<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-7450648132580958732</atom:id><lastBuildDate>Fri, 30 Aug 2024 04:17:55 +0000</lastBuildDate><category>Technorati</category><category>Norton</category><category>pingoat</category><category>Symantec</category><category>Google</category><category>blogflux</category><category>Crack</category><category>Download</category><category>Free</category><category>Hacking</category><category>Japan</category><category>Science and Technology</category><category>Strom Trojan</category><category>camtasia</category><category>pinggoat</category><category>$100 million</category><category>071</category><category>18 million</category><category>360</category><category>Accessibility Services</category><category>Adesnse</category><category>Adobe</category><category>Adobe Air</category><category>Antivirus</category><category>Artistic</category><category>Beta</category><category>Bio sensor</category><category>Botnet</category><category>Bringing AIR to the desktop</category><category>BuyTV</category><category>Camtasia Studio 3.0.0</category><category>Colourful</category><category>Cyber Cops</category><category>Cyber Spy</category><category>Deep Purple</category><category>Dell</category><category>Drawing.Picture</category><category>Dreaming</category><category>Dreams</category><category>Dubai</category><category>Easy wifiradar</category><category>Entertainment</category><category>Episode</category><category>Eye Tracking</category><category>Flight of the navigator</category><category>Free Wifi</category><category>Freebie</category><category>Gadgets</category><category>Games</category><category>Gateway</category><category>Ghost 14</category><category>Ghost 2003</category><category>Ghost 9.0</category><category>Ghost Hard drive</category><category>Ghost Imaging</category><category>Ghost backup</category><category>Ghost disk</category><category>Girls Games</category><category>GoWealthy.com</category><category>Gogle Hacking</category><category>Google Hack</category><category>Google Wifi</category><category>Guitar lessions</category><category>Guitar master</category><category>Hacker</category><category>Hacking Wifi</category><category>Hong Kong architecture</category><category>Hurt</category><category>IBM</category><category>Incredible machines</category><category>India</category><category>Ja</category><category>Keywords</category><category>LTTE Tamil Tigers Terrorists Suicide Bomber Live Action Sri Lanka Douglas Devananda</category><category>Love</category><category>Love to sleep</category><category>Makayama</category><category>Matrix</category><category>Michael Angelo</category><category>Milk</category><category>Milkyway</category><category>Million Dollar</category><category>Mixor.Q</category><category>Mosh</category><category>Moshing</category><category>Moshpit</category><category>Motivation</category><category>Motvik</category><category>Mp3 free</category><category>Music</category><category>N360</category><category>New Product</category><category>News and Politics</category><category>Norton Antivirus</category><category>Norton Ghost</category><category>Norton Internet Security</category><category>Offers</category><category>PC</category><category>Rajan</category><category>Rajiv</category><category>SQL injection</category><category>Screenshot|Free|Snagit|Dowbnload|free software</category><category>Sean Taylor</category><category>Silicon Valley</category><category>Sleep</category><category>Smoke on the water</category><category>Star Trek</category><category>Steve Jobs</category><category>Symantec Antivirus</category><category>Takashi Katsuki</category><category>Teaching Guitar</category><category>Tech Smith</category><category>TechnoFreaks</category><category>Technorati . Coupon</category><category>Thought control robots</category><category>Threat</category><category>TiSP</category><category>Time Traveling</category><category>Top 10</category><category>Trojan.Abwiz.F</category><category>Trojan.Farfli</category><category>Trojan.Hachilem</category><category>Trojan.Srizbi</category><category>Usability Inspection</category><category>User Testing</category><category>Virus</category><category>Web Attack</category><category>Wifi</category><category>Yaro Starak</category><category>Youtube</category><category>ads</category><category>adsense</category><category>backup software</category><category>bloggers</category><category>bomb attack</category><category>buy links</category><category>buy text links</category><category>copyright</category><category>crowd</category><category>cutting edge technology</category><category>cyber cop</category><category>death</category><category>eBay</category><category>easy money</category><category>email campaign tracking</category><category>email tracing</category><category>email tracking software</category><category>encryption</category><category>entrepreneurs</category><category>esafe</category><category>famous</category><category>free Mp3</category><category>free music</category><category>funny</category><category>future gaming</category><category>hacking exposed</category><category>head bang</category><category>iPhone</category><category>intrusion detection</category><category>live footage</category><category>make money</category><category>mastertheguitar.co.uk</category><category>mes Law Cybertecture</category><category>metal</category><category>mind control</category><category>naughty</category><category>neurosky</category><category>no Hacking</category><category>offer</category><category>online</category><category>packet sniffers</category><category>password</category><category>password hacking</category><category>pasword cracking</category><category>pcAnywhere</category><category>peak</category><category>performance</category><category>ping Pong</category><category>piracy</category><category>policy</category><category>protection</category><category>redskins</category><category>research</category><category>rock</category><category>sci-fi</category><category>sell text links</category><category>serial key</category><category>sniffers</category><category>sports</category><category>sudden death</category><category>taylor dies</category><category>test links</category><category>tetris.real live</category><category>text ads</category><category>text links</category><category>the ones who walk away from omelas</category><category>tools</category><category>toys</category><category>trace an email</category><category>trace email</category><category>trace email address</category><category>trace email origin</category><category>tracing email addresses</category><category>tuneup</category><category>unk walk it out remix</category><category>version 3</category><category>walk on the ocean</category><category>walking</category><category>walking shoes</category><category>“The Pad”</category><category>“iPod” apartments</category><title>Vj-Master Blogger</title><description>Trendy Techno Tutor</description><link>http://vj-news.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>36</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><xhtml:meta content="noindex" name="robots" xmlns:xhtml="http://www.w3.org/1999/xhtml"/><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-6366338118808848555</guid><pubDate>Sun, 16 Dec 2007 02:28:00 +0000</pubDate><atom:updated>2007-12-16T08:00:42.347+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">blogflux</category><category domain="http://www.blogger.com/atom/ns#">Japan</category><category domain="http://www.blogger.com/atom/ns#">Matrix</category><category domain="http://www.blogger.com/atom/ns#">ping Pong</category><category domain="http://www.blogger.com/atom/ns#">pingoat</category><category domain="http://www.blogger.com/atom/ns#">sports</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Ping Pong Matrix</title><description>What ping pong would look like if it was in The Matrix.&lt;br /&gt;&lt;br /&gt;&lt;object type="application/x-shockwave-flash" data="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=24992&amp;fullscreen=1" width="480" height="360" &gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="movie" quality="best" value="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=24992&amp;fullscreen=1" /&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;[Via]: http://www.collegehumor.com/video:24992</description><link>http://vj-news.blogspot.com/2007/12/ping-pong-matrix.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-6762078264061667953</guid><pubDate>Sun, 16 Dec 2007 02:16:00 +0000</pubDate><atom:updated>2007-12-16T07:49:06.104+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Incredible machines</category><category domain="http://www.blogger.com/atom/ns#">Japan</category><category domain="http://www.blogger.com/atom/ns#">pingoat</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Incredible machines from Japan</title><description>Incredible Mind | Incredible machines from Japan.&lt;br /&gt;&lt;br /&gt;&lt;object type="application/x-shockwave-flash" data="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=1682247&amp;fullscreen=1" width="480" height="360" &gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="movie" quality="best" value="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=1682247&amp;fullscreen=1" /&gt;&lt;/object&gt;</description><link>http://vj-news.blogspot.com/2007/12/incredible-machines-from-japan.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-1632826037205240789</guid><pubDate>Sun, 16 Dec 2007 01:33:00 +0000</pubDate><atom:updated>2007-12-16T07:43:46.679+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Artistic</category><category domain="http://www.blogger.com/atom/ns#">Colourful</category><category domain="http://www.blogger.com/atom/ns#">Drawing.Picture</category><category domain="http://www.blogger.com/atom/ns#">Milk</category><category domain="http://www.blogger.com/atom/ns#">Milkyway</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Colourful Milk | This is for all Artistic folks | Sorry about the music</title><description>Wanna see a Rainbow ? No need to wait for the rain.