<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-1674764414065866336</atom:id><lastBuildDate>Thu, 19 Dec 2024 03:27:43 +0000</lastBuildDate><category>Gadgets</category><category>Software</category><category>Applications</category><category>Information</category><title>Sharelok</title><description></description><link>http://sharelok.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>23</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-2627539355068380528</guid><pubDate>Wed, 02 Jan 2013 11:46:00 +0000</pubDate><atom:updated>2013-01-03T10:14:38.692+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Unmasked Private Calls</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia5vdOiyfKYjezm53Q19Qhxp6i_VKsfk8FNOLMUXjJIYqobPKjQcMjrPmuIoqTaZmga-FfQ7uJVlLGwKG-n4TRD8ZmSL3UgoW7vHgPwMVKzdnvnPA6ecJIVE3YEjc8mtgLeXfY0udUtVI/s1600/private_call.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia5vdOiyfKYjezm53Q19Qhxp6i_VKsfk8FNOLMUXjJIYqobPKjQcMjrPmuIoqTaZmga-FfQ7uJVlLGwKG-n4TRD8ZmSL3UgoW7vHgPwMVKzdnvnPA6ecJIVE3YEjc8mtgLeXfY0udUtVI/s320/private_call.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
This is a very rare software that can help you unmask private calls. I&#39;m sure you&#39;ll not find this kind of software for free. This gadget really helped me when I was in need and it&#39;s very easy to use by girls who want to reveal the identity of their admirers.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;a href=&quot;http://depositfiles.com/files/7u8p57ym3&quot; target=&quot;_blank&quot;&gt;Download &lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;color: #0b5394;&quot;&gt;&lt;span style=&quot;font-size: large;&quot;&gt;Downloaded: 472&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2013/01/unmasked-private-calls.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEia5vdOiyfKYjezm53Q19Qhxp6i_VKsfk8FNOLMUXjJIYqobPKjQcMjrPmuIoqTaZmga-FfQ7uJVlLGwKG-n4TRD8ZmSL3UgoW7vHgPwMVKzdnvnPA6ecJIVE3YEjc8mtgLeXfY0udUtVI/s72-c/private_call.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-9093886174842221194</guid><pubDate>Wed, 02 Jan 2013 07:35:00 +0000</pubDate><atom:updated>2013-01-02T14:53:41.566+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>jv16 Power Tools</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyvZ-fsTwglqjATATU7ZpoXANJkee0vSuOtnzGZ5Za50pvV_XFOK6NnNcYsbE7Cf9e4hSAam-ornuM_arCxjp_G-skucGGCXqNvYZUoYFtbjwSFHLERRgIi_eCyFu0ed0lBqZNrvfKJoQ/s1600/powertools.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyvZ-fsTwglqjATATU7ZpoXANJkee0vSuOtnzGZ5Za50pvV_XFOK6NnNcYsbE7Cf9e4hSAam-ornuM_arCxjp_G-skucGGCXqNvYZUoYFtbjwSFHLERRgIi_eCyFu0ed0lBqZNrvfKJoQ/s320/powertools.png&quot; width=&quot;304&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://987f36a4.linkbucks.com/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;jv16 PowerTools&lt;/b&gt;&lt;/a&gt; is the ultimate registry cleaner and Windows 
tuneup utility suite. You need oil to keep a car engine running. You 
need jv16 PowerTools to keep Windows running.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can download a &lt;b&gt;fully working&lt;/b&gt; free trial version to try it 
yourself. Unlike with some other products, you can fully use the free 
trial version of our product, it is not feature limited in any ways. And
 what&#39;s best, we offer a free trial period of 60 days!&lt;br /&gt;
That&#39;s Right! Forget those 30 day free trials. That&#39;s nowhere near 
long enough to fully appreciate everything the new jv16 PowerTools 2012 
has to offer.&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2013/01/jv16-power-tools.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhyvZ-fsTwglqjATATU7ZpoXANJkee0vSuOtnzGZ5Za50pvV_XFOK6NnNcYsbE7Cf9e4hSAam-ornuM_arCxjp_G-skucGGCXqNvYZUoYFtbjwSFHLERRgIi_eCyFu0ed0lBqZNrvfKJoQ/s72-c/powertools.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-5813733619343332318</guid><pubDate>Wed, 02 Jan 2013 07:29:00 +0000</pubDate><atom:updated>2013-01-02T09:29:29.428+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>AVG Remover</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqbQ02r3xLqyPhsGsTYdKdBD4EvRwWPIF1vKzsZtDrFUZTFosrjbfNnbLNe98HQguZW2gMW_fjRl-LvGdGXSBYucY8fRSR7uXJ1Wf1MkOBdmiyZQW4EkQAGrq8T3cZHarw9h-4FH9A0Io/s1600/avg_remover.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;176&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqbQ02r3xLqyPhsGsTYdKdBD4EvRwWPIF1vKzsZtDrFUZTFosrjbfNnbLNe98HQguZW2gMW_fjRl-LvGdGXSBYucY8fRSR7uXJ1Wf1MkOBdmiyZQW4EkQAGrq8T3cZHarw9h-4FH9A0Io/s320/avg_remover.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;/h3&gt;
&lt;a href=&quot;http://7337809f.linkbucks.com/&quot; target=&quot;_blank&quot;&gt;AVG Remover&lt;/a&gt; eliminates all the parts of your AVG installation from 
your computer, including registry items, installation files, user files,
 etc. AVG Remover is the last option to be used in case the AVG 
uninstall / repair installation process has failed repeatedly.&lt;br /&gt;
&lt;h3 class=&quot;#&quot;&gt;
Warning&lt;/h3&gt;
All AVG user settings will be removed after the uninstall process is 
complete, as well as content from the Virus Vault and all other items 
related to AVG installation and use. You will be asked during the 
removal procedure to restart your computer. Therefore, please make sure 
to finish your work and save all important data prior to launching AVG 
Remover.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2013/01/avg-remover.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqbQ02r3xLqyPhsGsTYdKdBD4EvRwWPIF1vKzsZtDrFUZTFosrjbfNnbLNe98HQguZW2gMW_fjRl-LvGdGXSBYucY8fRSR7uXJ1Wf1MkOBdmiyZQW4EkQAGrq8T3cZHarw9h-4FH9A0Io/s72-c/avg_remover.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-9074213779822678717</guid><pubDate>Wed, 02 Jan 2013 07:02:00 +0000</pubDate><atom:updated>2013-01-02T09:02:30.450+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Applications</category><title>Falcon Pro</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsUCfwyzGOdCWDdzSRfLJCl5QJdU0uxo9WCyINACRVPsKFRerBBUNG8CnQdjhd_gYu9mwQVWCAjoFYcJK1FRbA3bTQska4Olj58Z45K3qUWqPFqvesxUpyisATn3c8mw0X7yOkAffqE-I/s1600/FalconPro.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;156&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsUCfwyzGOdCWDdzSRfLJCl5QJdU0uxo9WCyINACRVPsKFRerBBUNG8CnQdjhd_gYu9mwQVWCAjoFYcJK1FRbA3bTQska4Olj58Z45K3qUWqPFqvesxUpyisATn3c8mw0X7yOkAffqE-I/s320/FalconPro.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
The folks behind the increasingly popular &lt;a href=&quot;http://dda52e70.linkbucks.com/&quot; target=&quot;_blank&quot;&gt;Falcon Pro Twitter client for Android&lt;/a&gt;
 have managed to push one last app update out the door before the new 
year, and it&#39;s not all about bug fixes. Version 1.4 of the slick client 
brings a host of new features, including double-tapping on tweets and a 
log-out button. See the full changelog below.&lt;br /&gt;

&lt;ul&gt;
&lt;li&gt;Added YouTube API integration&lt;/li&gt;
&lt;li&gt;Added option to enable double tap on tweets&lt;/li&gt;
