<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>Psycho Cyborg</title><description>For Nerds From Nerds</description><managingEditor>noreply@blogger.com (Prateek Gupta)</managingEditor><pubDate>Fri, 8 Nov 2024 07:38:39 -0800</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">45</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://psychocyborg.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>For Nerds From Nerds</itunes:subtitle><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>BULLET 02 | World's Smallest Flashlight</title><link>https://psychocyborg.blogspot.com/2017/02/bullet-02-worlds-smallest-flashlight.html</link><category>Future</category><category>Intresting</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Fri, 24 Feb 2017 09:12:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-6440925654745603988</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: #fbfbfa; color: #626369;"&gt;&lt;span style="font-family: inherit;"&gt;Waterproof, Fireproof, Small, Tough, and Bright. A Mini Multi-Use LED Light for EDC.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #fbfbfa; color: #626369;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="template asset" data-id="15051765" style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;figure style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;/span&gt;&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;img alt="" class="fit" src="https://ksr-ugc.imgix.net/assets/015/509/604/3e4826cef10c9cd31fe186db03cb6aa5_original.jpg?w=680&amp;amp;fit=max&amp;amp;v=1487115249&amp;amp;auto=format&amp;amp;q=92&amp;amp;s=fa335318746f88f7456e9eccc486016b" style="border: 0px; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px auto; max-width: 100%; padding: 0px; vertical-align: baseline;" /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;span style="font-family: inherit; font-size: small;"&gt;&lt;span style="color: #353535; text-align: left;"&gt;Introducing BULLET 02:&amp;nbsp;&lt;/span&gt;&lt;b style="border: 0px; color: #353535; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; text-align: left; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;World's Smallest LED Flashlight, Even Smaller.&lt;/i&gt;&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;br /&gt;&lt;span style="font-family: inherit;"&gt;&lt;/span&gt;&lt;/figure&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: inherit;"&gt;After Introducing Bullet: World's Smallest LED Flashlight&amp;nbsp;Last year&amp;nbsp;They&amp;nbsp;are back again, now with an even more minimal design, inspired by the iconic 40 S&amp;amp;W Luger round.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="template asset" data-id="15509604" style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class="template asset" data-id="14984931" style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;figure style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;&lt;a href="https://ksr-ugc.imgix.net/assets/015/127/426/5644fc162a264fc6c6e25ebf7b52ec99_original.gif?w=680&amp;amp;fit=max&amp;amp;v=1484096542&amp;amp;auto=format&amp;amp;gif-q=50&amp;amp;q=92&amp;amp;s=a01976b97ccf61e780559af5e15f72a9" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="" border="0" class="fit js-lazy-image" data-src="https://ksr-ugc.imgix.net/assets/015/127/426/5644fc162a264fc6c6e25ebf7b52ec99_original.gif?w=680&amp;amp;fit=max&amp;amp;v=1484096542&amp;amp;auto=format&amp;amp;gif-q=50&amp;amp;q=92&amp;amp;s=a01976b97ccf61e780559af5e15f72a9" height="180" src="https://ksr-ugc.imgix.net/assets/015/127/426/5644fc162a264fc6c6e25ebf7b52ec99_original.gif?w=680&amp;amp;fit=max&amp;amp;v=1484096542&amp;amp;auto=format&amp;amp;gif-q=50&amp;amp;q=92&amp;amp;s=a01976b97ccf61e780559af5e15f72a9" style="border: 0px; display: block; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin-top: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" width="320" /&gt;&lt;/a&gt;&lt;span style="font-family: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/figure&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: inherit;"&gt;they wanted to create something better and solve all the issues that the first Bullet faced. So they went back to the drawing board and started a complete redesign.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit;"&gt;The uber minimal design makes it even smaller than it's counterpart. BULLET 02 can be attached&amp;nbsp;to virtually&amp;nbsp;&lt;/span&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;anything&lt;/b&gt;&lt;/i&gt;&lt;span style="font-family: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit;"&gt;. Your gym bag, your jacket, your keys. Suitable for any indoor or outdoor situation.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="template asset" data-id="15127426" style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;figure style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;&lt;/figure&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: inherit;"&gt;BULLET 02 will feature a&amp;nbsp;quick 180-degree rotation that is spring-locked for secure on/off operation. The Bullet 02 will not unlatch even under the most&amp;nbsp;&lt;b style="border: 0px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;vigorous conditions&lt;/i&gt;&lt;/b&gt;.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: inherit;"&gt;Designed with aerospace-grade aluminum and a sleek anodized treatment, BULLET 02 is built for any situation possible.&amp;nbsp;Designed with aerospace-grade aluminum and a sleek anodized treatment, BULLET 02 is built for any situation possible.&amp;nbsp;an even smaller design added a spring lock mechanism to increase the pressure inside of the casing. they also added a longer stem with fine threading to avoid BULLET 02 from unlatching. &amp;nbsp;with premium aircraft grade aluminum alloy for a refined finish.&amp;nbsp;Measuring in at an incredible&amp;nbsp;&lt;b style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;10mm x 26mm&lt;/b&gt;&amp;nbsp;and weighing only&lt;b style="border: 0px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;5 grams&lt;/b&gt;, BULLET 02 is the perfect sized flashlight for modern day wear. Powered by three LR41 Button Cell batteries to produce 20 lumens of light, keep it with you at all times, anywhere you go.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://ksr-ugc.imgix.net/assets/015/563/625/9969fadd9dd5e85b68f3fe6412f6c8c8_original.gif?w=680&amp;amp;fit=max&amp;amp;v=1487525910&amp;amp;auto=format&amp;amp;gif-q=50&amp;amp;q=92&amp;amp;s=1575454c15a5271969fe2e8956ab7d1b" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="180" src="https://ksr-ugc.imgix.net/assets/015/563/625/9969fadd9dd5e85b68f3fe6412f6c8c8_original.gif?w=680&amp;amp;fit=max&amp;amp;v=1487525910&amp;amp;auto=format&amp;amp;gif-q=50&amp;amp;q=92&amp;amp;s=1575454c15a5271969fe2e8956ab7d1b" style="background-color: transparent;" width="320" /&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Waterproof&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;More minimal&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;More secure&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Smaller&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Brighter&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px;"&gt;&amp;nbsp;And most important of all,&amp;nbsp;&lt;/span&gt;&lt;b style="border: 0px; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;i style="border: 0px; font-family: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;indestructible&lt;/i&gt;&lt;/b&gt;&lt;span style="font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px;"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border: 0px; color: #353535; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin-bottom: 20px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Liberation Sans&amp;quot;, FreeSans, sans-serif; font-size: 16px;"&gt;What is an LED you ask? LED’s are the most efficient kind of light bulbs out on the market today. One small bulb can last you anywhere from 20,000 to 100,000 hours. Of course you'll still have to replace the batteries periodically. However, we decided to use a premium bulb for BULLET 02 that can last up to 150,000 hours in lifespan.&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
view the project on : &lt;a href="https://www.kickstarter.com/projects/bullet/bullet-02-worlds-smallest-flashlight-even-smaller?ref=category_popular"&gt;kickstarter&amp;nbsp;&lt;/a&gt;&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>My BTC life || Easiest way to earn Bitcoins ???</title><link>https://psychocyborg.blogspot.com/2017/02/my-btc-life-easiest-way-to-earn-bitcoins.html</link><category>Bitcoin</category><category>Cryptocurrency</category><category>Websites</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sun, 19 Feb 2017 04:54:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-1294760886674554649</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="tr_bq"&gt;
Hello Guys,&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;so my last few posts were about bitcoin and bitcoin wallets and as I promised in first I will guide you about earning online and earning bitcoins at ease so here it is I found something&amp;nbsp;last Friday&amp;nbsp;about this and this thing is called a matrix program there are many of them some are good and some are bad and here bad means "really bad" they are fishing websites to scam you but don't worry I am &amp;nbsp;right here just stay tuned and enjoy your happy earning.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
WHAT IS &amp;nbsp;MYBTCLIFE:&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://www.mybtclife.com/gurudesigns/images/logo.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="logo" border="0" height="93" src="https://www.mybtclife.com/gurudesigns/images/logo.png" width="400" /&gt;&lt;/a&gt;as described on my BTC life&lt;br /&gt;
&lt;blockquote style="font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="color: #666666;"&gt;&lt;span style="font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Mybtclife is an online donation platform available worldwide. Through our peer-to-peer direct upgrade donation system, our members can earn 100% commissions on their referrals upgrade donations. The donations are paid (voluntarily) by our members to members in their upline and at no time does our system hold any funds or fees for the services we provide. All donations are exclusively peer to peer and in Bitcoin and each donation is backed by its unique hash ID from the official database of Blockchain [the official Bitcoin operator].&lt;/span&gt;&lt;span style="font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;The donation plan works on a 3x4 forced matrix structure with 90-180 days level renewal subscription. Each member has a downline and upline. When members make a donation the donation is being paid directly into their upline's Bitcoin eWallet [100% commission].&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;The first 3 people you refer to the program are your frontline [first-tier downline]. Their donations are being paid directly to your Bitcoin eWallet in the form of 100% commission every 90 days. Then you are free to upgrade to next donation level at any time, you do not have to wait until you collect all donations from your downline. When a person upgrades to a higher donation level, their donation is paid to the upline member who is at that level. If an upline member has not upgraded to that level, the donation will be directed to another upline member who is at that level already. This can cause a misbalance in your upline's matrix and they might miss some payments. This is why it is important to keep track on your upgrades and your downline's progress and make sure you are ahead of them if necessary.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;strong style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Example of passing donations:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Let say you are at level 2 of your upline and you should donate him level 2 donation but you did not upgrade to that level yet or did not renew your subscription but your level 2 will make the level 2 donation to you, for the reason you are not eligible to receive the donation, then the donation from your level 2 will be passed up to your upline level 2 because he is still waiting for level 2 donation and so it goes with every level pass up.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;strong style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;3x4 0.03 Bitcoin matrix donation structure:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;You donate 0.03 BTC to your upline 1 every 90 days and you are now ready to receive your level 1 donations.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 1 - 3 people donate to you 0.03 BTC each and you receive 0.09 Bitcoin. Then you donate 0.025 Bitcoin for level 2 upgrade every 100 days to your level 2 upline so your profit for level 1 is 0.06 BTC every 90 days.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 2 - 9 people donate to you 0.025 BTC each and you receive 0.225 BTC. Then you donate 0.02 BTC for level 3 upgrade every 120 days to your level 3 upline so your profit for level 2 is 0.205 BTC every 100 days.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 3 - 27 people donate to you 0.02 BTC each and you receive 0.54 BTC. Then you donate 0.12 BTC for level 4 upgrade every 180 days to your level 4 upline so your profit for level 3 is 0.42 BTC every 120 days.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 4 - 81 people donate to you 0.12 Bitcoin each and you receive 9.72 BTC. Your profit for level 4 is 9.72 BTC every 180 days.&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;strong style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Total profit: 10.405 BTC&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;strong style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Renewal period for each level donations:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 1 - every 90 days + 1000 Text &amp;amp; Banners Ad Credits&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 2 - every 100 days&amp;nbsp;+ 2000 Text &amp;amp; Banners Ad Credits&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 3 - every 120 days&amp;nbsp;+ 3000 Text &amp;amp; Banners Ad Credits&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;Level 4 - every 180 days&amp;nbsp;+ 4000 Text &amp;amp; Banners Ad Credits&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;helvetica neue&amp;quot;, helvetica, arial, sans-serif; margin: 10px 50px;"&gt;
&lt;div style="font-size: 14px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: x-large;"&gt;link: &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;&lt;a href="https://goo.gl/1xLzDu"&gt;mybtclife.com...&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; color: #333333; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; margin: 10px 50px;"&gt;
&lt;span style="box-sizing: border-box; color: #3b3a3a; font-family: &amp;quot;helvetica&amp;quot;; font-size: 14pt;"&gt;&lt;img alt="makemoneyonline" height="224" src="https://www.mybtclife.com/images/howitworks.png" style="border: 0px; box-sizing: border-box; display: block; margin-left: auto; margin-right: auto; vertical-align: middle;" width="640" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bitcoin wallet::How to start and which one is the Best  </title><link>https://psychocyborg.blogspot.com/2017/02/bitcoin-wallethow-to-start-and-which.html</link><category>Bitcoin</category><category>Cryptocurrency</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 18 Feb 2017 04:32:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-6568692250008932599</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="entry" style="background-color: white; border: 0px; box-sizing: inherit; color: #222222; font-family: Montserrat, Helvetica, Arial, sans-serif; font-size: 18px; font-stretch: inherit; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Without a Bitcoin wallet, you can’t send or receive Bitcoin payments. So before you get bitcoins, you’ll need to buy, download, or create a bitcoin wallet.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Are you a&amp;nbsp;&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;new Bitcoin user&lt;/b&gt;? We highly recommend the free&amp;nbsp;&lt;a href="https://itunes.apple.com/il/app/breadwallet-bitcoin-wallet/id885251393?mt=8" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Breadwallet&lt;/a&gt;.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Have you been using Bitcoin for a while and want to upgrade your security practices? Then keep reading!&lt;/div&gt;
&lt;center style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="394" src="https://www.youtube.com/embed/oTfOfqmb5tU" style="border-style: initial; border-width: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" width="700"&gt;&lt;/iframe&gt;&lt;/center&gt;
&lt;h2 id="types" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Types of Wallets&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
There are many different ways to use Bitcoin and so there are many different types of wallets:&lt;/div&gt;
&lt;ul style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 15px 0px; padding: 0px 0px 0px 30px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Online bitcoin wallets. Wallets that can be accessed on the web from any internet connected device.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Bitcoin hardware wallets. Physical devices designed to secure bitcoins.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Software wallets. Wallet applications downloaded to your phone, computer or tablet.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Paper wallets.&amp;nbsp;&lt;a href="https://en.bitcoin.it/wiki/Private_key" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Bitcoin private keys&lt;/a&gt;&amp;nbsp;printed from an offline computer.&lt;/li&gt;
&lt;/ul&gt;
&lt;img alt="bitcoin" class="bitcoin-icon pull-left" src="https://www.weusecoins.com/images/bitcoinicons/wallet.png" style="border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: 0px 20px 0px 0px; max-width: 220px; padding: 0px; vertical-align: baseline;" /&gt;&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
By the end of this article you’ll understand Bitcoin wallets and have a better idea about which type is right for you. Here are some factors to consider:&lt;/div&gt;
&lt;ul style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style-image: initial; list-style-position: initial; margin: 15px 0px; padding: 0px 0px 0px 30px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;On the go?&lt;/b&gt;&amp;nbsp;If you are making payments in person and not online then a mobile wallet like Copay (iOS &amp;amp; Android), breadwallet (iOS) or Mycelium (Android) is a must.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Frequency of payments.&lt;/b&gt;&amp;nbsp;If you will need to make frequent payments then it will be best to keep your funds in wallet that is easy to use and accessible. Mobile wallets and desktop wallets are good options.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Amount.&lt;/b&gt;&amp;nbsp;If you are dealing with large amounts of bitcoins you will need a secure wallet. Hardware wallets and secure offline wallets like Armory are good options.&lt;/li&gt;
&lt;li style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Use combinations.&lt;/b&gt;&amp;nbsp;Use a mobile wallet as your checking account, and a hardware or secure offline wallet as your savings account. Mix and match to find a combination that provides both security and accessibility.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id="uni" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Universal Wallets&lt;/h2&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/copay.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Copay&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://copay.io/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Copay is a Bitcoin wallet by Bitpay and available on iOS, Android, Windows Phone, Linux, Max OS X, and Windows. Because Copay is available on multiple platforms, it’s easy to use the same wallet or accounts across multiple devices.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Copay’s simple, clean user interface makes it a good choice for new Bitcoin users. Copay is also a good option for businesses due to a shared account feature, which requires a certain number of users to sign each transaction. Two co-founders, for example, could create a 2 of 2 wallet where both will be required to sign each transaction.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2 id="hardware" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Hardware Wallets&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Hardware wallets are small computers or smartcards built with the sole purpose of generating Bitcoin&amp;nbsp;&lt;a href="https://www.weusecoins.com/amazing-math-bitcoin-private-keys/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;private keys&lt;/a&gt;&amp;nbsp;offline. Hardware wallets securely sign transactions in the same offline environment.&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/ledger.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Ledger Nano&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link-more" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.weusecoins.com/bitcoin-ledger-wallet-review/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px 10px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;LEARN MORE&lt;/a&gt;&lt;/span&gt;&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://geni.us/ledger" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;BUY&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The&amp;nbsp;&lt;a href="https://www.weusecoins.com/bitcoin-ledger-wallet-review/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Ledger Nano&lt;/a&gt;&amp;nbsp;is a smartcard based hardware wallet. Private keys are generated and signed offline in the smartcard’s secure environment. The Nano is setup using the Ledger Chrome Application. A random 24-word seed is generated upon setup and backed offline by writing it down on a piece of paper. In case of theft, damage or loss, the entire wallet can be recreated with the seed. A user selected PIN code is also assigned to the device to protect against physical theft or hacking.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The Ledger Nano may be used on any computer, or Android phones with Mycelium or GreenBits.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/trezor.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;TREZOR&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://geni.us/trezorwalletwhite" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;BUY&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The TREZOR differs from the Ledger Nano in that it’s a very tiny computer rather than a smartcard. Private keys are still generated offline.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
TREZOR also generates a 24-word seed upon setup. The TREZOR has its own built in screen where the seed is displayed and copied down during backup. Since the TREZOR is an offline device it offers extra security since the seed isn’t displayed on an online computer.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
An additional passphrase can be added to the 24-word seed. This provides extra protection, since anyone who finds someone else’s 24-word seed is free to access the funds. If the optional passphrase is added, an attacker still wouldn’t be able to access funds without both the seed AND the passphrase. If the passphrase is forgotten, it cannot be recovered.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/opendime.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;OPENDIME&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://opendime.com/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;BUY&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The first Bitcoin Bearer Bond or called a Bitcoin Stick. Opendime is a small USB stick that allows you to spend Bitcoin like a dollar bill. Pass it along multiple times. Connect to any USB to check balance. Unseal anytime to spend online. Trust no one.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Acts like a read-only USB flash drive. Works with any computer, laptop, and phone.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
A QR Picture and Text file inside contain Bitcoin address and support.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The private key is generated inside the device, and is never known to any human, not even you!&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The Bitcoin world changes fast but Opendime is built on the fundamental Bitcoin features that have not changed in five years.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Give an Opendime to anyone and they don't need to worry that you can take back the funds later.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
You have got the private keys in the device. This is physical Bitcoin as it was meant to be to just hand it to someone and they have got it.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Pass it on multiple times! Simple as a handshake. No miner fees, no confirmation delays.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Uses Bitcoin message signing, normal (non HD) bitcoin payment addresses and private keys in WIF format.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/ledger.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Ledger HW.1&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://geni.us/ledger" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;BUY&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The Ledger HW.1 is a more affordable version of the Ledger Nano.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/ledger.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Ledger Unplugged&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://geni.us/ledger" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;BUY&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The Ledger Unplugged is a credit card-size wireless hardware wallet. Private keys are generated offline. Transactions are signed on the device and sent to a mobile phone via NFC.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The Ledger Unplugged is ideal for everyday use, since the device fits perfectly into wallets and no OTG cable is required.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;img alt="bitcoin" src="https://www.weusecoins.com/images/ledger/desktop.png" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" /&gt;&lt;div class="caption" style="border: 0px; box-sizing: inherit; color: #969696; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
Software wallets make it easy to securely spend and receive bitcoins to a hardware wallet. The image above shows how Ledger's desktop wallet provides the interface to receive payments to a Ledger Nano or HW.1.&lt;/div&gt;
&lt;img alt="bitcoin" src="https://www.weusecoins.com/images/opendime-ui.png" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" /&gt;&lt;div class="caption" style="border: 0px; box-sizing: inherit; color: #969696; font-family: inherit; font-size: 16px; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 20px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
USB stick style software can makes it easy to load Bitcoin into hardware wallets without having to install any software or apps.&lt;/div&gt;
&lt;h2 id="online" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Online Bitcoin Wallets&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Online Bitcoin wallets, or web wallets, store your private keys online. Wallets can only be accessed with a user-set password.&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/greenaddress.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;GreenAddress&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://greenaddress.it/en/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;CREATE&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
GreenAddress is a multisig web wallet, with apps available for Chrome, iOS, and Android.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/spectrocoin.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;SpectroCoin&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://geni.us/spectrocoin" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;CREATE&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
SpectroCoin is an all-in-one solution for Bitcoin. Services offered include a wide range of Bitcoin solutions, from exchange to Bitcoin e-wallet.&lt;/div&gt;
&lt;/div&gt;
&lt;h2 id="mobile-android" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Mobile Wallets for Android&lt;/h2&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/mycelium.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Mycelium (Android)&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=com.mycelium.wallet" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://www.weusecoins.com/how-to-use-mycelium-bitcoin-wallet/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Mycelium&lt;/a&gt;&amp;nbsp;is a favorite among experienced Bitcoin users. It’s an HD wallet with many advanced features, like support for hardware wallets TREZOR and Ledger, watch-only accounts, cold storage spending, and Tor.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/bitcoinwallet.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Bitcoin Wallet&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=de.schildbach.wallet&amp;amp;hl=en" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin Wallet was the first Bitcoin wallet for Android. It’s simple, easy to backup, and connects directly to the Bitcoin network with SPV.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/airbitz2.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Airbitz&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link-more" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.weusecoins.com/airbitz/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px 10px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;LEARN MORE&lt;/a&gt;&lt;/span&gt;&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://airbitz.co/af/9TZ" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://www.weusecoins.com/airbitz/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;AirBitz&lt;/a&gt;&amp;nbsp;is another Bitcoin wallet that’s great for everyday use. It’s integrated with Fold, meaning you can get 20% discounts at Starbucks from within the wallet.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Airbitz manages accounts with usernames and passwords, but doesn’t have access to your funds. This type of account creation is easier for less technical users who may have trouble backing up or understanding HD seeds.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/greenbits.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;GreenBits&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://play.google.com/store/apps/details?id=com.greenaddress.greenbits_android_wallet&amp;amp;hl=en" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
GreenBits is the native version of GreenAddress. It’s fast, simple, and supports hardware wallets TREZOR and Ledger Nano/HW.1.&lt;/div&gt;
&lt;/div&gt;
