<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-509026492231771891</atom:id><lastBuildDate>Tue, 11 Mar 2025 18:14:57 +0000</lastBuildDate><title>HACKING WORLD</title><description>Technology News,A tips On Cell Phone Hacks, Browser Hacks, Email Hacks, Facebook Hacks, Passworld Hacks, Email Security And Much More....</description><link>http://hackingtips011.blogspot.com/</link><managingEditor>noreply@blogger.com (Unknown)</managingEditor><generator>Blogger</generator><openSearch:totalResults>59</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4783498422963684935</guid><pubDate>Sun, 16 Feb 2014 08:54:00 +0000</pubDate><atom:updated>2014-02-16T00:56:47.194-08:00</atom:updated><title>Kickstarter hacked, user data stolen</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbMqDBDL7R916p5aOI2z1_0zwQEKO_-j3cgl22hTBKoI1j_09KBNvJC1S_1WSqetpwUVCsxAwwOU5GFpY33FubK9ahXYJnkYZRfoQcHpQo9Hx6sBRDR2_AxIcztXdoCt1utWJ2MYsbNUI/s1600/kickstarter_logo.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbMqDBDL7R916p5aOI2z1_0zwQEKO_-j3cgl22hTBKoI1j_09KBNvJC1S_1WSqetpwUVCsxAwwOU5GFpY33FubK9ahXYJnkYZRfoQcHpQo9Hx6sBRDR2_AxIcztXdoCt1utWJ2MYsbNUI/s1600/kickstarter_logo.png&quot; /&gt;&lt;/a&gt;Online hackers hit crowd-funding website Kickstarter and created off with customer information, the website said Weekend.&lt;br /&gt;
Though no bank cards info was taken, the website said, assailants created off with usernames, e-mail details, emailing details, contact numbers, and secured protection passwords.&lt;br /&gt;
&quot;Actual protection passwords were not exposed, however it is possible for a harmful person with enough processing power to think and break an secured protection password, particularly a poor or obvious one,&quot; the website said in a short article, including that &quot;as a safety measure, we suggest that you create a new protection password for your Kickstarter account, and other records where you use this protection password.&quot;&lt;br /&gt;
The website said police officers told Kickstarter of the violation on Wed night and that the company &quot;immediately shut the protection violation and started building up precautionary features throughout the Kickstarter system.&quot; The website also said &quot;no bank cards data of any type was utilized by hackers&quot; and that &quot;there is no proof of illegal activity of any type on all but two Kickstarter customer records.&quot;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Facebook Power | How To Get Rockstar Like Power On Facebook
&lt;a href=&quot;http://3abe748heu8z7m2bda2kghbp5w.hop.clickbank.net/&quot; target=&quot;_top&quot;&gt;Click Here!&lt;/a&gt;

&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2014/02/kickstarter-hacked-user-data-stolen.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbMqDBDL7R916p5aOI2z1_0zwQEKO_-j3cgl22hTBKoI1j_09KBNvJC1S_1WSqetpwUVCsxAwwOU5GFpY33FubK9ahXYJnkYZRfoQcHpQo9Hx6sBRDR2_AxIcztXdoCt1utWJ2MYsbNUI/s72-c/kickstarter_logo.png" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-2899533235721444906</guid><pubDate>Sun, 16 Feb 2014 08:44:00 +0000</pubDate><atom:updated>2014-02-16T00:44:03.575-08:00</atom:updated><title>Apple, Samsung reportedly fail to reach truce in patent wars</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidQmeZtaRmsHUPpEqXzilrcDBBPdPc1hyphenhyphendvQFT1vI-qC07bg4smFr9qDMkXym8x_Bj2iEvmPeXIkhhBy9fj4bPksPAaNxxLp1wGWmm75s9i_xWmdOV7r3Kn9m6a2COARGnzYmqLVY7aEA/s1600/applevsamsung.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidQmeZtaRmsHUPpEqXzilrcDBBPdPc1hyphenhyphendvQFT1vI-qC07bg4smFr9qDMkXym8x_Bj2iEvmPeXIkhhBy9fj4bPksPAaNxxLp1wGWmm75s9i_xWmdOV7r3Kn9m6a2COARGnzYmqLVY7aEA/s1600/applevsamsung.jpg&quot; height=&quot;213&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;Apple company CEO Tim Prepare and New samsung Cellular head JK Leg allegedly met a couple weeks ago to sort out an contract to their long-running certain feud. The result? No contract.&lt;br /&gt;
Neither company has fessed up to such a conference. But ZDNet The philipines and other resources declare the two professionals met in the US after being requested by the judge to try to negotiate their lawful variations peacefully. The judge allegedly desired to see a agreement by Feb 19, but the bad blood stream between the two companies seems to have been too much of an hurdle.&lt;br /&gt;
The judge could expose its last judgment after Feb 19, according to ZDNet The philipines. And if New samsung is on the dropping side, the Japanese device manufacturer may have to pay Apple company loss as high as $930 thousand.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;Apple Ipad 4 Idiots Guide + Video Lessons 2012
&lt;a href=&quot;http://b809a64c8-gk4ne6zfm2y69sfo.hop.clickbank.net/&quot; target=&quot;_top&quot;&gt;Click Here!&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2014/02/apple-samsung-reportedly-fail-to-reach.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidQmeZtaRmsHUPpEqXzilrcDBBPdPc1hyphenhyphendvQFT1vI-qC07bg4smFr9qDMkXym8x_Bj2iEvmPeXIkhhBy9fj4bPksPAaNxxLp1wGWmm75s9i_xWmdOV7r3Kn9m6a2COARGnzYmqLVY7aEA/s72-c/applevsamsung.jpg" height="72" width="72"/><thr:total>3</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-6075296892429332480</guid><pubDate>Thu, 21 Feb 2013 07:31:00 +0000</pubDate><atom:updated>2013-02-20T23:31:21.493-08:00</atom:updated><title>iPhones have security flaw: Report </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; src=&quot;http://www.techgig.com/files/photo_1360954209_temp.jpg.pagespeed.ce.rfyfrrx_iW.jpg&quot; /&gt;Online hackers can quickly discover the screen of The apple company iPhone due to a protection defect, a review has said.&lt;br /&gt;&lt;br /&gt;A majority of iPhone customers have included a four-digit protection pin rule to prevent unexpected customers from obtaining their cellphone.&lt;br /&gt;&lt;br /&gt;But a new loophole in the latest 6.1 iOS application now indicates that anyone can avoid it and accessibility email, connections, sms information, voicemail and even video contacting, the Communicate reviews.&lt;br /&gt;&lt;br /&gt;Techcrunch, a device blog, called the manipulate &quot;a large entry to some of the iPhone&#39;s primary functions&quot;.&lt;br /&gt;&lt;br /&gt;Posted on YouTube by a blog writer determining themselves only as VideosdeBarraquito, the The apple company crack has been considered by nearly 4,000 people, and duplicates a similar defect with earlier application, iOS 4.1.&lt;br /&gt;&lt;br /&gt;According to the document, the process can be activated by aborting an urgent contact and then performing a number of simple key clicks to deceive the device into keeping the iPhone open.&lt;br /&gt;&lt;br /&gt;The defect indicates that the iPhone reveals the cellphone app, giving entry to the main systems such as contact records and information, the document said.&lt;br /&gt;&lt;br /&gt;It depends on accurate moment, but can quickly be duplicated by any user, it included.&lt;br /&gt;
&lt;br /&gt;
Source: Newsworld/Techgig.&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/iphones-have-security-flaw-report.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-170381176538761590</guid><pubDate>Thu, 21 Feb 2013 07:27:00 +0000</pubDate><atom:updated>2014-02-08T10:40:43.672-08:00</atom:updated><title>Indian IT to give smaller salary increments in 2013: Report </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; src=&quot;http://timesofindia.indiatimes.com/photo/18589082.cms&quot; hspace=&quot;10&quot; /&gt;Aon Hewitt today declared the results of the Seventeenth version of the Yearly Wage Improve Study. Showing the financial development objectives of 5%, Native indian Inc tasks a typical salary increase of 10.3% for 2013, while the IT industry is likely to dole out reduced amounts than this season. &lt;br /&gt;
&lt;br /&gt;
Margin pressure, a careful perspective in terms of the international financial state and large regular strength have led to IT assistance organizations predicting a traditional salary increase of 9.6%. On the other hand, IT product organizations, driven by development opportunities in the household market and greater transmission in Level II places published relatively higher salary increase of 11.2%. &lt;br /&gt;
&lt;br /&gt;
For the Native indian ITeS market, the normal surge in salary for 2013 has been estimated at 10.1%. BFSI captives and other captives are predicting salary increase at 10.2%. Third party companies published a typical salary increase of 8.9% due to tough international financial conditions, minimizing rupee and huge cost demands. &lt;br /&gt;
&lt;br /&gt;
A dip in sales for customer gadgets as well as the move to wiser gadgets and pills has moistened the feelings for the semiconductor market, which revealed salary increase of 11.3%, down from 12.1% this season. The high-tech market published a typical salary increase of 10.5%. &lt;br /&gt;
&lt;br /&gt;
Despite a season in which India&#39;s development came to a several years low, business Native indian revealed a typical overall attrition of 19.3% for 2012. While the attrition was second highest in ITeS market, telecommunications industry had the second smallest rate of leaves this season. Organisations are re-shaping their strategies to protect this skills group. This is also shown in the reduced regular attrition number for key skills at 5.7%. &lt;br /&gt;
&lt;br /&gt;
With reducing salary costs, organizations are creating distinct difference in salary improves between their key skills and the rest of the population. Over the years this gap is increasing. This season, key skills (hi-potentials, hi-performers &amp;amp; critical talent) is estimated to get a typical increase of 14.1%. The report also said that technology and freelancing areas have been among the most unpredictable and will be careful in buy. &lt;br /&gt;
&lt;br /&gt;
Sandeep Chaudhary, partner - skills &amp;amp; benefits at Aon Hewitt Native indian mentioned, &quot;Though business feeling is building up due to increasing prices attaining a three season low and stock markets increasing up-wards, the careful ability is obvious in the estimated salary increase numbers.&quot; &lt;br /&gt;
&lt;br /&gt;
