<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-5335456190204671036</id><updated>2024-09-10T18:02:36.940-07:00</updated><title type='text'>Learn All Techniques Of The Internet And Computer</title><subtitle type='html'>You can know all online techniques, earning methods and computer tricks</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default?redirect=false'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>14</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-3174879719792452770</id><published>2011-01-20T07:44:00.000-08:00</published><updated>2011-01-20T07:44:03.075-08:00</updated><title type='text'>STEPS TO CREATE STRONG PASSWORD</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• A Strong password is less susceptible to attack by a Hacker. The&lt;br /&gt;
following rules should be applied when you’re creating a&lt;br /&gt;
password, to protect it against attacks:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;  Must not contain any part of the User’s account name&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Must have a minimum of eight characters&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Must contain characters from at least three of the following&lt;br /&gt;
categories:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Non alphanumeric symbols ($,:”%@!#)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• Numbers&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• Uppercase letters&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• Lowercase letters&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Applying Syskey Security&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Go to Start &amp;gt; Run &amp;gt;&lt;br /&gt;
Type Syskey&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Click on Update&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Set Syskey Password,&lt;br /&gt;
Confirm the Password&lt;br /&gt;
and Click OK&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;u&gt; Change the Boot Sequence&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• You should change the boot sequence in the BIOS so that your&lt;br /&gt;
computer is not configured to boot from the CD first. It should&lt;br /&gt;
be configured as Hard Disk as the First Boot Device.&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• This will protect your computer from the attacking Live CDs.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• You may press Del or F2 Key at the System Boot to go to the&lt;br /&gt;
BIOS Setup&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/3174879719792452770/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/steps-to-create-strong-password.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/3174879719792452770'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/3174879719792452770'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/steps-to-create-strong-password.html' title='STEPS TO CREATE STRONG PASSWORD'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-1285953950794793414</id><published>2011-01-20T07:40:00.000-08:00</published><updated>2011-01-20T07:40:05.735-08:00</updated><title type='text'>STEPS TO CREATE HIDDEN ACCOUNT IN WINDOWS VISTA  OR 7</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Creating Hidden accounts&amp;nbsp; in Windows&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;* Creating Hidden Accounts&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Use the Net User Command to Create a Hidden Account in Windows:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Net User Hiddenuser /add&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• And then use the Command&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Net Localgroup Users Hiddenuser /delete&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Log Off the Current User, Press ALT+CTRL+DEL combination 2 times&lt;br /&gt;
to get the ‘Classic Windows User Login Screen’&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• Type the Username as Hiddenuser and Hit Enter, you will get Logged In&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Note: This trick will not work in Windows Vista and Windows 7&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Sticky Keys Backdoor&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt;&amp;nbsp;&lt;/u&gt;&lt;br /&gt;
&amp;nbsp;• Sticky Keys application can be used as the Backdoor in Windows&lt;br /&gt;
Operating System.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Command Prompt file ‘CMD.EXE’ can be renamed to&lt;br /&gt;
‘SETHC.EXE’ in C:\Windows\System32 Folder.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• After this one can hit the Shift Key 5 times on the User Login&lt;br /&gt;
Screen and will get the Command Prompt right there. Net User&lt;br /&gt;