&lt;h2 id="mobile-ios" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Mobile Wallets for iOS&lt;/h2&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/breadwallet2.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;breadwallet&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link-more" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.weusecoins.com/breadwallet/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px 10px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;LEARN MORE&lt;/a&gt;&lt;/span&gt;&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://itunes.apple.com/il/app/breadwallet-bitcoin-wallet/id885251393?mt=8" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Breadwallet’s combination of simplicity and security has made it the most popular iOS wallet. iPhone users in search of their first Bitcoin wallet should find&amp;nbsp;&lt;a href="https://www.weusecoins.com/breadwallet/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Breadwallet&lt;/a&gt;&amp;nbsp;easy to understand.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/copay.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Copay&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://itunes.apple.com/us/app/copay/id951330296" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Copay is available in the App Store. Click here for more details.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/airbitz2.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Airbitz&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link-more" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.weusecoins.com/airbitz/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px 10px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;LEARN MORE&lt;/a&gt;&lt;/span&gt;&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://itunes.apple.com/us/app/bitcoin-wallet-airbitz/id843536046?mt=8" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
AirBitz is also available in the App Store.&lt;/div&gt;
&lt;/div&gt;
&lt;h2 id="desktop" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Desktop Wallets&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Desktop wallets are software wallets that are downloaded and installed on your computer. The desktop wallets below are available on Mac OS X, Windows, and Linux.&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/armory2.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Armory&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link-more" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://www.weusecoins.com/armory/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px 10px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;LEARN MORE&lt;/a&gt;&lt;/span&gt;&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://bitcoinarmory.com/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://www.weusecoins.com/armory/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Armory&lt;/a&gt;&amp;nbsp;is the most mature, secure and full featured Bitcoin wallet but it can be technologically intimidating for users. Whether you are an individual storing $1,000 or institution storing $1,000,000,000 this is the most secure option available. Users are in complete control all Bitcoin private keys and can setup a secure offline-signing process in Armory.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/core.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Bitcoin Core&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://bitcoin.org/en/download" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin Core is the “official” Bitcoin client and wallet, though isn’t used by many due to slow speeds and a lack of features. Bitcoin Core, however,&amp;nbsp;&lt;a href="https://bitcoin.org/en/full-node" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;is a full node&lt;/a&gt;, meaning it helps verify and transmit other Bitcoin transactions across the network and stores a copy of the entire blockchain. This offers better privacy since Core doesn’t have to rely on data from external servers or other peers on the network. Bitcoin Core routed through Tor is considered one of the best ways to use Bitcoin privately.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/electrum.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;Electrum&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://electrum.org/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Electrum may be the most popular desktop wallet, due to its speed and ease of use. Electrum can also be used as cold storage if you have an extra computer that can be used offline. Additonaly, Electrum offers other features like connecting through Tor, multisiganture wallets, integration with hardware wallets, and more.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="wallet-list" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 10px 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="wallet" class="wallet-logo" src="https://www.weusecoins.com/images/multibit.png" style="border-radius: 3px; border: 0px; box-sizing: inherit; float: left; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; height: auto; line-height: inherit; margin: -2px 12px 0px 0px; max-width: 100%; padding: 0px; vertical-align: baseline; width: 40px;" /&gt;MultiBit HD&lt;div class="wallet-buttons" style="border: 0px; box-sizing: inherit; display: inline; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span class="wallet-link" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://multibit.org/" style="background: none 0px 0px repeat scroll rgb(226, 185, 37); border-radius: 3px; border: 1px solid rgb(206, 161, 0); box-shadow: rgba(255, 255, 255, 0.14902) 0px -1px 0px inset; box-sizing: inherit; color: white; cursor: pointer; float: right; font-family: inherit; font-size: 11px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 5px 0px 0px; padding: 4px 12px; text-decoration: none; text-transform: uppercase; vertical-align: baseline;"&gt;DOWNLOAD&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Multibit HD is a fast and straightforward desktop wallet with support for hardware wallets TREZOR and KeepKey.&lt;/div&gt;
&lt;/div&gt;
&lt;h2 id="paper" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Paper Wallets&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Paper wallets were the standard method of&amp;nbsp;&lt;a href="https://www.weusecoins.com/bitcoin-cold-storage-guide/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;cold storage&lt;/a&gt;&amp;nbsp;before hardware wallets were built. Paper wallets are private keys printed out on a piece of paper. If generated and printed with a secure, offline computer, paper wallets are secure cold storage.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
The main problem with paper wallets is it can be inconvenient to create and print a new wallet each time you send funds to cold storage. However, it’s possible to bulk print paper wallets to save time and eliminate address reuse. Our cold storage guide explains step-by-step&amp;nbsp;&lt;a href="https://www.weusecoins.com/bitcoin-cold-storage-guide/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;how to create a secure paper wallet&lt;/a&gt;.&lt;/div&gt;
&lt;h2 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Best Practices&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Bitcoin lets you control your money, meaning you are responsible for both your money’s security and your financial privacy. Here are some steps you can take to ensure your privacy and security:&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Control your private keys&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Services like Coinbase and Circle offer “Bitcoin wallets”, but in reality control your private keys. It’s best to use a wallet where you control your private keys. This is the only way to have full control of your funds and not have to rely on third parties for security.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Protect your privacy&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Each time you request blockchain data from a wallet, the server may be able to view your IP address and connect this to the address data requested. Each wallet handles data requests differently. If privacy is important to you, use a wallet that downloads the whole blockchain like Bitcoin Core or Armory. Tor can be used with other wallets to shield your IP address, but this doesn’t prevent a server from tying a group of addresses to one identity. For more information, check out the&amp;nbsp;&lt;a href="http://www.openbitcoinprivacyproject.org/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Open Bitcoin Privacy Project&lt;/a&gt;&amp;nbsp;for wallet rankings based on privacy.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Don’t reuse addresses&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Most Bitcoin wallets today automatically create a new address for each transaction. Since all Bitcoin transactions are public, address reuse makes it easy for others to group transactions and understand which payments are connected to one identity.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Use different wallets for different sums of money&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Just like you don’t walk around with your savings account as cash, there are different Bitcoin wallets that should be used depending on how much money is being stored or transferred. Secure wallets like paper wallets or hardware wallets can be used as “savings” wallets, while mobile, web, and desktop wallets should be treated like your spending wallet.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Create multiple secure backups&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Users should create multiple backups of their wallets. Backups should be kept in separate physical locations in the case of fire or water damage. Paper wallets can be laminated or written in metal for extra protection.&lt;/div&gt;
&lt;h2 id="how-to" style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 24px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
How to Store Bitcoins&lt;/h2&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Earlier it was mentioned that there are four types of Bitcoin wallets: online wallets, hardware wallets, software wallets, and paper wallets. These four categories can be broken down further into different kinds of storage and security:&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Hot Wallets&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Hot wallets refer to Bitcoin wallets used on internet connected devices like phones, computers, or tablets. Because hot wallets run on internet connected devices there is always a risk of theft. Think of hot wallets like your wallet today. You shouldn’t store any significant amount of bitcoins in a hot wallet, just as you would not walk around with your savings account as cash.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
If only used with small amounts, hot wallets should be used for your everyday Bitcoin needs. One may, for example, want to keep $200 worth of bitcoins in a hot wallet for spending, with $10,000 locked away in cold storage.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Custodial Services&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Although often called Bitcoin wallets,&amp;nbsp;&lt;a href="http://geni.us/coinbase" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;services like Coinbase&lt;/a&gt;&amp;nbsp;and Circle aren’t true Bitcoin wallets. Customers private keys are held by these third party services, meaning users don’t really have control of their money.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
As Bitcoiners often say: “if you don’t control the keys, you don’t control the coins”.&amp;nbsp;&lt;a href="https://en.wikipedia.org/wiki/Mt._Gox" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Mt. Gox&lt;/a&gt;&amp;nbsp;is an extreme example, but one that illustrates the importance of holding private keys. Gox was the first and largest Bitcoin exchange up until 2013. Thousands of users stored more than 800,000 bitcoins in their Gox accounts.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
At the time, one may have claimed to have 1,000 bitcoins in a Gox account. While true at the time, as soon as Mt. Gox claimed to have been victim of theft users with bitcoins in their accounts were left empty handed.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Services like Coinbase and Circle may in fact use good security practices and there’s a chance your bitcoins are safe. But by storing bitcoins with a third party you are always taking on additional risk.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Cold Storage&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Cold storage is achieved when Bitcoin private keys are created and stored offline. Private keys stored offline are more secure since there is no risk that a hacker or malware could steal your coins.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
There are three ways to create cold storage: paper wallets, hardware wallets, and software wallets run on offline computers. Think of cold storage as your savings account. Use it to securely store bitcoins that you don’t plan to spend.&lt;/div&gt;
&lt;h3 style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: 20px; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: 1.7; margin: 1em 0px 15px; padding: 0px; vertical-align: baseline;"&gt;
Multisignature Wallets&lt;/h3&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Multisignature wallets like&amp;nbsp;&lt;a href="https://copay.io/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Copay&lt;/a&gt;&amp;nbsp;make it easier to share control of bitcoins between multiple parties. If created offline, multisig can also make cold storage more secure.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Multisignature wallets require multiple parties to sign transactions in order for funds to be spend. In a 2-2 wallet, for example, both parties must sign a transaction. In a 2-3 multisig wallet, two of the three co-signers must sign each transaction.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Armory Multisig:&lt;/b&gt;&amp;nbsp;Armory offers a&amp;nbsp;&lt;a href="https://bitcoinarmory.com/tutorials/armory-advanced-features/lockbox/" style="border: 0px; box-sizing: inherit; color: #4183c4; cursor: pointer; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Lockbox feature&lt;/a&gt;&amp;nbsp;that requires any amount of up to seven co-signers to approve shared transactions. A Lockbox is created by one party who adds additional public keys as co-signers. This solution provides a mix of flexibility and security for personal use or organizations.&lt;/div&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="416" src="https://www.youtube.com/embed/B5E3WQjSB6w" style="border-style: initial; border-width: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" width="740"&gt;&lt;/iframe&gt;&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Armory’s fragmented backups is another useful feature. Instead of requiring multiple signatures for each transaction, fragmented backups require multiple signatures only for backups. A fragmented backup splits up your Armory backup into multiple pieces, which decreases the risk of physical theft of your wallet. Without a fragmented backup, discovery of your backup would allow for immediate theft. With fragmented backup, multiple backup locations would need to be compromised in order to obtain the full backup.&lt;/div&gt;
&lt;iframe allowfullscreen="" frameborder="0" height="416" src="https://www.youtube.com/embed/nyeMtM-Gclw" style="border-style: initial; border-width: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; max-width: 100%; padding: 0px; vertical-align: baseline;" width="740"&gt;&lt;/iframe&gt;&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
Here's a look at some everyday use cases for multisig:&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;2-2 Wallet:&lt;/b&gt;&amp;nbsp;Two business partners work together at a startup. They create a 2-2 multisig wallet so that no funds can be spent without the permission of both founders. If one tries to create a transaction, the other partner will be required to sign off on the transaction before money can be moved.&lt;/div&gt;
&lt;div style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin-bottom: 15px; margin-top: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;b style="border: 0px; box-sizing: inherit; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;2-3 Wallet:&lt;/b&gt;&amp;nbsp;A 2-3 multisig wallet could be used to create secure offline storage with paper wallets or hardware wallets. Users should already backup their offline Bitcoin holdings in multiple locations, and multisig helps add another level of security. A user, for example, may keep a backup of a paper wallet in three separate physical locations. If any single location is compromised the user’s funds can be stolen. Multisignature wallets improve upon this by requiring instead any two of the three backups to spend funds--in the case of a 2-3 multisig wallet. The same setup can be created with any number of signatures. A 5-9 wallet would require any five of the nine signatures in order to spend funds.&lt;/div&gt;
&lt;/div&gt;
&lt;div class="date" style="background-color: white; border: 0px; box-sizing: inherit; color: #666666; font-family: Montserrat, Helvetica, Arial, sans-serif; font-size: 18px; font-stretch: inherit; font-style: italic; font-variant-numeric: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;
Written by&amp;nbsp;Jordan Tuwiner&amp;nbsp;on &lt;a href="https://www.weusecoins.com/en/find-the-best-bitcoin-wallet/" target="_blank"&gt;weusecoins&lt;/a&gt;.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/oTfOfqmb5tU/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Bankchain || Indian version of blockchain??</title><link>https://psychocyborg.blogspot.com/2017/02/bankchain-indian-version-of-blockchain.html</link><category>Bitcoin</category><category>Cryptocurrency</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Fri, 17 Feb 2017 09:27:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-1266669124235558506</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: inherit;"&gt;So, finally Indian&amp;nbsp;government now supports bitcoin officially according to Economics times&amp;nbsp;,&lt;/span&gt;&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsEBjS4f-TaUGLQXR68ofNcg1_3Caivf5CNrxcvX-r7zb2lYTJpsd_5u6FmQfDrZhGHOtYZiNP_JYJktxO6psyVCcYE6Z-2SCboKYU9hGiwzbRnnL_R4nX7tXkaPjG1lCwA0JsvPiWTSWW/s1600/Untitled.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="240" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsEBjS4f-TaUGLQXR68ofNcg1_3Caivf5CNrxcvX-r7zb2lYTJpsd_5u6FmQfDrZhGHOtYZiNP_JYJktxO6psyVCcYE6Z-2SCboKYU9hGiwzbRnnL_R4nX7tXkaPjG1lCwA0JsvPiWTSWW/s320/Untitled.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="font-family: inherit;"&gt;State Bank of India&lt;span style="background-color: white;"&gt;&amp;nbsp;has taken the lead in bringing lenders and tech companies together for using blockchain technology to share information among banks which will eventually help prevent frauds.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style="font-family: inherit;"&gt;but really??&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit;"&gt;&amp;nbsp;to prevent frauds, &amp;nbsp;we are Indians&amp;nbsp;sir&amp;nbsp;you can't stop us, give us any secure facility and we'll break it :-P&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: inherit;"&gt;just kindly speaking but yes now state &amp;nbsp;bank of India &amp;nbsp;which is also the largest bank in India spearheading&lt;span style="background-color: white; font-size: 17px;"&gt;&amp;nbsp;&lt;/span&gt;a newly unveiled consortium focused on blockchain applications .&lt;/span&gt;&lt;br /&gt;
&lt;div style="border: 0px; color: #353536; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="color: #444444;"&gt;&lt;b&gt;&lt;span style="font-family: inherit;"&gt;Bank-Chain, India’s first Blockchain exploration consortium for banks was announced in Mumbai on 8th February, 2017.&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="font-family: inherit;"&gt;IBM and Microsoft will reportedly be providing technical assistance for&amp;nbsp;the group&amp;nbsp;as it explores ways to leverage blockchain&amp;nbsp;to reduce fraud and improve&amp;nbsp;operational efficiency.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="font-family: inherit;"&gt;IBM has previously announced&amp;nbsp;partnerships&amp;nbsp;with Indian companies focused on blockchain development.&amp;nbsp;&lt;a href="http://www.primechain.in/aboutus.php" style="border: 0px; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition-duration: 0.25s; transition-property: color; transition-timing-function: linear;" target="_blank"&gt;Prime chain Technologies&lt;/a&gt;, a blockchain startup based in Mumbai, is also said to be working on the Bankchain project.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="font-family: inherit;"&gt;Other institutions said to be part of the project or interested in joining include Axis Bank, ICICI Bank, Kotak Mahindra Bank – all institutions&amp;nbsp;that have experimented with the tech in the past, including&amp;nbsp;a recent trial&amp;nbsp;focused on know-your-customer (KYC) applications in which&amp;nbsp;India’s biggest stock exchange was involved.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="font-family: inherit;"&gt;M Mahapatra, a representative for the State Bank, told&amp;nbsp;&lt;em style="border: 0px; margin: 0px; padding: 0px;"&gt;The Economic Times&lt;/em&gt;:&lt;/span&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq" style="border: 0px; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
“Being the largest bank, SBI has taken the lead in initiating blockchain, and we are in talks with banks and other companies for this.”&lt;/blockquote&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgsEBjS4f-TaUGLQXR68ofNcg1_3Caivf5CNrxcvX-r7zb2lYTJpsd_5u6FmQfDrZhGHOtYZiNP_JYJktxO6psyVCcYE6Z-2SCboKYU9hGiwzbRnnL_R4nX7tXkaPjG1lCwA0JsvPiWTSWW/s72-c/Untitled.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What is a BitCoin?</title><link>https://psychocyborg.blogspot.com/2017/02/what-is-bitcoin-how-you-can-earn-bitcoin.html</link><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Thu, 9 Feb 2017 08:07:00 -0800</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-276120502588601323</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="font-size: large;"&gt;S&lt;/span&gt;o there is a boom in the market and the reason behind the boom is BITCOIN, so for some of you, this may &amp;nbsp;sound a strange or new word but believe me this strange word is the &amp;nbsp;future of &amp;nbsp;currencies and many things, so here we begin&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;&lt;b&gt;WHAT IS A BITCOIN:-&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
Bitcoin is a &amp;nbsp;sort of online currency and no country owns it that means it's totally decentralized no single institution controls it so it is very very famous in anarchists. &amp;nbsp;but more likely I would say bitcoin is cryptocurrency in technological manners. &amp;nbsp;(I will write a post about cryptocurrency later )&lt;br /&gt;
&lt;br /&gt;
or in some more satisfactioning words, you can read this from bitcoin.com itself&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq" style="background-color: white; border: 0px; color: #8b8b8b; font-family: MuseoSansRounded-300; font-size: 16px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 25px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
"&lt;span style="background-color: white; color: #8b8b8b; font-size: 16px;"&gt;Bitcoin is different than any currency you’ve used before, so it's very important to understand some key points. Unlike government-issued money, that can be inflated at will, the supply of bitcoin is mathematically limited to twenty-one million bitcoins, and that can never be changed.&lt;/span&gt;Bitcoins are impossible to counterfeit or inflate. You can use them to send or receive any amount of money, with anyone, anywhere in the world, at very low cost. Bitcoin payments are impossible to block, and bitcoin wallets can’t be frozen. Short of turning off the entire world's internet, and keeping it turned off, the Bitcoin network is unstoppable and uncensorable.&lt;br /&gt;
&lt;span style="background-color: white; color: #8b8b8b; font-size: 16px;"&gt;While Bitcoin brings unparalleled freedom, it also requires increased user responsibility, but the rewards are well worth your time. Read on to learn how to save 20% on everything from Amazon thanks to Bitcoin. Or you can direct questions to lots of other Bitcoin users in our&lt;/span&gt;&lt;span style="background-color: white; color: #8b8b8b; font-size: 16px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://forum.bitcoin.com/" style="border: 0px; color: #fab915; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Bitcoin forum.&lt;/a&gt;"&amp;nbsp;&lt;/blockquote&gt;
&lt;br /&gt;
&lt;img src="http://znaptag-uk.s3.amazonaws.com/680719.400.jpg" height="425" width="640" /&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;span style="background-color: #f6d5d9;"&gt; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&amp;nbsp; &lt;br /&gt;
&lt;span style="font-size: x-large;"&gt;SO WHO CREATED THIS:-&lt;/span&gt;&lt;br /&gt;
&lt;table cellpadding="0" cellspacing="0" class="tr-caption-container" style="float: right; margin-left: 1em; text-align: right;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="http://media.coindesk.com/uploads/2013/08/dorian-satoshi-nakamoto.jpg" imageanchor="1" style="clear: right; margin-bottom: 1em; margin-left: auto; margin-right: auto;"&gt;&lt;img alt="Image result for Satoshi Nakamoto" border="0" src="http://media.coindesk.com/uploads/2013/08/dorian-satoshi-nakamoto.jpg" height="225" width="320" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;No one knows who the hell satoshi Nakamoto is&lt;br /&gt;
you can check this link they are more professional on this&lt;br /&gt;
&lt;a href="http://www.coindesk.com/information/who-is-satoshi-nakamoto/" target="_blank"&gt;Click here.......................&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&amp;nbsp;Bitcoin was introduced on 31 October 2008 to a cryptography mailing list &lt;span style="background-color: white; color: #252525;"&gt;and released as&amp;nbsp;&lt;/span&gt;open-source software&lt;span style="background-color: white; color: #252525;"&gt;&amp;nbsp;in 2009.&lt;/span&gt;&lt;span style="background-color: white; color: #252525;"&gt;There have been various claims but rumors say it's Satoshi Nakamoto a Japanese&amp;nbsp;programmer.(they never leave a chance to amaze the world with their&amp;nbsp;skills).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525;"&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;but I can't find if this man is real or not&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="border: 0px; color: #353536; line-height: 23px; margin-bottom: 15px; padding: 0px;"&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;Nakamoto worked with people on the open-source team but took care never to reveal anything personal about himself.&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: 14px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;span style="color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style="color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: x-large;"&gt; WHAT YOU CAN DO WITH IT:&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;-&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;since it has the capability to amaze everyone by its raising&amp;nbsp;price many international companies&amp;nbsp;like ford and Microsoft&amp;nbsp;started accepting bitcoins as payments. via bitcoins, you can buy physical goods, gift cards, even traveling packages also.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;check this list:-&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;h2 style="background-color: white; border: 0px; color: #19232d; font-family: &amp;quot;Open Sans&amp;quot;, Arial, sans-serif; font-size: 21px; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/h2&gt;
&lt;h2 style="background-color: white; border: 0px; color: #19232d; font-family: &amp;quot;Open Sans&amp;quot;, Arial, sans-serif; font-size: 21px; line-height: 1.5; margin: 0px 0px 24px; padding: 0px; vertical-align: baseline;"&gt;
List of Companies Who Accepts Bitcoins as Payment!&lt;/h2&gt;
&lt;div style="background-color: white; border: 0px; font-family: &amp;quot;Open Sans&amp;quot;, Arial, sans-serif; font-size: 13px; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
