gt;exploits &lt;/b&gt;a security vulnerability in a &lt;b&gt;website's software&lt;/b&gt;. It is a technique used to take advantage of non-validated input vulnerabilities to pass SQL commands through a Web application for execution by a&lt;b&gt; backend database.&lt;/b&gt; Attackers take advantage of the fact that programmers often chain together SQL commands with user-provided parameters, and can therefore embed SQL commands inside these parameters. The result is that the attacker can execute arbitrary SQL queries and/or commands on the backend database server through the Web application.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_bkYFo5ZNvSH8Q4Rko0MO_ISWMYUXr8thFanxnp9tve4U3WbtNQhaC5JL7cQeveP9v4SJAsk1zhrlRerBCN_RUSfzbfEhhEDkv23fdQZ1lV7ZXbpqaeKOPAPp5d5pFp6UfIrgffaeykE/s1600/SQL+injection.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_bkYFo5ZNvSH8Q4Rko0MO_ISWMYUXr8thFanxnp9tve4U3WbtNQhaC5JL7cQeveP9v4SJAsk1zhrlRerBCN_RUSfzbfEhhEDkv23fdQZ1lV7ZXbpqaeKOPAPp5d5pFp6UfIrgffaeykE/s1600/SQL+injection.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;b&gt;Havij&lt;/b&gt; is an automated&lt;b&gt; SQL Injection tool &lt;/b&gt;that helps penetration testers to find and exploit SQL Injection vulnerabilities on a web page.&amp;nbsp;It can take advantage of a vulnerable web application. By using this software user can perform back-end database fingerprint, retrieve DBMS users and &amp;nbsp;password hashes, dump tables and columns, fetching data from the database, running SQL &amp;nbsp;statements and even accessing the underlying file.&amp;nbsp;The user friendly &lt;b&gt;GUI&lt;/b&gt; (Graphical User Interface) of Havij and automated settings and detections makes it easy to use for everyone even amateur users.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Finding the SQL Vulnerable Websites :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;We will use&amp;nbsp;&lt;b&gt;Google&amp;nbsp;dorks&lt;/b&gt; to find the vulnerable websites, Most common dorks for sql injection vulnerable site are:-&lt;br /&gt;&lt;br /&gt;&lt;span style="color: red;"&gt;
inurl:index.php?id=&lt;br /&gt;

inurl:trainers.php?id=&lt;br /&gt;


inurl:buy.php?category=&lt;br /&gt;

inurl:article.php?ID=&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/li&gt;
&lt;li&gt;Just search google using one of the dork and you will see a lot of vulnerable websites. Look like below,&lt;br /&gt;&lt;span style="color: red;"&gt;Example :&amp;nbsp;http://lodge4hacker.com/news.php?id=129&lt;/span&gt;&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now simply add an apostrophe(&lt;span style="color: red;"&gt; '&lt;/span&gt; )to the end of url and press enter. If the website replies with an error then it shows that the website is vulnerable to SQL injection.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;SQL Injection Using Havij Tool :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Start Havij and copy the url in target address.( The same url which we used to test for sql injection&amp;nbsp;vulnerability but without ' ).&lt;/li&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwFW7qImGe1iLe2bJZorX8805Bd67Ys-B0gYiktuTsPnfiQKtG9lgXZv2zEXx1hXerQZwOKt4tjRJUYVj8f-fG0el8SvPdDj16-gvH_MPTd6gH6etrRpuEWmzLdZdGAq3ajV3A_HEk5cc/s1600/Havij+4.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="81" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjwFW7qImGe1iLe2bJZorX8805Bd67Ys-B0gYiktuTsPnfiQKtG9lgXZv2zEXx1hXerQZwOKt4tjRJUYVj8f-fG0el8SvPdDj16-gvH_MPTd6gH6etrRpuEWmzLdZdGAq3ajV3A_HEk5cc/s400/Havij+4.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;li&gt;Click on the analyses button and wait for Havij to discover the database files for you.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;At the bottom of the Havij terminal you will see the search progress in detail.&lt;/li&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGR-pmdObjHJriSTNcpDpYc3boFzm3ZIhfvYbVs5Kwfva5MQ419CfzktgzimT1PZujDqT7mrEYjmnnp1qyI9FFbJoXAYG2KXxpmxHM6uQmFa1HBEJf5J_An60u5EIAfacbvfBgVnnO0LE/s1600/Havij+2.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="115" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGR-pmdObjHJriSTNcpDpYc3boFzm3ZIhfvYbVs5Kwfva5MQ419CfzktgzimT1PZujDqT7mrEYjmnnp1qyI9FFbJoXAYG2KXxpmxHM6uQmFa1HBEJf5J_An60u5EIAfacbvfBgVnnO0LE/s400/Havij+2.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGTkeL7AxB_9HUlbXQ_byF24D4ezb4elUn7h6K949N9Q8aDOkL-qhMlaGRZB83ro8RyL46Ovx6aQaANuRISA3Ax1dLvzieFTttd7tfK2b1VAxocSMn-4fvQO1xakrELC-jyq7laqYAKTE/s1600/Havij+3.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="202" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGTkeL7AxB_9HUlbXQ_byF24D4ezb4elUn7h6K949N9Q8aDOkL-qhMlaGRZB83ro8RyL46Ovx6aQaANuRISA3Ax1dLvzieFTttd7tfK2b1VAxocSMn-4fvQO1xakrELC-jyq7laqYAKTE/s400/Havij+3.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;li&gt;Once a database is found, you can click on tables tab to view the available tables. All the tables that are available in the database of the website are now shown.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Select that table and click on get columns. You will be listed with various columns that are present in the table.&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now select those columns whose data you want to retrieve.&amp;nbsp;After selecting the various columns, click on get data to get the values stored in the columns.&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKEtOQ3UzZQLFyccN64iSjwq6F41HTg_kX-5Tz5jiauitw8gWstRs98TkU0JRH2mH9G-3Z0byoTn78zyWXSRjIVuJbbEA3YbEF9clx-f9uc394d5Ru6K_6qkFZ-IW7V6UElHSZ4Sql4-c/s1600/Havij+1.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="202" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKEtOQ3UzZQLFyccN64iSjwq6F41HTg_kX-5Tz5jiauitw8gWstRs98TkU0JRH2mH9G-3Z0byoTn78zyWXSRjIVuJbbEA3YbEF9clx-f9uc394d5Ru6K_6qkFZ-IW7V6UElHSZ4Sql4-c/s400/Havij+1.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Now the website full database with you, Can do whatever you want !!&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Finding Admin Page Using&amp;nbsp;Havij Tool :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;To find admin page in website, Click Find Admin tab&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now type the website link in Path to search and link start&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now, You will get admin page listed below&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2OG57_OgeHfh5wVR2N8cjritPKuhjd63Ong89r5gHONLzzvfT8vm_w3GC4jmUZlz-44u-lXxwtgjqgu2EJJ49V0pqw2IWXtMWr-8Ph9zSpneScl3ydgiAltp4aichbqfudjMATmzAqwg/s1600/Havij+Admin.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="206" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2OG57_OgeHfh5wVR2N8cjritPKuhjd63Ong89r5gHONLzzvfT8vm_w3GC4jmUZlz-44u-lXxwtgjqgu2EJJ49V0pqw2IWXtMWr-8Ph9zSpneScl3ydgiAltp4aichbqfudjMATmzAqwg/s400/Havij+Admin.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Decrypt MD5 Hash Using Havij :&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;To Decrypt MD5 hash , Click MD5 in&amp;nbsp;Havij&amp;nbsp;tool&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now paste your hash into MD5 hash input box and click start&lt;/li&gt;
&lt;br /&gt;