command can be used to modify User Accounts thereafter.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/1285953950794793414/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/steps-to-create-hidden-account-in.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/1285953950794793414'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/1285953950794793414'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/steps-to-create-hidden-account-in.html' title='STEPS TO CREATE HIDDEN ACCOUNT IN WINDOWS VISTA  OR 7'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-150884400027537720</id><published>2011-01-20T07:35:00.000-08:00</published><updated>2011-01-20T07:35:02.656-08:00</updated><title type='text'>TAKE CARE YOUR PASSWORD MAY BE STOLEN</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;This is way which hacker or other third part steal your password so try to check this&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;u&gt;Brute Force Attack&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt;&lt;/u&gt;• Brute force password guessing is just what it sounds like: trying&lt;br /&gt;
a random approach by attempting different passwords and&lt;br /&gt;
hoping that one works. Some logic can be applied by trying&lt;br /&gt;
passwords related to the person’s name, job title, hobbies, or&lt;br /&gt;
other similar items.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Brute force randomly generates passwords and their associated&lt;br /&gt;
hashes.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• There are tools available to perform the Brute force attack on the&lt;br /&gt;
Windows SAM File. Most famous tool available for Windows&lt;br /&gt;
User Account Password Bruteforcing is Cain and Abel. Another&lt;br /&gt;
one is SamInside.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;u&gt; Rainbow Table Attack&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Rainbow Table Attack trades off the time-consuming process of&lt;br /&gt;
creating all possible password hashes by building a table of&lt;br /&gt;
hashes in advance of the actual crack. After this process is&lt;br /&gt;
finished, the table, called a rainbow table, is used to crack the&lt;br /&gt;
password, which will then normally only take a few seconds.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt; &lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt; &lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• We can use the Live CD to crack the Windows password using&lt;br /&gt;
the Rainbow table attack technique. Most famous Live CD&lt;br /&gt;
available is OphCrack&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/150884400027537720/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/take-care-your-password-may-be-stolen.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/150884400027537720'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/150884400027537720'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/take-care-your-password-may-be-stolen.html' title='TAKE CARE YOUR PASSWORD MAY BE STOLEN'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-3689920137412196735</id><published>2011-01-20T07:30:00.000-08:00</published><updated>2011-01-20T07:30:50.370-08:00</updated><title type='text'>WINDOWS ACCOUNT USER PASSWORD CRACKING WAY</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt;Cracking Windows User account Password&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Passwords are Stored and Transmitted in an encrypted form&lt;br /&gt;
called a Hash. When a User logs on to a system and enters a&lt;br /&gt;
password, a hash is generated and compared to a stored hash. If&lt;br /&gt;
the entered and the stored hashes match, the user is&lt;br /&gt;
authenticated (This is called the Challenge/Response).&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Passwords may be cracked Manually or with Automated tools&lt;br /&gt;
such as a Brute-force method or the Rainbow Table attack.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;u&gt;Net User: Command Prompt&lt;/u&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• Windows Command Prompt Utility, Net User, can be also be used to&lt;br /&gt;
manipulate the User accounts in Windows.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;The Commands are as follows:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• To check the User Accounts: Net User&lt;br /&gt;
• To Add a New User Account: Net User Username Password /add&lt;br /&gt;
• To Delete a User Account: Net User Username /delete&lt;br /&gt;
• To Change the Password of User Account: Net User Username *&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/3689920137412196735/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/windows-account-user-password-cracking.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/3689920137412196735'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/3689920137412196735'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/windows-account-user-password-cracking.html' title='WINDOWS ACCOUNT USER PASSWORD CRACKING WAY'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-2510725043748742128</id><published>2011-01-20T07:26:00.000-08:00</published><updated>2011-01-20T07:26:19.772-08:00</updated><title type='text'>SRM (SECURITY REFERENCE MONITOR)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
3) SRM (Security Reference Monitor)&lt;br /&gt;
&lt;br /&gt;
• The Security Reference Monitor is a security architecture component&lt;br /&gt;