&lt;li&gt;Added log-out button&lt;/li&gt;
&lt;li&gt;Added hide keyboard on RT&lt;/li&gt;
&lt;li&gt;Added report for spam&lt;/li&gt;
&lt;li&gt;Added mute management from settings&lt;/li&gt;
&lt;li&gt;Added hash tag autofill when searching for tweets&lt;/li&gt;
&lt;li&gt;Added slider for refresh rates&lt;/li&gt;
&lt;li&gt;New &quot;More Actions&quot; dialog design&lt;/li&gt;
&lt;li&gt;Enhanced conversation view with private accounts&lt;/li&gt;
&lt;li&gt;Bug fixes&lt;/li&gt;
&lt;/ul&gt;
Unquestionably the most important of Falcon&#39;s new features is the 
added YouTube API integration. This tweak allows Falcon users to now get
 a proper video experience within the app whenever they come across a 
tweeted YouTube link.&lt;br /&gt;

The updated&lt;a href=&quot;https://play.google.com/store/apps/details?id=com.jv.falcon.pro&quot; target=&quot;_blank&quot;&gt; Falcon Pro for Android&lt;/a&gt; is available now for 99 cents on Google Play. &lt;br /&gt;

   &lt;aside&gt; &lt;/aside&gt;  &lt;div class=&quot;origPosted&quot;&gt;
 Originally posted at  Android Atlas  &lt;/div&gt;
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2013/01/falcon-pro.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsUCfwyzGOdCWDdzSRfLJCl5QJdU0uxo9WCyINACRVPsKFRerBBUNG8CnQdjhd_gYu9mwQVWCAjoFYcJK1FRbA3bTQska4Olj58Z45K3qUWqPFqvesxUpyisATn3c8mw0X7yOkAffqE-I/s72-c/FalconPro.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-146883890543830623</guid><pubDate>Wed, 19 Dec 2012 19:15:00 +0000</pubDate><atom:updated>2012-12-19T21:17:35.793+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information</category><title>Foreign Economic Collection</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Foreign Economic Collection and industrial espionage against the United States represent significant and growing threats to the nation’s prosperity and security.&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizP9hcERZHu05BBX_tNAnFX0TRkw7yjPKGnYAvIuaHt_PLaEVwQjCCIfSsAOwa_MzAwIQm03dXVsUypSN949q0wx6qvzBVztu4KZx8B60Z9Cqq8V5OEgOXX-MXmYHHhzfhbqgO13uTS08/s320/ForeignEconomicCollection.jpg&quot; width=&quot;282&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Foreign economic collection and industrial espionage against the United States represent significant and growing threats to the nation’s prosperity and security. Cyberspace—where most business activity and development of new ideas now takes place—amplifies these threats by making it possible for malicious actors, whether they are corrupted insiders or foreign intelligence services (FIS), to quickly steal and transfer massive quantities of data while remaining anonymous and hard to detect.&lt;br /&gt;
You can find out more in Foreign Spies Stealing US Economic Secrets in Cybercpace&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://depositfiles.com/files/x9hu00jou&quot; target=&quot;_blank&quot;&gt;Download&lt;/a&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/foreign-economic-collection.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizP9hcERZHu05BBX_tNAnFX0TRkw7yjPKGnYAvIuaHt_PLaEVwQjCCIfSsAOwa_MzAwIQm03dXVsUypSN949q0wx6qvzBVztu4KZx8B60Z9Cqq8V5OEgOXX-MXmYHHhzfhbqgO13uTS08/s72-c/ForeignEconomicCollection.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-4566602888116372891</guid><pubDate>Wed, 19 Dec 2012 12:04:00 +0000</pubDate><atom:updated>2012-12-19T14:04:54.063+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Steganography Program</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Steganography is the art and science of writing hidden messages&quot; border=&quot;0&quot; height=&quot;224&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJFx_p1tTrTfm-kW57VtAysEvefPKwgeo1ZFXR9Z0-_LmZupvyYBgNusyuh9kR_AHMrO2U4I4pWN4emQSJv9x6MkrLWgZ-5PhvfOIwgRAmASaumhKKZH6bbtne3eOszLVhyphenhyphenVdEe9azKkk/s320/Stegnography+Program.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://depositfiles.com/files/4y3pgfpk1&quot; target=&quot;_blank&quot;&gt;Steganography&lt;/a&gt; is the art and science of writing hidden messages in such a way that no 
one, apart from the sender and intended recipient, suspects the 
existence of the message, a form of security through obscurity.&lt;br /&gt;
This is a&amp;nbsp; Zip file download that contains a Windows program 
(Instructions can be found in the Help menu), a bit map image file (for 
hiding an encrypted message) and example text files.

&lt;br /&gt;
The program performs monoalphabetic encryption and decryption using a
 keyword to create a 26 character cipher alphabet and hides ciphertext 
in a bit map image file. This program is intended as a teaching aid in 
the understanding of how basic computer steganography works.&lt;br /&gt;
The SCB Steganography Program is extremely easy to use and very 
useful for understanding computer based steganography. It was written 
for Secret Code Breaker by Tom Jones, Vice-President, SigmaSIX LLC an 
engineering and manufacturing company located in the Detroit, Michigan 
area. The program display is illustrated here Steganography program 
screen.&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/steganography-program.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgJFx_p1tTrTfm-kW57VtAysEvefPKwgeo1ZFXR9Z0-_LmZupvyYBgNusyuh9kR_AHMrO2U4I4pWN4emQSJv9x6MkrLWgZ-5PhvfOIwgRAmASaumhKKZH6bbtne3eOszLVhyphenhyphenVdEe9azKkk/s72-c/Stegnography+Program.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-3023024247512617848</guid><pubDate>Wed, 19 Dec 2012 11:02:00 +0000</pubDate><atom:updated>2012-12-19T13:02:21.566+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Laser Espionage Microphone</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
In the world we live in today, there are many different reasons why you 
would want to listen in or record others. Especially private 
investigators can benefit from using audio surveillance products.&lt;br /&gt;
If you are looking for a Listening Device, here is how to make one. &lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;500&#39; height=&#39;500&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dyCld5BEyXfjnF3-49EmDDMX_YKoqwX4-8zg6Oyo6Vi-_fvh0tvveD10H8tC5trrwpxtoLzuTKsMzwS_cI86g&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/laser-espionage-microphone.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-7891907777390179076</guid><pubDate>Wed, 19 Dec 2012 10:38:00 +0000</pubDate><atom:updated>2012-12-19T12:38:16.020+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Applications</category><title>Secret Folder</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;secret folder is an iphone app&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIXUAXiufj9Wafv1PXMjJVbqePkdwkkEDapxncySki3Xza_GKrmVonoz0z7Cev4OZlT3vh_aAvWfV7n6Nc_1wHMtvgfHn-Xr8mK9zf9O1wv6gO4aGolsn5zsafOpgDYP0SoG4BQTZhQM/s320/secret+folder.jpg&quot; width=&quot;213&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.apple.com/itunes/download/&quot; target=&quot;_blank&quot;&gt;Secret Folder&lt;/a&gt; is like a secret folder, you can manage private photos and videos.
