<?xml version='1.0' encoding='UTF-8'?><rss xmlns:atom="http://www.w3.org/2005/Atom" xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/" xmlns:blogger="http://schemas.google.com/blogger/2008" xmlns:georss="http://www.georss.org/georss" xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr="http://purl.org/syndication/thread/1.0" version="2.0"><channel><atom:id>tag:blogger.com,1999:blog-4572740781380543251</atom:id><lastBuildDate>Wed, 01 Oct 2025 06:59:05 +0000</lastBuildDate><category>Mobile hacking</category><category>Facebook Hacking</category><category>Keylogger</category><category>Networks</category><category>Phishing</category><category>Tips</category><category>Website Hacking</category><category>Hacking News</category><category>Hacking Software</category><category>Antivirus</category><category>Cookie Stealing</category><category>Facebook</category><category>Gmail Hacking</category><category>Guest Post</category><category>Hack Wi-fi</category><category>Hotmail</category><category>Jailbreaking</category><category>Md5 Hash</category><category>NetBIOS</category><category>Paypal</category><category>Windows</category><category>Yahoo Hacking</category><category>AOL</category><category>Android Spy</category><category>Antilogger</category><category>Ardamax</category><category>BitTorent</category><category>Bluetooth</category><category>Buysellads Approval</category><category>Bypass Survey</category><category>Crypters</category><category>Decrypts</category><category>Dictionary Attacks</category><category>Dns Spoofing</category><category>FUD</category><category>Fake Mailer</category><category>Hacking Book</category><category>Hide Ip</category><category>IDM</category><category>Iphone</category><category>Istealers</category><category>Myspace</category><category>News</category><category>Orkut</category><category>Packet Sniffing</category><category>Password Cracking</category><category>RATS</category><category>Recovery</category><category>Reverse Engineering</category><category>Reverting</category><category>Sharecash Downloader</category><category>SniperSpy</category><category>Speed Boost</category><category>Spy Phone Gold</category><category>Twitter Hacking</category><category>USB Hacking</category><category>Website</category><category>XSS</category><category>Zemana</category><category>get facebook likes</category><title>My Hacking Tips</title><description>Learn how to Hack Ethically! Know more about Cyber Security and Technology. Get cool Computer Tricks, Tips, How-To guides and more. hack,how to hack a password,how to hack.</description><link>http://saqlainhacking.blogspot.com/</link><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><generator>Blogger</generator><openSearch:totalResults>67</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-450274796198274665</guid><pubDate>Thu, 29 Nov 2012 11:45:00 +0000</pubDate><atom:updated>2012-11-29T10:35:26.132-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>Is It Easier To Track or Monitor Any Mobile ?</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW_QhTRUckQjyMdlIhsHtyO0Kg8wY-u9BsHZanaE7VL2UbsEO9zlPxI-yNb6Us0jM9DCYDSncGKInHFUXvxI4V_pyIBdtkraB57VX34NWUZB4yMboNpS9encoTcMhu4HWKT1BviaD7hkM/s1600/Tracking-Software.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW_QhTRUckQjyMdlIhsHtyO0Kg8wY-u9BsHZanaE7VL2UbsEO9zlPxI-yNb6Us0jM9DCYDSncGKInHFUXvxI4V_pyIBdtkraB57VX34NWUZB4yMboNpS9encoTcMhu4HWKT1BviaD7hkM/s1600/Tracking-Software.jpg&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background: white;&quot;&gt;Acquiring cell phones can be
burdensome as far as their security factors are concerned. There are various
smartphones such as Blackberry, iPhones, Androids, Windows Mobile, and many
more that are vulnerable to thefts and security threats. In order to safeguard
your cell phones from such threats, it is highly essential to monitor cell
phones. Well, you may find it to be a difficult task. However, the job of
tracking cell phones is now made easy with numerous &lt;/span&gt;&lt;b&gt;&lt;span style=&quot;background: white;&quot;&gt;&lt;a href=&quot;http://cellphonespy360.blogspot.com/&quot; target=&quot;_blank&quot;&gt;cell phonespy&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;background: white;&quot;&gt; applications in the market. These applications not only protect your cell
phones, but also tracks and monitors them. &lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;background: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;As far as tracking cell
phones are concerned, you can only track cell phones owned by you, or if you
have legal authority over them. If you want to track or monitor cell phones of
your kids, employees, or spouse, you can do so simply by installing mobile
monitoring applications such as Mobile Spy. The monitoring application can be installed
secretively without leaving an iota of clues behind. If you are keen to install
the monitoring application to track your cell phone, you need to follow the
following steps.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://saqlainhacking.blogspot.com/2012/09/is-it-easier-to-track-or-monitor-any.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/09/is-it-easier-to-track-or-monitor-any.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiW_QhTRUckQjyMdlIhsHtyO0Kg8wY-u9BsHZanaE7VL2UbsEO9zlPxI-yNb6Us0jM9DCYDSncGKInHFUXvxI4V_pyIBdtkraB57VX34NWUZB4yMboNpS9encoTcMhu4HWKT1BviaD7hkM/s72-c/Tracking-Software.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-474441246039194467</guid><pubDate>Thu, 25 Oct 2012 19:06:00 +0000</pubDate><atom:updated>2012-11-29T10:28:46.148-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Keylogger</category><title>Review on Latest Spyware Technologies and Applications</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG6EJ-C2iiAxrW2Bf8qVMmv5NqUa_18Od2QWaIaa8PgLF1D2hiqOJQE8oxC_301ttSppVmMhYFGgybThy0s1I7xyLeVkB9_gQ4NnS2Msg0S_VcAzXCFfAL73Kx_zUwHOY0V_0_rR4wgs0/s1600/Review+On+Latest+Spyware+And+Technology.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;178&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG6EJ-C2iiAxrW2Bf8qVMmv5NqUa_18Od2QWaIaa8PgLF1D2hiqOJQE8oxC_301ttSppVmMhYFGgybThy0s1I7xyLeVkB9_gQ4NnS2Msg0S_VcAzXCFfAL73Kx_zUwHOY0V_0_rR4wgs0/s200/Review+On+Latest+Spyware+And+Technology.png&quot; width=&quot;200&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot; style=&quot;line-height: 150%;&quot;&gt;
&lt;!--[if gte vml 1]&gt;&lt;v:shapetype
 id=&quot;_x0000_t75&quot; coordsize=&quot;21600,21600&quot; o:spt=&quot;75&quot; o:preferrelative=&quot;t&quot;
 path=&quot;m@4@5l@4@11@9@11@9@5xe&quot; filled=&quot;f&quot; stroked=&quot;f&quot;&gt;  &lt;v:stroke joinstyle=&quot;miter&quot;/&gt;  &lt;v:formulas&gt;   &lt;v:f eqn=&quot;if lineDrawn pixelLineWidth 0&quot;/&gt;   &lt;v:f eqn=&quot;sum @0 1 0&quot;/&gt;   &lt;v:f eqn=&quot;sum 0 0 @1&quot;/&gt;   &lt;v:f eqn=&quot;prod @2 1 2&quot;/&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelWidth&quot;/&gt;   &lt;v:f eqn=&quot;prod @3 21600 pixelHeight&quot;/&gt;   &lt;v:f eqn=&quot;sum @0 0 1&quot;/&gt;   &lt;v:f eqn=&quot;prod @6 1 2&quot;/&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelWidth&quot;/&gt;   &lt;v:f eqn=&quot;sum @8 21600 0&quot;/&gt;   &lt;v:f eqn=&quot;prod @7 21600 pixelHeight&quot;/&gt;   &lt;v:f eqn=&quot;sum @10 21600 0&quot;/&gt;  &lt;/v:formulas&gt;  &lt;v:path o:extrusionok=&quot;f&quot; gradientshapeok=&quot;t&quot; o:connecttype=&quot;rect&quot;/&gt;  &lt;o:lock v:ext=&quot;edit&quot; aspectratio=&quot;t&quot;/&gt; &lt;/v:shapetype&gt;&lt;v:shape id=&quot;_x0000_s1026&quot; type=&quot;#_x0000_t75&quot; style=&#39;position:absolute;
 margin-left:283.1pt;margin-top:34.5pt;width:212.9pt;height:190.4pt;z-index:251657728;
 mso-wrap-distance-left:0;mso-wrap-distance-right:0;mso-position-horizontal:absolute;
 mso-position-horizontal-relative:text;mso-position-vertical:absolute;