that is used to control user requests to access objects in the system.&lt;br /&gt;
The SRM enforces the access validation and audit generation. Windows&lt;br /&gt;
NT forbids the direct access to objects. Any access to an object must&lt;br /&gt;
first be validated by the SRM. For example, if a user wants to access a&lt;br /&gt;
specific file the SRM will be used to validate the request. The Security&lt;br /&gt;
Reference Monitor enforces access validation and audit generation&lt;br /&gt;
policy.&lt;br /&gt;
&lt;br /&gt;
• The reference monitor verifies the nature of the request against a table&lt;br /&gt;
of allowable access types for each process on the system. For example,&lt;br /&gt;
Windows 3.x and 9x operating systems were not built with a reference&lt;br /&gt;
monitor, whereas the Windows NT line, which also includes Windows&lt;br /&gt;
2000 and Windows XP, was designed with an entirely different&lt;br /&gt;
architecture and does contain a reference monitor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Windows User Account Architecture&lt;br /&gt;
&lt;br /&gt;
• User account passwords are contained in the SAM in the&lt;br /&gt;
Hexadecimal Format called Hashes.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• Once the Passwords converted in Hashes, you cannot&lt;br /&gt;
convert back to the Clear Text.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/2510725043748742128/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/srm-security-reference-monitor.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/2510725043748742128'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/2510725043748742128'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/srm-security-reference-monitor.html' title='SRM (SECURITY REFERENCE MONITOR)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-8242757161309818891</id><published>2011-01-20T07:22:00.000-08:00</published><updated>2011-01-20T07:22:01.526-08:00</updated><title type='text'>SAM (SECURITY ACCOUNT MANAGER)</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
2) SAM (Security Account Manager)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
• The Security Accounts Manager is a database in the Windows&lt;br /&gt;
operating system (OS) that contains user names and passwords.&lt;br /&gt;
SAM is part of the registry and can be found on the hard disk.&lt;br /&gt;
&lt;br /&gt;
• This service is responsible for making the connection to the SAMdatabase&lt;br /&gt;
(Contains available user-accounts and groups). The SAMdatabase&lt;br /&gt;
can either be placed in the local registry or in the Active&lt;br /&gt;
Directory (If available). When the service has made the connection&lt;br /&gt;
it announces to the system that the SAM-database is available, so&lt;br /&gt;
other services can start accessing the SAM-database.&lt;br /&gt;
&lt;br /&gt;
SAM (Security Account Manager)&lt;br /&gt;
&lt;br /&gt;
• In the SAM, each user account can be assigned a Windows password&lt;br /&gt;
which is in encrypted form. If someone attempts to log on to the&lt;br /&gt;
system and the user name and associated passwords match an entry in&lt;br /&gt;
the SAM, a sequence of events takes place ultimately allowing that&lt;br /&gt;
person access to the system. If the user name or passwords do not&lt;br /&gt;
properly match any entry in the SAM, an error message is returned&lt;br /&gt;
requesting that the information be entered again.&lt;br /&gt;
&lt;br /&gt;
• When you make a New User Account with a Password, it gets stored in&lt;br /&gt;
the SAM File.&lt;br /&gt;
&lt;br /&gt;
• Windows Security Files are located at&lt;br /&gt;
&lt;br /&gt;
“C:\Windows\System32\Config\SAM”&lt;br /&gt;
&lt;br /&gt;
• The moment operating system starts, the SAM file becomes&lt;br /&gt;
inaccessible&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/8242757161309818891/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/sam-security-account-manager.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/8242757161309818891'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/8242757161309818891'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/sam-security-account-manager.html' title='SAM (SECURITY ACCOUNT MANAGER)'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-1788583068489613300</id><published>2011-01-20T07:18:00.000-08:00</published><updated>2011-01-20T07:18:30.213-08:00</updated><title type='text'>WINDOWS SECURITY ARCHITECTURE</title><content type='html'>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;There are three components of Windows Security:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• LSA (Local Security Authority)&lt;br /&gt;
• SAM (Security Account Manager)&lt;br /&gt;
• SRM (Security Reference Monitor)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;1) &lt;/b&gt;&lt;/span&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;LSA (Local Security Authority)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
• LSA is the Central Part of NT Security. It is also known as Security&lt;br /&gt;
Subsystem. The Local Security Authority or LSA is a key component of&lt;br /&gt;
