<?xml version="1.0" encoding="UTF-8" standalone="no"?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:gd="http://schemas.google.com/g/2005" xmlns:georss="http://www.georss.org/georss" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4760218650716012528</atom:id><lastBuildDate>Fri, 17 Apr 2026 10:44:10 +0000</lastBuildDate><category>pics</category><category>Tips and Tricks</category><category>tips</category><category>Windows Installation and Recovery</category><category>Tech</category><category>apps</category><category>NETWORKING</category><category>Computer Maintenance</category><category>Blogging Tips</category><category>computer tips</category><category>Microsoft</category><category>Security Tips</category><category>Software</category><category>blogging</category><category>Infographics</category><category>Security</category><category>HELPDESK</category><category>new tips</category><category>Windows</category><category>android apps</category><category>iphone apps</category><category>Online Tips</category><category>Hardware</category><category>tricks</category><category>how to</category><category>WIMAX</category><category>Internet</category><category>tutorial</category><category>Downloads</category><category>softwares</category><category>seo</category><category>Interview QA</category><category>Error and Optimize</category><category>Mobile Tips</category><category>FAQ</category><category>Windows 8</category><category>Windows 7 tips</category><category>hack</category><category>social media</category><category>Notebook Laptop</category><category>Gaming</category><category>Buying Guide</category><category>Computer Triks</category><category>Facebook</category><category>Computer tricks</category><category>Internet General</category><category>SOLARIS</category><category>Windows 7</category><category>review</category><category>vs</category><category>Cloud Computing</category><category>Earn Online</category><category>UNIX</category><category>Online Tricks</category><category>btms</category><category>technology</category><category>Blogging How To</category><category>GDDon</category><category>Windows xp</category><category>BACKUP AND RESTORE</category><category>WINXP</category><category>FYI</category><category>GAMES</category><category>Mobile Tricks</category><category>Backtrack</category><category>Computer General</category><category>DNS</category><category>Interview</category><category>VLAN</category><category>linux</category><category>Blogger</category><category>DHCP</category><category>FREE</category><category>FTP</category><category>SQL Server Query</category><category>collection</category><category>comparison</category><category>eBooks</category><category>funny computer tricks</category><category>Advance Sql Query</category><category>Google</category><category>Hacking</category><category>Printer</category><category>SQL</category><category>m</category><category>t</category><category>vpn</category><category>CISCO</category><category>Network Engineer</category><category>Network Storage</category><category>PTC</category><category>Server 2003</category><category>System Administrator</category><category>VOIP</category><category>Windows Server</category><category>freewares</category><category>sh</category><category>Google Adsense</category><category>IP</category><category>Publisher Revenue</category><category>SERVER</category><category>VIRTUALIZATION</category><category>best</category><category>business</category><category>help for computer</category><category>iPad</category><category>int</category><category>printers</category><category>show</category><category>youtube</category><category>Facebook Tricks</category><category>Mobile</category><category>Useful Tools</category><category>Windows 7 Tips step by step</category><category>earn money online</category><category>gzm</category><category>sameer iqubal siddiqui</category><category>specs</category><category>Android</category><category>CCNP</category><category>Citrix</category><category>Download</category><category>HTC One</category><category>IT</category><category>IT Terms</category><category>Network Administrator</category><category>Smartphone</category><category>Speed Up Your PC</category><category>TAS.</category><category>Technical Support</category><category>XenApp</category><category>attack</category><category>computer</category><category>guide</category><category>iphone</category><category>price</category><category>About ASP.NET</category><category>Blog Hacks</category><category>Blogspot</category><category>Citrix XenApp 6.5</category><category>Citrix XenApp Administration</category><category>ClixSense</category><category>Clustered Index</category><category>Computer Hint</category><category>Development</category><category>Faster Internet Access</category><category>Gaming Tips</category><category>Gaming Tools</category><category>Hackers</category><category>Kali Linux</category><category>Laptop</category><category>Lock your personal folder</category><category>Mouse Pointer Looks</category><category>Notes</category><category>PROTOCOL</category><category>Release Date</category><category>Routing &amp; Switching</category><category>SQL Database Design</category><category>SUN</category><category>Samsung galaxy s4</category><category>Social Network</category><category>Twitter</category><category>VNC</category><category>Web host</category><category>arduino</category><category>buy</category><category>compared</category><category>computer tips and trick with graphical stape</category><category>cpu</category><category>help</category><category>help for software</category><category>make your computer funny</category><category>monetize</category><category>online</category><category>perl</category><category>phishing</category><category>pricing</category><category>raspberry Pi</category><category>sb</category><category>traffic</category><category>update</category><category>website</category><category>what is</category><category>2015</category><category>ALOM</category><category>Active Directory</category><category>Backtrack 6</category><category>Blogging Tools</category><category>Broadband Error Codes</category><category>CentOS</category><category>DataBase</category><category>EXCHANGE 2016</category><category>Earn Money</category><category>Firefox</category><category>Flying search images in Google</category><category>GDM</category><category>Google Chrome</category><category>Google Glass</category><category>Google Nexus</category><category>HAcking PC on LAN</category><category>Hack Remote Computer Using IP Address</category><category>Index</category><category>Iphone 5</category><category>MONITORING</category><category>Microsoft windows 8</category><category>Nahid Anwar</category><category>Neobux</category><category>Net-SNMP</category><category>Network Monitoring</category><category>Nokia Lumia 1020</category><category>Nokia Lumia 1520</category><category>Ojooo</category><category>Outlook</category><category>PPPoE</category><category>Paidverts</category><category>Probux</category><category>REMOVE DRIVEMONITOR.EXE VIRUS</category><category>Real Hackers Point</category><category>Refer &amp; Earn</category><category>Registry Setting</category><category>Remote Display</category><category>SNMP</category><category>Set Command Prompt on Right-Click</category><category>TELECOM INSTALLATION AND COMMISSIONING</category><category>Tas</category><category>Technical Documentation</category><category>Udoo</category><category>VIRUS INFO</category><category>WHAT IS SQL</category><category>Windows 8 Mail App – First Look</category><category>adsense</category><category>apple</category><category>azure</category><category>beagleboard</category><category>best mobile of 2015</category><category>blog</category><category>design</category><category>domain</category><category>error</category><category>ethical hacking</category><category>free Internet</category><category>google plus</category><category>how-to</category><category>iPad Tips: Easy and Quick Mute</category><category>iPhone 5s</category><category>infolinks</category><category>intel</category><category>investment</category><category>make money online</category><category>media.net</category><category>mini computers</category><category>mistake to avoid while buying</category><category>most common mistakes</category><category>new mobile</category><category>new mobiles</category><category>passwords</category><category>processor</category><category>recycle</category><category>server share</category><category>single board</category><category>site</category><category>sony xperia z1</category><category>spy</category><category>tracking</category><category>wet mobile</category><category>1sheeld</category><category>2008</category><category>3D Printed gun</category><category>3D Printing</category><category>3d</category><category>3xplr3 cyber army</category><category>41 Mega pixel</category><category>4th generation</category><category>5c</category><category>5s</category><category>7 Ways to Child Proof a Computer</category><category>7 operating system on 1 mobile</category><category>8.80 ghz</category><category>802.1X</category><category>8k</category><category>900 mp camera</category><category>ADSL</category><category>Aaron Swartz</category><category>About SIM Card</category><category>About visual basic 6.0</category><category>Add a program to the right click menu</category><category>Add and Remove startup programs in Windows</category><category>AirOS</category><category>Airgrid</category><category>Alienware M17x</category><category>Alienware M18x</category><category>Amazon</category><category>Android Debug Bridge (adb)</category><category>Android Development</category><category>Android security risks</category><category>Anna Hazare</category><category>Antivirus Softwares</category><category>Arvind Kejriwal</category><category>Asus G75VW</category><category>BPDU Tunneling</category><category>BPDU isolation</category><category>BPDU transparent transmission</category><category>BROADBAND</category><category>BSNL unlimited internet</category><category>Backtrack 