<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>hacking info and tools</title><description></description><managingEditor>noreply@blogger.com (Somendra meena)</managingEditor><pubDate>Mon, 25 Aug 2025 09:55:28 -0700</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">168</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://hackinginfoandtools.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Giveaway of the Month: Zemana AntiLogger</title><link>http://hackinginfoandtools.blogspot.com/2012/03/giveaway-of-month-zemana-antilogger.html</link><category>Computer. Anti-Virus</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 27 Mar 2012 11:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-8934414197936688350</guid><description>Giveaway of the Month: Zemana AntiLogger &lt;br /&gt;
&lt;div style="color: #555555; font-family: Georgia,Helvetica,Arial,Sans-Serif; font-size: 13px; font-size: 13px; line-height: 140%; margin: 9px 0 3px 0;"&gt;Posted: 03 Dec 2011 11:08 AM PST&lt;/div&gt;&lt;div style="color: black; font-family: Georgia,Helvetica,Arial,Sans-Serif; font-size: 13px; line-height: 140%; margin: 0;"&gt;&lt;div style="font-weight: bold; text-align: center;"&gt;Stop hackers now with Zemana AntiLogger!&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;HackPcOnline.Com&lt;/span&gt; is giving away five &lt;span style="font-weight: bold;"&gt;Zemana AntiLogger&lt;/span&gt; licenses. Five lucky readers will win! Winners will be announced on 31th December.&lt;br /&gt;
&lt;br /&gt;
Nothing happens until it happens to you. The same applies to identity theft as well, as more and more Internet users have become the victims of hackers looking for private details. If you wish to stay on the safe side and make sure that there's no attacker waiting for you to provide some valuable information, you might want to give Zemana AntiLogger a shot.&lt;br /&gt;
&lt;br /&gt;
&lt;img alt="" border="0" id="BLOGGER_PHOTO_ID_5681975673510547730" src="http://3.bp.blogspot.com/-dE0nCbUuWyc/TtpuxUoB0RI/AAAAAAAAFlk/Mjplb_N1AdU/s400/Zamana%2BAntiKogger.jpg" style="display: block; height: 328px; margin: 0px auto 10px; text-align: center; width: 400px;" /&gt;&lt;br /&gt;
&lt;br /&gt;
Although a security app, this is not an antivirus, but it could collaborate with such a software solution to deliver the most advanced defense for your system. It's able to &lt;span style="font-weight: bold;"&gt;detect keyloggers, screen loggers, webcam loggers and clipboard loggers&lt;/span&gt; without slowing down Windows and, more importantly, without breaking the other security tools that might be running on your machine.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Zemana AntiLogger Features:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;SSL Logger protection:&lt;/span&gt; &lt;span style="color: #cc0000;"&gt;(WORLD FIRST!)&lt;/span&gt; 128-bit encryption reliably secures data during online shopping and high-value financial transactions. Unfortunately, a new generation of spyware grabs your data just before it becomes safely encrypted!&lt;br /&gt;
Zemana AntiLogger's unique proactive protection prevents your personal information from being stolen while you are conducting online banking transactions or e-commerce using an encrypted 128-bit SSL (Secure Socket Layer).&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;Webcam Logger protection:&lt;/span&gt; &lt;span style="color: #cc0000;"&gt;(WORLD FIRST!)&lt;/span&gt; Is Big Brother watching you? Hackers and spyware can seize control of your webcam, even when it's switched off! Needless to say, Zemana AntiLogger prevents this.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;Key Logger protection:&lt;/span&gt; Keyloggers record whatever you type by monitoring the keyboard. This renders most security useless, but not Zemana AntiLogger!&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;Clipboard Logger protection:&lt;/span&gt; Copying, cutting and pasting sends potentially sensitive data to your Windows clipboard where malware can get at it. Fortunately, Zemana AntiLogger deals with all attempts at malicious monitoring, including memory capture.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;Screen Logger protection:&lt;/span&gt; Just as you can take a screen capture, screenlogger malware snaps the screen at your most vulnerable moments, e.g., when you are plugging in sensitive data such as bank account information with VirtualKeyboard. Zemana Anti-Screen Logger spots this suspicious activity in ways that go beyond the standard, signature-based anti-logging algorithms.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #006600; font-weight: bold;"&gt;System Defense:&lt;/span&gt; Malware likes to get at your registry, your physical memory (RAM), and other sensitive areas so it can inject malicious code and seize control of your PC. Zemana AntiLogger guards against all this, securing the very heart of your machine.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000; font-weight: bold;"&gt;Protection Highlights&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;No need to download latest signatures:&lt;/span&gt; Unlike old-fashioned antivirus and anti-spyware products, AntiLogger does not wait to receive malware signatures in order to prevent malware attacks. You never have to worry about getting the latest update.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Compatible with commonly used security software:&lt;/span&gt; Signature-based anti-malware, personal firewall, disk encryption, and many other client security tools can continue to operate normally with AntiLogger.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Proactive Modules:&lt;/span&gt; Monitors installation, registry and file changes, spotting and stopping all suspicious behavior.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Bulletproof self-defense:&lt;/span&gt; AntiLogger  cannot be deactivated by targeted attacks, ensuring continuity of protection.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: 130%;"&gt;&lt;span style="font-weight: bold;"&gt;How do I win it?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Step 1:&lt;/span&gt; Like this post by clicking the Facebook Like button.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Step 2:&lt;/span&gt; Retweet this post by clicking the Twitter Button.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-weight: bold;"&gt;Step 3:&lt;/span&gt; Leave a comment below (or if you want to keep your privacy use the &lt;span style="font-weight: bold;"&gt;contact form&lt;/span&gt;) with your:&lt;br /&gt;
&lt;br /&gt;
- Name&lt;br /&gt;
- Facebook ID (name &amp;amp; lastname)&lt;br /&gt;
- Twitter ID&lt;br /&gt;
- Email&lt;br /&gt;
&lt;br /&gt;
If you don't have Twitter and Facebook account you can't participate in this contest.&lt;br /&gt;
&lt;div class="blogger-post-footer"&gt;&lt;img alt="" height="1" src="https://blogger.googleusercontent.com/tracker/3582765462397882899-9010970039289005920?l=www.hackpconline.com" width="1" /&gt;&lt;/div&gt;&lt;/div&gt;&lt;br /&gt;
&lt;table id="footer" style="border-top: 1px solid #999; margin-top: 1.5em; padding-top: 4px; width: 100%;"&gt;&lt;tbody&gt;
&lt;tr&gt; &lt;td style="color: #333333; font-family: Helvetica,Arial,Sans-Serif; font-size: 11px; margin: 0 6px 1.2em 0; text-align: left;"&gt;&lt;br /&gt;
&lt;/td&gt; &lt;td style="color: #333333; font-family: Helvetica,Arial,Sans-Serif; font-size: 11px; margin: 0 6px 1.2em 0; text-align: right; vertical-align: top;"&gt;&lt;br /&gt;
&lt;/td&gt; &lt;/tr&gt;
&lt;tr&gt; &lt;td colspan="2" style="color: #333333; font-family: Helvetica,Arial,Sans-Serif; font-size: 11px; margin: 0 6px 1.2em 0; text-align: left;"&gt;&lt;br /&gt;
&lt;/td&gt; &lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/-dE0nCbUuWyc/TtpuxUoB0RI/AAAAAAAAFlk/Mjplb_N1AdU/s72-c/Zamana%2BAntiKogger.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Create Automated Blogger Blogs</title><link>http://hackinginfoandtools.blogspot.com/2011/11/how-to-create-automated-blogger-blogs.html</link><category>Blogger</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sat, 19 Nov 2011 09:28:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-926384991079093638</guid><description>&lt;iframe allowfullscreen="" frameborder="0" height="349" src="http://www.youtube.com/embed/oC0kRqbsnG4?hl=en&amp;amp;fs=1" width="450"&gt;&lt;/iframe&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/oC0kRqbsnG4/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Setup Parental Controls In Windows 7</title><link>http://hackinginfoandtools.blogspot.com/2011/08/how-to-setup-parental-controls-in.html</link><category>windows 7</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 9 Aug 2011 21:26:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-2397792757833130713</guid><description>&lt;div style="text-align: center;"&gt;&lt;object style="height: 390px; width: 500px"&gt;&lt;param name="movie" value="http://www.youtube.com/v/_ls9HxaGokM?version=3"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowScriptAccess" value="always"&gt;&lt;embed src="http://www.youtube.com/v/_ls9HxaGokM?version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" height="390" width="500"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Backup Your Data to a Virtual Hard Drive in Windows 7</title><link>http://hackinginfoandtools.blogspot.com/2011/08/how-to-backup-your-data-to-virtual-hard.html</link><category>windows 7</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 9 Aug 2011 21:25:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-1697665871020876406</guid><description>&lt;div style="text-align: center;"&gt;&lt;object style="height: 390px; width: 500px"&gt;&lt;param name="movie" value="http://www.youtube.com/v/_ls9HxaGokM?version=3"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowScriptAccess" value="always"&gt;&lt;embed src="http://www.youtube.com/v/_ls9HxaGokM?version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" height="390" width="500"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Publish Your Latest Blog Posts Automatically to Facebook Fan Page</title><link>http://hackinginfoandtools.blogspot.com/2011/06/how-to-publish-your-latest-blog-posts.html</link><category>Facebook</category><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-3369253213981615158</guid><description>SS Graffiti is the app which help you to publish your blog posts to your facebook profile or fan page Automatically .&lt;br /&gt;
These app monitors your blog for any update and publish it  automatically to your facebook profile or fan page so you don’t have to  share your blog posts manually to your facebook friends, everytime you  update your blog.&lt;span id="more-4798"&gt;&lt;/span&gt;&lt;br /&gt;
Open &lt;a href="http://apps.facebook.com/rssgraffiti" target="_blank"&gt;RSS Graffiti App&lt;/a&gt;, Grant permission to that app to access your Page&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
Choose your profile or fan page from left column and click green “&lt;strong&gt;+Add Feed&lt;/strong&gt;” button on the right.&lt;br /&gt;