Many companies are accepting bitcoins, many are not. Here is a list of the biggest (and smaller) names&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;who accepts bitcoins&lt;/strong&gt;&amp;nbsp;as a currency.&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; font-family: &amp;quot;Open Sans&amp;quot;, Arial, sans-serif; font-size: 13px; list-style: square; margin: 0px 0px 1.857em 42px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;WordPress.com&lt;/strong&gt;&amp;nbsp;– An online company that allows user to create free blogs&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://overstock.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Overstock.com&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;– A company that sells big ticket items at lower prices due to overstocking&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Subway&lt;/strong&gt;&amp;nbsp;– Eat fresh&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Microsoft&lt;/strong&gt;&amp;nbsp;– Users can buy content with Bitcoin on Xbox and Windows store&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Reddit&lt;/strong&gt;&amp;nbsp;– You can buy premium features there with bitcoins&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Virgin Galactic&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Richard Branson company that includes Virgin Mobile and Virgin Airline&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;OkCupid&lt;/strong&gt;&amp;nbsp;– Online dating site&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Tigerdirect&lt;/strong&gt;&amp;nbsp;– Major electronic online retailer&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Namecheap&lt;/strong&gt;&amp;nbsp;– Domain name registrar&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;CheapAir.com&lt;/strong&gt;&amp;nbsp;– Travel booking site for airline tickets, car rentals, hotels&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Expedia.com&lt;/strong&gt;&amp;nbsp;– Online travel booking agency&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Gyft&lt;/strong&gt;&amp;nbsp;– Buy gift cards using Bitcoin&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Newegg.com&lt;/strong&gt;&amp;nbsp;– Online&amp;nbsp;electronics retailer now uses bitpay to accept bitcoin as payment&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;1-800-FLOWERS.COM&lt;/strong&gt;&amp;nbsp;– United States-based online floral and gift retailer and distributor&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Dell&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;American privately owned multinational computer technology company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="https://www.wikipedia.org/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank" title="More articles about Wikipedia."&gt;Wikipedia&lt;/a&gt;&amp;nbsp;&lt;/strong&gt;– &amp;nbsp;The Free Encyclopedia with 4 570 000+ article&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Steam&lt;/strong&gt;&amp;nbsp;– Desktop gaming platform&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;The Internet Archive&lt;/strong&gt;&amp;nbsp;– web documentation company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Bitcoin.Travel&lt;/strong&gt;&amp;nbsp;– a travel site that provides&amp;nbsp;accommodation, apartments, attractions, bars, and beauty salons around the world&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Pembury Tavern&lt;/strong&gt;&amp;nbsp;– A pub in London, England&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Old Fitzroy&lt;/strong&gt;&amp;nbsp;– A pub in&amp;nbsp;Sydney, Australia&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;The Pink Cow&lt;/strong&gt;&amp;nbsp;– A diner in&amp;nbsp;Tokyo, Japan&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;The Pirate Bay&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;BitTorrent directories&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Zynga&lt;/strong&gt;&amp;nbsp;– Mobile gaming&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Tesla&lt;/strong&gt;&amp;nbsp;– The car company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;4Chan.org&lt;/strong&gt;&amp;nbsp;– For premium services&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;EZTV&lt;/strong&gt;&amp;nbsp;– Torrents TV shows provider&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Mega.co.nz&lt;/strong&gt;&amp;nbsp;– The new venture started by the former owner of&amp;nbsp;MegaUpload Kim Dotcom&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Lumfile&lt;/strong&gt;&amp;nbsp;– Free cloud base file server – pay for premium services&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Etsy Vendors&lt;/strong&gt;&amp;nbsp;– 93 of them&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;PizzaForCoins.com&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Domino’s Pizza signed up – pay for their pizza with bitcons&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Whole Foods&lt;/strong&gt;&amp;nbsp;– Organic food store (by purchasing gift card from&amp;nbsp;Gyft)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Bitcoincoffee.com&lt;/strong&gt;&amp;nbsp;– Buy your favorite coffee online&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Grass Hill Alpacas&lt;/strong&gt;&amp;nbsp;– A local farm in&amp;nbsp;Haydenville, MA&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Jeffersons Store&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;A street wear clothing store in Bergenfield, N.J&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Helen’s Pizza&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Jersey City, N.J., you can get a slice &amp;nbsp;of pizza for 0.00339 bitcoin by pointing your phone at a sign next to the cash register&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;A Class Limousine&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Pick you up and drop you off at Newark (N.J.) Airport&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Seoclerks.com&lt;/strong&gt;&amp;nbsp;– Get SEO work done on your site cheap&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Mint.com&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Mint pulls all your financial accounts into one place. Set a budget, track your goals and do more&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Fancy.com&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Discover amazing stuff, collect the things you love, buy it all in one place (&lt;em style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Source:&amp;nbsp;&lt;a class="external" href="http://fancy.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;Fancy&lt;/a&gt;&lt;/em&gt;)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Bloomberg.com&lt;/strong&gt;&amp;nbsp;– Online newspaper&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Humblebundle.com&lt;/strong&gt;&amp;nbsp;– Indie game site&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;BigFishGames.com&lt;/strong&gt;&amp;nbsp;– Games for PC, Mac, and Smartphones (iPhone, Android, Windows)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Suntimes.com&lt;/strong&gt;&amp;nbsp;– Chicago-based online newspaper&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;San Jose Earthquakes&lt;/strong&gt;&amp;nbsp;– San Jose California Professional Soccer Team (MLS)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Square&lt;/strong&gt;&amp;nbsp;– Payment processor that help small businesses accept credit cards using iPhone, Android or iPad&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Crowdtilt.com&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;The fastest and easiest way to pool funds with family and friends (&lt;em style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Source:&amp;nbsp;&lt;a class="external" href="https://www.crowdtilt.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;crowdtilt&lt;/a&gt;&lt;/em&gt;)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Lumfile&lt;/strong&gt;&amp;nbsp;– Server company that offers free cloud-based servers&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Museum of the Coastal Bend&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;2200 East Red River Street,&amp;nbsp;Victoria,&amp;nbsp;Texas&amp;nbsp;77901,&amp;nbsp;USA&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Home Depot&amp;nbsp;&lt;/strong&gt;– Office supplies store&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Kmart&amp;nbsp;&lt;/strong&gt;– Retail products store&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Sears&amp;nbsp;&lt;/strong&gt;– Clothing and household products, electronic store&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Gap, GameStop and JC Penney&lt;/strong&gt;&amp;nbsp;– have to use&amp;nbsp;eGifter.com&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="https://www.etsy.com/teams/10366/bitcoin/members" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;Etsy Vendors&lt;/a&gt;&amp;nbsp;– Original art and Jewelry creations&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="https://donate.fightforthefuture.org/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;Fight for the Future&lt;/a&gt;&amp;nbsp;– Leading organization finding for Internet freedom&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;i-Pmart (ipmart.com.my)&lt;/strong&gt;&amp;nbsp;– A&amp;nbsp;Malaysian online mobile phone and electronic parts retailer&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://curryupnow.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;curryupnow.com&lt;/a&gt;&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;A total of 12 restaurants on the list of restaurants accept bitcoins in San Francisco Bay Area&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://dealbook.nytimes.com/2014/05/29/dish-network-to-accept-bitcoin/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;Dish Network&lt;/a&gt;&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;An American direct-broadcast satellite service provider&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;The Libertarian Party&lt;/strong&gt;&amp;nbsp;– United States political party&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Yacht-base.com&lt;/strong&gt;&amp;nbsp;– Croatian yacht charter company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Euro Pacific&lt;/strong&gt;&amp;nbsp;– A major precious metal dealer&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;CEX&lt;/strong&gt;&amp;nbsp;– The trade-in chain has a shop in Glasgow, Scotland that accepts bitcoin&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Straub Auto Repairs&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;477 Warburton Ave, Hastings-on-Hudson, NY 10706 –&amp;nbsp;(914) 478-1177&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;PSP Mollie&lt;/strong&gt;&amp;nbsp;– Dutch Payment Service&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Intuit&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;an American software company that develops financial and tax preparation software and related services for small businesses, accountants and individuals.&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://www.shopjoy.com.au/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;ShopJoy&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;– An Australian online retailer that sells&amp;nbsp;novelty and unique gifts&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://www.lv.net/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;Lv.net&lt;/a&gt;&lt;/strong&gt;&amp;nbsp;– Las Vegas high-speed internet services&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="https://www.expressvpn.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;ExpressVPN.com&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;– High speed, ultra secure VPN network&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Grooveshark&lt;/strong&gt;&amp;nbsp;– Online music streaming service based in the United States&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Braintree&lt;/strong&gt;&amp;nbsp;– Well known payments processor&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://store.thecoop.com/coopstore/estore_home.jsp" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;MIT Coop Store&lt;/a&gt;&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Massachusetts Institute of Technology student bookstore&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;SimplePay&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Nigeria’s most popular web and mobile-based wallet service&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="external" href="http://sfu.collegestoreonline.com/" rel="nofollow" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;" target="_blank"&gt;SFU bookstore&lt;/a&gt;&lt;/strong&gt;&amp;nbsp;– Simon Fraser University in Vancouver, Canada&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;State Republican Party&lt;/strong&gt;&amp;nbsp;– First State Republican Party to accept&amp;nbsp;&lt;a href="https://99bitcoins.com/donate-btc" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;bitcoin donations&lt;/a&gt;&amp;nbsp;(http://www.lagop.com/bitcoin-donate)&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;mspinc.com&lt;/strong&gt;&amp;nbsp;– Respiratory medical equipment supplies store&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Shopify.com&lt;/strong&gt;&amp;nbsp;– An online store that allows anyone to sell their products&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Famsa – Mexico’s biggest retailer&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Naughty America&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Adult entertainment provider&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Mexico’s Universidad de las Américas Puebla&lt;/strong&gt;&amp;nbsp;– A major university in Mexico&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;LOT Polish Airlines&lt;/strong&gt;&amp;nbsp;– A worldwide airline based in Poland&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;MovieTickets.com – Online movie ticket exchange/retailer&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Dream Lover – Online relationship service&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Lionsgate Films&lt;/strong&gt;&amp;nbsp;– The production studio behind titles such as The Hunger Games and The Day After Tomorrow&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Rakutan&lt;/strong&gt;&amp;nbsp;– A&amp;nbsp;Japanese e-commerce giant&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Badoo&lt;/strong&gt;&amp;nbsp;– Online dating network&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;RE/MAX London&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;UK-based franchise of the global real estate network&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;T-Mobile Poland&lt;/strong&gt;&amp;nbsp;– T-Mobile’s Poland-based mobile phone top-up company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Stripe&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;San Francisco-based payments company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;WebJet&lt;/strong&gt;&amp;nbsp;– Online travel agency&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Green Man Gaming&lt;/strong&gt;&amp;nbsp;–&amp;nbsp;Popular digital game reseller&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Save the Children&lt;/strong&gt;&amp;nbsp;&amp;nbsp;–&amp;nbsp;Global charity organization&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;NCR Silver&lt;/strong&gt;&amp;nbsp;– Point of sales systems&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;One Shot Hotels&lt;/strong&gt;&amp;nbsp;– Spanish hotel chain&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div class="post-title item fn" style="border: 0px; font-family: inherit; margin-bottom: 1.857em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Coupa Café&amp;nbsp;&lt;/strong&gt;&lt;a href="https://99bitcoins.com/coupa-cafe-sells-coffee-to-the-silicon-valley-pros-in-exchange-for-bitcoins/" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;in Palo Alto&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;PureVPN – VPN provider&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="https://99bitcoins.com/get-your-own-custom-made-action-figure-for-bitcoins/" style="border: 0px; color: #1b51f4; font-family: inherit; margin: 0px; padding: 0px; text-decoration: none; transition: all 0.4s ease-in-out; vertical-align: baseline;"&gt;That’s my face&lt;/a&gt;&amp;nbsp;– create action&amp;nbsp;figures&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Foodler –&amp;nbsp;&lt;/strong&gt;North American restaurant delivery company&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Amagi Metals – Precious metal furnisher&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;a href="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSG0mXkLKqbhlcyyu2EQR4KhSBtEgWU6tn59WV076QXbULE82QF" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Image result for BITCOINS" border="0" height="120" src="https://encrypted-tbn1.gstatic.com/images?q=tbn:ANd9GcSG0mXkLKqbhlcyyu2EQR4KhSBtEgWU6tn59WV076QXbULE82QF" width="320" /&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;open sans&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: 13px;"&gt;they all accepts bitcoins:-D HAPPY TRADING !!!!&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;open sans&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;BUT DO YOU HAVE BITCOINS??:-&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; So here a question arises how I can earn bitcoins and use them if it is digital then how I am supposed to keep it???&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
but don't worry keep reading and you will get your answers :-)&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &lt;span style="color: #444444;"&gt;&amp;nbsp; &lt;span style="font-size: large;"&gt;&lt;b&gt;1. How can I earn &amp;nbsp;BITCOINS ??&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;SO there are few ways to earn Bitcoins legally (i am not gonna tell you about illegal ways:-D)&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #666666;"&gt; &lt;span style="font-size: large;"&gt;1. MINING :-&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #444444; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; yes, you can mine bitcoin as gold but not in mountains. bitcoin mining is a &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; procedure of solving large mathematical calculations. and as other minirals, it has a certain amount that anyone can mine.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #666666; font-size: large;"&gt;2.BUY/TRADE:-&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; If you can't mine it buy it there are many companies and wallets offering to convert your paper currency to bitcoin. but beware of scammers there are many&amp;nbsp;, Here I am giving you some links of bitcoin wallets where you can buy and keep your bitcoins safely.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #999999; font-size: large;"&gt;&amp;nbsp;1.&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;ubuntu&amp;quot; , sans-serif;"&gt;&lt;span style="color: #999999; font-size: large;"&gt;Coinbase&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #383838; font-family: &amp;quot;ubuntu&amp;quot; , sans-serif; font-size: 20.8px;"&gt; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;Coinbase is a web wallet service that aims to be easy to use. It&amp;nbsp;&lt;/span&gt;also&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt; provides an Android web wallet app, merchant tools &lt;/span&gt;and integration&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt; with &amp;nbsp; US bank accounts to buy and sell bitcoins.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp;&lt;a href="https://www.blogger.com/goog_371226560"&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: 15.2px;"&gt;&lt;a href="https://coinbase.com/"&gt;https://coinbase.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #252525;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: sans-serif;"&gt;&lt;span style="color: #999999; font-size: large;"&gt;2.XAPO &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: #666666;"&gt; Xapo combines the convenience of an everyday &amp;nbsp;Bitcoin wallet with the security of an insured deep cold storage vault. Xapo Debit Card links to &amp;nbsp;your Xapo Wallet and allows you to spend bitcoins at millions of merchants all around the world&lt;/span&gt;&lt;span style="color: #666666;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&lt;a href="https://xapo.com/" target="_blank"&gt;https://xapo.com/&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;3.BitGo &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;BitGo is a high-security multi-sig wallet, which protects your bitcoin from theft and loss. You maintain full custody; BitGo cannot spend or freeze funds. BitGo wallets are easy to use and offer advanced security features such as spending limits and multi-user access.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: 15.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: 15.2px;"&gt;&amp;nbsp;&lt;a href="https://www.bitgo.com/" target="_blank"&gt;https://www.bitgo.com/&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #646464; font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;helvetica neue&amp;quot; , &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;this were some popular bitcoin wallets.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; color: #252525; font-family: sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;but you can earn bitcoin via many online money making websites also i will post a artical about it so keep reading keep visiting :-) &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #252525; font-family: sans-serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="color: #252525; font-family: sans-serif;"&gt;&lt;span style="background-color: white; font-size: 14px;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>I bet these are the most amazing vehicles you had ever seen</title><link>https://psychocyborg.blogspot.com/2016/10/i-bet-these-are-most-amazing-vehicles.html</link><category>Future</category><category>NEW TECH</category><category>TOP 10</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Wed, 5 Oct 2016 08:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-8488465460600279337</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;span style="background-color: #eeeeee; color: #999999;"&gt;Hello friends &amp;nbsp;I am back here with a very different post, I know what are you thinking what I am doing here with a automobile shit but believe me these are very interesting and mindblowing things that we are starting today and in future you will be able to read more such kind of things&lt;/span&gt;&lt;/blockquote&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; so here &amp;nbsp;we start to day with the most awaited thing ever in vehicles&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: large;"&gt;#1 The &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;JETPACK&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: yellow; font-size: large;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;yeah i know what are you thinking i am joking right ?&lt;br /&gt;
&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; but seriously they did it at least technically these jetpacks are made by a &lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;New Zealand company named Martin Aircraft but &amp;nbsp;on the other hand they are not available in market so you can't just go on amazon and order it. for that moment you have wait&amp;nbsp;until&amp;nbsp;2017 according to company's&amp;nbsp;announcement&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7DZob92R_XG3Rc8SDn69Czl_ptbZVLSBezLSGDCBHXQRGnzg-19pFBVTgi9juA7nQXM50tK5YfCwQwev1ffpXcH05nqp2iIyKreFmHcTQGbQWx2QPSRVwiSREKAk-ocS4JOq0UrBjhnk/s1600/MACL_Studio_1006.jpg.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="640" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7DZob92R_XG3Rc8SDn69Czl_ptbZVLSBezLSGDCBHXQRGnzg-19pFBVTgi9juA7nQXM50tK5YfCwQwev1ffpXcH05nqp2iIyKreFmHcTQGbQWx2QPSRVwiSREKAk-ocS4JOq0UrBjhnk/s640/MACL_Studio_1006.jpg.jpg" width="600" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;span style="color: #999999; font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;image:http://www.martinjetpack.com/multimedia/image.html&amp;nbsp;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;I know it doesn't looks like GTA's jetpack but something is better than nothing&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif; font-size: large;"&gt;#2 the&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif; font-size: x-large;"&gt;Onewheel Scooter&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;what the hell is this ???&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Self-balancing scooter from Airwheel weighs only 9.8 kg, has a convenient handle and folding footrest. Scooter takes up no more space than a conventional suitcase, it can reach speeds to 16 km/h and charges in 80 minutes. phew!!!!&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;too much info in para ?? but this is soo cool&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglhK90lUr7zFAoh_KBQW92zjRrzdcHHrNV0xNhawaSFyZrHlfjwutr1JBreNzsiLAw2Ti6uUfe8yTjWN6V3Zh0e7zBV4hI7ynec-8BKt1DP9n_CVh6M7k5XE_hv-DWsiCEcBoXdakvMYL4/s1600/onewheel-head.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="353" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglhK90lUr7zFAoh_KBQW92zjRrzdcHHrNV0xNhawaSFyZrHlfjwutr1JBreNzsiLAw2Ti6uUfe8yTjWN6V3Zh0e7zBV4hI7ynec-8BKt1DP9n_CVh6M7k5XE_hv-DWsiCEcBoXdakvMYL4/s640/onewheel-head.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;not so cool&amp;nbsp;watch&amp;nbsp;the next&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif; font-size: large;"&gt;#3 the&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;FV Almelo&amp;quot;;"&gt;&lt;span style="font-size: x-large;"&gt;Suitcase Scooter&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: FV Almelo;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;well this is&amp;nbsp;weird&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;FV Almelo&amp;quot;;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;In China, a convenient way to transport luggage has appeared. It can bring not only your suitcase, but you as well. Suitcase Scooter can carry up two people, it accelerates to 19 km/h, and it passes through 59 km with a full battery. This scooter luggage weighs only 7 kg.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzNja49IemM212Dd-mnSR_RwABd_6Zw-_8tr2Ck_MyLQcx56vftbUjVPnfOw3DttBwYFsYlRyw2JZlHdHaywo9OtNqHh81kSULHQP6AKEJfESu-nXRxmRN3lcbT5QWSf5O1JqXPSOkIot1/s1600/gty_suitcase_scooter1_wy_140530_4x3_992.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="480" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzNja49IemM212Dd-mnSR_RwABd_6Zw-_8tr2Ck_MyLQcx56vftbUjVPnfOw3DttBwYFsYlRyw2JZlHdHaywo9OtNqHh81kSULHQP6AKEJfESu-nXRxmRN3lcbT5QWSf5O1JqXPSOkIot1/s640/gty_suitcase_scooter1_wy_140530_4x3_992.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;still not getting it see this one&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: large;"&gt;#4 the&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;FV Almelo&amp;quot;;"&gt;&lt;span style="font-size: x-large;"&gt;Air Bike Aero-X&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;FV Almelo&amp;quot;;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;technically its just a hover bike :-P&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;FV Almelo&amp;quot;;"&gt;but advanced&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;Bike Aero-X is cooler than quad and suv scooter - with it it's doesn't matter what is under your feet - the road beneath you, or impassable quagmire. Bike has a rotary engine with two screws and it's responds to movement of the body as an ordinary motorcycle, and flies at a speed of 70 km/h. Aero-X carries the dream of flying, and flying without licenses. It costs $85,000.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguKDoi7xUauKoDCjerxHVj6pWAcde7a6j-MC_VMfkzmjPdNZD6us-B-vwo4_TkRNxmJhBUfS5aTTvPS_M-lfn2GFq2wIkvS8ZAbDXpCRmqqDJvbZX6-Qvm5rAiLtOlngOAP1Sm6-dD0RfQ/s1600/maxresdefault.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEguKDoi7xUauKoDCjerxHVj6pWAcde7a6j-MC_VMfkzmjPdNZD6us-B-vwo4_TkRNxmJhBUfS5aTTvPS_M-lfn2GFq2wIkvS8ZAbDXpCRmqqDJvbZX6-Qvm5rAiLtOlngOAP1Sm6-dD0RfQ/s640/maxresdefault.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-family: Roboto, Helvetica Neue, Helvetica, Arial, sans-serif;"&gt;THe future is right here hovering in the sky&amp;nbsp;traveling&amp;nbsp;on one wheel move one place to another without wheels what else you want a teleportation device ??? :-D&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;forget it atleast for 10 or 15 years or may it will never gonna be real&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Roboto, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 16px;"&gt;so thank you guyz i hope you guuyz like it keep visiting for more awesome discoveries&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-7DZob92R_XG3Rc8SDn69Czl_ptbZVLSBezLSGDCBHXQRGnzg-19pFBVTgi9juA7nQXM50tK5YfCwQwev1ffpXcH05nqp2iIyKreFmHcTQGbQWx2QPSRVwiSREKAk-ocS4JOq0UrBjhnk/s72-c/MACL_Studio_1006.jpg.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Nike’s new shoe magically adapts to your foot.</title><link>https://psychocyborg.blogspot.com/2016/09/nikes-new-shoe-magically-adapts-to-your.html</link><category>Future</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sun, 25 Sep 2016 23:28:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-8607792836394266271</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="font-size: x-large;"&gt;1.&lt;/span&gt;&lt;span style="color: #2e2e2e; font-family: &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, sans-serif; font-size: 2.35294rem;"&gt;The Self-Lacing Shoe&lt;/span&gt;&lt;/h2&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="background-color: white; color: #666666; font-family: helvetica, arial, sans-serif;"&gt;Nike’s new shoe magically adapts to your foot.isn't crazy ?? they made a shoe which can automatically lace the shoe&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span class="master lede" style="border: 0px; box-sizing: border-box; font-family: ff-oxide-solid-web, HelveticaNeue-Bold, &amp;quot;Helvetica Neue Bold&amp;quot;, &amp;quot;Helvetica Neue&amp;quot;, Helvetica, Arial, &amp;quot;Lucida Grande&amp;quot;, sans-serif; font-size: 22px; letter-spacing: 0.08em; line-height: 14px; margin: 0px; outline: 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;"THE SNEAKER SHOULD COME ALIVE.&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;Tinker Hatfield was sitting at a drafting table in his office in Beaverton, Oregon. He and another young designer at Nike named Mark Parker had just returned from a brainstorming session in Hollywood with film director Robert Zemeckis, who was storyboarding the sequel to his sci-fi comedy hit of three years earlier,&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: &amp;quot;Exchange SSm 4i&amp;quot;, &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Back to the Future&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;. It was 1988, and Zemeckis and his creative team were on the hunt for futuristic sight gags for the film, set in 2015. They had tasked Hatfield and Parker with dreaming up some seriously 21st-century sneakers. One idea that came up in the meeting involved magnetic levitation, but to Hatfield that seemed a little too&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="border: 0px; box-sizing: border-box; font-family: &amp;quot;Exchange SSm 4i&amp;quot;, &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Jetsons&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;."&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Exchange SSm 4r, Georgia, serif;"&gt;&lt;span style="background-color: white;"&gt;the wierd took the interview of deginers and scientists of nike and see read it full at&lt;span style="font-size: large;"&gt; &lt;a href="https://www.wired.com/2016/09/nike-self-lacing-design-hyperadapt" target="_blank"&gt;here&amp;nbsp;&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;iframe width="320" height="266" class="YOUTUBE-iframe-video" data-thumbnail-src="https://i.ytimg.com/vi/1xcxn7pOYCg/0.jpg" src="https://www.youtube.com/embed/1xcxn7pOYCg?feature=player_embedded" frameborder="0" allowfullscreen&gt;&lt;/iframe&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: Exchange SSm 4r, Georgia, serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 28px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;figure class="carve wp-caption portrait alignnone right relative" data-js="fader" id="attachment_2088015" style="background-color: white; border: 0px; box-sizing: border-box; float: right; font-family: &amp;quot;Exchange SSm 4r&amp;quot;, Georgia, serif; font-size: 21px; margin: 50px -200px 50px 50px; max-width: 400px; outline: 0px; padding: 0px; position: relative; right: 0px; width: 400px;"&gt;&lt;/figure&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://img.youtube.com/vi/1xcxn7pOYCg/default.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Quantum Computing OMG!!!</title><link>https://psychocyborg.blogspot.com/2016/09/quantum-computing-omg.html</link><category>Future</category><category>Intresting</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 19 Sep 2016 09:08:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-7088934881147243240</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="entry-title" itemprop="headline"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-weight: normal;"&gt;Quantum Computing Such a heavy word ahhh!! friends this heavy word is future of computer it will increase the capabilities of processing power of CPU.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;div style="text-align: justify;"&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Quantum computing is in our future and 
it will change the way we do things in big ways. It is not yet 
completely understood what quantum computing can exactly bring us, but 
there are some ideas based on scientific research. One thing is for 
sure, the experts are excited to be working on quantum computing and to 
see what it is bringing to the next generation.&lt;/div&gt;
&lt;h2&gt;
SO What is Quantum Computing really is ????.......&lt;/h2&gt;
&lt;div style="text-align: justify;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyj0wv2RRcYrI2o6XMGGRpFH38Mlb0MCu_8-LFKWzHpTCo6mYaR7pmBXguglZGO2DgmGhaWrlrbv7K_Fz2ESwc8YutHgtmkrWCuQqJggtEg8_8Q7uFWoHseIqa3QTF1BFZGlCpaUBTgep/s1600/quantum-computer_1024.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="254" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyj0wv2RRcYrI2o6XMGGRpFH38Mlb0MCu_8-LFKWzHpTCo6mYaR7pmBXguglZGO2DgmGhaWrlrbv7K_Fz2ESwc8YutHgtmkrWCuQqJggtEg8_8Q7uFWoHseIqa3QTF1BFZGlCpaUBTgep/s640/quantum-computer_1024.jpg" width="640" /&gt;&lt;/a&gt;Quantum computing is different than the 
regular computing we are used to because it runs on atoms, not on 
silicone. Atoms are the smallest thing information can be stored on. The
 problem people are running into when building the quantum computers is 
how to house these atoms. Any small vibration can set the spinoff of the
 electron making it not work. &lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Another thing quantum computers can do 
is solving multiple problems at once,where regular computers can only 
solve one thing at a time. The problems quantum computers solve are 
extremely complex, which brings us to what they will be used for in the 
future.&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h1 class="entry-title" itemprop="headline"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-weight: normal;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;h2&gt;
In Military and Security Sectors&lt;/h2&gt;
&lt;div style="text-align: justify;"&gt;
Quantum computers can go through large 
amounts of data in a fraction of the time that regular computers can. 