6 release date</category><category>Beagle bone black</category><category>Best Note Taking Apps for iPad 2 and Retina</category><category>Best smartphone of 2015</category><category>Blackbuntu</category><category>Blank SIM</category><category>Blogs</category><category>Board</category><category>Bookmark</category><category>Books</category><category>Bounce Traffic</category><category>Bradley Manning</category><category>Braille</category><category>Breaking News</category><category>Browser</category><category>Bug Bash</category><category>Bypass A virus From Antiviruses</category><category>Bypass firewall</category><category>C#</category><category>CCDA</category><category>CISSP</category><category>CP</category><category>CPAN</category><category>Change AM and PM Displayed Text</category><category>Change Windows Restriction for any Program</category><category>Change your Mouse Pointer Looks</category><category>Cheap Tablet</category><category>Cisco certified design associate</category><category>Clean Your Computer’s Windows Registry</category><category>Cloning A Number</category><category>Comments</category><category>Communications</category><category>Computer Hope chat</category><category>Convert Video to Any Format Converter</category><category>Create A virus</category><category>Create Folders And Files Without Name</category><category>Create Pixel and Handwriting Fonts Online</category><category>Create a bootable CD or DVD with or without floppy</category><category>Create a virus in Virtual Basic Script</category><category>Creating a Simple User Login Form in MVC</category><category>Creating a autorun.inf in backtrack</category><category>Currency</category><category>Custom Robots</category><category>Deals</category><category>Dedicated vs. Cloud Hosting</category><category>Delete User</category><category>Desktop Support</category><category>Detecting and repairing disk errors</category><category>Dialer</category><category>Digital Storm x17</category><category>Disable CD Auto Run in Windows</category><category>Disadvantages</category><category>Docstoc</category><category>Domain name</category><category>Download All Your Facebook Information</category><category>Dynamics</category><category>Edward Snowden</category><category>Empty the Recycle Bin</category><category>Enter The Username and Password To Logon</category><category>Evasi0n setup</category><category>Exce</category><category>Exit Traffic</category><category>Export multiple DataSets to multiple Excel sheets</category><category>Facebook and Twitter</category><category>Faster Start</category><category>Faster Start-Menu Access</category><category>File</category><category>Find Google Maps Search History</category><category>FingerReader</category><category>Fix Delay When Typing in Windows</category><category>Flipkart</category><category>Format Your Hard Disk Using Notepad</category><category>Fragmentation</category><category>Fraud</category><category>Freegate</category><category>GTX 680</category><category>Game Changer</category><category>Gaming Laptop Comparison</category><category>Get a Power Efficiency Report in Windows</category><category>Google Search pages</category><category>Google or Twitter Accounts?</category><category>HACK PASSWORDS STORED IN FIREFOX BROWSER</category><category>HBCD</category><category>HD 7970</category><category>HD2 running meego</category><category>HD2 running windows phone 8</category><category>HOW TO CHECK SYSTEM SOFTWARE IS INSTALLED OR NOT?</category><category>HOW TO CLEAN YOUR RAM USING NOTEPAD</category><category>HOW TO ENABLE GAME IN WINDOW 7 ?</category><category>HP LaserJet 1010</category><category>HR</category><category>HTC HD2 running Ubuntu</category><category>HTC HD2 running android 4.2</category><category>HTC HD2 running windows phone 7 and 7.5</category><category>HTC HD2 windows RT</category><category>HUB TRANSPORT</category><category>Hacking By a USB</category><category>Hacking ISP</category><category>Hacking PC ar school</category><category>Hacking WEP passwords</category><category>Hacking With armintage</category><category>Hacking With metaspoilt</category><category>Hacking pc via social-engineer toolkit</category><category>Hacking using ettercap</category><category>Hacking wifi passwords</category><category>Has Someone Secretly Used Your Pc In Your Absence</category><category>Heroes Of The 21st Century</category><category>Hi-Tech</category><category>Hide From Some Facebook Friends</category><category>Hide and Unhide Folder Options Missing</category><category>Hirens Boot CD</category><category>Hirens Boot CD 15.2</category><category>Home</category><category>Hotspot sheild</category><category>How To Make An Email Server On Your Home Computer</category><category>How do you choose a good password</category><category>How to Abort The Shutdown Operation in Windows</category><category>How to Connect Laptop to TV</category><category>How to Create Your Own Customized Run Commands</category><category>How to Deal with Laptop Over Heating</category><category>How to Enable GodMode in Windows 8</category><category>How to Shutdown and Restart Windows 8</category><category>How to Trace an IP Address</category><category>How to check your systems bit version in windows 8</category><category>How to convert BAHT TEXT to English in excel</category><category>How to convert a numeric value into English words in Excel</category><category>How to create a bootable USB Pendrive</category><category>How to delete a user account in Windows 8?</category><category>How to hack an ISP</category><category>How to make a hidden file in Window 8</category><category>How to make a hidden folder in Window 8?</category><category>How to make or add user in Windows 8</category><category>How to open run in windows 8?</category><category>IE</category><category>IIS 7</category><category>IMSI</category><category>IPMP</category><category>ISP</category><category>ISRO</category><category>ITIL</category><category>Ice Cream Sandwich</category><category>Image</category><category>Improve Your Blog Loading Speed</category><category>Install Themes on Facebook</category><category>Intel haswell</category><category>Internet Banking</category><category>Internet Explorer</category><category>Internet-Tricks</category><category>Is Software to Clean and Speed Up Your PC Useful?</category><category>Is there any rule to decide what columns should be put in Included in non clustered index and in which order</category><category>Israel hackers</category><category>J.A.R.V.I.S</category><category>Jafar Raza</category><category>Job</category><category>Julian Assange</category><category>LIFX</category><category>Language</category><category>Live hacking operating system</category><category>Load Your Menu Faster</category><category>Lock And Unlock your Computer with a USB Drive</category><category>Logmein</category><category>Lulzsec</category><category>Luminate</category><category>Lync</category><category>MAC</category><category>MANGALYAAN</category><category>MARS</category><category>MCAD</category><category>MCBDA</category><category>MCITP</category><category>MIT</category><category>MLP</category><category>MP</category><category>MS-EXCEL</category><category>MS-EXCEL 2016</category><category>MSI GT70</category><category>MVC</category><category>Mac OS X Server</category><category>Make Non Deletable and Readable Folders</category><category>Md Raza Ali</category><category>Metaspoilt turn of antivirus</category><category>Microsoft $200 Tablet</category><category>Microsoft $200 Windows 8 Tablet</category><category>Microsoft Office</category><category>Microsoft certified database administrator</category><category>Most Out of Your 140 Characters on Twitter</category><category>Multilink PPP</category><category>NASA</category><category>NFS</category><category>NSA</category><category>NTFS VS FAT</category><category>NTP</category><category>NanoStation2</category><category>Netgear Dual-Band Router</category><category>New Android</category><category>New Backtrack Version</category><category>New Tiles</category><category>Nework Monitoring</category><category>Nikon D5200</category><category>Non Clustered Index</category><category>Norton Internet Security 2015 Full Version With Key</category><category>Notepad</category><category>Notepad++</category><category>Numbers</category><category>Nvidia Geforce GTX 670</category><category>Nvidia Geforce GTX Titan</category><category>ORACLE</category><category>OS</category><category>OTT Explains</category><category>OTT Guide to Understanding Google Chrome Advanced Features</category><category>Open Blocked Sites On Internet</category><category>OpenDNS</category><category>Other Tricks</category><category>PC troubleshooting tips</category><category>PERMANENTLY DELETED FILES RECOVERY SOLUTION</category><category>PHP</category><category>PMI</category><category>PMP</category><category>PORTAL</category><category>PPP</category><category>PROTECT YOUR COMPUTER FROM VIRUSES AND HACKERS</category><category>PcDuino</category><category>Perform a Disk Defragmentation</category><category>Photoshop</category><category>Pinterest</category><category>Point-to-Point Protocol</category><category>Port Scan</category><category>PowerShell</category><category>Prevent Google Chrome from Opening PDF Files in the Browser</category><category>Primary Key</category><category>Project Management</category><category>Promo</category><category>Protect Your Computer From Viruses</category><category>Protect Your PC Using a USB Flash Drive</category><category>Proxpn</category><category>Putty</category><category>Putty install for linux</category><category>QA Terminology</category><category>QR Code</category><category>Qualify</category><category>RAID</category><category>REMOVE FLASHGUARD.EXE OR DRIVEGUARD.EXE VIRUS</category><category>RF ENGINEERING</category><category>RSA</category><category>Read and Open POT .PO .MO Extension Files</category><category>RealVNC</category><category>Redirection</category><category>Regional options</category><category>Remote Login</category><category>Remotely Access a PC or Mac from