 mso-position-vertical-relative:text&#39; filled=&quot;t&quot;&gt;  &lt;v:fill color2=&quot;black&quot;/&gt;  &lt;v:imagedata src=&quot;file:///C:\DOCUME~1\Shabbar\LOCALS~1\Temp\msohtmlclip1\01\clip_image001.png&quot;
  o:title=&quot;&quot;/&gt;  &lt;w:wrap type=&quot;square&quot; side=&quot;largest&quot;/&gt; &lt;/v:shape&gt;&lt;![endif]--&gt;&lt;!--[if !vml]--&gt;&lt;!--[endif]--&gt;&lt;span style=&quot;font-family: &amp;quot;Verdana&amp;quot;,&amp;quot;sans-serif&amp;quot;; font-size: 10.5pt; line-height: 150%; mso-bidi-font-family: Calibri;&quot;&gt;Spyware is a technology through which you can collect all the information about a person secretly from the computers. If you’re tracking on the internet then it is known as tracking software. It is usually called as malicious software which is used to gather any person’s information without their knowledge and relay it to the interested people. It is can get into systems as a virus software or while installing any unsecured program. Spyware technologies can collect any kind of data that includes internet browsing history to bank account logins and passwords.&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://saqlainhacking.blogspot.com/2012/10/review-on-latest-spyware-technologies.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/10/review-on-latest-spyware-technologies.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiG6EJ-C2iiAxrW2Bf8qVMmv5NqUa_18Od2QWaIaa8PgLF1D2hiqOJQE8oxC_301ttSppVmMhYFGgybThy0s1I7xyLeVkB9_gQ4NnS2Msg0S_VcAzXCFfAL73Kx_zUwHOY0V_0_rR4wgs0/s72-c/Review+On+Latest+Spyware+And+Technology.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-921166490820552494</guid><pubDate>Mon, 22 Oct 2012 20:12:00 +0000</pubDate><atom:updated>2012-11-29T10:30:35.505-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>Mobile Spy : How To Hack Mobile Phones? Stealing Cellphone Logs Keystrokes</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://tehnoles.net/wp-content/uploads/2011/08/phone-hacking-5323l.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;http://tehnoles.net/wp-content/uploads/2011/08/phone-hacking-5323l.jpg&quot; width=&quot;186&quot;&gt;&lt;/a&gt;&lt;/div&gt;
I have written many tutorials and articles on hacking facebook hotmail yahoo recently, so today i am going to make another article on mobile hacking. As many people wants to see their girlfriends cheating them or not. So this method will spy the victims phone and will collect all the keystrokes and screenshots and will send to admin&amp;#39;s email. We can say it is a Mobile Spying method ( Phone keylogger ). So today i will teach you and show you some of the basics features of Mobile Spy.This method is only done on a mobile which is connected to any network.&lt;br&gt;
First of all let me explain you mobile spy? It is a kinda keylogger which record all the happening and logs fro your mobile device and send it to email. this includes all the media such as Videos, songs, pictures, even contacts, sim card information, the main thing is that it records all these things invisibly and secretly. So now you can hack mobiles easily.&lt;br&gt;
&lt;/div&gt;&lt;/div&gt;&lt;a href=&quot;http://saqlainhacking.blogspot.com/2012/04/mobile-spy-how-to-hack-mobile-phones.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/04/mobile-spy-how-to-hack-mobile-phones.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>12</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-6340080665717132090</guid><pubDate>Tue, 09 Oct 2012 12:00:00 +0000</pubDate><atom:updated>2012-11-29T10:30:08.664-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>Mobile Phones – Intruder’s Next Target</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhon-uAnSfGup3flJHTEWJq8bJ5Y71LYv4To7YzPsnOdodmji-TJIJgReyCPMvzsNHNyW5aOn7KlSLfdl0Yzd6M97wK5OAd-kLwlR8nF73CiWSwxEI0PCQbQQlQeQ2jDfmvzafkprHdSxg/s1600/hacking-phones.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;133&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhon-uAnSfGup3flJHTEWJq8bJ5Y71LYv4To7YzPsnOdodmji-TJIJgReyCPMvzsNHNyW5aOn7KlSLfdl0Yzd6M97wK5OAd-kLwlR8nF73CiWSwxEI0PCQbQQlQeQ2jDfmvzafkprHdSxg/s200/hacking-phones.png&quot; width=&quot;200&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Cell phones are the next aim of the hackers after they have tried their hands in almost all electronic devices. Even the latest mobile devices like androids and smartphones too are not safe. Mobile phones these days serve as a mini computing device with an array of modern apps and internet connection. It is the glitch in the chip manufacture that has induced the hackers more. &lt;/span&gt;&lt;br style=&quot;font-family: Verdana;&quot;&gt;&lt;br style=&quot;font-family: Verdana;&quot;&gt;&lt;span style=&quot;font-family: Verdana;&quot;&gt;Presently, many security measures are being adopted by the cell phone manufacturers, but still these devices are susceptible to hacking. Hackers target the Bluetooth mobile devices more than the ordinary ones. &lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://saqlainhacking.blogspot.com/2012/10/mobile-phones-intruders-next-target.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/10/mobile-phones-intruders-next-target.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhon-uAnSfGup3flJHTEWJq8bJ5Y71LYv4To7YzPsnOdodmji-TJIJgReyCPMvzsNHNyW5aOn7KlSLfdl0Yzd6M97wK5OAd-kLwlR8nF73CiWSwxEI0PCQbQQlQeQ2jDfmvzafkprHdSxg/s72-c/hacking-phones.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-4805938698361541725</guid><pubDate>Mon, 01 Oct 2012 11:19:00 +0000</pubDate><atom:updated>2012-11-29T10:31:27.634-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>Hack accounts with DroidSheep for Android – and how to protect yourself</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://appaggie.com/appimg/d/e/t/r/i/e/de.trier.infsec.koch.droidsheep-0&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://appaggie.com/appimg/d/e/t/r/i/e/de.trier.infsec.koch.droidsheep-0&quot;&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;Public access to WiFi gets most people excited. If only you had the slightest idea how vulnerable this leaves you to hacking. Surfing the web over unprotected wireless networks increases your chances of getting hacked through session hijacking. These days however, hackers don’t need a computer or program to take over your personal accounts. They can do it from their Android with an app called DroidSheep.&lt;/span&gt;&lt;br style=&quot;color: #454545;&quot;&gt;&lt;span style=&quot;color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;What is DroidSheep?&lt;/span&gt;&lt;br&gt;&lt;span style=&quot;color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;DroidSheep is a one-click session hijacking application for Android smartphones and tablets. The app can be used to hack accounts like Facebook, Twitter, LinkedIn, Yahoo, and others. Because it requires root access, you need a rooted Android for it to work.&lt;/span&gt; &lt;span style=&quot;color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;How does session hijacking work?&lt;/span&gt;&lt;span style=&quot;color: #454545;&quot;&gt; &lt;/span&gt;&lt;span style=&quot;color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;When you log in to your accounts over public WiFi using a browser, you send data to the wireless router and leave traces of your session id. A session id makes it possible to associate accounts with an identity. If you log in to Facebook for example, your Facebook session id will register on the router. People using the same wireless connection can hijack the session id and use Facebook with your identity. Facebook won’t be able to tell that someone else is using your account.&lt;/span&gt;&lt;/span&gt;&lt;br&gt;