d537fdca68d7f033f7035b311cc7658f998c4415ab9db34f81&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/indian-it-to-give-smaller-salary.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>5</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4321487820227731145</guid><pubDate>Thu, 21 Feb 2013 07:27:00 +0000</pubDate><atom:updated>2013-02-20T23:27:06.607-08:00</atom:updated><title>Apple Reclaims Leader Board In Smartphone Wars With iPhone 5, 4S </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://readwrite.com/files/strategy_analytics_iphone.jpg&quot; width=&quot;300&quot; /&gt;Time changes, the pendulum shifts and we have a new innovator on top of the Smart phone Conflicts scoreboard. &lt;br /&gt;&lt;br /&gt;Apple’s iPhone was the big champion in international deliveries in the last one fourth of 2012. Actually, it was two of Apple’s iPhones. The iPhone 5 delivered 27.4 thousand designs to top all mobile phones in the marketplace. It was followed by the year-old iPhone 4S that delivered 17.4 thousand designs, according to a new review from Technique Statistics. &lt;br /&gt;&lt;br /&gt;The vaunted New samsung Universe S 3 flagship? It did not even defeat the year-old iPhone 4S and came in third at 15.4 thousand designs delivered. &lt;br /&gt;&lt;br /&gt;We all know that Apple organization did incredibly well during the christmas period (OK, maybe Walls Road does not know). It marketed a history 47.8 thousand iPhones and documented $54.5 billion dollars in income. Apple organization does well every one fourth, really. But, it is worth noting that the characteristics of Apple’s business is incredibly cyclical. It does extremely well delayed in the period while dropping during summer time time season period. This has to do with the consumer-oriented characteristics of Apple’s products and moment of system releases.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For example, we got this identical review from Technique Statistics for Q3 2012 with the splashy title, “Galaxy S 3 Covers iPhone 4S” in Nov last period. Apple organization had just launched the iPhone 5 at the end of Q3 and the 4S was still Apple’s leading for most of the one fourth, offering at $199 in the U. s. Declares on two-year agreement. When the iPhone 5 came out, the 4S was reduced to $99 on a agreement. &lt;br /&gt;&lt;br /&gt;Right in time for the vacations.&lt;br /&gt;&lt;br /&gt;The distinction between the Universe S 3 and the iPhone 4S is thin. From Q4 to Q4, Samsung’s leading dropped 2.6 thousand in deliveries. The iPhone 4S increased 1.2 thousand with many of those designs likely focused towards lower cost-conscious customers and growing marketplaces. &lt;br /&gt;&lt;br /&gt;Strategy Statistics review looks remarkably at individual phone deliveries. It does not consist of Samsung’s incredibly long-tail of “S”-related gadgets that the Southern Japanese organization uses to overflow the world industry with cost-effective Android operating system gadgets.&lt;br /&gt;&lt;br /&gt;When Apple organization started discounting old iPhones when the latest version was launched, it described its own long-tail strategy. Apple organization CEO Tim Prepare said at the Goldman Sachs Technological innovation and Internet Meeting a week ago that the organization would not make a less expensive iPhone for the benefit of creating a less expensive iPhone, but would rather concentrate on creating mature designs more cost-effective. We see now what he was referring to. &lt;br /&gt;
&lt;br /&gt;
Source: Technews/Techgig/Apple/Cnet&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/apple-reclaims-leader-board-in.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>6</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-5206499063209125729</guid><pubDate>Thu, 21 Feb 2013 07:25:00 +0000</pubDate><atom:updated>2013-02-20T23:25:39.909-08:00</atom:updated><title>Hotmail Users, It‘s Time To Move To Outlook.com, Like It Or Not </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://readwrite.com/files/Hotmail%20screenshot.png&quot; width=&quot;300&quot; /&gt;OK, individuals, pay attention up. Seymour, pay attention. Elsie, turn on your listening to aid. It&#39;s a chance to move your Gmail records to Perspective.com. Hey! No, stop stressing. Don&#39;t use that terminology, Ethel, it&#39;s un-ladylike.&#39;&lt;br /&gt;&lt;br /&gt;Yes, the enough the come - the an incredible number of e-mail clients who are currently using Gmail will be moved over to Perspective.com by this season, Ms said Wednesday. For many of Windows long-time clients, this will be their first encounter with the Ms windows 8-styled &#39;Metro&#39; customer interface that Ms is propagating around its qualities.&lt;br /&gt;&lt;br /&gt;(See also Perspective.com: Take A Trip Of Windows Gmail Alternative.)&lt;br /&gt;&lt;br /&gt;&#39;We&#39;ve been very thrilled by the adopting of the review and how it&#39;s providing on our guarantee of a new, reimagined e-mail assistance,&#39; Bob Law, home of product control for Perspective.com, said in a writing on Wednesday. &#39;Throughout the review, we discovered a number from seeing how individuals used the assistance.&amp;nbsp; Beginning adopters have informed us what they liked, what they&#39;d like to see next, and what we required to do to create more individuals change. And we&#39;ve used that to add new functions and fine-tune the services to range.&amp;nbsp; Now that Perspective.com is coming out of review, we&#39;ll be throwing off a huge force across a number of nations around the world to generate even higher attention and adopting of Perspective.com.&#39;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Last This summer time, Ms modified its e-mail system and revealed Perspective.com, a try out of a considerably enhanced e-mail customer that it said at enough time would gradually substitute Gmail. The Ms windows 8 design &#39;Metro makeovers&#39; gradually achieved SkyDrive, the new Office Web Applications, and a renewed MSN, among other Ms propertiess. Although Gmail and Perspective.com discuss several components - public relationships to Tweets and Facebook or myspace, for example, and the capability to put wealthy press - such as video clips - within the consumer itself, Perspective.com is a strong reimagining of the Web e-mail customer in the Ms windows 8 line of thinking.&lt;br /&gt;The Dad Problem&lt;br /&gt;&lt;br /&gt;The issue, unfortunately, is Dad.&lt;br /&gt;&lt;br /&gt;My dad, like many dads, is a amazing man. But even though he&#39;s an professional, he despises technological innovation. He disliked beepers. Mobile mobile phones. ATM credit cards. Computer systems. Since I assured my mom that a DVR could history Concord A&#39;s activities or St. Mary&#39;s golf ball activities, they&#39;ve included a (standard-definition) video recoreder, which gathers dirt under their 27-inch Sony models Trinitron CRT tv. To their credit score, we were one of earlier family members to look at the microwave, which still exists in your kitchen at home area, awaiting me to totally reset time in the occasion of a power failing.&lt;br /&gt;&lt;br /&gt;My dad has an AOL consideration.&lt;br /&gt;&lt;br /&gt;My dad quite rationally factors out that he has no need for an additional current e-mail deal with, since that AOL consideration is now included strong in the list of contact of their buddies. And, cheapskate that he is (a enhance, in our family) he easily skipped out of AOL&#39;s dialup assistance when a better ISP deal came along.&lt;br /&gt;&lt;br /&gt;But there is no way on The lord&#39;s natural world that my dad wants Ms windows 8. He&#39;s quite satisfied with Ms windows XP, thank you, which chugs along on his old Dell PC. I&#39;m fairly sure he would still be on an historical edition of Online Traveler had I not enhanced him for worry of him getting compromised.&lt;br /&gt;&lt;br /&gt;No, my dad does not have a Gmail consideration, but I suppose that there are most individuals just like him who do. Moving from Gmail to the Perspective.com atmosphere is definitely going to strike some thoughts. I suppose that after glimpsing the Ms windows 8 design customer interface, some individuals may never project upon the Online again.&lt;br /&gt;Easing The Transition?&lt;br /&gt;&lt;br /&gt;I kid, of course.&lt;br /&gt;&lt;br /&gt;Honestly, I&#39;m sure some clients will be offered away by the overall look and feeling of Perspective.com, and the prosperity of new functions it gives you. Some may even experience enough to update their PCs to lastly get into the Twenty-first Millennium. And give credit score where credit score is due: Law and Ms are definitely trying to create the conversion as easy as possible:&lt;br /&gt;&lt;br /&gt;&#39;Everything from their @hotmail.com current e-mail deal with, security password, information, files, connections, guidelines, holiday responses, etc. will stay the same, with no interruption in assistance,&#39; Law had written. &#39;When enhanced, they&#39;ll also get all the benefits from the remodeled Perspective.com encounter - a clean and user-friendly customer interface, lots of new functions and better performance. And we won&#39;t ever create you change your current e-mail deal with to an @outlook.com deal with if you don&#39;t want to.&#39;&lt;br /&gt;&lt;br /&gt;But when I study all that, I still can&#39;t help but think of this quote:&lt;br /&gt;&lt;br /&gt;&#39;I used to be with it, but then they modified what *it* was. Now what I&#39;m with isn&#39;t *it,* and what&#39;s *it* seems strange and terrifying to me. It&#39;ll happen to you...&#39; Abe Simpson, The Simpsons: &#39;Homerpalooza&#39;&lt;br /&gt;
&lt;br /&gt;
Source: Hotmail/US&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/hotmail-users-its-time-to-move-to.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>2</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-3237871230995467580</guid><pubDate>Wed, 20 Feb 2013 06:58:00 +0000</pubDate><atom:updated>2013-02-19T22:58:56.596-08:00</atom:updated><title>How Facebook Makes Graph Search Safer for Teens</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&amp;nbsp;&lt;img alt=&quot;mother and teen girl looking at laptop&quot; class=&quot;make_big&quot; rel=&quot;#custom0&quot; src=&quot;http://www.technewsdaily.com/images/i/000/009/214/iFF/teen-mom-laptop-shst.jpg?1347304627&quot; style=&quot;border-bottom: 1px solid lightgray; cursor: pointer; width: 300px;&quot; /&gt;Teenagers don&#39;t get equivalent treatment on Facebook&#39;s Chart Look for. And for mother and father, that can be comforting.&lt;br /&gt;
&lt;br /&gt;
Facebook has been gradually moving out the extended search function known as Chart Look for that allows customers find out exciting relationships among their buddies, and based on comfort configurations, among buddies of buddies, which is likely to consist of unknown people.&lt;br /&gt;
&lt;br /&gt;
Facebook already boundaries discussing to buddies of buddies for all teens&amp;nbsp; (ages 13 to 17), significance children can&#39;t discuss to the community. And now Facebook or myspace has further restricted its Chart Look for for adolescents to show results only for those that drop into the same age team, the company said in a publish. So if your little girl queries for &quot;my buddies who like Bieber Bieber,&quot; she won&#39;t see that her mothers buddies are some of his greatest lovers.&lt;br /&gt;
&lt;br /&gt;
Facebook also advised customers to evaluation their Action records and About me segments to eliminate old content and images or restrict who can see them.&lt;br /&gt;
&lt;br /&gt;
Source: Facebook/Google/technews &lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/how-facebook-makes-graph-search-safer.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-5186699691158509000</guid><pubDate>Wed, 20 Feb 2013 06:56:00 +0000</pubDate><atom:updated>2013-02-19T22:56:53.504-08:00</atom:updated><title>Apple Tunes Out YouTube</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;img align=&quot;left&quot; alt=&quot;Apple Tunes Out YouTube&quot; class=&quot;story-image&quot; height=&quot;124&quot; src=&quot;http://www.technewsworld.com/images/rw133074/apple-youtube-google.jpg&quot; width=&quot;172&quot; /&gt;Soon iPhone users won&#39;t see the YouTube app on their devices and will have to go to the YouTube website from the Opera web browser. The apple company won&#39;t be such as the app in iOS 6, as its certification deal with YouTube is now finishing.&lt;br /&gt;&lt;br /&gt;The video-sharing social media service is now owned by Look for engines, of course, and this could be Apple&#39;s latest move to reduce the presence of its competing on the iPhone, iPad and iPod touch gadgets.&lt;br /&gt;&lt;br /&gt;&quot;Apple is hesitant of offering Look for engines any mind-share in its iOS,&quot; said Josh Crandall, major specialist for Netpop Research.&lt;br /&gt;&lt;br /&gt;&quot;When releasing the iPhone, The apple company created use of the YouTube and Charts technology to build impressive mobile phone applications. But since Look for engines developed the Android operating system OS, The apple company is increasingly careful of Google foot prints in iOS,&quot; he told MacNewsWorld.&lt;br /&gt;&lt;br /&gt;This could mean Look for engines -- as in Look for engines the online search motor -- could gradually be packed out of The apple company gadgets. The apple company has already eliminated the Look for engines Charts application from iOS.&lt;br /&gt;&lt;br /&gt;&quot;Apple has never been one to neglect commercial opportunities or cut opponents any sort of break,&quot; said Charles Master, major specialist for Pund-IT. &quot;In fact, the potential value of nearby ad earnings created it a no-brainer, and you could make the same point about gossips that The apple company will gradually substitute Look for engines -- which is the standard on iPhones -- with another online search motor.&quot;&lt;br /&gt;&lt;br /&gt;Google and The apple company did not reply to our demands for further details. &lt;br /&gt;