&lt;li&gt;Now you will get the decrypted hash in&amp;nbsp;table&amp;nbsp;from various online decryption website&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_ZbtyngvJElZo_XWwPFQO-sASXq_rHykErPSXdp82DSpMDn60tcvN3_8Hbpzf-tfCKvQJnzMlUPjBpnW_nRrwcURi_1b5mnk54DdBkdId1ZXALwWqNUqaduwkH0UoRcoEXpQWAUBFM48/s1600/Havij+MD5.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_ZbtyngvJElZo_XWwPFQO-sASXq_rHykErPSXdp82DSpMDn60tcvN3_8Hbpzf-tfCKvQJnzMlUPjBpnW_nRrwcURi_1b5mnk54DdBkdId1ZXALwWqNUqaduwkH0UoRcoEXpQWAUBFM48/s400/Havij+MD5.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;DOWNLOAD :&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://itsecteam.com/en/projects/project1.htm"&gt;Havij - Mirror1&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://software.lodge4hacker.x10.bz/Havij%201.12%20Pro.rar"&gt;Havij Full Version - Mirror2 ( Lodge4 Hacker )&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://itsecteam.com/files/havij/havij_help-english.pdf"&gt;Downlaod&amp;nbsp;Havij Tool&amp;nbsp;Help (PDFs&amp;nbsp;format)&lt;/a&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_bkYFo5ZNvSH8Q4Rko0MO_ISWMYUXr8thFanxnp9tve4U3WbtNQhaC5JL7cQeveP9v4SJAsk1zhrlRerBCN_RUSfzbfEhhEDkv23fdQZ1lV7ZXbpqaeKOPAPp5d5pFp6UfIrgffaeykE/s72-c/SQL+injection.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Best Browser-Based P2P File Sharing Sites</title><link>http://lodge4hacker.blogspot.com/2012/01/best-browser-based-p2p-file-sharing.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Tue, 24 Jan 2012 07:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-2494707565101467659</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
"&lt;b&gt;Technology Rules the World&lt;/b&gt;". Everyone knows technology has taken over the world and has forever changed the way we communicate, connect, share information and&amp;nbsp;transferring&amp;nbsp;files.&amp;nbsp;In those days we want to transfer a file to another we use an email to transfer it but supports only limited amount of size(Up-to&amp;nbsp;10 MB). and then an online file hosting websites are arrived that too have some limitation limited storage space, maximum file size allowed for transfer or expiry time to collect the file.&amp;nbsp;At last,&amp;nbsp;Now P2P File Sharing Sites are introduced &amp;nbsp;to overcome this limitation!!&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnkSCrgB4XBdWXEXQnQkKPK9NCMSKha_YORh0-U0_tN6zwt7ZrzeDSHUfAdZFNbdosy-OHKygChTh76YZkrtNjHGQa5hXyLCNjN3-0fPakg75hT2b7ZmxIV8ajUBvD1WOHjXUcilz_P3U/s1600/P2P.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="294" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnkSCrgB4XBdWXEXQnQkKPK9NCMSKha_YORh0-U0_tN6zwt7ZrzeDSHUfAdZFNbdosy-OHKygChTh76YZkrtNjHGQa5hXyLCNjN3-0fPakg75hT2b7ZmxIV8ajUBvD1WOHjXUcilz_P3U/s320/P2P.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;What is&amp;nbsp;Peer to Peer ?&lt;/b&gt;&lt;br /&gt;
Peer-to-peer file sharing or commonly known as P2P is a convenient way of sharing files over the internet. However, you must be very careful when using P2P because some of the files uploaded to the internet have viruses, spyware and other threats that can harm your PC, So transfer your file&amp;nbsp;only&amp;nbsp;with your&amp;nbsp;friends.&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;b&gt;List of Best Browser-Based P2P File Sharing Sites&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Files Over Miles&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.filesovermiles.com/" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="58" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguwGawfJWF5nCTQqlTA6Tfh04D9Pk_zA9lNsDGvtX62XFQQtuahNpPxk7OM727bK_-9r8klAV1MDx2lCNf68IYPttDd-LpYfUcZG4nmF7hN08j1ulwzlnoZTfnOoPfDMKnE6mr5zlDrMQ/s320/File+Over+Miles.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="http://www.filesovermiles.com/"&gt;FilesOverMiles&lt;/a&gt; is a direct file sharing tool for quickly and securely sending files over the internet. There is no installation or sign up and transferred files are not stored anywhere.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;PipeBytes&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://host03.pipebytes.com/" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="64" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8pvsvVJzobOdb3NLWnmUeMZv7lTWs3rPdrZzmf-AKApsc8RD4pro2XJhC9kZsmktp8SEAqMC4-auaSAXgpn64DjSTw_lg2nb17m22e9wmm3UKy1JZETQ8nm7HFMldBy9EGTXWyAmRmNU/s320/pipebytes.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;a href="http://host03.pipebytes.com/"&gt;PipeBytes&lt;/a&gt; is favorite web-based P2P file sharing service. There’s no upload limit and your friend could start downloading the file as you upload it.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;b&gt;JetBytes&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://jetbytes.com/"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiVsg1m5kooSxw3HR8so2y_U-NyIGWx_63w2zHGKIkzV_Aw2Rvq8IWq21F4ZfaW_Tb6cuk3YlTAyMr-ReJg_b2eQFsMqreXsPBjDS4qjI5yMCQvV8CMMsuLVs0rbMl5oc5uyYcvOSykvdE/s1600/jetbytes.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;a href="http://jetbytes.com/"&gt;JetBytes&lt;/a&gt; is an experimental direct file transfer tool that lets you quickly send files over the net. The application creates direct link between sender and receiver and does not store files during the transfer&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;b&gt;Dushare&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://dushare.com/"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidngyV_FFPfHi3b5V6Oxxg3K1Q4vS8zZkworU7Ti12HmGxafAMsECxou6lT_lER5_G2iWUNGQpAZC3pC7D1spFtPUxADmw6d6m_CcOGFo4UyG1EZkICb5jfnM1i8eeoWoUj-WG5EQaUFI/s1600/dushare.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both;"&gt;
&lt;a href="http://dushare.com/"&gt;Dushare&lt;/a&gt; is a simple direct file-transfer service. It makes sending unlimited file sizes between two people as simple as a clicking a link&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;xFiles&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://xfiles.technihelp.net/"&gt;&lt;img border="0" height="105" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjHF5QFonwjk5HNe-PqjOSS9AF6b8qoBiZ9PYId6LJ7Yltk7N3GWALvqvYCS4Y5fzKTenGwCjKdV4b9WgIQjE-kNiuUDl5gvKInc24Iq_2GczXA1ws3ITy6aue9fq4r7NlgkQAXyVZB_Qs/s320/xfiles.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href="http://xfiles.technihelp.net/"&gt;xFiles&lt;/a&gt; is a P2P based file transfer service that completely eliminates all of these risks.&amp;nbsp;Just head over to xFiles and choose the file you want to transfer. Once you have selected the file, you will instantly be provided with a URL that you can send to the desired recipient. Once they go to the URL and click claim, the file will start downloading to their computer.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;
Above&amp;nbsp;&amp;nbsp;Browser-Based P2P File Sharing Sites are the best Site from my analysis. I always&amp;nbsp;preferred&amp;nbsp;to use&amp;nbsp;Files Over Miles its working good. If you like this post leave a small comment and likes here. . .&lt;br /&gt;
Thank you ,&lt;br /&gt;