 It protects your files with either a 4 number PIN lock or a dot lock. 
The options they give you include taking a photo with the front camera 
when someone attempts to unlock the app. There is also the option to 
include a fake password. &lt;br /&gt;
Whenever this fake password is entered, functions to the app will be 
very limited, and whatever pictures taken with the app won’t be saved.
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/secret-folder.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgvIXUAXiufj9Wafv1PXMjJVbqePkdwkkEDapxncySki3Xza_GKrmVonoz0z7Cev4OZlT3vh_aAvWfV7n6Nc_1wHMtvgfHn-Xr8mK9zf9O1wv6gO4aGolsn5zsafOpgDYP0SoG4BQTZhQM/s72-c/secret+folder.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-5406760536521483152</guid><pubDate>Tue, 18 Dec 2012 15:42:00 +0000</pubDate><atom:updated>2012-12-18T17:42:22.841+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information</category><title>Phone Secret Codes</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Phone Secret Codes&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim0eg0_FSCEeCsSSSogk5AXfs0YZgd7cyYjersFHPBavFnigzh-LQ_8VHzLmF6PNigYZndM6sIxbkqqXD6x84TXUAARtGNKogeYvM0V2zdvSY6BYEp3g3OjdkhfGBfgb1GMSLVs3V5FR8/s1600/Phone+Secret+Codes.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
I will give you a few useful secret codes for your mobile, some of them must be entered without the SIM card in cellphone.&lt;br /&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;3&quot; cellspacing=&quot;1&quot; style=&quot;width: 400px;&quot;&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Alcatel&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor:&lt;/td&gt;&lt;td&gt;0 0 0 0 0 0 *&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Bosch&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Dafault Language:&lt;/td&gt;&lt;td&gt;* # 0 0 0 0 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor:&lt;/td&gt;&lt;td&gt;* # 3 2 6 2 2 5 5 * 8 3 7 8 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Dancall&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;* # 9 9 9 9 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;SIMcard serial number:&lt;/td&gt;&lt;td&gt;* # 9 9 9 4 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Information about battery status:&lt;/td&gt;&lt;td&gt;* # 9 9 9 0 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Selftest (only Dancall HP2731):&lt;/td&gt;&lt;td&gt;* # 9 9 9 7 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Show version configuration:&lt;/td&gt;&lt;td&gt;* # 9 9 9 8 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor:&lt;/td&gt;&lt;td&gt;* # 9 9 9 3 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Ericsson&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;&amp;gt; * &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Dafault Language:&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Enter to phone menu without SimCard - after Wrong PIN:&lt;/td&gt;&lt;td&gt;press NO:&lt;br /&gt;
* * 0 4 * 0 0 0 0 * 0 0 0 0 * 0 0 0 0 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Information about SIMLOCK:&lt;/td&gt;&lt;td&gt;&lt;br /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Hagenuk&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;# # 9 1 4 0 * 8 3 # 7 5 * 2 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Mitsubishi&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;View IMEI:&lt;/td&gt;&lt;td&gt;* # 06 # View IMEI&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Default language English:&lt;/td&gt;&lt;td&gt;* # 0044 # English&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;JDefault language Deutch:&lt;/td&gt;&lt;td&gt;* # 0049 # Deutsch&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;NetMonitor1 activate:&lt;/td&gt;&lt;td&gt;hold * enter 4329&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;NetMonitor2 activate:&lt;/td&gt;&lt;td&gt;hold * enter 621342&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Enter into M4 Test mode:&lt;/td&gt;&lt;td&gt;hold * enter 5472&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Show SW version:&lt;/td&gt;&lt;td&gt;hold * enter 5806&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Show HW version:&lt;/td&gt;&lt;td&gt;hold * enter 5807 &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Show SW and HW version:&lt;/td&gt;&lt;td&gt;hold * enter 936505&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;NS Lock Menu:&lt;/td&gt;&lt;td&gt;hold * enter 476989&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;CP Lock Menu:&lt;/td&gt;&lt;td&gt;hold * enter 482896&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;NS Lock Menu:&lt;/td&gt;&lt;td&gt;hold * enter 574243&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;SP Lock Menu:&lt;/td&gt;&lt;td&gt;hold * enter 967678&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMSI Lock Menu:&lt;/td&gt;&lt;td&gt;hold * enter 362628&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Lock net.level:&lt;/td&gt;&lt;td&gt;hold * enter 787090&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Lock net.level:&lt;/td&gt;&lt;td&gt;hold * enter 787292&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Shut Down:&lt;/td&gt;&lt;td&gt;hold * enter 3926&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Motorola&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0  6#&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor ON:&lt;/td&gt;&lt;td&gt;* * * 1 1 3  * 1 * [OK]&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor OFF:&lt;/td&gt;&lt;td&gt;* * * 1 1 3 * 1 * [OK]&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;* - press this until box shown up&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Nokia&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;* # 0 0 0 0 #  lub * # 9 9 9 9 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Simlock info:&lt;/td&gt;&lt;td&gt;* # 9 2 7 0 2 6 8 9 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Enhanced Full Rate:&lt;/td&gt;&lt;td&gt;* 3 3 7 0 # [ # 3 3 7 0 # off]&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Half Rate:&lt;/td&gt;&lt;td&gt;* 4 7 2 0 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Provider lock status:&lt;/td&gt;&lt;td&gt;# p w + 1 2 3 4 5 6 7 8 9 0 + 1&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Network lock status:&lt;/td&gt;&lt;td&gt;# p w + 1 2 3 4 5 6 7 8 9 0 + 2&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Provider lock status:&lt;/td&gt;&lt;td&gt;# p w + 1 2 3 4 5 6 7 8 9 0 + 3&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;SimCard lock status:&lt;/td&gt;&lt;td&gt;# p w + 1 2 3 4 5 6 7 8 9 0 + 4&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;1234567890 - MasterCode which is generated from IMEI&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Philips&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Simlock info:&lt;/td&gt;&lt;td&gt;* # 8 3 7 7 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Security code:&lt;/td&gt;&lt;td&gt;* # 1 2 