&lt;br /&gt;
Source: Technewsworld&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/apple-tunes-out-youtube.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-8702684767459875325</guid><pubDate>Wed, 20 Feb 2013 06:55:00 +0000</pubDate><atom:updated>2013-02-19T22:55:29.800-08:00</atom:updated><title>3 Reasons to Choose Outlook Over Gmail</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img alt=&quot;&quot; class=&quot;make_big&quot; rel=&quot;#custom0&quot; src=&quot;http://www.technewsdaily.com/images/i/000/011/007/iFF/outlook-inbox-130219-02.JPG?1361316385&quot; style=&quot;border-bottom: 1px solid lightgray; cursor: pointer; width: 300px;&quot; /&gt; The days are designated for Gmail. Ms declared it will near the 16-year-old assistance, one of the unique free, Web-based e-mail solutions, and shift clients to the new Perspective (not to be puzzled with Windows business e-mail item, which goes by the same name) by this season.&lt;br /&gt;
&lt;br /&gt;
The shift could keep as many as 360 thousand clients thinking if Perspective is a good option, or is it time to change to Googlemail, with its 425 thousand or so users?&lt;br /&gt;
&lt;br /&gt;
But don&#39;t determine depending on popularity; as opposed to with public networking , it doesn&#39;t really issue if your buddies use the same e-mail assistance as you. Instead, consider features: You may be amazed to understand that Windows Perspective varies from Googlemail in several important ways, providing more comfort than you can get with Googlemail. Here are three benefits that come from selecting Outlook:&lt;br /&gt;
&lt;br /&gt;
Source: Technewsdaily &lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/3-reasons-to-choose-outlook-over-gmail.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4151152581080610159</guid><pubDate>Tue, 19 Feb 2013 10:10:00 +0000</pubDate><atom:updated>2013-02-19T02:10:10.950-08:00</atom:updated><title>Oracle&#39;s Java Fix Fizzles</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img align=&quot;left&quot; alt=&quot;Oracle&#39;s Java Fix Fizzles&quot; class=&quot;story-image&quot; height=&quot;150&quot; src=&quot;http://www.technewsworld.com/images/rw555436/java-security.jpg&quot; width=&quot;200&quot; /&gt;Oracle launched a fix over the few days for two serious weaknesses in Coffee, but this doesn&#39;t seem to have enhanced issues much.&lt;br /&gt;&lt;br /&gt;The weaknesses, which impact Web internet explorer using Coffee 7 plug-ins, let assailants slightly manipulate focus on techniques without requiring a login name or security password.&lt;br /&gt;&lt;br /&gt;The U.S. Computer Urgent Preparedness Team has cautioned that customers should turn off Coffee even after implementing Oracle&#39;s areas unless it&#39;s absolutely necessary to run it.&lt;br /&gt;&lt;br /&gt;Oracle discovered of the manipulate on Jan. 10 and pressed out a spot three days later, which &quot;is a very fast turn-around a chance to launch a fix,&quot; Gavin O&#39;Gorman, mature risk intellect specialist at Symantec Protection Reaction, said.&lt;br /&gt;&lt;br /&gt;&quot;Oracle did what any application company would do under great pressure: the lowest necessary to fix the issue,&quot; Sorin Mustaca, data security professional at Avira, informed TechNewsWorld. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;How the Fix Works -- or Doesn&#39;t&lt;br /&gt;&lt;br /&gt;In addition to launching areas for the two weaknesses -- CVE-2013-0422 and CVE-2012-3174, Oracle is changing Coffee security configurations to &quot;high&quot; by standard. Users now must particularly approve the performance of applets that are either unsigned or self-signed.&lt;br /&gt;&lt;br /&gt;So, if customers visit harmful websites -- which are the newest exploit&#39;s vector of strike -- they will be informed before an applet is run and will be able to stop it before it starts to perform, Oracle said.&lt;br /&gt;&lt;br /&gt;However, US-CERT indicates customers turn off Coffee in their Web internet explorer even if they&#39;ve used Oracle&#39;s fix, to be sure they&#39;re protected.&lt;br /&gt;&lt;br /&gt;&quot;Disabling Coffee web browser plug-ins for untrusted websites guarantees that scammers cannot take advantage of Coffee to provide viruses, yet a customer need not remove Coffee or completely turn off the Coffee plug-in,&quot; O&#39;Gorman informed TechNewsWorld.&lt;br /&gt;&lt;br /&gt;US-CERT and its mother or father organization, the U.S. Division of Birthplace Protection, did not reply to our demands for further information.&lt;br /&gt;Patchworking is for Quilts&lt;br /&gt;&lt;br /&gt;While the spot offers an immediate fix for Oracle&#39;s Coffee weeknesses, &quot;developing crucial application under stress has only one impact -- even more insects,&quot; Mustaca outlined. &quot;I anticipate to soon see even more insects and weaknesses related to this fast fix.&quot;&lt;br /&gt;&lt;br /&gt;A strong fix &quot;should minimize all possible strike vectors so that, in the long run, they make the [Java] foundation protected by design, standard and implementation,&quot; Mustaca ongoing.&lt;br /&gt;&lt;br /&gt;Oracle should reconsider its application growth way of Coffee because the terminology &quot;was obtained, and was designed by many people over many years, significance the rule has become difficult to sustain,&quot; Mustaca recommended.&lt;br /&gt;&lt;br /&gt;Oracle did not reply to our demand for further information.&lt;br /&gt;How to Secure Yourself&lt;br /&gt;&lt;br /&gt;Users should observe their techniques for improved CPU action, system traffic or disk drive action and review any dubious action to their program directors and anti-virus companies for research, Mustaca said. If they&#39;re running important techniques such as commercial techniques, or techniques handling your personal data or life-support techniques, &quot;it&#39;s recommended to re-install the program or return to a past edition to experience highest possible confidence.&quot;&lt;br /&gt;&lt;br /&gt;If you don&#39;t really need Coffee, remove it from all the computer systems in your company, Mustaca recommended. If you do need it, search for out articles on how to remove Coffee.&lt;br /&gt;&lt;br /&gt;Occasionally, Coffee will accident if it has been impaired in the Web web browser and then re-enabled, US-CERT mentioned. Re-installing Coffee seems to take care of this issue.&lt;br /&gt;&lt;br /&gt;Re-enable Coffee with warning, O&#39;Gorman said. &quot;As with all security choices, technology needs to be handled carefully to ensure a advanced level of security but simultaneously not stop the customer. It&#39;s completely affordable for customers to re-enable Coffee in their web browser, but we&#39;d recommend only for those websites they believe in.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Oracle.com/US&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/oracles-java-fix-fizzles.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-6005414909062047535</guid><pubDate>Tue, 19 Feb 2013 10:07:00 +0000</pubDate><atom:updated>2013-02-19T02:07:09.272-08:00</atom:updated><title>Facebook May Be Mapping Out a Location-Tracking App</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;&lt;img align=&quot;left&quot; alt=&quot;Facebook May Be Mapping Out a Location-Tracking App&quot; class=&quot;story-image&quot; height=&quot;180&quot; src=&quot;http://www.technewsworld.com/images/rw638474/facebook-privacy-mobile.jpg&quot; width=&quot;180&quot; /&gt;F&lt;/span&gt;acebook or myspace, which already has a long record of skirmishes with comfort supporters, may be going toward another battle following reviews that the organization is operating on a cellular location-tracking app.&lt;br /&gt;&lt;br /&gt;The app, set for launch in mid-March, would allegedly run in the backdrop even when other applications are operating on a smart phone or when the smart phone is not in use, according to Bloomberg.&lt;br /&gt;&lt;br /&gt;Facebook is ramping up its promotion initiatives to indicate the point that more customers check in to public networking sites via cell phone gadgets. The app could help Facebook or myspace offer location-based ads, but it could also boost problems among customers about how the online community uses their private information. &lt;br /&gt;&lt;br /&gt;&amp;nbsp;Monitoring the Development of Mobile Use&lt;br /&gt;&lt;br /&gt;The group creating Facebook&#39;s place application is led by Chris Deng, formerly of Search engines, Bloomberg revealed. It also contains technicians from two Facebook or myspace acquisitions: Glancee, an French location-tracking start-up, and Gowalla, a location-based online community organization.&lt;br /&gt;&lt;br /&gt;Facebook already provides the Close by cellular development app to companies, but it is preparing to meat up its cellular products package. During a Jan. 30 call with experts, CEO Level Zuckerberg said Facebook or myspace will concentrate this season on cell phone applications.&lt;br /&gt;&lt;br /&gt;Mobile is a increasing area for Facebook or myspace, which revealed 680 thousand per month effective customers on cellular at the end of last season. Mobile everyday effective customers on Facebook or myspace surpassed those on the Web for initially in the last three several weeks of 2012.&lt;br /&gt;&lt;br /&gt;The need to pay attention to cellular was increased by advertisers&#39; adopting of public networking during last Sunday&#39;s Extremely Dish. Facebook or myspace was described in only four of 52 nationwide TV advertisements during the experience, or 8 %, while Tweets was described in 50 % of the ads, according to the Marketing Area website.&lt;br /&gt;No Need to Get Your OK&lt;br /&gt;&lt;br /&gt;Facebook may not need to ask its users&#39; authorization to monitor them.&lt;br /&gt;&lt;br /&gt;In a area of Facebook&#39;s information use plan, the organization says it may put together information about customers for promotion and promotion requirements.&lt;br /&gt;&lt;br /&gt;Facebook representative Ana Brekalo dropped to opinion for this tale.&lt;br /&gt;&lt;br /&gt;&quot;Facebook knows that it has some believe in problems with customers because of comfort problems in the last,&quot; Bieber Brookman, home of the customer comfort venture at the Middle for Democracy and Technological innovation, informed the E-Commerce Times. &quot;Whether or not their present information use plan allows for this, I extremely question they&#39;re going to convert it on by standard. The backlash wouldn&#39;t be worth it.&quot;&lt;br /&gt;&lt;br /&gt;It&#39;s uncertain that the app would proceed tracking users&#39; places in the backdrop even when it&#39;s not being used, Brookman included, because of comfort factors and the point that doing so would eat too much battery power pack.&lt;br /&gt;But Everybody&#39;s Doing It&lt;br /&gt;&lt;br /&gt;If Facebook or myspace is indeed operating on such an app, it may not be that different from what&#39;s already being provided by Apple company and Search engines.