&lt;/div&gt;&lt;a href=&quot;http://saqlainhacking.blogspot.com/2012/10/hack-accounts-with-droidsheep-for.html#more&quot;&gt;Read more »&lt;/a&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/10/hack-accounts-with-droidsheep-for.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-6664752829242311767</guid><pubDate>Thu, 20 Sep 2012 14:50:00 +0000</pubDate><atom:updated>2012-09-20T07:50:53.329-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook Hacking</category><title>How To Hack Facebook Account Through Mobile Phones</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpPdG4TDhfF0IxL78lPHIm6cT_N0nVW89bNQEJg9pc6pqzhSiPX91A-PBfYsHIyDvK5nHEdNgrXj5jKQ3rd4UoPFG7lnfp8MxblALillf8nH1EepPrP8pgjgdHGtEk0qd3dGMiwa6YvH0/s1600/facebook-hack.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpPdG4TDhfF0IxL78lPHIm6cT_N0nVW89bNQEJg9pc6pqzhSiPX91A-PBfYsHIyDvK5nHEdNgrXj5jKQ3rd4UoPFG7lnfp8MxblALillf8nH1EepPrP8pgjgdHGtEk0qd3dGMiwa6YvH0/s1600/facebook-hack.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
I have written many tutorials and articles on hacking facebook hotmail yahoo recently, so today i am going to make another article on mobile hacking. As many people wants to see their girlfriends cheating them or not. So this method will spy the victims phone and will collect all the keystrokes and screenshots and will send to admin&#39;s email. We can say it is a Mobile Spying method ( Phone keylogger ). So today i will teach you and show you some of the basics features of Mobile Spy.This method is only done on a mobile which is connected to any network.&lt;br /&gt;
First of all let me explain you mobile spy? It is a kinda keylogger which record all the happening and logs fro your mobile device and send it to email. this includes all the media such as Videos, songs, pictures, even contacts, sim card information, the main thing is that it records all these things invisibly and secretly. So now you can hack mobiles easily.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Don’t forget to&amp;nbsp;&lt;a href=&quot;http://feeds.feedburner.com/myhackingtip&quot; title=&quot;Subscribe to our feed&quot;&gt;Subscribe to our RSS feed&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.facebook.com/plugins/like.php?app_id=254084787941982&amp;amp;href=http://www.facebook.com/myhackingtips&amp;amp;send=false&amp;amp;layout=standard&amp;amp;width=530&amp;amp;show_faces=false&amp;amp;action=like&amp;amp;colorscheme=light&amp;amp;font&amp;amp;height=35&quot; style=&quot;border-style: none; height: 35px; overflow: hidden; width: 530px;&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
Mobile Spy Features&lt;/h3&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
1) Smartphone Control panel&lt;br /&gt;
2) Live recorder&lt;br /&gt;
3) High interface&lt;br /&gt;
4) Monitor upto three devices&lt;br /&gt;
4) Invisible&lt;br /&gt;
5) Fast &amp;amp; Instant Download&lt;br /&gt;
6) Sniperspy&lt;br /&gt;
7) Screen captures&lt;br /&gt;
8) Records Text Messages&lt;br /&gt;
9) Undetectable&lt;br /&gt;
10) Online Tech support&lt;br /&gt;
11) Get Sim Information&lt;br /&gt;
12) Email all contacts&lt;br /&gt;
13) Record all Video and Pictures&lt;br /&gt;
14) Call From Device&lt;br /&gt;
15) lock and Unlock device&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Instant Download&lt;/strong&gt;&amp;nbsp;- Download INSTANTLY after ordering! Request new downloads anytime!&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Step-by-Step Instructions&lt;/strong&gt;&amp;nbsp;- Detailed instructions to guide you along every step of the way.&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Customizable Username&lt;/strong&gt;&amp;nbsp;- You&#39;ll create your own username and password for your account!&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Monitor up to THREE Devices&lt;/strong&gt;&amp;nbsp;- You can monitor up to three devices with one subscription!&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Online Tech Support&lt;/strong&gt;&amp;nbsp;- Should you need help we will provide unlimited 24/7 online support.&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;Free Updates&lt;/strong&gt;&amp;nbsp;- As a member you receive free updates to the software as they occur.&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;SniperSpy&lt;/strong&gt;&amp;nbsp;- Choose an annual subscription and also receive SniperSpy to monitor your PC.&lt;/li&gt;
&lt;li style=&quot;color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 19px; list-style-image: url(http://www.mobile-spy.com/images/tic.png); padding: 4px 0px 0px;&quot;&gt;&lt;strong&gt;The Truth&lt;/strong&gt;&amp;nbsp;- You will finally learn the TRUTH about what happens on your smartphone!&lt;/li&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h3&gt;
&lt;div class=&quot;featuresborderbox&quot; style=&quot;background-color: white; background-image: url(http://www.mobile-spy.com/images/contentboxheader01.png); background-position: 50% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 10px; border-bottom-right-radius: 10px; border-top-left-radius: 10px; border-top-right-radius: 10px; border: 2px solid rgb(214, 214, 214); color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; height: auto; line-height: 19px; margin-left: 0px; margin-top: 0px; padding: 1px 10px 0px; text-align: justify; width: 596px;&quot;&gt;
&lt;h2 class=&quot;dividermainf&quot; style=&quot;color: #00317c; font-size: 12px; margin-left: 0px; margin-top: 0px; padding-top: 0px;&quot;&gt;
How It Works&lt;/h2&gt;
This new technology might sound complicated but the process is actually quite easy using our online&amp;nbsp;User Guide&amp;nbsp;and other documentation. Below you will find a summarized version of how the entire process works. Remember, Mobile Spy works on many platforms including&amp;nbsp;BlackBerry&amp;nbsp;and&amp;nbsp;iPhone!&lt;br /&gt;
&lt;div class=&quot;howworksbox&quot; style=&quot;background-color: #d6d6d6; height: 250px; padding: 2px 15px 10px 10px;&quot;&gt;
&lt;div class=&quot;howimgpos&quot; style=&quot;background-image: url(http://www.mobile-spy.com/images/how_it_works.png); background-repeat: no-repeat no-repeat; float: left; height: 261px; width: 260px;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;howtext&quot; style=&quot;float: left; line-height: 21px; width: 300px;&quot;&gt;
&lt;ol type=&quot;A&quot;&gt;
&lt;li&gt;Customer purchases Mobile Spy and downloads software onto the phone to be monitored. Customer configures program according to their monitoring needs.&lt;/li&gt;
&lt;li&gt;Phone user performs SMS messages, URL browsing and call activities. Mobile Spy Records the activities and then silently uploads logs to the Mobile Spy servers.&lt;/li&gt;
&lt;li&gt;Customer logs into their online account from any Internet connected PC. Here they can view all recorded activities in near real time.&lt;/li&gt;
&lt;/ol&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clear20&quot; style=&quot;clear: both; height: 20px;&quot;&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
Below you will find an outline of the four steps involved in purchasing and setting up Mobile Spy on your phone.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
&lt;strong&gt;First Step: Make Purchase&amp;nbsp;&lt;/strong&gt;&lt;br /&gt;
In order to purchase this software you must first acknowledge and agree that you are the owner or authorized administrator of the device you wish to install the software onto. We&amp;nbsp;&lt;strong&gt;DO NOT&lt;/strong&gt;&amp;nbsp;condone or promote the use of our software for illegal purposes.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
If you qualify and are ready to purchase, go to the appropriate&amp;nbsp;&lt;a href=&quot;https://secure.avangate.com/order/checkout.php?CART_ID=c4d1053b9106ff4c6059b4d75d5444ed&quot; style=&quot;color: #06508c; font-weight: bold; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;Order Page&lt;/a&gt;&amp;nbsp;and complete all sections and agree to the Mobile Spy Legal Requirements. Click Next and then enter your billing information. Then complete the order and check your email.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