the logon process in both Windows NT and Windows 2000. In Windows&lt;br /&gt;
2000, the LSA is responsible for validating users for both local and&lt;br /&gt;
remote logons. The LSA also maintains the local security policy.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;• During the local logon to a machine, a person enters his name and&lt;br /&gt;
password to the logon dialog. This information is passed to the LSA,&lt;br /&gt;
which then calls the appropriate authentication package. The password&lt;br /&gt;
is sent in a non-reversible secret key format using a one-way hash&lt;br /&gt;
function. The LSA then queries the SAM database for the User’s&lt;br /&gt;
account information. If the key provided matches the one in the SAM,&lt;br /&gt;
the SAM returns the users SID and the SIDs of any groups the user&lt;br /&gt;
belongs to. The LSA then uses these SIDs to generate the security&lt;br /&gt;
access token. &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/1788583068489613300/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/windows-security-architecture.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/1788583068489613300'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/1788583068489613300'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/windows-security-architecture.html' title='WINDOWS SECURITY ARCHITECTURE'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-7383831327443721621</id><published>2011-01-18T11:01:00.000-08:00</published><updated>2011-01-18T11:01:05.062-08:00</updated><title type='text'>SOME KEYWORDS</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Here are some keywords which increase money and traffic to your blog or website&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div dragover=&quot;true&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b dragover=&quot;true&quot;&gt; &lt;br /&gt;
refinance &lt;br /&gt;
video conferencing &lt;br /&gt;
payday loans &lt;br /&gt;
credit counseling &lt;br /&gt;
asbestos &lt;br /&gt;
debt solutions &lt;br /&gt;
cash loans &lt;br /&gt;
refinancing &lt;br /&gt;
broadband phone &lt;br /&gt;
debt management &lt;br /&gt;
fast loans &lt;br /&gt;
credit card processing &lt;br /&gt;
credit reports &lt;br /&gt;
making money on the internet &lt;br /&gt;
merchant account &lt;br /&gt;
line of credit &lt;br /&gt;
money magazine &lt;br /&gt;
Adsense &lt;br /&gt;
credit counselors &lt;br /&gt;
identity theft&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dragover=&quot;true&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b dragover=&quot;true&quot;&gt; &lt;br /&gt;
make money at home &lt;br /&gt;
free credit &lt;br /&gt;
cash advance &lt;br /&gt;
consumer credit counseling &lt;br /&gt;
freecreditreport &lt;br /&gt;
make money from home &lt;br /&gt;
free credit reports &lt;br /&gt;
make extra money &lt;br /&gt;
domain registration &lt;br /&gt;
adwords &lt;br /&gt;
citifinancial&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b dragover=&quot;true&quot;&gt;my fico score &lt;br /&gt;
web hosting &lt;br /&gt;
American express credit &lt;br /&gt;
airlines credit card &lt;br /&gt;
credit report &lt;br /&gt;
earn money &lt;br /&gt;
hard drive recovery&lt;br /&gt;
hard money lenders &lt;br /&gt;
credit counseling service &lt;br /&gt;
consolidate &lt;br /&gt;
claims &lt;br /&gt;
debt consolidation &lt;br /&gt;
poor credit&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;div dragover=&quot;true&quot;&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b dragover=&quot;true&quot;&gt;mesothelioma&lt;br /&gt;
mesothelioma attorneys &lt;br /&gt;
mesothelioma lawyers&lt;br /&gt;
malignant pleural mesothelioma &lt;br /&gt;
Asbestos Cancer &lt;br /&gt;
mesothelioma symptoms &lt;br /&gt;
peritoneal mesothelioma &lt;br /&gt;
trans union &lt;br /&gt;
lung cancer &lt;br /&gt;
search engine optimization &lt;br /&gt;
mesothelioma diagnosis &lt;br /&gt;
home equity loans &lt;br /&gt;
Baines and Ernst &lt;br /&gt;
consolidate loans &lt;br /&gt;
Lexington law &lt;br /&gt;
Lexington law firm &lt;br /&gt;
debt problems  &lt;br /&gt;
register domain &lt;br /&gt;
home equity line of credit &lt;br /&gt;
affiliate programs&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b dragover=&quot;true&quot;&gt;low interest &lt;br /&gt;
web host &lt;br /&gt;
student credit cards &lt;br /&gt;
secured&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;merchant account application&lt;br /&gt;
loans &lt;br /&gt;
send money to India &lt;br /&gt;
discover credit &lt;br /&gt;
merchant accounts &lt;br /&gt;
hosting &lt;br /&gt;
money on the internet &lt;br /&gt;
credit loans &lt;br /&gt;
consumer credit &lt;br /&gt;
money making ideas &lt;br /&gt;
credit card applications&lt;br /&gt;
money lenders&lt;br /&gt;
discover credit card &lt;br /&gt;
money loans &lt;br /&gt;
dept help&lt;br /&gt;
credit card services &lt;br /&gt;
consolidation&lt;br /&gt;
ways to make money &lt;br /&gt;
student credit &lt;br /&gt;
online credit report &lt;br /&gt;
how to make money &lt;br /&gt;
accept credit&lt;br /&gt;
accept credit cards &lt;br /&gt;
student loan &lt;br /&gt;
internet money &lt;br /&gt;
credit repair &lt;br /&gt;
free credit check &lt;br /&gt;