&lt;br /&gt;&lt;br /&gt;Apple&#39;s Discover My Buddies app allows customers on gadgets operating iOS 5 or later get the places of friends. Discover My Buddies is enhanced for the iPhone 5, but is also suitable with the iPod contact and iPad.&lt;br /&gt;&lt;br /&gt;A GPS Phone Tracking system app on iTunes allows customers adhere to people globally -- with their authorization -- through their iPhones or iPads. The app paths places to within 30 legs, records places from every two moments to every time, connects images to recognize customers on charts, and uses satellite tv charts or road charts. The compensated edition can adhere to up to 10 iPhones and map their motions for up to 48 time.&lt;br /&gt;&lt;br /&gt;Google provides Search engines Permission, which is part of Search engines Maps for cellular. The app is available for Android operating system, iOS or the BlackBerry. Users can control who recognizes their place and at what level of details, and they can discuss, set or cover up their place whenever they want.&lt;br /&gt;&lt;br /&gt;However, &quot;there&#39;s no real sign that that&#39;s what [Facebook&#39;s] preparing,&quot; Brookman outlined. &quot;The resources in this tale are pretty unexplained.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Technewsworld&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/facebook-may-be-mapping-out-location.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-19821539397301658</guid><pubDate>Tue, 19 Feb 2013 09:49:00 +0000</pubDate><atom:updated>2013-02-19T01:49:35.337-08:00</atom:updated><title>Review: HTC 8S smartphone </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://www.techgig.com/files/photo_1361123365_temp.jpg.pagespeed.ce.4-03xz1Fyx.jpg&quot; width=&quot;300&quot; /&gt;It is challenging to look for a intelligent phone at a cost below Rs 20,000. In the high-end section, there are gadgets like Universe S III, HTC One X+ and iPhone. But if you are not willing to spend lots of cash on a cellphone, your options are rather restricted.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The situation has enhanced in the last six months and we have started seeing some decentAndroid mobile phones that are also cost-effective. Yet, there is no one champion in this industry. The port for the best cellphone under Rs 20,000 is still start. And this is the port that HTC is focusing on with 8S, the organization&#39;s cost-effective Windows Phone 8 system. &lt;br /&gt;&lt;br /&gt;Does it succeed? Yes, but partially. HTC 8S is a very excellent system at its cost and is a deserving option over many Android os mobile phones that dot the industry. But it is not without its jeopardises. Read on to know more...&lt;br /&gt;&lt;br /&gt;Bright colors, excellent style, quick performance&lt;br /&gt;Just like the 8X, the leading Windows cellphone from HTC, the 8S has a intelligent and vivid character. The style language is also similar. The 8S too has pointed sides, at the same time a bit wider in comparison to those on the more costly cellphone. Remarkably, this gives the 8S a more healthy style and creates it a better fit in the hand. &lt;br /&gt;&lt;br /&gt;Other than the difference in width, the 8S and the 8X vary in the excellent of build content. The body of the 8S has a more plastic material feel, though not in a cheap way. The only grumble that we have in terms of style is the difficult-to-open cover on the end of the cellphone where SIM and microSD cards spots are placed. &lt;br /&gt;&lt;br /&gt;Even by its great style requirements, HTC has done a wonderful job with the 8S. The trendy colors - in Indian the product is available in red and red - go well with the shiny and vivid Windows Phone 8 user interface. &lt;br /&gt;&lt;br /&gt;Despite its relatively small size -- something that also creates it portable and easy fit in hands - the 8S features in some serious components. It is operated by a dual-core processor processor running at 1Ghz and 512MB RAM. The design are managed by Adreno 305, which is a very able processor. The cellphone has 4GB inner storage along with support for a small SD cards of up to 32GB. The primary digital camera can capture images in 5 mp. The 4-inch display sports a quality of 800x480 p. &lt;br /&gt;&lt;br /&gt;The mixture of excellent components, a shiny and precise display, and the liquid user interface of Windows Phone 8 managing software creates HTC 8S a quick cellphone. This gives it an advantage in comparison to similarly-priced Android os mobile phones, which seem slowly or experience from lag during use. &lt;br /&gt;&lt;br /&gt;In our use, we found HTC 8S to be a very able cellphone. Call excellent was clear and web surfing around was sleek. The digital camera isn&#39;t the best we have seen in a mid-range cellphone but it generates reasonable photos that are useful on websites like Facebook or myspace and Tweets. However, video clips that are taken in 720P quality are below regular in excellent. The cellphone power supply continues around 15 hours on single charge when cellphone used mainly for making calling, some surfing around, e-mails and social media. &lt;br /&gt;&lt;br /&gt;So what are the compromises?&lt;br /&gt;Despite all that is excellent in HTC 8S, the product has its restrictions. The Windows Phone 8, which abilities the product, is its durability as well as its weak point. &lt;br /&gt;&lt;br /&gt;We have written about the os previously but here is a quick conclusion. Windows Phone 8 is quick, user-friendly and wonderful but it is not as efficient or versatile as Android os. The OS does not have a appropriate alert center and appropriate multi-tasking. While some customers may not thoughts it, people who use their mobile phones to keep in touch with the real-time world through solutions like Tweets will look for the encounter missing. Deficiency of applications for Windows Phone gadgets is another problem. It is particularly an issue if your digital life moves around Search engines solutions like Youtube. com, Googlemail,Google Charts and Search engines Talk. There are some third-party applications that access into these solutions but the encounter is substandard in comparison to what Android os, which is made by Search engines, offers. &lt;br /&gt;&lt;br /&gt;The last bargain that customers will have to create with HTC 8S is absence of movie talk. The cellphone doesn&#39;t have a front digital camera so you can&#39;t movie talk with your family with it. &lt;br /&gt;&lt;br /&gt;Good cellphone for the price&lt;br /&gt;If you are out in the marketplace tracking for a intelligent phone for less than Rs 20,000 HTC 8S should be on your candidate. But before you pick it create sure that you do not thoughts what it does not have. Apps are not as numerous as what Android os mobile phones have, encounter with Search engines solutions is inadequate and if you are a large Tweets customers, this is not the product for you. In the same way, you cannot create movie calling with it. &lt;br /&gt;&lt;br /&gt;But if these restrictions are not a deal-breaker for you, 8S is a good option. It is not in the group of costly Android os mobile phones or iPhone but it doesn&#39;t have to be. At a cost of Rs 19,260 it is a strong system that is better than similarly-priced Android os mobile phones because of its quick performance, very excellent display and a great style.&amp;nbsp; &lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Htc.com/Techgig/Technorati&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/review-htc-8s-smartphone.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-402385620505025584</guid><pubDate>Tue, 19 Feb 2013 09:47:00 +0000</pubDate><atom:updated>2013-02-19T01:47:51.250-08:00</atom:updated><title>Apple second-largest smartphone brand by revenue in India </title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img align=&quot;left&quot; border=&quot;0&quot; src=&quot;http://www.techgig.com/files/photo_1361213907_temp.jpg.pagespeed.ce.CC9D3bZmIH.jpg&quot; /&gt;Its cool quotient may be fraying at home, but Apple&#39;s iPhone has become the second biggest smart phone product with regards to income and the fifth biggest by amount in Native indian, muscling its way up the group platforms assisted by an advertising blitzkrieg and some competitive costs.&lt;br /&gt;&lt;br /&gt;Yet-to-be-released information from industry trackers and cell mobile phone retailers is predicted to demonstrate that Apple organization has dislodged BlackBerry and wrested income business from No. 1 New samsung in the last one fourth of 2012, no mean task, experts say, for a organization that has lengthy viewed Native indian as a non-priority industry. In fact, just six several weeks ago, Apple organization Chief Executive Officer Tim Cook was estimated as saying Native indian did not have great potential in the &quot;intermediate term&quot;.&lt;br /&gt;&lt;br /&gt;IDC&#39;s Asia-Pacific Cellular Phone Tracking system for October-December 2012 will display later this week that Apple organization achieved a value business of 15.6% in contrast to 3.9% in the previous one fourth.&lt;br /&gt;&lt;br /&gt;Samsung, Apple organization gap narrows&lt;br /&gt;In value conditions, it was still way behind Samsung&#39;s 38.8% discuss, but ahead of BlackBerry&#39;s 6%, while its amount grew more than three periods, putting the iPhone at fifth spot behind New samsung, Micromax, Sony and Htc. &quot;Apple&#39;s rapid leap to become the second-largest player by income in mobile phones is a surprise as has been the four-fold increase in shipping of iPhones to Native indian in the last one fourth,&quot; IDC India&#39;s Senior Market Specialist Manasi Yadav said. &quot;We expect equally great numbers for the current one fourth as well.&quot;&lt;br /&gt;&lt;br /&gt;Indeed, experts say the business information for the January-March one fourth will display a further reducing of the gap between New samsung and Apple organization, making Native indian the newest arena for the high-pitch international battle between the two manufacturers.&lt;br /&gt;&lt;br /&gt;According to IDC information, New samsung, which is still the leader in the mobile phones section with a significant lead, reported an almost 12% fall in value business and deliveries in the fourth one fourth in contrast to the previous one. Even BlackBerry and HTC lost ground during the period, which experts feature to Apple&#39;s violence in the industry.&lt;br /&gt;&lt;br /&gt;Another review on cell mobile phone deliveries by Online Media Analysis is also predicted to confirm Apple&#39;s leap in the smart phone group platforms. The yet-to-be-published review is predicted to say Apple organization had deliveries worth Rs 1,142.8 crore in the October-December 2012 one fourth into Native indian, more than three periods that of manufacturers such as BlackBerry and Htc.&lt;br /&gt;&lt;br /&gt;&quot;Apple has deep pouches and we have to take its rapid violence seriously. However, it still has a lengthy path to travel,&quot; said BlackBerry Native indian Managing Director Sunil Dutt.&lt;br /&gt;&lt;br /&gt;But New samsung, which offers mobile phones at multiple prices unlike Apple&#39;s mostly premium costs, is unfazed by Apple&#39;s newly found violence in Native indian. Company authorities say New samsung enjoys more than 55% business by value in the Rs 20,000-plus mobile phones section.&lt;br /&gt;&lt;br /&gt;&quot;We are further looking at combining our industry leadership,&quot; said New samsung Cellular V-P Asim Warsi, adding the New samsung Universe Note 2 was the top-selling design in the Rs 20,000-plus mobile phones industry.&lt;br /&gt;&lt;br /&gt;Analysts feature the rapid leap in Apple&#39;s business to a critical choice the organization took last one fourth to push income in electronic shops through two retail shop suppliers, Ingram Micro and Redington, instead of just depending on sites of telecommunications providers.