<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>CyberFort</title><description>Latest News Based on Science &amp;amp; Technology</description><managingEditor>noreply@blogger.com (Unknown)</managingEditor><pubDate>Thu, 19 Dec 2024 08:53:37 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">256</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>http://cyberfort.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:image href="www.cyberfort.blogspot.in"/><itunes:subtitle>cyber fort</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Facebook Offers Loan Scheme Upto 1 Lakh</title><link>http://cyberfort.blogspot.com/2016/08/facebook-offers-loan-scheme-upto-1-lakh.html</link><category>all the business</category><category>Android</category><category>apps</category><category>apps and software</category><category>facebook</category><category>internet security</category><category>mobile</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 10 Aug 2016 16:43:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-8214015235266664767</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyfM7VfGUfSN4bXycWr9yMMSLEt6J-2Ei0IwQwXk73O7P8Ol46HVDJ64ohCwHaBlphpIskqjD8Oky3CX3BmJFqt9uMm3cQZ3iWRAE4r1arAfgqC2CnpoBKHKmNbkL8MtnPJtL6gNqLFVvE/s1600/120905015814-facebook-shares-tablet-large.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyfM7VfGUfSN4bXycWr9yMMSLEt6J-2Ei0IwQwXk73O7P8Ol46HVDJ64ohCwHaBlphpIskqjD8Oky3CX3BmJFqt9uMm3cQZ3iWRAE4r1arAfgqC2CnpoBKHKmNbkL8MtnPJtL6gNqLFVvE/s640/120905015814-facebook-shares-tablet-large.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-weight: normal;"&gt;&lt;span style="color: blue;"&gt;Good News for Facebook Users. Now Individuals can get loan Upto 1 Lakh on the basis of Facebook Account within 10 minutes&lt;/span&gt;. &lt;/span&gt;&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif; font-weight: normal;"&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: small;"&gt;&lt;span style="font-weight: normal;"&gt;Pune based company named&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white;"&gt;&lt;span style="font-weight: normal; line-height: 18.2px;"&gt;Early Salary is a&amp;nbsp;Fin Tech&amp;nbsp;company in Pune, offering urgent,&amp;nbsp;unsecured, quick cash personal loans at low interest rates to those who are broke on month end.You have to only submit the simple documents &amp;amp; simple&amp;nbsp;enquirers&amp;nbsp;regarding your details.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span style="color: blue; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;How to Proceed for Loan Scheme &amp;amp; What documents you must have.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;
&lt;span style="color: #0c343d; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;&lt;b&gt;&lt;br /&gt;1. You Should Must Have Facebook Account&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;The 1st &amp;nbsp;condition for company is you must have a Facebook account for signup process in early salary app. This is most important requirements for company. to proceed the loan scheme.&lt;/span&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="color: #0c343d; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;2. You Should Must Have Smartphone&lt;/span&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;The 2nd condition of company is you must have Smartphone for Registration Process.&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;Download and Install the application through play store.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #0c343d; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;b&gt;3. Your Salary Must Have Upto Rs 20,000/-&lt;/b&gt; &amp;nbsp;&lt;/span&gt;&lt;span style="color: blue; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;The 3rd condition of company is your monthly salary must have upto Rs 20,000. This information you have to clear at the time of loan approval.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #0c343d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: #0c343d; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;4. Loan Amt. Starts at Rs 10,000/- Upto Rs 1 Lakh at 2.5 % interest rate.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;This company provides these loan amt. only for 7 days - 30 days at per 2.5% interest rate per months&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #0c343d;"&gt;5. Documents Required&lt;/span&gt;&lt;/b&gt;&amp;nbsp;- Your Salary Bank Account Statement of 3 Months.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: blue; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;&lt;span style="color: blue;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; - &lt;/span&gt;Your Pan Details will be Required.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;
&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;
&lt;b&gt;&lt;i&gt;Best Regards . . . Please don't Forget to Share this information to whom needed for Money.&lt;/i&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: blue; font-family: &amp;quot;arial&amp;quot; , &amp;quot;helvetica&amp;quot; , sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;span style="line-height: 18.2px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyfM7VfGUfSN4bXycWr9yMMSLEt6J-2Ei0IwQwXk73O7P8Ol46HVDJ64ohCwHaBlphpIskqjD8Oky3CX3BmJFqt9uMm3cQZ3iWRAE4r1arAfgqC2CnpoBKHKmNbkL8MtnPJtL6gNqLFVvE/s72-c/120905015814-facebook-shares-tablet-large.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">103</thr:total></item><item><title>Amazon baits developers with $5K per Fire Phone app</title><link>http://cyberfort.blogspot.com/2014/06/amazon-baits-developers-with-5k-per.html</link><category>all tech</category><category>Android</category><category>apps</category><category>mobile</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 22 Jun 2014 08:02:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-5232963756553336499</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnBfCiZ6jmSk37Dkx6QCeNSj08mLvCNNmDP47LAoQBmr_2ET9DUFxChF6rl0aETuzcC4yY_5yNTna7TyWhIQW5xmiBHcjtGVTOe3y46cgeA2nqPVRxm_DdpDU1VkfSWiw9xkh2VmHe2WQ/s1600/fire_table.jpg" imageanchor="1" style="background-color: transparent; clear: left; display: inline !important; margin-bottom: 1em; margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnBfCiZ6jmSk37Dkx6QCeNSj08mLvCNNmDP47LAoQBmr_2ET9DUFxChF6rl0aETuzcC4yY_5yNTna7TyWhIQW5xmiBHcjtGVTOe3y46cgeA2nqPVRxm_DdpDU1VkfSWiw9xkh2VmHe2WQ/s1600/fire_table.jpg" height="355" width="640" /&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;div class="post-boilerplate boilerplate-before" style="background-color: white; border: 0px; box-sizing: border-box; font-family: 'Open Sans', sans-serif; font-size: 16px; line-height: 25px; margin: 0px 0px 18px; outline: none medium; padding: 0px; text-align: start; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; box-sizing: border-box; font-family: inherit; font-size: inherit; font-variant: inherit; line-height: inherit; margin: 0px; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #38761d;"&gt;&lt;span style="font-style: italic; font-weight: inherit;"&gt;How can you leverage mobile to increase profitability for your company? Find out at&amp;nbsp;MobileBeat, VentureBeat's 7th annual event on the future of mobile, on July 8-9 in San Francisco.&amp;nbsp;Register now and save &lt;/span&gt;&lt;b&gt;&lt;i&gt;$200 !&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;hr style="border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-color: rgb(204, 204, 204); border-top-style: solid; box-sizing: content-box; height: 1px; margin: 1em 0px; outline: none medium; padding: 0px;" /&gt;
&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; font-family: 'Open Sans', sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 2em; outline: none medium; padding: 0px; text-align: start; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Amazon will give developers $5,000 in Amazon Coins for every paid&amp;nbsp;&lt;span style="box-sizing: border-box; font-family: inherit !important; font-size: inherit !important; font-weight: inherit !important; outline: none medium; position: static;"&gt;&lt;span class="kLink" style="background: none transparent; border-bottom-style: solid; border-bottom-width: 1px; border-left-style: none !important; border-left-width: 0px !important; border-right-style: none !important; border-right-width: 0px !important; border-top-style: none !important; border-top-width: 0px !important; box-sizing: border-box; display: inline !important; float: none !important; font-family: inherit !important; font-size: inherit !important; font-style: inherit; font-variant: inherit; font-weight: inherit !important; line-height: inherit; margin: 0px; outline: none medium; padding: 0px 0px 1px !important; position: static; vertical-align: baseline; width: auto !important;"&gt;app&lt;/span&gt;&lt;/span&gt;&amp;nbsp;for&amp;nbsp;the new Fire Phone&amp;nbsp;that meets Amazon’s standards.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; font-family: 'Open Sans', sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 2em; outline: none medium; padding: 0px; text-align: start; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Each developer can reap the rewards for as many as three apps. Qualifying apps with in-app purchasing can count, too, according to a&amp;nbsp;blog post&amp;nbsp;today from Amazon developer evangelist David Isbitski.&lt;/span&gt;&lt;/div&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; font-family: 'Open Sans', sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 2em; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Amazon Coins are redeemable for games, apps, and in-app purchases on Amazon devices, including Kindles and the Fire Phone… and, presumably, Fire TV. You can also spend them on&amp;nbsp;&lt;span style="box-sizing: border-box; font-family: inherit !important; font-size: inherit !important; font-weight: inherit !important; outline: none medium; position: static;"&gt;&lt;span class="kLink" style="background: none transparent; border-bottom-style: solid; border-bottom-width: 1px; border-left-style: none !important; border-left-width: 0px !important; border-right-style: none !important; border-right-width: 0px !important; border-top-style: none !important; border-top-width: 0px !important; box-sizing: border-box; display: inline !important; float: none !important; font-family: inherit !important; font-size: inherit !important; font-style: inherit; font-variant: inherit; font-weight: inherit !important; line-height: inherit; margin: 0px; outline: none medium; padding: 0px 0px 1px !important; position: static; vertical-align: baseline; width: auto !important;"&gt;Android&amp;nbsp;&lt;/span&gt;&lt;span class="kLink" style="background: none transparent; border-bottom-style: solid; border-bottom-width: 1px; border-left-style: none !important; border-left-width: 0px !important; border-right-style: none !important; border-right-width: 0px !important; border-top-style: none !important; border-top-width: 0px !important; box-sizing: border-box; display: inline !important; float: none !important; font-family: inherit !important; font-size: inherit !important; font-style: inherit; font-variant: inherit; font-weight: inherit !important; line-height: inherit; margin: 0px; outline: none medium; padding: 0px 0px 1px !important; position: static; vertical-align: baseline; width: auto !important;"&gt;apps&lt;/span&gt;&lt;/span&gt;&amp;nbsp;and games. So basically, it’s more fake Internet money.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; box-sizing: border-box; font-family: 'Open Sans', sans-serif; font-size: 16px; line-height: 24px; margin-bottom: 2em; outline: none medium; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;It’s a logical step for Amazon to mobilize interest in the development community as the phone picks up and looks to challenge devices running Android, iOS, and Windows operating systems.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEitnBfCiZ6jmSk37Dkx6QCeNSj08mLvCNNmDP47LAoQBmr_2ET9DUFxChF6rl0aETuzcC4yY_5yNTna7TyWhIQW5xmiBHcjtGVTOe3y46cgeA2nqPVRxm_DdpDU1VkfSWiw9xkh2VmHe2WQ/s72-c/fire_table.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">13</thr:total></item><item><title>GTA 5 Tips &amp; Tricks: Get Rich The Easy Way</title><link>http://cyberfort.blogspot.com/2014/04/gta-5-tips-tricks-get-rich-easy-way.html</link><category>games</category><category>gta</category><category>tips</category><category>tricks</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 26 Apr 2014 08:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-4395022751734521989</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKPamPylZ8oZKhY_J7-L8EVhiHLRNgBITw6id34fPArWG1ewVFfysW_bJ_v8ZuUBIej0MPCF89QUQK7kVTnBAKvBeIvSyQDOKxmwF3vztcHGPu5RPKDMU2q_8meEBfNx5kfG-h-Jy41hag/s1600/GTA-image-1.jpg" height="396" width="640" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;&lt;span style="color: #660000;"&gt;Gamers who just have to have the best of things in GTA 5 will have to get their hands on lots of cash. Luckily there are numerous ways to get money, but some of them are more apparent than others.&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #073763;"&gt;&lt;span id="more-23"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;When Rockstar launched the 1.04 patch it change the structures for payment for missions and this meant that jobs then only paid out half of what they used to do.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Rockstar are offering stimulus packages as a way of apologising after the launch of GTA Online suffered issues. This means that gamers who log in during October can get their hands on $500,000.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;The payment will be handed out in two instalments of $250,000, with the first being available between 13th and 20th October.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Jobs are a way to gain ranks, stats and reputation, they also provide a way to get your hands on cash. The more jobs you take the more reward you get.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #783f04; font-family: Trebuchet MS, sans-serif;"&gt;Jobs can be found all over the map and one of the easiest ways to find them is by using the in game phone. Other gamers can also invite you to do jobs. Jobs are also opened up when you complete elements in the game.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;When you reach level 15 survival matches are unlocked and you can earn money with these. When you get to the end of level 10 you get $20,000 and this usually takes around 10 minutes. Survival missions can be played with between 1 and 4 players and they are easy if you work together as a team. These can be played as many times as you want and you can use the plane boneyard map to locate the building which allows you to get up on the roof and which provides you with an advantage.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;You can get your hands on cash when you steal cars or rob stores. Car theft is great but you can only sell cars at certain times.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The Los Santos Custom Mod Shops will buy cars but only if they are not tracked. The police are on the look-out for stolen cars though. These can be sold each 48 minutes. the SUVs will bring with it a good price, usually between 3, 5 and 7k, Lampsdeti Felons will sell for around $9,000.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;One of the best regions for finding high end cars is the Richman region.&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Simeon will provide you with a list of vehicles that he wants and which come with a high price and he will send you this list in a text.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;You can steal one, take it to the mod shop and then get a re-spray before taking it to the docks and getting your rewards.&lt;/span&gt;&lt;/div&gt;
&lt;div style="line-height: 20px; margin-bottom: 10px;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgKPamPylZ8oZKhY_J7-L8EVhiHLRNgBITw6id34fPArWG1ewVFfysW_bJ_v8ZuUBIej0MPCF89QUQK7kVTnBAKvBeIvSyQDOKxmwF3vztcHGPu5RPKDMU2q_8meEBfNx5kfG-h-Jy41hag/s72-c/GTA-image-1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Microsoft Launch's “Office Mix” Makes PowerPoint Interactive</title><link>http://cyberfort.blogspot.com/2014/04/microsoft-launchs-office-mix-makes.html</link><category>apps and software</category><category>microsoft</category><category>technology</category><category>windows</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 24 Apr 2014 12:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-5115553565872171644</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: white; line-height: 23.310400009155273px;"&gt;&lt;b&gt;&lt;span style="color: #274e13; font-family: Georgia, Times New Roman, serif;"&gt;Perhaps Microsoft has heard similar feedback, hence their new app called Office Mix. This application adds interactive elements to PowerPoint, and we all know interactive means better, yeah?&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOq7_nCbwZvArG2na978cDFtOF2ExTkc97B2TYNaB-4S1iU2zYXveZ0QsE6UH3jB0pYiTmDv9D1TbqkLljyrdyl3KB07TPK-wpNMMC41i_2jTc-XyLX4lboyB6QJy1ucmoPP14K-aOXN/s1600/Office-Mix-Preview.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOq7_nCbwZvArG2na978cDFtOF2ExTkc97B2TYNaB-4S1iU2zYXveZ0QsE6UH3jB0pYiTmDv9D1TbqkLljyrdyl3KB07TPK-wpNMMC41i_2jTc-XyLX4lboyB6QJy1ucmoPP14K-aOXN/s1600/Office-Mix-Preview.png" height="328" width="640" /&gt;&lt;/a&gt;&lt;span style="background-color: white; font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 23.310400009155273px;"&gt;&lt;span style="color: #0c343d;"&gt;Death by PowerPoint is something that many an employee has to go through, especially when attending seminars, meetings, and pitches. While there is no dearth of useful advice about how to make PowerPoint presentations that will not bore your audience to death, these resources don’t seem to have much of an impact – at least based on experience and stories I’ve heard.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: 'Helvetica Neue', Helvetica, sans-serif; line-height: 23.310400009155273px;"&gt;&lt;span style="color: #0c343d;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;There is also a&amp;nbsp;&lt;a href="https://officemix.uservoice.com/knowledgebase" target="_blank"&gt;Knowledge Base section for Office Mix&lt;/a&gt;, where you can find out more details about the application. Personally, I think there are two questions that need answering the most.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px; text-align: center;"&gt;
&lt;strong&gt;&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;One, what exactly does Office Mix do ?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;The answer, from the Knowledge Base:&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Office Mix allows you to turn your PowerPoints into interactive online lessons or presentations. We install an add-in that gives you the ability to record audio, video, and handwriting, and insert interactive elements like quizzes and CK12 exercises. There’s even a screen capture tool so you can record anything on your PC.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Once your presentation is ready just click “Create Mix.” We work our magic to mix it into an interactive document complete with analytics, and place it in the cloud. From there, just share the link, and your students can watch it on just about any device with a web browser. You can then check student progress online and see who watched the presentation, and how they did on your quizzes.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;That makes it pretty clear that – at least at this point – Office Mix is targetted at the education sector.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px; text-align: center;"&gt;
&lt;strong&gt;&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Two, how much will I have to pay for this ?&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;blockquote style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;It’s free! The website, data analytics, and add-in are all free.&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Pretty cool, but obviously, you’ll need Office, which is not free, to use Office Mix. You can try out various Microsoft products and services for free&amp;nbsp;here, though.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 23.310400009155273px;"&gt;