a Smartphone or Tablet</category><category>Remove Shadows From Desktop Icons in Windows</category><category>Remove Unneeded Files</category><category>Remove Unneeded Programs</category><category>Reopen Closed Folders And Applications</category><category>Robots.txt</category><category>Router</category><category>Rules of Chat</category><category>Run</category><category>SCCM</category><category>SCOM 2016</category><category>SEM</category><category>SFTP</category><category>SIM</category><category>SIM-Swap</category><category>SPACE</category><category>SQL Database Table</category><category>SQL FUNCTION</category><category>SSH</category><category>SSH public key authentication</category><category>STANDARDS</category><category>See the 911 Attack on Notepad</category><category>Sendmail</category><category>Server 2016</category><category>Shake Your Desktop Free of Clutter</category><category>Shut Down Shortcut on Your Desktop</category><category>Sim Clone</category><category>Sim Reader</category><category>Social Engineering Toolkit</category><category>Software QA Terminology</category><category>Software QA Terminology: Bug Bash</category><category>Sony Honami</category><category>Start Button</category><category>Start Menu</category><category>Sushil</category><category>System Center</category><category>System Engineer</category><category>TOR</category><category>TRANSPORT RULES</category><category>TV Channel</category><category>Tab key</category><category>Tablet PC</category><category>Taskbar</category><category>Tasks That Should Have Been Simpler in Windows 8</category><category>Teleconferencing and Videoconferencing</category><category>Test Guide</category><category>Textpad</category><category>Time change</category><category>Tips -Computer Tips</category><category>Tips for Speeding Up Your PC</category><category>Top 10 Facebook tips</category><category>Top 10 Triks For Speed Up Your PC</category><category>Tracking A Person Online.</category><category>Tunneling</category><category>Tunneling for unlimited internet</category><category>Turn Your Laptop Into J.A.R.V.I.S From Iron Man</category><category>Tweak Windows 7 or Vista Games To Cheat and More</category><category>Ubiquiti</category><category>Ultrasurf</category><category>Unlimited Internet hack</category><category>Use Hidden International Wallpapers and Themes</category><category>Use Windows Defender Offline Tool to Fix an Infected PC</category><category>Use middle button in the Mouse for easy work</category><category>VBA</category><category>VCP</category><category>VDSL</category><category>Virus that can hide from antivirus</category><category>Vista</category><category>WEBSITE MONETIZATION</category><category>WINDOW 7</category><category>WINDOWS GAMES</category><category>WIRELESS</category><category>WLAN</category><category>Web Site Tips</category><category>Website Hosting</category><category>Websites using Facebook</category><category>What's the Difference? Virtualization vs. Cloud Computing</category><category>Whats New</category><category>Whistle blower</category><category>Window 8</category><category>Windows 8 Change Startup Programs</category><category>Windows 8 – Assign Static IP Address</category><category>Windows 8.1</category><category>Windows 8.1 Blue</category><category>Windows Service Pack 1</category><category>Windows Time Service</category><category>Windows command line</category><category>Windows-Tricks</category><category>Writer</category><category>X11</category><category>XML</category><category>XP</category><category>Yahoo</category><category>Your Intel Processor (CPU) in Windows</category><category>acquired</category><category>activate windows 8</category><category>adb</category><category>adbrite</category><category>adfly</category><category>ads</category><category>ads tracking</category><category>affiliate program</category><category>amd</category><category>amd fx-8350</category><category>android fragmentation</category><category>anonymous</category><category>antivirus tools</category><category>apple iPhone 5s</category><category>apple tv</category><category>application run</category><category>armitage</category><category>assistant</category><category>attitude</category><category>avoid</category><category>avoid getting hacked</category><category>backbox linux</category><category>barack obama</category><category>batch virus</category><category>be a hacker</category><category>benchmark</category><category>best camera</category><category>best games for pc</category><category>best graphics card in the world</category><category>best hacker army</category><category>best laptop</category><category>best laptop for hackers</category><category>best shooting games</category><category>blackberry z10</category><category>blind</category><category>bootable CD</category><category>bootchanger</category><category>break</category><category>break passwords</category><category>bugtraq</category><category>buy USA Passport online</category><category>buy guns online</category><category>bypass astaro</category><category>bypass cyberroam</category><category>camera</category><category>cammand</category><category>certification</category><category>change pointer</category><category>change you pc setting</category><category>change your computer option</category><category>change your right click option</category><category>changes</category><category>changing the Start button text</category><category>cheap</category><category>check system software installed</category><category>checksum</category><category>chitika</category><category>chromecast</category><category>cifs</category><category>circuit scribe</category><category>clickbots</category><category>client computer</category><category>closing</category><category>cloud</category><category>colors</category><category>combined</category><category>computer tips with state</category><category>control panel</category><category>course</category><category>courses</category><category>cpc</category><category>cpm</category><category>crack</category><category>cracking windows passwords</category><category>create a fake sms</category><category>create a virtual cd drive</category><category>credit card fraud</category><category>cubieboard</category><category>damn vulnerable linux</category><category>dark web</category><category>data deduplication</category><category>data recovery</category><category>data recovery utilities</category><category>deduplication</category><category>deep web</category><category>defacement</category><category>desktop phishing</category><category>details</category><category>directories</category><category>display ads on my website</category><category>does google track us</category><category>domain controller</category><category>dos</category><category>download windows 8</category><category>drugs</category><category>duplicate</category><category>duplicate SIM</category><category>duplicating a mobile number</category><category>earn more</category><category>edomz</category><category>email</category><category>eraser</category><category>etercap</category><category>evasi0n orignal setup files</category><category>evasi0n setup files</category><category>evision jailbreaking tool</category><category>facebook vs google+</category><category>fastest processor ever</category><category>fastest supercomputer</category><category>faulty laptop</category><category>fees</category><category>file delete</category><category>finding IP address on facebook</category><category>for</category><category>format</category><category>fps</category><category>fraudster</category><category>free windows 8</category><category>funding</category><category>gadgets</category><category>gadgets tips</category><category>get more traffic to my blog</category><category>ghz</category><category>gnacktrack</category><category>google chromecast</category><category>google glasses</category><category>google glasses vs jarvis</category><category>google tv</category><category>google worries</category><category>google+</category><category>gpu amd radeon HD 7870</category><category>graphics</category><category>gun</category><category>hack Facebook</category><category>hack a mobile number</category><category>hack account passwords indows</category><category>hack accounts</category><category>hack facebook with ettercap</category><category>hack password</category><category>hack remote pc</category><category>hacker</category><category>hacker for hire</category><category>hacking facebook</category><category>hacking mobiles</category><category>hacking via metaspoit</category><category>hacking wifi with airodump.