&lt;br /&gt;&lt;object type="application/x-shockwave-flash" data="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=1793598&amp;fullscreen=1" width="480" height="360" &gt;&lt;param name="allowfullscreen" value="true" /&gt;&lt;param name="movie" quality="best" value="http://www.collegehumor.com/moogaloop/moogaloop.swf?clip_id=1793598&amp;fullscreen=1" /&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Wanna see a Rainbow ? No need to wait for the rain.Check out the Milk Rainbow...</description><link>http://vj-news.blogspot.com/2007/12/colourful-milk-this-is-for-all-artistic.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-5474816405515733616</guid><pubDate>Sun, 16 Dec 2007 01:00:00 +0000</pubDate><atom:updated>2007-12-16T06:39:57.275+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">cutting edge technology</category><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><category domain="http://www.blogger.com/atom/ns#">pingoat</category><category domain="http://www.blogger.com/atom/ns#">Science and Technology</category><category domain="http://www.blogger.com/atom/ns#">TechnoFreaks</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Is that a cricket ball? Is that a rubber ball? Its the techno Cam |Satugo</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0qmQRJl0TTo6O468zPE6tj7Me74jbc4PbK0tu8Ghwqn7F2KBOzawHI4egRxZnUt5w517b5UQptexu_28syB41OFOTqj3jUtyhdrxQ-W78tCTiLiGbyPrbYbntUVdVyAuA-Aeb32U6mQEz/s1600-h/satugoes1.jpg"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0qmQRJl0TTo6O468zPE6tj7Me74jbc4PbK0tu8Ghwqn7F2KBOzawHI4egRxZnUt5w517b5UQptexu_28syB41OFOTqj3jUtyhdrxQ-W78tCTiLiGbyPrbYbntUVdVyAuA-Aeb32U6mQEz/s200/satugoes1.jpg" border="0" alt=""id="BLOGGER_PHOTO_ID_5144369762138326386" /&gt;&lt;/a&gt;&lt;br /&gt;All &lt;a href="http://vj-news.blogspot.com/2007/11/what-would-you-do-if-you-get.html"&gt;techno gadgets &lt;/a&gt;freaks get closer then you ever imagined to the oddities of nature with a &lt;a href="http://www.satugo.com/"&gt;SatuGO&lt;/a&gt; camera, simply throw the SatuGO and capture your picture with the built-in timer. Add seconds to the timer simply by knocking the SatuGO, throw it and the countdown begins.&lt;br /&gt;Shoot From your hips: If you want to take ordinary pictures, grab the SatuGO camera push it towards the motive until the cord is stretched, and it takes a picture. By stretching the cord the lens is fixated and gives you the possibility to take quick but steady pictures. The cord is also the USB cable and comes in handy when you want to move data, or see your pictures.&lt;br /&gt;&lt;br /&gt;[Via] http://www.satugo.com/</description><link>http://vj-news.blogspot.com/2007/12/is-that-cricket-ball-is-that-rubber.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0qmQRJl0TTo6O468zPE6tj7Me74jbc4PbK0tu8Ghwqn7F2KBOzawHI4egRxZnUt5w517b5UQptexu_28syB41OFOTqj3jUtyhdrxQ-W78tCTiLiGbyPrbYbntUVdVyAuA-Aeb32U6mQEz/s72-c/satugoes1.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-1026531840131247919</guid><pubDate>Wed, 05 Dec 2007 11:03:00 +0000</pubDate><atom:updated>2007-12-05T17:19:03.752+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">camtasia</category><category domain="http://www.blogger.com/atom/ns#">Crack</category><category domain="http://www.blogger.com/atom/ns#">Dell</category><category domain="http://www.blogger.com/atom/ns#">funny</category><category domain="http://www.blogger.com/atom/ns#">Gateway</category><category domain="http://www.blogger.com/atom/ns#">IBM</category><category domain="http://www.blogger.com/atom/ns#">Screenshot|Free|Snagit|Dowbnload|free software</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Call centers | Support |Screenshot|Need help?|Techno Geeks</title><description>Support: Could you send a screentshot of the issue?&lt;br /&gt;Customer: Sure I can,give me moment.&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_aEminqVZjAfU2mc52rK9By1NW6QJ-9VP-hcTZZMmP6pO_fEeXr5DpDZmBZgFiq0HpBc0AhXw7miGQ_6vb0VlCJqUgH21tbkVW36LQasAu8peesoTnd46-WWoMeBTQWpIP5LB8NZKNy9/s1600-h/support.png"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_aEminqVZjAfU2mc52rK9By1NW6QJ-9VP-hcTZZMmP6pO_fEeXr5DpDZmBZgFiq0HpBc0AhXw7miGQ_6vb0VlCJqUgH21tbkVW36LQasAu8peesoTnd46-WWoMeBTQWpIP5LB8NZKNy9/s200/support.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5140442967199127538" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.feedburner.com/fb/a/emailverifySubmit?feedId=1371283&amp;amp;loc=en_US"&gt;If you enjoyed this post, make sure you subscribe to the VJ-News RSS feed!&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Technorati&lt;/strong&gt; is cool!!!!&lt;br /&gt;Courtesy:aboutcolonblank.com</description><link>http://vj-news.blogspot.com/2007/12/call-centers-support-screenshotneed.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjR_aEminqVZjAfU2mc52rK9By1NW6QJ-9VP-hcTZZMmP6pO_fEeXr5DpDZmBZgFiq0HpBc0AhXw7miGQ_6vb0VlCJqUgH21tbkVW36LQasAu8peesoTnd46-WWoMeBTQWpIP5LB8NZKNy9/s72-c/support.png" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-2606821059886871456</guid><pubDate>Wed, 05 Dec 2007 09:41:00 +0000</pubDate><atom:updated>2007-12-05T15:21:40.280+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dubai</category><category domain="http://www.blogger.com/atom/ns#">GoWealthy.com</category><category domain="http://www.blogger.com/atom/ns#">Hong Kong architecture</category><category domain="http://www.blogger.com/atom/ns#">Ja</category><category domain="http://www.blogger.com/atom/ns#">mes Law Cybertecture</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">“iPod” apartments</category><category domain="http://www.blogger.com/atom/ns#">“The Pad”</category><title>“iPod” apartments | Dubai Rocks</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxlxGCJYMBfdn37K650S6cTd6njr_EsRwO3LyqRiwqLqn2dtx25BM_O_EL4I6XernVFpjts8OPipoirNmVfK8w1yolgEU8eE_5eCoWyYSKOhH9ZU5_xCrgUyatwgDDk2N2MFOJC_Xi7mKa/s1600-h/ipod.JPG"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxlxGCJYMBfdn37K650S6cTd6njr_EsRwO3LyqRiwqLqn2dtx25BM_O_EL4I6XernVFpjts8OPipoirNmVfK8w1yolgEU8eE_5eCoWyYSKOhH9ZU5_xCrgUyatwgDDk2N2MFOJC_Xi7mKa/s200/ipod.JPG" border="0" alt=""id="BLOGGER_PHOTO_ID_5140422987011266530" /&gt;&lt;/a&gt;&lt;br /&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNpZxcY6aMxajqJDKfD9G3i0CsB_GTgQtSzYtIJ_e5akm1wIoeKCAP5fCOkKeydauMGdCGHksSIcbDUalzi7rAwDerMAPEN0g5fLwxoYbKle44PXnRy2MJk1MtoXs41bslk4Wt0m16BFvZ/s1600-h/ipod2.png"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNpZxcY6aMxajqJDKfD9G3i0CsB_GTgQtSzYtIJ_e5akm1wIoeKCAP5fCOkKeydauMGdCGHksSIcbDUalzi7rAwDerMAPEN0g5fLwxoYbKle44PXnRy2MJk1MtoXs41bslk4Wt0m16BFvZ/s200/ipod2.png" border="0" alt=""id="BLOGGER_PHOTO_ID_5140422832392443858" /&gt;&lt;/a&gt;&lt;br /&gt;The “iPod” apartments design was reportedly created by Hong Kong architecture company James Law Cybertecture, and will be executed by intelligent building developer Omniyat Properties. The building will be built in Dubai's Business Bay.&lt;br /&gt;Starting prices according to Dubai based realtors GoWealthy.com are as follows:&lt;br /&gt;&lt;br /&gt;Studio US$343,688&lt;br /&gt;1 Bedroom US$362,372&lt;br /&gt;2 Bedroom US$901,158&lt;br /&gt;Currently two-bedroom apartments in the more conventional West Wharf development are being sold for around US$550,000. This is a development by Corporate Finance House scheduled for completion about a year ahead of the Pad.Nicknamed the “iPod” apartments, “The Pad” is a 230 apartment block building schecduled for completion in 2008.&lt;br /&gt;&lt;br /&gt;Futuristic intelligent features of the Pad will include the following:&lt;br /&gt;&lt;br /&gt;• Rotating living and dinning rooms so as to enjoy views on either side of the waterfront building&lt;br /&gt;• Virtual panoramas from other parts of the world projecting on windows (iReality)&lt;br /&gt;• Video-conferencing in the dinning room&lt;br /&gt;• Reactive lighting able to respond to your mood or even to telephone calls (iAmbiance)&lt;br /&gt;• Bathroom health monitoring equipment&lt;br /&gt;&lt;br /&gt;The purpose of room rotation is aesthetic rather than the space-saving device developed by Luigi Colani in Germany in recent years. The 360 degree views referred to in the Omniyat Property press release are not clearly reflected in all of the floor plans but the feature will certainly allow for the flexible use of the accommodation. Some apartments appear from floor plans to also include rotating double beds.&lt;br /&gt;&lt;br /&gt;At the time of its launch Omniyat made clear that it hopes to incorporate robotic features into its developments such as robot vacuum cleaning but that seems to be some way in the future.&lt;br /&gt;&lt;br /&gt;Facilities for residents will include a retail area, parking, the iClub, swimming deck, media Jacuzzi, underwater concert, media deck chairs, aerobics section, lap pool, half basketball court, running track, barbeque &amp; gathering Area.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.feedburner.com/fb/a/emailverifySubmit?feedId=1371283&amp;amp;loc=en_US"&gt;If you enjoyed this post, make sure you subscribe to the VJ-News RSS feed!&lt;br /&gt;&lt;/a&gt;&lt;br /&gt;&lt;strong&gt;Technorati&lt;/strong&gt; is cool !!!!!!!</description><link>http://vj-news.blogspot.com/2007/12/ipod-apartments-dubai-rocks.