&lt;br /&gt;&lt;br /&gt;Research firm Gartner&#39;s principal research analyst Anshul Gupta said the appointment of the two suppliers, which together have more than 10,000 shops, instantly increased the retail shop impact of iPhones in Native indian. Apple&#39;s choice to quickly release the iPhone 5 in Native indian, almost at the same time with the international release, together with local payments of apps in Native indian rupees have also assisted the product gain traction.&lt;br /&gt;&lt;br /&gt;The performance of the product will be music to the ears of Apple&#39;s managers in Cupertino, California, who in recent weeks have been delivered over the hot coals over its stock cost performance and the iPhone&#39;s apparently decreasing attract in contrast to New samsung.&lt;br /&gt;&lt;br /&gt;Mobile mobile phone retail shop chains such as The Cellular Store, Future Team&#39;s eZone, Next Retail, Dependency Digital and Dependency iStore, which together operate 1,000 shops, review iPhone income have more than doubled on monthly on-month basis since Jan this year, assisted by an competitive costs plan that helps consumers buy an iPhone for a down-payment of Rs 9,990 and the rest in monthly instalments.&lt;br /&gt;&lt;br /&gt;The iPhone costs Rs 45,500 on average, with the cheapest design (iPhone4 8GB) charging Rs 26,500 and its newest and most expensive iPhone5 64GB design charging Rs 60,690. By comparison, the Samsung&#39;s Universe models cost between Rs 5,990 and Rs 20,900, with the more costly design at Rs 35,599.&lt;br /&gt;&lt;br /&gt;Himanshu Chakrawarti, CEO at The Cellular Store, the Essar Group-owned biggest mobile phone store in the country with 800 shops, told ET the iPhone5 has become the second-highest promoting design since Jan in its shops, next to New samsung Universe Grand Duos which is charging less than half the Apple organization design.&lt;br /&gt;&lt;br /&gt;In the case of The Cellular Store, Apple&#39;s discuss of total mobile phone income has increased to almost 17% from 5% in the past two several weeks, with income of the iPhone defeating BlackBerry since last Nov. &quot;The EMI plan has made the iPhone affordable for Native indian customers,&quot; said Chakrawarti.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Apple.com/Techgig&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/apple-second-largest-smartphone-brand_19.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-6008659340980856950</guid><pubDate>Mon, 18 Feb 2013 08:48:00 +0000</pubDate><atom:updated>2013-02-18T00:48:17.241-08:00</atom:updated><title>6 tips to stay connected during power failure</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img src=&quot;http://timesofindia.indiatimes.com/photo/18530462.cms&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Here are some tips for interacting with urgent services and loved in case of a energy failing or an emergency:&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* Keep your mobile phones connected in so that they&#39;re fully billed if the energy goes out. There are various products available that can renew a mobile cellphone from a larger standard battery power or AA battery power.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* Even if your mobile cellphone is billed when the energy goes out, the wi-fi system may not perform. Some mobile systems are equipped with back-up battery power and some have turbines, but not all.&amp;nbsp;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* If your energy goes out, you could use your car to renew your mobile phones. Of course, don&#39;t run the car in an internal space, or you risk co harming.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* Preferably, you should have a attached residential cellphone as well. They get all the energy they need from the line itself. Wireless mobile phones leave the workplace when the energy goes out.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* Operating mobile systems may be beyond capacity by people contacting to check in on each other or browsing the Web. Cellphone companies recommend sms information rather than contacting in any catastrophe, because sms information use much less system capacity. They also don&#39;t use much battery power pack. Using Facebook or myspace and Twitter can be attractive, but try to keep usage brief and use the cell cell phone&#39;s applications rather than web internet explorer if possible, to reduce system use and battery power strain.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* But if you lose energy at home, your homes websites won&#39;t perform. Wi-fi assistance on your mobile phones is your best bet.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
* If you have a battery-powered stereo or car stereo, use it to get your news up-dates rather than challenging the wi-fi system and your cellphone battery power.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Techgig.com&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/6-tips-to-stay-connected-during-power.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-2176473344542097829</guid><pubDate>Mon, 18 Feb 2013 08:46:00 +0000</pubDate><atom:updated>2013-02-18T00:46:37.358-08:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;img alt=&quot;Apple to launch iOS 6.1.2 &quot; src=&quot;http://cdn.mos.techradar.com///art/mobile_phones/iPhone/iPhone-04-470-75.jpg&quot; /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Apple&#39;s guaranteed fix for an iOS 6.1 bug that allows criminals to by-pass a customer&#39;s passcode and accessibility certain places of the phone, could be launched this weeks time.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
German site iFix statements that iOS 6.1.2 will be in the community world by Feb 20, at the newest, as Apple company looks to lockdown the risky defect.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Earlier this weeks time videos clip was published online displaying how a complicated sequence of key drives could nullify the passcode and discover picture collections, contacting records, voicemail messages and allow the cyberpunk to alter connections.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Apple has recognized the issue, which is almost similar to one which appeared truly, and said it is quickly working on a fix, but did not condition when it would appear.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Prediction&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Apple requires customer protection very seriously,&quot; said company representative Trudy Muller on Friday. &quot;We are conscious of this issue and will provide a fix in a upcoming application upgrade.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Now iFix, estimating the same resources it used to pre-empt the discharge of iOS 6.1.1 the other day, to estimate iOS 6.1.2 will appear beginning next weeks time, perhaps as soon as Thursday or Wednesday.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Source: Apple.com&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/apples-guaranteed-fix-for-ios-6.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-2987043977139738622</guid><pubDate>Mon, 18 Feb 2013 08:44:00 +0000</pubDate><atom:updated>2013-02-18T00:45:22.191-08:00</atom:updated><title>Facebook Says it Was Hacked???</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Facebook or myspace said on Saturday it had been the target of an unknown cyberpunk group, but it found no proof that customer details was affected.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Last 30 days, Facebook or myspace protection found that our systems had been focused in a innovative strike,&quot; the organization said in a writing published on Saturday mid-day, just before the three-day Presidents Day few days. &quot;The strike happened when a few workers frequented a mobile designer web page that was affected.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The online community, which says it has more than one billion dollars active users globally, also said: &quot;Facebook was not alone in this strike. It is clear that others were assaulted and treated recently as well.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Facebook dropped to opinion on the purpose or source of the strike.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
A protection expert at another organization with knowledge of the issue said he was told the Facebook or myspace strike showed up to have started in China suppliers.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The FBI dropped to opinion, while the Department of Birthplace Security did not immediately return a call looking for opinion.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Facebook&#39;s declaration follows recent online strikes on other popular sites. Twitter, the microblogging online community, said recently it had been compromised and that about 250,000 customer accounts were potentially affected, with assailants accessing details, such as customer names and contact details.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Newspaper sites, such as those of The New You are able to Times (NYT.N), The California Publish and The Wall Street Publication, have also been treated. Those strikes were linked by the news companies to China online hackers focusing on coverage of China suppliers.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
While Facebook or myspace said no customer details was affected, the occurrence could raise consumer concerns about comfort and the weeknesses of private details saved within the online community.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Facebook has made several comfort problems over the years because of the way it managed customer details and it resolved a comfort research with federal authorities this year.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Facebook said it identified a dubious data file and tracked it back to an worker&#39;s laptop computer. After using a forensic evaluation of notebooks computer, Facebook or myspace said it determined a harmful data file, then explored company-wide and determined &quot;several other affected worker notebooks.&quot;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Another person briefed on the issue said the first Facebook or myspace worker had been contaminated via a web page where programming strategies were mentioned.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
The organization also said it determined a formerly hidden make an effort to avoid its built-in cyberdefenses and that new rights were added on Feb 1.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Because the strike used a third-party web page, it might have been an early-stage make an effort to go through as many companies as possible.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
If they followed established styles, the assailants would learn about the people and computer networks at all the contaminated companies. They could then use that details in more focused strikes to grab resource value and other ip.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In its declaration, Facebook or myspace said the strike was released using a &quot;zero-day,&quot; or formerly unknown defect in its software that utilized its Coffee built-in rights.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&quot;Zero-day&quot; strikes are hardly ever found and even more hardly ever revealed. They are costly to release and often suggest government support.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