For example, satellites collect videos and images but not all of that 
data can be stored. Much of this data is thrown out because the 
computers cannot just handle it or do not recognize things that they 
should. Quantum computers, on the other hand, are much better at facial 
recognition or picking out small details in busy scenes.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Encryption is another area quantum 
computers will change. Encryption is everywhere, such as each time we 
use a credit card or send an email. Yet, it is not a failsafe method 
because accounts still get hacked and companies lose millions of 
dollars. Quantum computers use a different type of communication called 
quantum key distribution. It is much more secure.&lt;/div&gt;
&lt;h2&gt;
And in Automation and Learning&lt;/h2&gt;
&lt;div style="text-align: justify;"&gt;
Quantum computers can learn from 
experience, they have artificial intelligence. If they make a mistake 
they can also correct it. This method could actually have quantum 
computer improving quantum computers. It could leave to very advanced 
forms of artificial intelligence and even humanoid robots. There are so 
many different possibilities in this area it is hard to fathom all of 
them.&lt;/div&gt;
&lt;h2&gt;
It will &lt;span id="goog_251581704"&gt;&lt;/span&gt;pridict&lt;span id="goog_251581705"&gt;&lt;/span&gt;&amp;nbsp; Weather &lt;/h2&gt;
&lt;div style="text-align: justify;"&gt;
Today’s weather forecasting is an 
educated guess based on the different data a computer is given. There 
are many different ways a pattern can take, which is why it is not 
always accurate. Quantum computing can analyze all of these data at once
 to give meteorologists a better idea of where and when bad weather will
 hit. This means advanced warnings and more prep time for hurricanes and
 tornadoes.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
Quantum computing will be huge in the 
future, but it can be hard to tell all of the ways it will impact our 
lives. We do know that it can bring artificial intelligence, better 
security, and analyze large amounts of data all at once. It will be 
interesting to see how the power of quantum computing will be used.&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhnyj0wv2RRcYrI2o6XMGGRpFH38Mlb0MCu_8-LFKWzHpTCo6mYaR7pmBXguglZGO2DgmGhaWrlrbv7K_Fz2ESwc8YutHgtmkrWCuQqJggtEg8_8Q7uFWoHseIqa3QTF1BFZGlCpaUBTgep/s72-c/quantum-computer_1024.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>How to Hack Wi Fi Using Android</title><link>https://psychocyborg.blogspot.com/2016/09/how-to-hack-wi-fi-using-android.html</link><category>Hacking</category><category>Intresting</category><category>learning</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Fri, 16 Sep 2016 07:05:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-7521425071902233226</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLU6MDww1oBv5QJGDvj0c0n1i1HHtA2wCwlEXj_b2FsZYtSk3prh4zaMaiu9AjISoN6dQ9LVA3ySNjkm0zM6oU5Q_ugR7gwRB4rXCv2PXNNPZFEHqxSEjNRF8LhLNNegCXyzRJG_AL3R7y/s1600/Capture.PNG" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLU6MDww1oBv5QJGDvj0c0n1i1HHtA2wCwlEXj_b2FsZYtSk3prh4zaMaiu9AjISoN6dQ9LVA3ySNjkm0zM6oU5Q_ugR7gwRB4rXCv2PXNNPZFEHqxSEjNRF8LhLNNegCXyzRJG_AL3R7y/s640/Capture.PNG" width="640" /&gt;&lt;/a&gt;&lt;span style="background-color: white;"&gt;&lt;span style="color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif;"&gt;&lt;span style="line-height: 25px;"&gt;It is easy as piece of cake but you have to root your&amp;nbsp;mobile&amp;nbsp;which is risky, so here are some some step you should follow,&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; these tools are available for free as long as your device is compatible. Hacking routers without permission is illegal.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f5f4; color: #222222; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 20px; font-weight: bold; line-height: 29px;"&gt;WEP Routers&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f6f5f4; color: #222222; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 20px; font-weight: bold; line-height: 29px;"&gt;and&lt;/span&gt;&lt;br /&gt;
&lt;b class="whb" style="background-color: white; font-family: Helvetica, arial, sans-serif; line-height: 25px; margin: 0px; padding: 0px;"&gt;&lt;span style="font-size: large;"&gt;Download bcmon&lt;/span&gt;&lt;/b&gt;&lt;b class="whb" style="background-color: white; font-family: Helvetica, arial, sans-serif; font-size: 16px; line-height: 25px; margin: 0px; padding: 0px;"&gt;.&lt;/b&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;1.&amp;nbsp;This tool enables Monitor Mode on your Broadcom chipset, which is essential for being able to crack the PIN. The bcmon APK file is available for free from the bcmon page on the Google Code website.&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #545454; font-family: Helvetica, arial, sans-serif; font-size: 16px; line-height: 25px; margin: 0px; padding: 5px 5px 20px 55px;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;To install an APK file, you will need to allow installation from unknown sources in your Security menu. Step 2 of&amp;nbsp;&lt;a href="http://www.wikihow.com/Download-Videos,-Music,-Games,-Software-for-your-Mobile-Phone" style="color: #336633; margin: 0px; padding: 0px; text-decoration: none; word-wrap: break-word;" title="Download Videos, Music, Games, Software for your Mobile Phone"&gt;this article&lt;/a&gt;&amp;nbsp;goes into more detail&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;2. After installing the APK file, run the app. If prompted, install the firmware and tools. Tap the "Enable Monitor Mode" option. If the app crashes, open it and try again. If it fails for a third time, your device is most likely not supported.&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #545454; font-family: Helvetica, arial, sans-serif; font-size: 16px; line-height: 25px; margin: 0px; padding: 5px 5px 20px 55px;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;Your device must be rooted in order to run bcmon.&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;3. This will launch a terminal similar to most Linux terminals.Type&amp;nbsp;&lt;/span&gt;&lt;kbd style="background: rgb(238, 238, 238); color: #545454; font-size: 16px; letter-spacing: 0.1em; line-height: 25px; margin: 0px; padding: 0px 0.4em 0px 0.5em;"&gt;airodump-ng&lt;/kbd&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;and tap the Enter button. AIrdump will load, and you will be taken to the command prompt again. Type&amp;nbsp;&lt;/span&gt;&lt;kbd style="background: rgb(238, 238, 238); color: #545454; font-size: 16px; letter-spacing: 0.1em; line-height: 25px; margin: 0px; padding: 0px 0.4em 0px 0.5em;"&gt;airodump-ng wlan0&lt;/kbd&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;and tap the Enter button.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
4.Now &amp;nbsp;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;You will see a list of available access points. You must select an access point that is using WEP encryption.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;This is the MAC address for the router. Make sure that you have the right one if there are multiple routers listed. Jot this MAC address down.&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #545454; font-family: Helvetica, arial, sans-serif; font-size: 16px; line-height: 25px; margin: 0px; padding: 5px 5px 20px 55px;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;Also note the Channel that the access point is broadcasting on.&lt;/li&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;You will need to collect information from the access point for several hours before you can attempt to crack the password. Type&lt;kbd style="background: rgb(238, 238, 238); letter-spacing: 0.1em; margin: 0px; padding: 0px 0.4em 0px 0.5em;"&gt;airodump-ng -c&amp;nbsp;&lt;var style="margin: 0px; padding: 0px;"&gt;channel#&lt;/var&gt;&amp;nbsp;--bssid&amp;nbsp;&lt;var style="margin: 0px; padding: 0px;"&gt;MAC address&lt;/var&gt;&amp;nbsp;-w output ath0&lt;/kbd&gt;and tap Enter. Airodump will begin scanning. You can leave the device for a while as it scans for information. Be sure to plug it in if you are running low on battery.&lt;/li&gt;
&lt;ul style="margin: 0px; padding: 5px 5px 20px 55px;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;Replace&amp;nbsp;&lt;var style="margin: 0px; padding: 0px;"&gt;channel#&lt;/var&gt;&amp;nbsp;with the channel number the access point is broadcasting on (e.g. 6).&lt;/li&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;Replace&amp;nbsp;&lt;var style="margin: 0px; padding: 0px;"&gt;MAC address&lt;/var&gt;&amp;nbsp;with the MAC address of the router (e.g 00:0a:95:9d:68:16)&lt;/li&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;Keep scanning until you reach at least 20,000-30,000 packets.&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;5.Once you have a suitable number of packets, you can start attempting to crack the password . Return to the terminal and type&amp;nbsp;&lt;/span&gt;&lt;kbd style="background: rgb(238, 238, 238); color: #545454; font-size: 16px; letter-spacing: 0.1em; line-height: 25px; margin: 0px; padding: 0px 0.4em 0px 0.5em;"&gt;aircrack-ng output*.cap&lt;/kbd&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;and tap Enter.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;6.After the cracking process is complete (which could take several hours), the message&amp;nbsp;&lt;/span&gt;&lt;samp style="background-color: white; color: #666666; font-size: 16px; line-height: 25px; margin: 0px; padding: 0px 0.1em 0px 0em;"&gt;Key Found!&lt;/samp&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&amp;nbsp;will appear, followed by the key in hexadecimal form. Make sure that "Probability" is 100% or the key will not work.&lt;/span&gt;&lt;sup aria-label="Link to Reference 1" class="reference" id="_ref-1" style="background-color: white; color: #545454; font-family: Helvetica, arial, sans-serif; margin: 0px; padding: 0px;"&gt;&lt;a href="http://www.wikihow.com/Hack-Wi-Fi-Using-Android#_note-1" style="color: #336633; margin: 0px; padding: 0px; text-decoration: none; word-wrap: break-word;"&gt;[1]&lt;/a&gt;&lt;/sup&gt;&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; color: #545454; font-family: Helvetica, arial, sans-serif; font-size: 16px; line-height: 25px; margin: 0px; padding: 5px 5px 20px 55px;"&gt;
&lt;li style="-webkit-font-smoothing: antialiased; border-radius: 4px; border: none; clear: both; list-style: disc; margin: 0px; padding: 0px; position: relative;"&gt;When you enter the key, enter it without the ":". For example, if the key was 12:34:56:78:90, you would enter&amp;nbsp;&lt;kbd style="background: rgb(238, 238, 238); letter-spacing: 0.1em; margin: 0px; padding: 0px 0.4em 0px 0.5em;"&gt;1234567890&lt;/kbd&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;span style="background-color: white; color: #545454; font-family: &amp;quot;helvetica&amp;quot; , &amp;quot;arial&amp;quot; , sans-serif; font-size: 16px; line-height: 25px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLU6MDww1oBv5QJGDvj0c0n1i1HHtA2wCwlEXj_b2FsZYtSk3prh4zaMaiu9AjISoN6dQ9LVA3ySNjkm0zM6oU5Q_ugR7gwRB4rXCv2PXNNPZFEHqxSEjNRF8LhLNNegCXyzRJG_AL3R7y/s72-c/Capture.PNG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>C compilers  you should have</title><link>https://psychocyborg.blogspot.com/2016/09/c-compilers-you-should-have.html</link><category>Programing</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Thu, 15 Sep 2016 05:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-2659740052662192869</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-family: Georgia, Times, Times New Roman, serif;"&gt;&lt;span style="color: #333333; font-size: 15px; line-height: 21px;"&gt;yesterday finally my&amp;nbsp;favorite&amp;nbsp;subject started "Programming" so my friends these are some link from where you can easily download C&amp;nbsp;compilers&lt;/span&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-size: 15px; line-height: 21px;"&gt;(best C&amp;nbsp;Compilers)&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px;"&gt;There are plenty of C/C++ compilers available on the internet that are reliable and very robust, but since you've mentioned your choice for Windows 7 the search narrows down to following compilers:&lt;/span&gt;&lt;br /&gt;
&lt;ol style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; margin: 0px 2em 1em 0px; padding: 0px;"&gt;
&lt;li style="left: 2em; margin: 0px; padding: 0px 0px 0.7em; position: relative;"&gt;&lt;b&gt;Turbo C++&lt;/b&gt;&amp;nbsp;compiler is the most popular one among the beginners and developers and is been used for a very long time. It supports graphics programming and a system oriented programming.&lt;/li&gt;
&lt;/ol&gt;
&lt;div class="qtext_image_wrapper" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; margin-bottom: 1em; position: relative;"&gt;
&lt;canvas class="qtext_image_placeholder landscape qtext_image zoomable_in zoomable_in_feed" data-src="data:image/PNG;base64,iVBORw0KGgoAAAANSUhEUgAAAAoAAAAGCAYAAAD68A/GAAAAoUlEQVR4nEWOSw4BQRQA673uNkZY2VjZSJzAUdzA4ZyLhUgIEhnTeqb7WfjVupIqWa42Vi/WPPYNehacF6xAnw0RUK25xi3+foLDrqO5GdYFQADjTQYCVIJvb5DaIVVI6ChDk8jFkSy8XTFwoK4qqCTKo8d6pYiQ0Y/ED+/GmRAj8ZlpGwHqf/p70IOvO2E6mxDnYIMnlsEEMEO9I1TC5Qgv4xtFGDOGpAQAAAAASUVORK5CYII=" height="321.592972182" style="animation-duration: 0.001s; animation-name: insQ_100; cursor: -webkit-zoom-in; display: block; max-width: 100%; position: relative; vertical-align: baseline; visibility: hidden;" width="572.0"&gt;&lt;/canvas&gt;&lt;img class="landscape qtext_image zoomable_in zoomable_in_feed lazy_loaded lazy_loading" master_h="768" master_src="https://qph.ec.quoracdn.net/main-qimg-6668958f94caa325823e43e8128a0f02?convert_to_webp=true" master_w="1366" src="https://qph.ec.quoracdn.net/main-qimg-fc0baa481c35628900db90931e34cf58?convert_to_webp=true" style="animation-duration: 0.001s; animation-name: insQ_101; border-radius: 3px; border: 0px; cursor: -webkit-zoom-in; display: block; left: 0px; max-width: 100%; opacity: 1; position: absolute; top: 0px; transition: opacity 0.5s linear;" /&gt;&lt;/div&gt;
&lt;div class="qtext_para" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; margin-bottom: 1em; padding: 0px;"&gt;
You can download it from this link :&amp;nbsp;&lt;span class="qlink_container"&gt;&lt;a class="external_link" data-tooltip="attached" href="https://turboc.codeplex.com/downloads/get/1489512" rel="noopener" style="background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;data:image/svg+xml,%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20standalone%3D%22no%22%3F%3E%0A%3Csvg%20width%3D%2214px%22%20height%3D%2214px%22%20viewBox%3D%220%200%2014%2014%22%20version%3D%221.1%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20xmlns%3Axlink%3D%22http%3A%2F%2Fwww.w3.org%2F1999%2Fxlink%22%20xmlns%3Asketch%3D%22http%3A%2F%2Fwww.bohemiancoding.com%2Fsketch%2Fns%22%3E%0A%20%20%20%20%3C!--%20Generator%3A%20Sketch%203.5.2%20(25235)%20-%20http%3A%2F%2Fwww.bohemiancoding.com%2Fsketch%20--%3E%0A%20%20%20%20%3Ctitle%3Eexternal_link%3C%2Ftitle%3E%0A%20%20%20%20%3Cdesc%3ECreated%20with%20Sketch.%3C%2Fdesc%3E%0A%20%20%20%20%3Cdefs%3E%3C%2Fdefs%3E%0A%20%20%20%20%3Cg%20id%3D%22Page-1%22%20stroke%3D%22none%22%20stroke-width%3D%221%22%20fill%3D%22none%22%20fill-rule%3D%22evenodd%22%20sketch%3Atype%3D%22MSPage%22%3E%0A%20%20%20%20%20%20%20%20%3Cg%20id%3D%22external_link%22%20sketch%3Atype%3D%22MSLayerGroup%22%20fill%3D%22%23ccc%22%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%3Cpath%20d%3D%22M10%2C8%20C9.447%2C8%209%2C8.448%209%2C9%20L9%2C12%20L2%2C12%20L2%2C5%20L5%2C5%20C5.553%2C5%206%2C4.552%206%2C4%20C6%2C3.448%205.553%2C3%205%2C3%20L1%2C3%20C0.447%2C3%200%2C3.448%200%2C4%20L0%2C13%20C0%2C13.552%200.447%2C14%201%2C14%20L10%2C14%20C10.553%2C14%2011%2C13.552%2011%2C13%20L11%2C9%20C11%2C8.448%2010.553%2C8%2010%2C8%20L10%2C8%20Z%22%20id%3D%22Shape%22%20sketch%3Atype%3D%22MSShapeGroup%22%3E%3C%2Fpath%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%3Cpath%20d%3D%22M13%2C0%20L8%2C0%20C7.447%2C0%207%2C0.448%207%2C1%20C7%2C1.552%207.447%2C2%208%2C2%20L10.586%2C2%20L4.293%2C8.293%20C3.902%2C8.684%203.902%2C9.316%204.293%2C9.707%20C4.488%2C9.902%204.744%2C10%205%2C10%20C5.256%2C10%205.512%2C9.902%205.707%2C9.707%20L12%2C3.414%20L12%2C6%20C12%2C6.552%2012.447%2C7%2013%2C7%20C13.553%2C7%2014%2C6.552%2014%2C6%20L14%2C1%20C14%2C0.448%2013.553%2C0%2013%2C0%20L13%2C0%20Z%22%20id%3D%22Shape%22%20sketch%3Atype%3D%22MSShapeGroup%22%3E%3C%2Fpath%3E%0A%20%20%20%20%20%20%20%20%3C%2Fg%3E%0A%20%20%20%20%3C%2Fg%3E%0A%3C%2Fsvg%3E&amp;quot;); background-origin: initial; background-position: right 0.3em; background-repeat: no-repeat; background-size: 10.5px; color: #2b6dad; padding-right: 15px; text-decoration: none;" target="_blank"&gt;Turbo C++_Win7&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="qtext_para" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; margin-bottom: 1em; padding: 0px;"&gt;
2.&lt;b&gt;&amp;nbsp;Borland C++&amp;nbsp;&lt;/b&gt;is another popular compiler which is GUI based compiler. It&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; does not support graphics programming but it is good for console based programming.&lt;/div&gt;
&lt;div class="qtext_image_wrapper" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; margin-bottom: 1em; position: relative;"&gt;
&lt;canvas class="qtext_image_placeholder landscape qtext_image zoomable_in zoomable_in_feed" data-src="data:image/PNG;base64,iVBORw0KGgoAAAANSUhEUgAAAAoAAAAFCAYAAAB8ZH1oAAAAYElEQVR4nGWNOxKDMBBD31pa29z/fBS5QWgovSmYSZigUp+n2F97dW307KRhzA1J3LXWIt7HUWqTTCOBFEQE//IcA8sUAEXVL7wPbBupPQgP4nmeOBO1q1xVRMT3gbq8DzRTGxF5z5/tAAAAAElFTkSuQmCC" height="305.904761905" style="animation-duration: 0.001s; animation-name: insQ_100; cursor: -webkit-zoom-in; display: block; max-width: 100%; position: relative; vertical-align: baseline; visibility: hidden;" width="572.0"&gt;&lt;/canvas&gt;&lt;img class="landscape qtext_image zoomable_in zoomable_in_feed lazy_loaded lazy_loading" master_h="730" master_src="https://qph.ec.quoracdn.net/main-qimg-48dac71e9c62f6dfa47f8d172b7c04a5?convert_to_webp=true" master_w="1365" src="https://qph.ec.quoracdn.net/main-qimg-d93d7873d3b561aa241f554a6dd35a4a?convert_to_webp=true" style="animation-duration: 0.001s; animation-name: insQ_101; border-radius: 3px; border: 0px; cursor: -webkit-zoom-in; display: block; left: 0px; max-width: 100%; opacity: 1; position: absolute; top: 0px; transition: opacity 0.5s linear;" /&gt;&lt;/div&gt;
&lt;div class="qtext_para" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; padding: 0px;"&gt;
You can download it from this link :&amp;nbsp;&amp;nbsp;&lt;span class="qlink_container"&gt;&lt;a class="external_link" data-tooltip="attached" href="http://www.mediafire.com/download/zjrzclgmdlz/Borland+C%2B%2B+v5.02.rar" rel="noopener nofollow" style="background-attachment: initial; background-clip: initial; background-image: url(&amp;quot;data:image/svg+xml,%3C%3Fxml%20version%3D%221.0%22%20encoding%3D%22UTF-8%22%20standalone%3D%22no%22%3F%3E%0A%3Csvg%20width%3D%2214px%22%20height%3D%2214px%22%20viewBox%3D%220%200%2014%2014%22%20version%3D%221.1%22%20xmlns%3D%22http%3A%2F%2Fwww.w3.org%2F2000%2Fsvg%22%20xmlns%3Axlink%3D%22http%3A%2F%2Fwww.w3.org%2F1999%2Fxlink%22%20xmlns%3Asketch%3D%22http%3A%2F%2Fwww.bohemiancoding.com%2Fsketch%2Fns%22%3E%0A%20%20%20%20%3C!--%20Generator%3A%20Sketch%203.5.2%20(25235)%20-%20http%3A%2F%2Fwww.bohemiancoding.com%2Fsketch%20--%3E%0A%20%20%20%20%3Ctitle%3Eexternal_link%3C%2Ftitle%3E%0A%20%20%20%20%3Cdesc%3ECreated%20with%20Sketch.%3C%2Fdesc%3E%0A%20%20%20%20%3Cdefs%3E%3C%2Fdefs%3E%0A%20%20%20%20%3Cg%20id%3D%22Page-1%22%20stroke%3D%22none%22%20stroke-width%3D%221%22%20fill%3D%22none%22%20fill-rule%3D%22evenodd%22%20sketch%3Atype%3D%22MSPage%22%3E%0A%20%20%20%20%20%20%20%20%3Cg%20id%3D%22external_link%22%20sketch%3Atype%3D%22MSLayerGroup%22%20fill%3D%22%23ccc%22%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%3Cpath%20d%3D%22M10%2C8%20C9.447%2C8%209%2C8.448%209%2C9%20L9%2C12%20L2%2C12%20L2%2C5%20L5%2C5%20C5.553%2C5%206%2C4.552%206%2C4%20C6%2C3.448%205.553%2C3%205%2C3%20L1%2C3%20C0.447%2C3%200%2C3.448%200%2C4%20L0%2C13%20C0%2C13.552%200.447%2C14%201%2C14%20L10%2C14%20C10.553%2C14%2011%2C13.552%2011%2C13%20L11%2C9%20C11%2C8.448%2010.553%2C8%2010%2C8%20L10%2C8%20Z%22%20id%3D%22Shape%22%20sketch%3Atype%3D%22MSShapeGroup%22%3E%3C%2Fpath%3E%0A%20%20%20%20%20%20%20%20%20%20%20%20%3Cpath%20d%3D%22M13%2C0%20L8%2C0%20C7.447%2C0%207%2C0.448%207%2C1%20C7%2C1.552%207.447%2C2%208%2C2%20L10.586%2C2%20L4.293%2C8.293%20C3.902%2C8.684%203.902%2C9.316%204.293%2C9.707%20C4.488%2C9.902%204.744%2C10%205%2C10%20C5.256%2C10%205.512%2C9.902%205.707%2C9.707%20L12%2C3.414%20L12%2C6%20C12%2C6.552%2012.447%2C7%2013%2C7%20C13.553%2C7%2014%2C6.552%2014%2C6%20L14%2C1%20C14%2C0.448%2013.553%2C0%2013%2C0%20L13%2C0%20Z%22%20id%3D%22Shape%22%20sketch%3Atype%3D%22MSShapeGroup%22%3E%3C%2Fpath%3E%0A%20%20%20%20%20%20%20%20%3C%2Fg%3E%0A%20%20%20%20%3C%2Fg%3E%0A%3C%2Fsvg%3E&amp;quot;); background-origin: initial; background-position: right 0.3em; background-repeat: no-repeat; background-size: 10.5px; color: #2b6dad; padding-right: 15px; text-decoration: none;" target="_blank"&gt;Borland C++ v5.02.rar&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="qtext_para" style="color: #333333; font-family: Georgia, Times, &amp;quot;Times New Roman&amp;quot;, serif; font-size: 15px; line-height: 21px; padding: 0px;"&gt;
these are very easy to use and easy to install for any query inbox me on Facebook or comment below&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>What is hacking?</title><link>https://psychocyborg.blogspot.com/2016/09/what-is-hacking.html</link><category>Hacking</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 12 Sep 2016 08:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-8235404330184709818</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; text-align: left;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span style="font-size: x-large;"&gt;W&lt;/span&gt;&lt;span style="font-size: large;"&gt;hat &lt;/span&gt;&lt;b&gt;is&lt;/b&gt;&lt;span style="font-size: large;"&gt; &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;h&lt;/span&gt;&lt;span style="font-size: large;"&gt;ac&lt;/span&gt;&lt;span style="font-size: x-large;"&gt;k&lt;/span&gt;&lt;span style="font-size: large;"&gt;ing?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; text-align: left;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;There are many definitions of hacking. In this article, we will define hacking as identifying weakness in computer systems and/or networks and exploiting the weaknesses to gain access. An example of hacking is using by passing the login algorithm to gain access to a system. A hacker is a person who finds and exploits weakness in computer systems and/or networks to gain access. Hackers are usually skilled computer programmers with knowledge of computer security.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Before we go any further, let’s look at some of the most commonly used terminologies in the world of hacking.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Types of Hackers&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Hackers are classified according to the intent of their actions. The following list classifies hackers according to their intent.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Ethical Hacker (White hat):A hacker who gains access to systems with a view to fix the identified weaknesses. They may also perform penetration testing and vulnerability assessments.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://i.ytimg.com/i/o610qQuQPEef3WF-FRTRqQ/mq1.jpg?v=c2eeeb" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Image result for ethical hacking logo" border="0" height="400" src="https://i.ytimg.com/i/o610qQuQPEef3WF-FRTRqQ/mq1.jpg?v=c2eeeb" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Cracker (Black hat):A hacker who gains unauthorized access to computer systems for personal gain. The intent is usually to steal corporate data, violate privacy rights, transfer funds from bank accounts etc.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Grey hat:A hacker who is in between ethical and black hat hackers. He/she breaks into computer systems without authority with a view to identify weaknesses and reveal them to the system owner.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Script kiddies:A non-skilled person who gains access to computer systems using already made tools.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Hacktivist:A hacker who use hacking to send social, religious, and political etc. messages. This is usually done by hijacking websites and leaving the message on the hijacked website.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Phreaker:A hacker who identifies and exploits weaknesses in telephones instead of computers.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: x-large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; W&lt;/span&gt;&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: large;"&gt;hat is Cyber&lt;/span&gt;&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;b&gt;crime&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: x-large;"&gt;?&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Cybercrime is the use of computers and networks to perform illegal activities such as spreading computer viruses, online bullying, performing unauthorized electronic fund transfers etc. &amp;nbsp;Most cybercrimes are committed through the internet. Some cybercrimes can also be carried out using phones via SMS and online chatting applications.