&lt;span style="color: #0b5394; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;At the end of the day, the question is whether Office Mix will revolutionize PowerPoint. What do you think?&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #5f6d80; font-family: 'Helvetica Neue', Helvetica, sans-serif; font-size: 14px; line-height: 23.310400009155273px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJPOq7_nCbwZvArG2na978cDFtOF2ExTkc97B2TYNaB-4S1iU2zYXveZ0QsE6UH3jB0pYiTmDv9D1TbqkLljyrdyl3KB07TPK-wpNMMC41i_2jTc-XyLX4lboyB6QJy1ucmoPP14K-aOXN/s72-c/Office-Mix-Preview.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Most Desirable Job in the World Is…Here</title><link>http://cyberfort.blogspot.com/2014/04/most-desirable-job-in-world-ishere.html</link><category>Govt. Jobs</category><category>internet security</category><category>website</category><category>world</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 16 Apr 2014 21:51:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-3993173269546396446</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsLcYdcbOZjn8OaEmz5v1IBdvd9vP1tbHE5OY3wl1MCyTsCZuG_8P0Ut9ZxW04HVqR92dp6c0_g7Y-82Sr9jPaZd4IBtCn7uuauEBT9K4xnmrwVJ_6jE2349MsC4rgMRjFORrkv1YG1Z-8/s1600/smart-kids.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="job search here" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsLcYdcbOZjn8OaEmz5v1IBdvd9vP1tbHE5OY3wl1MCyTsCZuG_8P0Ut9ZxW04HVqR92dp6c0_g7Y-82Sr9jPaZd4IBtCn7uuauEBT9K4xnmrwVJ_6jE2349MsC4rgMRjFORrkv1YG1Z-8/s1600/smart-kids.jpg" height="265" title="job search here" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; font-family: georgia, serif; font-size: 19px; line-height: 26.880001068115234px; margin-bottom: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #073763;"&gt;For a new study ranking the best jobs of 2014, jobs website &lt;a href="http://www.careercast.com/jobs-rated/best-jobs-2014" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; text-decoration: none;" target="_blank"&gt;CareerCast.com&lt;/a&gt;&amp;nbsp;did some number-crunching and found — perhaps not surprisingly — that crunching numbers is a pretty good gig.&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; font-family: georgia, serif; font-size: 19px; line-height: 26.880001068115234px; margin-bottom: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #073763;"&gt;With a median income of&lt;span class="Apple-style-span" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;$101,360 and a 23% projected job growth rate by 2022, m&lt;/span&gt;athematician topped the site’s roundup of the most desirable jobs. CareerCast points to the “&lt;/span&gt;&lt;span class="Apple-style-span" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;&lt;span style="color: #073763;"&gt;exponentially growing popularity of mathematics” in everything from healthcare and technology to sports and politics&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; line-height: 26.880001068115234px; margin-bottom: 1.5em; margin-top: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #274e13; font-family: Verdana, sans-serif;"&gt;“Mathematicians are employed in every sector of the economy… from Wall Street brokerages to energy exploration companies to IT R&amp;amp;D labs to university classrooms,” CareerCast publisher Tony Lee tells&lt;em style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;&lt;a href="http://www.businessinsider.com/10-best-jobs-of-2014-2014-4" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; text-decoration: none;" target="_blank"&gt;BusinessInsider&lt;/a&gt;&lt;/em&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; font-family: georgia, serif; font-size: 19px; line-height: 26.880001068115234px; margin-bottom: 1.5em; margin-top: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span class="Apple-style-span" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;&lt;span style="color: #073763;"&gt;Companies and government agencies rely more heavily on analytics to make all sorts of decisions today, so employers need people who can generate and parse this data, CareerCast says in its overview. “Mathematical analyses of trends are used to gauge many activities, ranging from internet-user tendencies to airport traffic control.”&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; line-height: 26.880001068115234px; margin-bottom: 1.5em; margin-top: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Companies looking for all these math whizzes are going to have a tough time, though: As a nation, our math skills stink. A survey of 5,000 Americans between the ages of 16 and 65 last year found that our mathematical abilities are better than those of people in just two other countries — Italy and Spain — and behind the other 18 surveyed by the Organization for Economic Cooperation and Development. “Explanations for the relatively weak performance of the United States include failings in initial schooling, lack of improvement in educational attainment over time, and poor skills in some subpopulations,” the OECD said in a&amp;nbsp;&lt;a href="http://skills.oecd.org/documents/Survey_of_Adult_Skills_US.pdf" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; text-decoration: none;" target="_blank"&gt;report&lt;/a&gt;&amp;nbsp;examining the U.S.’s poor academic showing.&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; font-family: georgia, serif; font-size: 19px; line-height: 26.880001068115234px; margin-bottom: 1.5em; margin-top: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #073763;"&gt;Unfortunately, our kids aren’t any better at math than we are. In fact, when the&amp;nbsp;&lt;span class="Apple-style-span" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;Program for International Student Assessment evaluated the math skills of teenagers from 65 countries, it found that&amp;nbsp;&lt;a href="http://nation.time.com/2013/12/03/american-teenagers-are-getting-worse-at-math/" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; text-decoration: none;"&gt;math scores dropped&lt;/a&gt;&amp;nbsp;among U.S. teens. Their math abilities trail not only those of kids from countries like&amp;nbsp;&lt;span class="Apple-style-span" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box;"&gt;Japan and South Korea, but also Ireland and Poland, whose scores rose about the U.S. in the most recent test.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; line-height: 26.880001068115234px; margin-bottom: 1.5em; margin-top: 1.5em; width: 586.59375px; word-wrap: break-word;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;That’s too bad, because half of CareerCast’s top 10 jobs are in the so-called STEM fields: science, technology, engineering and mathematics. After “tenured university professor” at number two, the next two jobs are statistician and actuary (last year’s top job in CareerCast’s ranking), with median incomes of $75,560 and $93,680, respectively.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjsLcYdcbOZjn8OaEmz5v1IBdvd9vP1tbHE5OY3wl1MCyTsCZuG_8P0Ut9ZxW04HVqR92dp6c0_g7Y-82Sr9jPaZd4IBtCn7uuauEBT9K4xnmrwVJ_6jE2349MsC4rgMRjFORrkv1YG1Z-8/s72-c/smart-kids.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>How to Open Adf.ly Blocked Links in India </title><link>http://cyberfort.blogspot.com/2014/04/how-to-open-adfly-blocked-links-in-india.html</link><category>adfly</category><category>adsense</category><category>computer security</category><category>internet security</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 16 Apr 2014 08:45:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-3817576187542254450</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx61UkGfawDo77otkYiBKskNMf_78paDLN4SG199wovYJhHfEOkqoov6kXXapOr2JKyb62aaxaTmpabWag8KEl_Zg1yUdH9u_-coM-UexnJnH4yug_YCX_8uOhyHlnU7HowiiOP2fxgEZh/s1600/adflyaa.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx61UkGfawDo77otkYiBKskNMf_78paDLN4SG199wovYJhHfEOkqoov6kXXapOr2JKyb62aaxaTmpabWag8KEl_Zg1yUdH9u_-coM-UexnJnH4yug_YCX_8uOhyHlnU7HowiiOP2fxgEZh/s1600/adflyaa.png" height="253" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: Titillium, Arial, sans-serif; line-height: 28.799999237060547px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;You know what is Adf.ly. It is a URL Shortener service which pays for every visit your URL gets. It became so popular in only few days and everyone in the world started to use it to earn some decent bucks. But unfortunately it is blocked in India and some other countries. If you are living in india, you may be familiar with this problem because nowadays most of the outgoing download links are from adf.ly. Anyway it is not at all a problem now. I figured out something which allows you to open the links.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: Titillium, Arial, sans-serif; font-size: 18px; line-height: 28.799999237060547px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;If you want to go to adf.y, then you are blocked (let it be adf.ly/xxxx)&lt;br /&gt;Just ad&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;v2&lt;/span&gt;&amp;nbsp;in front of adf.ly (v2.adf.ly/xxxx)&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: Titillium, Arial, sans-serif; font-size: 18px; line-height: 28.799999237060547px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Now go to&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&amp;nbsp;v2.adf.ly&lt;/span&gt;&amp;nbsp;and continue your service.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #666666; font-family: Titillium, Arial, sans-serif; font-size: 18px; line-height: 28.799999237060547px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="border: 0px; color: red; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Update: If adding v2 is not working then try adding httpS:// instead of http://.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: Titillium, Arial, sans-serif; font-size: 18px; line-height: 28.799999237060547px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Your Old Link – http://adf.ly/xxxx&lt;br /&gt;Your New Link –&amp;nbsp;&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: 600; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;http&lt;span style="border: 0px; font-family: inherit; font-size: inherit; font-style: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;s&lt;/span&gt;&lt;/span&gt;://adf.ly/xxxx&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white; font-family: Titillium, Arial, sans-serif; font-size: 18px; line-height: 28.799999237060547px;"&gt;&lt;span style="color: #073763;"&gt;Note: When bypassing the links from above sites, Remove https:// and replace it with http://..&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #274e13;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;span style="color: #274e13;"&gt;&lt;b&gt;pls comment u get any queries . . . .&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgx61UkGfawDo77otkYiBKskNMf_78paDLN4SG199wovYJhHfEOkqoov6kXXapOr2JKyb62aaxaTmpabWag8KEl_Zg1yUdH9u_-coM-UexnJnH4yug_YCX_8uOhyHlnU7HowiiOP2fxgEZh/s72-c/adflyaa.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Google Prepares To Launch Android TV</title><link>http://cyberfort.blogspot.com/2014/04/google-prepares-to-launch-android-tv.html</link><category>all tech</category><category>all the business</category><category>Android</category><category>apps</category><category>design</category><category>device</category><category>software</category><category>Television</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 6 Apr 2014 16:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-2787378206012472047</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGjx8mHx9t2t9Dzg5wXMMLK7CMbQjdZet1thJxBVj7TrPCwPD6fcdzWRSLVFzwRthBTTgz_uHU8zpbjlptx3ZvyIMrY3Od-bW2EOOfsp2pqF_t0jNs0xmnp4wIfxijGjmOxeZjaS1-JMK/s1600/kogan-android-smart-3d-tv.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGjx8mHx9t2t9Dzg5wXMMLK7CMbQjdZet1thJxBVj7TrPCwPD6fcdzWRSLVFzwRthBTTgz_uHU8zpbjlptx3ZvyIMrY3Od-bW2EOOfsp2pqF_t0jNs0xmnp4wIfxijGjmOxeZjaS1-JMK/s1600/kogan-android-smart-3d-tv.jpg" height="426" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;a href="http://www.cyberfortblog.com/search/label/google" target="_blank"&gt;Google&lt;/a&gt; has plans for another smart TV product, according to&amp;nbsp;&lt;a href="http://www.theverge.com/2014/4/5/5584604/this-is-android-tv" style="box-sizing: border-box; outline: 0px; text-decoration: none;" target="_blank"&gt;a report in The Verge&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Apparently this set top box will be less ambitious and easier to use than one of the company’s previous initiatives,&amp;nbsp;Google TV. In the words of Google documents that The Verge said it has obtained, “&lt;a href="http://www.cyberfortblog.com/search/label/Android" target="_blank"&gt;Android TV&lt;/a&gt; is an entertainment interface, not a computing platform.”&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;The idea is to give users a simple interface for accessing entertainment content and lightweight apps. The most distinctive feature, it seems, is a recommendation system that will suggest content to users as soon as they turn the device on.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;There are no details about a launch date, but the documents suggest that Google is currently recruiting developers to build apps for Android TV. These plans shouldn’t affect&amp;nbsp;Google Chromecast, another of the company’s efforts to build a TV platform.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;The news comes just a few days after&amp;nbsp;Amazon launched its own device, the Fire TV.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: #f9f9f9; box-sizing: border-box; line-height: 26px; margin-bottom: 1em; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;I’ve emailed Google for comment and will update if I hear back....&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEivGjx8mHx9t2t9Dzg5wXMMLK7CMbQjdZet1thJxBVj7TrPCwPD6fcdzWRSLVFzwRthBTTgz_uHU8zpbjlptx3ZvyIMrY3Od-bW2EOOfsp2pqF_t0jNs0xmnp4wIfxijGjmOxeZjaS1-JMK/s72-c/kogan-android-smart-3d-tv.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>BARC to recruit 11 Scientific Assistant/B (Civil) 2014</title><link>http://cyberfort.blogspot.com/2014/04/barc-to-recruit-11-scientific.html</link><category>Govt. Jobs</category><category>internet security</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 3 Apr 2014 10:24:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-4926731450994765105</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEBbUO67n9xJPs82qtRU_PxZg9QB7KY5dBewl6vMgsznAtYGUG-d67sI5ZR0JZ2TccEZZXDN-XPpaB8GIujUfnWhxAltlcdavQ6q92uUWeNiBjH1ztROFZ257A4AnNmuOxuksW3-Rxk6Ua/s1600/recruitment3_350_040214043239.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEBbUO67n9xJPs82qtRU_PxZg9QB7KY5dBewl6vMgsznAtYGUG-d67sI5ZR0JZ2TccEZZXDN-XPpaB8GIujUfnWhxAltlcdavQ6q92uUWeNiBjH1ztROFZ257A4AnNmuOxuksW3-Rxk6Ua/s1600/recruitment3_350_040214043239.jpg" height="256" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Bhabha Atomic Research Centre, Visakhapatnam, Andhra Pradesh has invited applications for recruitment to the post of Scientific Assistant/B (Civil). Candidates eligible for the post have to apply online on or before April 15, 2014.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-size: 15px; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Details of post:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Name of the post: Scientific Assistant/B (Civil)&lt;br /&gt;Total number of posts: 11&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Eligibility:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Candidate should have Diploma or Licentiate in Civil Engineering with minimum 60% marks.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Age limit:&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Candidate's age should be between 18 years to 30 years. Age relaxation is applicable as per Govt. rules.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Pay Scale:&lt;/span&gt;&lt;span style="color: #585858; font-family: Arial; font-size: 15px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;29,365 per month&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Selection process: Selection will be on the basis of performance in Interview.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;How to apply:&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ol style="background-color: white; line-height: 21px;"&gt;
&lt;li&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Eligible candidates may apply Online only from the official website of BARC - www.barcrecruit.gov.in&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;No other means /mode of applications will be accepted.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;After final submission of online application form, candidates must print-out the generated application and retain safely for later use, during Interview.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Candidates should not send the application anywhere.&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;b style="background-color: white; line-height: 21px;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Important dates:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Opening date for online application form: March 22, 2014&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Closing date for online application form: April 15, 2014&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial; font-size: 15px; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;b&gt;&lt;span style="color: purple;"&gt;For further information, candidates can visit:&amp;nbsp;&lt;/span&gt;&lt;a href="https://www.blogger.com/goog_899172417" style="color: #585858;"&gt;&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;a href="http://www.barc.gov.in/" style="color: #585858;"&gt;http://www.barc.gov.in/&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: Arial; font-size: 15px; line-height: 21px; margin-bottom: 16px; margin-top: 2px; padding: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEBbUO67n9xJPs82qtRU_PxZg9QB7KY5dBewl6vMgsznAtYGUG-d67sI5ZR0JZ2TccEZZXDN-XPpaB8GIujUfnWhxAltlcdavQ6q92uUWeNiBjH1ztROFZ257A4AnNmuOxuksW3-Rxk6Ua/s72-c/recruitment3_350_040214043239.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Confirmed: April Is the Cruelest Month - Time Magazine</title><link>http://cyberfort.blogspot.com/2014/03/confirmed-april-is-cruelest-month-time.html</link><category>conservations</category><category>freebies stuff</category><category>health and fitness</category><category>memes</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sat, 29 Mar 2014 07:30:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-7000452092715672279</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"&gt;&lt;tbody&gt;
&lt;tr&gt;&lt;td style="text-align: center;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5MEKiCjdNwYsKvNsDFWaa_2j9X5N0SA5Aztruu2wyNq0UO5WlVdcg03Q10G021-09LZgSqjth4Xs93MkMBthx3G0ei_sWJ41CSRDMvmrfmZjKTTQr3hQFCZ-b5mzUzIDffNCrJrhjMRj-/s1600/150207200.jpg" imageanchor="1" style="background-color: white; font-size: 15px; letter-spacing: -0.46080002188682556px; line-height: 16.895999908447266px; margin-left: auto; margin-right: auto;"&gt;&lt;span style="color: #282828; font-family: franklin-gothic-urw, sans-serif;"&gt;&lt;b&gt;&lt;img alt="zoidoic" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5MEKiCjdNwYsKvNsDFWaa_2j9X5N0SA5Aztruu2wyNq0UO5WlVdcg03Q10G021-09LZgSqjth4Xs93MkMBthx3G0ei_sWJ41CSRDMvmrfmZjKTTQr3hQFCZ-b5mzUzIDffNCrJrhjMRj-/s1600/150207200.jpg" height="425" title="zoidoic" width="640" /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class="tr-caption" style="text-align: center;"&gt;&lt;h1 class="article-title" itemprop="headline" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; background-color: white; box-sizing: border-box; font-family: franklin-gothic-urw, sans-serif; font-size: 50px; letter-spacing: -0.03em; line-height: 1; margin: 0px 0px 0.3em; text-align: start;"&gt;
&lt;span style="color: #282828;"&gt;&lt;span style="background-color: white; font-size: 15px; letter-spacing: -0.46080002188682556px; line-height: 16.895999908447266px;"&gt;&lt;ul class="article-authors" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; display: inline; margin: 0px; padding: 0px;"&gt;
&lt;li class="article-author" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; border-right-color: rgb(227, 227, 227); border-right-style: solid; border-right-width: 1px; box-sizing: border-box; display: inline-block; margin-right: 0.5em; padding-right: 0.5em;"&gt;&lt;span class="byline" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; display: inline-block; vertical-align: top; zoom: 1;"&gt;&lt;a href="http://time.com/author/jessica-roy/" itemprop="author" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; outline: 0px; text-decoration: none;"&gt;Jessica Roy&lt;/a&gt;&lt;/span&gt;&amp;nbsp;&lt;a class="author-twitter" href="https://twitter.com/JessicaKRoy" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: rgba(24, 12, 12, 0.247059); box-sizing: border-box; display: inline-block; margin: 0px 0px 0px 0.41667em; text-decoration: none; vertical-align: top; zoom: 1;" target="_blank"&gt;@JessicaKRoy&lt;/a&gt;&lt;/li&gt;
&amp;nbsp;&lt;/ul&gt;
&lt;time class="publish-date" datetime="2014-03-28 14:24:53" itemprop="datePublished" pubdate="" style="-webkit-font-smoothing: antialiased; -webkit-tap-highlight-color: transparent; box-sizing: border-box; display: inline-block; margin: 0px 21.890625px 0px 0px; vertical-align: top; zoom: 1;"&gt;2:24 PM ET&lt;/time&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div class="MsoNormal" style="background-color: white; background-position: initial initial; background-repeat: initial initial; margin-bottom: 9.95pt;"&gt;
&lt;b&gt;&lt;span style="font-family: Arial, sans-serif; font-size: 14.5pt; letter-spacing: -0.35pt;"&gt;&lt;span style="color: #660000;"&gt;Anybody wanna hibernate until May?&lt;/span&gt;&lt;span style="color: #282828;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt;"&gt;
&lt;i&gt;&lt;span style="font-family: Georgia, serif; font-size: 14pt;"&gt;&lt;span style="color: #783f04;"&gt;&amp;nbsp;“APRIL is the cruellest month, breeding Lilacs