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxlxGCJYMBfdn37K650S6cTd6njr_EsRwO3LyqRiwqLqn2dtx25BM_O_EL4I6XernVFpjts8OPipoirNmVfK8w1yolgEU8eE_5eCoWyYSKOhH9ZU5_xCrgUyatwgDDk2N2MFOJC_Xi7mKa/s72-c/ipod.JPG" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-1718759138100974594</guid><pubDate>Mon, 03 Dec 2007 13:25:00 +0000</pubDate><atom:updated>2007-12-03T18:59:13.034+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">bomb attack</category><category domain="http://www.blogger.com/atom/ns#">famous</category><category domain="http://www.blogger.com/atom/ns#">live footage</category><category domain="http://www.blogger.com/atom/ns#">LTTE Tamil Tigers Terrorists Suicide Bomber Live Action Sri Lanka Douglas Devananda</category><category domain="http://www.blogger.com/atom/ns#">pinggoat</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>World thrilling live Footage | Live Sucide Bomer from Srilanka</title><description>Sucide Bomer Attck | Live Footagefrom Srilanka&lt;br /&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/sUdUEOVdEuc&amp;rel=1&amp;border=0"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/sUdUEOVdEuc&amp;rel=1&amp;border=0" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;In this chilling security camera footage, a female suicide bomber (Tamil Tiger terrorist) on a mission to kill a Sri Lankan Cabinet minister Douglas Devananda (a moderate Tamil political leader) is seen patiently answering questions in a bustling government office before calmly standing up and detonating the bomb hidden in her bra. 'Madness of Terrorism' - LTTE Human Bomb in Action, courtesy of defence.lk (Ministry of Defence, Sri Lanka). &lt;br /&gt;&lt;br /&gt;[Via] http://youtube.com</description><link>http://vj-news.blogspot.com/2007/12/world-thrilling-live-footage-live.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-4365426066089152688</guid><pubDate>Mon, 03 Dec 2007 10:44:00 +0000</pubDate><atom:updated>2007-12-03T18:47:02.024+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adesnse</category><category domain="http://www.blogger.com/atom/ns#">bloggers</category><category domain="http://www.blogger.com/atom/ns#">make money</category><category domain="http://www.blogger.com/atom/ns#">Million Dollar</category><category domain="http://www.blogger.com/atom/ns#">online</category><category domain="http://www.blogger.com/atom/ns#">pingoat</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">Top 10</category><title>Secret of Blogging | Bloggers Secret | Make Money Online |Tips for bloggers | Top 10 things for bloggers to know</title><description>&lt;strong&gt;Step 1.&lt;/strong&gt;&lt;br /&gt;For any blog, you need to write content. Make sure you post a minimum of 3 to 5 new entries in your blog per week.&lt;br /&gt;Doing this, and posting meaningful article that people want to read, will generate more revenue for you!&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 2.&lt;/strong&gt;&lt;br /&gt;Once your happy with the amount of content in your blog, its time to interrogate AdSense, for people who don't already know what AdSense is, you can find out here:&lt;br /&gt;&lt;a href="http://www.google.com/services/adsense_tour/index.html"&gt;http://www.google.com/services/adsense_tour/index.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;TIP: Interrogating Google AdSense at the top of your page is known to convert more clicks for you, also make the ad look like part of your content by using the same background &amp;amp; font colors ect.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 3.&lt;/strong&gt;&lt;br /&gt;Use Section Targeting html triggers ti target you adsense.&lt;br /&gt;&lt;br /&gt;Enter your text or blog about any topic to target the adsense&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;( Since the section targets are part of the html codes I am unable to include them here in my blog, please email me to vijaybhaskaran78@gmail.com by subscribing to my blog.I will send the codes personally to your email address)&lt;/strong&gt;&lt;br /&gt;The google algorith would search&lt;br /&gt;The google algorith would search only these contents and will popup the adesen according to this topic and thsi way you can target your adds based on the customers that you interact.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Step 4.&lt;/strong&gt; Promote your blog! Some blogs help promote them self to search engines, but that isn't enough. You need to link to your blog as much as possible. Participate in link exchanges and link to your blog in your forum signature. You should soon see an increase in traffic.Use Text links Add sales whcih woudl also give big easy money.Links are good for traffic building.use Blog Directories and use &lt;a href="http://scoop.isedb.com/"&gt;http://scoop.isedb.com/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 5:&lt;/strong&gt; Use technorati &amp; pinggoat . This is the most powerful way to ping the website. Use these two key words in all your keywords.This will pull maximum traffic.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 6:&lt;/strong&gt; The step to increase the readers to vist your blog is to publish a full feed rss.Dont worry about people who would be just held up in their emails and not visit the blog. The solution to this problem is to provide intractive contents by embeding the videos and also link to the old posts and also reply to the comments form all the readers in your blog and also in their blog.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 7:&lt;/strong&gt; Dont write it in a hurry because you got an important information which might increase the traffic. If you dont write well it might also end up to be a bad article. Always be calm,relax and enjoy your writing.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 8:&lt;/strong&gt; The most important is to use Wordpress and Adsense Delux. remember not to use any free hosting like blogspot.. Hey u think i am also using the blogspot... ye but i am shifting to wordpress .Most of the top bloggers that I met use Wordpress.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 9:&lt;/strong&gt; Now, for most bloggers AdSense earns them a steady amount. But for people who really want to maximize their earning, I suggest using Kontera's Content Link. This is a service that places sponsored links on certain keywords within your blog entries, just like AdSense, when people click on them you get money.&lt;br /&gt;More Info: http://kontera.com/&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Step 10:&lt;/strong&gt;Give lots of free stuffs and shall you receive.try some link baiting techniques and most of all is believing in you.&lt;br /&gt;&lt;br /&gt;I have got some money from adsense and so i am buying 7 domains and going to host my website in all of them. I have learnt the ways of making cool money. hope you also learn them and make more extra pocket money.I have been trying more, for a long time and spent a lot to learn all these but I do not wnat otehrs to do this and waste time. Hope you all get more money and if you think this article has really helped you then you can comment and also link my website or subscribe me through email and ensure to activate them. I will come with yet another article soon.</description><link>http://vj-news.blogspot.com/2007/12/secret-of-blogging-bloggers-secret-make.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-3629085125160197639</guid><pubDate>Mon, 03 Dec 2007 08:45:00 +0000</pubDate><atom:updated>2007-12-03T14:24:21.735+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">backup software</category><category domain="http://www.blogger.com/atom/ns#">blogflux</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Ghost 14</category><category domain="http://www.blogger.com/atom/ns#">Ghost 2003</category><category domain="http://www.blogger.com/atom/ns#">Ghost 9.0</category><category domain="http://www.blogger.com/atom/ns#">Ghost backup</category><category domain="http://www.blogger.com/atom/ns#">Ghost disk</category><category domain="http://www.blogger.com/atom/ns#">Ghost Hard drive</category><category domain="http://www.blogger.com/atom/ns#">Ghost Imaging</category><category domain="http://www.blogger.com/atom/ns#">Norton Antivirus</category><category domain="http://www.blogger.com/atom/ns#">Norton Ghost</category><category domain="http://www.blogger.com/atom/ns#">pingoat</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Norton Ghost | Beta Norton Ghost |Do u like Ghost 2003| Download|Offers</title><description>Hey I am excited to let you know that Ghost 14 is going to get released soon and if you did not had a chance to test the beta in your system then you can do so by using the link below.If you download now u can you it for 30 days for free then enroll yourself in the following link. If you enroll now you can downlod the beta software of both Ghost and N360 .&lt;br /&gt;&lt;a href="https://et.symantec.com/signup/default.html"&gt;https://et.symantec.com/signup/default.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;If you have any comments or clarification please leave a note to me.</description><link>http://vj-news.blogspot.com/2007/12/norton-ghost-beta-norton-ghost-do-u.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-8872761977082831293</guid><pubDate>Mon, 03 Dec 2007 08:15:00 +0000</pubDate><atom:updated>2007-12-03T14:08:55.937+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">$100 million</category><category domain="http://www.blogger.com/atom/ns#">ads</category><category domain="http://www.blogger.com/atom/ns#">adsense</category><category domain="http://www.blogger.com/atom/ns#">blogflux</category><category domain="http://www.blogger.com/atom/ns#">buy links</category><category domain="http://www.blogger.com/atom/ns#">buy text links</category><category domain="http://www.blogger.com/atom/ns#">easy money</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Keywords</category><category domain="http://www.blogger.com/atom/ns#">pinggoat</category><category domain="http://www.blogger.com/atom/ns#">sell text links</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">test links</category><category domain="http://www.blogger.com/atom/ns#">text ads</category><category domain="http://www.blogger.com/atom/ns#">text links</category><title>Text Links  Want Link popularity | Want Page Ranking ?