</category><category>hacking wifi with reaver</category><category>hardware diagnostic programs</category><category>heroine</category><category>high-end</category><category>highest</category><category>highest resolution</category><category>hire a hitman</category><category>history</category><category>home-made</category><category>how get more views on blog</category><category>how to add new option on right click option</category><category>how to apply</category><category>how to browse deep web</category><category>how to buy</category><category>how to buy a laptop</category><category>how to change mouse pointer</category><category>how to change start button</category><category>how to create a virtual cd drive</category><category>how to earn money by blog</category><category>how to install ettercap</category><category>how to jailbreak ios</category><category>how to monetize my blog</category><category>http://mytech2u.blogspot.com/</category><category>hyper supreme cam</category><category>iOS</category><category>iPad Tips: Add Two More Apps in Dock</category><category>iPad Tips: Shut Down Your iPad For Real</category><category>iPad Tips: Use Spotlight to Find Things</category><category>iPhone 5c</category><category>iglasses</category><category>in the world</category><category>in-image advertising</category><category>indishell</category><category>install</category><category>install  system software</category><category>install keylogger by armitage</category><category>installation</category><category>internet eyes</category><category>intro to deep web</category><category>ios7</category><category>iphone 5 vs galaxy s4</category><category>iron man</category><category>iron man jarvis</category><category>iron man laptop</category><category>iso</category><category>jailbreaking iphone</category><category>jarvis transformation pack</category><category>java</category><category>k9 security cyber army</category><category>key</category><category>keylogger</category><category>keystrokes</category><category>kickstarter</category><category>latest</category><category>lg g2</category><category>lg nexus 5</category><category>link shrinker</category><category>list</category><category>low</category><category>low cost tv dongle</category><category>ls command</category><category>lumia 920</category><category>mark zuckerburg</category><category>metasploit</category><category>metaspoilt attack</category><category>metaspoilt attack on windows 7</category><category>meterpreter</category><category>mi6 hackers</category><category>microsoft student partner</category><category>microsoft-outlook-2016</category><category>miscellaneous</category><category>mobile banking</category><category>mobile hacking</category><category>mobiles</category><category>mobrev</category><category>modify</category><category>money</category><category>more views</category><category>most common passwords</category><category>most powerful camera</category><category>mount cifs</category><category>mount command</category><category>mount windows share on linux</category><category>msp</category><category>multi-core</category><category>multiple Excel sheets Export form multiple DataSetsm</category><category>must know language</category><category>mva</category><category>nethack</category><category>network security toolkit</category><category>new</category><category>new features</category><category>new laptop</category><category>nexus</category><category>nexus 5</category><category>oculus rift</category><category>offers</category><category>one board computers</category><category>open blocked sites</category><category>open cmd by armitage</category><category>ophcrack</category><category>pakistan cyber army</category><category>pandaboard</category><category>partition</category><category>partition tools</category><category>pebble</category><category>person</category><category>phone</category><category>phpMyAdmin</category><category>playstation 4</category><category>portable computers</category><category>powerful</category><category>printed</category><category>privacy</category><category>probux down</category><category>probux not loading</category><category>probux not paying</category><category>probux offline</category><category>probux scam</category><category>processors</category><category>profit</category><category>project Neptune</category><category>projects</category><category>ps4</category><category>purchasing</category><category>pureview 808</category><category>remote control webcam</category><category>resource-monitor</category><category>revolights</category><category>rooting iphone</category><category>sabaru telescope</category><category>saiyan technology</category><category>samsung note 3</category><category>samurai web testing framework</category><category>script</category><category>secure banking</category><category>send sms by government numbers</category><category>servers</category><category>set</category><category>share name</category><category>shredder tool</category><category>shut down</category><category>silkroad</category><category>single-core</category><category>sites to submit my blog</category><category>smart glasses</category><category>sms spoofing</category><category>social networking</category><category>sony</category><category>sp3</category><category>spark core</category><category>specifications</category><category>sql injection</category><category>sqlmap</category><category>stalker</category><category>start Windows in Safe Mode or Safe Mode with Networking</category><category>start the computer in safe mode</category><category>stay anonymous</category><category>stealth</category><category>stellaris</category><category>steps</category><category>stolen credit card</category><category>strong</category><category>superfetch</category><category>surface</category><category>surveys</category><category>synchronization</category><category>tablets</category><category>tasks</category><category>team poison</category><category>technical specs</category><category>the onion routing</category><category>theme</category><category>tianhe 2</category><category>time</category><category>tips of computer</category><category>to</category><category>tool</category><category>tools</category><category>top</category><category>top 5</category><category>torrent</category><category>tracing</category><category>tracking phone number</category><category>trick</category><category>tutorials</category><category>tv box</category><category>unformattable Pen drives</category><category>unix system</category><category>update my android</category><category>upgrade</category><category>version</category><category>views</category><category>virus</category><category>virus for mobile</category><category>virus infected</category><category>visually impaired</category><category>vulnerability</category><category>walk-trough</category><category>war</category><category>wearable device</category><category>website revenue</category><category>websites</category><category>weed online</category><category>what happens to a file after we delete it</category><category>what is 3D printing ?</category><category>what is it like to be a MSP</category><category>which one is better</category><category>wikileaks</category><category>windows 7 performance</category><category>windows 8 activated</category><category>windows 8 dvd iso</category><category>windows 8 genuine download</category><category>windows 8 keys</category><category>windows phone 8</category><category>windows speech macro</category><category>windows-vista</category><category>windows-xp</category><category>world greates hackers</category><category>xbox</category><category>xbox one</category><category>yahoo passwords</category><title>NEW TECH</title><description>NEW TECH  is a Tech blog on Computer Security tips Computer Facebook Tricks Internet Tips Earning Online Software Downloads etc</description><link>http://mytech2u.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>2807</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="http://3.bp.blogspot.com/-dJ1owxgBHng/ViJPvSCdjnI/AAAAAAAABbk/7Xh-eKyjTDg/s1600-r/new-t.jpg"/><itunes:keywords>NEW,TECH,is,a,Tech,blog,on,Computer,Security,tips,Computer,Facebook,Tricks,Internet,Tips,Earning,Online,Software,Downloads,Computer,error</itunes:keywords><itunes:summary>NEW TECH is a Tech blog on Computer Security tips Computer Facebook Tricks Internet Tips Earning Online Software Downloads </itunes:summary><itunes:subtitle>NEW TECH</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:owner><itunes:email>romosentet@gmail.com</itunes:email></itunes:owner><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6360795293366969206</guid><pubDate>Sat, 31 Dec 2016 09:22:00 +0000</pubDate><atom:updated>2016-12-31T01:22:00.200-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ALOM</category><category domain="http://www.blogger.com/atom/ns#">RAID</category><category domain="http://www.blogger.com/atom/ns#">SOLARIS</category><category domain="http://www.blogger.com/atom/ns#">SUN</category><title>Disable T5120 RAID - Cause failure in booting/installing from HD</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;-&gt; &lt;br /&gt;start /SP/console&lt;br /&gt;&lt;br /&gt;Are you &lt;br /&gt;sure you want to start /SP/console (y/n)? y&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Serial &lt;br /&gt;console started.  To stop, type #.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;{0} ok &lt;br /&gt;show-disks&lt;br /&gt;&lt;br /&gt;a) &lt;br /&gt;/pci@0/pci@0/pci@8/pci@0/pci@9/LSILogic,sas@0/disk&lt;br /&gt;&lt;br /&gt;b) &lt;br /&gt;/pci@0/pci@0/pci@2/scsi@0/disk&lt;br /&gt;&lt;br /&gt;c) &lt;br /&gt;/pci@0/pci@0/pci@1/pci@0/pci@1/pci@0/usb@0,2/hub@4/device@4/storage@0/disk&lt;br /&gt;&lt;br /&gt;q) NO &lt;br /&gt;SELECTION &lt;br /&gt;&lt;br /&gt;Enter &lt;br /&gt;Selection, q to quit: c&lt;br /&gt;&lt;br /&gt;/pci@0/pci@0/pci@1/pci@</description><link>http://mytech2u.blogspot.com/2016/12/disable-t5120-raid-cause-failure-in.html</link><thr:total>12</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-470704598000924975</guid><pubDate>Sat, 31 Dec 2016 09:18:00 +0000</pubDate><atom:updated>2016-12-31T01:18:00.408-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ALOM</category><category domain="http://www.blogger.com/atom/ns#">Hardware</category><category domain="http://www.blogger.com/atom/ns#">SOLARIS</category><category domain="http://www.blogger.com/atom/ns#">SUN</category><title>How To Reset The ALOM Password On A Sun Fire T2000</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If &lt;br /&gt;an ALOM password reset is required on a Sun Fire T1000 or Sun &lt;br /&gt;Fire T2000 in &lt;br /&gt;case the password is lost or forgotten, the following steps can be taken to &lt;br /&gt;erase the ALOM NVRAM so that a user can gain access to it, set a new password &lt;br /&gt;and restore the NVRAM settings.&lt;br /&gt;&lt;br /&gt;Note: &lt;br /&gt;Access to the server’s power cables and the ALOM serial port is required for &lt;br /&gt;this procedure.&lt;br /&gt;&lt;br /&gt;Connect &lt;br /&gt;your computer </description><link>http://mytech2u.blogspot.com/2016/12/how-to-reset-alom-password-on-sun-fire.html</link><thr:total>4</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7321501223437513716</guid><pubDate>Thu, 22 Dec 2016 11:29:00 +0000</pubDate><atom:updated>2016-12-22T03:29:00.164-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Broadband Error Codes</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">HELPDESK</category><title>Broadband Error Codes</title><description>&lt;br /&gt;&lt;br /&gt;If you are customer of broadband and using Bridge mode (or dialer mode) connection, you must have experienced these or at least some of these errors at least once in your system and then you keep scratching your head that what the hell went wrong when you were doing every thing accordingly. Stop scratching your head, because I am providing the solutions for those errors.