Put in your blog’s feed URL and make other changes below that.Click  Preview to confirm the link and to view how it will look like as an  update status.&lt;br /&gt;
Hit “&lt;strong&gt;Save&lt;/strong&gt;” and that’s it.&lt;br /&gt;
Now your Post will be published automatically in your Facebook profile or pages.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to View Check Country Wise Adsense Earning Report</title><link>http://hackinginfoandtools.blogspot.com/2011/06/how-to-view-check-country-wise-adsense.html</link><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-6463656861050140670</guid><description>You can now track your adsense performance based on where your users  are .Countries report will help you to track from were you are  generating revenue.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
To access that report Go to  &lt;strong&gt;Performance reports&lt;/strong&gt; tab. In the navigation sidebar, click on the “Countries” report. This report will show your site’s earnings by visitor country.&lt;br /&gt;
&lt;br /&gt;
&lt;span id="more-4802"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Please note that the countries report won’t contain historical  earnings data prior to when this feature is made available in your  account.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>View and Manage Detail History of Orkut Communities Page</title><link>http://hackinginfoandtools.blogspot.com/2011/06/view-and-manage-detail-history-of-orkut.html</link><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-7855696561826324009</guid><description>Moderators can now view the history of all important administrative  actions taken in the community — both his and those of other moderators —  in the last six months, including:&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span id="more-4810"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;members removed ,join requests that were declined&lt;/li&gt;
&lt;li&gt;users banned or un-banned&lt;/li&gt;
&lt;li&gt;co-owners and moderators added or removed&lt;/li&gt;
&lt;li&gt;topics, replies or polls deleted by a moderator&lt;/li&gt;
&lt;/ul&gt;History page is available in community page and only owner and moderators can view the admin history page.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>4Share Block Stop USB Drives Pen Drive To Spread Virus on Your Pc or Computer</title><link>http://hackinginfoandtools.blogspot.com/2011/06/4share-block-stop-usb-drives-pen-drive.html</link><category>Passwords</category><category>windows</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-4868062060192581063</guid><description>PenDrive Locker/Unlocker utility is a small, simple yet truly  portable&amp;nbsp;program designed to unlock windows registry which prevent  someone to&amp;nbsp;use Flash Drive/Mass Storage/External Drive on USB port.&lt;br /&gt;
&lt;span id="more-4814"&gt;&lt;/span&gt;&lt;br /&gt;
This programme is useful to prevent your computer from virus and spywares that spread from pendrive  .You can use PenDriveLocker/Unlocker to limit access by setting Read  Only, or totally&amp;nbsp;disallow the use of flash drive by selecting Disabled.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
You can use this program to&amp;nbsp;inspect and reset USB setting to original  value and see if that helps.&amp;nbsp;you can also&amp;nbsp;use this small program to  enable USB port for flash drive, transfer&amp;nbsp;your personal belonging and  disable it back.&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;&lt;a href="http://www.box.net/shared/lsn8g2gtz4" target="_blank" title="pendrive locker"&gt;Download Pendrive Locker&lt;/a&gt;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;This program&amp;nbsp;also suitable for system administrator to limit or totally disable USB&amp;nbsp;mass storage device within organisation.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Stop Delete Remove Ask.com Toolbar or Search Completely From Your PC</title><link>http://hackinginfoandtools.blogspot.com/2011/06/stop-delete-remove-askcom-toolbar-or.html</link><category>windows</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:30:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-6674836293145717878</guid><description>Ask.com Toolbar is disturbing you in your browsing , want to  uninstall this completely from your Internet explore and Firefox browser  ,If yes then follow below guide and you can easily remove Ask toolbar  &amp;nbsp;from your system.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span id="more-4834"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong&gt;Windows XP:&lt;/strong&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Close all open Web browsers&lt;/li&gt;
&lt;li&gt;From the “&lt;strong&gt;Start&lt;/strong&gt;” menu in Windows, select “&lt;strong&gt;Control Panel&lt;/strong&gt;“&lt;/li&gt;
&lt;li&gt;Select “&lt;strong&gt;Add/Remove Programs&lt;/strong&gt;“&lt;/li&gt;
&lt;li&gt;Select the program with the Ask logo and the text “&lt;strong&gt;Ask Toolbar&lt;/strong&gt;” (or ask .com partner’s brand for a custom Toolbar)&lt;/li&gt;
&lt;li&gt;Click “&lt;strong&gt;Change/Remove&lt;/strong&gt;“&lt;/li&gt;
&lt;/ol&gt;&lt;strong&gt;Windows Vista:&lt;/strong&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Close all open Web browsers&lt;/li&gt;
&lt;li&gt;From the “&lt;strong&gt;Start&lt;/strong&gt;” menu in Windows, select “&lt;strong&gt;Control Panel”&lt;/strong&gt;. Under the “Programs” icon, select “Uninstall a program”&lt;/li&gt;
&lt;li&gt;Select the program with the Ask logo and the text “Ask Toolbar” (or ask.com partner’s brand for a custom Toolbar)&lt;/li&gt;
&lt;li&gt;Click “&lt;strong&gt;Uninstall&lt;/strong&gt;” and then “&lt;strong&gt;Continue&lt;/strong&gt;” to remove the Toolbar&lt;/li&gt;
&lt;/ol&gt;&lt;strong&gt;Windows 7:&lt;/strong&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;From your computer’s ‘&lt;strong&gt;Start&lt;/strong&gt;‘ button, select &lt;strong&gt;‘Control Panel&lt;/strong&gt;‘&lt;/li&gt;
&lt;li&gt;Click the &lt;strong&gt;“Uninstall a Program”&lt;/strong&gt; option found under the “Programs” category&lt;/li&gt;
&lt;li&gt;Select the program with the Ask logo and the text “&lt;strong&gt;Ask Toolbar&lt;/strong&gt;” (or ask.com partner’s brand for a custom Toolbar)&lt;/li&gt;
&lt;li&gt;Click ‘Remove’&lt;/li&gt;
&lt;/ol&gt;&lt;strong&gt;You can also uninstall the toolbar directly from the toolbar&lt;/strong&gt;&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Click on the chevron (down arrow) on the Option button on the toolbar&lt;/li&gt;
&lt;li&gt;Select “&lt;strong&gt;Uninstall&lt;/strong&gt;” from the drop down menu&lt;/li&gt;
&lt;li&gt;Click “Yes” when asked “&lt;strong&gt;Are you sure you want to uninstall this product&lt;/strong&gt;“&lt;/li&gt;
&lt;li&gt;Close all open web browsers&lt;/li&gt;
&lt;li&gt;Click “OK” on the popup window&lt;/li&gt;
&lt;/ol&gt;&lt;strong&gt;Reboot your computer&lt;/strong&gt; to ensure that the uninstall process is complete.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Unlock And Play all Angry Birds Levels In Chrome Browser</title><link>http://hackinginfoandtools.blogspot.com/2011/06/unlock-and-play-all-angry-birds-levels.html</link><category>Games</category><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:29:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-7013494308523101434</guid><description>If you are playing Angry Birds Game from your Chrome browser and Want to play next level game without Completing all other levels then you can easily do this using below java tricks.&lt;br /&gt;
To unlock and access all levels of Angry Birds for Chrome, copy and paste below code in the address bar and hit enter.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span id="more-4849"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;pre&gt;&lt;span style="color: blue;"&gt;javascript: var &lt;span style="color: red;"&gt;i = 0&lt;/span&gt;; while (i&amp;lt;=69) { localStorage.setItem(‘level_star_’+i,’3?); i++; } window.location.reload();&lt;/span&gt;&lt;/pre&gt;To LocK Level again  copy and paste below code in the address bar and hit enter.&lt;br /&gt;
&lt;pre&gt;&lt;span style="color: blue;"&gt;javascript: var &lt;span style="color: red;"&gt;i = 1&lt;/span&gt;; while (i&amp;lt;=69) { localStorage.setItem(‘level_star_’+i,’-1?); i++; } window.location.reload();&lt;/span&gt;&lt;/pre&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Stop or Block Search Engines from Tracking Webpages you Visit</title><link>http://hackinginfoandtools.blogspot.com/2011/06/stop-or-block-search-engines-from.html</link><category>Search Engines</category><category>Webpages</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 5 Jun 2011 10:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-3781114538867291692</guid><description>Disconnect is a browser extension that stops major third parties and  search engines from tracking the webpages you go to and searches you do.&lt;span id="more-4859"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Disables third-party tracking&lt;/li&gt;
&lt;li&gt;Truly depersonalizes searches&lt;/li&gt;
&lt;li&gt;Shows blocked requests&lt;/li&gt;
&lt;li&gt;Allows easy unblocking&lt;a name='more'&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;Disconnect is available for Firefox, Chrome, and Safari , You can &lt;a href="http://www.disconnect.me/" target="_blank" title="block or stop tracking"&gt;install&lt;/a&gt; Disconnect on all these browser .</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to trace a hacker?</title><link>http://hackinginfoandtools.blogspot.com/2011/03/how-to-trace-hacker.html</link><category>hack</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 29 Mar 2011 01:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-7444551893018969291</guid><description>&lt;h3&gt;How to trace a hacker?&lt;/h3&gt;&lt;div style="float: right; margin: 0pt 1em 0.75em 7pt;"&gt;&lt;/div&gt;Sometimes, it’s just not enough to simply know that there’s a  Trojan or Virus onboard. Sometimes you need to know exactly why that  file is onboard, how it got there - but most importantly, who put it  there.&lt;br /&gt;
By enumerating the attacker in the same way that they have  enumerated the victim, you will be able to see the bigger picture and  establish what you’re up against. But how can you do this?&amp;nbsp; &lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;Connections make the world go round &lt;/h3&gt;The computer world, at any rate. Every single time you open  up a website, send an email or upload your webpages into cyberspace, you  are connecting to another machine in order to get the job done. This,  of course, presents a major problem, because this simple act is what  allows malicious users to target a machine in the first place.&lt;br /&gt;
&lt;h3&gt;How do these people find their victim?&lt;/h3&gt;Well, first of all, they need to get hold of the victim’s IP  Address. Your IP (Internet Protocol) address reveals your point of entry  to the Internet and can be used in many ways to cause your online  activities many, many problems. It may not reveal you by name, but it  may be uniquely identifiable and it represents your digital ID while you  are online (especially so if you’re on a fixed IP / DSL etc).&lt;br /&gt;