Best Wishes!!&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnkSCrgB4XBdWXEXQnQkKPK9NCMSKha_YORh0-U0_tN6zwt7ZrzeDSHUfAdZFNbdosy-OHKygChTh76YZkrtNjHGQa5hXyLCNjN3-0fPakg75hT2b7ZmxIV8ajUBvD1WOHjXUcilz_P3U/s72-c/P2P.PNG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total></item><item><title>Anonymous Hackers Wallpaper</title><link>http://lodge4hacker.blogspot.com/2012/01/anonymous-hackers-wallpaper.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Mon, 16 Jan 2012 10:12:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-5575502601349750346</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TWufwnaCLVHqzs0v79CarFy7zyX08UW3LVvW-wS0Lqil-inENB8OW_qEgdp4tWyN0Uf0DyPSAQTuIWxg5WoKo6Wi_1roCZdxs2n8zyrxllZeemEDUGsjE-VTdY9q7Fefuq7F60WX2LI/s1600/1920X1080.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TWufwnaCLVHqzs0v79CarFy7zyX08UW3LVvW-wS0Lqil-inENB8OW_qEgdp4tWyN0Uf0DyPSAQTuIWxg5WoKo6Wi_1roCZdxs2n8zyrxllZeemEDUGsjE-VTdY9q7Fefuq7F60WX2LI/s400/1920X1080.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;Created&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&amp;nbsp;by&amp;nbsp;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.lodge4hacker.com/"&gt;Lodge 4 Hacker&lt;/a&gt;&lt;/div&gt;

&lt;div style="text-align: center;"&gt;
&lt;!-- Begin: adBrite, Generated: 2012-01-11 20:22:38  --&gt;
&lt;script type="text/javascript"&gt;
var AdBrite_Title_Color = '0000FF';
var AdBrite_Text_Color = '000000';
var AdBrite_Background_Color = 'FFFFFF';
var AdBrite_Border_Color = 'CCCCCC';
var AdBrite_URL_Color = '008000';
try{var AdBrite_Iframe=window.top!=window.self?2:1;var AdBrite_Referrer=document.referrer==''?document.location:document.referrer;AdBrite_Referrer=encodeURIComponent(AdBrite_Referrer);}catch(e){var AdBrite_Iframe='';var AdBrite_Referrer='';}
&lt;/script&gt;
&lt;script type="text/javascript"&gt;document.write(String.fromCharCode(60,83,67,82,73,80,84));document.write(' src="http://ads.adbrite.com/mb/text_group.php?sid=2080391&amp;zs=3330305f323530&amp;ifr='+AdBrite_Iframe+'&amp;ref='+AdBrite_Referrer+'" type="text/javascript"&gt;');document.write(String.fromCharCode(60,47,83,67,82,73,80,84,62));&lt;/script&gt;
&lt;div&gt;&lt;/div&gt;
&lt;!-- End: adBrite --&gt;
&lt;/div&gt;


&lt;div style="text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TWufwnaCLVHqzs0v79CarFy7zyX08UW3LVvW-wS0Lqil-inENB8OW_qEgdp4tWyN0Uf0DyPSAQTuIWxg5WoKo6Wi_1roCZdxs2n8zyrxllZeemEDUGsjE-VTdY9q7Fefuq7F60WX2LI/s1600/1920X1080.png" style="font-size: x-large;"&gt;View In Full Size&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;(1920X1080)&lt;/b&gt;&lt;/div&gt;&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg1TWufwnaCLVHqzs0v79CarFy7zyX08UW3LVvW-wS0Lqil-inENB8OW_qEgdp4tWyN0Uf0DyPSAQTuIWxg5WoKo6Wi_1roCZdxs2n8zyrxllZeemEDUGsjE-VTdY9q7Fefuq7F60WX2LI/s72-c/1920X1080.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Create File With Fixed Size and Type in Windows</title><link>http://lodge4hacker.blogspot.com/2012/01/create-file-with-fixed-size-and-type-in.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Mon, 16 Jan 2012 08:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-5494152067073617760</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Command Prompt is a non-graphical interface that allows you to interact with your operating system. Once you learn how to use command prompt and their commands, you can unleash supreme power and rule your computer! But really, you can do almost anything with cmd.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9AtHE07yW4CS8RgfKkFZvPsL7FfYfaQ0sOeKPFXcw1Qw7TrrAy9vHRbdLxopgf1s7TnQDFGsvx2GxnNosU8wYz14TjBzgLdmWEyC2HP_tYAXQBsLnDZmo3BpW_mIivGyEwaZ0IcBpwxU/s1600/File+Size.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9AtHE07yW4CS8RgfKkFZvPsL7FfYfaQ0sOeKPFXcw1Qw7TrrAy9vHRbdLxopgf1s7TnQDFGsvx2GxnNosU8wYz14TjBzgLdmWEyC2HP_tYAXQBsLnDZmo3BpW_mIivGyEwaZ0IcBpwxU/s1600/File+Size.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;
&lt;b&gt;Steps:&lt;/b&gt;&lt;br /&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;Go to &lt;b&gt;Start&lt;/b&gt;-&amp;gt;&lt;b&gt;All Programs&lt;/b&gt;-&amp;gt;&lt;b&gt;Accessories&lt;/b&gt;-&amp;gt;Right Click on Command Prompt and Click "&lt;b&gt;Run as Administrator&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Go to&amp;nbsp;&lt;b&gt;Directory&lt;/b&gt;&amp;nbsp;on which you want to create that file&lt;b&gt; in Command Prompt&lt;/b&gt;&lt;/li&gt;
&lt;span style="color: blue;"&gt;
-------------- Command To Change Directory &amp;nbsp;-------------------&lt;br /&gt;
&amp;nbsp;Cd &amp;lt;Name of Directory&amp;gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; (To Enter into Directory)&lt;br /&gt;
Cd.. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;(To Exit From Current Directory)&lt;br /&gt;
----------------------------------------------------------------------&lt;/span&gt;&lt;br /&gt;
&lt;li&gt;Now&lt;b&gt; enter the command &lt;/b&gt;to create file with fixed size and type&lt;/li&gt;
&lt;span style="color: red;"&gt;
fsutil file createnew &amp;lt;file name&amp;gt; &amp;lt;size in bytes&amp;gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;b&gt;
Example:&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;fsutil file createnew test.mp3 20000000000&lt;br /&gt;
&lt;/ol&gt;
&lt;ol style="text-align: left;"&gt;File is create in your specified directory !!&lt;/ol&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj66hzjU3A5AIW00vbBp-OCaFkDz_v9A_VtMPPhdNXvpKtHWccrVd2nV5SVYP0kbBdfwlSZ14TsZ4gOqsLCQ9892ZNQZjRBqcPL7Lf1wqajoNHC_-CxrlZW3AW_r_w5ke6B7JzIitDmpEs/s1600/Fsutil.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj66hzjU3A5AIW00vbBp-OCaFkDz_v9A_VtMPPhdNXvpKtHWccrVd2nV5SVYP0kbBdfwlSZ14TsZ4gOqsLCQ9892ZNQZjRBqcPL7Lf1wqajoNHC_-CxrlZW3AW_r_w5ke6B7JzIitDmpEs/s400/Fsutil.PNG" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: blue;"&gt;-------------------------------Descriprion of Fsutil Command--------------------------------
&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;Fsutil&lt;/b&gt; is a command-line utility that you can use to perform many FAT and NTFS file system related tasks, such as managing reparse points, managing sparse files, dismounting a volume, or extending a volume. Because fsutil is quite powerful, it should only be used by advanced users who have a thorough knowledge of Windows XP. In addition, you must be logged on as an administrator or a member of the Administrators group in order to use fsutil.&lt;br /&gt;
&lt;span style="color: blue;"&gt;---- Fsutil SubCommands----&lt;/span&gt;&lt;br /&gt;
8dot3name &amp;nbsp; &amp;nbsp; &amp;nbsp; 8dot3name managment&lt;br /&gt;
behavior &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Control file system behavior&lt;br /&gt;
dirty &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Manage volume dirty bit&lt;br /&gt;
file &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;File specific commands&lt;br /&gt;
fsinfo &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;File system information&lt;br /&gt;
hardlink &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Hardlink management&lt;br /&gt;
objectid &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Object ID management&lt;br /&gt;
quota &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Quota management&lt;br /&gt;
repair &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Self healing management&lt;br /&gt;
reparsepoint &amp;nbsp; &amp;nbsp;Reparse point management&lt;br /&gt;
resource &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Transactional Resource Manager management&lt;br /&gt;
sparse &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Sparse file control&lt;br /&gt;
transaction &amp;nbsp; &amp;nbsp; Transaction management&lt;br /&gt;