out of the dead land, mixing Memory and desire, stirring Dull roots with spring
rain.”&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style="color: #282828; font-family: &amp;quot;Georgia&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 18.0pt;"&gt;
&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #073763;"&gt;That’s a quote from a T.S. Eliot&amp;nbsp;&lt;a href="http://www.bartleby.com/201/1.html"&gt;poem&lt;/a&gt;,
but according to everybody’s favorite astrologer Susan Miller, April 2014 is
going to be&amp;nbsp;&lt;a href="http://nymag.com/thecut/2014/03/april-is-going-to-be-a-calamitous-disaster-month.html"&gt;an absolutely horrific month&lt;span style="text-decoration: none;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/a&gt;for
almost all of us. Of course, that’s only if you believe in astrology.&lt;/span&gt;&lt;span style="color: #282828;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt; margin-left: 0cm; margin-right: 0cm; margin-top: 18.0pt;"&gt;
&lt;i&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #783f04;"&gt;New York Magazine&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #783f04;"&gt;&amp;nbsp;points out that in an&lt;a href="http://www.ezivera.com/" target="_blank"&gt;&amp;nbsp;interview&lt;/a&gt;&amp;nbsp;given to the&lt;i&gt;Guardian&lt;/i&gt;&amp;nbsp;in
January, Miller noted that two “angry eclipses” destined for us in April will
cause some intense emotional upheaval, particularly for anyone born between
April 15 and 29. From&amp;nbsp;&lt;i&gt;NY Mag&lt;/i&gt;:&lt;/span&gt;&lt;span style="color: #282828;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #F8F8F8; line-height: 20.15pt;"&gt;
&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #073763;"&gt;Eclipses have a mission to expose truths, Miller writes, and thereby
sweep away elements that are no longer relevant in your life. You might&amp;nbsp;&lt;/span&gt;&lt;span style="color: #783f04;"&gt;&lt;i&gt;think&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="color: #073763;"&gt;they
are relevant or important, she notes, when they are&amp;nbsp;&lt;/span&gt;&lt;i style="color: #073763;"&gt;taken from you&lt;/i&gt;&lt;span style="color: #073763;"&gt;&amp;nbsp;on
April 15 or April 29, but they’re not.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt;"&gt;
&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #073763;"&gt;And it gets worse. From the&amp;nbsp;&lt;i&gt;Guardian&lt;/i&gt;&amp;nbsp;story:&lt;/span&gt;&lt;span style="color: #282828;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: #F8F8F8; line-height: 20.15pt;"&gt;
&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #660000;"&gt;“Look at 29 April!” I look.&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #282828; font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-ascii-theme-font: major-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-hansi-theme-font: major-latin;"&gt; &lt;/span&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #7f6000;"&gt;“Some people feel the stock market is…”&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #282828; font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-ascii-theme-font: major-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-hansi-theme-font: major-latin;"&gt; &lt;/span&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #073763;"&gt;She
pauses for such a long beat that I offer to complete her sentence: “…going to
crash?” She shakes her head. “This is even worse – we’ve not had this since the
American Revolution.”&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt;"&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;Miller also said that April looks so scary she’s&lt;/span&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #660000;"&gt;“giving classes on it.”&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #282828; font-family: &amp;quot;Cambria&amp;quot;,&amp;quot;serif&amp;quot;; font-size: 14.0pt; mso-ascii-theme-font: major-latin; mso-bidi-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-font-family: &amp;quot;Times New Roman&amp;quot;; mso-fareast-language: EN-IN; mso-hansi-theme-font: major-latin;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background: white; line-height: 20.15pt; margin-bottom: 18.0pt;"&gt;
&lt;span style="font-family: Cambria, serif; font-size: 14pt;"&gt;&lt;span style="color: #073763;"&gt;At least Mercury won’t be in retrograde?&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5MEKiCjdNwYsKvNsDFWaa_2j9X5N0SA5Aztruu2wyNq0UO5WlVdcg03Q10G021-09LZgSqjth4Xs93MkMBthx3G0ei_sWJ41CSRDMvmrfmZjKTTQr3hQFCZ-b5mzUzIDffNCrJrhjMRj-/s72-c/150207200.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Google Public DNS Server Traffic Hijacked</title><link>http://cyberfort.blogspot.com/2014/03/google-public-dns-server-traffic.html</link><category>computer security</category><category>e hacking</category><category>e news</category><category>google</category><category>hijacked</category><category>internet security</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 17 Mar 2014 17:44:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-2670905415813984286</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI3tBp6_v8R4LZdkLFDBtgpl1MjGwlmDf3NRokbxgjURlJE3Za8hkGxzqd5z0fJwFgoBBJQHjzqQwQ30NFIPlOdPqgtHeV25DDOMvYOcOEpuOVEdyvF3KXnYO3CXuEDv_bsEjLluRm_YzZ/s1600/Google-Public-DNS-Servers-Traffic-Hijacked.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI3tBp6_v8R4LZdkLFDBtgpl1MjGwlmDf3NRokbxgjURlJE3Za8hkGxzqd5z0fJwFgoBBJQHjzqQwQ30NFIPlOdPqgtHeV25DDOMvYOcOEpuOVEdyvF3KXnYO3CXuEDv_bsEjLluRm_YzZ/s1600/Google-Public-DNS-Servers-Traffic-Hijacked.png" height="439" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The latest bad news is that the World's largest and most widely used Google's free public&amp;nbsp;&lt;/span&gt;DNS&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;&amp;nbsp;(Domain name system)&amp;nbsp;resolvers&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px;"&gt;raised&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px;"&gt;security red flags yesterday.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;DNS is the master address list for the Internet, which translates IP addresses into human readable form and vice versa. According to Internet monitoring firm&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;&amp;nbsp;&lt;/span&gt;&lt;i style="font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;&lt;a href="https://twitter.com/bgpmon/statuses/445266642616868864" rel="nofollow" style="margin: 0px; outline: none; padding: 0px;" target="_blank"&gt;BGPmon&lt;/a&gt;&lt;/i&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;, Google's DNS server&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span class="GINGER_SOFTWARE_mark" ginger_software_uiphraseguid="7c2ee3ac-8aca-4b03-a771-01860aa22f97" id="726888a1-7c46-4982-adfc-00476cefbb84" style="font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;8.8.8.8&lt;/span&gt;&lt;span style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; text-align: justify;"&gt;/32 was hijacked yesterday for 22 minutes.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;br style="content: ' '; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEita-JynI-2htams8MlFDAsRAAUDxLa99ECr8CdfbwXrrTaJgin4qS7A1d2675NibaLwT6Xg1Hqq_9QTebDULsCQMkyZxhmVesNSwhK4Bk_KtRNrBVQeeO7GxkrJSWVbvNuUSAoiOh6yIPW/s1600/bgpmon.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEita-JynI-2htams8MlFDAsRAAUDxLa99ECr8CdfbwXrrTaJgin4qS7A1d2675NibaLwT6Xg1Hqq_9QTebDULsCQMkyZxhmVesNSwhK4Bk_KtRNrBVQeeO7GxkrJSWVbvNuUSAoiOh6yIPW/s1600/bgpmon.png" height="524" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 30px; margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;The Google's DNS server handles around 150 billion queries a day and during the 22 minutes of hijacking, millions of Internet users, including&amp;nbsp;Financial institutions, Governments were redirected to BT’s (British multinational telecommunications services company) Latin America division in Venezuela and Brazil.&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;Hackers exploited a well-known&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;vulnerability in the so-called&amp;nbsp;&lt;b style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;i style="margin: 0px; outline: 0px; padding: 0px;"&gt;Border Gateway Protocol (&lt;/i&gt;BGP)&lt;/b&gt;, which is&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;used to exchange data between large service providers, and hijacking&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;&lt;span style="color: #073763;"&gt;could allow&amp;nbsp;the attackers to simply re-route the traffic to a router they controlled.&amp;nbsp;&lt;/span&gt;&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgp9lV_rA2JlCgjb3VyWc0z7yLTN-CMmHkGlbCoz-ToufqMgK6S3gBaI1Zr_ZshewHT2TpOE2s4cjbX6hkNioq73BFcKEWSoYC4qtorAPQgP_ThSnwT2Mm75tqZ19J-xRWy1DZQhdRRR4/s1600/bgp+mon111.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgp9lV_rA2JlCgjb3VyWc0z7yLTN-CMmHkGlbCoz-ToufqMgK6S3gBaI1Zr_ZshewHT2TpOE2s4cjbX6hkNioq73BFcKEWSoYC4qtorAPQgP_ThSnwT2Mm75tqZ19J-xRWy1DZQhdRRR4/s1600/bgp+mon111.png" height="196" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;BGP attack is the&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;man-in-the-middle attack&amp;nbsp;at large scale and&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;harder to detect,&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;as the traffic still reaches its legitimate destination&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;&amp;nbsp;and which was first&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;&lt;a href="http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf" rel="nofollow" style="margin: 0px; outline: none; padding: 0px;" target="_blank"&gt;demonstrated&lt;/a&gt;&amp;nbsp;in 2008 by two security researchers -&amp;nbsp;&lt;/span&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;&lt;i style="margin: 0px; outline: 0px; padding: 0px;"&gt;Tony Kapela and Alex Pilosov&lt;/i&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;br style="content: ' '; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmgp9lV_rA2JlCgjb3VyWc0z7yLTN-CMmHkGlbCoz-ToufqMgK6S3gBaI1Zr_ZshewHT2TpOE2s4cjbX6hkNioq73BFcKEWSoYC4qtorAPQgP_ThSnwT2Mm75tqZ19J-xRWy1DZQhdRRR4/s1600/bgp+mon111.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;&lt;b&gt;&lt;i&gt;It's not the first time when Google Public DNS service has been hijacked. In 2010, DNS server traffic was hijacked and redirected to Romania and Austria.&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px; text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiI3tBp6_v8R4LZdkLFDBtgpl1MjGwlmDf3NRokbxgjURlJE3Za8hkGxzqd5z0fJwFgoBBJQHjzqQwQ30NFIPlOdPqgtHeV25DDOMvYOcOEpuOVEdyvF3KXnYO3CXuEDv_bsEjLluRm_YzZ/s72-c/Google-Public-DNS-Servers-Traffic-Hijacked.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><enclosure length="369082" type="application/pdf" url="http://www.defcon.org/images/defcon-16/dc16-presentations/defcon-16-pilosov-kapela.pdf"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The latest bad news is that the World's largest and most widely used Google's free public&amp;nbsp;DNS&amp;nbsp;(Domain name system)&amp;nbsp;resolvers&amp;nbsp;raised&amp;nbsp;security red flags yesterday. DNS is the master address list for the Internet, which translates IP addresses into human readable form and vice versa. According to Internet monitoring firm&amp;nbsp;BGPmon, Google's DNS server&amp;nbsp;8.8.8.8/32 was hijacked yesterday for 22 minutes. The Google's DNS server handles around 150 billion queries a day and during the 22 minutes of hijacking, millions of Internet users, including&amp;nbsp;Financial institutions, Governments were redirected to BT’s (British multinational telecommunications services company) Latin America division in Venezuela and Brazil.Hackers exploited a well-known&amp;nbsp;vulnerability in the so-called&amp;nbsp;Border Gateway Protocol (BGP), which is&amp;nbsp;used to exchange data between large service providers, and hijacking&amp;nbsp;could allow&amp;nbsp;the attackers to simply re-route the traffic to a router they controlled.&amp;nbsp; BGP attack is the&amp;nbsp;man-in-the-middle attack&amp;nbsp;at large scale and&amp;nbsp;harder to detect,&amp;nbsp;as the traffic still reaches its legitimate destination&amp;nbsp;and which was first&amp;nbsp;demonstrated&amp;nbsp;in 2008 by two security researchers -&amp;nbsp;Tony Kapela and Alex Pilosov. It's not the first time when Google Public DNS service has been hijacked. In 2010, DNS server traffic was hijacked and redirected to Romania and Austria.</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>The Internet is becoming a dangerous place day-by-day and especially for those innocent web users who rely on 3rd party services. The latest bad news is that the World's largest and most widely used Google's free public&amp;nbsp;DNS&amp;nbsp;(Domain name system)&amp;nbsp;resolvers&amp;nbsp;raised&amp;nbsp;security red flags yesterday. DNS is the master address list for the Internet, which translates IP addresses into human readable form and vice versa. According to Internet monitoring firm&amp;nbsp;BGPmon, Google's DNS server&amp;nbsp;8.8.8.8/32 was hijacked yesterday for 22 minutes. The Google's DNS server handles around 150 billion queries a day and during the 22 minutes of hijacking, millions of Internet users, including&amp;nbsp;Financial institutions, Governments were redirected to BT’s (British multinational telecommunications services company) Latin America division in Venezuela and Brazil.Hackers exploited a well-known&amp;nbsp;vulnerability in the so-called&amp;nbsp;Border Gateway Protocol (BGP), which is&amp;nbsp;used to exchange data between large service providers, and hijacking&amp;nbsp;could allow&amp;nbsp;the attackers to simply re-route the traffic to a router they controlled.&amp;nbsp; BGP attack is the&amp;nbsp;man-in-the-middle attack&amp;nbsp;at large scale and&amp;nbsp;harder to detect,&amp;nbsp;as the traffic still reaches its legitimate destination&amp;nbsp;and which was first&amp;nbsp;demonstrated&amp;nbsp;in 2008 by two security researchers -&amp;nbsp;Tony Kapela and Alex Pilosov. It's not the first time when Google Public DNS service has been hijacked. In 2010, DNS server traffic was hijacked and redirected to Romania and Austria.</itunes:summary><itunes:keywords>computer security, e hacking, e news, google, hijacked, internet security</itunes:keywords></item><item><title>Nokia X launched in India for Rs 8,599: Nokia’s first Android phone</title><link>http://cyberfort.blogspot.com/2014/03/nokia-x-launched-in-india-for-rs-8599.html</link><category>Android</category><category>apps and software</category><category>computer security</category><category>device and design</category><category>mobile</category><category>os</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 11 Mar 2014 18:19:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-8289369821289341561</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img alt="nokia android phone " border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpIIipmZ3Lx7BnPJmIjraSaboonm_vqeG6wCA5e3YBxs2B5Pn0rZfJv-avaMkD97p96XUJH_bTO5PV529FMm5qpVr5KgBMG9k5xWW4AEIDp_NAQXtWZGYW8zgDgr5sFFCA_zaTBFfJHf9R/s1600/nokia600.jpg" height="400" title="nokia android phone " width="640" /&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'Open Sans', sans-serif; line-height: 36px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;Nokia has launched its first Android device for India at an event in Mumbai. The&amp;nbsp;&lt;a href="http://tech.firstpost.com/news-analysis/nokia-x-nokia-x-4-inch-android-phones-announced-coming-soon-to-india-218825.html" style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Nokia X&lt;/strong&gt;&lt;/a&gt;&amp;nbsp;will be available from today for Rs 8,599. That price is slightly higher than the Rs 8,500 tag it was expected to sport, and could be the major factor in the final equation, Nokia is positioning the X series below its Lumia line, but above the Asha range, so it is expected to bridge the gap between the two price points. It must be noted that the price announced is the MOP (Market Operative Price) of the phone, so the box price (or MRP) is higher.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'Open Sans', sans-serif; line-height: 36px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;While the Nokia X has been launched, the company didn’t launch the X+ or the XL in India. Both are expected to launch in the next couple of months. The Nokia X run Android, but the login and app data is tied to Microsoft’s cloud services, and not Google as in any other Android phone. The phones run a version of Android Open Source Project, with access to sideloading of apps, third-party app stores and Nokia’s own store. You will find Microsoft essentials instead of Google services. Indian buyers will not get free Skype calls to mobiles and landlines when they purchase the Nokia X, due to regulatory hurdles.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'Open Sans', sans-serif; line-height: 36px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;The Nokia X features a 4-inch display with a 800×480 pixel resolution. It sports a low-powered Snapdragon S4 SoC with dual-core processor, which given the other specs should be enough for most use cases. The dual-core processor is clocked at 1GHz. There’s 512MB of RAM on the Nokia X, and it has 4GB internal storage and the ability to take in microSD cards up to 32GB in capacity.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'Open Sans', sans-serif; line-height: 36px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;The Finnish company has decided to go with a 3-megapixel primary shooter, and there’s no front-facing camera. That’s a bit of a disappointment for the selfie-obssessed and Skype users, though you can still use Skype on the phone. The Nokia X gets a 1500 mAh battery, rated for around 13 hours of talk time on 2G and 17 days standby time. In terms of connectivity, the X and X+ have dual SIM slots, 3G cellular data, Wi-Fi b/g/n and Bluetooth 3.0.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'Open Sans', sans-serif; line-height: 36px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;&lt;b&gt;&lt;i&gt;view more at :- &amp;nbsp;&lt;a href="http://www.ezivera.com/" target="_blank"&gt;ezivera&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpIIipmZ3Lx7BnPJmIjraSaboonm_vqeG6wCA5e3YBxs2B5Pn0rZfJv-avaMkD97p96XUJH_bTO5PV529FMm5qpVr5KgBMG9k5xWW4AEIDp_NAQXtWZGYW8zgDgr5sFFCA_zaTBFfJHf9R/s72-c/nokia600.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>$25 Smartphone by FireFox OS</title><link>http://cyberfort.blogspot.com/2014/03/25-smartphone-by-firefox-os.html</link><category>apps and software</category><category>gadgets</category><category>internet stuff</category><category>mobile</category><category>os</category><author>noreply@blogger.com (Unknown)</author><pubDate>Mon, 10 Mar 2014 20:40:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-554234698566109128</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnyZkS7Gl_Thm9O60UgYvLkqucAB0jBGk4x19mqFU9v8LtS-TZu4r8WymHeIykgF0sonCWLzsha395oZtuVTj4mRIP_mX3_1rp9icSqm1ai4idIoivS2nCa8A89KgEH1cZc3of5tUrv23/s1600/Capture111.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnyZkS7Gl_Thm9O60UgYvLkqucAB0jBGk4x19mqFU9v8LtS-TZu4r8WymHeIykgF0sonCWLzsha395oZtuVTj4mRIP_mX3_1rp9icSqm1ai4idIoivS2nCa8A89KgEH1cZc3of5tUrv23/s1600/Capture111.PNG" height="400" width="363" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Mozilla is aiming squarely at the dominance of
Google Android in the smartphone field by introducing the cheap smartphone with
the FireFox OS on it. Mozilla unveiled the phone at a press event at the Mobile
World Congress in Barcelona.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Mozilla partnered with chipmaker Spreadtrum to
develop the smartphone that has a $25 suggested retail price. Even if it comes
with a low price tag, the device still has some respectable specs. TechRadar
got shipping unit of the device and reported that it has a single-core ARM
Cortex-A5 chip clocked at 1 GHz backed by 256 MB of RAM. It also has a 2GB
flash memory and a 3.5 inch display, along with a 2 megapixel camera.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The $25 smartphone from Mozilla is the ideal
first smartphone for people who have not been able to afford other smartphone
models according to Jay Sullivan, the chief operating officer of Mozilla.
Sullivan was quoted by Bloomberg as saying,“we are about bringing people
online.” &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;A cheap smartphone will be perfect for developing
markets where internet penetration rates are not high yet. Smartphones can help
people in these markets leapfrog the progression to getting access to the
Internet and avoid purchasing personal computers or laptops just to connect to
the Internet. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The cheap smartphone also appears to be Mozilla’s
first push to stake its claim in the smartphone OS market which is dominated by
Google’s Android OS. Q2 2013 data from IDC shows that Android had a smartphone
market share of 79.3% while iOS had market share of 13.2%. Mozilla will most
likely aim at breaking Linux’s market share, at least for the initial phase.