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;                </description><link>http://mytech2u.blogspot.com/2016/12/broadband-error-codes.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-1465837976244812077</guid><pubDate>Thu, 22 Dec 2016 11:05:00 +0000</pubDate><atom:updated>2016-12-22T03:05:00.339-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Broadband Error Codes</category><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">HELPDESK</category><category domain="http://www.blogger.com/atom/ns#">Internet-Tricks</category><category domain="http://www.blogger.com/atom/ns#">Windows-Tricks</category><title>Error 651: How to Fix it in Windows 7/8</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you are a windows user then it is possible that you have Face Error 651 Anytime.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;There are many windows user who get affected by this error code 651 while working online.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;If you are one of those windows user, then keep reading this article and carefully read out the following Detailed solutions which I have gathered after researching various websites, articles, forums etc.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;</description><link>http://mytech2u.blogspot.com/2016/12/error-651-how-to-fix-it-in-windows-78.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-3304530288353369088</guid><pubDate>Thu, 22 Dec 2016 10:14:00 +0000</pubDate><atom:updated>2016-12-22T02:14:00.212-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">ADSL</category><category domain="http://www.blogger.com/atom/ns#">Dialer</category><category domain="http://www.blogger.com/atom/ns#">PPPoE</category><category domain="http://www.blogger.com/atom/ns#">VDSL</category><title>How to Set up a new PPPoE connection on your Windows 7</title><description>&lt;br /&gt;&lt;br /&gt;Here we take Windows 7 as an example, and please make sure that your Ethernet Adapter is working well.&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt;Step 1 Please Click the Start button, go to Control Panel. And then go to Network and Internet-&gt;View network status and taskspage.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Step 2 Click on Set up a new connection or network.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Step 3 Select Connect to the Internet and click Next button.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt; &lt;br /&gt;&lt;br /&gt;Step 4 Click on </description><link>http://mytech2u.blogspot.com/2016/12/how-to-set-up-new-pppoe-connection-on.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-1477101428852701385</guid><pubDate>Wed, 21 Dec 2016 19:37:00 +0000</pubDate><atom:updated>2016-12-21T11:37:00.159-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Net-SNMP</category><category domain="http://www.blogger.com/atom/ns#">SOLARIS</category><title>Installing Net-SNMP on Solaris OS</title><description>&lt;br /&gt;&lt;br /&gt;Introduction:&lt;br /&gt;Sun OS versions previous to Solaris10 come configured with the Sun SNMP agent. Solaris has started shipping Net-SNMP with Solaris10 as an alternative to the Sun SNMP agent, this guide is designed to offer a road-map for installing Net-SNMP on versions older than Solaris10 so that users can utilize both the inclusion of the HOST-MIB Tree (Disk and CPU monitoring) and the use of </description><link>http://mytech2u.blogspot.com/2016/12/installing-net-snmp-on-solaris-os.html</link><thr:total>1</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-684688157370924984</guid><pubDate>Mon, 19 Dec 2016 15:04:00 +0000</pubDate><atom:updated>2016-12-19T07:04:00.161-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">linux</category><category domain="http://www.blogger.com/atom/ns#">perl</category><category domain="http://www.blogger.com/atom/ns#">tutorial</category><title>How to Upgrade to Perl 5.12.5 on Linux Machine</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Upgrading Perl from source on Linux&lt;br /&gt;This tutorial explains how to compile Perl 5.12 for a Linux machine. In this tutorial, CentOS 5 / Red Hat Enterprise Linux 5 will be used, however the procedure should be quite similar for other distributions of Linux as well.&lt;br /&gt;Note: You may be tempted to do a `yum remove perl` to remove the 5.8 version that your distribution came with. Don't. I'll give an </description><link>http://mytech2u.blogspot.com/2016/12/how-to-upgrade-to-perl-5125-on-linux.html</link><thr:total>1</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-2305661860838720733</guid><pubDate>Wed, 14 Dec 2016 14:03:00 +0000</pubDate><atom:updated>2016-12-14T06:03:00.174-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">HELPDESK</category><category domain="http://www.blogger.com/atom/ns#">SOLARIS</category><category domain="http://www.blogger.com/atom/ns#">SUN</category><title>how to get process id attached with particular port in solaris</title><description>&lt;br /&gt;When you need to know process id attached with particular port use below command.&lt;br /&gt;pfiles /proc/* 2&gt;/dev/null | nawk ' /^[0-9]*:/ { pid=$0 } /port: 7085$/ { printf("%s %s\n",pid,$0);}' &lt;br /&gt;&lt;br /&gt;pfiles /proc/* is retrieving all processes file descriptors details&lt;br /&gt;2&gt;/dev/null is dropping out errors due to transient processes died in the meantime&lt;br /&gt;each line starting with a number followed by a colon reports </description><link>http://mytech2u.blogspot.com/2016/12/how-to-get-process-id-attached-with.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6662600397953604598</guid><pubDate>Mon, 12 Dec 2016 12:42:00 +0000</pubDate><atom:updated>2016-12-12T04:42:00.171-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">UNIX</category><title>Year 2038 problem</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;The year 2038 problem may cause some computer software to fail at some point near the year 2038. The problem affects all software and systems that both store system time as a signed 32-bit integer, and interpret this number as the number of seconds since 00:00:00 UTC on Thursday, 1 January 1970.[1] The furthest time that can be represented this way is 03:14:07 UTC on Tuesday, 19 January 2038.[</description><link>http://mytech2u.blogspot.com/2016/12/year-2038-problem.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6848953628747690109</guid><pubDate>Wed, 07 Dec 2016 18:38:00 +0000</pubDate><atom:updated>2016-12-07T10:38:03.421-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Microsoft</category><category domain="http://www.blogger.com/atom/ns#">Windows Server</category><title>Windows exchange Server 2007 installation Steps</title><description>&lt;br /&gt;&lt;br /&gt;   Error: Embedded data could not be displayed. &lt;br /&gt;&lt;br /&gt;</description><link>http://mytech2u.blogspot.com/2016/12/windows-exchange-server-2007.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-1199662354630724080</guid><pubDate>Tue, 06 Dec 2016 14:30:00 +0000</pubDate><atom:updated>2016-12-06T06:30:00.201-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">802.1X</category><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">PROTOCOL</category><category domain="http://www.blogger.com/atom/ns#">STANDARDS</category><title>List of 802.1X standards</title><description>&lt;br /&gt;&lt;br /&gt;   Standard    Description   &lt;br /&gt;   802.1B-1992    LAN/MAN Management   &lt;br /&gt;   802.1k-1993    Discovery and Dynamic Control of Event Forwarding (Amendment to   802.1B-1992)   &lt;br /&gt;   802.1D-1990    MAC Bridges   &lt;br /&gt;   802.1i-1995    FDDI bridging (see ANSI X3T9.5)   &lt;br /&gt;   802.1j-1996    Managed objects for MAC Bridges   &lt;br /&gt;   P802.1p    Traffic Class Expediting and Dynamic Multicast Filtering   &lt;br /&gt;   802.1D-1998</description><link>http://mytech2u.blogspot.com/2016/12/list-of-8021x-standards.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-5811243655610552184</guid><pubDate>Sat, 03 Dec 2016 20:18:00 +0000</pubDate><atom:updated>2016-12-03T12:18:00.154-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><category domain="http://www.blogger.com/atom/ns#">VOIP</category><title>Voice VLAN</title><description>The voice VLAN feature is provided to separate voice traffic from data traffic and assign higher priority to voice traffic, thus decreasing voice transmission delay and jitter.You can assign or remove a port to or from the voice VLAN manually or have the switch do that dynamically by configuring the automatic voice VLAN assignment mode on the port.On a port configured with the automatic voice </description><link>http://mytech2u.blogspot.com/2016/12/voice-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6679005806476247327</guid><pubDate>Sat, 03 Dec 2016 20:11:00 +0000</pubDate><atom:updated>2016-12-03T12:11:00.169-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>Multiple VLAN Registration Protocol (MVRP) (GVRP)</title><description>&lt;br /&gt;Multiple VLAN Registration Protocol (MVRP) formerly known as GARP VLAN Registration Protocol (GVRP) or Generic VLAN Registration Protocol is a standards-based Layer 2 network protocol, for automatic configuration of VLAN information on switches. It was defined in the 802.1ak amendment to 802.1Q-2005.Within a layer 2 network, MVRP provides a method to dynamically share VLAN information and </description><link>http://mytech2u.blogspot.com/2016/12/multiple-vlan-registration-protocol.