3 4 # (Fizz) or * # 7 4 8 9 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Samsung&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;* # 9 9 9 9 # albo * # 0 8 3 7 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor:&lt;/td&gt;&lt;td&gt;* # 0 3 2 4 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Chaning LCD contrast:&lt;/td&gt;&lt;td&gt;* # 0 5 2 3 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Memory info:&lt;/td&gt;&lt;td&gt;* # 0 3 7 7 # albo * # 0 2 4 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Reset memory (SIMLOCK`a removing!!!):&lt;/td&gt;&lt;td&gt;* 2 7 6 7 * 3 8 5 5 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Reset CUSTOM memory:&lt;/td&gt;&lt;td&gt;* 2 7 6 7 * 2 8 7 8 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Battery state:&lt;/td&gt;&lt;td&gt;* # 9 9 9 8 * 2 2 8 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Alarm beeper:&lt;/td&gt;&lt;td&gt;* # 9 9 9 8 * 2 8 9 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Vibra test:&lt;/td&gt;&lt;td&gt;* # 9 9 9 8 * 8 4 2 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Sagem&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Service Menu access:&lt;/td&gt;&lt;td&gt;MENU 5 1 1 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Siemens&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;* # 0 6 #&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;put off sim card and enter:: * # 0 6 # (and press LONG KEY)&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Bonus screen:&lt;/td&gt;&lt;td&gt;in phone booke: + 1 2 0 2 2 2 4 3 1 2 1&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Net Monitor (S4 Power):&lt;/td&gt;&lt;td&gt;Menu 9 8, left SoftKey, 7 6 8 4 6 6 6, Red phone, Menu 5 6&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;nagl&quot; colspan=&quot;2&quot;&gt;&lt;b&gt;Sony&lt;/b&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;IMEI number:&lt;/td&gt;&lt;td&gt;*#06#&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Software version:&lt;/td&gt;&lt;td&gt;*#8377466#&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td&gt;Show list of product creator names:&lt;/td&gt;&lt;td&gt;(you must save this number in your Phone Book with &quot;own phone no.&quot; record): + 1 2 0 2 2 2 4 3 1 2 1&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
</description><link>http://sharelok.blogspot.com/2012/12/phone-secret-codes.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEim0eg0_FSCEeCsSSSogk5AXfs0YZgd7cyYjersFHPBavFnigzh-LQ_8VHzLmF6PNigYZndM6sIxbkqqXD6x84TXUAARtGNKogeYvM0V2zdvSY6BYEp3g3OjdkhfGBfgb1GMSLVs3V5FR8/s72-c/Phone+Secret+Codes.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-1563788600914876839</guid><pubDate>Tue, 18 Dec 2012 12:31:00 +0000</pubDate><atom:updated>2012-12-18T14:36:32.848+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information</category><title>Is someone listening to your calls?</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;is someone listening to your calls?&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxgHm6GfsX9hm0qV0bq-PLbn8M38jb9IAZZcbgBbF5rKssMKV9luJjdqBaQq8wL7Q-piWPq9-kQ3iTs0fKCZe-Nm6nfg45RsFaipMcviyaWcdLgQQRbSRsWzRztaznrvtgtAu3FC3lupA/s320/Is+someone+listening+to+your+calls.jpg&quot; width=&quot;272&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
Listening to other persons calls is illegal, you can only monitor your own device if you don&#39;t want to be fined or to do some time in jail. However, in these days everybody listens to everybody.&amp;nbsp; &lt;br /&gt;
How this works?&lt;br /&gt;
Some types of phone monitoring software are able to record phone 
conversations and act as “bugs” that discretely tap into the phone’s 
microphone so you can listen in on conversations.&lt;br /&gt;
The problem is that most of the time, there is no sure way to tell if someone is monitoring you or spying on your conversations.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Tips: &lt;/b&gt;&lt;br /&gt;
Listen for additional sounds on the line, such as popping, excessive static, humming or clicking.&lt;br /&gt;
The phone sometimes lights up when you are not using it.&lt;br /&gt;
Watch for interference with your radio and television.&lt;br /&gt;
The phone’s battery seems to drain quicker than usual.&lt;br /&gt;
The phone bill goes up and you are charged for more texts than you remember sending. &lt;br /&gt;
Check your phone for apps and downloads, but you might not find any software, even if you use &quot;bugs&quot; from surveillance companies this may not always work.&lt;br /&gt;
If you discover some software on your device or you are suspicious of&amp;nbsp; some soft being installed, get rid of it by wiping the phones memory and go to your service provider, they can restore your phone.</description><link>http://sharelok.blogspot.com/2012/12/is-someone-listening-to-your-calls.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhxgHm6GfsX9hm0qV0bq-PLbn8M38jb9IAZZcbgBbF5rKssMKV9luJjdqBaQq8wL7Q-piWPq9-kQ3iTs0fKCZe-Nm6nfg45RsFaipMcviyaWcdLgQQRbSRsWzRztaznrvtgtAu3FC3lupA/s72-c/Is+someone+listening+to+your+calls.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-6658913264281877440</guid><pubDate>Tue, 18 Dec 2012 10:05:00 +0000</pubDate><atom:updated>2012-12-18T12:07:56.711+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Snake Spy Cam!</title><description>If you suspect someone of something and you don&#39;t have enough evidence, this gadget might help you. In stores are very expensive, but in this video you&#39;ll learn how to build one from skratch.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;500&#39; height=&#39;500&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dwGYGroqxZa_aeIXZReue-j6xHbgGl-mYImJbCmbBOIZHcBMbTxVJIfnxCb16XazgakwDfLkmT8H64dSYUt1A&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;</description><link>http://sharelok.blogspot.com/2012/12/snake-spy-cam.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-7643264718137671183</guid><pubDate>Tue, 18 Dec 2012 09:52:00 +0000</pubDate><atom:updated>2012-12-18T11:52:46.994+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Applications</category><title>Self Destructing Message</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Self Destructive Message delete messages after reading&quot; border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnBMZILd8I0AeJhMqSdkbOj1_GIII1x14tGPrmryimiquieVyOWdAR6yP4fWqRyXQhuH94WM4Jghz1aDhsbx8aeIWNXqHhI6V1DrdvPV_TsLUoJz7hMVgYrs-TxZ1uab62pWLNAcx1fOc/s320/Self_Destructive_Message.jpg&quot; width=&quot;213&quot; /&gt;&lt;/div&gt;
&amp;nbsp; &lt;br /&gt;
&lt;a href=&quot;https://itunes.apple.com/my/app/self-destructing-message/id362387613?mt=8&quot; target=&quot;_blank&quot;&gt;Self Destructing Message&lt;/a&gt; (SDM) is a message application along the lines of 
Viber or Whatsapp. With this app you’ll be able to set ‘self 
destruct’ timers to your messages. Your friend will have 5, 10, 15, 30 
or 60 seconds to read the message that you sent. After that, the message