</title><description>When search engines such as Google began to rank Websites based upon the number and quality of sites that linked to them, those search engines created a digital cottage industry called link placement. Emailing for link swaps was wildly popular with some, while others placed banner ads containing direct links to their own sites. Both solutions fit well with search engine's immature algorithms. &lt;br /&gt;&lt;a href="http://www.text-link-ads.com/"&gt;http://www.text-link-ads.com/&lt;/a&gt;&lt;br /&gt;Since then, search engines have vastly improved their systems for the filtering or removal of paid advertising links. Some of these steps have turned out to be unfair to many smaller Websites that are not connected to the larger Web publishers. As Google changes its algorithm, so the shape of the Web changes with it.&lt;br /&gt;The service offered by Text Link Ads is a little different to other advertising solutions - rather than pay per action, click or impression, payouts are based on an allotted value per month for a text link placed on a given site.&lt;br /&gt;&lt;br /&gt;The system itself is a little more involved than JavaScript-based solutions, such as AdSense - it requires the insertion of code in PHP, or whatever language your site runs on (everything under the sun is supported, from ASP, .NET, RoR, to standard blogging platforms such as WordPress). Ads are served from an XML file stored on your server, and managed by the scripting that you install. It all seems speedy on the backend, so there's none of the delay associated with JavaScript ads.&lt;br /&gt;&lt;br /&gt;The revenue is based on a number of factors - Alexa ranking seems to be one, with PageRank and Technorati rankings also being potential considerative factors. The more important your site is deemed, the more revenue per ad slot you will get. The higher-paying sites earn up to around &lt;strong&gt;$300/month&lt;/strong&gt;, per slot - and with up to 10 slots available to sell, there's good potential for consistent earnings.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What are text links?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;DEFINITION&lt;br /&gt;Links and Hyperlinks are used interchangeably.A text link is a text hyperlink that typically links to another online document, such as a webpage, PDF file, video, Excel spreadsheet, etc. Text links can also point to another location on the same page.&lt;br /&gt;&lt;br /&gt;The hyperlinks are typically underlined and highlighted in blue for unvisited links and purple for visited links. Internet users travel from one document to another by clicking on the links.&lt;br /&gt;&lt;br /&gt;Here are some examples of the underlying HTML code for a text link:&lt;br /&gt;&lt;br /&gt;&lt;a href="index.html"&gt;homepage&lt;/a&gt;&lt;br /&gt;&lt;a href="http://www.google.com"&gt;Google&lt;/a&gt;&lt;br /&gt;What do text links have to do with search engines?&lt;br /&gt;Search engines send out automated software programs called spiders (also known as crawlers or robots) to crawl the World Wide Web indexing retrieve webpages, documents, and other files to be used to create search indexes.&lt;br /&gt;&lt;br /&gt;Text links are like the highways that search engine spiders travel along to find online documents. Text links help search engines better understand the topic of a link destination because spiders can index the link text (also known as Anchor Text) contained within text links. They are basically descriptive markers of what the linked document is about. In effect text links are like road signs.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How do text links improve search engine rankings?&lt;/strong&gt;&lt;br /&gt;In the Google Webmaster Guidelines guide, under the "Design and content guidelines" section, it suggests and I quote,&lt;br /&gt;&lt;br /&gt;"Make a site with a clear hierarchy and text links. Every page should be reachable from at least one static text link."&lt;br /&gt;You can't get a clearer guideline than that.&lt;br /&gt;&lt;br /&gt;So firstly, text links help search engine spiders find, crawl and index all the webpages in your website. After all, if search engines can't find your webpages, they won't show up in the search results.&lt;br /&gt;&lt;br /&gt;And second, as I mentioned above, text links help search engines understand the topic of a link destination. Search engines spiders doesn't recognize text contained in images. Although there are ways to help spiders understand the content of image links (as explored in the Image Links guide), text links are the preferred method.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How do I get people to link to my web site?&lt;/strong&gt;&lt;br /&gt;A link is the online equivalent of a "word of mouth" recommendation in the real world. Have you ever recommended a movie or a restaurant to someone you know? Why did you do that? Because the movie or restaurant was great and you wanted to share it with them, right?&lt;br /&gt;&lt;br /&gt;Well, people "recommend" websites for the same reason you recommend a movie or restaurant. They do this by linking to the websites they like.&lt;br /&gt;&lt;br /&gt;So the secret to getting people to link to your website is to create great content or web tools that other people like to share with their website visitors.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What is link traffic?&lt;/strong&gt;&lt;br /&gt;Link traffic is traffic generated by links to your website. So getting people to link to your website isn't just about improving search engine rankings. It also generates traffic.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What is link popularity?&lt;/strong&gt;&lt;br /&gt;DEFINITION&lt;br /&gt;Link Popularity is sometimes shortened to Link Pop.Link popularity is a measure of the number of links pointing to a webpage, without any regard for the quality of the links.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;Text Link Ads offers 10,000s of PageRank 4 to 9, static text link ads, on 1000s of websites, blogs, and forums, as well as sell text links on your websites to other internet marketers. Get $100 of free links!&lt;/strong&gt;</description><link>http://vj-news.blogspot.com/2007/12/texet-links-want-link-popularity-wnat.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-2830747898002168106</guid><pubDate>Tue, 27 Nov 2007 15:59:00 +0000</pubDate><atom:updated>2007-11-29T10:20:20.861+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">18 million</category><category domain="http://www.blogger.com/atom/ns#">death</category><category domain="http://www.blogger.com/atom/ns#">redskins</category><category domain="http://www.blogger.com/atom/ns#">Sean Taylor</category><category domain="http://www.blogger.com/atom/ns#">sudden death</category><category domain="http://www.blogger.com/atom/ns#">taylor dies</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Football player wounded in shooting dies | Redskins' Taylor dies after shooting</title><description>The 24-year-old died in a Florida hospital where he underwent nearly seven hours of emergency surgery Monday to repair a severed femoral artery, the team confirmed in a website statement. "He never regained consciousness," Sharpstein told CNN. "He was unconscious when the fire rescue people arrived. It's a senseless tragic death."  Redskins running back Clinton Portis, who played with Taylor in college, told reporters yesterday that Taylor changed after the birth of his daughter last year. &lt;br /&gt;&lt;br /&gt;``It was like a new Sean,'' Portis said. &lt;br /&gt;&lt;br /&gt;Taylor signed a seven-year, $18 million contract with the Redskins in 2004 after being selected an All-American and the Big East Conference's Defensive Player of the Year during his senior season at Miami. He played four seasons for the Hurricanes and in 2001 was one of just four freshmen to play for Miami during its national championship campaign. &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Official Website:&lt;/strong&gt; http://seantaylor.kcbsportsmarketing.com/&lt;br /&gt;&lt;strong&gt;Big HitZ of  Sean Taylor&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/gj0rEv6Gfk8&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/gj0rEv6Gfk8&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/b1TgyMrkqNs&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/b1TgyMrkqNs&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/IdPqi69-qmY&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/IdPqi69-qmY&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;MIAMI (AP) - Washington Redskins safety Sean Taylor has died in a Florida hospital, one day after being shot at his home. &lt;br /&gt;Sharpstein calls Taylor's death a "tremendously sad and unnecessary event." He says the player was a "wonderful, humble, talented young man, and had a huge life in front of him."&lt;br /&gt;Doctors had been encouraged last night when Taylor squeezed a nurse's hand. But Sharpstein said he was told Taylor never regained consciousness after being transported to the hospital.&lt;br /&gt;Police are still investigating the shooting as a possible armed robbery.&lt;br /&gt;&lt;br /&gt;Taylor's former lawyer, Richard Sharpstein, says he received the news this morning from Taylor's father. Taylor was recruited by the University of Miami and enrolled in 2001. That year, he was one of just four true freshmen to play for Miami in the 2001 national championship season, carving a niche for himself in Miami's secondary in nickel and dime coin packages. Taylor was named "Big East Special Teams Player" of the Week for his performance against the University of Pittsburgh.[5]&lt;br /&gt;In 2002, Taylor was a second-team All-Big East selection by the league's head coaches in his first season as a starter. He finished third on the team in tackles with 85 (53 solos), broke up 15 passes, intercepted 4 passes, forced one fumbles, blocked one kick and returned a punt for a touchdown. He led all defensive backs in tackles, interceptions and passes broken up and had a career-high 11 tackles (2 solo) and intercepted 2 passes in the Fiesta Bowl loss to Ohio State University.