With an IP address, a Hacker can find out all sorts of weird  and wonderful things about their victim (as well as causing all kinds of  other trouble, the biggest two being Portnukes/Trojans and the dreaded  DoS ((Denial of Service)) attack). Some Hackers like to collect IP  Addresses like badges, and like to go back to old targets, messing them  around every so often. An IP address is incredibly easy to obtain -  until recently, many realtime chat applications (such as MSN) were  goldmines of information. Your IP Address is contained as part of the  Header Code on all emails that you send and webpages that you visit can  store all kinds of information about you. A common trick is for the  Hacker to go into a Chatroom, paste his supposed website address all  over the place, and when the unsuspecting victim visits, everything  about your computer from the operating system to the screen resolution  can be logged…and, of course, the all important IP address. In addition,  a simple network-wide port scan will reveal vulnerable target machines,  and a war-dialler will scan thousands of lines for exposed modems that  the hacker can exploit.&lt;br /&gt;
So now that you know some of the basic dangers, you’re probably wondering how these people connect to a victim’s machine?&lt;br /&gt;
&lt;h3&gt;Virtual and Physical Ports &lt;/h3&gt;Everything that you recieve over the Internet comes as a  result of other machines connecting to your computer’s ports. You have  two types; Physical are the holes in the back of your machine, but the  important ones are Virtual. These allow transfer of data between your  computer and the outside world, some with allocated functions, some  without, but knowing how these work is the first step to discovering who  is attacking you; you simply MUST have a basic knowledge of this, or  you won’t get much further.&lt;br /&gt;
&lt;h3&gt;What the phrases TCP/UDP actually mean&lt;/h3&gt;TCP/IP stands for Transmission Control Protocol and Internet  Protocol, a TCP/IP packet is a block of data which is compressed, then a  header is put on it and it is sent to another computer (UDP stands for  User Datagram Protocol). This is how ALL internet transfers occur, by  sending packets. The header in a packet contains the IP address of the  one who originally sent you it. Now, your computer comes with an  excellent (and free) tool that allows you to see anything that is  connected (or is attempting to connect) to you, although bear in mind  that it offers no blocking protection; it simply tells you what is going  on, and that tool is NETSTAT.&lt;br /&gt;
&lt;h3&gt;Netstat: Your first line of defence &lt;/h3&gt;Netstat is a very fast and reliable method of seeing exactly  who or what is connected (or connecting) to your computer. Open up DOS  (Start/Programs/MS-DOS Prompt on most systems), and in the MSDOS Prompt,  type:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;div class="fragment"&gt;netstat -a &lt;/div&gt;&lt;/blockquote&gt;&lt;br /&gt;
(make sure you include the space inbetween the “t” and the “a”).&lt;br /&gt;
If you’re connected to the Internet when you do this, you should see something like:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;div class="fragment"&gt;Active Connections                      Proto Local Address Foreign Address State&lt;br /&gt;
TCP macintosh: 20034 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED&lt;br /&gt;
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING &lt;/div&gt;&lt;/blockquote&gt;Now, “Proto(col)” simply means what kind of data transmission  is taking place (TCP or UDP), “Local address” is your computer (and the  number next to it tells you what port you’re connected on), “Foreign  Address” is the machine that is connected to you (and what port they’re  using), and finally “State” is simply whether or not a connection is  actually established, or whether the machine in question is waiting for a  transmission, or timing out etc.&lt;br /&gt;
Now, you need to know all of Netstat’s various commands, so type:&lt;br /&gt;
&lt;br /&gt;
&lt;div class="fragment"&gt;&lt;b&gt;netstat ? &lt;/b&gt;&lt;/div&gt;You will get something like this:&lt;br /&gt;
Displays protocol statistics and current TCP/IP network connections.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;div class="fragment"&gt;NETSTAT [-a] [-e] [-n] [-s] [-p proto] [-r] [interval]                      -a Displays all connections and listening ports.&lt;br /&gt;
-e Displays Ethernet statistics. This may be combined with the -s option.&lt;br /&gt;
-n Displays addresses and port numbers in numerical form.&lt;br /&gt;
-p proto Shows connections for the protocol specified by  proto; proto may be TCP or UDP. If used with the -s option to display  per-protocol statistics, proto may be TCP, UDP, or IP.&lt;br /&gt;
-r Displays the routing table.&lt;br /&gt;
-s Displays per-protocol statistics. &lt;/div&gt;&lt;/blockquote&gt;By default, statistics are shown for TCP, UDP and IP; the -p option may be used to specify a subset of the default.&lt;br /&gt;
Have a play around with the various options, but the most  important use of these methods is when you combine them. The best  command to use is&lt;br /&gt;
&lt;blockquote&gt;&lt;div class="fragment"&gt;netstat -an &lt;/div&gt;&lt;/blockquote&gt;because this will list all connections in Numerical Form,  which makes it a lot easier to trace malicious users….Hostnames can be a  little confusing if you don’t know what you’re doing (although they’re  easily understandable, as we shall see later). Also, by doing this, you  can also find out what your own IP address is, which is always useful.&lt;br /&gt;
Also,&lt;br /&gt;
&lt;blockquote&gt;&lt;br /&gt;
&lt;div class="fragment"&gt;netstat -b &lt;/div&gt;&lt;/blockquote&gt;will tell you what ports are open and what programs are connecting to the internet.&lt;br /&gt;
&lt;h3&gt;Types of Port &lt;/h3&gt;It would be impossible to find out who was attacking you if  computers could just access any old port to perform an important  function; how could you tell a mail transfer from a Trojan Attack? Well,  good news, because your regular, normal connections are assigned to  low, commonly used ports, and in general, the higher the number used,  the more you should be suspicious. Here are the three main types of  port:&lt;br /&gt;
&lt;b&gt;Well Known Ports : &lt;/b&gt; These run from 0 to 1023, and are  bound to the common services that run on them (for example, mail runs on  channel 25 tcp/udp, which is smtp (Simple Mail Transfer Protocol) so if  you find one of these ports open (and you usually will), it’s usually  because of an essential function.&lt;br /&gt;
&lt;b&gt;Registered Ports : &lt;/b&gt; These run on 1024 to 49151.  Although not bound to a particular service, these are normally used by  networking utilities like FTP software, Email client and so on, and they  do this by opening on a random port within this range before  communicating with the remote server, so don’t panic (just be wary,  perhaps) if you see any of these open, because they usually close  automatically when the system that’s running on them terminates (for  example, type in a common website name in your browser with netstat  open, and watch as it opens up a port at random to act as a buffer for  the remote servers). Services like MSN Messenger and ICQ usually run on  these Ports.&lt;br /&gt;
&lt;b&gt;Dynamic/Private Ports Ranging from 49152 to 65535 : &lt;/b&gt;  these things are rarely used except with certain programs, and even then  not very often. This is indeed the usual range of the Trojan, so if you  find any of these open, be very suspicious. So, just to recap:&lt;br /&gt;
Well Known Ports 0 to 1023 Commonly used, little danger.&lt;br /&gt;
Registered Ports 1024 to 49151 Not as common, just be careful.&lt;br /&gt;
Dynamic/Private Ports 49152 to 65535 Be extremely suspicious.&lt;br /&gt;
&lt;b&gt;The hunt is on : &lt;/b&gt;&lt;br /&gt;
Now, it is essential that you know what you’re looking for,  and the most common way someone will attack your machine is with a  Trojan. This is a program that is sent to you in an email, or attempts  to bind itself to one of your ports, and when activated, it can give the  user your passwords, access to your hard drive…they can even make your  CD Tray pop open and shut. At the end of this Document, you will find a  list of the most commonly used Trojans and the ports they operate on.  For now, let’s take another look at that first example of Netstat….&lt;br /&gt;
&lt;h3&gt;Active Connections:&lt;/h3&gt;Proto Local Address Foreign Address State&lt;br /&gt;
&lt;br /&gt;
&lt;div class="fragment"&gt;TCP macintosh: 27374 modem-123.tun.dialup.co.uk: 50505 ESTABLISHED&lt;br /&gt;
TCP macintosh: 80 proxy.webcache.eng.sq: 30101 TIME_WAIT&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING&lt;br /&gt;
TCP macintosh MACINTOSH: 0 LISTENING &lt;/div&gt;&lt;br /&gt;
Now, straight away, this should make more sense to you. Your  computer is connected on two ports, 80 and 27374. Port 80 is used for  http/www transmissions (ie for all intents and purposes, its how you  connect to the net, although of course it’s a lot more complicated than  that). Port 27374, however, is distinctly suspicious; first of all, it  is in the registered port range, and although other services (like MSN)  use these, let’s assume that you have nothing at all running like  instant messengers, webpages etc….you’re simply connected to the net  through proxy. So, now this connection is looking even more troublesome,  and when you realise that 27374 is a common port for Netbus (a  potentially destructive Trojan), you can see that something is untoward  here. So, what you would do is:&lt;br /&gt;
1) run Netstat , and use:&lt;br /&gt;
&lt;div class="fragment"&gt;Netstat -a&lt;/div&gt;then&lt;br /&gt;
&lt;div class="fragment"&gt;Netstat -an &lt;/div&gt;&lt;br /&gt;
So you have both Hostnames AND IP addresses.&lt;br /&gt;
&lt;h3&gt;Tracerouting : &lt;/h3&gt;Having the attacker’s IP is all well and good, but what can  you do with it? The answer is, a lot more! It’s not enough to have the  address, you also need to know where the attacker’s connections are  coming from. You may have used automated tracerouting tools before, but  do you jknow how they work?&lt;br /&gt;
&lt;b&gt;Go back to MSDOS and type : &lt;/b&gt;&lt;br /&gt;
tracert *type IP address/Hostname here*&lt;br /&gt;
Now, what happens is, the Traceroute will show you all the  computers inbetween you and the target machine, including blockages,  firewalls etc. More often than not, the hostname address listed before  the final one will belong to the Hacker’s ISP Company. It’ll either say  who the ISP is somewhere in there, or else you run a second trace on the  new IP/hostname address to see who the ISP Company in question is. If  the Hostname that you get back doesn’t actually seem to mention an  actual geographical location within its text, you may think all is lost.  But fear not! Suppose you get a hostname such as&lt;br /&gt;
http://www.haha.com&lt;br /&gt;