 ‘self destructs’ (gets deleted).&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</description><link>http://sharelok.blogspot.com/2012/12/self-destructing-message.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgnBMZILd8I0AeJhMqSdkbOj1_GIII1x14tGPrmryimiquieVyOWdAR6yP4fWqRyXQhuH94WM4Jghz1aDhsbx8aeIWNXqHhI6V1DrdvPV_TsLUoJz7hMVgYrs-TxZ1uab62pWLNAcx1fOc/s72-c/Self_Destructive_Message.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-3122454748648273712</guid><pubDate>Mon, 17 Dec 2012 16:25:00 +0000</pubDate><atom:updated>2012-12-17T18:25:05.923+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Freeware Applications to Protect Electronic Mail</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Freeware applications are encrypted software programs that allows you to protect any confidential emails&quot; border=&quot;0&quot; height=&quot;243&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqt8jcj-v-1zomDNYm7kGcCA4EyhQue0gXIWCAf-MDmS_uS6d7I79OTFbWFqOZeG4Nmkxgllrj2dnxdw7aUOu9Vom30pkE6h9OPkpdD2BY5EyRM7IVy-Y86cTip8wZNiOFFuS1XvNw8ZE/s320/Freeware_Applications.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Encrypted software program allows you to protect any 
confidential emails. It will help keep information private and data 
protected.&amp;nbsp;
&lt;br /&gt;
Recognizing the importance of email communications, users need to rely on protecting their electronic mail.&lt;br /&gt;
As you already know, to protect an electronic mail requires an encryption so the content won&#39;t be legible. To read the mail you must use a password to decrypt it.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Freeware programs:&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;&lt;a href=&quot;http://www.mxcsoft.com/download.htm&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;iSafeguard Freeware&lt;/i&gt;&lt;/a&gt;&lt;/b&gt; can safely secure your files and e-mails. It uses a strong encryption 
and digital signature. Supports the following e-mail clients: Microsoft 
Outlook, Microsoft Outlook Express, Yahoo Mail, Hotmail, Gmail, Juno 
Mail, Lycos Mail, Eudora Webmail, Brinkster WebMail. It also supports 
Text, RTF and HTML e-mails.&lt;br /&gt;
&lt;br /&gt;
&lt;a href=&quot;http://www.hushmail.com/services/downloads/&quot; target=&quot;_blank&quot;&gt;&lt;i&gt;&lt;b&gt;HushMail&lt;/b&gt;&amp;nbsp;&lt;/i&gt;&lt;/a&gt; is a Web-based email service that uses a Java applet to encrypt and
 decrypt messages. It is able to encode emails using a 1024 bit public 
key encryption. E-mails attachments are also encrypted.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;a href=&quot;http://www.softpedia.com/get/Security/Encrypting/Safe-Express-Home.shtml&quot; target=&quot;_blank&quot;&gt;&amp;nbsp;&lt;b&gt;Safe Express Home&amp;nbsp;&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;&lt;/b&gt; is an e-mail client that is easy to configure and features automatic e-mail encryption and anti-spam filters.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;a href=&quot;http://www.sbwave.com/enkryptor/encrypt.html&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;Sbwave&lt;/b&gt; &lt;/a&gt;&lt;/i&gt;&lt;/b&gt;allows users to send and receive encrypted email via a web form. It 
requires no software to install. It also doesn&#39;t have users sign up for 
anything and does not place ads in the e-mails.
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/freeware-applications-to-protect.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqt8jcj-v-1zomDNYm7kGcCA4EyhQue0gXIWCAf-MDmS_uS6d7I79OTFbWFqOZeG4Nmkxgllrj2dnxdw7aUOu9Vom30pkE6h9OPkpdD2BY5EyRM7IVy-Y86cTip8wZNiOFFuS1XvNw8ZE/s72-c/Freeware_Applications.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-407814205529914182</guid><pubDate>Mon, 17 Dec 2012 10:56:00 +0000</pubDate><atom:updated>2012-12-17T13:02:18.004+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Secret Compartments</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
If you like secret compartments then you should take a look at this ideas.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Hidden Book&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXNHm1YAJ_8F2U_C-UlJUx775G3XJynKjbrvVWqvACRoAE6aWomUueYtxF2BRyTOz1mSoJynCFhYgqAbT9Udy_f_UQ4i9R3ixHueUbp625Ar5YHRnEzoDzvXwD9IYhQycISXjUceJVPE/s1600/Hidden_Book.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;239&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXNHm1YAJ_8F2U_C-UlJUx775G3XJynKjbrvVWqvACRoAE6aWomUueYtxF2BRyTOz1mSoJynCFhYgqAbT9Udy_f_UQ4i9R3ixHueUbp625Ar5YHRnEzoDzvXwD9IYhQycISXjUceJVPE/s320/Hidden_Book.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Wrist Watch&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwDVU9fJjby_s7hjVkzdXM1eAInhwNOqkRcYM-hlWTr58EQ6kqszyTsXn04rmoS0QX4NYmeiVmsDeCrWb8LZD4yYuO05i4d4Wg4YfSPUvTTxrzpuJUOb5RFsvjZS8l6AAcdZYBF9DFArU/s1600/Wrist_Watch.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;162&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwDVU9fJjby_s7hjVkzdXM1eAInhwNOqkRcYM-hlWTr58EQ6kqszyTsXn04rmoS0QX4NYmeiVmsDeCrWb8LZD4yYuO05i4d4Wg4YfSPUvTTxrzpuJUOb5RFsvjZS8l6AAcdZYBF9DFArU/s320/Wrist_Watch.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&amp;nbsp;Truck Compartment&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHHKPU0Ye5OWDrOcAd_pxpupc6LJltU49XSK-xAfBwtEo_Jf6cvQH_wFwKaqUqx2HuCAWGsLcOjiAog8S1H_utJGkzRVAMFOLkfZ8B2S9TWGW2gM3Z8mD500TlAukYpHgO2r4McRwJsvc/s1600/truck_compartment.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiHHKPU0Ye5OWDrOcAd_pxpupc6LJltU49XSK-xAfBwtEo_Jf6cvQH_wFwKaqUqx2HuCAWGsLcOjiAog8S1H_utJGkzRVAMFOLkfZ8B2S9TWGW2gM3Z8mD500TlAukYpHgO2r4McRwJsvc/s320/truck_compartment.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_IwCXx7i9trz9h91NePnJ6Kwh2sFfqv3NoALTCL74u7Te-gg-cQHNlcpPRzffqVqZ2WfJz79n1wWPnDCyUU4KX5qWi0Tz4H8_WkHeaQ6v47mgUNqwgKYUrSn-KXwaY1z3LcePc61gXZ4/s1600/truck_hide.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Secret hiding sneakers&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSWZ4NdgCaWkpHc0t1DZ-bNIir-whS7FmwFJVoSsVQE-K-Y0VLstRFnWzIdNUGkCnBhPd336DgAvS2nyHr_HfuAzShtDwF4fogQDvTr6qzWufjjkya69_vVlEepYnFW_hLft_qIdWPCE/s1600/Secret_Hiding_Sneakers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;164&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgjSWZ4NdgCaWkpHc0t1DZ-bNIir-whS7FmwFJVoSsVQE-K-Y0VLstRFnWzIdNUGkCnBhPd336DgAvS2nyHr_HfuAzShtDwF4fogQDvTr6qzWufjjkya69_vVlEepYnFW_hLft_qIdWPCE/s320/Secret_Hiding_Sneakers.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
Wall socket&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgvLR51YtvofCfm6E54wHSmdJ52USH5atPekL-tYXAJ5RUSKlTHv_mnEqcSh0Qy7HejnBzpxv9dC6w8BB5Bmv6m-Tq3B2SKm7pSPfr2O2ALonXOfiVMnmpkWPrM35UWgVftBKLp224Sc4/s1600/Wall_Socket.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;125&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjgvLR51YtvofCfm6E54wHSmdJ52USH5atPekL-tYXAJ5RUSKlTHv_mnEqcSh0Qy7HejnBzpxv9dC6w8BB5Bmv6m-Tq3B2SKm7pSPfr2O2ALonXOfiVMnmpkWPrM35UWgVftBKLp224Sc4/s320/Wall_Socket.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