&lt;br /&gt;During his final year at Miami, Taylor produced a historic season that culminated with a plethora of honors and awards. He was a named a consensus first-team All-American, the "Big East Conference Defensive Player of the Year" and a finalist for the "Jim Thorpe Award" given to the nation's best defensive back. He led the Big East Conference and ranked first nationally in interceptions per game (0.98) with 10, tying the record for interceptions in a season with former Hurricane standout Bennie Blades. He finished first in total tackles with 77 (57 solos). He intercepted two passes in Miami's impressive 28-14 win over Pittsburgh, playing a key role as the Hurricanes limited All-American receiver Larry Fitzgerald to two receptions for 13 yards. He returned interceptions for an average of 18.4 yards, including a 67-yard touchdown return at Boston College, a 50-yard scoring runback at Florida State, and a 44-yard scoring runback against Rutgers. His three TD returns of interceptions is a Miami single-season record.</description><link>http://vj-news.blogspot.com/2007/11/football-player-wounded-in-shooting.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-5740943427264512230</guid><pubDate>Tue, 27 Nov 2007 10:50:00 +0000</pubDate><atom:updated>2007-11-29T10:20:49.562+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Free</category><category domain="http://www.blogger.com/atom/ns#">Free Wifi</category><category domain="http://www.blogger.com/atom/ns#">Google Wifi</category><category domain="http://www.blogger.com/atom/ns#">Hacker</category><category domain="http://www.blogger.com/atom/ns#">no Hacking</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">TiSP</category><title>Free Wifi | Google Free Wifi | Google TiSP | Installling Google Wifi (sanitary process )</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiea6NG49viIq-BFVVbfPv_6_vuPjDJ3I48VdpD24jAF_-w2omDh9iKlYqWsRdaN22K5jen5VMF7YIMVqQDI5zgwBgnCfmRmHsbzVFGwDv9JFyNx6Hweb_Wzf4b9oipxHWRTB9GdyxJhcSq/s1600-h/Tisp.bmp"&gt;&lt;img style="display:block; margin:0px auto 10px; text-align:center;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiea6NG49viIq-BFVVbfPv_6_vuPjDJ3I48VdpD24jAF_-w2omDh9iKlYqWsRdaN22K5jen5VMF7YIMVqQDI5zgwBgnCfmRmHsbzVFGwDv9JFyNx6Hweb_Wzf4b9oipxHWRTB9GdyxJhcSq/s200/Tisp.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5137472389796930594" /&gt;&lt;/a&gt;&lt;br /&gt;For those who haven't seen the news yet Google TiSP (BETA) is a fully functional, end-to-end system that provides in-home wireless access by connecting your commode-based TiSP wireless router to one of thousands of TiSP Access Nodes via fiber-optic cable strung through your local municipal sewage lines.Solution for the last hundred yards. It's in BETA, and those wishing to participate must apply soon.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;How can Google offer this service for free? &lt;/strong&gt;&lt;br /&gt;We believe that all users deserve free, fast and sanitary online access. To offset the cost of providing the TiSP service, we use information gathered by discreet DNA sequencing of your personal bodily output to display online ads that are contextually relevant to your culinary preferences, current health status and likelihood of developing particular medical conditions going forward. Google also offers premium levels of service for a monthly fee.</description><link>http://vj-news.blogspot.com/2007/11/free-wifi-google-free-wifi-google-tisp.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiea6NG49viIq-BFVVbfPv_6_vuPjDJ3I48VdpD24jAF_-w2omDh9iKlYqWsRdaN22K5jen5VMF7YIMVqQDI5zgwBgnCfmRmHsbzVFGwDv9JFyNx6Hweb_Wzf4b9oipxHWRTB9GdyxJhcSq/s72-c/Tisp.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-2796388406745827297</guid><pubDate>Tue, 27 Nov 2007 08:22:00 +0000</pubDate><atom:updated>2007-11-29T10:21:07.352+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Adobe</category><category domain="http://www.blogger.com/atom/ns#">Adobe Air</category><category domain="http://www.blogger.com/atom/ns#">Beta</category><category domain="http://www.blogger.com/atom/ns#">Bringing AIR to the desktop</category><category domain="http://www.blogger.com/atom/ns#">Download</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Adobe AIR brings the desktop | Beta Air from Adobe</title><description>&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAU4gA_W9hwufFeVETtwcR8GegRymdYuDpSLEeUtbguI5w9ZRW5OvPvoUPWCQw9M3atR_6oKOjPSziL2J2M7F0IjI9dkC-KoBIFiwO4EGtdfEx9pFVxSxhonHoOtp8fjJ6gjzTF-bp6ZhS/s1600-h/dcd.bmp"&gt;&lt;img style="float:right; margin:0 0 10px 10px;cursor:pointer; cursor:hand;" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAU4gA_W9hwufFeVETtwcR8GegRymdYuDpSLEeUtbguI5w9ZRW5OvPvoUPWCQw9M3atR_6oKOjPSziL2J2M7F0IjI9dkC-KoBIFiwO4EGtdfEx9pFVxSxhonHoOtp8fjJ6gjzTF-bp6ZhS/s200/dcd.bmp" border="0" alt=""id="BLOGGER_PHOTO_ID_5137458839175111698" /&gt;&lt;/a&gt;&lt;br /&gt;A new version of the Adobe AIR SDK download was posted on 10/1/2007.The Adobe Labs has released the Adobe Integrated Runtime (AIR), which provides this functionality.&lt;br /&gt;Adobe describes AIR as a cross-operating system runtime that allows developers to leverage existing Web development skills to build and deploy rich Web applications to the desktop. It provides support for Flash, Flex, HTML, JavaScript, and AJAX.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Getting the software:&lt;/strong&gt;&lt;br /&gt;This download provides the beta 1 version of Adobe AIR. This runtime is no longer recommended for use, but may be required for applications that have not been updated to use beta 2. The Adobe AIR beta 1 was released on June 11, 2007 and contains a timeout that will cause it to stop working on December 11, 2007.&lt;br /&gt;English&lt;br /&gt;&lt;a href="http://download.macromedia.com/pub/labs/air/air_b1_mac_061107.dmg"&gt;Download for Macintosh (DMG, 8 MB) &lt;/a&gt;&lt;br /&gt;&lt;a href="http://download.macromedia.com/pub/labs/air/air_b1_win_061107.exe"&gt;Download for Windows (EXE, 9 MB) &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;To get started with AIR development, you must install the AIR runtime on your computer. Once it is installed, you may download sample applications to see AIR in action and possibly take a peek under the covers at its code.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;There are two downloads relevant to AIR development:&lt;br /&gt;•Runtime provides the runtime environment for running AIR applications. Downloads are available for both Windows and Macintosh operating systems. &lt;br /&gt;•Software Development Kit (SDK) provides everything necessary to build AIR applications. This includes templates, Adobe AIR APIs, and debugger and developer tools. The SDK is available for both Windows and Macintosh platforms. The command line debugger and developer tools require a Java installation (JRE or JDK version 1.4.2 or newer). &lt;br /&gt;&lt;br /&gt;Additional downloads are available that allow you to build AIR applications within specific Web development tools:&lt;br /&gt;•Adobe Flex Builder 3: Includes support for building Flex applications on Adobe AIR from within Flex Builder. &lt;br /&gt;•Adobe Flex SDK: Allows you to build AIR applications via Flex. &lt;br /&gt;•Adobe AIR Extension for Dreamweaver CS3: Adds support for building AIR applications within Dreamweaver CS3. &lt;br /&gt;•Adobe AIR Extension for Flash CS3 Professional: Allows you to build AIR applications with Flash CS3 Professional. &lt;br /&gt;In addition, a plug-in is available for the Aptana IDE. Once the runtime is installed, you can easily install and run AIR applications, and the SDK allows you to build AIR applications.&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;More Information:&lt;/strong&gt;&lt;br /&gt;http://blogs.techrepublic.com.com/programming-and-development/?p=559&amp;tag=nl.e055&lt;br /&gt;http://labs.adobe.com/technologies/air/</description><link>http://vj-news.blogspot.com/2007/11/adobe-air-brings-desktop-beta-air-from.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiAU4gA_W9hwufFeVETtwcR8GegRymdYuDpSLEeUtbguI5w9ZRW5OvPvoUPWCQw9M3atR_6oKOjPSziL2J2M7F0IjI9dkC-KoBIFiwO4EGtdfEx9pFVxSxhonHoOtp8fjJ6gjzTF-bp6ZhS/s72-c/dcd.bmp" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-2211557617681996882</guid><pubDate>Tue, 27 Nov 2007 08:22:00 +0000</pubDate><atom:updated>2007-11-30T16:20:46.701+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">encryption</category><category domain="http://www.blogger.com/atom/ns#">intrusion detection</category><category domain="http://www.blogger.com/atom/ns#">Norton Internet Security</category><category domain="http://www.blogger.com/atom/ns#">packet sniffers</category><category domain="http://www.blogger.com/atom/ns#">pcAnywhere</category><category domain="http://www.blogger.com/atom/ns#">research</category><category domain="http://www.blogger.com/atom/ns#">sniffers</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Sniffers | Packet Sniffers | How to use Sniffers | How to Prevent from Sniffers</title><description>&lt;strong&gt;Sniffers&lt;/strong&gt;&lt;br /&gt;A sniffer is a piece of software that grabs all of the traffic flowing into and out of a computer attached to a network.. A packet sniffer is a program that eavesdrops on the network traffic. Like a telephone wiretap allows one to listen in on other people's conversations, a "sniffing" program lets someone listen in on computer conversations.  Sniffing is the act by a machine S of making copies of a network packet sent by machine A intended to be received by machine B.  Once a copy is made, the sniffer program can do, time and resources permitting, an arbitrary computation on the copy such as displaying it nicely in a GUI window. A sniffer can be used for a good purpose: to audit your own network, and to demonstrate the insecurity of plaintext network protocols.  A sniffer machine can be discovered by other network tools.&lt;br /&gt;In this lecture, we are considering sniffers where the sniffer (program/ machine) S network-topologically sits between A and B.  