Well, that tells us nothing, right? Wrong….simply enter the  hostname in your browser, and though many times you will get nothing  back, sometimes it will resolve to an ISP, and from there you can easily  find out its location and in what areas they operate. This at least  gives you a firm geographical location to carry out your investigations  in.&lt;br /&gt;
If you STILL have nothing, as a last resort you COULD try  connecting to your target’s ISP’s port 13 by Telnet, which will tell you  how many hours ahead or behind this ISP is of GMT, thus giving you a  geographical trace based on the time mentioned (although bear in mind,  the ISP may be doing something stupid like not having their clocks set  correctly, giving you a misleading trace. Similarly, a common tactic of  Hackers is to deliberately have their computer’s clock set to a totally  wrong time, so as to throw you off the scent). Also, unless you know  what you’re doing, I wouldn’t advise using Telnet (which is outside the  parameters of this tutorial).&lt;br /&gt;
&lt;h3&gt;Reverse DNS Query : &lt;/h3&gt;This is probably the most effective way of running a trace on  somebody. If ever you’re in a chatroom and you see someone saying that  they’ve “hacked into a satellite orbiting the Earth, and are taking  pictures of your house right now”, ignore them because that’s just bad  movie nonsense. THIS method is the way to go, with regard to finding out  what country (even maybe what State/City etc) someone resides, although  it’s actually almost impossible to find an EXACT geographical location  without actually breaking into your ISP’s Head Office and running off  with the safe.&lt;br /&gt;
To run an rDNS query, simply go back to MS-DOS and type&lt;br /&gt;
&lt;div class="fragment"&gt;netstat &lt;/div&gt;and hit return. Any active connections will resolve to hostnames rather than a numerical format.&lt;br /&gt;
&lt;h3&gt;DNS : &lt;/h3&gt;DNS stands for Domain Name Server. These are machines  connected to the Internet whose job it is to keep track of the IP  Addresses and Domain Names of other machines. When called upon, they  take the ASCII Domain Name and convert it to the relevant numeric IP  Address. A DNS search translates a hostname into an IP address….which is  why we can enter “www.Hotmail.com” and get the website to come up,  instead of having to actually remember Hotmail’s IP address and enter  that instead. Well, Reverse DNS, of course, translates the IP Address  into a Hostname (ie - in letters and words instead of numbers, because  sometimes the Hacker will employ various methods to stop Netstat from  picking up a correct Hostname).&lt;br /&gt;
So, for example,&lt;br /&gt;
298.12.87.32 is NOT a Hostname.&lt;br /&gt;
mail6.bol.net.au IS a Hostname.&lt;br /&gt;
Anyway, see the section at the end? (au) means the target  lives in Australia. Most (if not all) hostnames end in a specific  Country Code, thus narrowing down your search even further. If you know  your target’s Email Address (ie they foolishly sent you a hate mail, but  were silly enough to use a valid email address) but nothing else, then  you can use the Country codes to deduce where they’re from as well. You  can also deduce the IP address of the sender by looking at the emails  header (a “hidden” line of code which contains information on the  sender)…on Hotmail for example, go to Preferences, and select the “Full  Header’s Visible” option. Alternatively, you can run a “Finger” Trace on  the email address, at:&lt;br /&gt;
www.samspade.org&lt;br /&gt;
Plus, some ISP’s include their name in your Email Address  with them too (ie Wanadoo, Supanet etc), and your Hacker may be using an  email account that’s been provided by a Website hosting company,  meaning this would probably have the website host’s name in the email  address (ie Webspawners). So, you could use the information gleaned to  maybe even hunt down their website (then you could run a website check  as mentioned previously) or report abuse of that Website Provider’s  Email account (and thus, the Website that it goes with) to&lt;br /&gt;
abuse@companynamegoeshere.com&lt;br /&gt;
If your Hacker happens to reside in the USA, go to:&lt;br /&gt;
www.usps.gov/ncsc/lookups/abbr_state.txt&lt;br /&gt;
for a complete list of US State abbreviatons.&lt;br /&gt;
&lt;h3&gt;List of Ports commonly used by Trojans : &lt;/h3&gt;Please note that this isn’t a complete list by any means, but  it will give you an idea of what to look out for in Netstat. Be aware  that some of the lower Ports may well be running valid services.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;UDP: 1349 Back Ofrice DLL&lt;/li&gt;
&lt;li&gt;31337 BackOfrice 1.20&lt;/li&gt;
&lt;li&gt;31338 DeepBO&lt;/li&gt;
&lt;li&gt;54321 BackOfrice 2000&lt;/li&gt;
&lt;li&gt;TCP: 21 Blade Runner, Doly Trojan, Fore, Invisible FTP, WebEx, WinCrash&lt;/li&gt;
&lt;li&gt;23 Tiny Telnet Server&lt;/li&gt;
&lt;li&gt;25 Antigen, Email Password Sender, Haebu Coceda, Shtrilitz Stealth, Terminator, WinPC, WinSpy, Kuang2 0.17A-0.30&lt;/li&gt;
&lt;li&gt;31 Hackers Paradise&lt;/li&gt;
&lt;li&gt;80 Executor&lt;/li&gt;
&lt;li&gt;456 Hackers Paradise&lt;/li&gt;
&lt;li&gt;555 Ini-Killer, Phase Zero, Stealth Spy&lt;/li&gt;
&lt;li&gt;666 Satanz Backdoor&lt;/li&gt;
&lt;li&gt;1001 Silencer, WebEx&lt;/li&gt;
&lt;li&gt;1011 Doly Trojan&lt;/li&gt;
&lt;li&gt;1170 Psyber Stream Server, Voice&lt;/li&gt;
&lt;li&gt;1234 Ultors Trojan&lt;/li&gt;
&lt;li&gt;1243 SubSeven 1.0 - 1.8&lt;/li&gt;
&lt;li&gt;1245 VooDoo Doll&lt;/li&gt;
&lt;li&gt;1492 FTP99CMP&lt;/li&gt;
&lt;li&gt;1600 Shivka-Burka&lt;/li&gt;
&lt;li&gt;1807 SpySender&lt;/li&gt;
&lt;li&gt;1981 Shockrave&lt;/li&gt;
&lt;li&gt;1999 BackDoor 1.00-1.03&lt;/li&gt;
&lt;li&gt;2001 Trojan Cow&lt;/li&gt;
&lt;li&gt;2023 Ripper&lt;/li&gt;
&lt;li&gt;2115 Bugs&lt;/li&gt;
&lt;li&gt;2140 Deep Throat, The Invasor&lt;/li&gt;
&lt;li&gt;2801 Phineas Phucker&lt;/li&gt;
&lt;li&gt;3024 WinCrash&lt;/li&gt;
&lt;li&gt;3129 Masters Paradise&lt;/li&gt;
&lt;li&gt;3150 Deep Throat, The Invasor&lt;/li&gt;
&lt;li&gt;3700 Portal of Doom&lt;/li&gt;
&lt;li&gt;4092 WinCrash&lt;/li&gt;
&lt;li&gt;4567 File Nail 1&lt;/li&gt;
&lt;li&gt;4590 ICQTrojan&lt;/li&gt;
&lt;li&gt;5000 Bubbel&lt;/li&gt;
&lt;li&gt;5000 Sockets de Troie&lt;/li&gt;
&lt;li&gt;5001 Sockets de Troie&lt;/li&gt;
&lt;li&gt;5321 Firehotcker&lt;/li&gt;
&lt;li&gt;5400 Blade Runner 0.80 Alpha&lt;/li&gt;
&lt;li&gt;5401 Blade Runner 0.80 Alpha&lt;/li&gt;
&lt;li&gt;5402 Blade Runner 0.80 Alpha&lt;/li&gt;
&lt;li&gt;5400 Blade Runner&lt;/li&gt;
&lt;li&gt;5401 Blade Runner&lt;/li&gt;
&lt;li&gt;5402 Blade Runner&lt;/li&gt;
&lt;li&gt;5569 Robo-Hack&lt;/li&gt;
&lt;li&gt;5742 WinCrash&lt;/li&gt;
&lt;li&gt;6670 DeepThroat&lt;/li&gt;
&lt;li&gt;6771 DeepThroat&lt;/li&gt;
&lt;li&gt;6969 GateCrasher, Priority&lt;/li&gt;
&lt;li&gt;7000 Remote Grab&lt;/li&gt;
&lt;li&gt;7300 NetMonitor&lt;/li&gt;
&lt;li&gt;7301 NetMonitor&lt;/li&gt;
&lt;li&gt;7306 NetMonitor&lt;/li&gt;
&lt;li&gt;7307 NetMonitor&lt;/li&gt;
&lt;li&gt;7308 NetMonitor&lt;/li&gt;
&lt;li&gt;7789 ICKiller&lt;/li&gt;
&lt;li&gt;8787 BackOfrice 2000&lt;/li&gt;
&lt;li&gt;9872 Portal of Doom&lt;/li&gt;
&lt;li&gt;9873 Portal of Doom&lt;/li&gt;
&lt;li&gt;9874 Portal of Doom&lt;/li&gt;
&lt;li&gt;9875 Portal of Doom&lt;/li&gt;
&lt;li&gt;9989 iNi-Killer&lt;/li&gt;
&lt;li&gt;10067 Portal of Doom&lt;/li&gt;
&lt;li&gt;10167 Portal of Doom&lt;/li&gt;
&lt;li&gt;10607 Coma 1.0.9&lt;/li&gt;
&lt;li&gt;11000 Senna Spy&lt;/li&gt;
&lt;li&gt;11223 Progenic trojan&lt;/li&gt;
&lt;li&gt;12223 Hack´99 KeyLogger&lt;/li&gt;
&lt;li&gt;12345 GabanBus, NetBus&lt;/li&gt;
&lt;li&gt;12346 GabanBus, NetBus&lt;/li&gt;
&lt;li&gt;12361 Whack-a-mole&lt;/li&gt;
&lt;li&gt;12362 Whack-a-mole&lt;/li&gt;
&lt;li&gt;16969 Priority&lt;/li&gt;
&lt;li&gt;20001 Millennium&lt;/li&gt;
&lt;li&gt;20034 NetBus 2.0, Beta-NetBus 2.01&lt;/li&gt;
&lt;li&gt;21544 GirlFriend 1.0, Beta-1.35&lt;/li&gt;
&lt;li&gt;22222 Prosiak&lt;/li&gt;
&lt;li&gt;23456 Evil FTP, Ugly FTP&lt;/li&gt;
&lt;li&gt;26274 Delta&lt;/li&gt;
&lt;li&gt;30100 NetSphere 1.27a&lt;/li&gt;
&lt;li&gt;30101 NetSphere 1.27a&lt;/li&gt;
&lt;li&gt;30102 NetSphere 1.27a&lt;/li&gt;
&lt;li&gt;31337 Back Orifice&lt;/li&gt;
&lt;li&gt;31338 Back Orifice, DeepBO&lt;/li&gt;
&lt;li&gt;31339 NetSpy DK&lt;/li&gt;
&lt;li&gt;31666 BOWhack&lt;/li&gt;
&lt;li&gt;33333 Prosiak&lt;/li&gt;
&lt;li&gt;34324 BigGluck, TN&lt;/li&gt;
&lt;li&gt;40412 The Spy&lt;/li&gt;
&lt;li&gt;40421 Masters Paradise&lt;/li&gt;
&lt;li&gt;40422 Masters Paradise&lt;/li&gt;
&lt;li&gt;40423 Masters Paradise&lt;/li&gt;
&lt;li&gt;40426 Masters Paradise&lt;/li&gt;
&lt;li&gt;47262 Delta&lt;/li&gt;
&lt;li&gt;50505 Sockets de Troie&lt;/li&gt;
&lt;li&gt;50766 Fore&lt;/li&gt;
&lt;li&gt;53001 Remote Windows Shutdown&lt;/li&gt;
&lt;li&gt;54321 SchoolBus .69-1.11&lt;/li&gt;
&lt;li&gt;61466 Telecommando&lt;/li&gt;
&lt;li&gt;65000 Devil&lt;/li&gt;
&lt;li&gt;&lt;br /&gt;
&lt;/li&gt;
&lt;/ul&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Create Steam Fake login Page</title><link>http://hackinginfoandtools.blogspot.com/2011/03/how-to-create-steam-fake-login-page.html</link><category>hack</category><category>steam</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 27 Mar 2011 03:13:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-7641546516014340306</guid><description>Hi Friends Today i telling you new hack How To Create &lt;b&gt;Steam&lt;/b&gt; Fake &lt;b&gt;Login&lt;/b&gt; Page ?. Steam is a digital distribution, digital rights management, multiplayer and communications platform developed by Valve Corporation. It is used to distribute games and related media online, from small independent developers to larger software houses. Steam also has community features, automated game updates, and in-game voice and chat functionality.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFIbqL17axlRotktZLWXG_Eroh5I1Wv9_IqGkexTisiEhP-HAM27pD7GhEga0hli8J-rzxA_A8iMPlHz1rN5VQU0BxfblVtkMUVVP8BG5A4j5KygW3Giu3cYjGShAydwd3kE7WPFNJ_nYy/s1600/steam.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFIbqL17axlRotktZLWXG_Eroh5I1Wv9_IqGkexTisiEhP-HAM27pD7GhEga0hli8J-rzxA_A8iMPlHz1rN5VQU0BxfblVtkMUVVP8BG5A4j5KygW3Giu3cYjGShAydwd3kE7WPFNJ_nYy/s1600/steam.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step.&amp;nbsp; &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You need a online host site. you can create account for free in this sites :-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;a href="http://www.t35.com/" target="new"&gt;www.t35.com&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.110mb.com/" target="new"&gt;www.110mb.com&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://x10hosting.com/" target="new"&gt;www.x10hosting.com&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.000webhost.com/" target="new"&gt;www.000webhost.com&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.blackapplehost.com/" target="new"&gt;www.blackapplehost.com&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://www.freehostia.com/" target="new"&gt;www.freehostia.com&lt;/a&gt;&lt;/blockquote&gt;&lt;br /&gt;