usn &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; USN management&lt;br /&gt;
volume &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;Volume management&lt;br /&gt;
&lt;span style="color: blue;"&gt;--------------------------&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: blue;"&gt;------------------------------------------------------------------------------------------------------
&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion:&lt;/b&gt;&lt;br /&gt;
This tutorial not only shows how to Create File With Fixed Size and Type in Windows and also explains the use of most&amp;nbsp;powerful command "fsutil". If you like &amp;nbsp;this post please give me a like on above facebook like box&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Note:&lt;/b&gt; &amp;nbsp;FSUTIL utility requires administrative privileges.&lt;br /&gt;
&lt;b&gt;See Also :&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.lodge4hacker.com/2011/06/matrix-code-effect-in-command-prompt.html" style="color: black; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 18px; text-align: -webkit-auto; text-decoration: none;"&gt;Matrix Code Effect In Command Prompt&lt;/a&gt;
&lt;br /&gt;
&lt;a href="http://www.lodge4hacker.com/2011/05/run-commands-or-dos-commands-for.html" style="color: #c30064; font-family: Arial, Tahoma, Helvetica, FreeSans, sans-serif; font-size: 14px; line-height: 18px; text-align: -webkit-auto; text-decoration: none;"&gt;Run Commands or DOS Commands For Hackers&lt;/a&gt;&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj9AtHE07yW4CS8RgfKkFZvPsL7FfYfaQ0sOeKPFXcw1Qw7TrrAy9vHRbdLxopgf1s7TnQDFGsvx2GxnNosU8wYz14TjBzgLdmWEyC2HP_tYAXQBsLnDZmo3BpW_mIivGyEwaZ0IcBpwxU/s72-c/File+Size.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Use Your Profile Picture As Emoticon In Facebook Chat</title><link>http://lodge4hacker.blogspot.com/2012/01/use-your-profile-picture-as-emoticon-in.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Thu, 12 Jan 2012 13:31:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-2342390113696709909</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Today we are going to see another feature in facebook that recently facebook introduced one of the coolest things ever in their Facebook Chat. For years we are using emoticons to express our feelings but now with this new Facebook People Emoticon Feature we can use any person’s, official page’s or event page’s display picture in&amp;nbsp;Facebook&amp;nbsp;chat.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuRSef07U93_2xJ_kd2w0aOcUhBZoZfYvfl8rcDG5bav33ebQl3Oyr6oXdUnEVSRoRX9c2786Ee2edRLl71L7FZLYl3W5YovAydKqisvt41gSQepuiMlXE13BfnFgdEL4sclxLJPRWiNs/s1600/Untitled-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuRSef07U93_2xJ_kd2w0aOcUhBZoZfYvfl8rcDG5bav33ebQl3Oyr6oXdUnEVSRoRX9c2786Ee2edRLl71L7FZLYl3W5YovAydKqisvt41gSQepuiMlXE13BfnFgdEL4sclxLJPRWiNs/s400/Untitled-1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;
&lt;b&gt;Steps to&amp;nbsp;Use Your Profile Picture As Emoticon In Facebook Chat :&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Step-1 :&lt;/b&gt;&lt;br /&gt;
Just you need to have a Username for your profile, if you don’t have one then you can set your Facebook profile &lt;a href="https://www.facebook.com/settings?tab=account&amp;amp;section=username"&gt;username here&lt;/a&gt;.&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;Or&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
You can check the link of your profile and will find a number like this 100003262824948 You can use this instead of your username.&lt;br /&gt;
&lt;b&gt;Step-2:&lt;/b&gt;&lt;br /&gt;
Now,&amp;nbsp;Open the Chat box/Messages and in the text bar write, [[Username]] or [[Profile ID]] and hit Enter.&lt;br /&gt;
&lt;div&gt;
&lt;b&gt;Example:&lt;/b&gt; &amp;nbsp;[[100003262824948]] &amp;nbsp; or &amp;nbsp; [[siva01sankar]]&lt;br /&gt;&lt;/div&gt;
Now enjoy with&amp;nbsp;new Facebook People Emoticon /&amp;nbsp;Smiley&amp;nbsp;Feature !!&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsrvwDgGhqP3UavbtpMia8D4svhYioXMUwnPHYeBMKDxkE8a5FLQ5BkyMeCzxNkjue3bs-gcY8G0iiuGjn0jZeDGVRddvwxHgirBh-2JyhlR0hyphenhyphenDXgX3u1Q91Ll5DN15nRRzy38fJOj-A/s1600/11.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsrvwDgGhqP3UavbtpMia8D4svhYioXMUwnPHYeBMKDxkE8a5FLQ5BkyMeCzxNkjue3bs-gcY8G0iiuGjn0jZeDGVRddvwxHgirBh-2JyhlR0hyphenhyphenDXgX3u1Q91Ll5DN15nRRzy38fJOj-A/s1600/11.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Conclusion:&lt;/b&gt;&lt;br /&gt;
Facebook is dynamic growing company releasing new feature day by day , Now this feature "Profile Picture As Emoticon In Facebook Chat" has some limitation that these custom emoticons can be sent using Mobile devices however they cannot be viewed as graphics in the mobile, They will be displayed as the brackets with codes in the mobile view but on the desktop view they would appear normally. Keep visiting our blog and please leave your small comment below help me to increase my blogging skills.&lt;br /&gt;
&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuRSef07U93_2xJ_kd2w0aOcUhBZoZfYvfl8rcDG5bav33ebQl3Oyr6oXdUnEVSRoRX9c2786Ee2edRLl71L7FZLYl3W5YovAydKqisvt41gSQepuiMlXE13BfnFgdEL4sclxLJPRWiNs/s72-c/Untitled-1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Update Facebook Status Via “YOUR NAME”</title><link>http://lodge4hacker.blogspot.com/2012/01/update-facebook-status-via-your-name.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Fri, 6 Jan 2012 19:06:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-4413633473258570490</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
We are always looking for ways to impress our friends, maybe though the latest applications or a status,Facebook is a community where we can connect and share with others. We can watch that most of them updating their comments from&amp;nbsp;different&amp;nbsp;application&amp;nbsp;and devices like&amp;nbsp;iPhone, Android, Twitter, etc . . .,&lt;br /&gt;
Here we going to see how to update via your name !!&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh017I0Dd80Vaw2zZaUsXUbpPOKn3Tqzt8FjG4Faj0wO66nwWgO8huHVT1eNS1tG70RseawGSNcmjw7TBBKLaPcpnPvKz2CTpOBZtuEmoGo0OHmcr2CoFW6whyPe2pUeSnnGzmRB__vxJc/s1600/Black+Facebook.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh017I0Dd80Vaw2zZaUsXUbpPOKn3Tqzt8FjG4Faj0wO66nwWgO8huHVT1eNS1tG70RseawGSNcmjw7TBBKLaPcpnPvKz2CTpOBZtuEmoGo0OHmcr2CoFW6whyPe2pUeSnnGzmRB__vxJc/s400/Black+Facebook.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How exactly is this done though?&lt;/b&gt;&lt;br /&gt;
We need to create our own personalized application, writing an coding for an application is a difficult and long time process . But here we are going to use small trick&amp;nbsp;to update our status via any name as you like. Let's see how to do this !!&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvMFJ3bIj681HZO0omz-3V2O5tTXiynPhOxlfe0JVXiJt5_PE7_-NqNNT3-2Rntkosf8qNZFfEIFX0KJMMQ8OChnxkMgCXRbXqc3zBBCU5YuQPg1twLcxxThqrMGqdYXDf0S63-ogcSi8/s1600/Facebook+Status.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvMFJ3bIj681HZO0omz-3V2O5tTXiynPhOxlfe0JVXiJt5_PE7_-NqNNT3-2Rntkosf8qNZFfEIFX0KJMMQ8OChnxkMgCXRbXqc3zBBCU5YuQPg1twLcxxThqrMGqdYXDf0S63-ogcSi8/s1600/Facebook+Status.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;