But, be aware that it is possible to route the messages between A and B to go past S when A and  B are on different subnets.&lt;br /&gt;Sniffer activity occurs widely within organizations.  It is no longer a newsworthy item. So, we can find only the following.  In 1994, a sniffer program was installed by unidentified individuals at PANIX (Public Access to UNIX in New York). Within days, thousands of user names and passwords were stolen. Shortly thereafter, a similar incursion was successfully accomplished at BarNet in California.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Examples of Sniffers&lt;/strong&gt;&lt;br /&gt;Below is a select list of example sniffers from the open source archives. Visit  http://www.packetstormsecurity.org/  and search for "sniffers."    Many of these work on both Linux and Windows.&lt;br /&gt;1.tcpdump: The grand daddy of packet sniffers. Ships by default on many Linux distributions. &lt;br /&gt;2.ethereal: Excellent GUI based sniffer.  It can dissect many protocols. &lt;br /&gt;3.hunt: A well written sniffer with some attack tools included. &lt;br /&gt;4.Ettercap:  Ettercap is a network sniffer for switched LANs. It uses ARP poisoning and the man-in-the-middle technique to sniff all the connections between two hosts. It can inject characters to server (emulating commands) or to client (emulating replies) while maintaining an established TCP connection. &lt;br /&gt;5.dsniff:  As an article puts it, ``Dsniff is the Swiss army knife of privacy invasion''. The package ships with a handful of nasties: urlsnarf, msgsnarf, mailsnarf, webspy, dsniff etc. &lt;br /&gt;6.sniffit: Clever little packet sniffer with good filtering. We will be using it in the experiment described below. &lt;br /&gt;&lt;br /&gt;&lt;strong&gt;What Does Sniffed Data Look Like? &lt;/strong&gt;&lt;br /&gt;It is easy to grasp the concepts discussed above by watching a sniffer in action. The information in the following example was derived using tcpdump, a program that has been around for quite sometime and is available for many platforms. This particular snippet is an abbreviated exchange between a machine and the SecurityFocus Web server. &lt;br /&gt;&lt;strong&gt;"CONTENT FROM HERE HAS BEEN REMOVED AS THE FEEDBURNER STOPPED THE SYNC PROCESS DUE TO THE INFORMATION LOCATED HERE "  Only the subscribers will gte the complete information on this section&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;Prevention of Sniffing -Encryption &lt;/strong&gt;&lt;br /&gt;Encryption is the best protection against any form of traffic interception. It is reasonable to assume that at some point along a path, data can always be compromised. Therefore, your best defense is to ensure that traffic is essentially unreadable to everyone but the intended receiver. This isn’t difficult to do, since many organizations have deployed services that make use of Secure Socket Layers (SSL), Transport Layer Security (TLS) and other methods that provide secure messaging, web browsing and more. Use switches instead of hubs.  However, many commercial switches can be "overwhelmed" into behaving as though they are hubs. Use Symantec pcAnywhere when you try to access any remote files or while transferring any contents. The encryption technology used in it will avoid any packet sniffing and also use Norton Internet Security to block any intrusion.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Sample Script: &lt;/strong&gt;&lt;br /&gt;http://blog.robbiefoust.com/2007/11/powershell-ip-packet-sniffer-script.html &lt;br /&gt;&lt;br /&gt;This document is for educational purpose only.</description><link>http://vj-news.blogspot.com/2007/11/sniffers-packet-sniffers-how-to-use.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-7342285647949325707</guid><pubDate>Sun, 25 Nov 2007 20:43:00 +0000</pubDate><atom:updated>2007-11-29T10:22:41.002+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">free Mp3</category><category domain="http://www.blogger.com/atom/ns#">free music</category><category domain="http://www.blogger.com/atom/ns#">Google Hack</category><category domain="http://www.blogger.com/atom/ns#">Mp3 free</category><category domain="http://www.blogger.com/atom/ns#">piracy</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><title>Free Music| MP3 free Download | Google Hack - Part II</title><description>Every one like to listern to music. From heavy metal to hiphop anything is free here in the world of Google. &lt;br /&gt;&lt;br /&gt;Check the following steps to enjoy free music &lt;br /&gt;&lt;br /&gt;Step 1: Go To www.Google.com&lt;br /&gt;&lt;a href="www.Google.com"&gt;&lt;/a&gt;&lt;br /&gt;Step 2: Tepe the follwoing the search bar&lt;br /&gt;intitle:'index of' mp3&lt;br /&gt;&lt;br /&gt;Booommmmmmm you can see lot of mp3 files , just download them . This information is for education purpose only.Remember that all the music files are copyrighted .</description><link>http://vj-news.blogspot.com/2007/11/free-music-mp3-free-download-google.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-4275273260442314183</guid><pubDate>Sun, 25 Nov 2007 20:20:00 +0000</pubDate><atom:updated>2007-11-26T02:04:42.841+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gogle Hacking</category><category domain="http://www.blogger.com/atom/ns#">Google</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">hacking exposed</category><category domain="http://www.blogger.com/atom/ns#">password</category><category domain="http://www.blogger.com/atom/ns#">password hacking</category><category domain="http://www.blogger.com/atom/ns#">pasword cracking</category><title>Google Hacking | Hacking Exposed | Untimate Hacking Part - I</title><description>Have you ever wondered if you password is seen by millions of people ? Yes its true, if you have the habit of saving the password in text then obviously anyone can have it. Check out the steps on how to Google Hack the password that are saved in text documents.&lt;br /&gt;&lt;br /&gt;step 1: Go to &lt;a href="www..Google.com"&gt;www..Google.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Step 2: Type this in the search   &lt;br /&gt;&lt;br /&gt; ext:log inurl:password&lt;br /&gt;&lt;br /&gt;You can get all the passwords that are stored in the text documents.&lt;br /&gt;&lt;br /&gt;This information is for educational purpose only. Ensure not to save any username or passwords in any text documents.</description><link>http://vj-news.blogspot.com/2007/11/google-hacking-hacking-exposed-untimate.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-1593490491006625464</guid><pubDate>Sun, 25 Nov 2007 19:56:00 +0000</pubDate><atom:updated>2007-11-26T02:06:34.512+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Girls Games</category><category domain="http://www.blogger.com/atom/ns#">naughty</category><category domain="http://www.blogger.com/atom/ns#">tetris.real live</category><title>Human Tetris | Angels play | Game</title><description>I was enjoying my weekends in my home and came up with this video which was sent from my friend from his blog. This was acually the most viewed video EVER....  &lt;br /&gt;&lt;embed src="http://www.metacafe.com/fplayer/926755/sexy_tetris_real_live.swf" width="400" height="345" wmode="transparent"  pluginspage="http://www.macromedia.com/go/getflashplayer" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;&lt;br/&gt;&lt;font size="1"&gt;&lt;br /&gt;    &lt;a href="http://www.metacafe.com/watch/926755/sexy_tetris_real_live/"&gt;Sexy Tetris Real Live - video powered by Metacafe&lt;/a&gt;&lt;/font&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Hey this is just a game... No naughty feelings..............  :)</description><link>http://vj-news.blogspot.com/2007/11/human-tetris-angels-play-game.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-5869832739553031338</guid><pubDate>Sun, 25 Nov 2007 05:02:00 +0000</pubDate><atom:updated>2007-11-25T10:38:10.501+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">camtasia</category><category domain="http://www.blogger.com/atom/ns#">Camtasia Studio 3.0.0</category><category domain="http://www.blogger.com/atom/ns#">Crack</category><category domain="http://www.blogger.com/atom/ns#">Free</category><category domain="http://www.blogger.com/atom/ns#">Freebie</category><category domain="http://www.blogger.com/atom/ns#">offer</category><category domain="http://www.blogger.com/atom/ns#">serial key</category><category domain="http://www.blogger.com/atom/ns#">Tech Smith</category><category domain="http://www.blogger.com/atom/ns#">version 3</category><category domain="http://www.blogger.com/atom/ns#">Yaro Starak</category><title>Camtasia for Free | this is not a crack | Full version of version 3 Camtasia | Limited offer</title><description>Want to get the camtasia for free? This is a promotional offer by techsmith for limited period.&lt;br /&gt;&lt;br /&gt;Here are some clearer instructions -&lt;br /&gt;&lt;br /&gt;Step 1&lt;br /&gt;Download the software from here -&lt;br /&gt;(save the file to your desktop).&lt;br /&gt;&lt;br /&gt;&lt;a href="http://download.techsmith.com/camtasiastudio/enu/312/camtasiaf.exe"&gt;http://download.techsmith.com/camtasiastudio/enu/312/camtasiaf.exe&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Step 2&lt;br /&gt;Go to this page, complete your name, country and&lt;br /&gt;e-mail address and Techsmith will send you a&lt;br /&gt;software key to unlock the program.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.techsmith.com/camtasia/pcpls.asp"&gt;http://www.techsmith.com/camtasia/pcpls.asp&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Step 3&lt;br /&gt;Install the software and then input the key to&lt;br /&gt;unlock it and you will have the full working&lt;br /&gt;version of Camtasia Studio 3.&lt;br /&gt;&lt;br /&gt;Note: Unfortunately this offer is only for PC&lt;br /&gt;users, sorry to the Mac people out there!&lt;br /&gt;&lt;br /&gt;Courtesy : Yaro Starak , TechSmith&lt;br /&gt;&lt;a href="http://www.blogmastermind.com"&gt;http://www.blogmastermind.com&lt;/a&gt;</description><link>http://vj-news.blogspot.com/2007/11/camtasia-for-free-this-is-not-crack.