Mozilla only needs to capture more than 0.8% which is Linux’s share in the
smartphone OS market.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: .0001pt; margin-bottom: 0in; margin-left: 0in; margin-right: 0in; margin-top: 2.0pt; mso-pagination: widow-orphan lines-together; page-break-after: avoid;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Smartphones
Reduce the Digital Divide&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="line-height: 107%;"&gt;&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;One of the projections from&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="color: #660000;"&gt;&lt;a href="http://www.moneymax.ph/blog/ericsson-consumerlab-identifies-10-consumer-trends-2014-part-1/"&gt;&lt;b&gt;&lt;i&gt;Ericsson’s ConsumerLab’s 10 Hot
Consumer Trends 2014&lt;/i&gt;&lt;/b&gt;&lt;/a&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="color: #073763;"&gt;is that
smartphones will reduce the digital divide. The study found that people in
Indonesia and India already primarily use smartphones for instant messaging and
online banking. That is a big contrast to the U.S. and the U.K. where people
are more likely to use their laptop for online banking. People also believe
that mobile phones are the most important tool for carrying out daily
activities. Ericsson’s study shows that 51% of people think about mobile phones
this way.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Aside from offering cheap phones, there is also a
need to address the other side of the equation and that means the
infrastructure for connecting smartphones to the Internet. Telecommunication
firms are doing their best to offer the&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #660000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&amp;lt;a
href="http://www.moneyhero.com.hk/en/broadband"&amp;gt;best broadband plans&amp;lt;/a&amp;gt;&amp;nbsp;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;to
mobile consumers but there is more work that needs to be done. Facebook, for
example, has the Internet.org project where they try to connect more people to
the Internet and they are doing this by trying to bring down the cost to access
the Internet. The Internet.org is aiming to connect 5 billion more people to
the Internet.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Mozilla is not alone in trying to offer
lower-priced smartphones to the market. Nokia, for example, has also introduced
a new line of phones that run on the Google Android system that costs around
$120. BlackBerry also unveiled the Z3 and the Canadian smartphone maker will
sell the phone in Indonesia before selling it to other Southeast Asian
countries.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 107%; margin-bottom: 8.0pt;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;There are also smaller handset makers that are
making cheaper smartphones. ZTE from China is not as well-known as Nokia or
Blackberry but they have been making cheap smartphones. In the Philippines,
there is also Cherry Mobile that sells affordable smartphones. The race to
offer cheaper smartphones is a good development for breaking down the digital
divide in the world. These devices can help bring all of the benefits of having
information at the tip of your hands to the rest of the world’s population that
still do not have access to the Internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlnyZkS7Gl_Thm9O60UgYvLkqucAB0jBGk4x19mqFU9v8LtS-TZu4r8WymHeIykgF0sonCWLzsha395oZtuVTj4mRIP_mX3_1rp9icSqm1ai4idIoivS2nCa8A89KgEH1cZc3of5tUrv23/s72-c/Capture111.PNG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">15</thr:total></item><item><title>Change Your IP in Less Then 1 Minute</title><link>http://cyberfort.blogspot.com/2014/03/change-your-ip-in-less-then-1-minute.html</link><category>computer security</category><category>cyber crimes</category><category>e hacking</category><category>internet security</category><category>network</category><category>proxy</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 4 Mar 2014 09:00:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-7098154265730565898</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEtmRQ415DztYbvLXXItN9R189z2NA8g7gT_T2ghTLCDEujie9M5x6SFEGP_oASliOw7SVKi9e0werCYKwbbbcYWK9ItrBNisjffQ0urNgmZx0eejWxJUsghrCAjaT05iqR_4w0n_TE5d6/s1600/IP.png" height="450" width="640" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;1. Click on “Start” in the bottom left hand corner of screen&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;2. Click on “Run”&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;3. Type in “command” and hit OK&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif;"&gt;&amp;nbsp;&lt;span style="border: 0px; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;You should now be at an MSDOS prompt screen.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;4. Type “ipconfig /release” just like that, and hit “enter”&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;5. Type “exit” and leave the prompt&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;6. Right-click on “Network Places” or “My Network Places” on your desktop.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;7. Click on “properties”&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif;"&gt;You should now be on a screen with something titled “Local Area Connection”, or something close to that, and, if you have a network hooked up, all of your other networks.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;8. Right click on “Local Area Connection” and click “properties”&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;9. Double-click on the “Internet Protocol (TCP/IP)” from the list under the “General” tab.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;10. Click on “Use the following IP address” under the “General” tab.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;11. Create an IP address (It doesn’t matter what it is. I just type 1 and 2 until i fill the area up).&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;12. Press “Tab” and it should automatically fill in the “Subnet Mask” section with default numbers.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;13. Hit the “Ok” button here.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="color: #073763;"&gt;14. Hit the “Ok” button again.&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #2b2b2b;"&gt;&lt;span style="font-style: inherit;"&gt;&lt;strong style="border: 0px; font-style: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="border: 0px; font-weight: inherit; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif;"&gt;You should now be back to the “Local Area Connection” screen.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;15. Right-click back on “Local Area Connection” and go to properties again.&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="background-color: white; color: #073763; line-height: 24px;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;16. Go back to the “TCP/IP” settings.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;17. This time, select “Obtain an IP address automatically”&amp;nbsp;tongue.gif&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;18. Hit “Ok”&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;19. Hit “Ok” again&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;20. You now have a new IP address&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; display: inline !important; font-style: inherit; margin-bottom: 24px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
&lt;span style="color: #660000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;b&gt;&lt;em style="border: 0px; font-style: normal; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;With a little practice, you can easily get this process down to 15 seconds.&lt;/em&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="border: 0px; line-height: 24px; margin-bottom: 24px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;b&gt;NOTE:-&lt;/b&gt;&amp;nbsp;&lt;span style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;This only changes your dynamic IP address, not your ISP/IP address. If you plan on hacking a website with this trick be extremely careful, because if they try a little, they can trace it back.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="border: 0px; color: #073763; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;more info-&lt;b&gt;&amp;nbsp;&lt;a href="http://www.ezivera.com/" target="_blank"&gt;Ezivera&lt;/a&gt;&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEtmRQ415DztYbvLXXItN9R189z2NA8g7gT_T2ghTLCDEujie9M5x6SFEGP_oASliOw7SVKi9e0werCYKwbbbcYWK9ItrBNisjffQ0urNgmZx0eejWxJUsghrCAjaT05iqR_4w0n_TE5d6/s72-c/IP.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>“Outernet”a project to provide free wi-fi to entire world from space</title><link>http://cyberfort.blogspot.com/2014/02/outerneta-project-to-provide-free-wi-fi.html</link><category>all tech</category><category>internet marketing</category><category>internet security</category><category>network</category><category>technology</category><category>wireless</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 27 Feb 2014 22:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-4126726877206936608</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKIVuBq1xbJb_qgSioLRvBNBMMTrjzrJJlCYu9yxm52V1ZFu9d2OeZLj62yU1uDrl2mjR8Z2zTYzmXjTSCAaB4a_casi1tKzgjtXtTD7imiHXJnFS3oi6uMTiw0rwRMbdAsDgO6wz7bPOg/s1600/1924903_591818574233748_717873428_n.jpg" /&gt;&lt;/div&gt;
&lt;b style="font-family: roboto; font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;&lt;/b&gt;
&lt;div class="" style="clear: both; text-align: center;"&gt;
&lt;b style="line-height: 18px; text-align: left;"&gt;&lt;span style="color: #990000; font-family: Times, Times New Roman, serif; font-size: large;"&gt;Washington:&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style="font-family: 'Trebuchet MS', sans-serif; line-height: 18px; text-align: left;"&gt;&lt;span style="color: #073763;"&gt;&amp;nbsp;A US company is planning to build an 'Outernet - a global network of cube satellites broadcasting Internet data to all the people on the planet - for free.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="" style="clear: both; text-align: center;"&gt;
&lt;span style="line-height: 18px; text-align: left;"&gt;&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="line-height: 18px;"&gt;The idea is to offer free Internet access to all people, regardless of location, bypassing filtering or other means of censorship, according to the New York based non-profit organisation, Media Development Investment Fund (MDIF).&lt;/span&gt;&lt;br style="line-height: 18px;" /&gt;&lt;br style="line-height: 18px;" /&gt;&lt;span style="line-height: 18px;"&gt;MDIF proposes that hundreds of cube satellites be built and launched to create a constellation of sorts in the sky, allowing anyone with a phone or computer to access Internet data sent to the satellites by several hundred ground stations.&lt;/span&gt;&lt;br style="line-height: 18px;" /&gt;&lt;span style="line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="line-height: 18px;"&gt;The organisation claims that 40 per cent of the people in the world today are still not able to connect to the Internet - and it's not just because of restrictive governments such as North Korea - it's also due to the high cost of bringing service to remote areas, 'phys.org' reported.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: roboto; font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgiALvhsnMCm9nOBU-Awa7F0yX8vmo2N2VM1tvAxNDOfHtu8mkk0x2ihIyeMz7qko_efyakAMU5ETPyAPUmknonFVYFTP2Zv_4haeLEyXUZ3M46hEFGo8APwz9MltLd5Zc9ima-uNo_Rfw6/s1600/Outernet.jpg" /&gt;&lt;/div&gt;
&lt;span style="font-family: roboto; font-size: 14px; line-height: 18px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="line-height: 18px;"&gt;&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;An Outernet would allow people from Siberia to parts of the western US to remote islands or villages in Africa to receive the same news as those in New York or Tokyo.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br style="line-height: 18px;" /&gt;&lt;span style="line-height: 18px;"&gt;The Outernet would be one-way - data would flow from feeders to the satellites which would broadcast to all below.&lt;/span&gt;&lt;br style="line-height: 18px;" /&gt;&lt;br style="line-height: 18px;" /&gt;&lt;span style="line-height: 18px;"&gt;MDIF plans to add the ability to transmit from anywhere as well as soon as funds become available.&lt;/span&gt;&lt;br style="line-height: 18px;" /&gt;&lt;br style="line-height: 18px;" /&gt;&lt;span style="line-height: 18px;"&gt;MDIF has acknowledged that building such a network would not be cheap. Such satellites typically run $100,000 to $300,000 to build and launch.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: #660000; font-family: Times, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;How Does It Works ?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;&lt;div&gt;
&lt;div align="center" class="MsoNormal" style="text-align: center;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="text-align: center;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Outernet consists of
a constellation of hundreds of low-cost, miniature satellites in Low Earth
Orbit. Each satellite receives data streams from a network of ground stations
and transmits that data in a continuous loop until new content is received. In
order to serve the widest possible audience, the entire constellation utilizes
globally-accepted, standards-based protocols, such as DVB, Digital Radio
Mondiale, and UDP-based WiFi multicasting.&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEibQN5f6rgGM7Lu6ExBgLZhB5kMopjRNeFp_Wx_4qKSw0x69whOV2WYDw_IyTrytBhcmQT8PpEV8hd-IvyVwP_IJcp7LqnisLTMNwCJNrVtqskYOGlHXCQPMrPHFuzEiv1WuLwngK7uIZvm/s1600/sattelite.png" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="background-color: white; text-align: start;"&gt;&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;According to MDIF, Hundreds of cube satellites to be built and launched to create a&amp;nbsp;constellation of sorts in the sky, which allow anyone to connect with the Internet through Mobile or Computer. Still today 40% &amp;nbsp;of the people in the world are there who are not able to connect to the Internet, due to several reasons includes restrictive government rules, high cost of bringing service to remote areas. An Outernet would allow people from Siberia to parts of the western US to remote islands or villages in Africa to receive the same news as those in New York or Tokyo. The Outernet would be one-way – data would flow from feeders to the satellites which would broadcast to all below. MDIF also waiting for the funds, after that it will be able to transmit from anywhere. According to MDIF, such type of networks cost $100,000 to $300,000 to build and launch, well it’s not a cheap amount. Currently the organization plans to have prototype satellites ready in June with initial deployment happening mid-2015.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" class="MsoNormal" style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKIVuBq1xbJb_qgSioLRvBNBMMTrjzrJJlCYu9yxm52V1ZFu9d2OeZLj62yU1uDrl2mjR8Z2zTYzmXjTSCAaB4a_casi1tKzgjtXtTD7imiHXJnFS3oi6uMTiw0rwRMbdAsDgO6wz7bPOg/s72-c/1924903_591818574233748_717873428_n.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Which Browser Is Better for Privacy And for Security Purpose</title><link>http://cyberfort.blogspot.com/2014/02/which-browser-is-better-for-privacy-and.html</link><category>apps and software</category><category>computer security</category><category>google</category><category>internet security</category><category>network</category><category>os</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 20 Feb 2014 09:07:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-8765106412251112763</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaknEUllnkfbvvfZBd402W1CIk7AzFrg5ybQywsqrq65C0Xrqn8LsH68EOi93BFNRdcxIWwb4mfY8UZFMLBjl5yt18T-TXyCBvcFYnP07Q-Ey8xHIU_FKxc3lRh107s7sA_WseiNmFs6er/s1600/ku-xlarge.jpg" /&gt;&lt;/div&gt;
&lt;div class="first-text" data-textannotation-id="1041897ddf94a9f195dd884beec19323" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;"&gt;
&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;Dear Lifehacker,&amp;nbsp;&lt;br style="box-sizing: border-box;" /&gt;With Firefox&amp;nbsp;getting ads&amp;nbsp;and Chrome extensions&amp;nbsp;spying on me, is there really one browser that's better than the others when it comes to privacy? Does it matter if I use something like Opera or Safari instead? Is my browser watching what I'm doing and reporting back?&amp;nbsp;&lt;span class="text-annotation-footnote-wrapper" style="box-sizing: border-box; display: inline-block;"&gt;&lt;span class="annotateButton js_text-annotate text-annotation-button icon notranslate" style="-webkit-transition: all 0.1s linear; -webkit-user-select: none; box-sizing: border-box; cursor: pointer; display: inline-block; height: 16px; left: auto; line-height: 16px; margin-left: 7px; margin-top: 1px; opacity: 0; position: relative; text-align: center; top: 4px; vertical-align: top; width: 16px;"&gt;P&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id="cde282d6ee1d705ba194131264068622" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;"&gt;
&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;span style="line-height: 1.6;"&gt;That's a great question, and the answer isn't as clear cut as you might think. Different browsers handle user data in different ways, and when you toss add-ons and extensions into the mix, the picture changes even more. Let's take a look at some of the most popular browsers from a privacy angle, and see who has your back when it comes to tracking—or not tracking—what you do online.&lt;/span&gt;&lt;span style="line-height: 1.6;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div data-textannotation-id="cde282d6ee1d705ba194131264068622" style="background-color: whitesmoke; box-sizing: border-box; color: #222222; direction: ltr; font-family: Georgia, serif; font-size: 15px; line-height: 1.6; margin-bottom: 19px; max-width: 100%; padding: 0px 18px; word-break: break-word;"&gt;
&lt;/div&gt;
&lt;h3 data-textannotation-id="97312728c3ee5e6358a50c879d5b04e8" style="box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;"&gt;
&lt;span style="color: #990000;"&gt;Chrome, and Google's Position on Browser Privacy&lt;/span&gt;&lt;/h3&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBZ-dH9snSb4fEEkxd1I4DCMLy58btocGB6YPbJpTfdVqfzTpaJI4YD1bPOlKttkMNJudCorFtlnvWyPoM9oqGoC3j9M9MFV7-O_ZrbacSDVc7JQkLQHpxQq6E4BYSG2pc4NZ013DZ2Him/s1600/ku-xlarge+(1).jpg" height="299" width="640" /&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;Google Chrome, being the&amp;nbsp;&lt;/span&gt;&lt;a href="http://en.wikipedia.org/wiki/Usage_share_of_web_browsers" sl-processed="1" style="background-color: whitesmoke; box-sizing: border-box; line-height: 24px; text-decoration: initial;" target="_blank"&gt;dominant web browser in most of the world&lt;/a&gt;&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;, has taken a few hits lately in the privacy department. Between&amp;nbsp;&lt;/span&gt;adware-filled extensions&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;microphone-listening exploits&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;, It might look like Chrome has privacy problems. However, both of those issues are third parties using a combination of built-in features and user trust to spy on them—it has nothing to do with the browser itself. We'll get to how third parties play into things a little bit later, but first, let’s talk about Chrome on its own.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjmjF0h83PKBkfvQK7yzFRagvr5bY8UscnlalB8lYI3DDytyHC8_pJfVwMHiPuT5xpc1o1fLsNs056ZM5l0vPHJYINNQJOrFt5nnghEKJfEtLiVw-MZXoxqhG3UEBun0IMusOKia0bsWd9x/s1600/GOOGLE.jpg" height="225" width="400" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;h3 data-textannotation-id="04eb10f2ac00287dc493c3b3b495ec20" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-align: start; text-rendering: optimizelegibility;"&gt;
&lt;span style="color: #990000;"&gt;Firefox, and the Mozilla Foundation&lt;/span&gt;&lt;/h3&gt;
&lt;h3 data-textannotation-id="04eb10f2ac00287dc493c3b3b495ec20" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-align: start; text-rendering: optimizelegibility;"&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-EZDAuHVjIXYN-X_EWI1jw_F5EsbmY-JbUc1gtNXh1H8Pf1bosonfrvAle44e7u210gsqG4qmqdZI6m27tL5cY8kbv6_yyrmnwMX97H849-fofeAFp6gpK4tcooJijuU6LXI9WfwO_73L/s1600/FIREFOX.jpg" height="299" width="640" /&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="background-color: whitesmoke; font-family: Georgia, serif; font-size: 15px; line-height: 24px;"&gt;Firefox has long been touted as the best browser for privacy. It's open source, managed by the non-profit&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.mozilla.org/en-US/foundation/" sl-processed="1" style="background-color: whitesmoke; box-sizing: border-box; font-family: Georgia, serif; font-size: 15px; line-height: 24px; text-decoration: initial;" target="_blank"&gt;Mozilla Foundation&lt;/a&gt;&lt;span style="background-color: whitesmoke; font-family: Georgia, serif; font-size: 15px; line-height: 24px;"&gt;&amp;nbsp;(of which, it should be noted,&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.forbes.com/sites/timworstall/2013/01/22/so-why-is-google-funding-its-own-competition-in-the-firefox-os/" sl-processed="1" style="background-color: whitesmoke; box-sizing: border-box; font-family: Georgia, serif; font-size: 15px; line-height: 24px; text-decoration: initial;" target="_blank"&gt;Google is an investor&lt;/a&gt;&lt;span style="background-color: whitesmoke; font-family: Georgia, serif; font-size: 15px; line-height: 24px;"&gt;), and is at the core of most privacy-focused browsers (like the previously mentioned Tor Browser Bundle). Even on the mobile side, Firefox for Android is open source and its code available to anyone who wants it. By most accounts, Mozilla is completely above board with what Firefox does, and the Foundation doesn't trade in user data, so there's no reason for them to harvest it.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h3 data-textannotation-id="f90f016bed2ecaa6b8e18d57e66fbf44" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;"&gt;
&lt;span style="color: #990000;"&gt;What About Opera, Safari, and Internet Explorer?&lt;/span&gt;&lt;/h3&gt;
&lt;h3 data-textannotation-id="f90f016bed2ecaa6b8e18d57e66fbf44" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;"&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhMkeFnfJVbb6P9v16brrFITy5LevRDCsr5zjKft2U-SPXvYC5YBhw4neZ1e1sFq6zKZyVkozd6n_y6TBQKCzITxjHf0SZ1FUUzxfSOS7Y7yIcgPNSoW1PpY67M8qSSv4x24UdUpQs98Zj4/s1600/ku-xlarge+(2).jpg" height="299" width="640" /&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="background-color: whitesmoke; line-height: 24px;"&gt;&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;So if you don't use Firefox or Chrome, where does that leave you? We asked the EFF, but none of their experts had any knowledge when it came to browsers that weren't Chrome or Firefox. They did, however, note that privacy advocates generally prefer open source browsers like over closed-source, proprietary ones like Apple's Safari and Microsoft's Internet Explorer. The EFF praised both however for pioneering their own privacy features, like Safari's 3rd party cookie blocking and IE's Tracking Protection Lists. Still, the fact that you can't see under the hood and that neither have developer APIs makes them tough to analyze.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h3 data-textannotation-id="1c2cd68138ea625276f43d594f5a8d02" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;"&gt;
&lt;span style="color: #990000;"&gt;The Bottom Line: No, Your Browser Doesn’t Make a Huge Difference&lt;/span&gt;&lt;/h3&gt;
&lt;h3 data-textannotation-id="1c2cd68138ea625276f43d594f5a8d02" style="background-color: whitesmoke; box-sizing: border-box; direction: ltr; margin: 16px 0px; max-width: 100%; padding: 0px 18px; text-rendering: optimizelegibility;"&gt;
&lt;div class="separator" style="clear: both; font-family: ProximaNovaCond, serif; font-size: 25px; line-height: 1.1; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhfwBb302_YXuMTxSiDKxqhI5UmqV2pGjugOmlbMl7le4r2xTikSbR5vUd4lB31rUUbqdpuu_P8nnSH-48s9DkK_avlDAACVMGVfYm0-PQPX5yHTuBVBh9uKy1M6tXP_58EWrlFj5lWQWlV/s1600/ku-xlarge+(3).jpg" height="360" width="640" /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; line-height: 1.1; text-align: center;"&gt;