bad credit&lt;br /&gt;
money making &lt;br /&gt;
SEO &lt;br /&gt;
University Degrees Online &lt;br /&gt;
credit card application &lt;br /&gt;
consolidating &lt;br /&gt;
people with bad credit &lt;br /&gt;
car loans &lt;br /&gt;
money fast &lt;br /&gt;
money now&lt;br /&gt;
household automotive &lt;br /&gt;
personal credit &lt;br /&gt;
money at home &lt;br /&gt;
bad debt &lt;br /&gt;
lenders &lt;br /&gt;
auto loans &lt;br /&gt;
making money online&lt;br /&gt;
Point of sale software &lt;br /&gt;
interest credit cards&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;credit history &lt;br /&gt;
lending &lt;br /&gt;
business credit &lt;br /&gt;
money to India &lt;br /&gt;
debt &lt;br /&gt;
online credit &lt;br /&gt;
student credit card &lt;br /&gt;
hard money &lt;br /&gt;
webhosting &lt;br /&gt;
credit cards &lt;br /&gt;
make money &lt;br /&gt;
credit application &lt;br /&gt;
online credit card&lt;br /&gt;
chase credit &lt;br /&gt;
interest credit &lt;br /&gt;
Equifax credit&lt;br /&gt;
video conference &lt;br /&gt;
credit card offers &lt;br /&gt;
American credit &lt;br /&gt;
credit card fraud &lt;br /&gt;
best credit card&lt;br /&gt;
no credit check &lt;br /&gt;
credit card &lt;br /&gt;
bankruptcy &lt;br /&gt;
best credit&lt;br /&gt;
money market account&lt;br /&gt;
mbna credit &lt;br /&gt;
for credit &lt;br /&gt;
webhost &lt;br /&gt;
pengar &lt;br /&gt;
college credit &lt;br /&gt;
money market accounts &lt;br /&gt;
best credit cards &lt;br /&gt;
credit reporting agency &lt;br /&gt;
credit card debt &lt;br /&gt;
credit checks &lt;br /&gt;
visa credit &lt;br /&gt;
credit check &lt;br /&gt;
secured credit cards &lt;br /&gt;
one credit card &lt;br /&gt;
Credit report &lt;br /&gt;
i need money &lt;br /&gt;
low interest credit &lt;br /&gt;
credit services &lt;br /&gt;
credit reporting &lt;br /&gt;
preapproved &lt;br /&gt;
online approval &lt;br /&gt;
credit card rates &lt;br /&gt;
credit score &lt;/b&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/7383831327443721621/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/some-keywords.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7383831327443721621'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7383831327443721621'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/some-keywords.html' title='SOME KEYWORDS'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-7471488858262436135</id><published>2011-01-16T03:24:00.000-08:00</published><updated>2011-01-16T03:24:02.191-08:00</updated><title type='text'>ADSENSE THE BEST AD NETWORK</title><content type='html'>Google Adsense is the best ad network which provides good and quality ads to your blog or website.If you have a blog or website then put the Google ads in your website or blog and earn money.When you integrate Adsense to your blog or website the Google will start showing ads in your blog or website and any visitor clicks on your ad you will earn money.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
There some measures&amp;nbsp; for getting Adsense account approved because Google will not simply activate your Adsense account there is some things you should know.&lt;br /&gt;
&lt;br /&gt;
Your blog must not contain anything about sex and porn clips.If you put porn clips and pictures in your website or blog then you will not get approved because Adsense does not display ads on such site.&lt;br /&gt;
&lt;br /&gt;
Your blog or website must not contain contents copied from other websites because Google Adsense does not allow for copyrighted content to be copied and used.Your blog or website contain your ideas and your own content made by you.&lt;br /&gt;
&lt;br /&gt;
The blog or website should have 100 visitors daily and the creator or owner of the blog or website should be active and update contents once in a week.&lt;br /&gt;
&lt;br /&gt;
If you haave good content and visitors then no problem otherwise your blog or website should be six months&amp;nbsp; old.&lt;br /&gt;
&lt;br /&gt;
Do not put your blog or website in paid to click sites or programs and or any other traffic exchange sites for getting visitors such things are not tolerated by Adsense and will not your account approved.&lt;br /&gt;
&lt;br /&gt;
If you follow this things you can get your Adsense account activated easily and there are many other steps also.&lt;br /&gt;
&lt;br /&gt;
Once your account is activated you should not click on your ads because if you click then Adsense account gets banned and Adsense have very strict rules once you are banned then you will be banned for lifetime and cannot participate in Adsense again.&lt;br /&gt;
&lt;br /&gt;
If you do not have blog then there are sites which you can write your own articles and when you have five articles then you can ask for Adsense account activation and once they are approved you earn money for the ads dispalyed on your articles.You can earn money if anyone clicks on the ads displayed in your articles.&lt;br /&gt;
The article writing site are&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.bukisa.com/&quot;&gt;Bukisa&lt;/a&gt;&lt;br /&gt;
&lt;a href=&quot;http://www.triond.com/&quot;&gt;Triond&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