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;b&gt;&lt;span style="font-size: large;"&gt; T&lt;/span&gt;&lt;/b&gt;&lt;span style="font-size: large;"&gt;ype &lt;/span&gt;of&lt;span style="font-size: large;"&gt; &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;C&lt;/span&gt;&lt;span style="font-size: large;"&gt;yb&lt;/span&gt;er&lt;span style="font-size: large;"&gt;c&lt;/span&gt;&lt;span style="font-size: x-large;"&gt;ri&lt;/span&gt;&lt;span style="font-size: large;"&gt;me&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;The following list presents the common types of cybercrimes:&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Computer fraud:Intentional deception for personal gain via the use of computer systems.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Privacy violation:Exposing personal information such as email addresses, phone number, account details etc. on &amp;nbsp;social media, websites etc.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Identity Theft:Stealing personal information from somebody and impersonating that person.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Sharing copyrighted files/information:This involves distributing copyright protected files such as eBooks and computer programs etc.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Electronic funds transfer:This involves gaining an un-authorized access to bank computer networks and making illegal fund transfers.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Electronic money laundering:This involves the use of computer to launder money.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;ATM Fraud:This involves intercepting ATM card details such as account number and PIN numbers. These details are then used to withdraw funds from the intercepted accounts.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Denial of Service Attacks:This involves the use of computers in multiple locations to attack servers with a view of shutting them down.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Spam:Sending unauthorized emails. These emails usually contain advertisements.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;What is ethical hacking?&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Ethical hacking is identifying weakness in computer systems and/or computer networks and coming with counter measures that protect the weaknesses. Ethical hackers must abide by the following rules.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Get written permission from the owner of the computer system and/or computer network before hacking.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Protect the privacy of the organization been hacked.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Transparently report all the identified weaknesses in the computer system to the organization.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Inform hardware and software vendors of the identified weaknesses.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Why ethical hacking?&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Information is one of the most valuable assets of an organization. Keeping information secure can protect an organization’s image and save an organization a lot of money.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Hacking can lead to loss of business for organizations that deal in finance such as PayPal. Ethical hacking puts them a step ahead of the cyber criminals who would otherwise lead to loss of business.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Summary&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Hacking is identifying and exploiting weaknesses in computer systems and/or computer networks.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Cybercrime is committing crime with the aid of computers and information technology infrastructure.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Ethical hacking is about improving the security of computer systems and/or computer networks.&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white;"&gt;
&lt;span style="color: #222222; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Ethical hacking is legal.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Fake Mail A disposable email system</title><link>https://psychocyborg.blogspot.com/2016/09/fake-mail-disposable-email-system.html</link><category>hacks</category><category>Intresting</category><category>tricks</category><category>Websites</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 12 Sep 2016 08:32:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-348458155800605189</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; font-family: &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; line-height: 18px; margin-bottom: 15px;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;&lt;span style="font-size: x-large;"&gt;W&lt;/span&gt;&lt;span style="font-size: large;"&gt;hat&lt;/span&gt; the &lt;span style="font-size: x-large;"&gt;h&lt;/span&gt;&lt;span style="font-size: large;"&gt;ell is&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-size: x-large; font-weight: bold;"&gt;this&lt;/span&gt;&lt;span style="font-size: large; font-weight: 700;"&gt;?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 15px;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;The Fake Mail Generator is an absolutely&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;free&lt;/em&gt;&amp;nbsp;disposable email system.&lt;/span&gt;&amp;nbsp;By simply visiting this site the above address has already been activated. Use it instead of your regular email address to avoid spam. When an email is received it will pop up instantly on this page.&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 15px;"&gt;
The Fake Mail Generator offers several generic domain names—and even country-specific domains!&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; color: #333333; font-family: &amp;quot;Lucida Grande&amp;quot;, Helvetica, Arial, sans-serif; font-size: 14px; line-height: 18px; margin-bottom: 15px;"&gt;
And the fact is it is a&amp;nbsp;&lt;span style="background-color: white; color: #545454; font-family: arial, sans-serif; font-size: x-small; line-height: 18.2px;"&gt;Free web-based&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; color: #6a6a6a; font-family: arial, sans-serif; font-size: x-small; font-weight: bold; line-height: 18.2px;"&gt;addresses&lt;/span&gt;&lt;span style="background-color: white; color: #545454; font-family: arial, sans-serif; font-size: x-small; line-height: 18.2px;"&gt;&amp;nbsp;created in advance on the site, with no registration required.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;it is a disposable email address service. When you visit it a new email address is generated just for you. The generated email address can immediately receive email. Any email that is received will show up on the main page. No one other than you will see the emails that are received.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;It is important to note that an email address expires after 48 hours. When an email address has expired, the email address and any received emails will be gone. A new email address will be generated upon visiting this website.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px; text-align: left;"&gt;
&lt;span style="color: #444444; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="line-height: 18px;"&gt;&lt;b&gt;&lt;span style="font-size: x-large;"&gt;W&lt;/span&gt;&lt;span style="font-size: large;"&gt;hy &lt;/span&gt;y&lt;span style="font-size: x-large;"&gt;o&lt;/span&gt;u&lt;span style="font-size: large;"&gt; &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;s&lt;/span&gt;&lt;span style="font-size: large;"&gt;hould use &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;f&lt;/span&gt;&lt;span style="font-size: large;"&gt;ake &lt;/span&gt;email&lt;span style="font-size: large;"&gt; &lt;/span&gt;&lt;span style="font-size: x-large;"&gt;ids&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;There are many reasons for using a disposable email. You may want to give someone an email address without revealing your identity. Or you may want to sign up for a website or web service but you are concerned that the website will send you spam in the future.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;These are some very popular Fake email generators instead of these you can use outlook and yahoo also but they are a little complicated so the pearls of the ocean are presented to you&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.throwawaymail.com/" target="_blank"&gt;&lt;img border="0" height="78" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI03DuI0Z6TNFP6BYqDRfUNYlSHIz8ECW3KztIUMoGOY50AloaO70gOFwdpjRo9rxzuS8X7rC1WWIxVMuEiDaLjP0mH4rRRevHPpcEBWSS9CBHtOJm-gviYEu4oDcwDKJ7H-wn0krf3UcX/s400/2.png" width="400" /&gt;&lt;/a&gt;&lt;a href="http://www.fakemailgenerator.com/" target="_blank"&gt;&lt;img border="0" height="308" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZJW4JqC-AeGwMjiCgjaULp2kPOxOnwOPJJmrWhUAQAOibxOJ7uNv69bV34lbY4R3F4N9ZcIlNxLM-J5uAm9ZkYW9O73Js1d7gV-CRI79gvQnIO55riXb2wFr8-EEXQ4V5MwYfeDWMZGt3/s640/1.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://mailinator.com/" target="_blank"&gt;&lt;img border="0" height="224" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg9ug9IEV7UsXnyGaKnWJJaoJ3NTdnZ-GZVjlV9agUC-iUbEtvcOgshFycX07TD2h1bF2YlgV-brv8RdNOQ59v0Mic4quTZsuGLc9vp4qbiGXzs4cXfD97X3G0oi_4Q_FDNsRjvBa0lu42e/s640/3.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://www.guerrillamail.com/" target="_blank"&gt;&lt;img border="0" height="168" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiiyjU9KuHWwAdAM4X9-8kHWFIHQFqUIwbGpWpfP1hVLDYlzw-0gBJ3oQ0ijuINiisxEH1G8Fuaw3_YIOnjIlTNIse3F7ag0X-4_izpt8E_Y9izdNhoKu0UarrlZK-etba5YCqel6diSuvI/s640/4.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
these are the some very popular among It students and hackers&lt;/div&gt;
&lt;div style="background-color: #fbfbfb; box-sizing: border-box; margin-bottom: 15px;"&gt;
&lt;span style="color: #333333; font-family: Lucida Grande, Helvetica, Arial, sans-serif;"&gt;&lt;span style="font-size: 14px; line-height: 18px;"&gt;Malinater is paid service but the rest are free so enjoy!!!!!!!!!!!!!!!!!!!!!&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI03DuI0Z6TNFP6BYqDRfUNYlSHIz8ECW3KztIUMoGOY50AloaO70gOFwdpjRo9rxzuS8X7rC1WWIxVMuEiDaLjP0mH4rRRevHPpcEBWSS9CBHtOJm-gviYEu4oDcwDKJ7H-wn0krf3UcX/s72-c/2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Do you know How do your antivirus software works ????</title><link>https://psychocyborg.blogspot.com/2016/09/do-you-know-how-do-your-antivirus.html</link><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Tue, 6 Sep 2016 12:07:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-1214274973529965358</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Due to ever increasing threat from virus and other malicious programs,&amp;nbsp;almost every computer today&amp;nbsp;comes with a pre-installed antivirus software&amp;nbsp;on it.&amp;nbsp;In fact,&amp;nbsp;an antivirus&amp;nbsp;has become one of the most essential software package for&amp;nbsp;every computer.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4WD0qG4iReZ8AwxWIYpBJCGTFcFL5qzK9oBvnx1W2iMHpjux-Xmf9aSo8pllY8AGc2R1P4u4fEp_pZZtO-O4sl2IYGmRP5xp5SvKA08lPBAtB63yq6dYxZhK7_-k860u1m9SPJyDy3x6v/s1600/downfffload.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="433" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4WD0qG4iReZ8AwxWIYpBJCGTFcFL5qzK9oBvnx1W2iMHpjux-Xmf9aSo8pllY8AGc2R1P4u4fEp_pZZtO-O4sl2IYGmRP5xp5SvKA08lPBAtB63yq6dYxZhK7_-k860u1m9SPJyDy3x6v/s640/downfffload.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Even though every one of us have&amp;nbsp;an antivirus software installed on our computers,&amp;nbsp;only a few&amp;nbsp;really bother to understand how it actually works! Well, if you are one among those few who would really bother to understand&amp;nbsp;&lt;span style="box-sizing: border-box; text-decoration: underline;"&gt;how antivirus works&lt;/span&gt;, then&amp;nbsp;this article is for you.&lt;/div&gt;
&lt;h2 style="background-color: white; box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 30px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
How Antivirus Works:&lt;/h2&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
An antivirus software typically uses a variety of strategies in detecting and removing viruses, worms and other malware programs. The following are the two&amp;nbsp;most widely employed identification methods:&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
1. Signature-based dectection&amp;nbsp;(Dictionary approach)&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
This is the most commonly employed method which involves searching for known patterns of virus within a given file. Every antivirus software will have a&amp;nbsp;dictionary of sample&amp;nbsp;malware codes called&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;signatures&amp;nbsp;&lt;/em&gt;in its database. Whenever a file is examined, the antivirus refers to the dictionary of sample codes present within its database and compares the same with the current file. If the piece of code within the file matches with the one in its dictionary then it is flagged and proper action is taken immediately so as to stop the virus from further replicating. The antivirus may choose to&amp;nbsp;repair the file, quarantine&amp;nbsp;or delete it permanently based on its potential risk.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
As new viruses and malwares are created and released every day, this method of detection cannot defend against new malwares unless their samples are collected and signatures are released by the antivirus software company. Some companies may also encourage the users to upload new viruses or variants so that, the virus&amp;nbsp;can be analyzed and the signature can be added to the dictionary.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Signature based detection can be very effective, but requires&amp;nbsp;frequent&amp;nbsp;updates of the virus signature dictionary. Hence, the users must update their antivirus&amp;nbsp;software on a&amp;nbsp;regular basis so as to defend against new threats that are released daily.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
2. Heuristic-based detection (Suspicious behaviour)&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Heuristic-based detection involves identifying&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;suspicious behaviour&amp;nbsp;&lt;/em&gt;from any given program which might indicate a potential risk. This approach is used by some of the sophisticated antivirus&amp;nbsp;software&amp;nbsp;to identify new malware and variants of&amp;nbsp;known malware.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Unlike the&amp;nbsp;signature based approach, here the antivirus doesn’t attempt to identify known viruses, but instead monitors the behavior of all programs.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
For example, malicious behaviours like a program trying to write data to an executable program is flagged and the user is alerted about this action. This method of detection gives an additional level of security from unidentified threats.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;File emulation:&lt;/span&gt;&amp;nbsp;This is another type of&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;heuristic-based approach&amp;nbsp;&lt;/em&gt;where a given program is executed in a virtual environment and the actions performed by it are logged. Based on the actions logged, the antivirus software can determine if the program is malicious or not and carry out necessary actions in order to clean the infection.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Most commercial antivirus software use a combination of both signature-based and heuristic-based approaches to combat malware.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
Issues of Concern:&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Zero-day threats:&amp;nbsp;&lt;/span&gt;A zero-day (zero-hour ) threat or attack is where a malware tries to exploit computer application vulnerabilities that are yet&amp;nbsp;unidentified&amp;nbsp;by the antivirus software companies. These attacks are used to cause damage to the computer even before they are identified. Since patches are not yet released for these kind of new threats, they can easily manage to bypass the antivirus software and carry out malicious actions. However, most of the threats are identified&amp;nbsp;after a day or two&amp;nbsp;of its release, but damage caused by them before identification is quite inevitable.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Daily Updates:&amp;nbsp;&lt;/span&gt;Since new viruses and threats are released every day, it is most essential to update the antivirus software so that the virus definitions are kept up-to-date. Most software will have an auto-update feature so that, the virus definitions are updated whenever the computer is connected to the Internet.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Effectiveness:&amp;nbsp;&lt;/span&gt;Even though an antivirus software can catch almost every&amp;nbsp;malware, it is still not 100%&amp;nbsp;foolproof against all kinds of threats. As explained earlier, a zero-day threat can easily bypass the protective shield of the antivirus software. Also virus authors have tried to stay a step ahead&amp;nbsp;by writing “&lt;a href="http://en.wikipedia.org/wiki/Oligomorphic_code" style="background: 0px 0px; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank" title="Oligomorphic code"&gt;oligomorphic&lt;/a&gt;“, “&lt;a href="http://en.wikipedia.org/wiki/Polymorphic_code" style="background: 0px 0px; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank" title="Polymorphic code"&gt;polymorphic&lt;/a&gt;” and, more recently, “&lt;a href="http://en.wikipedia.org/wiki/Metamorphic_code" style="background: 0px 0px; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank" title="Metamorphic code"&gt;metamorphic&lt;/a&gt;” virus codes, which will encrypt parts of themselves or otherwise modify themselves as a method of disguise, so as to not match virus signatures in the dictionary.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Thus user awareness is as important as antivirus software; users must be trained&amp;nbsp;to practice&amp;nbsp;safe surfing habits such as&amp;nbsp;downloading files only from trusted websites and not blindly executing a program that is unknown or obtained from an untrusted source. I hope this article has helped you understand the working of an antivirus software.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj4WD0qG4iReZ8AwxWIYpBJCGTFcFL5qzK9oBvnx1W2iMHpjux-Xmf9aSo8pllY8AGc2R1P4u4fEp_pZZtO-O4sl2IYGmRP5xp5SvKA08lPBAtB63yq6dYxZhK7_-k860u1m9SPJyDy3x6v/s72-c/downfffload.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>The Monster PC   My last Wish</title><link>https://psychocyborg.blogspot.com/2016/09/the-monster-pc-my-last-wish.html</link><category>NEW TECH</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 5 Sep 2016 10:41:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-1322467612837472851</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="font-size: large;"&gt;My last wish&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;since i saw these laptop it totally made me crazy&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;A LAPTOP WITH these specification&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ol style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;&amp;nbsp;Curved 21-inch display on a laptop &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;Two GeForce GTX 1080 GPUs &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;7th-generation Intel Core K-series processor, &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;Our terabytes of SSD storage &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;64GB of RAM&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;Tobii eye-tracking,&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;A mechanical keyboard,&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;A 4.2 sound system,&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;A window to show off one of the big fans,&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;And a numpad that flips over to turn into a touchpad.&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-size: large;"&gt;An SD card slot&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: red; font-size: large;"&gt;&lt;span style="background-color: white; color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: 16.5px; line-height: 28.05px;"&gt;Unveiling the 21 X at IFA in Berlin today, Acer acknowledges that this laptop is more of a proof of engineering acumen than any sort of "big seller" retail product. Each Predator 21 X will be made to order, starting in January of next year (which is how Acer can advertise today that it will have an Intel CPU that technically hasn't yet been announced).&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: red; font-size: large;"&gt;&lt;span style="background-color: white; color: #444444; font-family: Helvetica, Arial, sans-serif; font-size: 16.5px; line-height: 28.05px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: red; font-size: large;"&gt;that's all I wished for ever&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;just have a look at his stunning design !!!!!!!!!!!&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7BY98nsHptcAi2RaWRNIGQHhocLCGVzUSGkbMC98iOYZHKO62aG0iq2O2SnoeK_AKkij_VqgG5CYkaglKJIVPKVqGI30Hh2AaPLv9SU3qyk3AGkW9BQM7VW2SM71IXWVY7NJauO0E3RJS/s1600/DSC09872.0.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7BY98nsHptcAi2RaWRNIGQHhocLCGVzUSGkbMC98iOYZHKO62aG0iq2O2SnoeK_AKkij_VqgG5CYkaglKJIVPKVqGI30Hh2AaPLv9SU3qyk3AGkW9BQM7VW2SM71IXWVY7NJauO0E3RJS/s640/DSC09872.0.jpg" width="640" /&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqWcN7um3LfKsiynAYGZ4u1NCBwU2DsK6joE6MiNGBvEgF1keohyphenhyphenxVfPTitwEO2HVuLPehmgXyu7urZ2_VaAded9KwlHaEzrcM5XfxWfIJPT-_YDxN5xDgHdBQ9FKUzR2E0mggopfnwQK/s1600/DSC09875.0.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEirqWcN7um3LfKsiynAYGZ4u1NCBwU2DsK6joE6MiNGBvEgF1keohyphenhyphenxVfPTitwEO2HVuLPehmgXyu7urZ2_VaAded9KwlHaEzrcM5XfxWfIJPT-_YDxN5xDgHdBQ9FKUzR2E0mggopfnwQK/s640/DSC09875.0.jpg" width="640" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #fa4b2a; font-family: ff-din-web-condensed, Helvetica, Arial, sans-serif; font-size: 37.5px; font-style: italic; font-weight: bold; line-height: 37.5px; text-transform: uppercase;"&gt;YOU CALL THAT A GAMING LAPTOP? THIS IS A GAMING LAPTOP!!&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH21S4Fz_tRARbskpwMf8fOVdQnum6kxmjxwCBUnHuiuDOBF3LF78Zg5aaWa1fihikBcIxp11TbcF-bx0yMRKQSVh3T_p0UmrFi-2KVKSCa0E99Q0X77CzOxqp9fDumEkL0nVzt25mLcBu/s1600/DSC09877.0.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="426" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgH21S4Fz_tRARbskpwMf8fOVdQnum6kxmjxwCBUnHuiuDOBF3LF78Zg5aaWa1fihikBcIxp11TbcF-bx0yMRKQSVh3T_p0UmrFi-2KVKSCa0E99Q0X77CzOxqp9fDumEkL0nVzt25mLcBu/s640/DSC09877.0.jpg" width="640" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;NOW THIS IS A MONSTER&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh7BY98nsHptcAi2RaWRNIGQHhocLCGVzUSGkbMC98iOYZHKO62aG0iq2O2SnoeK_AKkij_VqgG5CYkaglKJIVPKVqGI30Hh2AaPLv9SU3qyk3AGkW9BQM7VW2SM71IXWVY7NJauO0E3RJS/s72-c/DSC09872.0.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>wanna trace your Facebook friend ????</title><link>https://psychocyborg.blogspot.com/2016/08/wanna-trace-your-facebook-friend.html</link><category>hacks</category><category>tips</category><category>tricks</category><category>Websites</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Wed, 31 Aug 2016 11:40:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-322188553979102202</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
You have a very annoying friend on facebook and you want to search where he currently loacated then you can use these simple steps. its very easy and ready to use&amp;nbsp;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGex1WtpeeaN5wEVHUQx_8bZ7AO-l-f5f7nDL22gxYC3p5KowHTAnxNRMb_AeNdCzw-n2ktUBHQ_yFs2eT-PCNWAXGjcg-UCxdPQhCgDuZU_SQ9_8sxU38lIH7j4311KpU_i2SRF8lS-Mz/s1600/How+to+trace+friends+location+in+facebook.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGex1WtpeeaN5wEVHUQx_8bZ7AO-l-f5f7nDL22gxYC3p5KowHTAnxNRMb_AeNdCzw-n2ktUBHQ_yFs2eT-PCNWAXGjcg-UCxdPQhCgDuZU_SQ9_8sxU38lIH7j4311KpU_i2SRF8lS-Mz/s400/How+to+trace+friends+location+in+facebook.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
First you got to find out the IP address of that User.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
To Do so we will be using “netstat” command in windows. If you want to know the IP address of a specific person on facebook or orkut or any chat service, there is only one way: Just invite or ping him for a chat and while chat is ON open ‘Command Prompt‘ on your PC (Start &amp;gt;Run&amp;gt;cmd).&lt;/div&gt;
&lt;div&gt;
note: before trying this make sure you close all the other tabs in your browser. and only facebook is open. also if possible delete all the history and cache from your browser.&lt;/div&gt;
&lt;div&gt;
When command prompt opens Type the following command and hit Enter.&lt;/div&gt;
&lt;div&gt;
netstat -an&lt;/div&gt;
&lt;div&gt;
And you will get all established connections IP addresses there. Note down all the suspicious IP’s.&lt;/div&gt;