&lt;span style="color: #073763; font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"&gt;&lt;span style="font-weight: normal; line-height: 24px; text-align: start;"&gt;So where does that leave us? Well, your browser is probably sending&amp;nbsp;&lt;/span&gt;&lt;em style="box-sizing: border-box; font-weight: normal; line-height: 24px; text-align: start;"&gt;some information&lt;/em&gt;&lt;span style="font-weight: normal; line-height: 24px; text-align: start;"&gt;&amp;nbsp;back to the company that created it, but that information is explicitly used to support the features you have turned on. As long as you trust the developer behind your favorite browser, this isn't an issue. Bonus: there's nothing dangerous or invasive about using Chrome sync or Firefox sync.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: start;"&gt;
&lt;span style="color: #274e13; font-family: Helvetica Neue, Arial, Helvetica, sans-serif; font-size: small;"&gt;&lt;span style="font-weight: normal; line-height: 24px;"&gt;&lt;i&gt;credit:- &lt;a href="http://www.lifehacker.com/"&gt;www.lifehacker.com&lt;/a&gt;&lt;/i&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiaknEUllnkfbvvfZBd402W1CIk7AzFrg5ybQywsqrq65C0Xrqn8LsH68EOi93BFNRdcxIWwb4mfY8UZFMLBjl5yt18T-TXyCBvcFYnP07Q-Ey8xHIU_FKxc3lRh107s7sA_WseiNmFs6er/s72-c/ku-xlarge.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Chrome, Firefox face threat of mischievous cyber attacks</title><link>http://cyberfort.blogspot.com/2014/02/chrome-firefox-face-threat-of.html</link><category>computer security</category><category>internet security</category><category>internet stuff</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 16 Feb 2014 21:42:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-1879800981102991202</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="clear: left; color: #073763; float: left; font-family: Trebuchet MS, sans-serif; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfYdiDRbxe_Yga5W-csefL9TVDqrIny6EyiYn5NyWUsAWUVGx9kPTXjRXZkgz8gYvoqPsxOcuSM88Nc62PZTdjt-capmC9T_tFfudRiCyYdeVhY2pLFgls664rywQ9CuGwz78TYaub5t8X/s1600/C1F9A4AAD81CD6D6ABCA254B41FFA6.jpg" height="360" width="640" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="color: #660000; font-size: large;"&gt;New Delhi: &lt;/span&gt;&lt;span style="color: #073763;"&gt;Multiple vulnerabilities have been detected in popular web browsers Google Chrome and Mozilla Firefox and cyber security sleuths have advised Internet users in the Indian cyberspace to guard against arbitrary activities on their systems.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;In view of these suspicious virus-based activities, Internet users have been asked to upgrade their personal versions of these two most used web browsers on their work stations.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;“Multiple vulnerabilities have been reported in Mozilla Firefox, Thunderbird and SeaMonkey which could be exploited by a remote attacker to bypass certain security restrictions, disclose potentially sensitive information, gain escalated privileges, execute arbitrary code and causes denial of service condition on the affected system,” the Computer Emergency Response Team of India (CERT-IN) said in its latest advisory to online users in the country.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #990000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #990000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;i&gt;The CERT-In is the nodal agency to combat hacking, phishing and to fortify security-related defences of the Indian Internet arena.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;“The two web browsers are an important tool for Internet surfing among Indian online consumers. The anomalies have been detected recently and it would be advised that users upgrade their existing versions sooner than later. These activities are mischief on part of hackers or they are harmful viruses,” a cyber security expert told PTI.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The agency, in its advisory, said the vulnerability is caused “due to improper restrict access to ‘about:home’ buttons by script on other pages in Mozilla Firefox”.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;“A user-assisted remote attacker could exploit this vulnerability using a crafted website or webpage. Successful exploitation of this vulnerability could allow user-assisted remote attacker to cause a denial of service condition,” the CERT-In said.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;Similar issues have been reported in the popular browser offered by Google.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #990000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #990000; font-family: Trebuchet MS, sans-serif;"&gt;&lt;i&gt;“Multiple vulnerabilities have been reported in Google Chrome which could be exploited by a remote attacker to cause denial of service condition or execute arbitrary code on the target system,” the agency said.&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The maximum damage these vulnerabilities can cause, the advisory said, was memory corruption, unwanted downloading of files, loss of sensitive information (when Mozilla Firefox is used in Android phones) and cause of denial of various services on the Internet to the user.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The agency advised Internet users to either user proper security patches (Mozilla Firefox) or upgrade the browser version (Google Chrome).&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The affected software systems include “Firefox versions prior to 27.0, Firefox extended support release (ESR) versions prior to 24.3, Thunderbird versions prior to 24.3, SeaMonkey versions prior to 2.24 and Google Chrome prior to version 32.0.1700.102".&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 1.333em;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjfYdiDRbxe_Yga5W-csefL9TVDqrIny6EyiYn5NyWUsAWUVGx9kPTXjRXZkgz8gYvoqPsxOcuSM88Nc62PZTdjt-capmC9T_tFfudRiCyYdeVhY2pLFgls664rywQ9CuGwz78TYaub5t8X/s72-c/C1F9A4AAD81CD6D6ABCA254B41FFA6.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 25 Free Educational Video Sites </title><link>http://cyberfort.blogspot.com/2014/02/top-25-free-educational-video-sites.html</link><category>blogging</category><category>education</category><category>entertainment</category><category>intelligence</category><category>more stuff</category><category>youtube</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 16 Feb 2014 08:47:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-8751599069433885591</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;h1 style="font-weight: normal; margin: 0px; padding: 0px 0px 17px;"&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLNMFzuyZrayw-_zYhUgEuhCDwmlfXzUTONr2BJSS8BT2-Vpsj0WTyJkJsDYatPSP29g7qKlGDq5xQ5bNsNnq_9IVerx6LlcY_CVrR3dq6RONIumwodOvkQQItrABhZdP56YfN__Qjc_tz/s1600/Screen-shot-2013-07-18-at-12.06.24-PM-1024x555.png" height="345" width="640" /&gt;&lt;/div&gt;
&lt;span style="line-height: 16px;"&gt;&lt;span style="color: #274e13; font-family: Verdana, sans-serif; font-size: small;"&gt;RefSeek's guide to the 25 best online resources for finding free educational videos. With the exception of BrainPOP and Cosmeo, all listed sites offer their extensive video libraries for free and without registration.&lt;/span&gt;&lt;/span&gt;&lt;/h1&gt;
&lt;a href="http://www.academicearth.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Academic Earth" class="directory_logo" src="http://www.refseek.com/images/logos/academicearth.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.academicearth.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Academic Earth&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Thousands of video lectures from the world's top scholars.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;academicearth.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://bigthink.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Big Think" class="directory_logo" src="http://www.refseek.com/images/logos/bigthinkers.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://bigthink.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Big Think&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Video interviews with 600+ thought leaders in a range of fields.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;bigthink.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.brightstorm.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Brightstorm" class="directory_logo" src="http://www.refseek.com/images/logos/brightstorm.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.brightstorm.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Brightstorm&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Short-form online video lessons by professional educators. Free math lessons.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;brightstorm.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.cosmolearning.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="CosmoLearning" class="directory_logo" src="http://www.refseek.com/images/logos/cosmolearning.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.cosmolearning.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;CosmoLearning&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Aggregator of free, online video lessons and documentaries.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;cosmolearning.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.coursera.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Coursera" class="directory_logo" src="http://www.refseek.com/images/logos/coursera.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.coursera.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Coursera&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Lectures taught by world-class professors and reinforced through interactive exercises.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;coursera.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://edx.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="EdX" class="directory_logo" src="http://www.refseek.com/images/logos/edx.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://edx.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;EdX&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Courses designed specifically for interactive study via the web.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;edx.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.thefutureschannel.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="The Futures Channel" class="directory_logo" src="http://www.refseek.com/images/logos/futureschannel.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.thefutureschannel.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Futures Channel&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
High quality multimedia content ideal for use in the classroom.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;thefutureschannel.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.howcast.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Howcast" class="directory_logo" src="http://www.refseek.com/images/logos/howcast2.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.howcast.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Howcast&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Professional and user-generated how-to videos.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.howcast.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.archive.org/details/movies" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Internet Archive" class="directory_logo" src="http://www.refseek.com/images/logos/internetarchive.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.archive.org/details/movies" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Internet Archive&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Collection of more than two-hundred thousand free historical videos, many academic.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;archive.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.apple.com/apps/itunes-u/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="iTunes U" class="directory_logo" src="http://www.refseek.com/images/logos/itunes.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.apple.com/apps/itunes-u/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;iTunes U&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Free lectures, language lessons, audiobooks, and more accessible via Apple iTunes.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;Apple iTunes&lt;/span&gt;&amp;nbsp;- Apple iTunes Software&lt;/div&gt;
&lt;a href="http://khanacademy.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Khan Academy" class="directory_logo" src="http://www.refseek.com/images/logos/khan.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://khanacademy.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Khan Academy&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Self-pased learning with extensive video library, interactive challenges, and assessments.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;khanacademy.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://learner.org/resources/browse.html" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Annenberg Media's Learner.org" class="directory_logo" src="http://www.refseek.com/images/logos/learner.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://learner.org/resources/browse.html" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Learner.org&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Professionally developed programming for K-12 classrooms.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;learner.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.mathtv.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Math TV" class="directory_logo" src="http://www.refseek.com/images/logos/mathtv.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.mathtv.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Math TV&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Professional video lessons in mathematics. Covers basic math through calculus.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;mathtv.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://ocw.mit.edu/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="MIT Open CourseWare" class="directory_logo" src="http://www.refseek.com/images/logos/mit.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://ocw.mit.edu/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;MIT Open CourseWare&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Lectures and course materials for students, teachers, and self-learners.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;ocw.mit.edu&lt;/span&gt;&amp;nbsp; |&amp;nbsp; Also see:&amp;nbsp;&lt;a href="http://www.opencontent.org/ocwfinder/" rel="nofollow" style="color: #0063be; margin: 0px; padding: 0px; text-decoration: initial;"&gt;OpenCourseWare Finder&lt;/a&gt;&lt;/div&gt;
&lt;a href="http://video.mit.edu/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="MIT Video" class="directory_logo" src="http://www.refseek.com/images/logos/mitworld.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://video.mit.edu/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;MIT Video&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Guide to more than 11,000 interesting MIT videos and lectures.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;video.mit.edu/&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.neok12.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="NeoK12" class="directory_logo" src="http://www.refseek.com/images/logos/neok12.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.neok12.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;NeoK12&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Aggregator of high-quality educational videos from around the Web.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.neok12.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.youtube.com/user/ResearchChannel/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Research Channel" class="directory_logo" src="http://www.refseek.com/images/logos/researchchannel.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.youtube.com/user/ResearchChannel/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;ResearchChannel&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
3,500 videos from distinguished researchers and scholars.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;youtube.com/user/ResearchChannel&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://video.pbs.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="PBS Video" class="directory_logo" src="http://www.refseek.com/images/logos/pbs.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://video.pbs.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;PBS&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Free videos from your favorite PBS programs, including NOVA and Frontline.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;video.pbs.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.schooltube.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="SchoolTube" class="directory_logo" src="http://www.refseek.com/images/logos/schooltube.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.schooltube.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;SchoolTube&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Video sharing platform for schools featuring original content created by students.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.schooltube.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.schoolsworld.tv/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="SchoolsWorld" class="directory_logo" src="http://www.refseek.com/images/logos/schoolsworld.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.schoolsworld.tv/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;SchoolsWorld&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Engaging, professional videos and practical resources for educator development.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.schoolsworld.tv&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.snagfilms.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Snag Films" class="directory_logo" src="http://www.refseek.com/images/logos/snagfilms.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.snagfilms.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;SnagFilms&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Library of free, full-length documentary films.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.snagfilms.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.teachertube.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Teacher Tube" class="directory_logo" src="http://www.refseek.com/images/logos/teachertube.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.teachertube.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;TeacherTube&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Online aggregator of educational videos.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.teachertube.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.ted.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="TED" class="directory_logo" src="http://www.refseek.com/images/logos/ted.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.ted.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;TED&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Fascinating presentations by the world's leading thinkers and doers.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.ted.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.videojug.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Videojug" class="directory_logo" src="http://www.refseek.com/images/logos/videojug.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.videojug.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Videojug&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Collection of videos from professors, professionals, coaches, teachers, and consultants.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.videojug.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.watchknowlearn.org/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="WatchKnowLearn" class="directory_logo" src="http://www.refseek.com/images/logos/watchknow.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.watchknowlearn.org/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;WatchKnowLearn&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Comprehensive online directory of educational videos aggregated from across the Web.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.watchknowlearn.org&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.wonderhowto.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="WonderHowTo" class="directory_logo" src="http://www.refseek.com/images/logos/wonderhowto.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.wonderhowto.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;WonderHowTo&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Search engine and directory of free how-to videos.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.wonderhowto.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://oyc.yale.edu/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Open Yale Courses" class="directory_logo" src="http://www.refseek.com/images/logos/yale.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://oyc.yale.edu/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Open Yale Courses&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Free access to a selection of introductory Yale courses.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;oyc.yale.edu&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.youtube.com/edu" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="YouTube EDU" class="directory_logo" src="http://www.refseek.com/images/logos/youtubeedu.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.youtube.com/edu" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;YouTube EDU&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Free lectures from more than one hundred colleges and universities.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.youtube.com/edu&lt;/span&gt;&amp;nbsp; |&amp;nbsp; Also see:&amp;nbsp;&lt;a href="http://www.youtube.com/user/AtGoogleTalks" rel="nofollow" style="color: #0063be; margin: 0px; padding: 0px; text-decoration: initial;"&gt;Talks@Google&lt;/a&gt;&lt;/div&gt;
&lt;div class="result_description" style="font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 20px; width: auto;"&gt;
&lt;i style="margin: 0px; padding: 0px;"&gt;&lt;b&gt;&lt;span style="color: #660000;"&gt;Additional sites that are not free but offer outstanding content:&lt;/span&gt;&lt;/b&gt;&lt;/i&gt;&lt;/div&gt;
&lt;a href="http://www.brainpop.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="BrainPop" class="directory_logo" src="http://www.refseek.com/images/logos/brainpop.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.brainpop.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;BrainPOP&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Provider of original, animated educational videos. Subscription required.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.brainpop.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.cosmeo.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Cosmeo" class="directory_logo" src="http://www.refseek.com/images/logos/cosmeo.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.cosmeo.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Cosmeo&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
30,000 video segments from Discovery Education. Subscription required.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.cosmeo.com&lt;/span&gt;&amp;nbsp; |&amp;nbsp; Also see:&amp;nbsp;&lt;a href="http://streaming.discoveryeducation.com/" rel="nofollow" style="color: #0063be; margin: 0px; padding: 0px; text-decoration: initial;"&gt;Discovery Education Streaming&lt;/a&gt;&lt;/div&gt;
&lt;h1 style="font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px 0px 17px;"&gt;
&lt;span style="color: #660000; font-size: small;"&gt;general interest&lt;/span&gt;&lt;/h1&gt;
&lt;a href="http://www.hulu.com/" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Hulu" class="directory_logo" src="http://www.refseek.com/images/logos/hulu.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.hulu.com/" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Hulu&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Joint venture between NBC Universal and News Corp. Features TV shows and movies.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.hulu.com&lt;/span&gt;&amp;nbsp; |&amp;nbsp; Also see:&amp;nbsp;&lt;a href="http://www.hulu.com/network/pbs" rel="nofollow" style="color: #0063be; margin: 0px; padding: 0px; text-decoration: initial;"&gt;PBS&lt;/a&gt;,&amp;nbsp;&lt;a href="http://www.hulu.com/studio/national-geographic-channel" rel="nofollow" style="color: #0063be; margin: 0px; padding: 0px; text-decoration: initial;"&gt;National Geographic&lt;/a&gt;&lt;/div&gt;