If you do not know how to write articles then no need to worry you can upload pictures and videos and apply for Adsense account and earn money.You should upload your own pictures other copyrighted pictures and upload video or embed it from youtube and&amp;nbsp; once Adsense account is activated ads will be displayed in side of pictures and videos and any&amp;nbsp; visitor click on your ads then you will earn money.&lt;br /&gt;
The website which you can upload pictures,videos and write articles and earn money is&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.flixya.com/&quot;&gt;Flixya&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
Be nice with Google Adsense do not try to do any trick or fraudulent activity with Google because Google has worlds best engineers and once you are banned means you are banned for the lifetime.</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/7471488858262436135/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/adsense-best-ad-network.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7471488858262436135'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7471488858262436135'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/adsense-best-ad-network.html' title='ADSENSE THE BEST AD NETWORK'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-476285171004154609</id><published>2011-01-14T19:42:00.001-08:00</published><updated>2011-01-14T19:42:44.170-08:00</updated><title type='text'>IMPORTANT TIPS FOR EARNING ONLINE MONEY</title><content type='html'>As you know now every jobless person and other people are looking for earning money online so there are some things which should be followed otherwise you will find that you cannot earn much money from online works.&lt;br /&gt;
&lt;br /&gt;
First up all you should know that you will not become rich through online works within one day or one week or within one month. You should use your time and effort towards it and work according to your skills and slowly you will start to earn money and as time goes according to your hard work and effort your earnings will increase.&lt;br /&gt;
&lt;br /&gt;
Second thing is do not fall in scam sites. Those sites which says pay $5 and earn $500 are scam sites and do not join it and waste your time and money.Those sites which says that you can be rich within one week or one month are most probably scam websites. There is on short-cut for earning money online just use your skills and efforts wisely than you can earn money. &lt;br /&gt;
&lt;br /&gt;
PTC sites are the best site which is easy for begginers to earn money online because it is easy and less time consuming.&lt;br /&gt;
If you are a good writer than you can look to write articles and publish it and there are sites which pays for the number of views on your article otherwise there are sites where you can write articles and you can sell your articles and earn money.&lt;br /&gt;
&lt;br /&gt;
Then you can do data entry works and earn money online and some data entry works requires training and some data entry work sites provide training within the site and you can learn it and do the work and earn money. &lt;br /&gt;
There are sites which pays you money for participating in surveys and according to the country ways the number of surveys you are getting will decrease. If you live in U.S you would be getting more surveys and earn more money from it.&lt;br /&gt;
&lt;br /&gt;
Remember one thing there is no short cut and fast methods for earning money online it depends upon your hard work and effort. If you are looking for short cut and earn money within one day most probably you will fall is scam websites and loose your money and time.</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/476285171004154609/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/important-tips-for-earning-online-money.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/476285171004154609'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/476285171004154609'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/important-tips-for-earning-online-money.html' title='IMPORTANT TIPS FOR EARNING ONLINE MONEY'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-7485841642790814134</id><published>2011-01-14T19:12:00.000-08:00</published><updated>2011-01-14T19:12:11.687-08:00</updated><title type='text'>TIPS FOR SMOOTH FUCTIONING OF COMPUTER</title><content type='html'>All of know most of the time our computer hangs or becomes stuck and very slow which makes us bored and angry.I have some tips that can will help your computer to function very smoothly and better running of your computer.&lt;br /&gt;
&lt;br /&gt;
Install a good antivirus software and update it everyday so that virus will not affect our computer.Scan your computer once in a week.When you insert a CD or DVD or USB scan it and check for virus and then use it.If virus affected your computer means it will make the system very slow.&lt;br /&gt;
&lt;br /&gt;
Do not use un-necessary themes and softwares which will cause to the system become very slow.Better use the themes installed on your OS and install the softwares which is supported by the computer.&lt;br /&gt;