Step 2. After register any site from above just download this two files from below Url. steam.htm and login.php.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;http://www.mediafire.com/?6d90rw37hpc4g71 &lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Step3. After registering login to your file manager of you respective hosting  and upload all the files of the folder which contains the document.&lt;br /&gt;
&lt;br /&gt;
after apply steps you find that when some one type and username and password in your fake page you will get that in your file manager with &lt;b&gt;log.htm&lt;/b&gt;.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFIbqL17axlRotktZLWXG_Eroh5I1Wv9_IqGkexTisiEhP-HAM27pD7GhEga0hli8J-rzxA_A8iMPlHz1rN5VQU0BxfblVtkMUVVP8BG5A4j5KygW3Giu3cYjGShAydwd3kE7WPFNJ_nYy/s72-c/steam.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>earn money online for free</title><link>http://hackinginfoandtools.blogspot.com/2011/03/earn-money-online-for-free.html</link><category>Tips</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Fri, 25 Mar 2011 22:47:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-1000506026742507053</guid><description>Now you can earn money online for free just &lt;a href="https://www.alertpay.com/?eLli58ynAtUjfOJuS%2fJmxQ%3d%3d"&gt;register here&lt;/a&gt;. after register just go&lt;a href="https://www.alertpay.com/referrals.aspx"&gt; here&lt;/a&gt; and send Your Referral URL to your friends...and earn 10$ for 10 people.</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Send SMS Without Registration</title><link>http://hackinginfoandtools.blogspot.com/2011/03/send-sms-without-registration.html</link><category>Mobile Hacking</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Thu, 24 Mar 2011 08:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-8047318523287273349</guid><description>There are a lot of websites on the Internet that provides free sms  services but only handful of them allows you to send Sms without  registration and anonymously. In this post I will review the services of  4 sms websites that allows you to send Anonymous messages.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://smsti.in/send-free-sms/"&gt;&lt;span style="font-weight: bold;"&gt;Smsti.in&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Smsti.in  allows you send message of complete 160 words and without any ads.  There message service is very fast and you can even check the delivery  reports of the sms that has been sent.&lt;br /&gt;
&lt;br /&gt;
They provide their sms services for Indian Mobile numbers only.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://seasms.com/#type"&gt;&lt;span style="font-weight: bold;"&gt;Seasms.com&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;ol&gt;&lt;/ol&gt;&lt;br /&gt;
Seasms  allows you to send messages all over the world. This is the only free  sms service that I found which all allows you to send worldwide messages  anonymously.&lt;br /&gt;
&lt;br /&gt;
They also provide 160 character support for SMS.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://spicesms.com/sendsms.php"&gt;&lt;span style="font-weight: bold;"&gt;Spicesms.com&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Spicesms  allows you to send sms only in India with 130 character support for  sms. Their service is very fast and sms are delivered instantaneously.&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://www.bollywoodmotion.com/free-long-sms-india.html"&gt;&lt;span style="font-weight: bold;"&gt;Bollywoodmotion&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
Bollywoodmotion is one of the best sms website as you can send sms up to 500 characters long.&lt;br /&gt;
&lt;br /&gt;
They  do not include any ads into your message and messages are delivered in  real time.This service is available only for Indian mobile numbers&lt;br /&gt;
&lt;br /&gt;
If you know any other sms services that allows you to send messages without registration then do share with us by commenting.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;span style="font-style: italic; font-weight: bold;"&gt;NOTE:&lt;/span&gt; Don’t send abusive messages to somebody using the above site as you can be traced. &lt;/blockquote&gt;&lt;br /&gt;
Do you have questions, comments, or suggestions? Feel free to post a comment!</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to use Prevx antivirus without License key- Any version</title><link>http://hackinginfoandtools.blogspot.com/2011/03/how-to-use-prevx-antivirus-without.html</link><category>anti</category><category>Computer. Anti-Virus</category><category>hack</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Thu, 24 Mar 2011 08:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-1282798427012666557</guid><description>&lt;span class="data-post"&gt;When we realize that we are infected by spyware,  malware or any&lt;/span&gt;other virus, we&amp;nbsp;certainly end up with mini online  antivirus tools like Prevx. And I am one of them. I got&amp;nbsp;infected by  malware and certainly had to rely on Prevx 3.0.&lt;br /&gt;
&lt;span class="data-post"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;span class="data-post"&gt;&lt;br /&gt;
Unlike other jumbo antivurs softwares, these mini antivirus fetches  their updated virus&amp;nbsp;database without need of downloading any information  to your Computer hence saving space. This is one of the&amp;nbsp;most important  thing if you are considering and suffering from low disk space.&lt;br /&gt;
&lt;a href="http://draft.blogger.com/post-edit.g?blogID=5651791991831731052&amp;amp;postID=1282798427012666557" name="more"&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
But one of the bad point of these kind of software is that, once it  scans your computer and detects the threats, it&amp;nbsp;asks you to enter a license key to remove the virus, which requires you to purchase the license of the software from the vendor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
I see many Google search redirecting to free license key for Prevx 3.0. But I am totally&amp;nbsp;against this illegal thingy. But you (even me) might not be interested to &lt;span class="IL_AD" id="IL_AD1"&gt;invest&lt;/span&gt; your &lt;span class="IL_AD" id="IL_AD3"&gt;money&lt;/span&gt;&amp;nbsp;for it. Rather I found some easy way to &lt;span class="IL_AD" id="IL_AD6"&gt;remove virus&lt;/span&gt; using Prevx 3.0. That is&amp;nbsp;neither&amp;nbsp;hurting Prevx 3.0 nor spending any penny.&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBcKFIUv70JEW0Ythd7GrRCW-3i0isYdpo6vL-uBKew-LYjuOT4GCr3fyhJ3Lt2t6L9aZHhz0vKLFbyIhZjyxlQInu9l2Mw5f-0bQ4s2K68EL9-UMx5Jhc54Hls_i3uTrBg33eOWsANnc/s1600/IMGA.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBcKFIUv70JEW0Ythd7GrRCW-3i0isYdpo6vL-uBKew-LYjuOT4GCr3fyhJ3Lt2t6L9aZHhz0vKLFbyIhZjyxlQInu9l2Mw5f-0bQ4s2K68EL9-UMx5Jhc54Hls_i3uTrBg33eOWsANnc/s320/IMGA.png" width="295" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;First have a look what this mini software offers in the image above. Yes free &lt;b&gt;Scanning and Detection&lt;/b&gt;! We'll going to use this benefit from Prevx.&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;Let's get with the tutorial.&lt;br /&gt;
&lt;br /&gt;
Once you get to know that you are infected with virus go to Prevx homepage and download the&amp;nbsp;latest version.&lt;br /&gt;
&lt;br /&gt;
Run the program and let it scan.&amp;nbsp;Since the virus database lies on their  server it will obviously list out all the virus in your computer.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaC4Dii3nouK7oY08V4NWJfE6dhruqj3vgrkfJ8XXDNUfI-kKCtLJ3fzQ_bSxQ_OFZlomfxsE-gjYUfa_WZs1IY0K1cT_95DweQwoiKkHlovjQBg6zi-OK0UzFA_saXs6K8miZxVMCLUw/s1600/IMGB.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="255" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaC4Dii3nouK7oY08V4NWJfE6dhruqj3vgrkfJ8XXDNUfI-kKCtLJ3fzQ_bSxQ_OFZlomfxsE-gjYUfa_WZs1IY0K1cT_95DweQwoiKkHlovjQBg6zi-OK0UzFA_saXs6K8miZxVMCLUw/s400/IMGB.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
A person having basic computing might click on CleanUp Button which ends with the License&amp;nbsp;Activation window.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjecX8gIzr3-fHNX-4fm5i3YMvuTjUbgLlz0k_RIFKQCU2-0rHZ-asazs1fSgFQBmfjNspK6piPjrh4OMWwU-v2h-z3qm96FX6OdLWH7BsuMNhjz_vkODUNUAUXglzbScXV8jWZtuk1w4/s1600/IMGC.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhjecX8gIzr3-fHNX-4fm5i3YMvuTjUbgLlz0k_RIFKQCU2-0rHZ-asazs1fSgFQBmfjNspK6piPjrh4OMWwU-v2h-z3qm96FX6OdLWH7BsuMNhjz_vkODUNUAUXglzbScXV8jWZtuk1w4/s320/IMGC.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
As you don't have license key, no matter how much you cry, you'll never going to get it for&amp;nbsp;free legally until and unless Prevx itself provides it.&lt;br /&gt;
&lt;br /&gt;
So, we are not going there. Instead note down the location of the virus file as you can see&amp;nbsp;in the second image of this post.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;c:\users\saaz\appdata\local\temp\&lt;/blockquote&gt;&lt;br /&gt;
Open up command prompt window by going to Start&amp;gt;Run type "cmd" without &lt;span class="IL_AD" id="IL_AD2"&gt;quotes&lt;/span&gt; (make sure&amp;nbsp;that you have administrator privilege).&lt;br /&gt;
&lt;br /&gt;
Now go to the virus location.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGFT1cyrILHCIpUJ0bNMRLV8jVguZsGrl-7t-PKtCCR4ULjTAlGHhgpgHxDjFvWR0by4YaGdAK1pzef1TeMdhm58WLJTdXkbGtXcSeCc0Aq0ovQ8CDe-X2JYQYaQGc6MzDwwszrHYjCGg/s1600/IMGD.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="60" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGFT1cyrILHCIpUJ0bNMRLV8jVguZsGrl-7t-PKtCCR4ULjTAlGHhgpgHxDjFvWR0by4YaGdAK1pzef1TeMdhm58WLJTdXkbGtXcSeCc0Aq0ovQ8CDe-X2JYQYaQGc6MzDwwszrHYjCGg/s320/IMGD.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Input the following command:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;DIR&lt;/blockquote&gt;&lt;br /&gt;
This will show the list of visible files including the virus file.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSzbKQxg4zUg4aj8hCE8MP9BhgweH3wFobR2Kza1ySWuh_T7oxm9CPnDBZayjMGpjBQrGcdn0BbBbzDh2lh8_VbvpnV8bmHCqEozXu5G8-l-GqO1LAAR9th3CO6gthddavbcRfQVye2i8/s1600/IMGE.png" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="152" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSzbKQxg4zUg4aj8hCE8MP9BhgweH3wFobR2Kza1ySWuh_T7oxm9CPnDBZayjMGpjBQrGcdn0BbBbzDh2lh8_VbvpnV8bmHCqEozXu5G8-l-GqO1LAAR9th3CO6gthddavbcRfQVye2i8/s400/IMGE.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Input the following command to delete the virus file:&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;DEL /F jnqc.exe&lt;/blockquote&gt;&lt;br /&gt;
Repeat the same process for all virus and malware.&lt;br /&gt;
&lt;br /&gt;