&lt;a href="http://www.metacafe.com/" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Metacafe" class="directory_logo" src="http://www.refseek.com/images/logos/metacafe.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.metacafe.com/" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Metacafe&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Specializes in short-form original video content.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.metacafe.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.vimeo.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="Vimeo" class="directory_logo" src="http://www.refseek.com/images/logos/vimeo.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.vimeo.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;Vimeo&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Upload, share, and explore user-generated videos.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.vimeo.com&lt;/span&gt;&lt;/div&gt;
&lt;a href="http://www.youtube.com/" rel="nofollow" style="color: #0063be; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin: 0px; padding: 0px; text-decoration: initial;"&gt;&lt;img alt="YouTube" class="directory_logo" src="http://www.refseek.com/images/logos/youtube.gif" style="border: 1px solid rgb(223, 228, 236); float: left; height: 33px; margin: 2px 18px 20px 0px; padding: 0px; width: 33px;" /&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;a class="result_title" href="http://www.youtube.com/" rel="nofollow" style="color: #642d9c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 19px; margin: 0px; padding: 0px;"&gt;&lt;b style="margin: 0px; padding: 0px;"&gt;YouTube&lt;/b&gt;&lt;/a&gt;&lt;span style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif;"&gt;&lt;/span&gt;&lt;div class="result_description" style="color: #54555c; font-family: arial, tahoma, helvetica, verdana, sans-serif; line-height: 16px; padding: 1px 0px 0px; width: auto;"&gt;
Hosts millions of user-generated and professional videos.&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;www.youtube.com&lt;/span&gt;&lt;/div&gt;
&lt;div class="result_details" style="color: #838e96; font-family: arial, tahoma, helvetica, verdana, sans-serif; margin-bottom: 16px; padding: 0px;"&gt;
&lt;span class="result_url" style="color: #539d36; letter-spacing: 1px; line-height: 17px; margin: 0px; padding: 0px;"&gt;credit:-&amp;nbsp;&lt;a href="http://www.refseek.com/"&gt;http://www.refseek.com&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLNMFzuyZrayw-_zYhUgEuhCDwmlfXzUTONr2BJSS8BT2-Vpsj0WTyJkJsDYatPSP29g7qKlGDq5xQ5bNsNnq_9IVerx6LlcY_CVrR3dq6RONIumwodOvkQQItrABhZdP56YfN__Qjc_tz/s72-c/Screen-shot-2013-07-18-at-12.06.24-PM-1024x555.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">7</thr:total></item><item><title>List Of All Top Android Versions</title><link>http://cyberfort.blogspot.com/2014/02/list-of-all-top-android-versions.html</link><category>Android</category><category>apps and software</category><category>device and design</category><category>mobile</category><category>os</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Fri, 14 Feb 2014 11:59:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-5531473678049592838</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: white; color: #073763; font-family: Verdana, sans-serif;"&gt;Android is a Linux-based operating system for mobile devices such as smartphones, multitasking phones and tablet computers such as the Galaxy Tab. It is developed by the Open Handset Alliance led by Google.Google bought over the initial developer Android Inc in 2005, to gain total control of the Android Franchise, today it is worth several hundred times what it was bought for.The Android franchise has a total of 9 versions, the names of which have been illustrated below.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq-U8q7hpL0H6Uss-Zun1ZhdczI97V2oT6t2b4WbMzpsmSXnM9NMndVSEdRD7IZx6u0bX_5gJc5mbre9f1f5mo5Ej-gAWsdPtXyDtzQoY5Tfy2s1ZfQsvawXCHnxrWZekLQz4Deq7g25sP/s1600/4453391412_8ec6dfa2a8_o.jpg" height="427" width="640" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;The following names are used for the currently existing Android releases. Note that versions 1.0 and 1.1 were not publicly named. However, Android 1.1 was internally referred to as "Petit-Four" (noted in&amp;nbsp;Traroth's answer, confirmed&amp;nbsp;here):&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #274e13;"&gt;&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;see also :-&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;a href="http://cyberfort.blogspot.com/2014/01/how-to-block-popup-ads-on-your-android.html" style="line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;&lt;span style="font-family: Verdana, sans-serif; font-size: small;"&gt;&lt;b&gt;How To Block PopUp Ads On Your Android Smartphone&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Cupcake:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 1.5&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Donut:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 1.6&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Eclair:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 2.0&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 2.1&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #274e13;"&gt;see also:-&lt;/span&gt;&lt;span style="color: #073763;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;a href="http://cyberfort.blogspot.com/2013/10/30-secret-codes-of-android-devices.html" style="font-family: Helvetica, Arial, sans-serif; line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;&lt;span style="color: #073763; font-size: small;"&gt;&lt;b&gt;30+ Secret Codes Of Android Devices&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Froyo:&lt;/strong&gt;&amp;nbsp;(short for "frozen yogurt")&lt;/span&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 2.2&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Gingerbread:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 2.3&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Honeycomb:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN1GHzyeVsBq-iZD9iEwYl9HJU3qODDERWaCbpvCR4l8q5Q9xV2hBgmYw49CnuqZbdu3EPWZ-eCIvtX2Dk1uuVu9pt52qMdWeEOJooRwpETwJleinG_QbRT6yvGpbWXZ8z9l2FLycjOm97/s1600/honeycomb_statue-1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN1GHzyeVsBq-iZD9iEwYl9HJU3qODDERWaCbpvCR4l8q5Q9xV2hBgmYw49CnuqZbdu3EPWZ-eCIvtX2Dk1uuVu9pt52qMdWeEOJooRwpETwJleinG_QbRT6yvGpbWXZ8z9l2FLycjOm97/s1600/honeycomb_statue-1.jpg" height="240" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 3.0&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 3.1&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 3.2&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Ice Cream Sandwich:&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit0SIg-31-d5wBzkOvwSzchPZWmSi8RDqxGzI7tnHEUj5cIkvIer1DlmSiZoWw1gatX9TAMxV73moxSn1RZhIbgGTXR2iDg2FL7IhtL1Nd-r2tDGHrz4dzb8FjWPDOu_iTMAv7_N0v01xA/s1600/ice_cream_googleplex.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEit0SIg-31-d5wBzkOvwSzchPZWmSi8RDqxGzI7tnHEUj5cIkvIer1DlmSiZoWw1gatX9TAMxV73moxSn1RZhIbgGTXR2iDg2FL7IhtL1Nd-r2tDGHrz4dzb8FjWPDOu_iTMAv7_N0v01xA/s1600/ice_cream_googleplex.jpg" height="240" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 4.0&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #274e13;"&gt;&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;see also:-&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;a href="http://cyberfort.blogspot.com/2013/12/10-android-tips-and-tricks.html" style="line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;&lt;span style="font-family: Verdana, sans-serif; font-size: small;"&gt;&lt;b&gt;10 Android Tips and Tricks&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Jelly Bean:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUAFfZLoJZ8a-Wv-bHWFRHwbyDkJgVGlJtFxHHQ9tBcu0EmXHSqUV7WLEPek9H6T5dxs2nvsRQe8aeCytvM96rAthNFxiOEzNhCqTU_d_1X34cvGsz41q3CG0Tolwx9ZqPeWVV5k6Vro8n/s1600/android_jelly_bean_sculpture_at_googleplex_520x300x24_fill.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjUAFfZLoJZ8a-Wv-bHWFRHwbyDkJgVGlJtFxHHQ9tBcu0EmXHSqUV7WLEPek9H6T5dxs2nvsRQe8aeCytvM96rAthNFxiOEzNhCqTU_d_1X34cvGsz41q3CG0Tolwx9ZqPeWVV5k6Vro8n/s1600/android_jelly_bean_sculpture_at_googleplex_520x300x24_fill.jpg" height="230" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 4.1&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 4.2&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 4.3&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="background-color: white; border: 0px; clear: both; line-height: 18.1875px; margin-bottom: 1em; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="color: #274e13;"&gt;&lt;b&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;see also :-&amp;nbsp;&lt;/span&gt;&lt;a href="http://cyberfort.blogspot.com/2013/07/top-features-of-android-jelly-bean.html" style="font-family: Helvetica, Arial, sans-serif; line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;&lt;span style="font-size: small;"&gt;Top Features Of Android Jelly Bean&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/strong&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;KitKat:&lt;/span&gt;&lt;/strong&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXj8_9NeqFi_TaUo_EsvIwhfkvhiXr0rczEWcYhCDhtlqIyX9tRlMe5GQGqO21VOvjtZ_9jOXbZLQkPmXXgE0XmxvfLIPCm3iTkjYwImS9f5VzqrJYw-Rmv3defhDS5Vf0oiE2xnq0EcJx/s1600/kitkat-android-650x433.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXj8_9NeqFi_TaUo_EsvIwhfkvhiXr0rczEWcYhCDhtlqIyX9tRlMe5GQGqO21VOvjtZ_9jOXbZLQkPmXXgE0XmxvfLIPCm3iTkjYwImS9f5VzqrJYw-Rmv3defhDS5Vf0oiE2xnq0EcJx/s1600/kitkat-android-650x433.jpg" height="213" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;ul style="background-color: white; border: 0px; line-height: 18.1875px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 1em 30px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; line-height: 1.3em; margin: 0px 0px 1em; padding: 0px; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="color: #660000; font-family: Verdana, sans-serif;"&gt;Android 4.4 (confirmed)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: #274e13;"&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="line-height: 20.796875px;"&gt;see also:-&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Helvetica, Arial, sans-serif; font-size: small; line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;&lt;a href="http://cyberfort.blogspot.com/2013/10/how-to-unlock-android-pattern-lock-and.html" style="font-family: Helvetica, Arial, sans-serif; line-height: 24px; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;How to Unlock Android Pattern Lock And Password Lock&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;
&lt;b&gt;&lt;span style="color: #274e13;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgq-U8q7hpL0H6Uss-Zun1ZhdczI97V2oT6t2b4WbMzpsmSXnM9NMndVSEdRD7IZx6u0bX_5gJc5mbre9f1f5mo5Ej-gAWsdPtXyDtzQoY5Tfy2s1ZfQsvawXCHnxrWZekLQz4Deq7g25sP/s72-c/4453391412_8ec6dfa2a8_o.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 10 Best Firefox Add-ons of 2014  </title><link>http://cyberfort.blogspot.com/2014/02/top-10-best-firefox-add-ons-of-2014.html</link><category>all tech</category><category>apps and software</category><category>internet security</category><category>internet stuff</category><category>network</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 13 Feb 2014 21:38:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-7797362571560070303</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZccvJxb4goUzBJyBXbE7c-jXRTC830465eJvNtBG5k3mWZvbNam59LMMlnFuEzc_zmxLVB2t3Wjs-KcflS2RGLnj1JqzEACTsE7NvL7K4xt3rrpb32ltWkPctECB5IeNsDye503DdhI83/s1600/firefox.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZccvJxb4goUzBJyBXbE7c-jXRTC830465eJvNtBG5k3mWZvbNam59LMMlnFuEzc_zmxLVB2t3Wjs-KcflS2RGLnj1JqzEACTsE7NvL7K4xt3rrpb32ltWkPctECB5IeNsDye503DdhI83/s1600/firefox.jpg" height="300" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Firefox is one of the best browsers out there. If used correctly, the
effect can be pretty awesome. Let's have a look below for 12 addons which can
help you improve the usage of Mozilla Firefox.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;b&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;
1.Collusion:&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
allows you to see which sites are using third-party cookies to track your
movements across the Web. It shows, in real time, how that data creates a
spider web of interaction between companies and other trackers.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
2.URL Fixer&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
corrects typos in URLs that you enter in the address bar. For example, if you
type google.con, it will correct it to google.com (asking first, if you enable
confirmation). One reviewer of this add-on says it’s a “huge time saver” — and
who doesn’t need to save time?&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
3.PearlTrees.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
Collect, organize and share everything you like with your new visual and social
library. Pearltrees’ unique visual interface lets you have all your interests
at hand and inspires you with other’s collections.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
4.TwitBin.&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
It allows you to keep up with all of your Twitter conversations right from your
browser sidebar. Send messages, receive messages, share links, and more&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
5.Memonic Web Clipper,&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
which lets you capture content snippets on any page and choose sections of
websites to save, share and discuss with friends. Keep more than just links:
Save the essential content snippets and use them on any computer or mobile.
Memonic combines the advantages of bookmarks with your private online notebook&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
6. 365scores Notifier&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
lets you get all the scores, updates and other information about your favorite
teams in real time.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
7.Do Not Track Plus&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
Firefox already has a feature called Do Not Track, which allows you to tell
Websites not to track your online activity&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
8. Cheevos for Firefox&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
Want to learn about Firefox and brag to your friends about your pro-level Web
surfing? May’s add-on choice Cheevos for Firefox— gets you there. With this
add-on you gain achievements for using Firefox, whether it’s finding hidden
Easter eggs within the product, or taking advantage of the power of the
browser. It makes using the web more fun&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;&lt;br /&gt;
9.Tab Badge,&lt;/b&gt;&lt;/span&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
which gives an alert on any one of your open tabs letting you know when there’s
something new on that page.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;b&gt;
10. Fabtabs&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;
It was a big hit with Firefox users. By taking a small screenshot of the website
you are currently viewing, and calculating the most commonly used color from
that screenshot, Fab Tabs tries to take the one essential color from the
website and apply it to the tab to not only makes your tabs look fabulous, but
to help you navigate your tabs visually.&lt;/span&gt;&lt;br /&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;span style="color: #6aa84f;"&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="line-height: 115%;"&gt;&lt;span style="color: #6aa84f; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="font-family: Verdana, sans-serif;"&gt;&lt;span style="line-height: 115%;"&gt;&lt;span style="color: #38761d;"&gt;You may downloads all the addons from here:&lt;/span&gt;&lt;br /&gt;
&lt;/span&gt;&lt;span style="color: #073763; line-height: 115%;"&gt;&lt;a href="https://www.facebook.com/l.php?u=https%3A%2F%2Faddons.mozilla.org%2Fen-US%2Ffirefox%2F&amp;amp;h=1AQHgHKkO&amp;amp;enc=AZMUcASKyDQeqkG3K5KODmakkV0yZrb2DFpu6q-tPzV9D8HoQz_DPd6KKCZzPLRHDAK0nt41gs30knaly__vqzfb14vB86y8bhSo1pS5HzBOCc3I5poGNW993xMmikWwmpf2HRidqG9Qctbot2m7GLxWUH_cQD78SnKtz-U1tYz8qg&amp;amp;s=1" target="_blank"&gt;&lt;span style="line-height: 115%;"&gt;https://addons.mozilla.org/en-US/firefox/&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="line-height: 115%;"&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;!--[if !supportLineBreakNewLine]--&gt;&lt;br /&gt;
&lt;!--[endif]--&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZccvJxb4goUzBJyBXbE7c-jXRTC830465eJvNtBG5k3mWZvbNam59LMMlnFuEzc_zmxLVB2t3Wjs-KcflS2RGLnj1JqzEACTsE7NvL7K4xt3rrpb32ltWkPctECB5IeNsDye503DdhI83/s72-c/firefox.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>J.A.R.V.I.S : Artificial Intelligence Assistant Operating System for Hackers</title><link>http://cyberfort.blogspot.com/2014/02/jarvis-artificial-intelligence.html</link><category>computer security</category><category>cyber crimes</category><category>e hacking</category><category>hacker's view</category><category>intelligence</category><category>internet security</category><category>os</category><category>technology</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 13 Feb 2014 19:05:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-4081878396878378460</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;span style="color: #073763;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSzty2-ut4SjcdcOzF5PNXCTcly31lE5w3Yjdd23iFmPKpCv4dwhyi5vdXOlKvA9JGieF917sWWEC2B92nb84f2kL_4J_D-4P4YjvInZO-5bpIQN2bhCFJvWqect-wzHB1kWKJ6Sf58Stq/s1600/jarvis+Artificial+Intelligence+Assistant+Operating+System+for+Hackers+2.png" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 29px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;A group of Indian Hackers has designed Artificial Intelligence Assistant Operating System called '&lt;b&gt;J.A.R.V.I.S&lt;/b&gt;' , who recognizes them, answer questions, tweet for them and Collect information, scan targets for them.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 29px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 29px; text-align: justify;"&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="text-align: left;"&gt;Chiragh Dewan, a 18 year old student who is currently pursuing his BCA has taken the initiative to be the first Indian to complete this project&amp;nbsp;&lt;/span&gt;J.A.R.V.I.S , which is inspired by Iron Man’s (movie) artificial intelligence assistant Jarvis.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; font-family: 'Segoe UI', 'Gill Sans Light', Helvetica; font-size: 16px; line-height: 29px; text-align: justify;"&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;span style="clear: left; color: #073763; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6qsJj5enN0IZ5DfDk9GkDeZ5p4ZpkF2XJpe7UsbMrHrVEXDaFQSiZoiyTxRTqvhJJ5lCFN6qhgpXADBEgIjT1gSRsACfOZRXzfTnm3w5FJfRaaSOM6bc0ZUn7dev5ri9HuE65JyxuzaoK/s1600/jarvis+Artificial+Intelligence+Assistant+Operating+System+for+Hackers.png" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #073763;"&gt;With his team of 7 including Himanshu Vaishnav, Mayur Singh, Krishanu Kashyap, Vikas Kumar, Vinmay Nair and Sravan Kumar, they are about to finish the 3rd level of the project.&lt;br style="content: ' '; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/span&gt;&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;span style="color: #073763;"&gt;Their long term goal is to create an OS which could adapt itself according to the user's needs. Like if a doctor is using the OS, it will adapt itself so as it is capable of helping him out in his field like searching for new techniques, medicines, help in their research, etc. Add for architects, other professions.&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;span style="color: #073763;"&gt;&lt;b style="margin: 0px; outline: 0px; padding: 0px;"&gt;Project Task Completed:&amp;nbsp;&lt;/b&gt;In the current version of Jarvis v1.0, it is capable of:&lt;/span&gt;&lt;ul style="margin: 0px 10px 10px 20px; outline: 0px; padding: 0px 0px 0px 5px; text-align: left;"&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Answering questions asked by the administrator&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Compile reports on any topic asked by the user.&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Control lights by voice.&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Basic interaction with the user.&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Handling Facebook, Email and Social profiles of users&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Using Twitter Account with voice control&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Basic OS kernel is ready.&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Can Scan targets for Hackers&lt;/span&gt;&lt;/li&gt;
&lt;li style="margin: 0px; outline: 0px; padding: 0px;"&gt;&lt;span style="color: #073763;"&gt;Gathering Basic information about the target&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;span style="color: #073763;"&gt;All the above functionalities are completely controlled by voice. It has only been four months since they have started this project and have achieved a lot in this short period of time.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;br style="content: ' '; display: block; margin: 15px 0px 0px; outline: 0px; padding: 0px;" /&gt;&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;span style="color: #073763;"&gt;&lt;span style="margin: 0px; outline: 0px; padding: 0px; text-align: left;"&gt;The team will announce the OS publicly&amp;nbsp;soon after completion&amp;nbsp;of phase 3, but for now Chiragh&lt;/span&gt;&amp;nbsp;proudly shows off his creation on the&amp;nbsp;&lt;a href="http://www.jarviscorp.com/" style="border-bottom-style: dotted; border-bottom-width: 1px; margin: 0px; outline: none; padding: 0px; text-decoration: initial;"&gt;J.A.R.V.I.S project&lt;/a&gt;&amp;nbsp;website&lt;a href="http://www.jarviscorp.com/" style="border-bottom-style: dotted; border-bottom-width: 1px; margin: 0px; outline: none; padding: 0px; text-decoration: initial;"&gt;&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="margin: 0px; outline: 0px; padding: 0px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjSzty2-ut4SjcdcOzF5PNXCTcly31lE5w3Yjdd23iFmPKpCv4dwhyi5vdXOlKvA9JGieF917sWWEC2B92nb84f2kL_4J_D-4P4YjvInZO-5bpIQN2bhCFJvWqect-wzHB1kWKJ6Sf58Stq/s72-c/jarvis+Artificial+Intelligence+Assistant+Operating+System+for+Hackers+2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Top 7 Best Operating System For Hacking</title><link>http://cyberfort.blogspot.com/2014/02/top-7-best-operating-system-for-hacking.html</link><category>all tech</category><category>apps and software</category><category>computer security</category><category>cyber crimes</category><category>e hacking</category><category>hacker's view</category><category>intelligence</category><category>internet security</category><category>windows</category><author>noreply@blogger.com (Unknown)</author><pubDate>Thu, 13 Feb 2014 15:04:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-7310489890223862488</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGIYDwaR3Du49fk_8R5b-VI7ggsIhRnUh_0PE-wwiPThi03x7dbQVz19-4zoJQZdplG11UOTGUwAwQZXJTVIJgqoZs_qRwpf5ol7Bz9iAsG4HJxLLQDEiz72Ei1P4aT_qa8kR5POMSKGzn/s1600/jarvis+Artificial+Intelligence+Assistant+Operating+System+for+Hackers+2.png" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;span style="background-color: white; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; line-height: 26px;"&gt;&lt;span style="color: #274e13;"&gt;Hacking is not an art than can be mastered overnight, it requires dedication and off-course time. Have you ever thing why Hacking is possible because of “unaware developers and inappropriate programming techniques” . As a Ethical hacker i personally realize that&amp;nbsp;You can never stop hackers to hack something, you can just make his task harder by putting some extra security. if you are really interested in Hacking, You need to be know Which Operating systems are used Hackers.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #bf9000;"&gt;&lt;span style="background-color: white; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px;"&gt;Today i want to say u that which is the best operating system for hacking a/c hackers &lt;/span&gt;&lt;span style="background-color: white; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;strong style="background-color: white; border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;1. &amp;nbsp;Kali Linux :-&lt;/span&gt;&lt;/strong&gt;&lt;span style="background-color: white; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgv1z3OqSfSO-0L4X7PC2apoBqSxay81uKP2AKCLUAU3kgodpYaXnDJnpaPMck3uWKJHEUf7X9nB-5G9FFM3ZJLGPn98grgeDAvW68AreF4d0Vtw1V1eUfJniKVz54NOADIh32v4Ypx93z_/s1600/kali-home-large-slider2.jpg" height="219" width="320" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;span style="color: #073763;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Kali Linux&lt;/strong&gt;&amp;nbsp;is an advanced penetration testing tool that should be a part of every security professional’s toolbox. Penetration testing involves using a variety of tools and techniques to test the limits of security policies and procedures. What Kali has done is collect just about everything you’ll need in a single CD. It includes more than 300 different tools, all of which are open source and available on&lt;/span&gt;&lt;span style="color: #333333;"&gt;&amp;nbsp;&lt;/span&gt;&lt;a href="https://github.com/" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;GitHub&lt;/a&gt;&lt;span style="color: #333333;"&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.kali.org/downloads/" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-size: 16px; line-height: 26px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;2.