In Jan 2010, Search engines revealed it had been occupied via a &quot;zero-day&quot; defect in an older version of the Internet Traveler Web internet browser. The assailants were looking for resource value and were also interested in China dissidents, and Search engines reduced its functions in the country as a result.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Attention to cybersecurity has ratcheted up since then and this week Chief professional Barack Barack obama released an professional order looking for higher safety requirements for critical facilities.&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: justify;&quot;&gt;
Other companies stand to benefit more from comprehensive regulation, which has delayed in The legislature. Conservatives have opposed additional rules that would come with compulsory protection requirements.&lt;br /&gt;
&lt;br /&gt;
Source: Techgig.com&lt;/div&gt;
&lt;/div&gt;
</description><link>http://hackingtips011.blogspot.com/2013/02/facebook-says-it-was-hacked.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-1556490018644870729</guid><pubDate>Thu, 30 Jun 2011 05:21:00 +0000</pubDate><atom:updated>2011-06-29T22:21:03.329-07:00</atom:updated><title>Basic Needs To Become a Hacker</title><description>What are the basics to become a hacker&lt;br /&gt;
&lt;br /&gt;
Everyone has heard of a person or someone else who was caught while hacking into computers belonging to a particular organization. Because hacking computers is illegal, it should be noted that this article does not cite any real specifics on the subject, and this writer would be like to invite you to become a true hacker - professionally.&lt;br /&gt;
&lt;br /&gt;
This article will give you a brief overview of the criminal hackers, some of their methods, and some things you can do to your computer safe from hacker attacks. Here are the things you need to learn to become a hacker.&lt;br /&gt;
&lt;br /&gt;
Learn Computer&lt;br /&gt;
&lt;br /&gt;
It &#39;obvious that the first thing you need to do is learn about computers. This refers to the study. Reading a lot is involved with old-fashioned simple to learn to use computers. Then, of course, there are specific aspects of the study. Places where the tips have learned is often twofold: first, a friend who has access to a computer, and various places online. But this is also an interesting thing - if the young person has the ability to learn, and wants to learn can be used for hacking guides, so why not take the time to learn the right things - things that can earn lots of money in world are legit? It &#39;could be possible that one of his friends, who dismisses him for ever?</description><link>http://hackingtips011.blogspot.com/2011/06/basic-needs-to-become-hacker.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-5230815296957350735</guid><pubDate>Thu, 30 Jun 2011 05:20:00 +0000</pubDate><atom:updated>2011-06-29T22:20:09.637-07:00</atom:updated><title>Hacker and Culture</title><description>Hacker culture has existed for many decades, even though most of us may have been recently noted, thanks to films like The Matrix. However, the hacker culture has been there and were constantly affect our society and our way of seeing the world. From manga to computer knowledge, the hacker culture, gradually made its way into our lives.&lt;br /&gt;
&lt;br /&gt;
What is the hacker culture?&lt;br /&gt;
&lt;br /&gt;
Hacker culture is composed of all those human experiences and expressions, which are related to take advantage of hardware and software. At this moment there are three types of hackers. The first and best known type of black hat hacker is a hacker, or a person who uses his knowledge to gain a personal advantage. Usually it means to steal information that can be sold on the black market.&lt;br /&gt;
&lt;br /&gt;
Pirates bolder black hat is able to decipher the bank, without a trace. Fortunately, the bank security and global cooperation was able to place certain restrictions and control over them.&lt;br /&gt;
&lt;br /&gt;
The other side of the white balance is to affect a hacker, security specialist, who works with organizations and help with the problems of your computer&#39;s security.&lt;br /&gt;
&lt;br /&gt;
Finally, a gray hat hackers. Hackers are composed of people who walk a thin line of white hat hackers and black hat hackers. Generally, they are influenced in their need for money or lust for recognition of the hacker community.&lt;br /&gt;
&lt;br /&gt;
What are the origins of the hacker culture?&lt;br /&gt;
&lt;br /&gt;
It can be said that hackers have been around since time immemorial. Although Merriam-Webster describes a hacker as a computer expert, in fact, a hacker is a person who is looking for weaknesses in the system and try to exploit to their advantage.&lt;br /&gt;
&lt;br /&gt;
Under this definition, was Philip II of Macedon, father of Alexander the Great, a hacker. How so? He noted that there were some weaknesses in the armies of ancient Greece. For use in his favor, he decided to implement a number of improvements to its own army. As history has shown us that these improvements in his favor and in favor of its famous Sun&lt;br /&gt;
&lt;br /&gt;
The same could be said to Napoleon, who noted that the movement and artillery could be used in such a way that no army in Europe would be able to resist him. Unfortunately for him, he forgot to consider that logistics was an important thing to consider, when he mobilized hundreds of thousands of men in the Russian Empire.</description><link>http://hackingtips011.blogspot.com/2011/06/hacker-and-culture.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4732089077095845568</guid><pubDate>Thu, 30 Jun 2011 05:19:00 +0000</pubDate><atom:updated>2011-06-29T22:19:15.289-07:00</atom:updated><title>Hacking Software Programs</title><description>The Computer Emergency Response Team (CERT) has warned against the growing threat of cyber attacks as it was much more automated hacking tools that are designed to take maximum impact in the shortest possible. With a large number of malicious software, hackers can control distributed systems to automatically scan systems and attack systems by taking immediate advantage of system vulnerabilities and exploit them.&lt;br /&gt;
&lt;br /&gt;
Hundreds of free software hackers are available and easy to use that even a novice can turn a highly paid professional. With a wide range of easy to use, software piracy in South Africa was again the sky pirates, &quot;the injection of illegitimate programs in remote control systems for the fraudulent act of entering Web sites.&lt;br /&gt;
&lt;br /&gt;
Attacks with Hacking Program&lt;br /&gt;
&lt;br /&gt;
Hackers, by any means, to launch attacks against a server GAMCO, which houses a number of websites. In this sense we can win without unimpeded access to these sites, with a reason to aspire information and secret documents and in some cases even money. Pirated software is a technically superior control software designed to be used as hacking programs that help find what the hacker wants to know.&lt;br /&gt;
&lt;br /&gt;
An attacker can be a spouse who can use a free program of hacking with the intention to know everything about the woman or her husband. Interested tutors can also hack into the systems of their departments to discover their actions and approaches.&lt;br /&gt;
&lt;br /&gt;
With a wide range of programs readily available hacking password, a hacker breaks into home sites large and small companies, which smuggled out of all the secret protocols, which refers to the concerns, financial and other movements.&lt;br /&gt;
&lt;br /&gt;
A wonderful example of such software program is SpyRecon that allows an attacker to control a remote system from anywhere - to what extent it can be. SpyRecon is the hacking program - so smart and so strong that it allows the user to track any target system while secretly record and automatically, what happens to the target system. This may be software pirate who sends each recorded activity, connection details, keystrokes, screenshots of the e-mail and chat, even personal. For SpyRecon total surprise turned out to be one hundred percent compatible with almost all the major online services or applications such as Neopets, Yahoo, AOL, Hotmail, MSN, AIM and LiveJournal.&lt;br /&gt;
&lt;br /&gt;
There are a huge number of free software hacking just as intelligent as SpyRecon provides immense pleasure to hackers breaking into other systems without a trial. Another, as the latest hacking program, which can be completely free of charge, the Camera / Shy software, just released by the dedicated team of hackers do not know how new Hactive.&lt;br /&gt;
&lt;br /&gt;
Activists can change the contents prohibited by the entire World Wide Web using the Camera / Shy software. Because the software is dedicated to the famous former Chinese leader, Wang Ruowang, it was noted that China is one of the nation, who have shown enormous interest in the Camera / Shy software. Steganography software is yet another free program hack, which is designed for advanced users who have a good grip on the technical know-how.</description><link>http://hackingtips011.blogspot.com/2011/06/hacking-software-programs.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-2748896934264755710</guid><pubDate>Wed, 04 May 2011 07:11:00 +0000</pubDate><atom:updated>2011-05-04T00:11:35.817-07:00</atom:updated><title>Hacking Webcams And More..</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
Hacking webcams ... This is not a guide to hacking ..&lt;br /&gt;
&lt;br /&gt;
Rather it is a tutorial to show you how to do a simple search for unprotected webcams on the net.&lt;br /&gt;
&lt;br /&gt;
This is only for fun ...&lt;br /&gt;
&lt;br /&gt;
You are fully responsible for your actions ...&lt;br /&gt;
&lt;br /&gt;
(Note: These are not the personal web, this is only a guide to see the public web, such as traffic cameras)&lt;br /&gt;
&lt;br /&gt;
START&lt;br /&gt;
&lt;br /&gt;
Go to this link:&lt;br /&gt;
&lt;br /&gt;
www.google.com&lt;br /&gt;
&lt;br /&gt;
and put it into the search bar&lt;br /&gt;
&lt;br /&gt;
inurl: / view / index.shtml&lt;br /&gt;
&lt;br /&gt;
or&lt;br /&gt;
&lt;br /&gt;
liveapplet inurl: intitle LvAppl&lt;br /&gt;
&lt;br /&gt;
and click Google Search ...&lt;br /&gt;
&lt;br /&gt;
displays a list of search items.&lt;br /&gt;
&lt;br /&gt;
Go to any of the links ... Some of them do not work.&lt;br /&gt;
&lt;br /&gt;
You will be able to view the cameras on the street / traffic ...&lt;br /&gt;
&lt;br /&gt;
and not only .. you can also control the move right or left, or zooming in or out ...&lt;br /&gt;
&lt;br /&gt;
It&#39;s a bit of fun&lt;br /&gt;
&lt;br /&gt;
Have fun.&lt;br /&gt;
&lt;br /&gt;
NOTE: You should have a fast connection to this ...&lt;br /&gt;
&lt;br /&gt;
Create folders and files can not be! Name&lt;br /&gt;
&lt;br /&gt;
This trick will allow you to create files and folders with no name.&lt;br /&gt;
&lt;br /&gt;
Just follow the steps below:&lt;br /&gt;
&lt;br /&gt;
1. Select a file or folder.&lt;br /&gt;
&lt;br /&gt;
2.Right click on the name of the press, or press F2.&lt;br /&gt;
&lt;br /&gt;
3. Press and hold down the Alt key. While holding down the Alt key, type numbers 0160 from the keypad.&lt;br /&gt;
&lt;br /&gt;
Note: The numbers Type 0160 in the keypad, which is the number of people present on the right side of the keyboard. Do not type the numbers that are present in the top of the character keys.&lt;br /&gt;
&lt;br /&gt;
4. Press Enter and the nameless file or folder is created.&lt;br /&gt;
&lt;br /&gt;
Hide files in JPEG format! Well, you know you can hide your files in a JPEG file? You only need to download WinRAR. You just need a little knowledge about the command prompt and installed WinRAR.&lt;br /&gt;
&lt;br /&gt;
Ok, give ...&lt;br /&gt;
&lt;br /&gt;