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7017199967283766951</guid><pubDate>Sat, 03 Dec 2016 19:11:00 +0000</pubDate><atom:updated>2016-12-03T11:11:00.814-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">HELPDESK</category><category domain="http://www.blogger.com/atom/ns#">Windows 7</category><title>Can&amp;#39;t add to favorites in Windows Explorer</title><description>Problem Description: I did Clean install of Windows 7 Ultimate. However, I noticed that I cannot add any items under the favorites "star" icon that can be found on the left pane in windows explorer.&lt;br /&gt;&lt;br /&gt;I tried drag &amp; drop and "add current location to Favorites" but nothing works. I'm not getting any error either which is weird.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Solution: Generally When you open the desired directory then right </description><link>http://mytech2u.blogspot.com/2016/12/can-add-to-favorites-in-windows-explorer.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7706339528243497395</guid><pubDate>Sat, 03 Dec 2016 17:51:00 +0000</pubDate><atom:updated>2016-12-03T09:51:00.199-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">apps</category><category domain="http://www.blogger.com/atom/ns#">blogging</category><category domain="http://www.blogger.com/atom/ns#">Blogging Tips</category><title>Get better Website Advertising Earnings with Simple Tips</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;link href="https://plus.google.com/110940548121933077997" rel="author"&gt;&lt;/link&gt; &lt;br /&gt;&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcq_x77S480sIk8bakyCHQCnc8-hwpF8AdE_wx5yb5MYDUna1n5fjrQ0A_sQQ2Xa34yWAJVbPKT3LcmkqIslS5WTxNe1FlvdEQqYPxpEzkyVWGjn5ANs6Sby9fsN_tqwhmiczC1aX4o_I/s1600/Website-Advertising-Earnings.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img alt="Get better Website Advertising Earnings with Simple Tips" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcq_x77S480sIk8bakyCHQCnc8-hwpF8AdE_wx5yb5MYDUna1n5fjrQ0A_sQQ2Xa34yWAJVbPKT3LcmkqIslS5WTxNe1FlvdEQqYPxpEzkyVWGjn5ANs6Sby9fsN_tqwhmiczC1aX4o_I/s1600/Website-Advertising-Earnings.jpg" height="250" title="Website Advertising Earnings" width="550" /&gt;&lt;/a&gt;&lt;/div&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;The best and popular monetization way for any website or blog is advertising. This is simple and easy method is very efficient. The process involves simple copy and paste activities of the code. Stick with the key advertising networks to get satisfied earnings. Behind these advantages, some web bloggers experienced the less money making with their advertisements on the website. If the site has fewer monthly visitors, then there is no chance to boost the earning of the website via advertisements. Here is a definite set of tips to maximize the website earnings.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;1. In-text advertising&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;For advertising purpose, most of the Website owners and bloggers rely specially on Banners ads and Adsense. Experimenting with In-Text advertising is the best way that compliments in a good manner. They are placed directly in the website, in between the article or blog post. The main advantage of this In-text advertising is the fact that its integration with the website content in a contextual format. It assists in boosting the traffic of the website and thereby increasing the website earnings. This is because, people those who might not noticed the Adsense ads will definitely observe the In-text ads. This is a vice-versa thing that enhances the profit of the website.&lt;br /&gt;&lt;br /&gt;Infolinks, the world leader offers the best recommendation In-text advertising network. For In-text advertising, they have bounty of advertisers to work with and to offer reliable payment after you started to earn money.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;2. Inventory Usage&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;The best online number game is making money via advertising. More the number of impressions on the banners, more the money you can make online. To maximize the earnings of the website, make sure to display the ads on the every page of the website. There are some sites that display ads on single web page, leaving other category, archive and home page. It is just like leaving in the money in the table that is of nearer distance.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;3. Sell own ads as well&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;It is a good idea to work with established advertising network, as the process is straightforward and pretty good as well. Apart from this, any website owner can also advertise spots to the companies directly. It shuns away the need to display, “Advertise with us” page on the website. This is effective as some companies willingly joins to work with site owners in a straight line. It also offers them more flexibility for displaying banner type ads and positioning.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;4. Multiple Tests&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;While advertising there will be many chances to find the optimal combination for the website, if the testing is done properly. Determine the best tool to make optimize the website and to guide through the process and provide all the necessary reports.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;To make the ad attractive and to earn high.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;Display a banner above or below the content of the post.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;Align the banner to the left or right of the website.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;Use preferable White or dark background.&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;&amp;nbsp; &lt;/span&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;u&gt;&lt;b&gt;Author Bio:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;Eva Jasmine is a freelance marketer and a content specialist. She’s also a trainer in &lt;a href="http://www.seojobtraining.in/" target="_blank"&gt;SEO Job Training&lt;/a&gt; offering &lt;a href="http://www.seojobtraining.in/digital-marketing-training-in-chennai.php" target="_blank"&gt;digital marketing training in Chennai&lt;/a&gt; who loves blogging.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://mytech2u.blogspot.com/2016/12/get-better-website-advertising-earnings.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhcq_x77S480sIk8bakyCHQCnc8-hwpF8AdE_wx5yb5MYDUna1n5fjrQ0A_sQQ2Xa34yWAJVbPKT3LcmkqIslS5WTxNe1FlvdEQqYPxpEzkyVWGjn5ANs6Sby9fsN_tqwhmiczC1aX4o_I/s72-c/Website-Advertising-Earnings.jpg" width="72"/><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7441603078222752943</guid><pubDate>Thu, 01 Dec 2016 09:44:00 +0000</pubDate><atom:updated>2016-12-01T01:44:00.219-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Blogger</category><category domain="http://www.blogger.com/atom/ns#">Blogging Tips</category><category domain="http://www.blogger.com/atom/ns#">seo</category><title>SEO: Remove your blog name from the title of Blogger Blog</title><description>One thing that has bothered me for a while is the fact that every one of my blog post page titles starts with the blog name.&lt;br /&gt;Repeating your blog title on every post page is bad for SEO. &lt;br /&gt;Blogger doesn't have a built in option for this but it's easy to fix with a few lines of code.&lt;br /&gt;Go to your Blogger CP and select edit html.Find the string: &lt;br /&gt;&lt;title&gt;&lt;data:blog.pageTitle/&gt;&lt;/title&gt;Replace it with:  &lt;</description><link>http://mytech2u.blogspot.com/2016/12/seo-remove-your-blog-name-from-title-of.html</link><thr:total>2</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6460903258753560437</guid><pubDate>Fri, 25 Nov 2016 07:07:00 +0000</pubDate><atom:updated>2016-11-24T23:07:00.160-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">FAQ</category><category domain="http://www.blogger.com/atom/ns#">HELPDESK</category><category domain="http://www.blogger.com/atom/ns#">IIS 7</category><category domain="http://www.blogger.com/atom/ns#">Website Hosting</category><title>13 Easy Steps to Install IIS 7 and Setup a Static Website</title><description>IIS 7 in Windows Server 2008 is a completely different entity than it has been in the past.Why to install IIS? The most common answer is because you need a web server that is easy to configure and work with.&lt;br /&gt;&lt;br /&gt;Finally Microsoft have created a version of IIS that will compete against Apache for functionality and performance. IIS 7 is a giant step forward for the IIS platform with the following </description><link>http://mytech2u.blogspot.com/2016/11/13-easy-steps-to-install-iis-7-and.