&amp;nbsp;BackTrack 5r3 :-&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjzK3wBVU1t7pm2rheS0QVbcNF8y0_T5VdvnHN3ct7-5-zEd8SDN041_NORX7qCETDq2bRsYScw3zx5EEL9xsgGQS3QAMV4dRjL3UbUxx7bpy2UNX9Q_V_O0GSGI0NRPHv-b82jzmX-T54M/s1600/bt5_personal_wallpaper_by_xxdigipxx-d3a5kg4-300x187.png" height="249" width="400" /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; font-size: 16px; line-height: 26px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;The evolution of BackTrack spans many years of development, penetration tests, and unprecedented help from the security community. BackTrack originally started with earlier versions of live Linux distributions called Whoppix, IWHAX, and Auditor. When BackTrack was developed, it was designed to be an all in one live cd used on security audits and was specifically crafted to not leave any remnants of itself on the laptop. It has since expanded to being the most widely adopted penetration testing framework in existence and is used by the security community all over the world.&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.backtrack-linux.org/downloads/" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;3.&amp;nbsp;BackBox Linux :-&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; color: #1c1c1c; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgovkh7b7mPbDHqA_pOKwaFEaf1kdlotwveK01BChGZS_iKz82IYwXO-KV0982Lpb8a4xyNbXF0Sfm2s5RtOzRLPot8QWH8eNfaOeHnujoRYZL7bRIqlKUMnLUzMIVnky2XJiopPvZL8kQm/s1600/backbox-2.png" height="320" width="400" /&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="border: 0px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;BackBox is a Linux distribution based on Ubuntu. It has been developed to perform penetration tests and security assessments. Designed to be fast, easy to use and provide a minimal yet complete desktop environment, thanks to its own software repositories, always being updated to the latest stable version of the most used and best known ethical hacking tools.&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.backbox.org/downloads" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;4.&amp;nbsp;Samurai Web Testing Framework :-&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi10x9r9V9KbUZhYcDa0mG3f0pRIet4DzlBAyLFcaX3mCKw33-MDN2yXJp4U0CSYJ-jlw9AncUp9M-omJEjtO9bTkiOv0BC615G6Qfs2OBaMEhmz4eiG5ESccJjGaG01gbe3_QLLcrz6XOz/s1600/Best-operating-system-used-for-Hacking13.jpg" height="120" width="400" /&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="border: 0px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;The Samurai Web Testing Framework is a live linux environment that has been pre-configured to function as a web pen-testing environment. The CD contains the best of the open source and free tools that focus on testing and attacking websites. In developing this environment, we have based our tool selection on the tools we use in our security practice. We have included the tools used in all four steps of a web pen-test.&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://sourceforge.net/projects/samurai/files/" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;5.&amp;nbsp;NodeZero Linux :-&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;img alt="Best-operating-system-used-for-Hacking1" class="aligncenter size-full wp-image-9123" height="268" src="http://rumy.alghazzawigroup.netdna-cdn.com/wp-content/uploads/2013/11/Best-operating-system-used-for-Hacking14.jpg" style="background-color: transparent; border: 0px; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px; padding: 0px; vertical-align: baseline;" width="400" /&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;Penetration testing and security auditing requires specialist tools.The natural path leads us to collecting them all in one handy place. However how that collection is implemented can be critical to how you deploy effective and robust testing.&lt;br /&gt;All though NodeZero Linux can be used as a “Live System” for occasional testing, its real strength comes from the understanding that a tester requires a strong and efficient system. This is achieved in our belief by working at a distribution that is a permanent installation, that benefits from a strong selection of tools, integrated with a stable linux environment.&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.nodezero-linux.org/downloads" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;6. &amp;nbsp;Knoppix STD :-&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; text-align: center;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgZr-a4aFJg3kn_7EyVES1Hiod1BG6rEqB1XCUDbAZd1bTR_N8rWardxphdZ-MFi0CiclNWgzsCjfsvSjmuCwlXPrIZNet-Xc-LXbKw1IS4l162nzMFuMeQ8AYdQw8bXFCdtFwdhWthrQyd/s1600/png_knoppix-std.png" height="240" width="320" /&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; display: inline !important; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; display: inline !important; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; display: inline !important; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;STD is a Linux-based Security Tool. Actually, it is a collection of hundreds if not thousands of open source security tools. It’s a Live Linux Distro, which means it runs from a bootable CD in memory without changing the native operating system of the host computer. Its sole purpose in life is to put as many security tools at your disposal with as slick an interface as it can.&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; color: #1c1c1c; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://s-t-d.org/download.html" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #990000;"&gt;7. &amp;nbsp;CAINE :-&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a class="fancybox" href="http://rumy.alghazzawigroup.netdna-cdn.com/wp-content/uploads/2013/11/Best-operating-system-used-for-Hacking16.jpg" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;img alt="Best-operating-system-used-for-Hacking1" class="aligncenter size-full wp-image-9126" height="320" src="http://rumy.alghazzawigroup.netdna-cdn.com/wp-content/uploads/2013/11/Best-operating-system-used-for-Hacking16.jpg" style="background-color: transparent; border: 0px; display: block; height: auto; margin: 0px auto; max-width: 100%; outline: 0px; padding: 0px; vertical-align: baseline;" width="320" /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: #073763;"&gt;CAINE (Computer Aided INvestigative Environment) is an Italian GNU/Linux live distribution created as a project of Digital Forensics&lt;br /&gt;CAINE offers a complete forensic environment that is organized to integrate existing software tools as software modules and to provide a friendly graphical interface.&lt;/span&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #333333; font-family: 'PT Serif', Georgia, 'Times New Roman', serif; font-weight: normal; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;a href="http://www.caine-live.net/page5/page5.html" style="background-color: transparent; border: 0px; color: #4bb6f5; margin: 0px; outline: 0px; padding: 0px; text-decoration: initial; vertical-align: baseline;" target="_blank"&gt;Download Now&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style="border: 0px; outline: 0px; padding: 0px 0px 10px; vertical-align: baseline;"&gt;
&lt;strong style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-color: transparent; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="color: red; font-family: 'PT Serif', Georgia, 'Times New Roman', serif;"&gt;see also:-&lt;/span&gt;&lt;a href="http://cyberfort.blogspot.com/2013/07/make-your-own-operating-system.html" style="color: #333333; font-weight: normal;" target="_blank"&gt; &lt;span style="font-family: Verdana, sans-serif;"&gt;How to Make your own operating system&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiGIYDwaR3Du49fk_8R5b-VI7ggsIhRnUh_0PE-wwiPThi03x7dbQVz19-4zoJQZdplG11UOTGUwAwQZXJTVIJgqoZs_qRwpf5ol7Bz9iAsG4HJxLLQDEiz72Ei1P4aT_qa8kR5POMSKGzn/s72-c/jarvis+Artificial+Intelligence+Assistant+Operating+System+for+Hackers+2.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Common Methods to Hack a Website</title><link>http://cyberfort.blogspot.com/2013/07/common-methods-to-hack-website.html</link><category>computer security</category><category>cyber crimes</category><category>e hacking</category><category>internet security</category><category>network</category><category>website</category><author>noreply@blogger.com (Unknown)</author><pubDate>Sun, 26 Jan 2014 07:55:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-3950658230222983766</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBG1l-iKosuEPdy8oMJnEA9OT0D394rechQywxzVQaIyiEYfuAi8eveckGopp0Xz01QRk39hPNBeZdtc8c5jmCo97b2bsjV6U7fQ6s0Bp5UYenSKSQEJMHG1FvVK3RrVDIuDZ6G-6a25gT/s1600/1.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBG1l-iKosuEPdy8oMJnEA9OT0D394rechQywxzVQaIyiEYfuAi8eveckGopp0Xz01QRk39hPNBeZdtc8c5jmCo97b2bsjV6U7fQ6s0Bp5UYenSKSQEJMHG1FvVK3RrVDIuDZ6G-6a25gT/s320/1.jpg" height="182" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: #4c1130;"&gt;Gone are the days when website hacking was a sophisticated art. Today any body can access through the Internet and start hacking your website. All that is needed is doing a search on google with keywords like “how to hack website”, “hack into a website”, “Hacking a website” etc. The following article is not an effort to teach you website hacking, but it has more to do with raising awareness on some common website hacking methods.&lt;/span&gt;&lt;/span&gt;&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;"&gt;&lt;span style="color: #4c1130;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;span style="color: #2f312a; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style="color: #20124d; font-size: large;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;b&gt;The Simple&amp;nbsp;SQL Injection&lt;span style="font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;&lt;/span&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;&lt;/span&gt;&lt;/span&gt;&amp;nbsp;Hack&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;SQL Injection involves entering SQL code into web forms, eg. login fields, or into the browser address field, to access and manipulate the database behind the site, system or application.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;When you enter text in the Username and&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: inherit !important; line-height: 20px; position: static;"&gt;&lt;span class="kLink" style="font-family: inherit !important; position: static;"&gt;Password&amp;nbsp;&lt;/span&gt;&lt;span class="kLink" style="font-family: inherit !important; position: static;"&gt;fields&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;of a login screen, the data you input is typically inserted into an&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;SQL command&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;. This command checks the data you've entered against the relevant table in the database. If your input matches table/row data, you're granted access (in the case of a login screen). If not, you're knocked back out.&lt;/span&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwhIqSj9c8JioOjGUiD8Q4p3hORcdFkvIEEM5kpUzAb7LaQXmZUav7DCDHQnC86nfVAoe62zgGAIfDEoVPg3UCdlY-5DujWezcBenhzsdrEnjKlr9ZM36rwvJMdamTie9dzitLVh-sxSU2/s1600/2.jpeg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwhIqSj9c8JioOjGUiD8Q4p3hORcdFkvIEEM5kpUzAb7LaQXmZUav7DCDHQnC86nfVAoe62zgGAIfDEoVPg3UCdlY-5DujWezcBenhzsdrEnjKlr9ZM36rwvJMdamTie9dzitLVh-sxSU2/s1600/2.jpeg" /&gt;&lt;/a&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;In its simplest form, this is how the SQL Injection works. It's impossible to explain this without reverting to code for just a moment. Don't worry, it will all be over soon.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Suppose we enter the following string in a User name field:&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;
&lt;b style="background-color: white; line-height: 20px;"&gt;&lt;span style="color: red; font-family: Verdana, sans-serif;"&gt;' OR 1=1&amp;nbsp;&lt;img alt="double-dash-txt.png" src="http://www.cmswire.com/images/double-dash-txt.png" height="10" style="border: 1px solid rgb(234, 238, 227); margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="12" /&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;The authorization SQL query that is run by the server, the command which must be satisfied to allow access, will be something along the lines of:&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;SELECT * FROM users WHERE username =&lt;span style="color: red;"&gt; ‘&lt;/span&gt;&lt;/span&gt;&lt;span style="color: red;"&gt;&lt;i style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;USRTEXT&lt;/i&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;'&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: #4c1130;"&gt;AND password&lt;/span&gt; = ‘&lt;/span&gt;&lt;i style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;PASSTEXT&lt;/i&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;’&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;…where&amp;nbsp;&lt;/span&gt;&lt;i style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;USRTEXT&lt;/i&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;i style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;PASSTEXT&lt;/i&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;are what the user enters in the login fields of the web form.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;So entering&amp;nbsp;&lt;/span&gt;&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;`&lt;span style="color: red;"&gt;OR 1=1 —&lt;/span&gt;&lt;/b&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: red;"&gt;&amp;nbsp;&lt;/span&gt;as your username, could result in the following actually being run:&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: #741b47;"&gt;SELECT * FROM users WHERE username&lt;/span&gt; = ‘&lt;/span&gt;&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;' &lt;span style="color: red;"&gt;OR 1=1 —&lt;/span&gt;&lt;/b&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;'&lt;span style="color: #4c1130;"&gt;AND password = '&lt;/span&gt;’&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Two things you need to know about this:&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;['] closes the [user-name] text field.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;'&lt;/span&gt;&lt;img alt="double-dash-txt.png" src="http://www.cmswire.com/images/double-dash-txt.png" height="10" style="background-color: white; border: 1px solid rgb(234, 238, 227); font-family: Arial, Helvetica, sans-serif; line-height: 20px; margin: 0px 4px 4px 0px; max-width: 99%; padding: 6px;" width="12" /&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;' is the SQL convention for Commenting code, and everything after Comment is ignored. So the actual routine now becomes:&lt;/span&gt;&lt;br /&gt;
&lt;i style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: #4c1130;"&gt;SELECT * FROM users WHERE user name&lt;/span&gt; = '' &lt;span style="color: red;"&gt;OR 1=1&lt;/span&gt;&lt;/i&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;1 is always equal to 1, last time I checked. So the authorization routine is now validated, and we are ushered in the front door to wreck havoc.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Let's hope you got the gist of that, and move briskly on.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;
&lt;span style="color: #20124d; font-size: large;"&gt;&lt;b&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Brilliant! I'm gonna go to hack a Bank!&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0ReJSn0ZOfQs-g-SWt8QHjWvaU0zs4xqjOS2xQnzuuOnV5wcFLj6LbR98Pt6RBnv6EYpVlOiNSW9Ywu4SfbHUUT4T5lUTJJ-84CyH2jHcR_PQBoeOeIwFpgBNd_RgRCekM1EIk-MtU2Ul/s1600/3.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi0ReJSn0ZOfQs-g-SWt8QHjWvaU0zs4xqjOS2xQnzuuOnV5wcFLj6LbR98Pt6RBnv6EYpVlOiNSW9Ywu4SfbHUUT4T5lUTJJ-84CyH2jHcR_PQBoeOeIwFpgBNd_RgRCekM1EIk-MtU2Ul/s1600/3.png" /&gt;&lt;/a&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Slow down, cowboy. This half-cooked method won't beat the systems they have in place up at Citibank,&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;evidently&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;But the process does serve to illustrate just what SQL Injection is all about — injecting code to manipulate a routine via a form, or indeed via the URL. In terms of login bypass via Injection, the hoary old&amp;nbsp;&lt;/span&gt;&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;' OR 1=1&lt;/b&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;is just one option. If a hacker thinks a site is vulnerable, there are cheat-sheets all over the web for login strings which can gain access to weak systems. Here are a couple more common strings which are used to dupe SQL validation routines:&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;username field examples:&lt;/span&gt;&lt;br /&gt;
&lt;ul style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="color: red;"&gt;admin'—&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="color: red;"&gt;') or ('a'='a&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="color: red;"&gt;”) or (“a”=”a&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span style="color: red;"&gt;hi” or “a”=”a&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;… and so on.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;
&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;span style="color: #20124d; font-size: large;"&gt;Cross&amp;nbsp;&lt;span style="font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;&lt;span class="kLink" style="font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;site&amp;nbsp;&lt;/span&gt;&lt;span class="kLink" style="font-family: inherit !important; font-weight: inherit !important; position: static;"&gt;scripting&lt;/span&gt;&lt;/span&gt;&amp;nbsp;( XSS ):&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ8_g5ssA2c7Ayxt1PonQ_DTweG0F0wEI5xtNY4fQWwAFw32nPii1s69IROUtcukhyphenhyphene0bgKPHvwtFrZEH6z1t_ptQiIVWn6oATMwGMRnC9a-iNOy_JL6TfzFOJVimf9IJ2DQSeJsdhXhNZ/s1600/4.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjZ8_g5ssA2c7Ayxt1PonQ_DTweG0F0wEI5xtNY4fQWwAFw32nPii1s69IROUtcukhyphenhyphene0bgKPHvwtFrZEH6z1t_ptQiIVWn6oATMwGMRnC9a-iNOy_JL6TfzFOJVimf9IJ2DQSeJsdhXhNZ/s1600/4.jpeg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;Cross-site scripting or XSS is a threat to a&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: inherit !important; line-height: 20px; position: static;"&gt;&lt;span class="kLink" style="font-family: inherit !important; position: static;"&gt;website's&amp;nbsp;&lt;/span&gt;&lt;span class="kLink" style="font-family: inherit !important; position: static;"&gt;security&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;. It is the most common and popular hacking a website&lt;/span&gt;&lt;b style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&amp;nbsp;&lt;/b&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;to gain access information from a user on a website. There are hackers with malicious objectives that utilize this to attack certain websites on the Internet. But mostly good hackers do this to find security holes for websites and help them find solutions. Cross-site scripting is a security loophole on a website that is hard to detect and stop, making the site vulnerable to attacks from malicious hackers. This security threat leaves the site and its users open to identity theft, financial theft and data theft&lt;/span&gt;&lt;span style="background-color: white; font-family: inherit !important; line-height: 20px; position: static;"&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; font-family: inherit !important; position: static;"&gt;&lt;/span&gt;&lt;span class="kLink" style="background-color: transparent; border-bottom-color: blue; border-bottom-style: solid; border-bottom-width: 1px; font-family: inherit !important; position: static;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;. It would be advantageous for website owners to understand how cross-site scripting works and how it can affect them and their users so they could place the necessary security systems to block cross-site scripting on their website.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;b&gt;&lt;span style="color: #20124d; font-size: large;"&gt;Denial of service ( Ddos attack )&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #2f312a; font-size: large; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; color: #2f312a; font-size: large; text-align: center;"&gt;
&lt;b&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZSozlTUlYxAJRXRQOy37-I6Xpi-PV4H0l5WCDeaORn6t4iJ8ztzjJxlZYiT_u8DjazVT3T7TrnnhsCpGBmYBmUTMCx7C7dAEu4fYoM0DzAP7BxvQ5felO02TuvQ3eKcyFhZ3TUj3icP1f/s1600/5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhZSozlTUlYxAJRXRQOy37-I6Xpi-PV4H0l5WCDeaORn6t4iJ8ztzjJxlZYiT_u8DjazVT3T7TrnnhsCpGBmYBmUTMCx7C7dAEu4fYoM0DzAP7BxvQ5felO02TuvQ3eKcyFhZ3TUj3icP1f/s1600/5.jpg" /&gt;&lt;/a&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; color: #2f312a; font-size: large; text-align: center;"&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; display: inline !important; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-weight: normal; text-align: start;"&gt;A&lt;/span&gt;&lt;span style="color: #4c1130;"&gt;&lt;span style="text-align: start;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b style="text-align: start;"&gt;denial of service attack (DOS)&lt;/b&gt;&lt;/span&gt;&lt;span style="font-weight: normal; text-align: start;"&gt;&amp;nbsp;is an attack through which a person can render a system unusable or significantly slow down the system for legitimate users by overloading the resources, so that no one can access it.this is not actually hacking a webite but it is used to take down a website.&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b style="font-family: Arial, Helvetica, sans-serif; line-height: 20px;"&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="font-family: Verdana, sans-serif;"&gt;If an attacker is unable to gain access to a machine, the attacker most probably will just crash the machine to accomplish a denial of service attack,this one of the most used method for website hacking&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;b style="text-align: start;"&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;b style="text-align: start;"&gt;&lt;b&gt;&lt;span style="color: #20124d; font-family: Verdana, sans-serif; font-size: large;"&gt;Cookie Poisoning:&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/div&gt;