1. Gather all the files you want to hide a folder anywhere on your PC (not in C: \ hidden - recommended).&lt;br /&gt;
&lt;br /&gt;
2. Now add these files in a RAR file (example secret.rar). This file must also be in the same directory (C: \ hidden).&lt;br /&gt;
&lt;br /&gt;
3. Now look for a single image JPEG file (eg logo.jpg). Copy and paste this file also in C: \ hidden.&lt;br /&gt;
&lt;br /&gt;
4. Now open the command prompt (go to Run and type &quot;cmd&quot;). Make your working directory C: \ hidden.&lt;br /&gt;
&lt;br /&gt;
5. Now type: &quot;logo.jpg COPY / b + output.jpg secret.rar&quot; (without the quotes) - Now, logo.jpg is the picture you want to show secret.rar is the file to be hidden, and output. jpg is the file that contains both. : D&lt;br /&gt;
&lt;br /&gt;
6. Now, having done this, you will see a file output.jpg in C: \ hidden. Open (double click) and display the image you want to see. Now try to open the same file with WinRAR, it will show hidden files.&lt;br /&gt;
&lt;br /&gt;
Running multiple Yahoo Messengers&lt;br /&gt;
&lt;br /&gt;
It is possible to run multiple Yahoo Messenger simultaneously right after installing the official version of Yahoo Messenger.&lt;br /&gt;
&lt;br /&gt;
You will need a simple patch Windows registry to enable this feature.&lt;br /&gt;
&lt;br /&gt;
&amp;amp;gt;&amp;amp;gt; Follow these steps:&lt;br /&gt;
&lt;br /&gt;
1. Open Notepad&lt;br /&gt;
&lt;br /&gt;
2. Copy the following code&lt;br /&gt;
&lt;br /&gt;
REGEDIT4 [HKEY_CURRENT_USER \ Software \ Yahoo \ pager \ Test] &quot;Plural&quot; = dword: 00000001&lt;br /&gt;
&lt;br /&gt;
3. Save the above code as multi.reg&lt;br /&gt;
&lt;br /&gt;
4. Double-click the file or right click and select Merge. (The goal is to combine these options in the Windows registry)&lt;br /&gt;
&lt;br /&gt;
XP Boot Pen Drive&lt;br /&gt;
&lt;br /&gt;
There are times when a small error in the Windows registry or a viral infection can cause your system unbootable. In this state of a properly configured USB drive on hand with Bart Lagerweij free utility (BartPE), is a practical replacement for the Windows operating system.&lt;br /&gt;
&lt;br /&gt;
BartPE will give you a complete Win32 environment with network support, a graphical user interface (800x600) and FAT / NTFS / CDFS file system support for.&lt;br /&gt;
&lt;br /&gt;
Do not confuse BartPE official Microsoft Windows PE. BartPE has some interesting features compared to Windows PE and is freeware.&lt;br /&gt;
&lt;br /&gt;
Requirements for the installation of BartPE:&lt;br /&gt;
&lt;br /&gt;
:: The USB flash drive with at least 256 MB of storage capacity.&lt;br /&gt;
&lt;br /&gt;
:: The records of the Windows installation CD-ROM.&lt;br /&gt;
&lt;br /&gt;
How it works:&lt;br /&gt;
&lt;br /&gt;
:: PE Builder, closer to its original settings of Windows XP operating system information should be lean, which is ready to begin, or a USB memory stick.&lt;br /&gt;
&lt;br /&gt;
:: This compact, portable version of Windows includes all the important system tools to deal with the PC in case of emergency.&lt;br /&gt;
&lt;br /&gt;
:: You can also add other programs of the collection, such as the media writing tool for Nero Burning ROM or an anti-spyware package such as Ad-Aware SE Personal, during the installation.&lt;br /&gt;
&lt;br /&gt;
Steps:&lt;br /&gt;
&lt;br /&gt;
:: Download the latest PE Builder&#39;s (self-installing package) and install it.&lt;br /&gt;
&lt;br /&gt;
Start PE Builder (pebuilder.exe) and insert Microsoft Windows XP installation / setup CD, it condenses the installation file to your pen drive.&lt;br /&gt;
&lt;br /&gt;
:: In the main dialog box office PE Builder, select the &quot;Pen Drive&quot; option. Click &quot;Build&quot; button. PE Builder will now ask you to create a BartPE directory, answer &quot;yes.&quot;&lt;br /&gt;
&lt;br /&gt;
:: PE Builder now start building BartPE. This may take several minutes. You will see a lot of files to be copied and / or unloading, you must flash drive. If the verification data has been corrected and where there are no errors reported you can boot the Pen Drive.&lt;br /&gt;
&lt;br /&gt;
next Mason (PKK)&lt;br /&gt;
&lt;br /&gt;
How to Hack on MSN:&lt;br /&gt;
&lt;br /&gt;
Brute force method&lt;br /&gt;
&lt;br /&gt;
a. Use telnet to port 110 (Hotmail&#39;s pop-server)&lt;br /&gt;
&lt;br /&gt;
b. Type the user, then the victim&lt;br /&gt;
&lt;br /&gt;
Username&lt;br /&gt;
&lt;br /&gt;
c. Type PASS and then guess a password&lt;br /&gt;
&lt;br /&gt;
d. Repeat until you have found the correct password.&lt;br /&gt;
&lt;br /&gt;
!. This&lt;br /&gt;
&lt;br /&gt;
is called piracy requires strength and patience.&lt;br /&gt;
&lt;br /&gt;
Is better than trying to guess the password of the victims&lt;br /&gt;
&lt;br /&gt;
hotmail&lt;br /&gt;
&lt;br /&gt;
home page just because it&#39;s faster.&lt;br /&gt;
&lt;br /&gt;
____&lt;br /&gt;
&lt;br /&gt;
I_2_I - The best way&lt;br /&gt;
&lt;br /&gt;
a. Get the username of the victim (It is usually located in&lt;br /&gt;
&lt;br /&gt;
Address field&lt;br /&gt;
&lt;br /&gt;
b. Then type &quot;www.hotmail.com / cgi-bin / start / victimsusername&quot;&lt;br /&gt;
&lt;br /&gt;
c. you are in!&lt;br /&gt;
&lt;br /&gt;
!. This hack only works if you&#39;re on the same network or computer that&lt;br /&gt;
&lt;br /&gt;
victim and if not registered.&lt;br /&gt;
&lt;br /&gt;
____&lt;br /&gt;
&lt;br /&gt;
I_3_I - The Old Road&lt;br /&gt;
&lt;br /&gt;
a. Go to&lt;br /&gt;
&lt;br /&gt;
http://www.hotmail/proxy.html&lt;br /&gt;
&lt;br /&gt;
b. Now, type the user name victims. (Click Login)&lt;br /&gt;
&lt;br /&gt;
c. Look at the source code.&lt;br /&gt;
&lt;br /&gt;
d. In the fifth line&lt;br /&gt;
&lt;br /&gt;
U should find &quot;action = someadress&quot;&lt;br /&gt;
&lt;br /&gt;
e. Copy and paste the address in the Address field&lt;br /&gt;
&lt;br /&gt;
f. You&#39;re ..&lt;br /&gt;
&lt;br /&gt;
!. As you can see&lt;br /&gt;
&lt;br /&gt;
It is a long process and the victim is&lt;br /&gt;
&lt;br /&gt;
long time to disconnect.&lt;br /&gt;
&lt;br /&gt;
____&lt;br /&gt;
&lt;br /&gt;
I_4_I - Another ...&lt;br /&gt;
&lt;br /&gt;
a. Go to home page hotmail&lt;br /&gt;
&lt;br /&gt;
b. Copy the source code.&lt;br /&gt;
&lt;br /&gt;
c. Create a new html file with the same code but change method = post&lt;br /&gt;
&lt;br /&gt;
method = get&lt;br /&gt;
&lt;br /&gt;
d. &quot;View&quot; on page&lt;br /&gt;
&lt;br /&gt;
e. Change the www.hotmail.com/ address (not press enter!)&lt;br /&gt;
&lt;br /&gt;
f. Making the victim to write your username and password&lt;br /&gt;
&lt;br /&gt;
g. see in the address field. Here you can see ... &amp;amp; Password: something ...&lt;br /&gt;
&lt;br /&gt;
!. This is the way I use, because it allows&lt;br /&gt;
&lt;br /&gt;
password.&lt;br /&gt;
&lt;br /&gt;
(If you exit the browser, you can see the password in the History folder!)&lt;br /&gt;
&lt;br /&gt;
READ!&lt;br /&gt;
&lt;br /&gt;
Administrators Hotmail&lt;br /&gt;
&lt;br /&gt;
changed &quot;system&quot; so that the victim can connect&lt;br /&gt;
&lt;br /&gt;
power&lt;br /&gt;
&lt;br /&gt;
If you&#39;re in your account. So do not waste your time!&lt;br /&gt;
&lt;br /&gt;
If you are a beginner, I would not do this your first attempt&lt;br /&gt;
&lt;br /&gt;
hacking. When you want to do is to use a port surfer and surf over&lt;br /&gt;
&lt;br /&gt;
port 80. Once there, try e-mail user&lt;br /&gt;
&lt;br /&gt;
want password. It is preferable&lt;br /&gt;
&lt;br /&gt;
their mail using the word&lt;br /&gt;
&lt;br /&gt;
&quot;We&quot; and &quot;Here at Hotmail ...&quot; Most of the releases this fall and end&lt;br /&gt;
&lt;br /&gt;
to provide their&lt;br /&gt;
&lt;br /&gt;
password. There is also another way you can&lt;br /&gt;
&lt;br /&gt;
obtain an anon mailer, and create staff@hotmail.com address.&lt;br /&gt;
&lt;br /&gt;
But&lt;br /&gt;
&lt;br /&gt;
you need to change the reply address to go to a different address&lt;br /&gt;
&lt;br /&gt;
as user@host.com. The person who&lt;br /&gt;
&lt;br /&gt;
try to get the card shall respond to this letter in the mail that was sent to you.&lt;br /&gt;
&lt;br /&gt;
Text, like &quot;I want an answer to this letter with the&quot; password &quot;&lt;br /&gt;
&lt;br /&gt;
below and please include your username and password.&lt;br /&gt;
&lt;br /&gt;
If you have trouble logging in the coming days, it is&lt;br /&gt;
&lt;br /&gt;
only because we are updating our mail servers, but not need&lt;br /&gt;
&lt;br /&gt;
worry, your messages are still there. Even if the server can be shut down&lt;br /&gt;
&lt;br /&gt;
for one hour. Hotmail staff, thank you. &quot;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
Cause: The file or folder that seems nameless is actually the name of an area.&lt;br /&gt;
&lt;br /&gt;
But what if you want to create another nameless file or folder in the same directory?&lt;br /&gt;
&lt;br /&gt;
To do this you need to rename the file with 2 seats. Just follow these steps:&lt;br /&gt;
&lt;br /&gt;
1. Select the file, press F2.&lt;br /&gt;
&lt;br /&gt;
2.Hold Alt key and type 0160 from the keypad.&lt;br /&gt;
&lt;br /&gt;
3.release the ALT key. Now, without doing anything else, once again to hold the Alt key and press 0160.&lt;br /&gt;
&lt;br /&gt;
4. Press enter and you have another nameless file in the same directory.&lt;br /&gt;
&lt;br /&gt;
Step 3 5.Repeat create as many nameless files or folders in the same directory.&lt;br /&gt;
&lt;br /&gt;
(We&#39;ve had problems deleting these folders, to do this, restart the computer in Safe Mode and delete it from there.)&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/05/hacking-webcams-and-more.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-8343573769255084109</guid><pubDate>Wed, 04 May 2011 06:58:00 +0000</pubDate><atom:updated>2011-05-03T23:58:45.176-07:00</atom:updated><title>How To Set Up Multiple Users On A PC</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;br /&gt;
Setting up separate accounts on a shared PC would help to retain documents as images and organized labor, and it will be much easier to follow both the duties of tomorrow and the budget proposal next week .&lt;br /&gt;
&lt;br /&gt;
Step By Step&lt;br /&gt;
&lt;br /&gt;
1. Click the Windows orb to open the Start menu, then click Control Panel.&lt;br /&gt;
&lt;br /&gt;
2. If you are using Classic View, click the icon called User Accounts. &quot; Usually accompanied by an icon of two cartoons. If you use the new control panel is standard on Vista and Windows 7, click on Add or remove user accounts &quot;, the text in the User Accounts and Family Safety&quot; section. This takes you to Manage Accounts screen, allowing you to change your user accounts after adding&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipDzMdgoQnJyM-KIl-vANG5TADVWsms_D60Tp_uhx8lRTNZZ-4oTpO1cgpOhyQ835qomRkWynoeumRX99KJ8i3wJBXrjcqJCqww5hhAvF2ttTaa849TskwmZItWWXDc7y_OB_xE5B4BJs/s1600/210558-multiple-user-on-windows-step3_6063_original.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;229&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipDzMdgoQnJyM-KIl-vANG5TADVWsms_D60Tp_uhx8lRTNZZ-4oTpO1cgpOhyQ835qomRkWynoeumRX99KJ8i3wJBXrjcqJCqww5hhAvF2ttTaa849TskwmZItWWXDc7y_OB_xE5B4BJs/s320/210558-multiple-user-on-windows-step3_6063_original.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;
&lt;br /&gt;
3. Click &quot;Create a new account&quot; in the large text box that shows the current users.&lt;br /&gt;
&lt;br /&gt;
4. Label a new account name. Give each user account name that accurately describes what it once was. For example, if an account is intended for adults and children, the label of the new account &quot;Kids&quot;. You can also create an account for household use, such as games or sending an e-mail, and the second part of work-related enterprises.&lt;br /&gt;
&lt;br /&gt;