&lt;strong&gt;Second Step: Download Software to Phone&lt;/strong&gt;&lt;br /&gt;
After the order is complete, you will be instantly emailed a receipt with your registration code. This code is used to&amp;nbsp;Register&amp;nbsp;your account so you can create your username and password for your online account the logs will be stored in.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
This email will also contain a link to download the program. You can download and install the application onto the phone to be monitored easily using the included instructions. Also, the download and installation instructions can be found in our online&amp;nbsp;User Guide.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
After Mobile Spy is downloaded to the phone, you will run the installer file on the phone. The software installs into full stealth mode. No icons or other mentions of the software will be shown on the phone. Once the software is installed, you are ready to adjust settings.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
&lt;strong&gt;Third Step: Adjust Settings&lt;/strong&gt;&lt;br /&gt;
Once Mobile Spy is installed, it is hidden to the user of the phone. It is your responsibility to notify the user of monitoring. You can press a certain key sequence on the phone to bring up the Mobile Spy interface. From there you can change the various settings of the program.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
Use the instructions contained in the order email to enter the key sequence to bring up the interface. Select which Internet (GPRS) connection to use to upload logs. Select which activities you wish to monitor and then select the option to start monitoring.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
&lt;strong&gt;Fourth Step:Login to View Activities&lt;/strong&gt;&lt;br /&gt;
After you have started the monitoring it will remain active from that point on. Even if the phone is turned off and back on it will still remain active in the background. Activities will now be recorded and rapidly uploaded to your Mobile Spy account.&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #2e2e2e; font-family: Helvetica, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 13px; font-weight: normal; line-height: 19px; text-align: justify;&quot;&gt;
Then you can login to your account by visiting the&amp;nbsp;Login Page&amp;nbsp;anytime. After entering your username and password you will be brought to the Online Control Panel. Log entries are categorized by activity types on the left side. Click a type to start viewing!&lt;/div&gt;
&lt;/h3&gt;
&lt;div dir=&quot;ltr&quot; trbidi=&quot;on&quot;&gt;
&lt;b&gt;&lt;br /&gt;&lt;span style=&quot;text-align: justify;&quot;&gt;Thats it, Now you can receive all the happening on your mobile phone it is secured and kinda legal. You can also spy your girlfriend/ boyfriend.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;a href=&quot;https://www.mobilespylogs.com/ms6panel/home.php&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: blue;&quot;&gt;Live Demo&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555855&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;DOWNLOAD MOBILE SPY (12MONTHS)&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555853&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;DOWNLOAD MOBILE SPY (6MONTHS)&lt;/span&gt;&lt;/a&gt;&lt;br /&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555852&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;DOWNLOAD MOBILE SPY (3MONTHS)&lt;/span&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/09/how-to-hack-facebook-account-through.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhpPdG4TDhfF0IxL78lPHIm6cT_N0nVW89bNQEJg9pc6pqzhSiPX91A-PBfYsHIyDvK5nHEdNgrXj5jKQ3rd4UoPFG7lnfp8MxblALillf8nH1EepPrP8pgjgdHGtEk0qd3dGMiwa6YvH0/s72-c/facebook-hack.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-5309063744435879382</guid><pubDate>Thu, 13 Sep 2012 08:20:00 +0000</pubDate><atom:updated>2012-09-13T01:20:09.600-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>What Your Boss Sees on Your Computer</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxTuIl3W-PKxmazIz1JfCtQYzSC1P_Vla5Za7gogoQE0Ay5VkN7kYNzH8qKaHzjCZpfF0McrrE7tK807ZgUuOjn7abDKjqnyORpx3Bq_y2J9l6EsTzeXLyODc5ky1Ii5Wdmh41otFNCnw/s1600/guestpost45.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;312&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxTuIl3W-PKxmazIz1JfCtQYzSC1P_Vla5Za7gogoQE0Ay5VkN7kYNzH8qKaHzjCZpfF0McrrE7tK807ZgUuOjn7abDKjqnyORpx3Bq_y2J9l6EsTzeXLyODc5ky1Ii5Wdmh41otFNCnw/s400/guestpost45.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;“Do you agree to use your office computer for personal work?”&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;“Yes”&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&amp;nbsp;“You are guilty as
charged”&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;We’ve all used our office internet and computers to do some
personal errands. We’ve also sat at work and shopped or even used FaceBook and
Twittered around. If that was a crime then well, we’re all criminals then,
aren’t we?&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;It might seem that your employer would have no idea about
what you’re doing on your computer when you pretend to work but its time to
burst that happy bubble. Your boss knows exactly what you do on your computer
and when you do it, it’s a blessing of technology and employee monitoring strategies.
We usually don’t take the warning, “I’m keeping an eye on you” very seriously
but its time we should. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;New technology and spyware applications are installed in all
the devices employees work on. Although their basic task is to identify
employee performance and the use of company’s resources they also aim to
provide employers with ample information about their employees. With technology
like packet-sniffers, employers can easily go through all the internet content
you have viewed or are still viewing. Employers know the websites you visit and
what content you open in those websites. They also have complete access to all
the incoming and outgoing emails in your mailbox and whatever online data you
download. Anything and everything you do on Google Chrome, Mozilla FireFox or
Internet Explorer is easily accessible to your employers.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;So if you’re opening Facebook to reply to a friend’s wall
post or post a status about how boring or hectic work is, think twice because
your boss would know exactly what you type in and what comments you receive.
Although this is a breach of personal privacy it still is a part of employee
monitoring. Every time you open EBay or Amazon or any retail website to ponder
around products every once in a while to break your work monotony… well guess
who else would know? Your employer would be notified and hence would know
exactly what you’re doing. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Apart from packet-sniffers employers are also using desktop
monitoring to keep an eye on you. PC monitoring identifies whatever you type on
your keyboard and then notifies your boss about it. If you are connected to the
company’s portal and spending time chatting with your peers your boss would know
exactly what you type. PC monitoring software also takes up print screen shots
of your desktop screen and transmits them to your boss. Your employer would
know at all times what you’re doing at the computer and the print screen shot
would show the employer if you’re conducting serious office work or playing
Pac-man on your computer. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Finally employers use log-files, a history of data
compilation in your computer. Whatever content you have visited or downloaded
your employer would receive information about all of it with log-files.