Hidden Coin&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG6rpMYjnP5iOhJfWKv_ihr5RNhTwS_27dKdOsGZRVN-tX-9wUNBBKwGzYlCFgBvg0Xp9uIO76i05_rrtrGOY8KE6MdgfHJA9m999oyMfl1ipqJXvUDVO0tZjVeQVGzZGcDyRMa0KF2NM/s1600/Hidden_Coin.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;207&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhG6rpMYjnP5iOhJfWKv_ihr5RNhTwS_27dKdOsGZRVN-tX-9wUNBBKwGzYlCFgBvg0Xp9uIO76i05_rrtrGOY8KE6MdgfHJA9m999oyMfl1ipqJXvUDVO0tZjVeQVGzZGcDyRMa0KF2NM/s320/Hidden_Coin.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
If you want to learn how to create a secret compartment watch this video. It&#39;s a good hidden place.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&#39;allowfullscreen&#39; webkitallowfullscreen=&#39;webkitallowfullscreen&#39; mozallowfullscreen=&#39;mozallowfullscreen&#39; width=&#39;500&#39; height=&#39;500&#39; src=&#39;https://www.blogger.com/video.g?token=AD6v5dzZF1L7joPsJhecK95aJIxiVaW8lDBmkZthJib20sT6oLTMxwzK6-XofU2Sj0QH72Xcp1Vo4aqYJLzExJRY&#39; class=&#39;b-hbp-video b-uploaded&#39; frameborder=&#39;0&#39;&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/secret-compartments.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjyXNHm1YAJ_8F2U_C-UlJUx775G3XJynKjbrvVWqvACRoAE6aWomUueYtxF2BRyTOz1mSoJynCFhYgqAbT9Udy_f_UQ4i9R3ixHueUbp625Ar5YHRnEzoDzvXwD9IYhQycISXjUceJVPE/s72-c/Hidden_Book.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-8565398907262396113</guid><pubDate>Mon, 17 Dec 2012 08:15:00 +0000</pubDate><atom:updated>2012-12-17T10:15:50.866+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Is someone spying your computer?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii-54y-Aw0utWOOMfNWO2ugi5t54SYYiNzI7RpThaKjqBqz36ZbYP-zvh6MhTWuub67XE5eVZkuU9f40nPiuQLg11xEGJYc0cL4p5kEqkpifWHZp4gYo0sS51rZQhTVBObHD8hbqgWlZQ/s1600/Start_control_panels.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;/a&gt;Go to&amp;nbsp; &quot;Start&quot; and click &quot;Control Panel&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii-54y-Aw0utWOOMfNWO2ugi5t54SYYiNzI7RpThaKjqBqz36ZbYP-zvh6MhTWuub67XE5eVZkuU9f40nPiuQLg11xEGJYc0cL4p5kEqkpifWHZp4gYo0sS51rZQhTVBObHD8hbqgWlZQ/s1600/Start_control_panels.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii-54y-Aw0utWOOMfNWO2ugi5t54SYYiNzI7RpThaKjqBqz36ZbYP-zvh6MhTWuub67XE5eVZkuU9f40nPiuQLg11xEGJYc0cL4p5kEqkpifWHZp4gYo0sS51rZQhTVBObHD8hbqgWlZQ/s320/Start_control_panels.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Click &quot;Security Center&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-47eYi6NDwuu6_YSyA0Xu_E_eiDzwJjYRfwCqmEYcBunI_gKfDugc7RgdCdvAZSUe7Lwtip4E5VbSUKEI1F4V7eNDoitVdE2hrVykl1fnW8lJbvNUqyNInQmxYJkusNDL_b3SFqexdxs/s1600/control_panel.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;249&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-47eYi6NDwuu6_YSyA0Xu_E_eiDzwJjYRfwCqmEYcBunI_gKfDugc7RgdCdvAZSUe7Lwtip4E5VbSUKEI1F4V7eNDoitVdE2hrVykl1fnW8lJbvNUqyNInQmxYJkusNDL_b3SFqexdxs/s320/control_panel.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiduL8f_aGNs_ElRc9jLPM5dfTqiryZs7byEVTXFH9a8SUHwaNX9NtefKvE0U0SgBmHW4SXF66YGSkBZ6YG6m-F4iyWagGHX28pjGEXtK9HWgccPTQlzpNGh89gSAiJSHazdHhnjsOg6xg/s1600/control_panel.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Click &quot;Windows Firewall&quot;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivOfBkSq5SnBOW19kAgcJAOhXDlwU6rZXoSTqPIhmV3XigKHe9nmroygacJEmtBnxmInv-N0Z0mBQGYsM5_gs6wzmbbAadIWSycqiar2hnoB-nHWV7w35iu37Cj6m2SiJswWOTqCRoj-U/s1600/security_center.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;255&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivOfBkSq5SnBOW19kAgcJAOhXDlwU6rZXoSTqPIhmV3XigKHe9nmroygacJEmtBnxmInv-N0Z0mBQGYsM5_gs6wzmbbAadIWSycqiar2hnoB-nHWV7w35iu37Cj6m2SiJswWOTqCRoj-U/s320/security_center.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
Click the &quot;Exceptions Tab&quot;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGUxWXzRznlpIUCqx-kTzKSd4t8zTjXG9Camii-GAoSbwAjL9m_01AQaFWgVcLDaBnVhAk63F7VFvnSNvtyd9kMxEMGgvgPr5ViFAhOHbqtApUqqAMffnoyPrrtj9U7-ZTBnDRShFbw4o/s1600/Exceptions_tab.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGUxWXzRznlpIUCqx-kTzKSd4t8zTjXG9Camii-GAoSbwAjL9m_01AQaFWgVcLDaBnVhAk63F7VFvnSNvtyd9kMxEMGgvgPr5ViFAhOHbqtApUqqAMffnoyPrrtj9U7-ZTBnDRShFbw4o/s320/Exceptions_tab.jpg&quot; width=&quot;270&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: left;&quot;&gt;
Uncheck programs that you do not want to have access to the Internet, but make sure you know what a program does before restricting access, as you
 could completely lose Internet access or prohibit programs that you 
need.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
Click &quot;OK&quot; after you have deselected the programs you do not want to have access to the Internet.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
Close the &quot;Security Center&quot; and the &quot;Control Panel&quot;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
Download, install and run a complete computer scan with the free spyware
 detection software &lt;a href=&quot;https://www.rapidshare.com/#download|0|2468858342|SpywareTerminatorSetup.exe|938&quot; target=&quot;_blank&quot;&gt;Spyware Terminator&lt;/a&gt; and schedule it 
to run a daily scan.&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
If you know someone who has reasons to spy on you and had access to your computer, you shoult take your keyboard and pc to a specialist and have it checked. &lt;/div&gt;
&lt;div style=&quot;background-color: white; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/is-someone-spying-your-computer.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEii-54y-Aw0utWOOMfNWO2ugi5t54SYYiNzI7RpThaKjqBqz36ZbYP-zvh6MhTWuub67XE5eVZkuU9f40nPiuQLg11xEGJYc0cL4p5kEqkpifWHZp4gYo0sS51rZQhTVBObHD8hbqgWlZQ/s72-c/Start_control_panels.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-1370624421541802374</guid><pubDate>Sun, 16 Dec 2012 16:55:00 +0000</pubDate><atom:updated>2012-12-16T18:55:37.008+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Lipstick Pistol</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Lipstick pistol is a 4.5 millimeter single-shot weapon&quot; border=&quot;0&quot; height=&quot;256&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinmaCHJnoOUHpG_A-gkiwTVXccOyCghgzlR46RQXmssUIgPSiqAg0CyOpwUnGNzVEH4I-HZ2Am2hbmZWr2SEU0USfPXL7tbVZYIgiwKKa5V74gK9UdiD6dUcpDzGavxtFaraLxUzqCw00/s320/Lipstick_pistol.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Lipstick pistol of this 4.5 millimeter single-shot weapon, presumably taken from a KGB agent in the mid-1960s. While it&#39;s unclear whether this dangerous &quot;kiss of death&quot; was ever used, a cyanide pistol was used for assassination in that era. These covert weapons are surviving examples of the &quot;active measures&quot; that were taken in this time period, unlike many of their intended targets.