&lt;div&gt;
The Next Step is to Trace that user using his IP address.&lt;/div&gt;
&lt;div&gt;
To do so we will be using IP tracer service. Go to the below address and paste the IP address in the box that says “lookup this ip or website”. and it will show you the location of the user.&lt;/div&gt;
&lt;div&gt;
http:// www.ip-adress.co m/ip_tracer/ &amp;lt;&lt;a href="http://whatismyipaddress.com/ip-lookup" target="_blank"&gt;click here if this link dosn't worked&lt;/a&gt;&amp;gt;&lt;/div&gt;
&lt;div&gt;
It will show you all the information about that user along with his ISP and a Location in the MAP. Now in the MAP Just click on “click for big ip address location” in the big picture you can actually zoom in. and try to recognize the area. If any serious matter just note down the ISP details in that page and contact them about the IP. they will respond you.&lt;/div&gt;
&lt;div&gt;
Other netstat commands:&lt;/div&gt;
&lt;div&gt;
-a Displays all connections and listening ports.&lt;/div&gt;
&lt;div&gt;
-e Displays Ethernet statistics. This may be combined with the -s option.&lt;/div&gt;
&lt;div&gt;
-n Displays addresses and port numbers in numerical form.&lt;/div&gt;
&lt;div&gt;
-p proto Shows connections for the protocol specified by proto; proto may be TCP or UDP.&lt;/div&gt;
&lt;div&gt;
-s option to display per-protocol statistics, proto may be TCP, UDP, or IP.&lt;/div&gt;
&lt;div&gt;
-r Displays the routing table.&lt;/div&gt;
&lt;div&gt;
-s Displays per-protocol statistics. By default, statistics are shown for TCP, UDP and IP; the&lt;/div&gt;
&lt;div&gt;
-p option may be used to specify a subset of the default.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjGex1WtpeeaN5wEVHUQx_8bZ7AO-l-f5f7nDL22gxYC3p5KowHTAnxNRMb_AeNdCzw-n2ktUBHQ_yFs2eT-PCNWAXGjcg-UCxdPQhCgDuZU_SQ9_8sxU38lIH7j4311KpU_i2SRF8lS-Mz/s72-c/How+to+trace+friends+location+in+facebook.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Browser Cookies </title><link>https://psychocyborg.blogspot.com/2016/08/browser-cookies.html</link><category>Browser</category><category>learning</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Tue, 30 Aug 2016 19:18:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-3798901920064378183</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
We are familiar with the term “&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Cookie&lt;/span&gt;” but only a few know what exactly it is and the purpose it serves. This article will help you understand the working of different types of browser cookies in a simple and easy to follow manner.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
To begin with, a&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;cookie&lt;/span&gt;&amp;nbsp;(also known as&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;browser cookie&lt;/span&gt;,&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Internet cookie&lt;/span&gt;,&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;web cookie&lt;/span&gt;&amp;nbsp;or&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;HTTP cookie&lt;/span&gt;) is a small piece of data that websites store on your hard disk in the form of a text file. Cookies allow websites to store specific information helpful to remember each visitor uniquely. A cookie is set when the user visits a particular website for the first time. Thereafter, each time the user loads the website the browser sends the cookie back to the web server so that it can keep track of the user’s previous activity.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Purpose of Browser Cookies:&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoVUn-vpNi8FR4ARfUD-bM23-WGURoY8D7HcUHaCAla-_AHi8qKOsy7Wd5t7gDdhRNkZNuen54Wy_DgxAy0zDsVH688ZSKX_wX75ih3To5jQ9iSF2b5oUwkVcMytz-6OmnF8Vy8rKxm14G/s1600/set_get_cookies_using_jquery.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoVUn-vpNi8FR4ARfUD-bM23-WGURoY8D7HcUHaCAla-_AHi8qKOsy7Wd5t7gDdhRNkZNuen54Wy_DgxAy0zDsVH688ZSKX_wX75ih3To5jQ9iSF2b5oUwkVcMytz-6OmnF8Vy8rKxm14G/s1600/set_get_cookies_using_jquery.jpg" /&gt;&lt;/a&gt;The following are some of the common purposes served by cookies:&lt;/div&gt;
&lt;ul style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Enable automatic user log-in thereby eliminating the need for a password input&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Enhance user experience by storing user preferences so that the site can look different for each visitor&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Keep track of items in the shopping cart&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Record user’s activity such as browsing history, click patterns, page visits and so on&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Types of Browser Cookies:&lt;/span&gt;&lt;/h3&gt;
&lt;h4 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Session Cookie&lt;/span&gt;&lt;/h4&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Since web pages have no memories, a visitor navigating to a different page on the same website is treated as an entirely new visitor. This is where&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;session cookies&lt;/span&gt;&amp;nbsp;come in handy. It makes it possible for the website to keep track of the user from page to page so that user specific information such as shopping cart data, account details and other preferences are not lost during navigation.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
A session cookie is stored in the temporary memory while the user is on the website. If no expiry date is specified during its creation, session cookies are normally deleted by the browsers upon closure.&lt;/div&gt;
&lt;h4 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Persistent Cookie&lt;/span&gt;&lt;/h4&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
A&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;persistent cookie&lt;/span&gt;&amp;nbsp;facilitates websites to track user settings and information when they visit the same website in the future. Unlike most session cookies, a persistent cookie does not get deleted upon browser closure. This makes it possible for the websites to easily authenticate users upon revisits without having to login again. In addition, persistent cookies&lt;/div&gt;
help enhance user experience by storing their previous inputs such as language selection, themes and menu preferences.&lt;br /&gt;
&lt;h4 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Secure Cookie&lt;/span&gt;&lt;/h4&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
A&amp;nbsp;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;secure cookie&lt;/span&gt;&amp;nbsp;has a secure attribute enabled so that its content gets encrypted every time it moves between the web server and the browser. This cookie is used only in the&amp;nbsp;HTTPS mode&amp;nbsp;and thus offers protection against cookie theft.&lt;/div&gt;
&lt;h4 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Third-Party Cookie&lt;/span&gt;&lt;/h4&gt;
&lt;div style="background-color: white; box-sizing: border-box; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;&lt;span style="color: red;"&gt;Third-party cookies&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222;"&gt;&amp;nbsp;are those that originate from a website other than the one that you are currently using. For example, when you visit a website&amp;nbsp;&lt;/span&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;&lt;span style="color: red;"&gt;www.abc.com&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222;"&gt;, all the cookies that come from this website are called&amp;nbsp;&lt;/span&gt;&lt;em style="box-sizing: border-box; color: #222222;"&gt;first-party&lt;/em&gt;&lt;span style="color: #222222;"&gt;&amp;nbsp;cookies. Suppose, if this website (www.abc.com) is running an advertisement on its page from a third party website&amp;nbsp;&lt;/span&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;&lt;span style="color: red;"&gt;www.xyz.com&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #222222;"&gt;, then the cookie that originates from this website (www.xyz.com) is referred to as a&amp;nbsp;&lt;/span&gt;&lt;em style="box-sizing: border-box; color: #222222;"&gt;third-party&lt;/em&gt;&lt;span style="color: #222222;"&gt;&amp;nbsp;cookie.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Structure of a Cookie&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
A cookie is comprised of the following seven components:&lt;/div&gt;
&lt;ol style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Name of the cookie&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Value/Content of the cookie&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Domain associated with the cookie&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Path for which the cookie is valid&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Attribute to specify whether the cookie requires a secure connection&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Attribute specifying whether the cookie can be accessed by a script&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: decimal; padding-bottom: 18px; text-align: justify;"&gt;Expiry information of the cookie&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Drawbacks of Cookies&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Even though cookies make our lives easier on the Internet, they come with drawbacks as well. Some of the major ones are listed below:&lt;/div&gt;
&lt;ul style="background-color: white; box-sizing: border-box; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;span style="color: red;"&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Shared Machines&lt;/span&gt;:&lt;/span&gt;&lt;span style="color: #222222;"&gt; Most people share their computers with their friends and family. As a result, a cookie set during the usage of one user may not be appropriate for the other user using the same machine. For example, when a new user revisits a shopping website such as amazon.com, he/she will be presented with all the information belonging to the previous user such as order details, shipping address and other personal preferences. This may cause annoyance to the new user as he/she may be required to change all the preferences once again to match personal requirements. Additionally, the exposure of previous user’s preferences and settings to the new user may raise security issues.&lt;/span&gt;&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;span style="color: red;"&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;Accidental Deletion&lt;/span&gt;:&lt;/span&gt;&lt;span style="color: #222222;"&gt; In many cases, cookies can get erased accidentally when you clear your browsing history or use a third party cookie cleaner program. When this happens all your stored settings and preference gets lost and the website treats you as a completely new user.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="background-color: white; box-sizing: border-box; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 28.8px; margin: 0px 0px 17px;"&gt;
&lt;span style="color: blue;"&gt;Privacy Issues&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Since cookies are capable of tracking a number of user specific information such as online behavior and personal preferences, they can be used to hamper the privacy of users. A website may use cookie information to display related advertising products based on your previous purchase. For example, Google often stores and uses your search keywords to display matching advertisements on all its partner network. Some sites are also known to have engaged in selling the cookie data to third parties which seriously hurts the privacy of individuals.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgoVUn-vpNi8FR4ARfUD-bM23-WGURoY8D7HcUHaCAla-_AHi8qKOsy7Wd5t7gDdhRNkZNuen54Wy_DgxAy0zDsVH688ZSKX_wX75ih3To5jQ9iSF2b5oUwkVcMytz-6OmnF8Vy8rKxm14G/s72-c/set_get_cookies_using_jquery.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Viruses, Trojans, Worms and Malware.</title><link>https://psychocyborg.blogspot.com/2016/08/viruses-trojans-worms-and-malware.html</link><category>Intresting</category><category>learning</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 29 Aug 2016 21:15:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-932202651268012347</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div&gt;
Difference between Viruses, Trojans, Worms and Malware.&lt;/div&gt;
&lt;div&gt;
Dude it hurts too much when I see many of friends think that viruses, trojans,worms and malware that are same. they don't know a little bit about it and talk about them every time like &amp;lt;are yaaar meri windows ud gayi i think teri pendrive me malware tha &amp;gt; &amp;nbsp;so we are here with a strong diffrence between Viruses, Trojans, Worms and Malware&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
I. What is Malware?&lt;/div&gt;
&lt;div&gt;
The word Malware is short for malicious software, and is a&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFpkaOZxX4S5_9xYfp-ZTB-i4527IyLstvP0uyZjus4h51uijbsunrg9tWXFliPrsXnei6iqZPooNtlE8HAqTMnQ3j8x3RQwT8vMHfK2BPDknH21c_y2ERLL2FKOTiHD6jbKEVAO3DSIvh/s1600/download+%25281%2529.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFpkaOZxX4S5_9xYfp-ZTB-i4527IyLstvP0uyZjus4h51uijbsunrg9tWXFliPrsXnei6iqZPooNtlE8HAqTMnQ3j8x3RQwT8vMHfK2BPDknH21c_y2ERLL2FKOTiHD6jbKEVAO3DSIvh/s1600/download+%25281%2529.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
general term used to describe all of the viruses, worms,&lt;/div&gt;
&lt;div&gt;
spyware, and pretty much anything that is specifically&lt;/div&gt;
&lt;div&gt;
designed to cause harm to your PC or steal your&lt;/div&gt;
&lt;div&gt;
information.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
II. Viruses --&amp;gt; Wreak Havoc On Your Files. The term computer virus is often used interchangeably&lt;/div&gt;
&lt;div&gt;
with malware, though the two don’t actually have thesame meaning. In the strictest sense, a virus is a programthat copies itself and infects a PC, spreading from one fileto another, and then from one PC to another when the files are copied or shared.Most viruses attach themselves to executable files, but&lt;/div&gt;
&lt;div&gt;
some can target a master boot record, autorun scripts, MS Office macros, or even in some cases, arbitrary files. Many of these viruses, like CIH, are designed to render your PCcompletely inoperable, while others simply delete or corrupt your files—the general point is that a virus is designed to cause havoc and break stuff. You can protect yourself from viruses by making certain&lt;/div&gt;
&lt;div&gt;
your antivirus application is always updated with the latest definitions and avoiding suspicious looking files coming through email or otherwise. Pay special attention to the filename—if the file is supposed to be an mp3, and the name ends in .mp3.exe, you’re dealing with a virus.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
III. Spyware --&amp;gt; Steals Your Information Spyware is any software installed on your PC that collects&lt;/div&gt;
&lt;div&gt;
your information without your knowledge, and sends that information back to the creator so they can use your personal information in some nefarious way. This could include keylogging to learn your passwords, watching your searching habits, changing out your browser home and search pages, adding obnoxious browser toolbars, or just stealing your passwords and credit card numbers.&lt;/div&gt;
&lt;div&gt;
Since spyware is primarily meant to make money at your expense, it doesn’t usually kill your PC—in fact, many people have spyware running without even realizing it, but generally those that have one spyware application installed also have a dozen more. Once you’ve got that many pieces of software spying on you, your PC is going to become slow. What many people don’t realize about spyware is that not every antivirus software is designed to catch spyware. You should check with the vendor to make sure the application you are using to protect you from malware is actually checking for spyware as well. If you come across a PC that is already heavily infected, run a combination of MalwareBytes and SuperAntiSpyware to clean it thoroughly.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
IV. Trojan Horses --&amp;gt; Install a Backdoor Trojan horses are applications that look like they are doing&lt;/div&gt;
&lt;div&gt;
something innocuous, but secretly have malicious code that does something else. In many cases, trojans will create a backdoor that allows your PC to be remotely controlled, either directly or as part of a botnet—a network of computers also infected with a trojan or other malicious software. The major difference between a virus and a trojan is that trojans don’t replicate themselves—they must be installed by an unwitting user. Once your PC has been infected with the trojan, it can be used for any number of nefarious purposes, like a denial of service (DoS) attack against a web site, a proxy server for concealing attacks, or even worse—for sending out buckets of spam. Protection against trojans works the same way as viruses—make sure that your antivirus application is up to date, don’t open suspicious attachments, and think long and hard before you try and use a downloaded crack for Photoshop—that’s one of malware authors’ favorite spots to hide a trojan.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
V. Worms --&amp;gt; Infect Through the Network Computer worms use the network to send copies of&lt;/div&gt;
&lt;div&gt;
themselves to other PCs, usually utilizing a security hole to travel from one host to the next, often automatically without user intervention. Because they can spread so rapidly across a network, infecting every PC in their path, they tend to be the most well-known type of malware, although many users still mistakenly refer to them as viruses. Because worms often exploit a network vulnerability, they are the one type of malware that can be partially prevented by making sure your firewall is enabled and locked down.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFpkaOZxX4S5_9xYfp-ZTB-i4527IyLstvP0uyZjus4h51uijbsunrg9tWXFliPrsXnei6iqZPooNtlE8HAqTMnQ3j8x3RQwT8vMHfK2BPDknH21c_y2ERLL2FKOTiHD6jbKEVAO3DSIvh/s72-c/download+%25281%2529.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>HOW TO CREATE LOGIC BOMB</title><link>https://psychocyborg.blogspot.com/2016/08/how-to-create-logic-bomb.html</link><category>hacks</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 29 Aug 2016 11:52:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-7405707465466317059</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
VIRUS Its Just too easy to create, just follow the below steps.&lt;br /&gt;
&lt;br /&gt;
1. Open Notepad on your PC and write this Code into it.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp; &amp;nbsp; "%0|%0"&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Ws7-lctNEsoMwFyNvJcdhOPhyphenhyphenFumFKZemcPXLKvLBKW87QBnmvVCLGp0Nvz8ddSXMlqNmRfgpny5fXLYA5m2k5DqVavDu_t0yMN2IH5_1VaqybBNZ8UMImE93s3rsTKnI1uuHENjAkg1/s1600/download+%25282%2529.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Ws7-lctNEsoMwFyNvJcdhOPhyphenhyphenFumFKZemcPXLKvLBKW87QBnmvVCLGp0Nvz8ddSXMlqNmRfgpny5fXLYA5m2k5DqVavDu_t0yMN2IH5_1VaqybBNZ8UMImE93s3rsTKnI1uuHENjAkg1/s1600/download+%25282%2529.jpg" /&gt;&lt;/a&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; or copy it from here to your Notepad&lt;br /&gt;
&lt;br /&gt;
2. Then save it with a .bat extension! When saving delete&lt;br /&gt;
the .txt and input the File name and the .bat extension e.g&lt;br /&gt;
logic.bat&lt;br /&gt;
&lt;br /&gt;
3. Once anyone will do double click on this bat file, his system will Jam and Crash.&lt;br /&gt;
NOTE:&lt;br /&gt;
Now you can send it to your Victim through Mail or from your&lt;br /&gt;
Flash Drive to his PC and then once he open the File, the action will start.&lt;br /&gt;
SOLUTION OR PREVENTION MEASURE TO TAKE&lt;br /&gt;
Due to members comments asking for Solution and the Way&lt;br /&gt;
to Prevent this Attack, We have listed this 2 Reliable Ways to&lt;br /&gt;
conquer it. not open any File with .bat on your PC.&lt;br /&gt;
If you are already a victim of thisVirus, Once you ON your PC,&lt;br /&gt;
quickly Press CTL + ALT + Delete&lt;br /&gt;
key on your keyboard then Start the Task Manager, Now click on&lt;br /&gt;
the Processes Tab and locate "Fork.bat" or anyname you Use,&lt;br /&gt;
then put you mouse on it and click on the End Process Button,&lt;br /&gt;
thats all.&lt;br /&gt;
&lt;br /&gt;
"NOTE:THIS TUTORIAL IS FOR EDUCATIONAL PURPOSE ONLY."&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8Ws7-lctNEsoMwFyNvJcdhOPhyphenhyphenFumFKZemcPXLKvLBKW87QBnmvVCLGp0Nvz8ddSXMlqNmRfgpny5fXLYA5m2k5DqVavDu_t0yMN2IH5_1VaqybBNZ8UMImE93s3rsTKnI1uuHENjAkg1/s72-c/download+%25282%2529.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title> BASICS OF HACKING</title><link>https://psychocyborg.blogspot.com/2016/08/basics-of-hacking.html</link><category>hacks</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 29 Aug 2016 11:50:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-9101369125228947754</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
Hacker means someone who finds weaknesses in a computer or computer network, though the term can also refer to someone with an advanced understanding of computers and computer networks.Hackers may be motivated by a multitude of reasons, such as profit, protest, or challenge. The subculture that has evolved around hackers is often referred to as the computer underground but it is now an open community. While other uses of the word hacker exist that are not related to computer security, they are rarely used in mainstream context.&lt;br /&gt;
&lt;br /&gt;
Classifications:-&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8QKVWH1V-hT07SC13j5FLD7B3r7_nb09dbkUz2-4PoCA28r3tDMiM4fEa_YH8vUam6ihVymKLnc6kFT3CfjO-HcoR3nq3HC5fhaGH5-c_PArvRzJBGNhGQNhyphenhyphen-pZtzBEzQzM7R0Vfbei/s1600/download.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="266" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8QKVWH1V-hT07SC13j5FLD7B3r7_nb09dbkUz2-4PoCA28r3tDMiM4fEa_YH8vUam6ihVymKLnc6kFT3CfjO-HcoR3nq3HC5fhaGH5-c_PArvRzJBGNhGQNhyphenhyphen-pZtzBEzQzM7R0Vfbei/s400/download.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree. Eric S. Raymond (author of The New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers and even try to include the views of Raymond in what they see as one wider hacker culture, a view harshly rejected by Raymond himself. Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as white hat, grey hat, black hat and script kiddie.&lt;br /&gt;
White hat:-&lt;br /&gt;
&lt;br /&gt;
A white hat hacker breaks security for non-malicious reasons, perhaps to test their own security system or while working for a security company which makes security software. The term "white hat" in Internet slang refers to an ethical hacker. This classification also includes individuals who perform penetration tests and vulnerability assessments within a contractual agreement. The EC-Council , also known as the International Council of Electronic Commerce Consultants has developed certifications, course ware, classes, and online training covering the diverse arena of Ethical Hacking.&lt;br /&gt;
Black hat:-&lt;br /&gt;
&lt;br /&gt;
A "black hat" hacker is a hacker who "violates computer security for little reason beyond maliciousness or for personal gain" (Moore, 2005). Black hat hackers form the stereotypical, illegal hacking groups often portrayed in popular culture, and are "the epitome of all that the public fears in a computer criminal". Black hat hackers break into secure networks to destroy data or make the network unusable for those who are authorized to use the network.&lt;br /&gt;
Part 1: Targeting&lt;br /&gt;
&lt;br /&gt;
The hacker determines what network to break into during this phase. The target may be of particular interest to the hacker, either politically or personally, or it may be picked at random. Next, they will port scan a network to determine if it is vulnerable to attacks, which is just testing all ports on a host machine for a response. Open ports—those that do respond—will allow a hacker to access the system.&lt;br /&gt;
&lt;br /&gt;
Part 2: Research and Information Gathering&lt;br /&gt;
&lt;br /&gt;
It is in this stage that the hacker will visit or contact the target in some way in hopes of finding out vital information that will help them access the system. The main way that hackers get desired results from this stage is from "social engineering", which will be explained below. Aside from social engineering, hackers can also use a technique called "dumpster diving". Dumpster diving is when a hacker will literally search through users' garbage in hopes of finding documents that have been thrown away, which may contain information a hacker can use directly or indirectly, to help them gain access to a network.&lt;br /&gt;
Part 3: Finishing The Attack&lt;br /&gt;
&lt;br /&gt;
This is the stage when the hacker will invade the preliminary target that he/she was planning to attack or steal. Many "hackers" will be caught after this point, lured in or grabbed by any data also known as a honeypot (a trap set up by computer security personnel).&lt;br /&gt;
Grey hat:-&lt;br /&gt;
&lt;br /&gt;
A grey hat hacker is a combination of a Black Hat and a White Hat Hacker. A Grey Hat Hacker may surf the internet and hack into a computer system for the sole purpose of notifying the administrator that their system has been hacked, for example. Then they may offer to repair their system for a small fee.&lt;br /&gt;