&lt;br /&gt;
Regularly clean your system and defragrament it once in a week. Defragrament will help you to free space and speed the system.&lt;br /&gt;
&lt;br /&gt;
Another method to keep your computer active is free the harddisk space. Usually keep the drive space free where your OS files are installed.Usually keep five GB free space on the drive where your OS files are installed. Fully filling your harddisk also slows down your computer usually keep 2-3GB free space on each drive than your computer will not slow down if by doing this your computer speed will increase.&lt;br /&gt;
&lt;br /&gt;
Use the software like TuneUpUtilities to clear registry files and temporary unwanted files it help to speed the system and free the space. You can delete the temporary files by typing the   word %temp% on your run menu and new folder gets opened and delete all the files in there because they are unwanted files.&lt;br /&gt;
&lt;br /&gt;
If you have 2GB RAM and 320GB harddisk space and a graphics card then it is better you can windows7 and will not having much problem and if you  computer ratings are less than mentioned here than it is better to use Windows XP otherwise if you use Windows7 then it will slow the system.&lt;br /&gt;
&lt;br /&gt;
Clean your computer CPU once in a moth because if dust particles or other things enter your CPU then it will slow the system and is very harmful for HardDisk and RAM and may get damaged.</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/7485841642790814134/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/tips-for-smooth-fuctioning-of-computer.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7485841642790814134'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/7485841642790814134'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/tips-for-smooth-fuctioning-of-computer.html' title='TIPS FOR SMOOTH FUCTIONING OF COMPUTER'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-5394775037206738243</id><published>2011-01-14T09:19:00.000-08:00</published><updated>2011-01-14T09:19:48.383-08:00</updated><title type='text'>PTC WEBSITES FOR EARNING</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;I know most of them know about PTC websites and some of you are not interested in it because earnings are less in PTC websites but you are completely wrong.If you are smart enough or spent five minutes every day and earn money from it and completely free.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;For those who are new to online earning money methods then PTC websites are best for you.Spend everyday five minutes and you can earn money from it.Legit websites give you $0.04 per day that means 4 ads per day to view and if you have refferals then you will earn $0.02 from each refferal.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;If you worry that you have no refferal so you cannot earn much money then there is solution for first two months click ads everyday and when you reach $2 you can rent refferals and earn more money. After you earn more money then invest it and upgrade membership and use wisely the money you earned from it then you can earn $20 per day from PTC website.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;PTC websites are good for those people who use internet everyday and work with it.Just use only five minutes and earn money.Earlier I did not like PTC sites but later I understood that anyway I am spending time on internet so use some time here and earn money.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Next question is the minimum payout no need to worry about it almost all legit PTC sites minimum payout is $2 and earn easily it.The PTC sites are legit and pays you money.Do not join the PTC website which pays lots of money and minimum payout very high because most probably that sites are scam.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Why wasting time join PTC sites and earn money and do not invest when you join a PTC site at the first time when you get payments from them and site is at least three years old then you invest your earned money.Most of the legit PTC sites are:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://onbux.com/&quot;&gt;onbux.com&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;a href=&quot;http://neobux.com/&quot;&gt;neobux.com&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;and I am member in this  and this are legit PTC site which paid me money and there are other lots of legit and scam PTC sites when you join other just check it and join.&lt;/b&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/5394775037206738243/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/ptc-websites-for-earning.