Employers would know if you’ve download games onto your computer with the
company’s Wi-Fi or filled your ITunes and IPod with mp3 songs using the
company’s internet resources. Many times employers warn about such actions and might
even cut back some pay from your personal salary. &lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Your boss knows exactly what you’re doing on your computer
and when you’re doing it so every time you open up FaceBook, EBay or decide to
download a couple of mp3 songs for fun think twice because all your content is
easily viewable and accessible. So here is a fair warning, next time just think
before you type any funny or rude comment against your bosses tie, he might be
the one reading it even before you have posted it.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Author Bio:&lt;o:p&gt;&lt;/o:p&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;MsoNormal&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;i&gt;Beth has been playing with &lt;a href=&quot;http://www.cellphonespyreviews.net/android-spy-reviews/&quot;&gt;android spy software&lt;/a&gt;
technology for as far as she can remember. His pieces are funfair of
information for his readers on what&#39;s new and what&#39;s hot in the &lt;a href=&quot;http://www.cellphonespyreviews.net/&quot;&gt;cell spyware reviews&lt;/a&gt; market.&lt;br /&gt;&lt;br /&gt;&lt;/i&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/09/what-your-boss-sees-on-your-computer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjxTuIl3W-PKxmazIz1JfCtQYzSC1P_Vla5Za7gogoQE0Ay5VkN7kYNzH8qKaHzjCZpfF0McrrE7tK807ZgUuOjn7abDKjqnyORpx3Bq_y2J9l6EsTzeXLyODc5ky1Ii5Wdmh41otFNCnw/s72-c/guestpost45.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-5937229027481806588</guid><pubDate>Mon, 10 Sep 2012 09:25:00 +0000</pubDate><atom:updated>2012-09-13T08:45:40.551-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>The 10 Most Infamous Student Hackers of All Time</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgn-dJ6a0ob1IKBXyG31PtpH0CahFnRTEB1R1ZDdU0Io8ksetgcAd_0fgca4YuvnMTyWKiYCDOlHbB14S6NytmQtW8SYZ4kieV2t7MX11QCt4Y52oWMFY5NAKvApW-yZTn6Rq8cE0Q7U4/s1600/hackers.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgn-dJ6a0ob1IKBXyG31PtpH0CahFnRTEB1R1ZDdU0Io8ksetgcAd_0fgca4YuvnMTyWKiYCDOlHbB14S6NytmQtW8SYZ4kieV2t7MX11QCt4Y52oWMFY5NAKvApW-yZTn6Rq8cE0Q7U4/s200/hackers.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; line-height: 21px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Hacking has always been inherently a young person’s game. The first usage of the word “hacker” was to describe pranksters&amp;nbsp;meddling with the phones&amp;nbsp;at MIT. Many hackers have cited boredom, a desire for change, or the thrill of going somewhere one is not supposed to go as their motivation for hacking, all of which could apply to scores of common activities on college campuses. While today’s hacking scene is dominated by large hacking groups like Anonymous and Masters of Deception, many of the greatest hacks ever have been pulled off by college, high school, and even middle school kids who rose to infamy armed only with a computer and the willingness to cross the bounds of legality.&lt;/span&gt;&lt;/div&gt;
&lt;ol style=&quot;border: 0px; line-height: 21px; margin: 0px 0px 1em 2em; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://lastwatchdog.com/microsoft-pays-250000-bounty-capture-creator-netskysasser/&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Sven Jaschan&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;In the&amp;nbsp;words of one tech expert, “His name will always be associated with some of the biggest viruses in the history of the Internet.” The viruses: the Sasser and NetSky worms that infected millions of computers and have caused millions of dollars of damage since their release in 2004. The man behind the viruses proved to be not even a man at all, legally. Seventeen-year-old hacker Sven Jaschan, a student at a computer science school in Germany, claimed to have created the viruses to become a hero by developing a program that would eradicate the rampaging Mydoom and Bagle bugs. Instead he found himself the subject of&amp;nbsp;a $250,000 bountycourtesy of Microsoft, for which some of his classmates turned him in.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.wired.com/threatlevel/2009/07/hacker/&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Jonathan James&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;In 2000, at the age of 16, James, or “C0mrade” as he was known in the hacker community, infamously became the first juvenile federally sentenced for hacking. The targets of his notorious hack jobs were a wing of the U.S. Department of Defense called the Defense Threat Reduction Agency, NASA, and the Marshall Space Flight Center in Huntsville, Ala. (By hacking the latter James gained the ability to control the A/C in the International Space Station.) All of these were pulled off “for fun” while James was still a student at Palmetto Senior High in Miami. Unfortunately, the fun ran out when James was tied into a massive&amp;nbsp;identity theft investigation. Though insisting he was innocent, James took his own life, saying he had “no faith in the justice system.”&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://mafiaboybook.com/michael-calce/&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Michael Calce&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Yahoo. CNN. Ebay. Amazon. Dell.com. One by one in a matter of days, these huge websites crashed at the hands of 15-year-old Canadian high school student Michael Calce, aka “MafiaBoy.” Armed with a denial-of-service program he called “Rivolta” that overloaded servers he targeted, the young hacker wreaked $7.5 million in damages,&amp;nbsp;according to court filings. Calce was caught when he fell victim to a common ailment of teenage boys: bragging. The cops were turned on to him when he began boasting in chat rooms about being responsible for the attacks. On Sept. 12, 2001, MafiaBoy was sentenced to a group facility for eight months on 56 counts of cybercrime.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.telegraph.co.uk/technology/6670127/Top-10-most-famous-hackers.html&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Kevin Mitnick&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Before performing hacks that prompted the U.S. Department of Justice to declare him “the most wanted computer criminal in United States history,” Kevin Mitnick had already made a name for himself as a hacker in his school days, first at Monroe High School in LA and later at USC. On a dare, Mitnick connived an opening into the computer system of Digital Equipment Corporation, which some fellow hackers then used to&amp;nbsp;steal proprietary source code&amp;nbsp;from the company before ratting on him. While still on probation for that crime, Mitnick broke into the premises of Pacific Bell and had to go on the run from police in the aftermath, during which time he hacked dozens of systems, including those of IBM, Nokia, Motorola, and Fujitsu.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.rawhack.com/famous.hackers/tim.berners.lee.htm&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Tim Berners-Lee&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;“Scandalous” is a synonym for “infamous,” and for this legendary computer scientist, knight of the British Empire, and inventor of the World Wide Web to have been a hacker in his school days is certainly a juicy factoid. During his time at Oxford in the mid-’70s, Sir Tim was banned from using university computers after he and a friend were caught hacking their way into restricted digital areas. Luckily by that time he already knew how to&amp;nbsp;make his own computer&amp;nbsp;out of a soldering iron, an old TV, and some spare parts. And also luckily for him, he will always be&amp;nbsp;revered&amp;nbsp;as the father of the Internet.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.atarimagazines.com/creative/v10n1/266_Telecommunications_talk.php&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Neal Patrick and the 414s&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;In the early ’80s, hacking was still a relatively foreign concept to most Americans. Few recognized the enormous power hackers could hijack with a few strokes on a keyboard, which explains why a young group of hackers known as the 414s (after a Milwaukee area code) were virtual celebrities after they hacked into the famous Los Alamos National Laboratory, the Memorial Sloan-Kettering Cancer Center, and elsewhere. While today hacking a lab where classified nuclear research is conducted could earn you a one-way ticket to Guantanamo, the 17-year-old ringleader and high school student Neal Patrick was on&amp;nbsp;the cover of&amp;nbsp;&lt;em style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Newsweek&lt;/em&gt;. The group members got light sentences but prompted Congress to take a stronger role in cybercrime.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.findingdulcinea.com/news/on-this-day/July-August-08/On-this-Day--Robert-Morris-Becomes-First-Hacker-Prosecuted-For-Spreading-Virus.html&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Robert T. Morris&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;The first ever Internet worm, the Morris Worm derived its name from Cornell grad student Robert Tappan Morris. In 1988, Morris released the worm through MIT’s system to cover his tracks, which would seem to contradict his claims that he meant no harm with it. But that’s exactly what resulted: the worm spread out of control, infecting more than 6,000 computers connected to the ARPANET, the academic forerunner to the World Wide Web. The damages reached as high as an estimated $10 million, and Morris earned the ignominious distinction of being the first person prosecuted under the Computer Fraud and Abuse Act. Morris got community service but was apparently not considered too infamous to be offered his current job as a professor at MIT.