&lt;b&gt;Steps to&amp;nbsp;Update Facebook Status Via “YOUR NAME” :-&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Goto &lt;b&gt;&lt;a href="https://developers.facebook.com/apps"&gt;Facebook Developers&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Now Goto &lt;b&gt;Create New Ap&lt;/b&gt;p ( In Upper RightSide of the Page)&lt;/li&gt;
&lt;li&gt;Now Enter &lt;b&gt;App Display Name&lt;/b&gt; and &lt;b&gt;Agree&lt;/b&gt; Facebook Platform Policies.&lt;/li&gt;
&lt;li&gt;Then &lt;b&gt;Security Check&lt;/b&gt; (CAPTCHA), You will be taken to the &lt;b&gt;Dashboard&lt;/b&gt; after Security Check&lt;/li&gt;
&lt;li&gt;Now you can see your application numbers ( &lt;b&gt;App ID/API Key&lt;/b&gt; ) Note your App ID&lt;/li&gt;
&lt;li&gt;Now Goto&amp;nbsp;&lt;b&gt;"https://www.facebook.com/connect/prompt_feed.php?preview=true&amp;amp;api_key=&lt;span style="color: red;"&gt;XXXXXXXXXXX&lt;/span&gt;"&lt;/b&gt; after replacing &lt;span style="color: red;"&gt;XXXXXXXXXXX&lt;/span&gt; with your App ID&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;Example :&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;a href="https://www.facebook.com/connect/prompt_feed.php?preview=true&amp;amp;api_key=352321714793240"&gt;https://www.facebook.com/connect/prompt_feed.php?preview=true&amp;amp;api_key=352321714793240&lt;/a&gt;&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Now you will see an &lt;b&gt;Facebook status bar&lt;/b&gt; , where you can update anything you want via your own App name&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpKEfu8U_3uengqmmcrHvtN973m-mrZyJGKksdN4lLmGqP5jJrDwj1nGic6tdFnY2D0yIC8CMzlxmsI5djF0aWuh3T6gaDvV9FNm1IG3qHJiD5F7ET92_U__pEfPyC64NQanIA5Dzou3k/s1600/Fb+status+via+name.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpKEfu8U_3uengqmmcrHvtN973m-mrZyJGKksdN4lLmGqP5jJrDwj1nGic6tdFnY2D0yIC8CMzlxmsI5djF0aWuh3T6gaDvV9FNm1IG3qHJiD5F7ET92_U__pEfPyC64NQanIA5Dzou3k/s1600/Fb+status+via+name.JPG" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
Please leave your comment Below !!&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;ul style="text-align: left;"&gt;
&lt;/ul&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh017I0Dd80Vaw2zZaUsXUbpPOKn3Tqzt8FjG4Faj0wO66nwWgO8huHVT1eNS1tG70RseawGSNcmjw7TBBKLaPcpnPvKz2CTpOBZtuEmoGo0OHmcr2CoFW6whyPe2pUeSnnGzmRB__vxJc/s72-c/Black+Facebook.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">13</thr:total></item><item><title>Facebook launches Messenger for Windows Now Officially Available For Download</title><link>http://lodge4hacker.blogspot.com/2012/01/facebook-launches-messenger-for-windows.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 1 Jan 2012 23:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-9120976340596291960</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
Facebook is a social utility that connects people with
friends and others who work, study and live around them.&amp;nbsp;Facebook launched in February 2004 in a short period it
reaches to a position #2 (Alexa Traffic Rank) with its dynamic and user friendly
Services.&amp;nbsp;Now Facebook launches messenger for windows allows users to connect with their friends without relying on a browser to sign in.&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;o:p&gt;&lt;/o:p&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9CXSSSKOhrqVITToVFLL9fEdF857wnUrvXU1NZ51TAdLZ50QRcLKQmh39W4gvOLyASvPQlUKWafhmtaoQhyGDGYI0JJuykjsM3PhxylVFVlPwEnGd57wSaFuhpTHsFoyROVNhCrQ7z_k/s1600/messenger.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="228" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9CXSSSKOhrqVITToVFLL9fEdF857wnUrvXU1NZ51TAdLZ50QRcLKQmh39W4gvOLyASvPQlUKWafhmtaoQhyGDGYI0JJuykjsM3PhxylVFVlPwEnGd57wSaFuhpTHsFoyROVNhCrQ7z_k/s320/messenger.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;span class="fullpost"&gt;&lt;b&gt;Facebook said in its Help Center that :&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class="fullpost"&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="color: #3d85c6;"&gt;&lt;span style="background-color: white; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12px; line-height: 16px;"&gt;Messenger is a new, trial application that lets you use Facebook without being on www.facebook.com. While you surf the web or use other applications on your computer, you can:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul class="uiList uiListBulleted" style="background-color: white; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12px; line-height: 16px; list-style-type: square; margin-bottom: 0px; margin-left: 12px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"&gt;
&lt;li class="uiListVerticalItemBorder" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 1px;"&gt;&lt;div class="fcb"&gt;
&lt;span style="color: #3d85c6;"&gt;Chat and message with your friends on Facebook&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class="uiListVerticalItemBorder" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 1px;"&gt;&lt;div class="fcb"&gt;
&lt;span style="color: #3d85c6;"&gt;See the latest updates from your friends in ticker&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li class="uiListVerticalItemBorder" style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 1px;"&gt;&lt;div class="fcb"&gt;
&lt;span style="color: #3d85c6;"&gt;Get quick notifications about what’s going on&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="color: #3d85c6;"&gt;&lt;span style="background-color: white; font-family: 'lucida grande', tahoma, verdana, arial, sans-serif; font-size: 12px; line-height: 16px;"&gt;We’re testing out a first version of the app with a small group of people. During this trial period, we plan on rolling out changes to the app and expect outages and periods of instability as we make improvements&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjku9yZ59s7V6rndWWfiWEsfXAYqKUI6k-uh9uFzHbxZO0ywiVx5XmHt5XKB3ArjN4cyvaWCGKULSOfYsX8sshHiN9kyM5cPRBj7DscBBtsbfOa1bYcuD8SdEqTbCS3neQl20JHYoSSz4M/s1600/Untitled-1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjku9yZ59s7V6rndWWfiWEsfXAYqKUI6k-uh9uFzHbxZO0ywiVx5XmHt5XKB3ArjN4cyvaWCGKULSOfYsX8sshHiN9kyM5cPRBj7DscBBtsbfOa1bYcuD8SdEqTbCS3neQl20JHYoSSz4M/s400/Untitled-1.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Conclusion:&lt;/b&gt;&lt;br /&gt;
Overall Facebook&amp;nbsp;Messenger&amp;nbsp;provides an awesome features.&amp;nbsp;It allow users access to the real time aspects of the website without the need to have the browser open and have the distraction of all of the features.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;[&amp;nbsp;&lt;a href="https://fbcdn_dragon-a.akamaihd.net/cfs-ak-ash4/84995/940/FacebookMessengerSetup.exe"&gt;Download Facebook Messenger for Windows (EXE)&lt;/a&gt;&amp;nbsp;]&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9CXSSSKOhrqVITToVFLL9fEdF857wnUrvXU1NZ51TAdLZ50QRcLKQmh39W4gvOLyASvPQlUKWafhmtaoQhyGDGYI0JJuykjsM3PhxylVFVlPwEnGd57wSaFuhpTHsFoyROVNhCrQ7z_k/s72-c/messenger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Online Email Spoofing Using Emkei's Fake Mailer</title><link>http://lodge4hacker.blogspot.com/2011/12/online-email-spoofing-using-emkeis-fake.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Thu, 22 Dec 2011 08:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-8082944672209205998</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Email spoofing is email activity in which the sender address and other parts of the email header are altered to appear as though the email originated from a different source.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFmonPyfrXEtmAsTbkOGs18la1xiOQOmjSZLAduqgRbciHRwq7of-f1E2Panhh_vVWw5BdxvdSgDnMiEmn1SvWLzDoYWdTqRUhTppa5zy_KQH8S9loQa1uBNLeDF6FsjoLaHcd0nYDP_8/s1600/espoofed.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="160" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFmonPyfrXEtmAsTbkOGs18la1xiOQOmjSZLAduqgRbciHRwq7of-f1E2Panhh_vVWw5BdxvdSgDnMiEmn1SvWLzDoYWdTqRUhTppa5zy_KQH8S9loQa1uBNLeDF6FsjoLaHcd0nYDP_8/s400/espoofed.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;span class="fullpost"&gt;