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/5394775037206738243'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/5394775037206738243'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/ptc-websites-for-earning.html' title='PTC WEBSITES FOR EARNING'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-5022035418222222214</id><published>2011-01-14T06:38:00.001-08:00</published><updated>2011-01-14T08:53:24.168-08:00</updated><title type='text'>GET ANSWERS AND EARN MONEY</title><content type='html'>&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;This is a forum where you can get answers for your technical problems and you can earn money from it by answering the technical answers. &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Now you can get free support for all your technical problems of your computer freely and earn money also if you post on others problems also get money from it.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;The website name is&amp;nbsp; myaffiliateforum and you can post all doubts and technical problems and you can get answers instantly and freely.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;Things to remember in this website is follow the rules of the website and post on correct forums and do not try to advertise on the forum.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href=&quot;http://myaffiliateforum.com/&quot;&gt;&lt;br /&gt;
&lt;/a&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;You can earn money from the forum site. They pay you $0.03 per post on technical problems and if your rating increase and helpful for others then you can get maximum $1 per post.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;The minimum payout of the website is $10 and pay through paypal and payments are done on 13th and 28th of every month.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;&lt;br /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt;If you want to get free answers for your computer technical problems and earn money from it go to the below website link.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://myaffiliateforum.com/&quot;&gt;myaffiliateforum.com/&lt;/a&gt;&lt;span style=&quot;font-size: small;&quot;&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/5022035418222222214/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/get-answers-and-earn-money.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/5022035418222222214'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/5022035418222222214'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/get-answers-and-earn-money.html' title='GET ANSWERS AND EARN MONEY'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry><entry><id>tag:blogger.com,1999:blog-5335456190204671036.post-6733682843820589014</id><published>2011-01-14T06:03:00.001-08:00</published><updated>2011-01-14T08:48:47.658-08:00</updated><title type='text'>SOCIAL NETWORKS WEBSITES</title><content type='html'>The society has changed nowadays due to internet and especially this social networks has brought a large change on our society. &lt;br /&gt;
&lt;br /&gt;
Social networks has brought lots of change in our society and changed peoples behavior and life.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Earlier Orkut had lots of influence on people  and people enjoyed orkut and its applications. But orkut have less security measures and less applications. But it was the first social network site so people enjoyed it mostly. But so many crimes occurred in the orkut and less security measures orkut was banned in many countries and lost its popularity. According to new time social networks the orkut has less applications. &lt;br /&gt;
&lt;br /&gt;
Facebook is other social network which is most popular and with lots of applications in it.Facebook has lots of applications and many security measures and all countries are supporting Facebook and is not banned by any other country.Facebook is best because it has many applications which will never bore facebook surfing it.      &lt;br /&gt;
&lt;br /&gt;
Other one social network which is not popular in U.S and India and popular in other country. This site have unlimited friends and this website have people from all country.Like Facebook it have many applications and  and point system and makes this site more interesting and more applications than Facebook. &lt;br /&gt;
If you want to join this site the link is below&lt;br /&gt;
&lt;a href=&quot;http://perfspot.com/&quot;&gt;perfspot.com&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
As internet have lot of influence on society and people this social networks help people to have enjoyment and relief .</content><link rel='replies' type='application/atom+xml' href='http://rimbochi.blogspot.com/feeds/6733682843820589014/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://rimbochi.blogspot.com/2011/01/social-networks.html#comment-form' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/6733682843820589014'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/5335456190204671036/posts/default/6733682843820589014'/><link rel='alternate' type='text/html' href='http://rimbochi.blogspot.com/2011/01/social-networks.html' title='SOCIAL NETWORKS WEBSITES'/><author><name>Admin</name><uri>http://www.blogger.com/profile/17908195683178411254</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='16' height='16' src='https://img1.blogblog.com/img/b16-rounded.gif'/></author><thr:total>0</thr:total></entry></feed>