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.newyorker.com/reporting/2012/05/07/120507fa_fact_kushner&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;George Hotz&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;To some, George Hotz (aka “geohot,” aka “million75,” aka “mil”) is a public menace, a threat to electronic businesses everywhere. To many, Hotz is a hero. The high-schooler shot to fame/infamy in 2007 at the tender age of 17 by giving the world its first hacked, or “jailbroken” iPhone. He traded it for a new sports car and three new iPhones, and the video of the hacking received millions of hits. Apple has had to grudgingly come to terms with jailbreaking, seeing as the&amp;nbsp;courts have declared it legal, but Sony Corp. is definitely not OK with such tampering. When Hotz hacked his PlayStation 3 and published the how-to on the web, the company launched a vicious lawsuit against him. In turn, the hacker group Anonymous launched an attack on Sony, stealing millions of users’ personal info.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.independent.ie/national-news/trinity-student-fbi-claim-is-top-hacker-is-released-by-gardai-3041639.html&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Donncha O’Cearbhaill&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;According to the FBI, this 19-year-old freshman at Trinity College Dublin is one of the top five most wanted hackers in the world. Well, he was; now that he’s been arrested he’s not really “wanted” anymore. The Feds contend the young man is a VIP member of the Anonymous and LulzSec hacking groups that have already been mentioned and whose targets have included the FBI, the U.S. Senate, and Sony (in the Hotz backlash). It seems “Palladium” (O’Cearbhaill) took the liberty of listening in on a conference call between the FBI and several international police forces who were discussing their investigations of the hacking groups. He could be sentenced to up to 15 years in prison if convicted for that hack alone.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;strong style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.forbes.com/sites/andygreenberg/2011/08/01/meet-comex-the-iphone-uber-hacker-who-keeps-outsmarting-apple/&quot; style=&quot;border: 0px; color: #0088cc; margin: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;Nicholas Allegra&lt;/a&gt;:&lt;/span&gt;&lt;/strong&gt;&lt;div style=&quot;border: 0px; margin: 1em auto; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Just as George Hotz moved on from the Apple hacking game, Brown University student Nicholas Allegra is also hanging up his jersey. “Comex,” as he is known to millions of rooted iPhone fans, created the simple-to-use Apple iOS jailbreaking program&amp;nbsp;JailbreakMe&amp;nbsp;in 2007 and has since released two newer versions of it. However, Comex seems to have gone over to the dark side,accepting an internship&amp;nbsp;with the very company whose products he became famous exploiting. Still, Allegra’s hacking skills are so advanced (one author puts him five years ahead of the authors of the infamous Stuxnet worm that corrupted Iran’s nuclear facilities) and so many people availed themselves of his talents, he will forever live in hacking infamy.&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;span style=&quot;background-color: white; color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;b&gt;Bio&lt;/b&gt; : I am Katina Solomon, I am a freelancer writer for&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://onlindegree.org/&quot; style=&quot;background-color: white; color: #234786; font-family: Arial, Helvetica, sans-serif; outline: 0px;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1347550966_0&quot; style=&quot;color: #366388; cursor: pointer;&quot;&gt;Onlindegree.org&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;background-color: white; color: #454545; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&amp;nbsp;and always write student and education related article.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt; &lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/09/the-10-most-infamous-student-hackers-of.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhgn-dJ6a0ob1IKBXyG31PtpH0CahFnRTEB1R1ZDdU0Io8ksetgcAd_0fgca4YuvnMTyWKiYCDOlHbB14S6NytmQtW8SYZ4kieV2t7MX11QCt4Y52oWMFY5NAKvApW-yZTn6Rq8cE0Q7U4/s72-c/hackers.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-324123009267628352</guid><pubDate>Thu, 06 Sep 2012 17:30:00 +0000</pubDate><atom:updated>2012-09-06T08:37:44.435-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Website Hacking</category><title>Website Hacking : How To Find  Vulnerability On Website ? Part 2</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
Today i will show you how hackers find Vulnerabilities of targeted websites. Hacker would take that information and search a numerous vulnerability databases for the exploit it may be malicious app. If there’s an exploit available, he will run it against the websites server and would take the whole complete control. If there isn’t any exploit, hacker would move onto another available port and try again on a different method.&lt;br /&gt;
Popular exploit databases are:&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
• &lt;a href=&quot;http://milworm.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;Milw0rm&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;• &lt;a href=&quot;http://securityfocus.com/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;SecurityFocus&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;b&gt;• &lt;a href=&quot;http://osvdb.org/&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;osvdb&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://www.whitec0de.com/wp-content/uploads/2012/04/Hotmail-Exploit.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;246&quot; src=&quot;http://www.whitec0de.com/wp-content/uploads/2012/04/Hotmail-Exploit.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;
Don’t forget to &lt;a href=&quot;http://adf.ly/1569058/http://feeds.feedburner.com/myhackingtip&quot; title=&quot;Subscribe to our feed&quot;&gt;Subscribe to our RSS feed&lt;/a&gt; &lt;/b&gt;&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.facebook.com/plugins/like.php?app_id=254084787941982&amp;amp;href=http://www.facebook.com/myhackingtips&amp;amp;send=false&amp;amp;layout=standard&amp;amp;width=530&amp;amp;show_faces=false&amp;amp;action=like&amp;amp;colorscheme=light&amp;amp;font&amp;amp;height=35&quot; style=&quot;border: none; height: 35px; overflow: hidden; width: 530px;&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
How to Find Vulnerabilities&amp;nbsp;of Websites?&lt;/h3&gt;
By searching “filezilla” on application milw0rm, the hacker would not find any exploits due to current version of the FTP program. Every hacker would move on to another available port to try and find another possible vulnerability attack, but this doesn’t mean professional hacker will do this thing. If a skillful hacker has given the&amp;nbsp;opportunity, he may try to path a vulnerability in the current software version and will make an exploit for it. In every hacker&#39;s community, this new vulnerability attack would be called a “&lt;b&gt;0-day&lt;/b&gt;”. These vulnerabilities are very important in the hacker community for some reasons.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;1)&lt;/b&gt; &amp;nbsp;Nobody knows about the vulnerability, so the hacker could start cracking hundreds of websites before the vulnerability is patched.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;2) &lt;/b&gt;Mostly some hackers sell the vulnerability for thousands of dollars to enemies of the targeted sites.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;3)&lt;/b&gt; &amp;nbsp;Patching vulnerabilities and creating the exploit for it shows that hacker is very skillful and is the member of hacker community.&lt;br /&gt;
&lt;br /&gt;
You might be confused why 0-days are worth so much. &amp;nbsp;I’ll explain it with a simple formulae.&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote&gt;
Hackers + (0-Day )+ Agency Servers = Worst Reputation = Loss of Dollars&lt;/blockquote&gt;
&lt;br /&gt;
Now before we get into the actual hacking, I will discuss a some of the common type of attacks used against patched vulnerabilities.&lt;br /&gt;
&lt;b&gt;&lt;br /&gt;
Denial-of-Service (DoS)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;There are many types of DoS attacks, but they all have one concept: to make the target website server unavailable for users. The most common type of DoS attack is when the hacker sends a software full of malicious information to the &amp;nbsp;server causing it to use up all of its sources, and in return pushing it offline from the network, or causing it to deny requests from unknown users who are trying to reach the web.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Buffer Overflow (BoF)&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