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/lipstick-pistol.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinmaCHJnoOUHpG_A-gkiwTVXccOyCghgzlR46RQXmssUIgPSiqAg0CyOpwUnGNzVEH4I-HZ2Am2hbmZWr2SEU0USfPXL7tbVZYIgiwKKa5V74gK9UdiD6dUcpDzGavxtFaraLxUzqCw00/s72-c/Lipstick_pistol.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-5442411685323841021</guid><pubDate>Sun, 16 Dec 2012 14:44:00 +0000</pubDate><atom:updated>2012-12-16T16:44:52.187+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Software</category><title>Keyloggers</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Keylogger 007 it can secretly track all activities of computer users&quot; border=&quot;0&quot; height=&quot;212&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-WKU9pDuDcuuS9jjmSv0Ph8wCj5NsZQFVVL_8tGHF9-OjmlhpjVgHEakKISUZZEio6VwcEENC8An4-db4XN-hQRKXWBE_BJPrrCKgr8WkSt2OJNl9HStBF0IK4fB17lq9KouGa7gkQZw/s320/007_keylogger.png&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
Keyloggers are software programs designed to secretly monitor and log all keystrokes. Also they can be devices and it&#39;s important to keep their existence in mind when we think about security.&lt;br /&gt;
&lt;br /&gt;
Function:&lt;br /&gt;
&lt;br /&gt;
They can secretly track all activities of computer users in total stealth mode, and automatically deliver logs to you via Email or FTP. They can help you gather information about web sites visited, file operations, every keystroke, username and password, online chat conversation.&lt;br /&gt;
Keywords&amp;nbsp; can take screen snapshot at set intervals just like a surveillance camera directly point at the computer monitor.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
You can try the 007 keylogger, it works in the background and it&#39;s totally safe, making it undetectable for antivirus in the market. You can download it for free &lt;a href=&quot;https://www.rapidshare.com/#download|0|2205869469|007%20keylogger%20spy%20software.exe|177&quot; target=&quot;_blank&quot;&gt;here.&lt;/a&gt;&lt;span id=&quot;goog_1265290010&quot;&gt;&lt;/span&gt;&lt;span id=&quot;goog_1265290011&quot;&gt;&lt;/span&gt; 
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/keyloggers.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi-WKU9pDuDcuuS9jjmSv0Ph8wCj5NsZQFVVL_8tGHF9-OjmlhpjVgHEakKISUZZEio6VwcEENC8An4-db4XN-hQRKXWBE_BJPrrCKgr8WkSt2OJNl9HStBF0IK4fB17lq9KouGa7gkQZw/s72-c/007_keylogger.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-11229098569873179</guid><pubDate>Sat, 15 Dec 2012 10:29:00 +0000</pubDate><atom:updated>2012-12-15T13:28:58.049+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Applications</category><title>Cam On! Lite</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Cam on!Lite is a navigation tool&quot; border=&quot;0&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2PFGrYTxn9Uj3xCoKgHGFSVtxDHugHq0S8gXfyaiVXW2L2oCB2Xy4l9V_1MpX3lx0VLdAUncR41445Y8jxJWDFKOqFA6-_A_XNSQcFoUtTWllJi7NobugNR29OZUSwdaRshyphenhyphenw02FcWQE/s320/Cam+on!Lite.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;a href=&quot;https://itunes.apple.com/my/app/cam-on!-lite/id419260277?mt=8&quot; target=&quot;_blank&quot;&gt;Cam on! Lite&lt;/a&gt; lets you explore the world by interacting with some of the&amp;nbsp; webcams on the net.&lt;br /&gt;
This is an app that has a map full of webcam cameras you can view. Also, you can control some of the cameras viewing angle 
(limited viewing angle) with on screen controls.  You can also take a 
picture of the place you’re viewing and save it to your iPhone photo 
album. </description><link>http://sharelok.blogspot.com/2012/12/cam-on-lite.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg2PFGrYTxn9Uj3xCoKgHGFSVtxDHugHq0S8gXfyaiVXW2L2oCB2Xy4l9V_1MpX3lx0VLdAUncR41445Y8jxJWDFKOqFA6-_A_XNSQcFoUtTWllJi7NobugNR29OZUSwdaRshyphenhyphenw02FcWQE/s72-c/Cam+on!Lite.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-5194546398068738352</guid><pubDate>Sat, 15 Dec 2012 10:05:00 +0000</pubDate><atom:updated>2012-12-15T12:06:24.770+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Applications</category><title>Monitoring Software - Mobile Spy</title><description>&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Mobile spy is a smartphone monitoring software&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpyYhfsOcnVT4x1rxPJIex2N3cIZgMt2z3ZPRzyk7k5BXLypPoKBjFLpvDF-OHpx0iKpfMSjHrxc5sLR-KSm4_DDN45szGEnPFdOYUM0nR65pP-XaSuYoutr-8jNW_P2dfVUlvfl5CKH8/s1600/Mobile_Spy.gif&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;a href=&quot;http://www.mobile-spy.com/&quot; target=&quot;_blank&quot;&gt;Mobile Spy&lt;/a&gt; &lt;/b&gt;allows you to monitor your iPhone in real 
time by providing reports of incoming and outgoing calls, SMS, GPS 
locations, contact list, e-mails, website URLs, photos and videos. $49.97/Quarter&lt;b&gt;.&lt;/b&gt;</description><link>http://sharelok.blogspot.com/2012/12/mobile-spy.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpyYhfsOcnVT4x1rxPJIex2N3cIZgMt2z3ZPRzyk7k5BXLypPoKBjFLpvDF-OHpx0iKpfMSjHrxc5sLR-KSm4_DDN45szGEnPFdOYUM0nR65pP-XaSuYoutr-8jNW_P2dfVUlvfl5CKH8/s72-c/Mobile_Spy.gif" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-8098157197505164929</guid><pubDate>Sat, 15 Dec 2012 09:33:00 +0000</pubDate><atom:updated>2012-12-15T11:45:40.154+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Information</category><title>Free apps spy on calls and texts</title><description>Companies are using free smartphone apps to allow them to spy on users messages, intercept calls and also to track their location. By accepting little-read terms and conditions when downloading apps, consumers give developers the right to gather private information.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Companies use apps to spy on calls and texts&quot; border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZfZ1JrBDBNJ4IJO6YzyzS7FWnna4SMbaflDiIJ3tSi_7ofWfqDJ5K5dQkS5CaGqT_K9tDD-L6dZbhtZr0NgRReXXgN1_s2ZnTkh6LxUeHiIF0N0cw0vr3Dqj_gavhOjveFLnCXWhyphenhyphenWKM/s1600/Companies_spy.png&quot; /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiCjrxAxeNccmgk37S3qHgQYdpxj4DN8qU-Ir7jdAZQ-anzuha5LUkQBNjyZ2fp2LCyR3gcXBAdksKXzbP8UF5SGnXRBMiT5746JIOB5MNHQxHjepzQI6h4K9415UuD3gi61k2jlclpcpE/s1600/Untitled-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguZWCvu_Z2_vYNChXs4pNmTfPabZzREdTVazSjw_EbcWQli5EKPdszN51-AnAPZBWCeB6YTGZDjjEFoX6Jm33-lX1C8_XCwvhbTcDy93LSZyaOs1RtH9qW6-UAuT42NxQU4O2Daf7V2EQ/s1600/Untitled-1.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;br /&gt;&lt;/a&gt;&lt;/div&gt;