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-3345376928386641377</guid><pubDate>Fri, 23 Nov 2007 10:39:00 +0000</pubDate><atom:updated>2007-11-23T17:13:39.498+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Deep Purple</category><category domain="http://www.blogger.com/atom/ns#">Guitar lessions</category><category domain="http://www.blogger.com/atom/ns#">Guitar master</category><category domain="http://www.blogger.com/atom/ns#">mastertheguitar.co.uk</category><category domain="http://www.blogger.com/atom/ns#">Michael Angelo</category><category domain="http://www.blogger.com/atom/ns#">Smoke on the water</category><category domain="http://www.blogger.com/atom/ns#">Teaching Guitar</category><title>Black Night| Deep Purple | Guitar  Master | mastertheguitar.co.uk - MTR13! | Smoke on the water</title><description>Excellent teaching by this geek who plays this stuff. I was amazed to listern when he played. Simply amazing....he rocks/ I love the orginal version and hope you also love this music.&lt;br /&gt;&lt;br /&gt;Johnny B Goode-Guitar Lesson | Excellent Teacher&lt;br /&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/d-IDrRSVkCQ&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/d-IDrRSVkCQ&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;Speed Kills - Guitar Lesson Introduction|No Boundaries by Michael Angelo Batio &lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/hb5QaCfm7bg&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/hb5QaCfm7bg&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Impossible Guitar | Divine Quality&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/r2BOApUvFpw&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/r2BOApUvFpw&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Jason Becker - Guitar Clinic| Guitar Freak | The MASTER&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/K3fvB4QO1qo&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/K3fvB4QO1qo&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/87Iz3RHZNDQ&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/87Iz3RHZNDQ&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Check out this video:Amazing Stuff&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/82QArIOqZMI&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/82QArIOqZMI&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Kid teaching| Check this out | How to Play Smoke on the Water&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/ODE-NliwAMU&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/ODE-NliwAMU&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Check this out | Improved Version | Smoke on the water&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/NloDnfoVHUg&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/NloDnfoVHUg&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;The Real Note | Smoke on the water&lt;/strong&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/EUAeWx_jjNU&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/EUAeWx_jjNU&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;You wont miss this one | WHITESNAKE IN THE STILL OF THE NIGHT &lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/-p1EoPm3xWk&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/-p1EoPm3xWk&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Enjoy your weekend everybodyyyyyyyyyy  :)&lt;/strong&gt;</description><link>http://vj-news.blogspot.com/2007/11/black-night-deep-purple-guitar-master.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-61844829145820017</guid><pubDate>Tue, 20 Nov 2007 18:16:00 +0000</pubDate><atom:updated>2007-11-29T10:23:04.687+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Bio sensor</category><category domain="http://www.blogger.com/atom/ns#">future gaming</category><category domain="http://www.blogger.com/atom/ns#">Games</category><category domain="http://www.blogger.com/atom/ns#">mind control</category><category domain="http://www.blogger.com/atom/ns#">neurosky</category><category domain="http://www.blogger.com/atom/ns#">Silicon Valley</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">Thought control robots</category><category domain="http://www.blogger.com/atom/ns#">toys</category><title>Mind Control | Brain wave sensor | Future Gaming |Silicon Valley |</title><description>How would you feel if the music player play songs depending on your mood, how would u feel when you can lift an object by just using the brain wave ? Sounds interesting ?&lt;br /&gt;&lt;br /&gt;NeuroSky is developing some consumer technology that might lead the way to some intense game control in the near future!&lt;br /&gt;&lt;br /&gt;“NeuroSky has developed a cost effective bio sensor and signal processing system for the consumer market. Our wearable technology unlocks worlds of new applications such as consumer electronics, health, wellness, education and training.&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/hQWBfCg91CU&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/hQWBfCg91CU&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;The neurons that comprise the brain work on electrical impulses. The last century of neurological research has shown us that brainwaves of different wavelengths indicate different emotional states, like a focused awareness, a meditative state, or drowsiness. Brainwaves have been used in medical research and therapy for years. We’re bringing it to the consumer world. ”&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/wvLm6_DY02k&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/wvLm6_DY02k&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;Five companies, including a Bluetooth headset provider, game console maker and trucking company, are said to have signed up to market end-user products containing NeuroSky's chips. Its biggest customer thus far is Ziyitong Technology Co. Ltd. (China Mobile), which has more than 100 million cell phone subscribers, 13 million of whom have high-speed 3G service.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Reference:&lt;/strong&gt;&lt;br /&gt;http://www.eetimes.com/news/latest/showArticle.jhtml?articleID=163701653</description><link>http://vj-news.blogspot.com/2007/11/mind-control-brain-wave-sensor-future.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-7300917465515745895</guid><pubDate>Tue, 20 Nov 2007 17:48:00 +0000</pubDate><atom:updated>2007-11-29T10:23:28.599+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Easy wifiradar</category><category domain="http://www.blogger.com/atom/ns#">Hacking</category><category domain="http://www.blogger.com/atom/ns#">Hacking Wifi</category><category domain="http://www.blogger.com/atom/ns#">Makayama</category><category domain="http://www.blogger.com/atom/ns#">Norton</category><category domain="http://www.blogger.com/atom/ns#">Technorati</category><category domain="http://www.blogger.com/atom/ns#">Wifi</category><title>Free Wifi |  Easy WifiRadar | Hacking Wifi | Norton Internet Security</title><description>Some things in life are free. Easy WiFi Radar helps you find and connect to open wireless access points with a single mouseclick.&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/3lNqqryPBNU&amp;rel=1"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/3lNqqryPBNU&amp;rel=1" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;&lt;br /&gt;&lt;/br&gt;&lt;br /&gt;&lt;strong&gt;Steps to setup the wifiradar:&lt;/strong&gt;&lt;br /&gt;Step 1: Go to &lt;a href="www.makayama.com/easywifiradar.html"&gt;www.makayama.com/easywifiradar.html&lt;/a&gt;&lt;br /&gt;Step 2: Click Download&lt;br /&gt;Step 3: Unzip and click on the .exe file and install the product.&lt;br /&gt;Step 4: Click the play button and let it scan for any nearby wifi connections. All red access points indicate that the wifi connections are "password encrypted" the green indicates that the connection is not protected.The green connections can be used to connect to the internet.&lt;br /&gt;&lt;br /&gt;Four steps to protect Wi-Fi networks from hackers &lt;br /&gt;1. Stop broadcasting to the world.&lt;br /&gt;2. Change the password on your access point. &lt;br /&gt;3. Use encryption.&lt;br /&gt;4. Enable Media Access Control (MAC) filtering.  &lt;br /&gt;5. Use Norton Internet Security to protect the system from any intrusion.</description><link>http://vj-news.blogspot.com/2007/11/free-wifi-easy-wifiradar-hacking-wifi.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-7620121466960663293</guid><pubDate>Tue, 20 Nov 2007 16:50:00 +0000</pubDate><atom:updated>2007-11-20T22:36:44.715+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Botnet</category><category domain="http://www.blogger.com/atom/ns#">eBay</category><category domain="http://www.blogger.com/atom/ns#">esafe</category><category domain="http://www.blogger.com/atom/ns#">Norton</category><category domain="http://www.blogger.com/atom/ns#">SQL injection</category><category domain="http://www.blogger.com/atom/ns#">Strom Trojan</category><category domain="http://www.blogger.com/atom/ns#">Web Attack</category><title>eBay Web attack using custom- built botnet | eBay users "ALERT"</title><description>Seeding genuine web sites with malware is nothing new, but the practice has been gathering steam this year.The site was compromised by SQL injection vulnerabilities and then IFrame attack code is inserted.Yet another sophisticated Web-based attack against eBay and its users is being investigated by a Tel Aviv-based security vendor that discovered a similar attack two months ago involving a custom-made bot designed to steal accounts.Ofer Elzam, Aladdin Knowledge Systems’ director of product management, says his firm has determined in the last few days that at least two Web sites, one called Save Our Planet and another called Nova Radio, appear to have been compromised with malicious code that combines to launch an attack against a site visitor. Aladdin Knowledge Systems Ltd.