This is exactly not a great solution, the great thing to do is never let  any virus to enter&amp;nbsp;your PC. This can be accomplished by installing  latest and always updating antivirus&amp;nbsp;software.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgBcKFIUv70JEW0Ythd7GrRCW-3i0isYdpo6vL-uBKew-LYjuOT4GCr3fyhJ3Lt2t6L9aZHhz0vKLFbyIhZjyxlQInu9l2Mw5f-0bQ4s2K68EL9-UMx5Jhc54Hls_i3uTrBg33eOWsANnc/s72-c/IMGA.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Update Your Windows Phone 7 Device</title><link>http://hackinginfoandtools.blogspot.com/2011/03/update-your-windows-phone-7-device.html</link><category>Mobile</category><category>Software</category><category>windows 7</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Thu, 24 Mar 2011 08:00:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-6528688152210327306</guid><description>&lt;b&gt;Windows Phone 7&lt;/b&gt; users would be informed on the new software update automatically and therefore they would be able to download and install it on their devices.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR1mdBI54EuWAB3A-vYxkcVYOnRHAnAw2lFIFsQ_7hpQiFpZGu21GUQv8SKgTQ2Zu9dRQrAifr83G6ppAyimUG24MLzSpzVY46yu9hTZ3G6VBD-siOrXmXzz23XHpyK8jfHJhnbSu_fRa4/s1600/Update+Your+Windows+Phone+7+Device.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR1mdBI54EuWAB3A-vYxkcVYOnRHAnAw2lFIFsQ_7hpQiFpZGu21GUQv8SKgTQ2Zu9dRQrAifr83G6ppAyimUG24MLzSpzVY46yu9hTZ3G6VBD-siOrXmXzz23XHpyK8jfHJhnbSu_fRa4/s1600/Update+Your+Windows+Phone+7+Device.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Users who wish to check if their device is eligible for update can do it manually:&lt;/blockquote&gt;&lt;br /&gt;
1. Go through Start&lt;br /&gt;
&lt;br /&gt;
2. Flick left to the App list&lt;br /&gt;
&lt;br /&gt;
3. Hit Settings &amp;gt; Phone update&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;While the handset is connected to a desktop PC:&lt;/blockquote&gt;&lt;br /&gt;
1. Go through Start&lt;br /&gt;
&lt;br /&gt;
2. Zune &amp;gt;Settings&amp;gt;Phone&amp;gt;Update&lt;br /&gt;
&lt;br /&gt;
Microsoft announced:&lt;br /&gt;
&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Before updating your phone, the Zune software and Windows Phone 7 Connector for Mac will attempt to back up your phone data to your computer, so you’ll need to know how much space your data is using on your phone.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
To update your Windows Phone 7 device, users need to connect it to the desktop computer using an USB cable. Keep in mind that the handset has to remain connected throughout the update process.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhR1mdBI54EuWAB3A-vYxkcVYOnRHAnAw2lFIFsQ_7hpQiFpZGu21GUQv8SKgTQ2Zu9dRQrAifr83G6ppAyimUG24MLzSpzVY46yu9hTZ3G6VBD-siOrXmXzz23XHpyK8jfHJhnbSu_fRa4/s72-c/Update+Your+Windows+Phone+7+Device.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>4.2.1 for Apple TV now available</title><link>http://hackinginfoandtools.blogspot.com/2011/03/421-for-apple-tv-now-available.html</link><category>Software</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Wed, 23 Mar 2011 03:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-5562898525638435743</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizImZh9-FSXBuATju6NN40nL0Eo5t_5iGY0psO6m7AlviIuddpe7S09Z5P6lI53-aR-XnaQW1Gtil0BNF_yTpqfRFDFiTHOVMGNlfdoLC7rOgbTUncazrc5JbUGFNxt57Auj_sm7bbDZvO/s1600/4.2.1+for+Apple+TV+now+available.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;/div&gt;Apple has just&amp;nbsp;released&amp;nbsp;a new updated for Apple TV. This update is supposed to fix the flickering issue and bugs.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizImZh9-FSXBuATju6NN40nL0Eo5t_5iGY0psO6m7AlviIuddpe7S09Z5P6lI53-aR-XnaQW1Gtil0BNF_yTpqfRFDFiTHOVMGNlfdoLC7rOgbTUncazrc5JbUGFNxt57Auj_sm7bbDZvO/s1600/4.2.1+for+Apple+TV+now+available.jpg" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizImZh9-FSXBuATju6NN40nL0Eo5t_5iGY0psO6m7AlviIuddpe7S09Z5P6lI53-aR-XnaQW1Gtil0BNF_yTpqfRFDFiTHOVMGNlfdoLC7rOgbTUncazrc5JbUGFNxt57Auj_sm7bbDZvO/s1600/4.2.1+for+Apple+TV+now+available.jpg" /&gt;&lt;/a&gt; &lt;/div&gt;&lt;br /&gt;
- &amp;nbsp;&lt;b&gt;TV compatibility&lt;/b&gt;: Addresses issues that may cause the screen to flicker or display incorrect color on some older TVs.&lt;br /&gt;
-&amp;nbsp;&lt;b&gt;Wake from sleep&lt;/b&gt;: Addresses an issue where Apple TV may not wake up from sleep.&lt;br /&gt;
-&amp;nbsp;&lt;b&gt;Audio&lt;/b&gt;: Addresses an issue where audio may not be heard on some TV models after switching from another input.&lt;br /&gt;
-&amp;nbsp;&lt;b&gt;Stability and performance&lt;/b&gt;: Apple TV Software Update 4.2.1 includes stability and performance fixes for Apple TV.&lt;br /&gt;
4.2.1 &lt;a href="http://appldnld.apple.com/AppleTV/041-0574.20110322.Dcfr5/AppleTV2,1_4.3_8F202_Restore.ipsw"&gt;direct download&lt;/a&gt;.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizImZh9-FSXBuATju6NN40nL0Eo5t_5iGY0psO6m7AlviIuddpe7S09Z5P6lI53-aR-XnaQW1Gtil0BNF_yTpqfRFDFiTHOVMGNlfdoLC7rOgbTUncazrc5JbUGFNxt57Auj_sm7bbDZvO/s72-c/4.2.1+for+Apple+TV+now+available.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="334284882" type="application/zip" url="http://appldnld.apple.com/AppleTV/041-0574.20110322.Dcfr5/AppleTV2,1_4.3_8F202_Restore.ipsw"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Apple has just&amp;nbsp;released&amp;nbsp;a new updated for Apple TV. This update is supposed to fix the flickering issue and bugs. - &amp;nbsp;TV compatibility: Addresses issues that may cause the screen to flicker or display incorrect color on some older TVs. -&amp;nbsp;Wake from sleep: Addresses an issue where Apple TV may not wake up from sleep. -&amp;nbsp;Audio: Addresses an issue where audio may not be heard on some TV models after switching from another input. -&amp;nbsp;Stability and performance: Apple TV Software Update 4.2.1 includes stability and performance fixes for Apple TV. 4.2.1 direct download.</itunes:subtitle><itunes:author>noreply@blogger.com (Somendra meena)</itunes:author><itunes:summary>Apple has just&amp;nbsp;released&amp;nbsp;a new updated for Apple TV. This update is supposed to fix the flickering issue and bugs. - &amp;nbsp;TV compatibility: Addresses issues that may cause the screen to flicker or display incorrect color on some older TVs. -&amp;nbsp;Wake from sleep: Addresses an issue where Apple TV may not wake up from sleep. -&amp;nbsp;Audio: Addresses an issue where audio may not be heard on some TV models after switching from another input. -&amp;nbsp;Stability and performance: Apple TV Software Update 4.2.1 includes stability and performance fixes for Apple TV. 4.2.1 direct download.</itunes:summary><itunes:keywords>Software</itunes:keywords></item><item><title>Download Free Office Viewers For Windows Embedded Compact 7</title><link>http://hackinginfoandtools.blogspot.com/2011/03/download-free-office-viewers-for.html</link><category>Software</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 22 Mar 2011 04:26:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-5787765384057534615</guid><description>Windows Embedded Compact 7. This release provides viewing capabilities for documents created using PowerPoint, PowerPoint, Word and Excel in Microsoft Office 2003 and 2007. In addition to Microsoft Office file formats, it also supports viewing PDF file formats.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiecXg_Ys2MUQg7Yb6cy72V8d2jOVVK2DIswB_nd0vi6ILwss9QAsIidERipqFgKkeqHG9BUKDqRWkHFv75dGnW2yKGARKduI9z2jet6VGbHGZdxpobV6UX6OUQpPPLhd-uWBMQgoRZBAuT/s1600/Download+Free+Office+Viewers+For+Windows+Embedded+Compact+7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiecXg_Ys2MUQg7Yb6cy72V8d2jOVVK2DIswB_nd0vi6ILwss9QAsIidERipqFgKkeqHG9BUKDqRWkHFv75dGnW2yKGARKduI9z2jet6VGbHGZdxpobV6UX6OUQpPPLhd-uWBMQgoRZBAuT/s1600/Download+Free+Office+Viewers+For+Windows+Embedded+Compact+7.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;Viewers for  Windows Embedded Compact 7 supports the following Microsoft Office file formats:&lt;/blockquote&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;Microsoft Office Word 97, 2000, 2003, XP and 2007 file formats.&lt;/li&gt;
&lt;li&gt;Microsoft Office Excel 97, 2000, 2003, XP and 2007 file formats.&lt;/li&gt;
&lt;li&gt;Microsoft Office PowerPoint 97, 2000, 2003, XP and 2007 file formats.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
The Viewers for Windows Embedded Compact 7 is available as a free download from Microsoft Download Center without require any registration, or just download from the official direct download links below.&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://download.microsoft.com/download/E/B/8/EB889657-9012-4A16-A352-F64A4C237ACE/WesttekFileViewers6.exe"&gt;Download Viewers for Windows Embedded Compact 7: WesttekFileViewers6.exe&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Those users who have an evaluation or full product DVD of Windows Embedded Compact 7, can find the Viewers for Windows Embedded Compact7 as a separate installer on the media.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiecXg_Ys2MUQg7Yb6cy72V8d2jOVVK2DIswB_nd0vi6ILwss9QAsIidERipqFgKkeqHG9BUKDqRWkHFv75dGnW2yKGARKduI9z2jet6VGbHGZdxpobV6UX6OUQpPPLhd-uWBMQgoRZBAuT/s72-c/Download+Free+Office+Viewers+For+Windows+Embedded+Compact+7.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Accept Friend Requests in Windows Live Messenger 2011</title><link>http://hackinginfoandtools.blogspot.com/2011/03/how-to-accept-friend-requests-in.html</link><category>windows</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 22 Mar 2011 04:22:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-4633797460404446075</guid><description>In old version of &lt;b&gt;Windows Live Messenger&lt;/b&gt; or MSN Messenger prior to Windows Live Messenger 2011, any friend requests to add you as a contact to communicate or instant messaging will pop up and display a notification dialog box which allows user to accept or reject the request.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
In Windows Live Messenger 2011, such notification popup or dialog message no longer available nor offered by the Messenger client. As a replacement, only a text link is displayed on the bottom of contact list to alert Windows Live Messenger 2011 user on any incoming friend requests.&lt;br /&gt;
&lt;br /&gt;
Thus, if you have known that somebody has added you as friend, but is wondering why you don’t get an alert to trigger option to accept or reject the friend, just look to the bottom of the contacts list, where the words similar to “You have x invitations” appear on a yellow background strip box.&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://lh6.googleusercontent.com/-b8qCqgdiB0I/TYiGPWvU9RI/AAAAAAAAARI/1Pm-AecWcDU/s1600/How+to+Accept+Friend+Requests+in+Windows+Live+Messenger+2011.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://lh6.googleusercontent.com/-b8qCqgdiB0I/TYiGPWvU9RI/AAAAAAAAARI/1Pm-AecWcDU/s400/How+to+Accept+Friend+Requests+in+Windows+Live+Messenger+2011.jpg" width="380" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
Just click on the link indicating invitations that waiting for you to approve or reject. Then, Windows Live Messenger will offer you options to either accept or reject the friend requests, whether to favorite them, and to place the friends into which categories (groups).&lt;br /&gt;
&lt;u&gt;&lt;br /&gt;