5. Select an account type. There are two options, the standard account and the account administrator. standard account can use the software and install and remove programs, but they can not make changes that affect all users, or which may compromise the safety of your computer. Admin accounts have full control of your computer, but may require password authentication to prevent unwanted changes to the system.&lt;br /&gt;
&lt;br /&gt;
6. Add a password for your account by clicking the desired account in the Account Management screen. Click &quot;Create a password&quot; text, then type the appropriate information in the appropriate boxes. Click Create password to complete the process. a password and change the access settings.&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/05/how-to-set-up-multiple-users-on-pc.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEipDzMdgoQnJyM-KIl-vANG5TADVWsms_D60Tp_uhx8lRTNZZ-4oTpO1cgpOhyQ835qomRkWynoeumRX99KJ8i3wJBXrjcqJCqww5hhAvF2ttTaa849TskwmZItWWXDc7y_OB_xE5B4BJs/s72-c/210558-multiple-user-on-windows-step3_6063_original.jpg" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4031723166039298757</guid><pubDate>Wed, 27 Apr 2011 08:56:00 +0000</pubDate><atom:updated>2011-04-27T01:56:45.327-07:00</atom:updated><title>Create Your Own IM Bot( Yahoo, Gmail) Instant Messenger</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;This quick tutorial demonstrates how to develop your own functional IM bot that works with Google Talk, Yahoo Messenger, Windows Live and all other popular instant messaging programs.&lt;br /&gt;
To begin with, only to learn some basic programming skills (any language that do) and web space to host your bot.&lt;br /&gt;
@For this example, I created a dummy bot called &quot;dangerous&quot; to listen to your instant messages. To see this live, add &lt;a href=&quot;mailto:hackingtips011@bot.im&quot;&gt;hackingtips011@bot.im&lt;/a&gt; your GTalk contact list and start chatting&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-1U8i_uC0T2uEH898NMPV4qACZuo1T1BD_AnPcPK46oMCou5l9O-KCrVT2NhTddbYiFsgjFYDDGrzd3NZogB7ncaijf6krjnnEKzxMrYLyaPcEYmQdUsaJfkCPK6vkkxhdAOrBwJ84M/s1600/imbot.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;286px&quot; j8=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-1U8i_uC0T2uEH898NMPV4qACZuo1T1BD_AnPcPK46oMCou5l9O-KCrVT2NhTddbYiFsgjFYDDGrzd3NZogB7ncaijf6krjnnEKzxMrYLyaPcEYmQdUsaJfkCPK6vkkxhdAOrBwJ84M/s320/imbot.gif&quot; width=&quot;320px&quot; /&gt;&lt;/a&gt;&lt;/div&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-1U8i_uC0T2uEH898NMPV4qACZuo1T1BD_AnPcPK46oMCou5l9O-KCrVT2NhTddbYiFsgjFYDDGrzd3NZogB7ncaijf6krjnnEKzxMrYLyaPcEYmQdUsaJfkCPK6vkkxhdAOrBwJ84M/s1600/imbot.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;286px&quot; j8=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-1U8i_uC0T2uEH898NMPV4qACZuo1T1BD_AnPcPK46oMCou5l9O-KCrVT2NhTddbYiFsgjFYDDGrzd3NZogB7ncaijf6krjnnEKzxMrYLyaPcEYmQdUsaJfkCPK6vkkxhdAOrBwJ84M/s320/imbot.gif&quot; width=&quot;320px&quot; /&gt;&lt;/a&gt;&lt;/div&gt;If you want to write a personal IM bot, just follow these simple steps: -&lt;br /&gt;
Step 1: Go &lt;a href=&quot;http://www.imified.com/&quot;&gt;http://www.imified.com/&lt;/a&gt; and register a new account of the bot.&lt;br /&gt;
Step 2: Now is the time to create a bot that is a very simple script that resides on the public web server.&lt;br /&gt;
It could be PHP, Perl, Python or other languages.&lt;br /&gt;
Hello World example bot:&lt;br /&gt;
The example shows how easy it is to create a bot.&lt;br /&gt;
This example is coded in PHP.&lt;br /&gt;
&amp;lt;?php&lt;br /&gt;
switch ($ _REQUEST [step &#39;]) {&lt;br /&gt;
Case 1:&lt;br /&gt;
echo &quot;Hello, what&#39;s your name?&quot;&lt;br /&gt;
break;&lt;br /&gt;
Table 2:&lt;br /&gt;
echo &quot;Hello&quot;. $ _REQUEST [&#39;Value1&#39;]. &quot;Where do you live?&quot;&lt;br /&gt;
break;&lt;br /&gt;
Case 3:&lt;br /&gt;
echo &quot;Well, welcome to this world bot hello.&quot; $ _REQUEST [&#39;Value1&#39;]. &quot; &amp;lt;br&amp;gt; of &quot;. $ _REQUEST [&#39;value2&#39;].&quot;. &amp;lt;reset&amp;gt; &quot;&lt;br /&gt;
break;&lt;br /&gt;
}&lt;br /&gt;
?&amp;amp;gt;&lt;br /&gt;
Step 3: Once the script is ready, put it somewhere on your web server and copy the complete URL in the clipboard.&lt;br /&gt;
Step 4: Now, signed imified paste the script into the URL&lt;br /&gt;
Screen Name: hackingtips011.blogspot.om&lt;br /&gt;
Search Engine Script URL: &lt;a href=&quot;http://www.hackingtips011.blogspot.com/imbot.php&quot;&gt;http://www.hackingtips011.blogspot.com/imbot.php&lt;/a&gt;&lt;br /&gt;
Step 5: Add to that, im a robot buddy list. That&#39;s it.&lt;br /&gt;
This is a very simple robot, but the possibilities are endless.&lt;br /&gt;
For example, you can write a bot that sends e-mail to all close friends through a simple IM message. Or you can write a will does currency exchange.&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/04/create-your-own-im-bot-yahoo-gmail.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8-1U8i_uC0T2uEH898NMPV4qACZuo1T1BD_AnPcPK46oMCou5l9O-KCrVT2NhTddbYiFsgjFYDDGrzd3NZogB7ncaijf6krjnnEKzxMrYLyaPcEYmQdUsaJfkCPK6vkkxhdAOrBwJ84M/s72-c/imbot.gif" height="72" width="72"/><thr:total>4</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-7630359291300400525</guid><pubDate>Sat, 23 Apr 2011 03:47:00 +0000</pubDate><atom:updated>2011-04-24T04:39:32.951-07:00</atom:updated><title></title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #222222; font-family: &#39;Helvetica Neue&#39;, Helvetica, Arial, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: 12px; line-height: 16px;&quot;&gt;2QHS8CY6S7DB&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/04/3pnpmut8s4jr.html</link><author>noreply@blogger.com (Unknown)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-4617223627796674554</guid><pubDate>Fri, 22 Apr 2011 02:43:00 +0000</pubDate><atom:updated>2011-04-21T19:43:04.966-07:00</atom:updated><title>Catching a Hacker</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdwS_qqBShtn8zii42Co1K4TRYeqrcGetfvt5ftoJebw01o5tUrdKve_-3lZ4of8kObPn_-puKquJhZe5k5hQ4P4VWRtXioXwhHi7lPya4YvmB2lyRohyphenhyphentup9b7y-gEZ28gqlgvj_llc/s1600/hacker.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdwS_qqBShtn8zii42Co1K4TRYeqrcGetfvt5ftoJebw01o5tUrdKve_-3lZ4of8kObPn_-puKquJhZe5k5hQ4P4VWRtXioXwhHi7lPya4YvmB2lyRohyphenhyphentup9b7y-gEZ28gqlgvj_llc/s320/hacker.gif&quot; width=&quot;284&quot; /&gt;&lt;/a&gt;&lt;/div&gt;Hacker care: A con artist is caught sooner or later&lt;br /&gt;
&lt;br /&gt;
The hackers broke into Pentagon computer - again. When news of this, plus the fact that other hackers are constantly looking to steal the identities of people to spam innocent computer crime and computer hacking in unauthorized places&lt;br /&gt;
&lt;br /&gt;
makes it necessary for illegal hackers get caught. If you&#39;re one of those who have suffered a hack attack, so you can be one of those who say: &quot;. I need a specialist in IP, to catch a hacker&quot; This article will show you things you can do.&lt;br /&gt;
&lt;br /&gt;
How hackers were&lt;br /&gt;
&lt;br /&gt;
The fact that Microsoft and some other software companies were informed - yes, hackers, there are many &quot;holes&quot; in the hacker could exploit Windows. Microsoft has responded by looking to solve the &quot;holes&quot; every time you said one. Then send a patch to prevent hackers through the &quot;hole&quot;. Peace with the update, Microsoft has a way to close the problems that exist in the Windows software - even if it is not known whether all these &quot;holes&quot; ever known.&lt;br /&gt;
&lt;br /&gt;
Usually, it is quite difficult to see that a hacker has hacked into the computer. If there is only a ride, or take the minimum amount of data - you really can not be sure that you get hacked. They are some of the effects of computer hacking, although this may tell you something. Here are some ways to detect intruders.&lt;br /&gt;
&lt;br /&gt;
Pirates detection&lt;br /&gt;
&lt;br /&gt;
Hackers are by nature very cautious. Their ability to access your computer over the Internet can easily be done without his knowledge - and most of them seem to prefer this approach. Before time is spent on being able to detect an intruder, it is noted that a determined attacker will not stop! Receive - including the Department of defense systems!&lt;br /&gt;
&lt;br /&gt;
There are some common things that may tell you something about an intruder is:&lt;br /&gt;
&lt;br /&gt;
* Lights indicate hard drive activity is busier than my role as a&lt;br /&gt;
&lt;br /&gt;
* Suspicious files left on your computer - often in the Windows Temp directory tmp. suffix&lt;br /&gt;
&lt;br /&gt;
* Handling obvious - corrupt files, missing files, etc.&lt;br /&gt;
&lt;br /&gt;
* Or, worst - someone taking money from your bank account or credit card (Please note, however, that this could be the result of &quot;phishing&quot;, too - not necessarily the piracy)&lt;br /&gt;
&lt;br /&gt;
* Firewall to receive multiple packets from one address and notify you.&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/04/catching-hacker.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjhdwS_qqBShtn8zii42Co1K4TRYeqrcGetfvt5ftoJebw01o5tUrdKve_-3lZ4of8kObPn_-puKquJhZe5k5hQ4P4VWRtXioXwhHi7lPya4YvmB2lyRohyphenhyphentup9b7y-gEZ28gqlgvj_llc/s72-c/hacker.gif" height="72" width="72"/><thr:total>1</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-509026492231771891.post-6137016734930791760</guid><pubDate>Fri, 22 Apr 2011 02:35:00 +0000</pubDate><atom:updated>2014-02-09T22:13:48.367-08:00</atom:updated><title>WiFi Hacking</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaL8yQrBAIxyPQx48f6nO6mU-Ul114CviEFDrsujMe_aXEk2oqW-49R0A0rJ8hRiVxzbYgPMh7wXQlxwCBSAPhnCY4SyXCNi2tmsQtfNs0sCEceBavInwdw3OF7xicP3PMk_-i_i4_yxc/s1600/wifi.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaL8yQrBAIxyPQx48f6nO6mU-Ul114CviEFDrsujMe_aXEk2oqW-49R0A0rJ8hRiVxzbYgPMh7wXQlxwCBSAPhnCY4SyXCNi2tmsQtfNs0sCEceBavInwdw3OF7xicP3PMk_-i_i4_yxc/s320/wifi.gif&quot; width=&quot;294&quot; /&gt;&lt;/a&gt;&lt;/div&gt;WiFi is a wireless internet use, cables are not needed and it was originally designed for use with laptops and mobile phones. WI-FI has become increasingly popular due to the lack of cables and cheap installation costs. Many people now use WiFi instead of the normal Internet connection. Disadvantages include WI-FI WI-FI that can be easily hacked. The most common form of encryption for the Wi-Fi can only be hacked, even if it is properly configured. There are people who travel around a laptop looking Wi-Fi connection with no guarantee that can be hacked.&lt;br /&gt;
&lt;br /&gt;
Using these methods, a person could &quot;fly&quot; using the Internet to someone else and break into files with ease. Thus, many hackers use other people to break WI FI connections secure access to files which a connection can be more difficult to trace them as it is wireless, and on behalf of another person. This type of piracy can be severe if firms have important files using WI FI sensitive information involved in the files can be easily accessed by a hacker. There have been convictions of this type of piracy. COMPUTER REPAIR HOME STUDY (BUY HERE )&lt;a href=&quot;http://f7d47z2e8rbx1y8x6gks716qer.hop.clickbank.net/&quot; target=&quot;_top&quot;&gt;Click Here!&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;</description><link>http://hackingtips011.blogspot.com/2011/04/wifi-hacking.html</link><author>noreply@blogger.com (Unknown)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhaL8yQrBAIxyPQx48f6nO6mU-Ul114CviEFDrsujMe_aXEk2oqW-49R0A0rJ8hRiVxzbYgPMh7wXQlxwCBSAPhnCY4SyXCNi2tmsQtfNs0sCEceBavInwdw3OF7xicP3PMk_-i_i4_yxc/s72-c/wifi.gif" height="72" width="72"/><thr:total>1</thr:total></item></channel></rss>