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-1166628111401005918</guid><pubDate>Wed, 23 Nov 2016 19:44:00 +0000</pubDate><atom:updated>2016-11-23T11:44:00.190-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>Super VLAN</title><description>&lt;br /&gt;&lt;br /&gt;Network Diagram&lt;br /&gt;&lt;br /&gt;Figure 6 Network diagram for super VLAN configuration&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Network Requirements&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;As shown in Figure 6, Switch A works at the distribution layer to distribute traffic for the numerous hosts attached to the access switches connected to Switch A. All the hosts are assigned IP addresses from network segment 10.0.0.0/24. Switch A connects to the external network through </description><link>http://mytech2u.blogspot.com/2016/11/super-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-3138343086887254923</guid><pubDate>Wed, 23 Nov 2016 19:41:00 +0000</pubDate><atom:updated>2016-11-23T11:41:00.197-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>Isolate-User-VLAN</title><description>&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Network Diagram&lt;br /&gt;&lt;br /&gt;Figure 5 Network diagram for isolate-user-VLAN configuration&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Network Requirements&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;Device B and Device C are located in two independent networks, each device configured with VLANs as required. Due to network design changes, you are required to use Device A to interconnect Device B and Device C. When doing that, consider the following:&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;For security sake, </description><link>http://mytech2u.blogspot.com/2016/11/isolate-user-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-6667529600060123923</guid><pubDate>Wed, 23 Nov 2016 19:37:00 +0000</pubDate><atom:updated>2016-11-23T11:37:00.667-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>IP Subnet-Based VLAN</title><description>Network DiagramFigure 4 Network diagram for IP subnet-based VLAN configuration&lt;br /&gt;Network RequirementsAs shown in Figure 4, hosts in the office area are configured on two network segments 192.168.5.0/24 and 10.200.50.0/24. Configure IP subnet-based VLANs on the switch to enable GigabitEthernet 1/0/1 of the switch to transmit packets received from different network segments in different VLANs to the </description><link>http://mytech2u.blogspot.com/2016/11/ip-subnet-based-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7801927133801776035</guid><pubDate>Wed, 23 Nov 2016 19:22:00 +0000</pubDate><atom:updated>2016-11-23T11:22:00.172-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>Protocol-Based VLAN</title><description>Network DiagramFigure 3 Network diagram for protocol-based VLAN configuration&lt;br /&gt;Network RequirementsAs shown in Figure 3, configure protocol-based VLANs on the switch to satisfy the following requirements:l          IPv4 hosts in the office area and lab area can communicate with the IPv4 server; IPv6 hosts in the office area and lab area can communicate with the IPv6 server.l          The IPv4 </description><link>http://mytech2u.blogspot.com/2016/11/protocol-based-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-8273450104186979684</guid><pubDate>Wed, 23 Nov 2016 19:17:00 +0000</pubDate><atom:updated>2016-11-23T11:17:00.180-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>MAC-Based VLAN</title><description>Network DiagramFigure 2 Network diagram for MAC-based VLAN configuration&lt;br /&gt;&lt;br /&gt;Network Requirementsl          As shown in Figure 2, GigabitEthernet 1/0/1 of Switch A and GigabitEthernet 1/0/1 of Switch B are each connected to a meeting room. Laptop 1 and Laptop 2 are used for meeting and each of them may be used in any of the two meeting rooms.l          Laptop 1 and Laptop 2 are owned by different </description><link>http://mytech2u.blogspot.com/2016/11/mac-based-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-2163839568965235084</guid><pubDate>Wed, 23 Nov 2016 19:12:00 +0000</pubDate><atom:updated>2016-11-23T11:12:00.240-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">NETWORKING</category><category domain="http://www.blogger.com/atom/ns#">VLAN</category><title>Port-Based VLAN</title><description>Network DiagramFigure 1 Network diagram for port-based VLAN configuration&lt;br /&gt;Network Requirementsl          As shown in Figure 1, Switch A and Switch B connect to Host 1 and Server 1 of a department and Host 2 and Server 2 of another department.l          To isolate the communication between the two departments at Layer 2, assign Host 1 and Server 1 to VLAN 100 with the descriptive string being </description><link>http://mytech2u.blogspot.com/2016/11/port-based-vlan.html</link><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-7105539303500866794</guid><pubDate>Mon, 21 Nov 2016 15:48:00 +0000</pubDate><atom:updated>2016-11-21T07:48:00.200-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">apps</category><category domain="http://www.blogger.com/atom/ns#">blogging</category><category domain="http://www.blogger.com/atom/ns#">Blogging Tips</category><title>7 Tips To Beat Procrastination For Bloggers</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;link href="https://plus.google.com/110940548121933077997" rel="author"&gt;&lt;/link&gt; &lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; &lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2Y2AxFz_5NecP3FNxDbZjgPqeR_qr5Gm912TuAYoWltYnKZSU2arjSFh3Sm2_Z6ub44xvE8tokboUEKS6a5zaKGlPxXJxWZGfZJcDDw0wukyz9Iq1EmlzVJN2ICvMbL_tlr87HkP1YFk/s1600/ID-100287748.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="7 Tips To Beat Procrastination For Bloggers" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2Y2AxFz_5NecP3FNxDbZjgPqeR_qr5Gm912TuAYoWltYnKZSU2arjSFh3Sm2_Z6ub44xvE8tokboUEKS6a5zaKGlPxXJxWZGfZJcDDw0wukyz9Iq1EmlzVJN2ICvMbL_tlr87HkP1YFk/s1600/ID-100287748.jpg" height="171" title="Procrastination" width="200" /&gt;&lt;/a&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;Doubt and Inconsistent thinking are the behavioral patterns responsible for Procrastination. Regret, Anxiety and constant brooding are the consequent behavioral outputs of Procrastination. What is commonly evident is a sort of confusion and apprehension that things will not work out, inspite of your best efforts. It is pre-decided that, no matter, ‘how well you do to put in your best effort’ – you will fail!&lt;br /&gt;&lt;br /&gt; BUT (and this is a big but) LET US NOT FORGET THAT WE CAN WALK THE PATH FROM NOTHING TO SOMETHING, AND SOMETHING THAT MATTERS! ONE STEP AT A TIME! THAT IS HOW WE LEARNED TO WALK AND TALK AS KIDS, RIGHT?&lt;br /&gt;&lt;br /&gt; In this article, we will study the 7 measures to counter procrastination by maintaining coordination between the mind and the body. The maintenance of mind to body coordination essentially means that: ‘the way you think in your mind’ and ‘the way you act with your body’ can be ‘balanced’.&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 1) Self-Reflection&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; What is Self-reflection?&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; Self-reflection is necessary to counter the tendency of doubting that good things will happen to us. Self-reflection essentially means: Talking to the ‘Self’ and telling your mind about the plan that you have for next year, next month, next week or even the next day. You can self-reflect to decide about your course of action for the next day. This habit of questioning your mind and getting the answers will lead you to the fine habit of ‘knowing where you stand and how you can progress’.&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; How to commit yourself to Self-reflection?&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; It is necessary to reflect upon your own thoughts and understand – ‘where are you going wrong’ and ‘where are you going right’. This method of observing your actions and learning from those actions is worthwhile, rather than regretting the past.&lt;br /&gt;&lt;br /&gt; It is easy to tune into the self-reflective mode. All you have to do is contemplate and believe in the greatness of your mere existence and great things will begin to happen. If you begin to appreciate the smaller things in your life then you will value your own existence. And once you understand, the real meaning of value, you will certainly value your time, work and the satisfaction that you receive from the action of doing the work.&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 2) Difference between a ‘&lt;i&gt;drop of water&lt;/i&gt;’ and the ‘&lt;i&gt;ocean&lt;/i&gt;’&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; It is often difficult to view the big picture and recollect its beauty; but committing to the self-reflection activity mentioned above will certainly help in viewing the big picture. However, first do not try to look at the big picture, it is for later. First, it is necessary to experience small beginnings and learn from them. The difference between a ‘drop of water’ and the ‘ocean’ is that the ‘OCEAN IS GRATEFUL TO KNOW THAT IT IS SO BIG, AND YET IT WAS A SMALL DROP OF WATER ONCE; WHEREAS, THE DROP OF WATER IS ALSO GRATEFUL TO KNOW THAT WITH THE HELP OF OTHER WATER DROPLETS, IT WILL ALSO BECOME AN OCEAN SOMEDAY’!&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 3) Commitment&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; The act of committing yourself to action is the effort required from ‘thinking about doing an action’ to ‘initiating the action’, and ‘maintaining consistency in action’. It is necessary to acknowledge that – ‘we as humans can commit ourselves to doing anything we want. And hence, we can either remain idle or become the being of action’.&lt;br /&gt;&lt;br /&gt; Did you ever wonder why you continue procrastinating? It is bad enough that we procrastinate but why do we continue doing so every day without fail. The reason is simple – we continue doing so because we are creatures of habit. Hence, if we can remain idle for days, then we can also remain active for days, weeks and months. A habit once formed is difficult to break and hence, if we commit ourselves to forming the habit of putting in little effort everyday then big results will certainly follow.&lt;/span&gt;&lt;br /&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 4) Reasoning&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; Simply asking ‘why’ to your mind will give you enough answers. And if questions bother you a lot, you should only acknowledge them. I am not saying ignore questions or forget about questions. The basic characteristic of mind is its consciousness and consciousness can be experienced in every moment of the life. Consciousness can be perceived in your ability to think. Your effort to commit yourself to reasoning, self-reflecting and believing will bring success when you begin to envision clarity. This clarity will further strengthen your ability to self-reflect reason and believe in the cause.&lt;/span&gt;&lt;br /&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 5) Write it down&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; Writing down random thoughts can also make you feel lighter. Your mind is free to flow in any direction with its thoughts and hence it is essential to control it. A mind cluttered with unnecessary thoughts can make you feel burdened with complexity. Writing down your apprehensions is another way of countering the negative beliefs and sowing the seeds for the fruit of wisdom. DON’T GIVE UP! BECAUSE IT ISN’T OVER UNTIL IT’S OVER, YOU ARE STILL BREATHING! AREN’T YOU!