&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;Tip: &lt;/u&gt;If you face a problem where there is not even the yellow invitation notification bar appearing on the Messenger client below the friends list, the workaround is to just add the friend from your side. It’s equivalent to approve and accept the friend request from the friend, and the contact will appear on the contact list once done.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://lh6.googleusercontent.com/-b8qCqgdiB0I/TYiGPWvU9RI/AAAAAAAAARI/1Pm-AecWcDU/s72-c/How+to+Accept+Friend+Requests+in+Windows+Live+Messenger+2011.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Firefox 4 Final RTM Official Download</title><link>http://hackinginfoandtools.blogspot.com/2011/03/firefox-4-final-rtm-official-download.html</link><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Tue, 22 Mar 2011 04:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-7403552805844029294</guid><description>&lt;b&gt;&amp;nbsp;After twelve betas and two RCs&lt;/b&gt; (Release Candidates), Mozilla has finally announced and released the final RTM/RTW version of next generation Firefox 4 web browser. Firefox has redesigned user interface (GUI) especially to functionality of tabs management, greatly improve performance and page rendering speed with Gecko 2.0 engine and new JägerMonkey JavaScript engine, in addition to GPU hardware acceleration support. Another feature, Firefox Sync allows user to synchronize settings, passwords, bookmarks, history, open tabs and other customizations across multiple devices.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqSQ-XnmeUfvYPWDUmKNMY51feTwg75FvS82JhmXj_Hn-61-CFCts3S4_DgRks4Fi08iSG5XDP5jL_FQNuk3mxd97eOAkQ2I0P8uLBNBOTff5AvEHY_P3aynkMXsoIAkR_bQZo8W27Nb6/s1600/Firefox+4+Final+RTM+Official+Download.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="227" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqSQ-XnmeUfvYPWDUmKNMY51feTwg75FvS82JhmXj_Hn-61-CFCts3S4_DgRks4Fi08iSG5XDP5jL_FQNuk3mxd97eOAkQ2I0P8uLBNBOTff5AvEHY_P3aynkMXsoIAkR_bQZo8W27Nb6/s400/Firefox+4+Final+RTM+Official+Download.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Additional features of Firefox 4 include:&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;WebM and HD Video support.&lt;/li&gt;
&lt;li&gt;Enhanced privacy protection.&lt;/li&gt;
&lt;li&gt;New JS values for executing heavy, numeric code more efficiently for cleaner graphics and a better browsing experience.&lt;/li&gt;
&lt;li&gt;Multi-touch support for Windows 7.&lt;/li&gt;
&lt;li&gt;3D the Web support with WebGL.&lt;/li&gt;
&lt;li&gt;Audio API through and elements in HTML5.&lt;/li&gt;
&lt;li&gt;Retained layers for fast scrolling on complex web pages.&lt;/li&gt;
&lt;li&gt;XPCOM module improvements for better extensions framework and fast startup.&lt;/li&gt;
&lt;li&gt;Support for new CSS3 features like Transitions and Transformations.&lt;/li&gt;
&lt;li&gt;OpenType font.&lt;/li&gt;
&lt;li&gt;More Form features like list attributes and HTML5 validation.&lt;/li&gt;
&lt;li&gt;HTML5 parser with full support for web video, audio, drag &amp;amp; drop, and file handling.&lt;/li&gt;
&lt;li&gt;Web Console web pages analysis tool.&lt;/li&gt;
&lt;li&gt;JetPack SDK to develop add-ons which can be installed without restarting the browser.&lt;/li&gt;
&lt;li&gt;Full hardwareacceleration with Direct2D and Direct3D on Windows, XRender on Linux and OpenGL on Mac.&lt;/li&gt;
&lt;li&gt;Use SVG as images and backgrounds in Firefox.&lt;/li&gt;
&lt;li&gt;Better manage JavaScript objects with Compartments, offering improved cache utilization and garbage collection mechanisms for better security, memory management and overall performance.&lt;/li&gt;
&lt;li&gt;Crash protection from crash in the Adobe Flash, Apple Quicktime or Microsoft Silverlight plugins.&lt;/li&gt;
&lt;li&gt;HSTS for sites to request Firefox to automatically establish secure connections to their servers (https).&lt;/li&gt;
&lt;/ol&gt;&lt;br /&gt;
&lt;b&gt;Firefox 4&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;The Firefox 4 &lt;/b&gt;final is to release on March 22nd, 2011. The final build of Firefox version 4.0 has been published on the Mozilla FTP server, and is available for Windows, Mac OS X and Linux (in the name of Firefox Setup 4.0.exe, Firefox 4.0.dmg or firefox-4.0.tar.bz2) for various supported languages, including US English (en-US) and British English (en-GB).&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;a href="http://www.mozilla.org/community/mirrors.html"&gt;&lt;b&gt;Download Firefox 4&lt;/b&gt;&lt;/a&gt;&lt;/blockquote&gt;&lt;br /&gt;
In fact, the final version of Firefox 4 is exactly the same with Firefox 4 RC2, according to the PGP signature been published for final and RC version. It means that the Firefox 4 RC2 will be released officially as Firefox 4 (if there is no bug or showstopper been found), and by installing Firefox 4 RC2, you have already actually installing the final version of Firefox 4, although the warning on FTP site indicating that “we aren’t quite finished qualifying Firefox 4 yet”.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeqSQ-XnmeUfvYPWDUmKNMY51feTwg75FvS82JhmXj_Hn-61-CFCts3S4_DgRks4Fi08iSG5XDP5jL_FQNuk3mxd97eOAkQ2I0P8uLBNBOTff5AvEHY_P3aynkMXsoIAkR_bQZo8W27Nb6/s72-c/Firefox+4+Final+RTM+Official+Download.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 5 Tips For Counter Strike Game</title><link>http://hackinginfoandtools.blogspot.com/2011/03/top-5-tips-for-counter-strike-game.html</link><category>Games</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Mon, 21 Mar 2011 22:39:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-64266190073167713</guid><description>This is Best Tips For Counter strike game read this all very carefully. After reading post u can able to play like pro.&lt;br /&gt;
&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 1. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You see in game most of player using mag so fast. the shoot some one and change gun and use mag again . Whats u need to do just press "Q" Two times after shoot some one with mag.&amp;nbsp; this help You to save your time for reload.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 2.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You see In game So many Maggers Aim is So good Before They zoom they already target you. It possible Just Download &lt;b&gt;Crosshair&amp;nbsp; &lt;/b&gt;from below link and after extract file just put on your cs folder (&lt;b&gt;C:\Program Files\Steam\SteamApps\Username\condition zero\czero\models&lt;/b&gt;). What Is Crosshair?&lt;br /&gt;
You find that all guns have target ...but two guns have not AWP and Scout. after Copy&amp;nbsp; v_awp and v_scout. You find both guns have target. Now u can target with this befor zoom.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;Download Link :  &lt;a class="yt-uix-redirect-link" dir="ltr" href="http://www.megaupload.com/?d=QE68RDL3" rel="nofollow" target="_blank" title="http://www.megaupload.com/?d=QE68RDL3"&gt;http://www.megaupload.com/?d=QE68RDL3&lt;/a&gt;&lt;br /&gt;
Other Link : &lt;a class="yt-uix-redirect-link" dir="ltr" href="http://uploading.com/files/d9dd2b56/Crosshair.zip/" rel="nofollow" target="_blank" title="http://uploading.com/files/d9dd2b56/Crosshair.zip/"&gt;http://uploading.com/files/d9dd2b56/Crosshair.zip/&lt;/a&gt; &lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;object style="height: 390px; width: 400px;"&gt;&lt;param name="movie" value="http://www.youtube.com/v/s8M1GP9HuQo?version=3"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowScriptAccess" value="always"&gt;&lt;embed src="http://www.youtube.com/v/s8M1GP9HuQo?version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="400" height="390"&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 3.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Run like duck in game. whats u need to do just change Your control go to &amp;gt;option &amp;gt; keyboard and change jump and duck with wheels and Down. After change control Press W and scroll up fast and You can also do one more thing press W and scroll Up then down fast.&amp;nbsp; &lt;b&gt;Now No magger can target you easily if u running with duck&lt;/b&gt;. &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXO5EbxYzl6kW3UKDaR7Dl5mrnhL03jlPOKJI4kElZLG-PZzubgyGB56Yqd8YeG9F8FFDjNNTh_OMStExUhXnRTDHCrERskSfZxsxNvphdo5y-Ugm3W82qvk8ZpwMyctnL07brwGifTF2Y/s1600/controls.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="322" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXO5EbxYzl6kW3UKDaR7Dl5mrnhL03jlPOKJI4kElZLG-PZzubgyGB56Yqd8YeG9F8FFDjNNTh_OMStExUhXnRTDHCrERskSfZxsxNvphdo5y-Ugm3W82qvk8ZpwMyctnL07brwGifTF2Y/s400/controls.jpg" width="400" /&gt; &lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;object style="height: 390px; width: 400px;"&gt;&lt;param name="movie" value="http://www.youtube.com/v/ztt-XIG9zVs?version=3"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowScriptAccess" value="always"&gt;&lt;embed src="http://www.youtube.com/v/ztt-XIG9zVs?version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="400" height="390"&gt;&lt;/object&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Step 4.&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
You&lt;b&gt; &lt;/b&gt;find in game that so many player play with Rifles because its shoots faster and silent but target of Rifles is to large when we run or shooting some one. Now You can small &lt;b&gt;crosshair&lt;/b&gt; by just write this in console "&lt;b&gt;cl_dynamiccrosshair 0&lt;/b&gt;". &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Step 5. &lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;br /&gt;
Run Your game smother just write this code in Your console &lt;/blockquote&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;rate 25000&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_rate 25000&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_updaterate 101&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_cmdrate 101&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_cmdbackup 0&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_resend 0&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_interp 0&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_interpolate 0&lt;/li&gt;
&lt;li&gt;&amp;nbsp;cl_dlmax 0&lt;/li&gt;
&lt;li&gt;&amp;nbsp;fps_max 101 &lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;blockquote&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;Write comment below and tell about your game experence after using this  &lt;/b&gt;&lt;/div&gt;&lt;/blockquote&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXO5EbxYzl6kW3UKDaR7Dl5mrnhL03jlPOKJI4kElZLG-PZzubgyGB56Yqd8YeG9F8FFDjNNTh_OMStExUhXnRTDHCrERskSfZxsxNvphdo5y-Ugm3W82qvk8ZpwMyctnL07brwGifTF2Y/s72-c/controls.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Blogger Previews New User Interface</title><link>http://hackinginfoandtools.blogspot.com/2011/03/blogger-previews-new-user-interface.html</link><category>Blogger</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 20 Mar 2011 04:11:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-2712894665786642467</guid><description>&lt;b&gt;&lt;a href="http://www.blogger.com/"&gt;Blogger&lt;/a&gt; is the world's&lt;/b&gt; largest blogging platform and is ranked at 7th position by Alexa. However when it comes to comparison with other blogging platforms, Wordpress always has a upper hand over blogger due to its amazing features. However Blogger introduced various features in 2010 like Static Pages, Blog Stats Widgets, Template Designer and they are doing the same thing in 2011.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_ib1YOavhz5yWkH2Pja5ecPLpAHdlT-KXO8Pw62E6TlHahnWwfjK7_TMoR8Dw34kUL4YiqusjopB75jS12ZW2HO5C7DJdIyiD8voWxVi70cJOMiXu4kuPX06gHitxWYUrruGnBAew3-HD/s1600/Blogger+Previews+New+User+Interface.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_ib1YOavhz5yWkH2Pja5ecPLpAHdlT-KXO8Pw62E6TlHahnWwfjK7_TMoR8Dw34kUL4YiqusjopB75jS12ZW2HO5C7DJdIyiD8voWxVi70cJOMiXu4kuPX06gHitxWYUrruGnBAew3-HD/s1600/Blogger+Previews+New+User+Interface.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;At SXSW the Blogger&lt;/b&gt; team gave a sneak peek of the new Blogger interface and it looks great. Check this wonderful video showing its new interface along with some interesting facts like the number of active blogspot users is more that the entire population of South America!&lt;br /&gt;