&lt;a href="http://emkei.cz/"&gt;Emkei's Fake Mailer&lt;/a&gt; is a website to send fake emails from anybody to anybody .&amp;nbsp;Emkei is a fake mail server that captures emails as files for acceptance testing. This avoids the excessive configuration of setting up a real mail server and trying to extract mail queue content. There are many free services that allow you to send fake emails, but some of them do not allow sending Links (URL’s) along with the fake email . If you need such service for sending fake emails with hyperlinks , then I would recommend Emkei’s Fake Mailer. This is a useful website which allows you to send fake emails.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL_x4gJzN1Nc-RbyXAnKuFcs_JTubJPj6Vel13v0yk2PFCQ-vyRNHyl_XHyC260lTXNzpqcvP_bo2fd7LFDcrGt5TXlS2SbLsWTvrpmAtH3NUkAawXFEE4dcZ0Exh16Grav4uhvOPFEzE/s1600/email123456789.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiL_x4gJzN1Nc-RbyXAnKuFcs_JTubJPj6Vel13v0yk2PFCQ-vyRNHyl_XHyC260lTXNzpqcvP_bo2fd7LFDcrGt5TXlS2SbLsWTvrpmAtH3NUkAawXFEE4dcZ0Exh16Grav4uhvOPFEzE/s400/email123456789.jpg" width="322" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://emkei.cz/"&gt;Click Here Go To&amp;nbsp;Emkei's Fake Mailer&amp;nbsp;Here&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Note :&lt;/b&gt;&amp;nbsp;Kindly do not misuse it for any other purposes.Your IP address gets saved on there server, So do not misuse this free service.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;iframe border="0" frameborder="0" height="60" marginwidth="0" scrolling="no" src="http://rcm.amazon.com/e/cm?t=hacslod-20&amp;amp;o=1&amp;amp;p=26&amp;amp;l=ur1&amp;amp;category=software&amp;amp;banner=1ZJ37126PPXGN5760HG2&amp;amp;f=ifr" style="border-bottom-style: none; border-color: initial; border-left-style: none; border-right-style: none; border-top-style: none; border-width: initial;" width="468"&gt;&lt;/iframe&gt;&lt;/div&gt;&lt;/span&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiFmonPyfrXEtmAsTbkOGs18la1xiOQOmjSZLAduqgRbciHRwq7of-f1E2Panhh_vVWw5BdxvdSgDnMiEmn1SvWLzDoYWdTqRUhTppa5zy_KQH8S9loQa1uBNLeDF6FsjoLaHcd0nYDP_8/s72-c/espoofed.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Redhat Linux Wallpaper</title><link>http://lodge4hacker.blogspot.com/2011/12/redhat-linux-wallpaper.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Tue, 20 Dec 2011 09:20:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-8121246740107290372</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-UwSQpy_WxDSNFkBDtbROz3yDoYf4MykBDE7pugwrxv9AaLibUyZGDldTPVJcIK55vTQCYQo8Aq_2cBAcahPatnMyjsqzy4kNWgLaJvmGDFL9pCV582LwRNQlu0JnNWpVqRSUAl9HJRA/s1600/Red_Hat_Wallpaper_dqrhd.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-UwSQpy_WxDSNFkBDtbROz3yDoYf4MykBDE7pugwrxv9AaLibUyZGDldTPVJcIK55vTQCYQo8Aq_2cBAcahPatnMyjsqzy4kNWgLaJvmGDFL9pCV582LwRNQlu0JnNWpVqRSUAl9HJRA/s400/Red_Hat_Wallpaper_dqrhd.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-UwSQpy_WxDSNFkBDtbROz3yDoYf4MykBDE7pugwrxv9AaLibUyZGDldTPVJcIK55vTQCYQo8Aq_2cBAcahPatnMyjsqzy4kNWgLaJvmGDFL9pCV582LwRNQlu0JnNWpVqRSUAl9HJRA/s72-c/Red_Hat_Wallpaper_dqrhd.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Facebook Insights For Website/Blog</title><link>http://lodge4hacker.blogspot.com/2011/10/facebook-insights-provides-facebook.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Mon, 17 Oct 2011 07:58:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-5117211957172549319</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href="http://www.facebook.com/insights/"&gt;Facebook Insights&lt;/a&gt;&lt;/b&gt; provides Facebook Page owners and Facebook Platform developers with metrics around their content. By understanding and analyzing trends within user growth and demographics, consumption of content, and creation of content, Page owners and Platform developers are better equipped to improve their business with Facebook.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.facebook.com/insights/"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokNCBCPqBQzeCziZ5f_hPZPDUNLsYRlECMZGPjbO-N4n5nvwfVubEHbYFgkQn650-Gv6qt1sI6XJWNTOrc-9ETQ00nFYJpeEfnacwkl17Pa2Gg327dGQ6QvA13zq2zZUqsiGD22QypwA/s1600/facebook_insight2yyyyyyyyyyy.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;Facebook Website/Domain Insight&lt;/b&gt;&lt;br /&gt;
Facebook Insights for Domains offers a consolidated view of key metrics for any website, even those that have not implemented Facebook Platform. For example, if a user links to your site in their Facebook status message, that data is included in the analytics for your domain. You can access sharing metrics and demographic information per domain and per URL so you can optimize your content for sharing and better tailor your content to your audience.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="fullpost"&gt;
&lt;b&gt;Add you Website/Blog to Facebook Insight&lt;/b&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;Login to your Facebook Account and open &lt;a href="http://www.facebook.com/insights/"&gt;Facebook Insights&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Click on Insights for your website button in the top right.&lt;/li&gt;
&lt;li&gt;Enter the domain name and choose the account with which the insight has to been linked to . You can add insight to a person or to a page.&lt;/li&gt;
&lt;li&gt;In the same box, you will find a meta tag, which needs to be copied to your Website header for owner verification&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2KmhqI_u7EKdMKso8_TfaYqwESSZ_F5WjMxkfvNj0ZA3NOJVeRmBA36ayJcGX2XpCH8EY1c2comKyOJWpmPsbJt3CfLISxaz34w9jDj1cbWSH2y3YU4mM9gVKa8CaXzRTpqbEOaAq138/s1600/s2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh2KmhqI_u7EKdMKso8_TfaYqwESSZ_F5WjMxkfvNj0ZA3NOJVeRmBA36ayJcGX2XpCH8EY1c2comKyOJWpmPsbJt3CfLISxaz34w9jDj1cbWSH2y3YU4mM9gVKa8CaXzRTpqbEOaAq138/s320/s2.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;Insights in Facebook&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&amp;nbsp;Websites&lt;/i&gt;:&lt;/b&gt; Fully-integrated sites and those that use social plugins, or add a non-integrated domain&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Applications&lt;/i&gt;:&lt;/b&gt; Including canvas, mobile, device, and desktop applications&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Facebook Pages&lt;/i&gt;:&lt;/b&gt; Including Pages created on Facebook.com and those that are part of the Open Graph protocol&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Conclusion&lt;/b&gt;
&lt;br /&gt;
Facebook is an  widely used social networking site in the world. Facebook Insights offers much brief analytic of your Website/Blog in Facebook. It helps you view your content likes,share,comments,etc. . .  