Elite hacker:-&lt;br /&gt;
&lt;br /&gt;
A social status among hackers, elite is used to describe the most skilled. Newly discovered exploits will circulate among these hackers. Elite groups such as Masters of Deception conferred a kind of credibility on their members.&lt;br /&gt;
Script kiddi:-&lt;br /&gt;
&lt;br /&gt;
A script kiddie (or skiddie) is a non-expert who breaks into computer systems by using pre-packaged automated tools written by others, usually with little understanding of the underlying concept—hence the term script (i.e. a prearranged plan or set of activities) kiddie (i.e. kid, child—an individual lacking knowledge and experience, immature).&lt;br /&gt;
Neophyt:-&lt;br /&gt;
&lt;br /&gt;
A neophyte, "n00b", or "newbie" is someone who is new to hacking or phreaking and has almost no knowledge or experience of the workings of technology, and hacking.&lt;br /&gt;
Blue hat:-&lt;br /&gt;
&lt;br /&gt;
A blue hat hacker is someone outside computer security consulting firms who is used to bug test a system prior to its launch, looking for exploits so they can be closed. Microsoft also uses the term BlueHat to represent a series of security briefing events.&lt;br /&gt;
Hacktivis:-&lt;br /&gt;
&lt;br /&gt;
A hacktivist is a hacker who utilizes technology to announce a social, ideological, religious, or political message. In general, most hacktivism involves website defacement or denial-of-service attacks. Nation state Intelligence agencies and cyberwarfare operatives of nation states.&lt;br /&gt;
Attack:-&lt;br /&gt;
&lt;br /&gt;
A typical approach in an attack on Internet-connected system is:&lt;br /&gt;
&lt;br /&gt;
1. Network enumeration: Discovering information about the intended target.&lt;br /&gt;
&lt;br /&gt;
2. Vulnerability analysis: Identifying potential ways of attack.&lt;br /&gt;
&lt;br /&gt;
3. Exploitation: Attempting to compromise the system by employing the vulnerabilities found through the vulnerability analysis.&lt;br /&gt;
&lt;br /&gt;
In order to do so, there are several recurring tools of the trade and techniques used by computer criminals and security experts.&lt;br /&gt;
Security exploit:-&lt;br /&gt;
&lt;br /&gt;
A security exploit is a prepared application that takes advantage of a known weakness. Common examples of security exploits are SQL injection, Cross Site Scripting and Cross Site Request Forgery which abuse security holes that may result from substandard programming practice. Other exploits would be able to be used through FTP, HTTP, PHP, SSH, Telnet and some web-pages. These are very common in website/domain hacking.&lt;br /&gt;
Techniques&lt;br /&gt;
&lt;br /&gt;
Vulnerability scanner:-&lt;br /&gt;
&lt;br /&gt;
A vulnerability scanner is a tool used to quickly check computers on a network for known weaknesses.Hackers also commonly use port scanners. These check to see which ports on a specified computer are "open" or available to access the computer, and sometimes will detect what program or service is listening on that port, and its version number. (Note that firewalls defend computers from intruders by limiting access to ports/machines both inbound and outbound, but can still be circumvented.)&lt;br /&gt;
Password cracking:-&lt;br /&gt;
&lt;br /&gt;
Password cracking is the process of recovering passwords from data that has been stored in or transmitted by a computer system. A common approach is to repeatedly try guesses for the password.&lt;br /&gt;
&lt;br /&gt;
Packet sniffer:-&lt;br /&gt;
&lt;br /&gt;
A packet sniffer is an application that captures data packets, which can be used to capture passwords and other data in transit over the network.&lt;br /&gt;
Spoofing attack (Phishing):-&lt;br /&gt;
&lt;br /&gt;
A spoofing attack involves one program, system, or website successfully masquerading as another by falsifying data and thereby being treated as a trusted system by a user or another program. The purpose of this is usually to fool programs, systems, or users into revealing confidential information, such as user names and passwords, to the attacker.&lt;br /&gt;
Rootkit:-&lt;br /&gt;
&lt;br /&gt;
A rootkit is designed to conceal the compromise of a computer's security, and can represent any of a set of programs which work to subvert control of an operating system from its legitimate operators. Usually, a rootkit will obscure its installation and attempt to prevent its removal through a subversion of standard system security. Rootkits may include replacements for system binaries so that it becomes impossible for the legitimate user to detect the presence of the intruder on the system by looking at process tables.&lt;br /&gt;
Social engineering:-&lt;br /&gt;
&lt;br /&gt;
When a Hacker, typically a black hat, is in the second stage of the targeting process, he or she will typically use some social engineering tactics to get enough information to access the network. A common practice for hackers who use this technique, is to contact the system administrator and play the role of a user who cannot get access to his or her system.&lt;br /&gt;
Trojan horses:-&lt;br /&gt;
&lt;br /&gt;
A Trojan horse is a program which seems to be doing one thing, but is actually doing another. A trojan horse can be used to set up a back door in a computer system such that the intruder can gain access later. (The name refers to the horse from the Trojan War, with conceptually similar function of deceiving defenders into bringing an intruder inside.)&lt;br /&gt;
Viruses:-&lt;br /&gt;
&lt;br /&gt;
A virus is a self-replicating program that spreads by inserting copies of itself into other executable code or documents. Therefore, a computer virus behaves in a way similar to a biological virus, which spreads by inserting itself into living cells. While some are harmless or mere hoaxes most computer viruses are considered malicious.&lt;br /&gt;
Worm:-&lt;br /&gt;
&lt;br /&gt;
Like a virus, a worm is also a self-replicating program. A worm differs from a virus in that it propagates through computer networks without user intervention. Unlike a virus, it does not need to attach itself to an existing program. Many people conflate the terms "virus" and "worm", using them both to describe any self-propagating program.&lt;br /&gt;
&lt;br /&gt;
Key loggers:-&lt;br /&gt;
&lt;br /&gt;
A key logger is a tool designed to record ('log') every keystroke on an affected machine for later retrieval. Its purpose is usually to allow the user of this tool to gain access to confidential information typed on the affected machine, such as a user's password or other private data. Some key loggers uses virus-, trojan-, and rootkit-like methods to remain active and hidden. However, some key loggers are used in legitimate ways and sometimes to even enhance computer security. As an example, a business might have a key logger on a computer used at a point of sale and data collected by the key logger could be used for catching employee fraud.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgy8QKVWH1V-hT07SC13j5FLD7B3r7_nb09dbkUz2-4PoCA28r3tDMiM4fEa_YH8vUam6ihVymKLnc6kFT3CfjO-HcoR3nq3HC5fhaGH5-c_PArvRzJBGNhGQNhyphenhyphen-pZtzBEzQzM7R0Vfbei/s72-c/download.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Beep Code Manual</title><link>https://psychocyborg.blogspot.com/2016/08/beep-code-manual.html</link><category>hacks</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Mon, 29 Aug 2016 11:49:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-3350672783669306581</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
BIOS Beep Codes&lt;br /&gt;
&lt;br /&gt;
When a computer is first turned on, or rebooted, its BIOS performs a power-on self test (POST) to test the system's hardware, checking to make sure that all of the system's hardware components are working properly. Under normal circumstances, the POST will display an error message; however, if the BIOS detects an error before it can access the video card, or if there is a problem with the video card, it will produce a series of beeps, and the pattern of the beeps indicates what kind of problem the BIOS has detected.&lt;br /&gt;
Because there are many brands of BIOS, there are no standard beep codes for every BIOS.&lt;br /&gt;
&lt;br /&gt;
The two most-used brands are AMI (American Megatrends International) and Phoenix.&lt;br /&gt;
&lt;br /&gt;
Below are listed the beep codes for AMI systems, and here are the beep codes for Phoenix systems.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
AMI Beep Codes&lt;br /&gt;
&lt;br /&gt;
Beep Code Meaning&lt;br /&gt;
1 beep DRAM refresh failure. There is a problem in the system memory or the motherboard.&lt;br /&gt;
2 beeps Memory parity error. The parity circuit is not working properly.&lt;br /&gt;
3 beeps Base 64K RAM failure. There is a problem with the first 64K of system memory.&lt;br /&gt;
4 beeps System timer not operational. There is problem with the timer(s) that control functions on the motherboard.&lt;br /&gt;
5 beeps Processor failure. The system CPU has failed.&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIXejjmXzWWR9iu7YSZc1YaQ5kQ35uvr0BICT8ZAxed3K9ozItaf9ZAQElyOF9IPF1Cgzvql7z3HDo0BSVlAJ16lavY5LyDeK4YdxcAxbgX786jcIeZfkzDRSaz11fIQuyjtMdjMNGyDfb/s1600/images.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIXejjmXzWWR9iu7YSZc1YaQ5kQ35uvr0BICT8ZAxed3K9ozItaf9ZAQElyOF9IPF1Cgzvql7z3HDo0BSVlAJ16lavY5LyDeK4YdxcAxbgX786jcIeZfkzDRSaz11fIQuyjtMdjMNGyDfb/s1600/images.jpg" /&gt;&lt;/a&gt;6 beeps Gate A20/keyboard controller failure. The keyboard IC controller has failed, preventing gate A20 from switching the processor to protect mode.&lt;br /&gt;
7 beeps Virtual mode exception error.&lt;br /&gt;
8 beeps Video memory error. The BIOS cannot write to the frame buffer memory on the video card.&lt;br /&gt;
9 beeps ROM checksum error. The BIOS ROM chip on the motherboard is likely faulty.&lt;br /&gt;
10 beeps CMOS checksum error. Something on the motherboard is causing an error when trying to interact with the CMOS.&lt;br /&gt;
11 beeps Bad cache memory. An error in the level 2 cache memory.&lt;br /&gt;
1 long beep, 2 short Failure in the video system.&lt;br /&gt;
1 long beep, 3 short A failure has been detected in memory above 64K.&lt;br /&gt;
1 long beep, 8 short Display test failure.&lt;br /&gt;
Continuous beeping A problem with the memory or video.&lt;br /&gt;
BIOS Beep Codes&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Phoenix Beep Codes&lt;br /&gt;
&lt;br /&gt;
Phoenix uses sequences of beeps to indicate problems. The "-" between each number below indicates a pause between each beep sequence. For example, 1-2-3 indicates one beep, followed by a pause and two beeps, followed by a pause and three beeps. Phoenix version before 4.x use 3-beep codes, while Phoenix versions starting with 4.x use 4-beep codes. Click here for AMI BIOS beep codes.&lt;br /&gt;
4-Beep Codes&lt;br /&gt;
Beep Code Meaning&lt;br /&gt;
1-1-1-3 Faulty CPU/motherboard. Verify real mode.&lt;br /&gt;
1-1-2-1 Faulty CPU/motherboard.&lt;br /&gt;
1-1-2-3 Faulty motherboard or one of its components.&lt;br /&gt;
1-1-3-1 Faulty motherboard or one of its components. Initialize chipset registers with initial POST values.&lt;br /&gt;
1-1-3-2 Faulty motherboard or one of its components.&lt;br /&gt;
1-1-3-3 Faulty motherboard or one of its components. Initialize CPU registers.&lt;br /&gt;
1-1-3-2&lt;br /&gt;
1-1-3-3&lt;br /&gt;
1-1-3-4 Failure in the first 64K of memory.&lt;br /&gt;
1-1-4-1 Level 2 cache error.&lt;br /&gt;
1-1-4-3 I/O port error.&lt;br /&gt;
1-2-1-1 Power management error.&lt;br /&gt;
1-2-1-2&lt;br /&gt;
1-2-1-3 Faulty motherboard or one of its components.&lt;br /&gt;
1-2-2-1 Keyboard controller failure.&lt;br /&gt;
1-2-2-3 BIOS ROM error.&lt;br /&gt;
1-2-3-1 System timer error.&lt;br /&gt;
1-2-3-3 DMA error.&lt;br /&gt;
1-2-4-1 IRQ controller error.&lt;br /&gt;
1-3-1-1 DRAM refresh error.&lt;br /&gt;
1-3-1-3 A20 gate failure.&lt;br /&gt;
1-3-2-1 Faulty motherboard or one of its components.&lt;br /&gt;
1-3-3-1 Extended memory error.&lt;br /&gt;
1-3-3-3&lt;br /&gt;
1-3-4-1&lt;br /&gt;
1-3-4-3 Error in first 1MB of system memory.&lt;br /&gt;
1-4-1-3&lt;br /&gt;
1-4-2-4 CPU error.&lt;br /&gt;
1-4-3-1&lt;br /&gt;
2-1-4-1 BIOS ROM shadow error.&lt;br /&gt;
1-4-3-2&lt;br /&gt;
1-4-3-3 Level 2 cache error.&lt;br /&gt;
1-4-4-1&lt;br /&gt;
1-4-4-2&lt;br /&gt;
2-1-1-1 Faulty motherboard or one of its components.&lt;br /&gt;
2-1-1-3&lt;br /&gt;
2-1-2-1 IRQ failure.&lt;br /&gt;
2-1-2-3 BIOS ROM error.&lt;br /&gt;
2-1-2-4&lt;br /&gt;
2-1-3-2 I/O port failure.&lt;br /&gt;
2-1-3-1&lt;br /&gt;
2-1-3-3 Video system failure.&lt;br /&gt;
2-1-1-3&lt;br /&gt;
2-1-2-1 IRQ failure.&lt;br /&gt;
2-1-2-3 BIOS ROM error.&lt;br /&gt;
2-1-2-4 I/O port failure.&lt;br /&gt;
2-1-4-3&lt;br /&gt;
2-2-1-1 Video card failure.&lt;br /&gt;
2-2-1-3&lt;br /&gt;
2-2-2-1&lt;br /&gt;
2-2-2-3 Keyboard controller failure.&lt;br /&gt;
2-2-3-1 IRQ error.&lt;br /&gt;
2-2-4-1 Error in first 1MB of system memory.&lt;br /&gt;
2-3-1-1&lt;br /&gt;
2-3-3-3 Extended memory failure.&lt;br /&gt;
2-3-2-1 Faulty motherboard or one of its components.&lt;br /&gt;
2-3-2-3&lt;br /&gt;
2-3-3-1 Level 2 cache error.&lt;br /&gt;
2-3-4-1&lt;br /&gt;
2-3-4-3 Motherboard or video card failure.&lt;br /&gt;
2-3-4-1&lt;br /&gt;
2-3-4-3&lt;br /&gt;
2-4-1-1 Motherboard or video card failure.&lt;br /&gt;
2-4-1-3 Faulty motherboard or one of its components.&lt;br /&gt;
2-4-2-1 RTC error.&lt;br /&gt;
2-4-2-3 Keyboard controller error.&lt;br /&gt;
2-4-4-1 IRQ error.&lt;br /&gt;
3-1-1-1&lt;br /&gt;
3-1-1-3&lt;br /&gt;
3-1-2-1&lt;br /&gt;
3-1-2-3 I/O port error.&lt;br /&gt;
3-1-3-1&lt;br /&gt;
3-1-3-3 Faulty motherboard or one of its components.&lt;br /&gt;
3-1-4-1&lt;br /&gt;
3-2-1-1&lt;br /&gt;
3-2-1-2 Floppy drive or hard drive failure.&lt;br /&gt;
3-2-1-3 Faulty motherboard or one of its components.&lt;br /&gt;
3-2-2-1 Keyboard controller error.&lt;br /&gt;
3-2-2-3&lt;br /&gt;
3-2-3-1&lt;br /&gt;
3-2-4-1 Faulty motherboard or one of its components.&lt;br /&gt;
3-2-4-3 IRQ error.&lt;br /&gt;
3-3-1-1 RTC error.&lt;br /&gt;
3-3-1-3 Key lock error.&lt;br /&gt;
3-3-3-3 Faulty motherboard or one of its components.&lt;br /&gt;
3-3-3-3&lt;br /&gt;
3-3-4-1&lt;br /&gt;
3-3-4-3&lt;br /&gt;
3-4-1-1&lt;br /&gt;
3-4-1-3&lt;br /&gt;
3-4-2-1&lt;br /&gt;
3-4-2-3&lt;br /&gt;
3-4-3-1&lt;br /&gt;
3-4-4-1&lt;br /&gt;
3-4-4-4 Faulty motherboard or one of its components.&lt;br /&gt;
4-1-1-1 Floppy drive or hard drive failure.&lt;br /&gt;
4-2-1-1&lt;br /&gt;
4-2-1-3&lt;br /&gt;
4-2-2-1 IRQ failure.&lt;br /&gt;
4-2-2-3&lt;br /&gt;
4-2-3-1&lt;br /&gt;
4-2-3-3&lt;br /&gt;
4-2-4-1 Faulty motherboard or one of its components.&lt;br /&gt;
4-2-4-3 Keyboard controller error.&lt;br /&gt;
4-3-1-3&lt;br /&gt;
4-3-1-4&lt;br /&gt;
4-3-2-1&lt;br /&gt;
4-3-2-2&lt;br /&gt;
4-3-3-1&lt;br /&gt;
4-3-4-1&lt;br /&gt;
4-3-4-3 Faulty motherboard or one of its components.&lt;br /&gt;
4-3-3-2&lt;br /&gt;
4-3-3-4 IRQ failure.&lt;br /&gt;
4-3-3-3&lt;br /&gt;
4-3-4-2 Floppy drive or hard drive failure.&lt;br /&gt;
3-Beep Codes&lt;br /&gt;
Beep Code Meaning&lt;br /&gt;
1-1-2 Faulty CPU/motherboard.&lt;br /&gt;
1-1-3 Faulty motherboard/CMOS read-write failure.&lt;br /&gt;
1-1-4 Faulty BIOS/BIOS ROM checksum error.&lt;br /&gt;
1-2-1 System timer not operational. There is a problem with the timer(s) that control functions on the motherboard.&lt;br /&gt;
1-2-2&lt;br /&gt;
1-2-3 Faulty motherboard/DMA failure.&lt;br /&gt;
1-3-1 Memory refresh failure.&lt;br /&gt;
1-3-2&lt;br /&gt;
1-3-3&lt;br /&gt;
1-3-4 Failure in the first 64K of memory.&lt;br /&gt;
1-4-1 Address line failure.&lt;br /&gt;
1-4-2 Parity RAM failure.&lt;br /&gt;
1-4-3 Timer failure.&lt;br /&gt;
1-4-4 NMI port failure.&lt;br /&gt;
2-_-_ Any combination of beeps after 2 indicates a failure in the first 64K of memory.&lt;br /&gt;
3-1-1 Master DMA failure.&lt;br /&gt;
3-1-2 Slave DMA failure.&lt;br /&gt;
3-1-3&lt;br /&gt;
3-1-4 Interrupt controller failure.&lt;br /&gt;
3-2-4 Keyboard controller failure.&lt;br /&gt;
3-3-1&lt;br /&gt;
3-3-2 CMOS error.&lt;br /&gt;
3-3-4 Video card failure.&lt;br /&gt;
3-4-1 Video card failure.&lt;br /&gt;
4-2-1 Timer failure.&lt;br /&gt;
4-2-2 CMOS shutdown failure.&lt;br /&gt;
4-2-3 Gate A20 failure.&lt;br /&gt;
4-2-4 Unexpected interrupt in protected mode.&lt;br /&gt;
4-3-1 RAM test failure.&lt;br /&gt;
4-3-3 Timer failure.&lt;br /&gt;
4-3-4 Time of day clock failure.&lt;br /&gt;
4-4-1 Serial port failure.&lt;br /&gt;
4-4-2 Parallel port failure.&lt;br /&gt;
4-4-3 Math coprocessor.&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIXejjmXzWWR9iu7YSZc1YaQ5kQ35uvr0BICT8ZAxed3K9ozItaf9ZAQElyOF9IPF1Cgzvql7z3HDo0BSVlAJ16lavY5LyDeK4YdxcAxbgX786jcIeZfkzDRSaz11fIQuyjtMdjMNGyDfb/s72-c/images.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title> Change Your IP Address</title><link>https://psychocyborg.blogspot.com/2016/08/change-your-ip-address.html</link><category>hacks</category><category>Intresting</category><category>learning</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 27 Aug 2016 07:19:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-6978934082912442887</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;header class="entry-header" style="box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px; margin-bottom: 25px;"&gt;&lt;h1 class="entry-title" itemprop="headline" style="border-top: 1px solid rgb(199, 161, 94); box-sizing: border-box; color: #111111; font-family: Inconsolata, sans-serif; font-size: 36px; letter-spacing: -1px; line-height: 1.2; margin: 0px 0px 15px; padding-top: 10px;"&gt;
&lt;/h1&gt;
&lt;div class="feat-img" style="box-sizing: border-box;"&gt;
&lt;/div&gt;
&lt;div class="entry-meta" style="box-sizing: border-box; padding: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/header&gt;&lt;br /&gt;
&lt;div class="entry-content" itemprop="text" style="box-sizing: border-box; color: #222222; font-family: &amp;quot;Open Sans&amp;quot;, sans-serif; font-size: 16px; letter-spacing: 0.7px; line-height: 28.8px;"&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Every time you connect to the Internet, your ISP (Internet Service Provider) assigns an IP address to your computer that makes it possible for websites and applications to keep track of your online activities and also pin point your physical location. Therefore, in order to protect your Internet privacy, it is often necessary to change your IP address.&lt;/div&gt;
&lt;h2 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 30px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
Ways to Change IP Address&lt;/h2&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
The following are some of the possible ways to change IP address of your computer:&lt;/div&gt;
&lt;h3 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
1. Using a VPN: Best Way to Change IP Address&lt;/h3&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEiDH4DaA75Xw03YdcxUIk8vZfwEgOmGGDg4wUh2g_WDw5drXnFB4cO3RHN0YyD652LuHkWlqqgkdUhivXha7SR4jlIVaGaMywdX-vJuuTFKeqbl_lbkmlnUztfq8hbtIA34gEuYZX3XocN_5ztDDLfOD9Kkfoh40u6onQWkwB_q7Y4eChwNY5bc32oFhW3JGO2h=" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="Change IP Address" border="0" class="alignnone" height="173" src="https://www.gohacking.com/wp-content/uploads/2016/01/change-ip-address-735x400.jpg" style="border: 0px; box-sizing: border-box; height: auto; max-width: 100%;" width="320" /&gt;&lt;/a&gt;Even though there are several methods to change your IP address, using a VPN proxy is by far the best and most secure way. The following are some of the most popular VPN proxies that most Internet users prefer:&lt;/div&gt;
&lt;hr style="box-sizing: content-box; height: 0px; margin-bottom: 25px;" /&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
1.&amp;nbsp;&lt;span style="box-sizing: border-box; font-size: 18px; font-weight: bold;"&gt;&lt;a href="http://www.gohacking.com/recom_products/HMA-VPN/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;"&gt;Hide My Ass VPN&lt;/a&gt;&lt;/span&gt;&amp;nbsp;– Hide My Ass is one of the most popular and trusted VPN service that provides a fast and secure proxy server to allow people to easily change their IP address and also obtain IP address from any country of their choice.&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;a href="https://www.hidemyass.com/" target="_blank"&gt;click here to go original website..........&lt;/a&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
2.&amp;nbsp;&lt;span style="box-sizing: border-box; font-size: 18px; font-weight: bold;"&gt;&lt;a href="http://www.gohacking.com/recom_products/VYPR-VPN/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;"&gt;VyprVPN&lt;/a&gt;&lt;/span&gt;&amp;nbsp;– VyprVPN offers the world’s fastest VPN services to make it possible for its clients to easily change their real IP using a proxy and supports wide range of operating systems.&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;a href="https://www.goldenfrog.com/vyprvpn" style="letter-spacing: 0.7px; line-height: 28.8px;" target="_blank"&gt;click here to go original website..........&lt;/a&gt;&lt;/div&gt;
&lt;hr style="box-sizing: content-box; height: 0px; margin-bottom: 25px;" /&gt;
&lt;h4 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
Advantages of using VPN over other methods:&lt;/h4&gt;
&lt;ul style="box-sizing: border-box; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Fast, secure and highly reliable. All your web traffic is encrypted to keep your data safe from hackers and also protect your privacy.&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;You can choose from a list of countries and locations to obtain a new IP address. This makes it possible to have your origin from any country of your choice.&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Easily bypass regional blocks to access sites and content that are restricted for your location.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
2.Change IP by Restarting the Router&lt;/h3&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Every time you connect to the Internet your ISP may assign a different IP to your computer called dynamic IP. If your Internet connection uses a dynamic IP you can easily change it just by restarting your network device such as modem/router. All you need to do is just turn off its switch for a few seconds and turn it on again to get a different IP address assigned.&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Unlike using a VPN, this method has quite a few drawbacks. Your newly assigned IP will have the same location or country as before and therefore if you’re trying to bypass a country block it would not be possible. Moreover, if your Internet connection uses a static IP address, you will get the same IP assigned no matter how many times you restart your router.&lt;/div&gt;
&lt;h3 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
3. Using Free Web Proxy to Change Your IP Address&lt;/h3&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
If you cannot afford a VPN service or restarting the router doesn’t get you a new IP, you can try some of the free browser based proxy services that help you change your IP address and surf anonymously. The following are some of the websites that offer free proxy services:&lt;/div&gt;
&lt;ul style="box-sizing: border-box; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;a href="http://www.proxysite.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank"&gt;www.proxysite.com&lt;/a&gt;&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;a href="http://www.englandproxy.co.uk/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank"&gt;www.englandproxy.co.uk&lt;/a&gt;&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;a href="http://www.filterbypass.me/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank"&gt;www.filterbypass.me&lt;/a&gt;&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;&lt;a href="http://www.newipnow.com/" rel="nofollow" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; background-position: 0px 0px; background-repeat: initial; background-size: initial; box-sizing: border-box; color: #bb0000; transition: all 0.1s ease-in-out;" target="_blank"&gt;www.newipnow.com&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 22px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
Drawbacks of using free web proxies&lt;/h4&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
Even though these services come free of cost they also come with some of the following drawbacks:&lt;/div&gt;
&lt;ul style="box-sizing: border-box; margin: 0px 0px 20px 40px; padding: 0px;"&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Most of them are slow and websites take a lot of time to load.&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Security and privacy is questionable as most of these free services are unreliable.&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Users have to bare with annoying ads and pop-ups as these sites need to generate revenue to compensate for free service.&lt;/li&gt;
&lt;li style="box-sizing: border-box; list-style-type: disc; padding-bottom: 18px; text-align: justify;"&gt;Limited or no choice over the selection of your IP location.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="box-sizing: border-box; color: #c11616; font-family: Inconsolata, sans-serif; font-size: 24px; letter-spacing: -0.2px; line-height: 1.2; margin: 0px 0px 17px;"&gt;
How to Ensure that Your IP is Changed?&lt;/h3&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