&lt;br /&gt;
&lt;object height="390" width="640"&gt;&lt;param name="movie" value="http://www.youtube.com/v/hPhFc6GqVdU&amp;rel=0&amp;hl=en_US&amp;feature=player_embedded&amp;version=3"&gt;&lt;/param&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;/param&gt;&lt;param name="allowScriptAccess" value="always"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/hPhFc6GqVdU&amp;rel=0&amp;hl=en_US&amp;feature=player_embedded&amp;version=3" type="application/x-shockwave-flash" allowfullscreen="true" allowScriptAccess="always" width="640" height="390"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;
&lt;br /&gt;
The new &lt;b&gt;dashboard &lt;/b&gt;and the post editor looks great. Along with the new interface which uses &lt;a href="http://code.google.com/webtoolkit/"&gt;Google Web Toolkit,&lt;/a&gt; they will also showcase a new content discovery feature that will allow you to uncover interesting and related content based on the topics that you are reading on the blog.</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj_ib1YOavhz5yWkH2Pja5ecPLpAHdlT-KXO8Pw62E6TlHahnWwfjK7_TMoR8Dw34kUL4YiqusjopB75jS12ZW2HO5C7DJdIyiD8voWxVi70cJOMiXu4kuPX06gHitxWYUrruGnBAew3-HD/s72-c/Blogger+Previews+New+User+Interface.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Backup your Gmail/Email accounts automatically for free</title><link>http://hackinginfoandtools.blogspot.com/2011/03/backup-your-gmailemail-accounts.html</link><category>Email</category><category>Internet</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 20 Mar 2011 04:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-6198668809895012561</guid><description>Gmail is a crucial part of my life, Everything i have is there on  gmail, Right from personal pics to office documents, Creditcard  statements to bank accounts. But one thing keeps me worried about my Gmail, What if I loose access  to my account? What if some hacker manages to access to my gmail  account and changes my password permanently?&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;/div&gt;I am sure this is the same question a lot of you will have in your  mind, Whether it’s gmail,yahoo mail or hotmail. This is a common  problem, I have lost a yahoo account once &amp;amp; it was almost impossible  to gain &amp;nbsp;back &amp;nbsp;that account, I tried everything possible, but nothing  worked &amp;amp; I was helpless &lt;img alt=":(" class="wp-smiley" src="http://tipsfromgeek.com/wp-includes/images/smilies/icon_sad.gif" /&gt;  . I lost few pics of my college friends which were special in a way, because that was our last day in college.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4Zen6LNL_sVcK_sLFsB6Db-FSjh0tEdHEXu5fEGB9SKTJqH-yuFavA8hRT0gePOfgnLG3nOThvm220cJGwoiioPQJs2t5dTiWq2Ol-wSwdxdAnd35_vyi9M-wPsBqdjhV3yFJG8ftPjaz/s1600/Backup+your+Gmail+Email+accounts+automatically+for+free.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4Zen6LNL_sVcK_sLFsB6Db-FSjh0tEdHEXu5fEGB9SKTJqH-yuFavA8hRT0gePOfgnLG3nOThvm220cJGwoiioPQJs2t5dTiWq2Ol-wSwdxdAnd35_vyi9M-wPsBqdjhV3yFJG8ftPjaz/s1600/Backup+your+Gmail+Email+accounts+automatically+for+free.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
Anyways lets get back to the main point, How to backup Gmail, Yahoo mail, Hotmail &amp;nbsp;basically any email account for free &amp;amp; automatically?&lt;br /&gt;
&lt;br /&gt;
Before we begin, We need one gmail account and one email account from  any other provider(Yahoo, Hotmail&amp;nbsp;preferably&amp;nbsp;) so keep them handy.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;b&gt;If your primary account is on Gmail, Follow these steps :&lt;/b&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;Go to gmail.com and signin to your gmail account.&lt;/li&gt;
&lt;li&gt;Click on “settings” or “gmail settings” in the right &amp;nbsp;hand side corner&lt;/li&gt;
&lt;li&gt;Go to forwarding and POP/IMAP tab. or if you feel like skipping step 1,2,3; &amp;nbsp;Type this url in your browser&amp;nbsp;&lt;a href="https://mail.google.com/mail/?shva=1#settings/fwdandpop" rel="nofollow" target="_blank"&gt;https://mail.google.com/mail/?shva=1#settings/fwdandpop&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;You will reach an interface that looks something like this.&lt;/b&gt; &lt;div class="wp-caption alignnone" id="attachment_4185" style="width: 310px;"&gt;&lt;div class="wp-caption-text"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUHUaluajsZWp5fnNyJ4af_FFSb1a67AOJpk-mhZeE6YHQfHJOx2OARoVyDAIRt-oB4MQ-fIWkgLhAfjfuqyVIC-2UQnbD7itSvVaA9SCTFmmzJUPwuORUE-8KQ-HG0_HESlIRhBY6ja61/s1600/Backup+your+Gmail+Email+accounts+automatically+for+free+2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhUHUaluajsZWp5fnNyJ4af_FFSb1a67AOJpk-mhZeE6YHQfHJOx2OARoVyDAIRt-oB4MQ-fIWkgLhAfjfuqyVIC-2UQnbD7itSvVaA9SCTFmmzJUPwuORUE-8KQ-HG0_HESlIRhBY6ja61/s1600/Backup+your+Gmail+Email+accounts+automatically+for+free+2.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;/li&gt;
&lt;li&gt;Now click on the button that says “Add a forwarding Address”&lt;/li&gt;
&lt;li&gt;The page will then direct you to add another email address of yours  where you want to&amp;nbsp;receive&amp;nbsp;emails. (A link will be sent to your email  address &amp;amp; you will have to click that)&lt;/li&gt;
&lt;li&gt;Now after you have followed the procedure to forward the  email&amp;nbsp;automatically, check the radio button that says “Forward a copy of  incoming mail to”&lt;/li&gt;
&lt;li&gt;Now , select the option from the drop down menu that says, “Keep Gmail’s copy in the inbox.”&lt;/li&gt;
&lt;li&gt;Save changes.&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
You are done . All your emails from now that will come to Gmail, will  automatically be forwarded to your other email account, Free Backup you  see:),&lt;br /&gt;
What about hotmail &amp;amp; yahoo users? you will ask,&lt;br /&gt;
&lt;blockquote&gt;&lt;b&gt;So here is what you need to do.&lt;/b&gt;&lt;/blockquote&gt;&lt;ul&gt;&lt;li&gt;Create a gmail account where you want your backup to be downloaded,&lt;/li&gt;
&lt;li&gt;Download &lt;a href="http://email.about.com/od/gmailtips/qt/Import_Addresses_from_Hotmail_Outlook_Yahoo_Others_in_Gmail.htm"&gt;emaisl to your gmail&lt;/a&gt; account from Yahoo , Hotmail &amp;amp;&amp;nbsp; others&lt;/li&gt;
&lt;li&gt;Once you are setup with step 2, your gmail account will  automatically pull all the messages from other email accounts &amp;amp; what  you get is free backup of all your emails.&lt;/li&gt;
&lt;/ul&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4Zen6LNL_sVcK_sLFsB6Db-FSjh0tEdHEXu5fEGB9SKTJqH-yuFavA8hRT0gePOfgnLG3nOThvm220cJGwoiioPQJs2t5dTiWq2Ol-wSwdxdAnd35_vyi9M-wPsBqdjhV3yFJG8ftPjaz/s72-c/Backup+your+Gmail+Email+accounts+automatically+for+free.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Maintain your System healthy and error free</title><link>http://hackinginfoandtools.blogspot.com/2011/03/maintain-your-system-healthy-and-error.html</link><category>Computer</category><category>Software</category><author>noreply@blogger.com (Somendra meena)</author><pubDate>Sun, 20 Mar 2011 03:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5651791991831731052.post-8516381266547136491</guid><description>&lt;b&gt;Maintaining your computer&lt;/b&gt; is the key to keeping it healthy and fully working and of course, fast. Windows 95 has most of the tools for maintaining your PC, but Windows 98 extends the possibilities and makes it even less of a hassle.  If you follow the list below and run the programs listed frequently, you will be guaranteed to have a maintained computer at no extra cost. There are, however, other programs in the market with stronger engines, but then again, they're not free.&lt;br /&gt;
&lt;a name='more'&gt;&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;&lt;b&gt;Most of these programs can be found under the Start, Programs, Accessories, System Tools folder. &lt;/b&gt;&lt;/blockquote&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;1. Disk Defrag: &lt;/b&gt;It is advisable to run Defrag under Windows 95 once a month or when you add/remove programs. However, under Windows 98, you can run it every week if you want because it has a new engine, which means that the more you run it, the faster your computer will get. What happens is that your programs are placed on your hard disk in a way so that the ones you use most often are easier for the hard disk to find and run.  Make sure that the 'make my programs run faster' is ticked in the 'Settings' window in Defrag.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2. Scandisk: &lt;/b&gt;Running a thorough check is good once a month in both Windows 95 and 98. Run this once a month if you feel that your hard disk takes a long time to load programs.  A standard check is very fast and checks for basic disk problems concerning files and folders and lost fragments.  It takes an average 2 minutes to complete so try running it often.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3. Disk cleanup: &lt;/b&gt;This one is good for seeing how much disk space is being used up by unnecessary files that are in the recycle bin, temp folder, or in temporary internet folders.  You can then remove them!&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;4. RegClean: &lt;/b&gt;A simple but effective piece of software this is. You can download it for free from Microsoft's web site. It is also available on many magazine cover disks. Reg Clean takes about a minute to check the registry. Then it asks whether you want to clean out redundant or orphan file. This usually helps the computer to get rid of files that have been left behind by uninstalled programs.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;5. Windows update: &lt;/b&gt;It's a good idea to use Windows Update to make sure your computer has all the latest fixes, patches and updates.  You can do so by clicking on its icon in the Start Menu under Windows 98.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;6. Tweak ALL: &lt;/b&gt;A very handy program that allows to change settings, which cannot be changed using Windows alone!</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>