&lt;b style="text-align: start;"&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="font-size: 13px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="text-align: start;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;Well, for a starters i can begin with saying that Cookie Poisoning is alot like &lt;span style="color: red;"&gt;SQL Injection&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;Both have &lt;span style="color: red;"&gt;'OR'1'='1&lt;/span&gt; or maybe &lt;span style="color: red;"&gt;'1'='1'&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;But in cookie poisoning you begin with alerting your cookies&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;&lt;b&gt;&lt;span style="color: #4c1130;"&gt;Javascript:alert(document.cookie)&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;Then you will perharps see&lt;span style="color: #0c343d;"&gt; "username=JohnDoe" &lt;/span&gt;and &lt;span style="color: #073763;"&gt;"password=iloveJaneDoe"&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;in this case the cookie poisoning could be:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="color: #4c1130;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;&lt;b&gt;Javascript:void(document.cookie="username='OR'1'='1"); void(document.cookie="password='OR'1'='1");&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;It is also many versions of this kind... like for example&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;'&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="color: red; font-weight: normal;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;'1'='1'&lt;/span&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;'OR'1'='1&lt;/span&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;'OR'1'='1'OR'&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;and so on...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;You may have to try 13 things before you get it completely right...&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-weight: normal; line-height: 20px; text-align: start;"&gt;&lt;b&gt;&lt;br /&gt;&lt;span style="color: #20124d; font-family: Verdana, sans-serif; font-size: large;"&gt;Password Cracking&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; color: #2f312a; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;Hashed strings can often be deciphered through&lt;span style="color: #4c1130;"&gt; 'brute forcing'.&lt;/span&gt; Bad news, eh? Yes, and particularly if your encrypted passwords/usernames are floating around in an unprotected file somewhere, and some Google hacker comes across it.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;You might think that just because your password now looks something like &lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;&lt;b&gt;&lt;span style="color: #a64d79;"&gt;XWE42GH64223JHTF6533H&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt; in one of those files, it means that it can't be cracked? Wrong. Tools are freely available which will decipher a certain proportion of hashed and similarly encoded passwords.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;Know more about Brute force attack&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;A Few Defensive Measures&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;br style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;" /&gt;&lt;/span&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* If you utilize a web content management system, subscribe to the development blog. Update to new versions soon as possible.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* Update all 3rd party modules as a matter of course — any modules incorporating web forms or enabling member file uploads are a potential threat. Module&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: white; font-family: inherit !important; font-weight: normal; line-height: 20px; position: static; text-align: start;"&gt;&lt;span class="kLink" style="font-family: inherit !important; position: static;"&gt;vulnerabilities&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;&amp;nbsp;can offer access to your full database.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* Harden your Web CMS or publishing platform. For example, if you use WordPress, use this guide as a reference.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: start;"&gt;* If you have an admin login page for your custom built CMS, why not call it&lt;span style="color: #4c1130;"&gt; &lt;b&gt;'Flowers.php' &lt;/b&gt;&lt;/span&gt;or something, instead of&lt;b&gt; &lt;span style="color: #4c1130;"&gt;“AdminLogin.php”&lt;/span&gt;&lt;/b&gt; etc.?&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* Enter some confusing data into your login fields like the sample Injection strings shown above, and any else which you think might confuse the server. If you get an unusual error message disclosing server-generated code then this may betray vulnerability.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* Do a few Google hacks on your name and your website. Just in case…&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="text-align: start;"&gt;&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;* When in doubt, pull the yellow cable out! It won't do you any good, but hey, it rhymes.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="text-align: start;"&gt;
&lt;div style="text-align: justify;"&gt;
&lt;span style="background-color: white; font-family: Arial, Helvetica, sans-serif; font-weight: normal; line-height: 20px; text-align: start;"&gt;&lt;span style="color: red;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: start;"&gt;
&lt;span style="color: red; font-family: Arial, Helvetica, sans-serif;"&gt;&lt;span style="line-height: 20px;"&gt;hope u like this article...&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBG1l-iKosuEPdy8oMJnEA9OT0D394rechQywxzVQaIyiEYfuAi8eveckGopp0Xz01QRk39hPNBeZdtc8c5jmCo97b2bsjV6U7fQ6s0Bp5UYenSKSQEJMHG1FvVK3RrVDIuDZ6G-6a25gT/s72-c/1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Apple Wins Big Against Samsung In Court in South Corea</title><link>http://cyberfort.blogspot.com/2014/01/apple-wins-big-against-samsung-in-court.html</link><category>apps and software</category><category>conservations</category><category>cyber crimes</category><category>e news</category><category>gadgets</category><category>mobile</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 22 Jan 2014 22:39:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-3201708034250920361</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s1600/rulesgavel.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="apple win aganist sumsang" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s1600/rulesgavel.jpg" height="400" title="apple win aganist sumsang" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #073763; font-family: 'Trebuchet MS', sans-serif; line-height: 15pt; text-align: justify;"&gt;Samsung&amp;nbsp;&lt;/span&gt;&lt;b style="color: #073763; font-family: 'Trebuchet MS', sans-serif; line-height: 15pt; text-align: justify;"&gt;lost its bid on Thursday&lt;/b&gt;&lt;span style="color: #073763; font-family: 'Trebuchet MS', sans-serif; line-height: 15pt; text-align: justify;"&gt;&amp;nbsp;to ban sales of Apple's older iPhone and iPad
models in South Korea. A court dismissed a lawsuit, filed in March 2012,
claiming the U.S. firm had infringed on three &amp;nbsp;of Samsung's mobile patents.&lt;/span&gt;&lt;br /&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin: 7.5pt 0in 0.0001pt; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;The lawsuit was
another part of Samsung's global courtroom war with Apple dating back to 2011
when the iPhone company first sued Samsung for copying the look and feel of its
products.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin: 7.5pt 0in 0.0001pt; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Trebuchet MS, sans-serif;"&gt;"We are glad the
Korean court joined others around the world in standing up for real innovation
and rejecting Samsung's ridiculous claims," Apple Korea spokesman Steve
Park said.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin: 7.5pt 0in 0.0001pt; text-align: justify;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="color: #073763;"&gt;A judge at the Seoul
Central District Court said that Apple products did not violate Samsung patents
on the display of short messages and group messaging features. The court ruled
against a sale ban on the products and subsequently threw out Samsung's claim
for $95,100 (£58,000, AU$105,000) in damages.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="margin: 15pt 0in 7.5pt; text-align: justify;"&gt;
&lt;b&gt;&lt;span style="color: #660000; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;Necessary measures&lt;/span&gt;&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin-bottom: 0.0001pt; text-align: justify;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;Samsung said it would carefully review the ruling before
deciding on whether to launch an appeal. "We are disappointed with the
court's decision …. Apple has continued to infringe our patented mobile
technologies [so] we will continue to take the measures necessary to protect
our intellectual property rights," Samsung said in a statement.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin: 7.5pt 0in 0.0001pt; text-align: justify;"&gt;
&lt;span style="color: #274e13; font-family: Trebuchet MS, sans-serif;"&gt;Similar rulings in the
past have gone in Samsung's favour. In August last year the same South Korean
court ordered Apple to pay $38,000 (£23,100, $AU42,000) in damages for
infringing on wireless technology patents.&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="line-height: 15pt; margin: 7.5pt 0in 0.0001pt; text-align: justify;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;&lt;span style="color: #274e13;"&gt;Thursday's court
ruling comes after a German court in Mannheim dismissed Apple's claim that
Samsung infringed on a utility patent. Apple and Samsung have gone to trial
twice in the past two years in California, where juries awarded Apple $930
million (£567 million, AU$1 billion) in damages.&lt;/span&gt;&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="text-align: justify;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;i&gt;&lt;span style="color: #783f04;"&gt;&lt;span style="background-color: #f9f9f9; font-family: open_sansregular, HelveticaNeue, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 26px;"&gt;Here’s the complete ruling courtesy of&amp;nbsp;&lt;/span&gt;&lt;a href="http://www.fosspatents.com/2014/01/us-court-finds-samsung-to-infringe-one.html" style="background-color: #f9f9f9; box-sizing: border-box; font-family: open_sansregular, HelveticaNeue, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 26px; outline: 0px; text-decoration: initial;" target="_blank"&gt;FOSS Patents&lt;/a&gt;&lt;span style="background-color: #f9f9f9; font-family: open_sansregular, HelveticaNeue, Helvetica, Arial, sans-serif; font-size: 16px; line-height: 26px;"&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;div style="-x-system-font: none; display: block; font-family: Helvetica,Arial,Sans-serif; font-size-adjust: none; font-size: 14px; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal; margin: 12px auto 6px auto;"&gt;
&lt;a href="http://www.scribd.com/doc/201362938" style="text-decoration: underline;" title="View 14-01-21 Apple v. Samsung Summary Judgment Order on Scribd"&gt;14-01-21 Apple v. Samsung Summary Judgment Order&lt;/a&gt;&lt;/div&gt;
&lt;iframe class="scribd_iframe_embed" data-aspect-ratio="undefined" data-auto-height="false" frameborder="0" height="600" id="doc_17033" scrolling="no" src="//www.scribd.com/embeds/201362938/content?start_page=1&amp;amp;view_mode=scroll&amp;amp;show_recommendations=true" width="100%"&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;




&lt;!-- Blogger automated replacement: "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s1600/rulesgavel.jpg" with "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s1600/rulesgavel.jpg" --&gt;&lt;!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2F2.bp.blogspot.com%2F-yQxEG_Ep15s%2FUt_6bbKaHaI%2FAAAAAAAACBc%2FWFu0SQo8q3I%2Fs1600%2Frulesgavel.jpg&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s1600/rulesgavel.jpg" --&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFYEJnR9fnYNo0XJq1VdfaOWlrraU4kH__UMtF37NMLm8-8dmD7qBpmwzWl9Ys3g4NXIAxKcA5Jfzm4v5TFgDun_lVKmlTBw5uTMs8FQTBefvB1waF1D_pSilC53abTPoSayBCQcxdjgTm/s72-c/rulesgavel.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Block PopUp Ads On Your Android Smartphone</title><link>http://cyberfort.blogspot.com/2014/01/how-to-block-popup-ads-on-your-android.html</link><category>Android</category><category>apps and software</category><category>computer security</category><category>gadgets</category><category>mobile</category><author>noreply@blogger.com (Unknown)</author><pubDate>Wed, 22 Jan 2014 08:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-7119379384076219179</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em; text-align: center;"&gt;
&lt;img alt="block popups ads on android" border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXwBcTDY7FoNwflY-k6ZMJ08Ew3zL4aEQTnqJZSngdViU9slUt9OrlcMeW0jv7uQEyqd7QcRaWGP9kfZXVZDcuNBC13GRRwgBl3oIHTKNk_7rv_2A1LG339HN-EwcvRwPvHWAqf5kaPwmm/s1600/android.jpg" height="300" title="block popups ads on android" width="400" /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="MsoNormal" style="background-color: white;"&gt;
&lt;span style="font-family: Trebuchet MS, sans-serif;"&gt;Ads and pop-up windows on your computer are one of the most annoying things in the world, and that's why practically everyone has a pop-up and ad blocker installed on their desktop. But for some strange reason not everyone bothers to do the same thing for their Android - and then suffers from various sites that pop up more windows and tabs than you can poke&lt;br /&gt;&lt;a href="" name="more"&gt;&lt;/a&gt;a honey-covered stick at (for catching the pop-ups with, you see). Suffer no more! We'll show you the best way to block ads, including pop-ups, on your Android.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm; text-align: center;"&gt;
&lt;span style="color: #783f04; font-family: Trebuchet MS, sans-serif;"&gt;&lt;i&gt;You can disable ads, video ads, sound ads and pop-ups (as well as all ads!).&lt;/i&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #222222; margin-bottom: 0cm;"&gt;
&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="color: red; font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;see also :- &lt;a href="http://cyberfort.blogspot.com/2013/09/top-60-best-free-android-apps.html" target="_blank"&gt;Top 60 Free Apps on ANDROID Smartphones&lt;/a&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;&lt;i&gt;&lt;span style="color: #660000;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;&lt;i&gt;&lt;span style="color: #660000;"&gt;Instructions&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br style="background-color: #e7f2fa; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;Step 1:&lt;/span&gt;&lt;/b&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Open the Web browser on your Android smartphone. Type the URL address, “market.android.com” in the “Search” text box. Tap on the magnifying glass icon (search button).&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 2:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Tap on the “Gmail” link located near the top of the page. Use your Gmail account information to log on to Android Market. Enter your username in the “Username” text box. Enter your password in the “Password” text box and tap the “Sign In” button.&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 3:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Type the keywords “ad blocker” in the “Search” text box on the homepage. Tap on the magnifying glass icon (search button). Browse the list of free ad-blocker applications. Scroll down the page until you see one that will block and prevent popup ads from appearing on your phone.&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 4:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Tap on the “Install” or “Buy” button next to the name of the ad-blocker application that you want to download on your Android smartphone. If you want to buy an ad-blocker application, you will need to provide your credit card information to make the purchase. Follow the website's instructions for purchasing the ad-blocker application.&amp;nbsp;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 5:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Tap the “OK” button and confirm that you want to install the application. Follow the on-screen instructions for downloading the ad-blocker application. When the installation is complete, go to the “Application” list and tap the ad-blocker icon to launch the application.&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 6:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Follow the ad-blocker application instructions on how to use the software to block popup ads. For example, if you're using “Ad Blocker” on your phone, tap on an application icon that you want the ad-blocker application to block popup ads. A popup menu will appear on your display screen. Select the “Block” option to add the application to the Ad Block list. To remove the application from the Ad Block list, tap on the “Unblock” option.&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;b&gt;Step 7:&lt;/b&gt;&lt;/span&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;br style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;" /&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;Go to “Menu” and then “Setting” to enable or disable the Ad Blocker service. If you want to disable your Internet connection to prevent popup ads from appearing on your phone, tap the “Home” key and use your finger to press down on an empty area on the Home screen. Select “Add to Home Screen Menu” and then select “Widgets” and “Network Toggle.” Tap on the network icon to turn the Internet connection on or off.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;&lt;span style="background-color: #e7f2fa; color: #2c2c2c; line-height: 18.1875px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="color: red; font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="color: red; font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;span style="background-color: #e7f2fa; line-height: 18.1875px;"&gt;see also:-&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: #ececec;"&gt;&lt;a href="http://cyberfort.blogspot.com/2013/10/how-to-unlock-android-pattern-lock-and.html" target="_blank"&gt;How to Unlock Android Pattern Lock Or Password&lt;/a&gt;&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; margin-bottom: 0cm;"&gt;
&lt;span style="color: red; font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXwBcTDY7FoNwflY-k6ZMJ08Ew3zL4aEQTnqJZSngdViU9slUt9OrlcMeW0jv7uQEyqd7QcRaWGP9kfZXVZDcuNBC13GRRwgBl3oIHTKNk_7rv_2A1LG339HN-EwcvRwPvHWAqf5kaPwmm/s72-c/android.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How To Prevent cut, paste, copy, delete, re-naming of files &amp; folders.</title><link>http://cyberfort.blogspot.com/2014/01/how-to-prevent-cut-paste-copy-delete-re.html</link><category>all tech</category><category>computer security</category><category>file</category><category>internet security</category><author>noreply@blogger.com (Unknown)</author><pubDate>Tue, 21 Jan 2014 21:03:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3431094707335092807.post-2786549519333128793</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: justify;"&gt;
&lt;span style="color: #274e13; font-family: Helvetica Neue, Arial, Helvetica, sans-serif;"&gt;We are pleased to release&lt;strong&gt;&amp;nbsp;Prevent v 1.0,&lt;/strong&gt;&amp;nbsp;a&amp;nbsp;freeware&amp;nbsp;app which runs on all Windows. If you don’t want anyone deleting or renaming or messing around with your data,&lt;em&gt;&amp;nbsp;maybe your younger sibling&lt;/em&gt;, then Prevent may be able to help you.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinZZDgKH65wUHmluXjUHtQxGyOVXm28fyjw2PeRH9ztKqf0MGLUEjfEP4aLB14drjhmHbOUTly-VL_EVIxKq91GND-N1PtC6pJmTklnf_luXO9zxO3W1tWSHutAE3Gt3dt2O_Ic36tkpQr/s1600/prevent.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinZZDgKH65wUHmluXjUHtQxGyOVXm28fyjw2PeRH9ztKqf0MGLUEjfEP4aLB14drjhmHbOUTly-VL_EVIxKq91GND-N1PtC6pJmTklnf_luXO9zxO3W1tWSHutAE3Gt3dt2O_Ic36tkpQr/s1600/prevent.jpg" height="260" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;The downloaded zip file consists of:&lt;br /&gt;1. Prevent.exe&lt;br /&gt;2. Pre_1&lt;br /&gt;3. Pre_2&lt;br /&gt;4. Read Me file.&lt;br /&gt;5. Uninstall&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;Run the Prevent installer setup.&amp;nbsp;&lt;em&gt;The installer only places the Prevent folder in the system Program Files folder&lt;/em&gt;. A desktop shortcut will also be created. To run the program, click on Prevent. Set your Hot key to stop Prevent. You may set it as&lt;strong&gt;Ctrl+P&amp;nbsp;&lt;/strong&gt;&lt;span class="gmw_"&gt;&lt;span class="gmw_"&gt;if you wish.&amp;nbsp;Hotkeys&amp;nbsp;Win+F8&amp;nbsp;kills Pre_1 and Win+F9&amp;nbsp;&lt;span class="gm_ gm_28839cc9-2519-e6e7-d711-9119c5caf8ff gm-spell"&gt;kills&lt;/span&gt;&amp;nbsp;Pre_2, too. But the single&amp;nbsp;&lt;/span&gt;&lt;span class="gm_ gm_94352a80-745a-5dda-8209-2653e9ea5555 gm-spell"&gt;hotkey&lt;/span&gt;&amp;nbsp;set by you will kill all Prevent processes at the same time.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;strong&gt;Prevent :&lt;/strong&gt;1. Stops Cut&lt;br /&gt;2. Stops Paste&lt;br /&gt;3. Stops Copy&lt;br /&gt;4. Stops Delete&lt;br /&gt;5. Stops Copy To&lt;br /&gt;6. Stops Move to&lt;br /&gt;7. Stops Send To&lt;br /&gt;8. Prevents renaming&lt;br /&gt;&lt;span class="gmw_"&gt;9. Disables Task Manager’s End Process button. Alsoit doesn’t allow you to right click on process name and click on end process. It also grays out the context menu items, disable Ctrl+C, Ctrl+X&amp;nbsp;and Ctrl+V and/or stops the process.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: justify;"&gt;
&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;To uninstall or remove Prevent, use the Uninstaller situated in the Prevent folder, or uninstall it via the Control Panel or simply delete its Program folder.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; line-height: 20px; margin-bottom: 10px; text-align: center;"&gt;
&lt;a href="http://www.thewindowsclub.com/downloads/Prevent.zip?8c730d" style="outline: 0px;"&gt;&lt;span style="color: #073763; font-family: Verdana, sans-serif;"&gt;&lt;img alt="download1 Prevent cut, paste, copy, delete, re naming of files &amp;amp; folders." class="aligncenter size-full wp-image-760" height="48" src="http://thewindowsclub.thewindowsclubco.netdna-cdn.com/wp-content/uploads/2009/04/download1.gif" style="border: 0px; clear: both; display: block; height: auto; margin: 1.625em auto; max-width: 97.5%; vertical-align: middle; width: auto;" title="Download" width="48" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEinZZDgKH65wUHmluXjUHtQxGyOVXm28fyjw2PeRH9ztKqf0MGLUEjfEP4aLB14drjhmHbOUTly-VL_EVIxKq91GND-N1PtC6pJmTklnf_luXO9zxO3W1tWSHutAE3Gt3dt2O_Ic36tkpQr/s72-c/prevent.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><enclosure length="-1" type="application/zip" url="http://www.thewindowsclub.com/downloads/Prevent.zip?8c730d"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>We are pleased to release&amp;nbsp;Prevent v 1.0,&amp;nbsp;a&amp;nbsp;freeware&amp;nbsp;app which runs on all Windows. If you don’t want anyone deleting or renaming or messing around with your data,&amp;nbsp;maybe your younger sibling, then Prevent may be able to help you. The downloaded zip file consists of: 1. Prevent.exe 2. Pre_1 3. Pre_2 4. Read Me file. 5. Uninstall Run the Prevent installer setup.&amp;nbsp;The installer only places the Prevent folder in the system Program Files folder. A desktop shortcut will also be created. To run the program, click on Prevent. Set your Hot key to stop Prevent. You may set it asCtrl+P&amp;nbsp;if you wish.&amp;nbsp;Hotkeys&amp;nbsp;Win+F8&amp;nbsp;kills Pre_1 and Win+F9&amp;nbsp;kills&amp;nbsp;Pre_2, too. But the single&amp;nbsp;hotkey&amp;nbsp;set by you will kill all Prevent processes at the same time. Prevent :1. Stops Cut 2. Stops Paste 3. Stops Copy 4. Stops Delete 5. Stops Copy To 6. Stops Move to 7. Stops Send To 8. Prevents renaming 9. Disables Task Manager’s End Process button. Alsoit doesn’t allow you to right click on process name and click on end process. It also grays out the context menu items, disable Ctrl+C, Ctrl+X&amp;nbsp;and Ctrl+V and/or stops the process. To uninstall or remove Prevent, use the Uninstaller situated in the Prevent folder, or uninstall it via the Control Panel or simply delete its Program folder.</itunes:subtitle><itunes:author>noreply@blogger.com (Unknown)</itunes:author><itunes:summary>We are pleased to release&amp;nbsp;Prevent v 1.0,&amp;nbsp;a&amp;nbsp;freeware&amp;nbsp;app which runs on all Windows. If you don’t want anyone deleting or renaming or messing around with your data,&amp;nbsp;maybe your younger sibling, then Prevent may be able to help you. The downloaded zip file consists of: 1. Prevent.exe 2. Pre_1 3. Pre_2 4. Read Me file. 5. Uninstall Run the Prevent installer setup.&amp;nbsp;The installer only places the Prevent folder in the system Program Files folder. A desktop shortcut will also be created. To run the program, click on Prevent. Set your Hot key to stop Prevent. You may set it asCtrl+P&amp;nbsp;if you wish.&amp;nbsp;Hotkeys&amp;nbsp;Win+F8&amp;nbsp;kills Pre_1 and Win+F9&amp;nbsp;kills&amp;nbsp;Pre_2, too. But the single&amp;nbsp;hotkey&amp;nbsp;set by you will kill all Prevent processes at the same time. Prevent :1. Stops Cut 2. Stops Paste 3. Stops Copy 4. Stops Delete 5. Stops Copy To 6. Stops Move to 7. Stops Send To 8. Prevents renaming 9. Disables Task Manager’s End Process button. Alsoit doesn’t allow you to right click on process name and click on end process. It also grays out the context menu items, disable Ctrl+C, Ctrl+X&amp;nbsp;and Ctrl+V and/or stops the process. To uninstall or remove Prevent, use the Uninstaller situated in the Prevent folder, or uninstall it via the Control Panel or simply delete its Program folder.</itunes:summary><itunes:keywords>all tech, computer security, file, internet security</itunes:keywords></item></channel></rss>