&lt;/div&gt;
&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiokNCBCPqBQzeCziZ5f_hPZPDUNLsYRlECMZGPjbO-N4n5nvwfVubEHbYFgkQn650-Gv6qt1sI6XJWNTOrc-9ETQ00nFYJpeEfnacwkl17Pa2Gg327dGQ6QvA13zq2zZUqsiGD22QypwA/s72-c/facebook_insight2yyyyyyyyyyy.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google Spider Wallpaper</title><link>http://lodge4hacker.blogspot.com/2011/10/google-spider-wallpaper.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 16 Oct 2011 16:36:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-8961171185488297438</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg_JVmwIhPJBf-zA6tgXQHY9mFbXkZz2m2xP9SguhnTZYHYyCcjJvlzP3SnCTMyCe5mVR1aMIIZy8fx0GMOxxkm4nyyBxhtuEurpBljFqt8UPbF4I11tFq9IcUmP5npOQQ20wJBcBmw0Y/s1600/Google+Spider.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg_JVmwIhPJBf-zA6tgXQHY9mFbXkZz2m2xP9SguhnTZYHYyCcjJvlzP3SnCTMyCe5mVR1aMIIZy8fx0GMOxxkm4nyyBxhtuEurpBljFqt8UPbF4I11tFq9IcUmP5npOQQ20wJBcBmw0Y/s400/Google+Spider.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjg_JVmwIhPJBf-zA6tgXQHY9mFbXkZz2m2xP9SguhnTZYHYyCcjJvlzP3SnCTMyCe5mVR1aMIIZy8fx0GMOxxkm4nyyBxhtuEurpBljFqt8UPbF4I11tFq9IcUmP5npOQQ20wJBcBmw0Y/s72-c/Google+Spider.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Creating IM Bot Using IMified with PHP</title><link>http://lodge4hacker.blogspot.com/2011/08/creating-im-bot-using-imified-with-php.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 28 Aug 2011 10:22:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-1504958768544697134</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;Instant messaging (IM)&lt;/b&gt; is a form of real-time direct text-based communication between two or more people using personal computers or other devices, along with shared clients. The user's text is conveyed over a network, such as the Internet. More advanced instant messaging software clients also allow enhanced modes of communication, such as live voice or video calling.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxklSrAePRnhGrXhaY9kLSlpCQD2MvRF24TZyDa_qbry0XuGLvdXdqllrV9Smq69MamvRsqrtK4PdlzXsXxfogpQfbepLLtrT6PeUhOYNEfLnFZTG_lajiAqMmqzUBhOrXO-Xfu1j6Gx8/s1600/IM+bot.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxklSrAePRnhGrXhaY9kLSlpCQD2MvRF24TZyDa_qbry0XuGLvdXdqllrV9Smq69MamvRsqrtK4PdlzXsXxfogpQfbepLLtrT6PeUhOYNEfLnFZTG_lajiAqMmqzUBhOrXO-Xfu1j6Gx8/s200/IM+bot.jpg" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;IM bot &lt;/b&gt;is a bot program that uses instant messaging as an application interface. IM users can add the name of the IM bot to their buddy list. Because the bot uses artificial intelligence, the end user thinks that he is talking to a real person and can forget that he is actually just querying a database. Some IM bots are able to connect to outside databases&lt;br /&gt;
&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;b&gt;IMified&lt;/b&gt; platform allows anyone with basic web programming skills to quickly and easily create and run an IMR (Interactive Messaging Response) application more commonly known as a "BOT" on public IM networks client like Google Talk, AIM, MSN, Windows Live, Jabber and Twitter.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA5QMdfD_WP54j7TXg2UcyrbGTRDzXd3oe5Fjt7LzgXL4_SEqCxQ1PEnGLUxNnALzSJCSb5evxOWGDG-s01eOWERM2ydX2JMCh6x31Xkugm50onX1BlIZzYDJM-3fGCsS9D1LsESgEXLI/s1600/imified.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="80" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhA5QMdfD_WP54j7TXg2UcyrbGTRDzXd3oe5Fjt7LzgXL4_SEqCxQ1PEnGLUxNnALzSJCSb5evxOWGDG-s01eOWERM2ydX2JMCh6x31Xkugm50onX1BlIZzYDJM-3fGCsS9D1LsESgEXLI/s200/imified.png" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Steps to create IM Bot using php&lt;/b&gt;&lt;br /&gt;
Here, I given steps to create a personal IM bot using php.&lt;br /&gt;
✔ Go to &lt;a href="http://www.imified.com/"&gt;www.imified.com&lt;/a&gt; and register a new account.&lt;br /&gt;
&lt;br /&gt;
✔ Now create a bot with your favorite server side programming language like PHP, Perl, Python or any other language.&lt;br /&gt;
&lt;i&gt;Example :&lt;/i&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;&amp;lt;?php&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;switch ($_REQUEST['step']) {&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;case 1:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;echo "Hi, what's your name?";&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;break;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;case 2:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;echo "Hi " . $_REQUEST['value1'] . ", where do you live?";&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;break;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;case 3:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;echo "Well, Welcome to Hacker's Lodge, " . $_REQUEST['value1'] . "&amp;lt;br&amp;gt;from " . $_REQUEST['value2'] . ".&amp;lt;reset&amp;gt;";&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;break;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: blue;"&gt;?&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
✔ Once your bot script is ready, put it somewhere on your web server and note the url of your  bot in web server &lt;br /&gt;
&lt;i&gt;For Free Hosting|Web Server : &lt;a href="http://x10hosting.com/"&gt;x10hosting.com&lt;/a&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
✔ Now login to your imified account, and click "create a new bot". Fill the following field to complete your bot creation&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="color: purple;"&gt;Bot Name&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;    : General identifier for your bot&lt;br /&gt;
&lt;i&gt;Example : Hacker's Lodge&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="color: purple;"&gt;Screen Name&lt;/span&gt;&lt;/i&gt;&lt;/b&gt; : To get you started we'll give you your own bot.im screen name that is accessible via Gtalk and Jabber. You can add other networks to your bot after its created.&lt;br /&gt;
&lt;i&gt;Example : lodge4hacker@bot.im&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="color: purple;"&gt;Bot URL&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;     :  Enter the url of your bot that you uploaded in web server.&lt;br /&gt;
&lt;i&gt;Example : http://lodge4hacker.com/test.php&lt;/i&gt;&lt;br /&gt;
That's it, Now your IM bot is created!!.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdttobeRlMnbt0louCcaW4tH0JtGXp04P53V0Vdj0sH5daZXMTik63uX_qWUdqbbX_eiv61aqmCBQEn4mAmMn9MksvqceLTK5DxWkEernsjy2w7ckR3S84av7VTSkKqWDwlb3YwKmSWX8/s1600/Create+Imified+bot.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="272" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhdttobeRlMnbt0louCcaW4tH0JtGXp04P53V0Vdj0sH5daZXMTik63uX_qWUdqbbX_eiv61aqmCBQEn4mAmMn9MksvqceLTK5DxWkEernsjy2w7ckR3S84av7VTSkKqWDwlb3YwKmSWX8/s400/Create+Imified+bot.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;✔ Finally add bot to your IM friends list and enjoy chat with your bot. This is a simple bot creation steps, you can a create your own bot to do things for you. Imified provides you a feature to connect bot to your existing IM account.&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIq2ZgHbjkHAu4bFQ3rwsgSMEQOHtG73VcJJKvlwR3vOB1u0NSqGNJxyqGcJe5WUzVtqSV_Mww88xXybvxOMmThTQYB5i2RK3JMjLbFgi46AMsz6p-Dhs4Y-sOvanAJY5zW5Y0FvC6YqI/s1600/Gtalk+bot.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIq2ZgHbjkHAu4bFQ3rwsgSMEQOHtG73VcJJKvlwR3vOB1u0NSqGNJxyqGcJe5WUzVtqSV_Mww88xXybvxOMmThTQYB5i2RK3JMjLbFgi46AMsz6p-Dhs4Y-sOvanAJY5zW5Y0FvC6YqI/s320/Gtalk+bot.jpg" width="212" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;br /&gt;
Imified provides a best platform to create your own Innovative And Inspiring bot,which helps you to do things faster. If you like this post please give your feedback with few lines in a below comment box.&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxklSrAePRnhGrXhaY9kLSlpCQD2MvRF24TZyDa_qbry0XuGLvdXdqllrV9Smq69MamvRsqrtK4PdlzXsXxfogpQfbepLLtrT6PeUhOYNEfLnFZTG_lajiAqMmqzUBhOrXO-Xfu1j6Gx8/s72-c/IM+bot.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Free "The Hackers Underground Handbook" E-Book</title><link>http://lodge4hacker.blogspot.com/2011/08/free-hackers-underground-handbook-e.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sat, 13 Aug 2011 07:21:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-3608110192262704845</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbixVvRXf7mmzZE3ztyeQ7Fjqa_gRGFQdmcBzTZvO7FX2tGLqsZIzDRi3q5g3lnQGoKNChH5uC-t-_iLJU8VJKFRfHUc1Nl2glsUH8Xb67nLc5jiW9F7VNHMkOj8rEPB2gx5CmvvUwoVA/s1600/The+Hackers+Underground+Handbook.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbixVvRXf7mmzZE3ztyeQ7Fjqa_gRGFQdmcBzTZvO7FX2tGLqsZIzDRi3q5g3lnQGoKNChH5uC-t-_iLJU8VJKFRfHUc1Nl2glsUH8Xb67nLc5jiW9F7VNHMkOj8rEPB2gx5CmvvUwoVA/s320/The+Hackers+Underground+Handbook.png" width="252" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;b&gt;The Hacker's Underground Handbook&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;i&gt;Learn How to Hack and What It Takes to Crack Even the Most Secure Systems!&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;Author&lt;/b&gt;&lt;br /&gt;