&lt;/span&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 6) Less Planning, More Action&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;div style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; Many of us have the habit of doing too much of thinking and planning to the minutest detail. However, ‘Thinking without doing is similar to nothingness’. Hence, it is said that action speaks louder than words. Even understanding this phenomenon is enough to bring ourselves into the action mode.&lt;/span&gt;&lt;/div&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; 7) Your work is a set of first steps taken to reach your goal&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; The ideal end product of your work is success. And your work is nothing but a series of individual steps taken to reach a goal. These series of steps will make you strong enough to accept and appreciate the power of success.&lt;br /&gt;&lt;br /&gt; Thus, we should get our beliefs right and take those small steps to gain bigger results. RESULTS ARE A PRODUCT OF OUR UNDYING SPIRIT OF APPRECIATION TOWARDS OUR EXISTENCE. WE BELIEVE WE EXIST AND SO WE DO!&lt;/span&gt;&lt;br /&gt;&lt;i&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: x-small;"&gt;Image credit: &lt;span style="color: #0b5394;"&gt;&lt;a href="tubeilmu.blogspot.com/images/view_photog.php?photogid=2664" target="_blank"&gt;stuart miles&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;u&gt;&lt;b&gt;Author Bio:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt; Yohana Petrovic is a freelance writer and professional educator. She has 10 years experience of educating. She is a guest blogger, writing about blogging, writing skills and education. Yohana is also a regular contributor to &lt;a href="http://globalessays.org/" target="_blank"&gt;http://globalessays.org/&lt;/a&gt; website &lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://mytech2u.blogspot.com/2016/11/7-tips-to-beat-procrastination-for.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2Y2AxFz_5NecP3FNxDbZjgPqeR_qr5Gm912TuAYoWltYnKZSU2arjSFh3Sm2_Z6ub44xvE8tokboUEKS6a5zaKGlPxXJxWZGfZJcDDw0wukyz9Iq1EmlzVJN2ICvMbL_tlr87HkP1YFk/s72-c/ID-100287748.jpg" width="72"/><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4760218650716012528.post-3635714973454374304</guid><pubDate>Fri, 18 Nov 2016 18:14:00 +0000</pubDate><atom:updated>2016-11-18T10:14:00.186-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">apps</category><category domain="http://www.blogger.com/atom/ns#">Blogging Tips</category><category domain="http://www.blogger.com/atom/ns#">Security Tips</category><category domain="http://www.blogger.com/atom/ns#">tips</category><title>Seven Ways to Prevent Software Viruses from Infecting your Personal Data</title><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;link href="https://plus.google.com/110940548121933077997" rel="author"&gt;&lt;/link&gt; &lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt; &lt;/span&gt;&lt;br /&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPixAFpkCYvMk6fUbtKYpWBXEZZtC1yvZVcZB1TJ8wgh6efhe6CPOzhY6FsPUJsQrxh8ws1q6pyzMkIPM1d6JQgI_WEqZcscNq3-HF0V_rKbUsW6rTVQM0LLdVsDxPO9GIeAFFidRc5g/s1600/ID-100235790.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="Seven Ways to Prevent Software Viruses from Infecting your Personal Data" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPixAFpkCYvMk6fUbtKYpWBXEZZtC1yvZVcZB1TJ8wgh6efhe6CPOzhY6FsPUJsQrxh8ws1q6pyzMkIPM1d6JQgI_WEqZcscNq3-HF0V_rKbUsW6rTVQM0LLdVsDxPO9GIeAFFidRc5g/s1600/ID-100235790.jpg" height="150" title="Software Viruses" width="200" /&gt;&lt;/a&gt;&lt;/div&gt;Computer viruses are manifested through software programs that replicate and infect other computers. Normally these are spread through emails and data transfer devices such as flash disks. Other than infecting your computer or laptop, viruses can be transferred to your cell phone, e-reader or tablet. So long as these gadgets can get into contact with the internet, they are always at risk. A viral attack can lead to a malfunction or expose your personal data such as the passwords you use. If an intruder gets hold of your password he/she can hack into your phone or emails.&lt;br /&gt;&lt;br /&gt;There are three basic ways to steer clear of viruses:&lt;br /&gt;&lt;br /&gt;&lt;ul style="text-align: left;"&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;  Avoid opening email attachments from people you don’t know&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;Always use sites that are trusted when downloading files&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;Scan suspect documents or devices that you use &lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;&lt;h3 style="text-align: left;"&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;Below are some measures you can take to prevent viruses from getting into your personal data:&lt;/span&gt;&lt;/h3&gt;&lt;h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;/span&gt;&lt;/h3&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;  &lt;b&gt;1.&lt;/b&gt;       Exercise caution when opening email attachments either from your phone or tablet. The same way you treat suspect attachments with caution when working from your computer should be replicated in other gadgets. If you get an email from someone who is not in your mailing list, don’t open it. Do the same in case the message title or sender’s name looks suspicious.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;2.&lt;/b&gt;       Be on the lookout for links that look questionable. These are normally sent through text or email messages. The people who send them are spammers or hackers. Some do this on purpose with the intention of establishing whether that email address has a user. Once you open it, some trigger is raised on their end and they get an opportunity to either spam your mail box or send viruses. Others may not be aware that their phones are infected. You can try sending a text to the sender to inquire whether he/she sent the link. If the person is genuine and honest you will get a response and an apology. Otherwise, delete such messages instantly.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;3. &lt;/b&gt;      With respect to applications, download only those that are legitimate. You can tell whether a store is legit by reading online reviews about it. Since there are many people looking for mobile phone applications, some malicious people have taken advantage by spreading viruses in form of fake games, social networking applications and financial tracking apps.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;4.       &lt;/b&gt;While using Bluetooth, apply undiscoverable settings. There are viruses that pass through Bluetooth connections. This is a tricky attack. If you walk near a device and your connection is in discoverable mode, the virus in the infected device can easily be transferred to your tablet or smartphone. Currently, there are some malicious viruses that disable your phone and steal your contact details.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;5.       &lt;/b&gt;In order to protect your smartphones, iPhones, e-readers and tablets download anti-virus applications. These can be obtained from trusted providers. Make sure the company you source the app from is well known. Examples include Lookout Mobile Security app and SmrtGuard Solutions’ Snap Secure app. These help protect iPhones as well as provide data backup. The applications are available from Lookout Inc. There are a host of many others.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;6.&lt;/b&gt;       For Android phones, you should be able to get reliable anti-virus such as Kaspersky Mobile Security app. This incorporates spam and virus protection. Other examples are Norton Mobile Security and Bullguard Mobile Security. These protect data during an attack, theft or loss of your phone. You can download them online.&lt;br /&gt;  &lt;br /&gt;&lt;b&gt;7.&lt;/b&gt;       Look for anti-virus applications that help secure your personal information from falling into the wrong hands. Some can help keep track of your phone while others rid your phone’s memory from a remote location. This works well when someone steals your phone. &lt;/span&gt;&lt;br /&gt;&lt;i&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: x-small;"&gt;Image Credit: &lt;/span&gt;&lt;/span&gt;&lt;span style="color: #0b5394;"&gt;&lt;span style="font-family: inherit;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;a href="tubeilmu.blogspot.com/images/view_photog.php?photogid=6851" target="_blank"&gt;jesadaphorn&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/i&gt; &lt;br /&gt;&lt;br /&gt;&lt;span style="font-family: Georgia,&amp;quot;Times New Roman&amp;quot;,serif;"&gt;&lt;br /&gt;&lt;br /&gt;&lt;u&gt;&lt;b&gt;Author Bio:&lt;/b&gt;&lt;/u&gt;&lt;br /&gt;&lt;a href="https://www.linkedin.com/company/agency-fusion" target="_blank"&gt;Agency Fusion&lt;/a&gt;, located in Salt Lake City, Utah, is an ad agency focused on the intersection of design and technology. They specialize in web design, web development, branding and software development. Learn more about Fusion Agency &lt;a href="http://www.wearenotfusionagency.com/" target="_blank"&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;&lt;/div&gt;</description><link>http://mytech2u.blogspot.com/2016/11/seven-ways-to-prevent-software-viruses.html</link><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFPixAFpkCYvMk6fUbtKYpWBXEZZtC1yvZVcZB1TJ8wgh6efhe6CPOzhY6FsPUJsQrxh8ws1q6pyzMkIPM1d6JQgI_WEqZcscNq3-HF0V_rKbUsW6rTVQM0LLdVsDxPO9GIeAFFidRc5g/s72-c/ID-100235790.jpg" width="72"/><thr:total>0</thr:total><author>romosentet@gmail.com (Anonymous)</author></item></channel></rss>