To know your current IP address just type&amp;nbsp;&lt;em style="box-sizing: border-box;"&gt;&lt;span style="box-sizing: border-box; font-weight: 700;"&gt;what is my ip address&lt;/span&gt;&lt;/em&gt;&amp;nbsp;on Google and your public IP address should be displayed in the search results. Once you’ve successfully implemented one of the above mentioned IP changing methods, you can re-check your IP on Google to make sure that you have got a new one.&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
The above snapshot shows the Google search result page displaying a new IP address after the router is restarted.&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS9_JQqO4wLrDmEW1HqM-AflxbUX6n-9upDH91cEmeG7hAvDpH5lW8f91guiDdsRu_LBcyi-CkJtgU4ji8_MRXwTDJV-cqiERDmD7eRuucG8OF6xwl7w4QKXoJ01Pol3MTaGoD8LR29Udw/s1600/Untitled.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="264" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS9_JQqO4wLrDmEW1HqM-AflxbUX6n-9upDH91cEmeG7hAvDpH5lW8f91guiDdsRu_LBcyi-CkJtgU4ji8_MRXwTDJV-cqiERDmD7eRuucG8OF6xwl7w4QKXoJ01Pol3MTaGoD8LR29Udw/s640/Untitled.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZukkfzyGUBRMlR7F9GukRbq41WOZomgjDQNU8PEpHmdWzb0GvYY9U8SxwUCmD0l_KJjhzUtJDWmtDzrhPNkHmdPY-ht_gcD1tJRPc5CuyS_vM_uXcgBhHayqkSI3gLlRnauVzitXxYDy5/s1600/4556.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="274" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZukkfzyGUBRMlR7F9GukRbq41WOZomgjDQNU8PEpHmdWzb0GvYY9U8SxwUCmD0l_KJjhzUtJDWmtDzrhPNkHmdPY-ht_gcD1tJRPc5CuyS_vM_uXcgBhHayqkSI3gLlRnauVzitXxYDy5/s640/4556.png" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="box-sizing: border-box; margin-bottom: 28px; padding: 0px; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fwww.gohacking.com%2Fwp-content%2Fuploads%2F2016%2F01%2Fchange-ip-address-735x400.jpg&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEiDH4DaA75Xw03YdcxUIk8vZfwEgOmGGDg4wUh2g_WDw5drXnFB4cO3RHN0YyD652LuHkWlqqgkdUhivXha7SR4jlIVaGaMywdX-vJuuTFKeqbl_lbkmlnUztfq8hbtIA34gEuYZX3XocN_5ztDDLfOD9Kkfoh40u6onQWkwB_q7Y4eChwNY5bc32oFhW3JGO2h=" --&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjS9_JQqO4wLrDmEW1HqM-AflxbUX6n-9upDH91cEmeG7hAvDpH5lW8f91guiDdsRu_LBcyi-CkJtgU4ji8_MRXwTDJV-cqiERDmD7eRuucG8OF6xwl7w4QKXoJ01Pol3MTaGoD8LR29Udw/s72-c/Untitled.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>HIDE SECRET FILE IN IMAGE</title><link>https://psychocyborg.blogspot.com/2016/08/hide-secret-file-in-image.html</link><category>hacks</category><category>Intresting</category><category>learning</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 27 Aug 2016 06:59:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-8748457892131680149</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h1 class="post-title entry-title" style="background-color: white; border: 0px; color: #454545; font-family: Oswald, arial, serif; font-size: 30px; font-stretch: inherit; font-variant-numeric: inherit; font-weight: 400; line-height: 1.2; margin: 0px; outline: none medium; padding: 0px 0px 5px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/h1&gt;
&lt;div&gt;
&lt;div align="LEFT" style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Before begin,we have one secret file named : shutdown1.jpg I do not want other people know about this file and also a picture named : freenet.jpg. All of that files we put on our personal folder named pictures.(here i used desktop so don't be confused )&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="outline: none medium;" /&gt;&lt;/div&gt;
&lt;ol style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; list-style: none; margin: 10px 0px 10px 30px; outline: none medium; padding: 0px 0px 0px 10px; vertical-align: baseline;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlhVWyXJ7Y7EJAW4duuIzwFTalFrbZHM17gWyXnq0NqtPzepQnmvYNGZV4IwVJoM5AVTM9iazwB3n9TX-g71-gFBipSiQTdzvFpm-5PiZeRHbb5zrchPayLIgJt5r7ptI6rzffkgqX2mH/s1600/1.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="230" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlhVWyXJ7Y7EJAW4duuIzwFTalFrbZHM17gWyXnq0NqtPzepQnmvYNGZV4IwVJoM5AVTM9iazwB3n9TX-g71-gFBipSiQTdzvFpm-5PiZeRHbb5zrchPayLIgJt5r7ptI6rzffkgqX2mH/s400/1.png" width="400" /&gt;&lt;/a&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;open command prompt.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Now change directory to picture folder through command prompt.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: x-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Now compress your secret file(shutdown.jpg) using winrar.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Next we use command prompt. type following code&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;copy /b [image_filename].jpg + [rar_filename].rar name.jpg&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;for our example code becomes&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: x-small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;copy /b shutdown1.jpg + freenet.rar nkd.jpg&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;here nkd.jpg is our newfile which contain hidden document.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Go your picture folder , you can see nkd.jpg.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Now to view original file ,nothing too do just open file with winrar or you can also change extention from jpg to rar&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 18px; list-style: decimal outside none; margin: 7px 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Trebuchet MS&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqlhVWyXJ7Y7EJAW4duuIzwFTalFrbZHM17gWyXnq0NqtPzepQnmvYNGZV4IwVJoM5AVTM9iazwB3n9TX-g71-gFBipSiQTdzvFpm-5PiZeRHbb5zrchPayLIgJt5r7ptI6rzffkgqX2mH/s72-c/1.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>DOWNLOAD YOUTUBE VIDEO :-D</title><link>https://psychocyborg.blogspot.com/2016/08/download-youtube-video-d.html</link><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 27 Aug 2016 06:44:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-9032445741037748044</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
how to download videos from you tube&amp;nbsp;&lt;div&gt;
here we will talk about most commonly used methods&lt;/div&gt;
&lt;div&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidm7wS__QtPIBGaI9c6uULZO2Gv2nn6fhK6OpAdp4cp_O5dWZ0pJMk5ehobTaOLTzf3fLQzVurQtglOk5ak8rpOtzTo8bcJ6vuweYjnVDU2f0TdUo2HkT68o1qBO9JVSantmZ0Nqh7kpTg/s1600/download+%25282%2529.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="479" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidm7wS__QtPIBGaI9c6uULZO2Gv2nn6fhK6OpAdp4cp_O5dWZ0pJMk5ehobTaOLTzf3fLQzVurQtglOk5ak8rpOtzTo8bcJ6vuweYjnVDU2f0TdUo2HkT68o1qBO9JVSantmZ0Nqh7kpTg/s640/download+%25282%2529.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;(1)It`s very easy , Download youtube downloader from&lt;a href="http://youtubedownload.altervista.org/" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;here&lt;/a&gt;.&amp;amp; install it.open software &amp;amp; copy &amp;amp; paste video url into software.BUT here is problem, if your connection lost then it can not be resumed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="outline: none medium;" /&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;(2)Copy video url from youtube, now open&amp;nbsp;&lt;a href="http://keepvid.com/" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://keepvid.com&lt;/a&gt;&amp;nbsp;or&amp;nbsp;&lt;a href="http://savevid.com/" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;http://savevid.com&lt;/a&gt;&amp;nbsp;and paste video url into their site. But for this purpose you should have java program installed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="outline: none medium;" /&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;(3)it`s my favourite method. No software or plugin needed. If you want to download following video&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;http://youtube.com/watch?v=Y4E9brXa6hA&lt;/span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;then just put&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;ss&lt;/span&gt;&amp;nbsp;at begining of url like&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;http://ssyoutube.com/watch?v=Y4E9brXa6hA&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;a&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: inherit; font-size: small; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit;"&gt;nd copy it &amp;amp; paste it in your browser addressbar.&lt;/span&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="outline: none medium;" /&gt;&lt;/div&gt;
&lt;div align="LEFT" style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;(4)if you have internet download manager installed.it will automatically download when you start watching video. you can download full crack version of internet download manager form&amp;nbsp;&lt;a href="http://www.4shared.com/rar/NxgRwXH8/idm.html" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;Times New Roman&amp;quot;; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidm7wS__QtPIBGaI9c6uULZO2Gv2nn6fhK6OpAdp4cp_O5dWZ0pJMk5ehobTaOLTzf3fLQzVurQtglOk5ak8rpOtzTo8bcJ6vuweYjnVDU2f0TdUo2HkT68o1qBO9JVSantmZ0Nqh7kpTg/s72-c/download+%25282%2529.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title> VIEW USB HISTORY OF WINDOWS PC know what you don't know</title><link>https://psychocyborg.blogspot.com/2016/08/view-usb-history-of-windows-pc-know.html</link><category>hacks</category><category>Intresting</category><category>learning</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 27 Aug 2016 06:35:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-4187202196362070643</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-family: &amp;quot;Maven Pro&amp;quot;, Arial, sans-serif; font-size: 14px; font-stretch: inherit; font-variant-numeric: inherit; line-height: 22.4px; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-stretch: inherit; font-variant-numeric: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="outline: none medium;" /&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="outline: none medium;" /&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;USBDeview also allows you to uninstall USB devices that you previously used, disconnect USB devices that are currently connected to your computer, as well as to disable and enable USB devices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="http://www.nirsoft.net/utils/usbdeview.zip" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;Downloa&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;d USBDevi&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;ew For&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;X32 System&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;a href="http://www.nirsoft.net/utils/usbdeview-x64.zip" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Download USBDeview For&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;X64 Syste&lt;span style="border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;m&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href="http://www.nirsoft.net/utils/usbdeview-x64.zip" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;&amp;nbsp;&lt;/a&gt;&lt;br /&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;You can also use USBDeview on a remote computer, as long as you login to that computer with admin user.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br style="outline: none medium;" /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px 0px 0in; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; color: navy; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; color: black; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;Connecting To Remote Computer&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;The following command-line options allows you to connect to remote computers. You must login to the remote computer with admin user in order to use these options.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;/remote &amp;lt;\\Computer Name&amp;gt;&lt;/span&gt;&lt;br style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit; outline: none medium;" /&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;Allows you to connect a single remote computer.&lt;/span&gt;&lt;br style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit; outline: none medium;" /&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;For Example:&lt;/span&gt;&lt;br style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit; outline: none medium;" /&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;USBDeview.exe /remote \\MyComp&lt;/span&gt;&lt;br /&gt;&lt;span style="background-color: transparent; border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;/remotefile &amp;lt;Computers List File&amp;gt;&lt;/span&gt;&lt;br style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit; outline: none medium;" /&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;Allows you to connect multiple computers, and view all their USB activity in one window. The computers list file should be a simple Ascii text file with computer names separated by colon, semicolon, space, tab characters or CRLF.&lt;/span&gt;&lt;br style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-variant-caps: inherit; font-variant-ligatures: inherit; font-weight: inherit; line-height: inherit; outline: none medium;" /&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; text-align: left; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;For Example:&lt;/span&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: inherit; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;USBDeview.exe /remotefile "c:\temp\comp.txt"&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; list-style: none outside none; margin: 10px 0px 10px 20px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background: url(&amp;quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhsm-njpg3M0MXloFdoEZuvSXad2zVHEp6kCbpG5lyfukEsS-49EkJOal_vvyxbuB6YlNUus-9ztGy3JQP6fMikb_W9hl9HIgtG_AAjdkeB54jX3i1Asx8qJXIC_pDXy3Q1ukV54sdZw_ta/s24/w2b_bloggerbullet.png&amp;quot;) left center no-repeat scroll transparent; border: 0px; font-family: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: 22px; list-style: none outside none; margin: 7px 0px; outline: none medium; padding: 0px 0px 0px 30px; vertical-align: baseline;"&gt;&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://www.blogger.com/null" name="more" style="border: 0px; color: #2a7295; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;If you have the 'SYSTEM' registry file of external operating system, you can use the following command-line option to read the USB devices list from it:&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="outline: none medium;" /&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;/regfile &amp;lt;SYSTEM Registry File&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;For Example:&lt;br style="outline: none medium;" /&gt;USBDeview.exe /regfile "c:\temp\regfiles\SYSTEM"&lt;br style="outline: none medium;" /&gt;USBDeview.exe /regfile "d:\windows\system32\config\SYSTEM"&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: &amp;quot;bitstream charter&amp;quot; , serif; font-size: inherit; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: small; font-stretch: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;This option has some limitations:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-stretch: inherit; font-variant-numeric: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;
You cannot read a Registry file of Windows XP/2003/Vista from Windows 2000 Machine.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div dir="ltr" style="background-color: white; border: 0px; font-stretch: inherit; font-variant-numeric: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;span style="background-color: transparent; font-family: inherit; font-size: small; font-style: inherit; font-weight: inherit; line-height: inherit;"&gt;USB Deview works in read-only mode. (You cannot uninstall a device from external file)&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;bitstream charter&amp;quot; , serif;"&gt;&lt;span style="line-height: 22px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="101424" type="application/zip" url="http://www.nirsoft.net/utils/usbdeview.zip"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>&amp;nbsp;&amp;nbsp; USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more.USBDeview also allows you to uninstall USB devices that you previously used, disconnect USB devices that are currently connected to your computer, as well as to disable and enable USB devices. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;Download USBDeview For&amp;nbsp;X32 System &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Download USBDeview For&amp;nbsp;X64 System&amp;nbsp;&amp;nbsp; You can also use USBDeview on a remote computer, as long as you login to that computer with admin user. Connecting To Remote Computer The following command-line options allows you to connect to remote computers. You must login to the remote computer with admin user in order to use these options. /remote &amp;lt;\\Computer Name&amp;gt;Allows you to connect a single remote computer.For Example: USBDeview.exe /remote \\MyComp /remotefile &amp;lt;Computers List File&amp;gt; Allows you to connect multiple computers, and view all their USB activity in one window. The computers list file should be a simple Ascii text file with computer names separated by colon, semicolon, space, tab characters or CRLF. For Example:USBDeview.exe /remotefile "c:\temp\comp.txt" If you have the 'SYSTEM' registry file of external operating system, you can use the following command-line option to read the USB devices list from it:&amp;nbsp;/regfile &amp;lt;SYSTEM Registry File&amp;gt; For Example:USBDeview.exe /regfile "c:\temp\regfiles\SYSTEM"USBDeview.exe /regfile "d:\windows\system32\config\SYSTEM" This option has some limitations: You cannot read a Registry file of Windows XP/2003/Vista from Windows 2000 Machine. USB Deview works in read-only mode. (You cannot uninstall a device from external file)</itunes:subtitle><itunes:author>noreply@blogger.com (Prateek Gupta)</itunes:author><itunes:summary>&amp;nbsp;&amp;nbsp; USBDeview is a small utility that lists all USB devices that currently connected to your computer, as well as all USB devices that you previously used.For each USB device, extended information is displayed: Device name/description, device type, serial number (for mass storage devices), the date/time that device was added, VendorID, ProductID, and more.USBDeview also allows you to uninstall USB devices that you previously used, disconnect USB devices that are currently connected to your computer, as well as to disable and enable USB devices. &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;Download USBDeview For&amp;nbsp;X32 System &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Download USBDeview For&amp;nbsp;X64 System&amp;nbsp;&amp;nbsp; You can also use USBDeview on a remote computer, as long as you login to that computer with admin user. Connecting To Remote Computer The following command-line options allows you to connect to remote computers. You must login to the remote computer with admin user in order to use these options. /remote &amp;lt;\\Computer Name&amp;gt;Allows you to connect a single remote computer.For Example: USBDeview.exe /remote \\MyComp /remotefile &amp;lt;Computers List File&amp;gt; Allows you to connect multiple computers, and view all their USB activity in one window. The computers list file should be a simple Ascii text file with computer names separated by colon, semicolon, space, tab characters or CRLF. For Example:USBDeview.exe /remotefile "c:\temp\comp.txt" If you have the 'SYSTEM' registry file of external operating system, you can use the following command-line option to read the USB devices list from it:&amp;nbsp;/regfile &amp;lt;SYSTEM Registry File&amp;gt; For Example:USBDeview.exe /regfile "c:\temp\regfiles\SYSTEM"USBDeview.exe /regfile "d:\windows\system32\config\SYSTEM" This option has some limitations: You cannot read a Registry file of Windows XP/2003/Vista from Windows 2000 Machine. USB Deview works in read-only mode. (You cannot uninstall a device from external file)</itunes:summary><itunes:keywords>hacks, Intresting, learning, tricks</itunes:keywords></item><item><title>Best Alternatives to Tor Browser for Anonymous Browsing</title><link>https://psychocyborg.blogspot.com/2016/08/best-alternatives-to-tor-browser-for.html</link><category>hacks</category><category>Intresting</category><category>learning</category><category>tricks</category><author>noreply@blogger.com (Prateek Gupta)</author><pubDate>Sat, 27 Aug 2016 06:26:00 -0700</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-5535286350442288026.post-9179797407566451290</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px; text-align: left;"&gt;
&lt;span style="font-size: large;"&gt;last time I told you how you can be go anonymous on internet today here we have alternatives for tor. I hope it will help you more&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
&lt;br /&gt;&lt;/h3&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
1. I2P&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf3vUZSs11PZcoGMng5MRnuL6FAwcGODfX3ccTEdyi9LMg-HIwXFG8nEo1nMal3Fo2DxS-igyPVC-M2jQn7vev8CUnBtWwNEe71w5H6nGBIJ7d4Q7q30Zdp0woORuRP1hgHOiLotrx5JZ7/s1600/download.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="142" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf3vUZSs11PZcoGMng5MRnuL6FAwcGODfX3ccTEdyi9LMg-HIwXFG8nEo1nMal3Fo2DxS-igyPVC-M2jQn7vev8CUnBtWwNEe71w5H6nGBIJ7d4Q7q30Zdp0woORuRP1hgHOiLotrx5JZ7/s200/download.png" width="200" /&gt;&lt;/a&gt;I2P is an anonymous per to peer-to-peer distributes communication layer which is for open source tools. The software implementing this computer network layer is called I2P layer such as P2P software. Specially, it is designed for security services and is compatible faster than Tor and is full on alternative to TOR . It’s self oranising and distributed potential.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
2. Freenet&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHNn2WeKyMeZ7LR-01ZUd8Vrc3YQlDTL4caXq1lAvRafOKObWPg5YdzQqCixhvxaVQCcvgva-q01H5LmAVIGl2cpPePx4QD-QXH0_81sj9QoqbEIiB_-4YsbhB9F2MjLOeB-TEDjTcO_/s1600/freenet_Iphone02a.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="150" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhuuHNn2WeKyMeZ7LR-01ZUd8Vrc3YQlDTL4caXq1lAvRafOKObWPg5YdzQqCixhvxaVQCcvgva-q01H5LmAVIGl2cpPePx4QD-QXH0_81sj9QoqbEIiB_-4YsbhB9F2MjLOeB-TEDjTcO_/s200/freenet_Iphone02a.png" width="200" /&gt;&lt;/a&gt;Freenet is considered as a peer-to-peer to dislike the censorship same as to I2P.It utilizes the similar P2P tools of diffusing data storage to distribute and keep the information but divide the set of rules of user interface and network structure. It comes out with two-tier safety measures such as Darknet and Opennet.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
3. Freepto&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
Freepto is a dissimilar Linux-based Operating System that is booted using a USB Disk on any PC. It is easy to run and is faster in saving your encrypted data. The data is encrypted which is put it into your disk. It offers hacktivists the straightwforward way to communicate in the similar way as Tor.&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
4. JonDo Live-CD&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
JonDo Live-CD , one of the Linux based OS that provides you pre-configured applications to be used for web surfing. It includes Thinderbird, Torbrowser, and may other programs.&lt;/div&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
5. Tox&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3oJcFCOwkQpNZGgVGw0d0c3lUZiGZbZVvbcMt1zknpoQY3Kb6lO590W_467h20B4LGjKBFubW_muKGHd4aAzc7sTzc_ACjWh3TFaCzSP0ekDOAylNFzifx4NAzUlitu2z0r6jEZwb4x4H/s1600/download+%25281%2529.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg3oJcFCOwkQpNZGgVGw0d0c3lUZiGZbZVvbcMt1zknpoQY3Kb6lO590W_467h20B4LGjKBFubW_muKGHd4aAzc7sTzc_ACjWh3TFaCzSP0ekDOAylNFzifx4NAzUlitu2z0r6jEZwb4x4H/s200/download+%25281%2529.jpg" width="200" /&gt;&lt;/a&gt;Tox is considered not a complete standby for Tor, but helps in providing you the messaging services. It provides you many more advanced features as private and encrypted IM, video conferencing and calls i.e. a user- friendly browser.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
6. Lightweight Portable Security (LPS)&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
It creates a safe passage between end nodes from dependable media on any nearly located Intel-based PC. It also boot up CD from Linux operating system. Administrator benefits are not required and not anything is installed.&lt;/div&gt;
&lt;h3 style="background-color: white; box-sizing: inherit; clear: both; color: #555555; font-family: Roboto, sans-serif; font-size: 30px; font-weight: normal; line-height: 1.3; margin: 0px 0px 12px;"&gt;
7. IprediaOS&lt;/h3&gt;
&lt;div style="background-color: white; box-sizing: inherit; color: #111111; font-family: Roboto, sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 1.5em;"&gt;
Ipredia OS is a fast, commanding and firm opertaing system that is totally based on Linux that provides you an unspecified environment. All the traffic is encrypted and anonymized. Many apps are available in Ipredia OS, can be in any form as mail, peer-to-peer, bittorrent.&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgf3vUZSs11PZcoGMng5MRnuL6FAwcGODfX3ccTEdyi9LMg-HIwXFG8nEo1nMal3Fo2DxS-igyPVC-M2jQn7vev8CUnBtWwNEe71w5H6nGBIJ7d4Q7q30Zdp0woORuRP1hgHOiLotrx5JZ7/s72-c/download.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>