This happens when an application attempts to store more data into a FTP buffer, or in a data storage area. Because the buffer was only meant to keep the particular amount/storage of data, the extra information overflows into other folders causing them to be removed with malicious scripting published by the hacker. Once the code is executed by the user, the hacker can receive each and every information and can access full control of the server.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Types of Exploits&amp;nbsp;&lt;/h3&gt;
&lt;br /&gt;
If you see the Milw0rm exploit database list, you will see that in many exploit &amp;nbsp;it reads local pc exploit or remote exploit.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Local Exploit&lt;/b&gt; – For running local exploit, you must first have access and control on the machine. Local exploits are usually used to control users to admin or root. In other words, it allows an ordinary user to gain admin role.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Remote Exploit&lt;/b&gt; – A remote exploit is as good exploit just roles the same thing as a local exploit except that what isn’t running &amp;nbsp;locally means admin access, but can be launched or run from anywhere across the internet.&lt;br /&gt;
&lt;br /&gt;
A hacker mosly has to use a combination of both exploits remote and local exploits to gain full control of a system through websites.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Enjoy Hacking!&lt;/b&gt;&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/website-hacking-how-to-find.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-8951668333119871462</guid><pubDate>Mon, 27 Aug 2012 11:12:00 +0000</pubDate><atom:updated>2012-08-27T04:12:39.478-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Guest Post</category><title>Top 3 Mac Keyloggers For Spying Computer</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFm4mP9EJY58UaCI8yeidRNo5Zi2Xr6xrHkIP8QZaegXDcWkVLo0WQ7DAs4Oo3DnKgxu-3wnRjvHZPuLdXuF6xvLmL5kYtkdmqW7WYbAZJQFmoE_rRyDfPQwe7Ws_vm3aRbS0-OgKMUj8/s1600/keylogger-windows-7.png&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;240&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFm4mP9EJY58UaCI8yeidRNo5Zi2Xr6xrHkIP8QZaegXDcWkVLo0WQ7DAs4Oo3DnKgxu-3wnRjvHZPuLdXuF6xvLmL5kYtkdmqW7WYbAZJQFmoE_rRyDfPQwe7Ws_vm3aRbS0-OgKMUj8/s320/keylogger-windows-7.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;There are several reasons why you should put applications for your Mac product. This product has a wide variety of interesting and exciting software to choose from. You will encounter a lot especially now that you can browse all over the web for more if you have high speed internet.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;However, you will not download all of the materials that can be put on it because of several reasons. People will always encounter downsides to any situation and this is not an exemption.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;One, there are a lot of malicious software that might corrupt the entire system. As much as possible, you want to protect your files and let them stay close to you. You will not easily download a game for your iPhone because it will pleasure you for the amount of your data.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;People engaged in the business sector can relate to this more. Plus, it will not be tough for them to buy a separate unit for pleasure and for professional use.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Second, the things that you pile up in the device will make the entire system process slowly. This is a hard problem because you cannot deal with it even though you have the fine resources like high speed internet.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This will bring you to the next idea that is wished to be discussed. Not all of the applications that can be downloadable and free should always be put in it. Listed below are several soft wares that can contribute to the lag time of your mobile.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Specter Pro. This is an application that lets you be a “spy”. It will keep you on track of your kids or employees.&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;A lot of people use this kind of application mainly because they are able to regulate the behaviour of the other one being looked onto every single time. You basically receive all the activities that the other person engages in.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;This is considered as one of the most terrible key loggers because of too much information that you will receive. Again, too much memory can no longer be handled by such models.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;In addition, its price is not cheap. This can only be invested for really serious reasons. Maybe, a person who has plans to ruin a state’s governance can look into its agencies.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Aobo. This is much like the previous but it can let you discover things out of the materials that you spy on. It claims that it can analyse data that are coming to you to become much more useful.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;One of the most famous statements that make it liked by its audience is the capability of an owner to retrieve a stolen Mac because of this application. This can really be interesting especially to people who are prone to such incidents.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;However, the application does assure you that you can find the Mac but not the culprit itself. You cannot just intrude into their property. You should make sure that you deal with the person very well because there might even be instances that they will pull a gun in front of you.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Moreover, it consumes a lot of space in the storage section without it being useful every single time.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;About The Author&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Daphne enjoys writing on all things technical for [Broadband Expert] (&lt;/span&gt;&lt;a href=&quot;http://www.broadbandexpert.com/&quot; style=&quot;font-family: inherit; outline: 0px;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;yshortcuts&quot; id=&quot;lw_1346065180_1&quot; style=&quot;cursor: pointer;&quot;&gt;http://www.broadbandexpert.com&lt;/span&gt;&lt;/a&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;). Her daily routine consists of drinking coffee, keeping up on the latest news in technology, as well as blogging and guest posting.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/top-3-mac-keyloggers-for-spying-computer.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjFm4mP9EJY58UaCI8yeidRNo5Zi2Xr6xrHkIP8QZaegXDcWkVLo0WQ7DAs4Oo3DnKgxu-3wnRjvHZPuLdXuF6xvLmL5kYtkdmqW7WYbAZJQFmoE_rRyDfPQwe7Ws_vm3aRbS0-OgKMUj8/s72-c/keylogger-windows-7.png" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-6325008718167409874</guid><pubDate>Fri, 24 Aug 2012 10:41:00 +0000</pubDate><atom:updated>2012-08-23T23:49:29.795-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Facebook Hacking</category><category domain="http://www.blogger.com/atom/ns#">Yahoo Hacking</category><title>How to Know Someones Facebook Email ? Hacking Facebook Yahoo Hotmail 2012</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ6QsFBgYrd-L9z2wsOqob80hl2YIZvbTQ5Mftn72S1gBn_RnV7qNjfSOb5FxfGyC3ERaTORhY6mna-kv2Qcy2qwOG27JjFCF8nvCY7CP-7CaHGkX4iDGzTRykyLGRgMovWqQcgL0rHV4/s1600/imagesCADNY9O3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; cssfloat: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; oda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ6QsFBgYrd-L9z2wsOqob80hl2YIZvbTQ5Mftn72S1gBn_RnV7qNjfSOb5FxfGyC3ERaTORhY6mna-kv2Qcy2qwOG27JjFCF8nvCY7CP-7CaHGkX4iDGzTRykyLGRgMovWqQcgL0rHV4/s1600/imagesCADNY9O3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
Hello Everyone! This is Saqlain Kazmi, I have&amp;nbsp;updated many&amp;nbsp;Tips on hacks and&amp;nbsp;stealing friends&amp;nbsp;Email&amp;nbsp;&amp;amp; password So, Today i am going to make another&amp;nbsp;article on stealing&amp;nbsp;your facebook friend&#39;s email. Usually Some friends use to&amp;nbsp;hide their Emails from their facebook information, because of the Phishing and Hacking Privacy. But Now i will tell you some of the steps to find their email, of facebook account. This method would be only done if your account is on Yahoo for example :- &lt;a href=&quot;http://www.blogger.com/:p&quot; target=&quot;_blank&quot;&gt;account&lt;/a&gt;&lt;a href=&quot;mailto:yourmail@yahoo.com&quot;&gt;@yahoo.com&lt;/a&gt; So, lets start the ways to get your friend&#39;s emails secretly and securely!&amp;nbsp;On the whole world wide web, Yahoo only provides this service to import contacts from facebook, so this will only done on yahoo account,&amp;nbsp;rest&amp;nbsp;of the others can make another account on yahoo and then could signup to facebook for finding the emails. So, Now from this you&amp;nbsp;can find their information. Or you can hack by emails.&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;Don’t forget to &lt;a href=&quot;http://feeds.feedburner.com/myhackingtip&quot; title=&quot;Subscribe to our feed&quot;&gt;Subscribe to our RSS feed&lt;/a&gt; &lt;/b&gt;&lt;br /&gt;
&lt;iframe allowtransparency=&quot;true&quot; frameborder=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;http://www.facebook.com/plugins/like.php?app_id=254084787941982&amp;amp;href=http://www.facebook.com/myhackingtips&amp;amp;send=false&amp;amp;layout=standard&amp;amp;width=530&amp;amp;show_faces=false&amp;amp;action=like&amp;amp;colorscheme=light&amp;amp;font&amp;amp;height=35&quot; style=&quot;border: none; height: 35px; overflow: hidden; width: 530px;&quot;&gt;&lt;/iframe&gt;&lt;br /&gt;