(NASDAQ: ALDN) announced that the Aladdin eSafe Content Security Response Team (CSRT) has uncovered significant new details surrounding the eBay botnet attack it first discovered on September 6, 2007 .The attack, which is one of the first of its kind to employ extremely complex, multi-stage attack methods, performs a distributed and covert brute force attack on eBay accounts in an effort to obtain personal information and/or items sold/purchased via the eBay site. Two new details provided by the Aladdin eSafe CSRT were made available this afternoon: &lt;br /&gt;&lt;br /&gt;The goal of the re-attack today is to combine code to break in through the browser to the victim’s desktop and install a Trojan to collect eBay user account information, if it’s found, and connect to eBay to use that account information to commit fraud.   “There are a chain of sites that work together,” says Elzam. “One Web page uses a trick with JavaScript to open a size-zero window, which takes content from a third-party site.”   Elzam says Aladdin hasn’t yet been able to reach the operators of the Save Our Planet and Nova Radio sites- and notes that forty more Web sites may be tied to this attack, which is very fluid and changing-- but it has been in touch with eBay.</description><link>http://vj-news.blogspot.com/2007/11/ebay-web-attack-using-custom-built.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-2527778702933063409</guid><pubDate>Thu, 15 Nov 2007 11:56:00 +0000</pubDate><atom:updated>2007-11-15T18:13:33.369+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Norton</category><category domain="http://www.blogger.com/atom/ns#">Symantec</category><category domain="http://www.blogger.com/atom/ns#">Takashi Katsuki</category><category domain="http://www.blogger.com/atom/ns#">Trojan.Farfli</category><category domain="http://www.blogger.com/atom/ns#">Trojan.Hachilem</category><category domain="http://www.blogger.com/atom/ns#">Trojan.Srizbi</category><title>Trojans can use your Affliate I-D | An  Exclusive report -Takashi Katsuki</title><description>Trojan is a general term for malicious software that is installed under false or deceptive pretenses or is installed without the user's full knowledge and consent. Most Trojans exhibit some form of malicious, hostile, or harmful functionality or behavior.Trojan.Farfli can download and execute additional threat on the infected computer. It can also modify the Internet Explorer Start Page and change many settings related to online transaction and one such example would be the Affliate ID to get more profits through the clicks.&lt;br /&gt;Takashi Katsuk from Symantec is under an investigation of Trojan.Farfli. He Says" Trojan has daily tasks that are closely related to updating Trojan.Farfli. We have seen Trojan.Farfli updated three times a day on average and sometimes as much as seven times a day, and the total number of variants has reached more than 300 since July. In comparison, Trojans discovered around the same time have far fewer variants. For example, Trojan.Hachilem and Trojan.Srizbi have only 150 variants and 40 variants, respectively. Precisely speaking, because there are files dropped by this Trojan that are polymorphic there are hundred and hundred variants of this Trojan "&lt;br /&gt;&lt;br /&gt;To read the complete report use the following link&lt;br /&gt;&lt;a href="http://www.symantec.com/enterprise/security_response/weblog/2007/11/trojan_writer_lusts_for_money.html"&gt;http://www.symantec.com/enterprise/security_response/weblog/2007/11/trojan_writer_lusts_for_money.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;HOW TO REMOVE&lt;/strong&gt; Trojan.Farfli: &lt;br /&gt;&lt;br /&gt;1. Temporarily Disable System Restore (Windows Me/XP). &lt;br /&gt;2. Update the virus definitions.&lt;br /&gt;3. Reboot computer in SafeMode&lt;br /&gt;4. Run a full system scan and clean/delete all infected file&lt;br /&gt;5. Delete/Modify any values added to the registry. [Take extream caution when editing the registry- Use this only if you are tech savy]&lt;br /&gt;&lt;br /&gt;Navigate to and delete the following entries:&lt;br /&gt;HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Enum\Root\LEGACY_[random 2] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 1] HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\[random 2] HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IE4\"Main"= [random] &lt;br /&gt;&lt;br /&gt;6. Exit registry editor.&lt;br /&gt;7. Delete the Web sites added to the Internet Explorer Favorites menu.&lt;br /&gt;a) Start Microsoft Internet Explorer&lt;br /&gt;b) Click Favorites &gt; Organize Favorites&lt;br /&gt;c) Delete the Favorites added by the risk: http://www.6781.com/?001&lt;br /&gt;&lt;br /&gt;8. Restore the default settings in Internet Explorer. [how to]&lt;br /&gt;9. Restart the computer.&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Ensure you have Norton Internet Security installed in your computer to be confident and safe in this connected world.&lt;/strong&gt;</description><link>http://vj-news.blogspot.com/2007/11/trojans-can-use-your-affliate-id.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-222986654279918052</guid><pubDate>Thu, 15 Nov 2007 11:36:00 +0000</pubDate><atom:updated>2007-11-15T17:15:45.774+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Cyber Cops</category><category domain="http://www.blogger.com/atom/ns#">Mixor.Q</category><category domain="http://www.blogger.com/atom/ns#">Strom Trojan</category><category domain="http://www.blogger.com/atom/ns#">Symantec</category><category domain="http://www.blogger.com/atom/ns#">Trojan.Abwiz.F</category><title>“Storm Trojan” Illustrated | Security Response Lab | Cyber Cops from Symantec</title><description>Cyber crime never sleeps — so the crime-busters have to work round-the-clock too. Which is why U.S.-based Net security leader Symantec, best known for the Norton anti-virus products, has just set up in Pune, its first "24 x 7" Security Response Lab. It is equipped to keep tabs on the world's Internet traffic, monitoring 40,000 of its own sensors buried in cyberspace, across 180 countries, tracking 150 million anti-virus systems — and sending two million dummy e-mails to test the Web's defences. &lt;br /&gt;&lt;br /&gt;The lab work is done in four shifts by Indian security specialists or Cyber cops, backed by Symantec's 2000-strong India-based development muscle. &lt;br /&gt;&lt;br /&gt;Why Pune? "Because of the strong security expertise and programming skills available in India," explains Anil Chakravarthy, vice-president for India Technical Operations. "We have groups here who are experts in anti-fraud operations," says Vincent Weafer, Symantec's U.S.-based Senior Director (Global Operations). &lt;br /&gt;&lt;br /&gt;In fact, Pune engineers have filed four global patents in recent months in the area of Net security. And Vishal Dhupar, Symantec India's Managing Director, feels: "The India-based Security Response Lab is a major contributor to our global response to Net threats — and will also help us track the security landscape in the country from a global vantage point." &lt;br /&gt;&lt;br /&gt;The Pune Centre will work in tandem with response labs in seven other locations spread across North America, Europe and the Far East as they try and neutralise viruses, spam (unsolicited mail), phishing (trying to steal sensitive information) and `bots' (robot-like invaders into unsuspecting computers)... often within minutes of the threats appearing. &lt;br /&gt;&lt;br /&gt;The Pune lab is the only one that works 24 hours, 365 days of the year. &lt;br /&gt;Symantec illustrates the "Strom Trojan findings in the following link &lt;br /&gt;&lt;a href="http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html"&gt;http://www.symantec.com/content/en/us/home_homeoffice/media/flash/peacomm.html&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The threat  searches for some particular hashes (searches are done by hash, not by specific filename) and eventually it receives a reply that includes some 'meta tag' information. The meta tag information is encrypted and contains information on where/what to download (e.g. Mixor.Q, Trojan.Abwiz.F).</description><link>http://vj-news.blogspot.com/2007/11/storm-trojan-illustrated-security.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-7450648132580958732.post-1334695373441716387</guid><pubDate>Thu, 15 Nov 2007 10:30:00 +0000</pubDate><atom:updated>2007-11-15T16:14:20.349+05:30</atom:updated><category domain="http://www.blogger.com/atom/ns#">Accessibility Services</category><category domain="http://www.blogger.com/atom/ns#">Eye Tracking</category><category domain="http://www.blogger.com/atom/ns#">Usability Inspection</category><category domain="http://www.blogger.com/atom/ns#">User Testing</category><title>Eye Tracking | Usability Testing</title><description>What would you do if you get an oppurtunity to know where the user see on your website .First when I saw this technology from &lt;a href="http://www.etre.com/usability/eyetracking/"&gt;etre&lt;/a&gt; I got thrilled.&lt;br /&gt;&lt;object width="425" height="355"&gt;&lt;param name="movie" value="http://www.youtube.com/v/lo_a2cfBUGc&amp;rel=1&amp;border=0"&gt;&lt;/param&gt;&lt;param name="wmode" value="transparent"&gt;&lt;/param&gt;&lt;embed src="http://www.youtube.com/v/lo_a2cfBUGc&amp;rel=1&amp;border=0" type="application/x-shockwave-flash" wmode="transparent" width="425" height="355"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;br /&gt;Eye tracking services allow you to climb inside the users' head and see your designs through their eyes.This can increase the internet sales for any Online Internet Marketing. Amazed seeing this video file , check this out its a must see video&lt;br /&gt;&lt;strong&gt;&lt;br /&gt;DONT MISS IT&lt;/strong&gt;</description><link>http://vj-news.blogspot.com/2007/11/what-would-you-do-if-you-get.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item></channel></rss>