Source: &lt;a href=&quot;http://www.dailymail.co.uk/&quot; target=&quot;_blank&quot;&gt;dailymail&lt;/a&gt;</description><link>http://sharelok.blogspot.com/2012/12/free-apps-spy-on-calls-and-texts.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZfZ1JrBDBNJ4IJO6YzyzS7FWnna4SMbaflDiIJ3tSi_7ofWfqDJ5K5dQkS5CaGqT_K9tDD-L6dZbhtZr0NgRReXXgN1_s2ZnTkh6LxUeHiIF0N0cw0vr3Dqj_gavhOjveFLnCXWhyphenhyphenWKM/s72-c/Companies_spy.png" height="72" width="72"/><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-2669163277936102986</guid><pubDate>Fri, 14 Dec 2012 16:48:00 +0000</pubDate><atom:updated>2012-12-14T18:48:28.605+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Handgun Electric Screwdriver</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Handgun Electric Screwdriver is designed for home improvement&quot; border=&quot;0&quot; height=&quot;275&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6xR24NBZCIw6Q7OZm18v70Sm5TgvSvFhNr8JrnYHV3Y0WQWnfMoHZlcQL884A7t3cMU-vwJ6Jbm9BYMmhKGNUb8nw3t1ZMiPm6R9aRHO1T3_K3mQDRy8TvvAxo4hv2tkTeJ8u4QhR5rM/s320/gun-power-screwdriver.jpeg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
This gun is designed for home improvement types who are quick on the draw, this electric screwdriver is modeled after a classic revolver handgun and comes with six interchangeable bits stored in the cylinder.&lt;br /&gt;
To make the handgun experience more realistic, an LED light at the 
end of the barrel recreates the effect of a muzzle flash while also 
illuminating the screw in the gun&#39;s targeting.&amp;nbsp; &lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/handgun-electric-screwdriver.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj6xR24NBZCIw6Q7OZm18v70Sm5TgvSvFhNr8JrnYHV3Y0WQWnfMoHZlcQL884A7t3cMU-vwJ6Jbm9BYMmhKGNUb8nw3t1ZMiPm6R9aRHO1T3_K3mQDRy8TvvAxo4hv2tkTeJ8u4QhR5rM/s72-c/gun-power-screwdriver.jpeg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-8729616657489363911</guid><pubDate>Fri, 14 Dec 2012 16:01:00 +0000</pubDate><atom:updated>2012-12-14T18:01:07.936+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>Flashlight Revolver Guns </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;Flashlight Revolver Guns&quot; border=&quot;0&quot; height=&quot;160&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzqKUVjjtV7fD9RRMXnJSt23mArVHE6OnamZ0ySE6OT6UMihmAu-sDbyDgcvCk7r3d3-bVVKaTB0CX-G1POpuh392aE-MHK594X6nAT0aXHzygicI8Sl2EBcL5wx0wWwPHTipXgO2dMvs/s320/Flashlight+Revolver+Guns.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;br /&gt;
This flashlight includes a 22 caliber seven-shot revolver on the business end. Perfect for dark places.&amp;nbsp; &lt;br /&gt;
&amp;nbsp;It was produced in the early 1920s by 
Buffalo-based S.P. Cottrell &amp;amp; Son for use by security guards and 
night watchmen as a quick way to deal with intruders as soon as they 
were spotted. And you thought that baseball bat flashlight was dangerous.From this one you can&#39;t hide.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/flashlight-revolver-guns.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgzqKUVjjtV7fD9RRMXnJSt23mArVHE6OnamZ0ySE6OT6UMihmAu-sDbyDgcvCk7r3d3-bVVKaTB0CX-G1POpuh392aE-MHK594X6nAT0aXHzygicI8Sl2EBcL5wx0wWwPHTipXgO2dMvs/s72-c/Flashlight+Revolver+Guns.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-1674764414065866336.post-659490324640040926</guid><pubDate>Fri, 14 Dec 2012 13:42:00 +0000</pubDate><atom:updated>2012-12-18T11:35:42.730+02:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Gadgets</category><title>LaCie Rugged Key</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img alt=&quot;LaCie Rugged Key is a usb key resistent to water and heat.&quot; border=&quot;0&quot; height=&quot;202&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuRK-VwIDeF9hexgX3_I5Etje1rnto4UYpxN804fCK86DCdMt2WbCjqr0gHqtSnS5AlDoCj4IqXMihUT_uHaiHaOn46xMacz2AtlOCh2ZQE8yAjWRYp6pPnlkyuDvL6KLKffrLUu6M1rQ/s320/lacie_ruggedkey.jpg&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
LaCie Rugged Key gives you peace of mind that your 
data is safe. The drive offers fast USB 3.0 speed and can withstand 328-foot drops. Also, is heat and cold 
resistant, and is IP-54 certified for dust and water-projection 
resistance.&lt;br /&gt;
The AES 256-bit encryption means it&#39;s secure from the inside out.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Positives: &lt;/b&gt;&lt;br /&gt;
Withstands drops from up to 328 feet&lt;br /&gt;
USB 3.0 for speeds up to 150MB/s&lt;br /&gt;
Secure AES 256-bit encryption&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Negatives: &lt;/b&gt;&lt;br /&gt;
The LaCie RuggedKey doesn&#39;t float, caps at only 32GB and is expensive. Starting at: 39,99$.&lt;br /&gt;
&lt;br /&gt;
You can find out more&lt;a href=&quot;http://www.lacie.com/products/product.htm?id=10603&quot; target=&quot;_blank&quot;&gt; here &lt;/a&gt;.
&lt;/div&gt;
</description><link>http://sharelok.blogspot.com/2012/12/lacie-rugged-key.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiuRK-VwIDeF9hexgX3_I5Etje1rnto4UYpxN804fCK86DCdMt2WbCjqr0gHqtSnS5AlDoCj4IqXMihUT_uHaiHaOn46xMacz2AtlOCh2ZQE8yAjWRYp6pPnlkyuDvL6KLKffrLUu6M1rQ/s72-c/lacie_ruggedkey.jpg" height="72" width="72"/><thr:total>0</thr:total></item></channel></rss>