David Melnichuk&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Website&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://learn-how-to-hack.net/"&gt;Learn How To Hack&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Description&lt;/b&gt;&lt;br /&gt;
The information given in this underground handbook will put you into a hacker's mindset and teach you all of the hacker's secret ways.The Hacker's Underground Handbook is for the people out there that wish to get into the the amazing field of hacking. It introduces you to many topics like programming, Linux, password cracking, network hacking, Windows hacking, wireless hacking, web hacking and malware. Each topic is introduced with an easy to follow, real-world example. The book is written in simple language and assumes the reader is a complete beginner.&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;a href="http://adf.ly/2LG9X"&gt;!Download!&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #999999; font-size: large;"&gt;---------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Mirror&lt;/b&gt; : &lt;a href="http://adf.ly/2LG9X"&gt;Hacker's Lodge&lt;/a&gt;&lt;br /&gt;
&lt;b&gt;Mirror&lt;/b&gt; : &lt;a href="http://thepiratebay.org/torrent/5339707/The_Hackers_Underground_Handbook.pdf"&gt;The Pirate Bay&lt;/a&gt; [&lt;i&gt;Torrent&lt;/i&gt;]&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #999999; font-size: large;"&gt;---------------------------------------------------------------------------------------------&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;More Hacking Books Here:&lt;/b&gt;&lt;br /&gt;
&lt;a href="http://www.amazon.com/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441?ie=UTF8&amp;amp;tag=hacslod-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="Hacking: The Art of Exploitation, 2nd Edition" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=1593271441&amp;amp;tag=hacslod-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=hacslod-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=1593271441" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&amp;nbsp; &amp;nbsp;&lt;a href="http://www.amazon.com/Hacking-Next-Generation-Animal-Guide/dp/0596154577?ie=UTF8&amp;amp;tag=hacslod-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="Hacking: The Next Generation (Animal Guide)" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=0596154577&amp;amp;tag=hacslod-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=hacslod-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=0596154577" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&amp;nbsp;&amp;nbsp;&lt;a href="http://www.amazon.com/Ninja-Hacking-Unconventional-Penetration-Techniques/dp/1597495883?ie=UTF8&amp;amp;tag=hacslod-20&amp;amp;link_code=bil&amp;amp;camp=213689&amp;amp;creative=392969" imageanchor="1" target="_blank"&gt;&lt;img alt="Ninja Hacking: Unconventional Penetration Testing Tactics and Techniques" src="http://ws.amazon.com/widgets/q?MarketPlace=US&amp;amp;ServiceVersion=20070822&amp;amp;ID=AsinImage&amp;amp;WS=1&amp;amp;Format=_SL160_&amp;amp;ASIN=1597495883&amp;amp;tag=hacslod-20" /&gt;&lt;/a&gt;&lt;img alt="" border="0" height="1" src="http://www.assoc-amazon.com/e/ir?t=hacslod-20&amp;amp;l=bil&amp;amp;camp=213689&amp;amp;creative=392969&amp;amp;o=1&amp;amp;a=1597495883" style="border: none !important; margin: 0px !important; padding: 0px !important;" width="1" /&gt;&lt;/div&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbixVvRXf7mmzZE3ztyeQ7Fjqa_gRGFQdmcBzTZvO7FX2tGLqsZIzDRi3q5g3lnQGoKNChH5uC-t-_iLJU8VJKFRfHUc1Nl2glsUH8Xb67nLc5jiW9F7VNHMkOj8rEPB2gx5CmvvUwoVA/s72-c/The+Hackers+Underground+Handbook.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">5</thr:total></item><item><title>Google Logos and Doodles Collection</title><link>http://lodge4hacker.blogspot.com/2011/08/google-logos-and-doodles-collection.html</link><author>noreply@blogger.com (Sivasankar)</author><pubDate>Sun, 7 Aug 2011 10:00:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3672839352220267098.post-6315677784562326384</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b&gt;&lt;a href="http://www.google.com/"&gt;Google&lt;/a&gt;&lt;/b&gt; Search or Google Web Search is a web search engine owned by Google Inc. and is the most used search engine on the Web. Google Doodle is a creative way to show current holidays, famous birthdays, notable inventions, major events or even its own updates through the Google logo. Google Doodle logos include both static and interactive logos. Clicking on a Google Doodle links to a string of Google search results about the topic. Google began in January 1996, since from 1996 Google release a various logos&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href="http://www.google.com/logos/"&gt;Google Doodle&lt;/a&gt;&lt;/b&gt; provides a collection of all Google logos commemorating holidays and events around the world here is some top doodles. Google Doodle service is&amp;nbsp;officially&amp;nbsp;provided to&amp;nbsp;Google&amp;nbsp;fans/user to get archived collection of&amp;nbsp;Google&amp;nbsp;doodles/logos.&lt;br /&gt;
&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="120" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn1bpIFApQUurgjo8a_i0JFd7c8U1k2CL-JOnh9rHHYKpjknrU3aNjI6kY00UYx_Lq-JStpWBBq54y4-hq3v_w-seoeSiWuSTK3U0NAgGGhHh8kqmHLN2ZJlp6xCg7iD9I5ZM3aPAWGbI/s320/Jan+20%252C+2011+50th+Anniversary+of+JFK%2527s+Inaugural.jpg" style="margin-left: auto; margin-right: auto;" width="320" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Jan 20, 2011 - 50th Anniversary of JFK's Inaugural&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img border="0" height="123" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1T7AxaPavBYBGiG6JnIzXwKuRJELYYxvsLUnIvmeAw6x1niyW_TEzHPcM3XM9QkQ1Xq3sBg2oEbDmzURLuBK1O6c0fBScYUZNtgFmmAzYq6soNbvNgZIpOW5tjfbnjX_C45DFVPyw-wY/s320/Jul+20+2011+-+Gregor+Mendel%2527s+189th+Birthday.jpg" width="320" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;Jul 20, 2011 - Gregor Mendel's 189th Birthday&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="margin-left: auto; margin-right: auto;"&gt;&lt;a href="http://www.google.com/logos/bunsen.html"&gt;&lt;img border="0" height="130" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiM8yDS-4OYuOMaxT085ktsGyCc-9Xi1oIbRCcWr1iQ71z8nda5LTdrn7hlYrjQ1qnX1K_igcuzoOyismgmCbdrvhsAhyphenhyphenNAVElw7WFTFQey4Q7Y3HwLOSF-r-Pptbwhj4gCEJlYUuR8Z8o/s320/Mar+31%252C+2011Robert+Bunsen%2527s+200th+Birthday.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="http://www.google.com/logos/bunsen.html"&gt;Mar 31, 2011 - Robert Bunsen's 200th Birthday&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="margin-left: auto; margin-right: auto;"&gt;&lt;a href="http://www.google.com/logos/2011/graham.html"&gt;&lt;img border="0" height="124" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhD33KoUIuwL40XexXN5to0fdKOQyZ44PCeUCzkWXTwjZGdo98owCHuZ4BrR-LEyRl3Io5IJQsEnnbRmJHETmqKFUtJdksZn6vxWJtFkd5Te4BK8VaMWi8xEV67Cv3DTseM3b1div3845o/s320/May+11%252C+2011Martha+Graham%2527s+117th+Birthday.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="http://www.google.com/logos/2011/graham.html"&gt;May 11, 2011 - Martha Graham's 117th Birthday&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="margin-left: auto; margin-right: auto;"&gt;&lt;a href="http://www.google.com/logos/2011/lespaul.html"&gt;&lt;img border="0" height="111" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfeCXkqhXICmvtJr0Px1lI57QzH9lkhZu1AB-ZkXMuB-TRyWUByFDEJM1Jeday1Dw2-NVLx7VIbBSRuEN-7y59jOwb_F83qDTxhZux37em83UFPDX5gDkdd7bnz6EqarlWroi-AeOxTKg/s320/Jun+09+2011+Les+Paul%2527s+96th+Birthday.png" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;a href="http://www.google.com/logos/2011/lespaul.html"&gt;Jun 09, 2011 - Les Paul's 96th Birthday&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: red; font-size: large;"&gt;&lt;a href="http://www.google.com/logos/"&gt;Google Logos and Doodles Collection&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: center;"&gt;&lt;span class="Apple-style-span" style="color: red; font-size: x-small;"&gt;&lt;a href="http://www.google.com/logos/"&gt;(Click Here to Get More Collection)&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b&gt;Note :&lt;/b&gt; First &lt;b&gt;two&lt;/b&gt; doodles are statics and next&lt;b&gt; three &lt;/b&gt;are an interactive doodles click on image to view full doodle&lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&lt;/span&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjn1bpIFApQUurgjo8a_i0JFd7c8U1k2CL-JOnh9rHHYKpjknrU3aNjI6kY00UYx_Lq-JStpWBBq54y4-hq3v_w-seoeSiWuSTK3U0NAgGGhHh8kqmHLN2ZJlp6xCg7iD9I5ZM3aPAWGbI/s72-c/Jan+20%252C+2011+50th+Anniversary+of+JFK%2527s+Inaugural.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>