&lt;h3 dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;

 How To Get Your Facebook Friend&#39;s Email?&lt;/h3&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
1) Login To your Yahoo Mail account.&lt;/div&gt;
&lt;br /&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeNgiJrqUpwfq-Km0T_RBl09qYaGh0KsoMwYkAxzqIsbuhtLMc1EXxJ7jgah4OhtTyUO4riR8ASXiwY3A7sPbKmWPY3M90BkudXzJoXCaM7XgiLrfsgwPeUDaZQsNo5Ahz53l-WKkmOgk/s1600/untitled.bmp&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; oda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeNgiJrqUpwfq-Km0T_RBl09qYaGh0KsoMwYkAxzqIsbuhtLMc1EXxJ7jgah4OhtTyUO4riR8ASXiwY3A7sPbKmWPY3M90BkudXzJoXCaM7XgiLrfsgwPeUDaZQsNo5Ahz53l-WKkmOgk/s1600/untitled.bmp&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;br /&gt;
2) Goto contacts option.&lt;br /&gt;
3) Now their select tools and then you will see there is an option of import on yahoo toolbar.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: justify;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSa7I9xnLZjCijGXWhquq33nn-Oq-knoMonYg9Lz7aNZVDq8SMS6YyU6ObiEcP045Ztozba9dyRY44mCLQ7X4Fpryu_P14cAMp179TZ7h50I-ZOy6OrZe_lUVAQDKyKPCWm_NuRxmv_a4/s1600/contactsyahoofacebook.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;104&quot; oda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhSa7I9xnLZjCijGXWhquq33nn-Oq-knoMonYg9Lz7aNZVDq8SMS6YyU6ObiEcP045Ztozba9dyRY44mCLQ7X4Fpryu_P14cAMp179TZ7h50I-ZOy6OrZe_lUVAQDKyKPCWm_NuRxmv_a4/s320/contactsyahoofacebook.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
﻿4) Now goto your facebook account login and hit Facebook here on yahoo, Now they will ask you on facebook to import contacts, allow them.&lt;br /&gt;
5) After Five minutes they will import all the contacts and emails of your facebook friends they could be 10-1000, depends on your friends list.&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9lzTxWaid6J1u8OTpRaMEsxItIvW6Bc9gL3pJUXRRZR_JyufGenL0-qYEIZiXCRN6s0UvjQZ68ID9PXzadmwUnnMjgaCNQaJayuh9eWBK_F170u4A1BByXldmujE14ijJ8atAlEbuan0/s1600/images.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;198&quot; oda=&quot;true&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9lzTxWaid6J1u8OTpRaMEsxItIvW6Bc9gL3pJUXRRZR_JyufGenL0-qYEIZiXCRN6s0UvjQZ68ID9PXzadmwUnnMjgaCNQaJayuh9eWBK_F170u4A1BByXldmujE14ijJ8atAlEbuan0/s320/images.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
6) Now Yahoo has successfully imports your contacts, Goto Your Yahoo Contacts list there you will see all friends email with details.&lt;br /&gt;
&lt;br /&gt;
&amp;nbsp;&lt;strong&gt;So, I have teach you the steps to get emails of your facebook friends, Now I can hack accounts &amp;nbsp;easily for $100! Contact me only serious customers.&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/04/how-to-know-someones-facebook-email.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjJ6QsFBgYrd-L9z2wsOqob80hl2YIZvbTQ5Mftn72S1gBn_RnV7qNjfSOb5FxfGyC3ERaTORhY6mna-kv2Qcy2qwOG27JjFCF8nvCY7CP-7CaHGkX4iDGzTRykyLGRgMovWqQcgL0rHV4/s72-c/imagesCADNY9O3.jpg" height="72" width="72"/><thr:total>8</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-9177677132256580047</guid><pubDate>Sat, 18 Aug 2012 21:16:00 +0000</pubDate><atom:updated>2012-08-18T14:16:29.721-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Book</category><title>Ethical Hacking Book : Get All Hacking Techniques!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;How to hack&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;. It’s a very often asked question with around 1,000,000 Google searches each month. I know that anyone that runs a hacking related website get’s asked this question daily. The same questions get asked from me again and again eg.&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;My girl friend is cheating me i need her password?&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;&amp;nbsp;or&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;Some one is really abusing me i need her password?&lt;/b&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;Most of us are very curious to learn Hacking and want to become a Hacker, but don’t know where to start. If you are in the same situation this is right place for you.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;a href=&quot;http://www.blogger.com/blogger.g?blogID=4572740781380543251&quot; name=&quot;more&quot; style=&quot;background-color: white; color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;&lt;/a&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;I am very happy to tell you that my book&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;&quot;Ethical Hacking Book&quot;&amp;nbsp;&lt;/b&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;has just launched.I have been working on this book for past few months.I have dedicated this book&amp;nbsp;completely&amp;nbsp;to beginners who want to become hackers.&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;
&lt;img height=&quot;320&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLgDbzwTpmGy2sYnjeRax23KXtawP9OVDfvCPoSKzbqsoBROgFW-UAGZoZuv30-Uu3vVyhVQZcpoODdJJOtwSjzeB40hn7xnpDc1Xf8umIO_iPyKMx4tNxKdD-gN9mm31whpbQyUKWZ4_r/s320/A+Beginners+Guide+to+Ethical+Hacking.JPG&quot; style=&quot;padding: 10px;&quot; width=&quot;253&quot; /&gt;&amp;nbsp;&lt;/div&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;How will the information in the book affect me?&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;ul style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px; list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU_CGnQqWiK0WkADhHYzJnyCz1Le694reyR89sI-dOo7tLfrtWX-vR8xF24FmjU_vJ21UUGXbb2ESlAHHMdLB5cwyz8QadVWXb4TnjNH6xTLgXFVm3Z7ZBGAYPUU_phivjYu9mX3hAIPIb/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;You will learn All Ethical hacking techniques and also you will learn to apply them in real world situation&lt;/li&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU_CGnQqWiK0WkADhHYzJnyCz1Le694reyR89sI-dOo7tLfrtWX-vR8xF24FmjU_vJ21UUGXbb2ESlAHHMdLB5cwyz8QadVWXb4TnjNH6xTLgXFVm3Z7ZBGAYPUU_phivjYu9mX3hAIPIb/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;You will start to think like hackers&lt;/li&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU_CGnQqWiK0WkADhHYzJnyCz1Le694reyR89sI-dOo7tLfrtWX-vR8xF24FmjU_vJ21UUGXbb2ESlAHHMdLB5cwyz8QadVWXb4TnjNH6xTLgXFVm3Z7ZBGAYPUU_phivjYu9mX3hAIPIb/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;Secure your computer from trojans,worms, Adwares etc&lt;/li&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU_CGnQqWiK0WkADhHYzJnyCz1Le694reyR89sI-dOo7tLfrtWX-vR8xF24FmjU_vJ21UUGXbb2ESlAHHMdLB5cwyz8QadVWXb4TnjNH6xTLgXFVm3Z7ZBGAYPUU_phivjYu9mX3hAIPIb/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;Amaze your friends with your newly learned tricks&lt;/li&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiU_CGnQqWiK0WkADhHYzJnyCz1Le694reyR89sI-dOo7tLfrtWX-vR8xF24FmjU_vJ21UUGXbb2ESlAHHMdLB5cwyz8QadVWXb4TnjNH6xTLgXFVm3Z7ZBGAYPUU_phivjYu9mX3hAIPIb/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;You will be able to protect your self from future hack attacks&lt;/li&gt;
&lt;/ul&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;And Much more...&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;Reality about Password Hacking softwares&lt;/b&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;You might have heard about some paid password hacking softwares which claim to hack a password on entering the email account.But in reality all those softwares are fake.If you believe what they say then you are just wasting your time and money.These all softwares are fake.If there exists such a software, will there be any security on web. And all expert engineers at Google, Yahoo and other services are not mad. They are all engaged in ensuring security of their customers ie email account owners. So, no such software exists.&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;So stop wasting your time and money on these foolish softwares and services and learn real Ethical Hacking methods which hackers use to access email accounts.&lt;/span&gt;&lt;br /&gt;
&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot; /&gt;
&lt;b style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.200000762939453px;&quot;&gt;For Download Link visit the following link:-&lt;br /&gt;
&lt;/b&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;Price :- &lt;/span&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;strike style=&quot;font-size: x-large;&quot;&gt;79 &lt;/strike&gt;&lt;span style=&quot;font-size: large;&quot;&gt;&amp;nbsp; &amp;nbsp;only &amp;nbsp;&lt;/span&gt;&lt;span style=&quot;font-size: x-large;&quot;&gt;$10&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;br /&gt;
&lt;div align=&quot;center&quot;&gt;
&lt;form action=&quot;https://www.paypal.com/cgi-bin/webscr&quot; method=&quot;post&quot;&gt;
&lt;input name=&quot;cmd&quot; type=&quot;hidden&quot; value=&quot;_s-xclick&quot; /&gt;&lt;br /&gt;
&lt;input name=&quot;hosted_button_id&quot; type=&quot;hidden&quot; value=&quot;3LW9R6CLH2AWA&quot; /&gt;&lt;br /&gt;
&lt;input alt=&quot;PayPal - The safer, easier way to pay online!&quot; border=&quot;0&quot; name=&quot;submit&quot; src=&quot;https://www.paypalobjects.com/en_US/i/btn/btn_buynowCC_LG.gif&quot; type=&quot;image&quot; /&gt;&lt;br /&gt;
&lt;img alt=&quot;&quot; border=&quot;0&quot; height=&quot;1&quot; src=&quot;https://www.paypalobjects.com/en_US/i/scr/pixel.gif&quot; width=&quot;1&quot; /&gt;&lt;/form&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/ethical-hacking-book-get-all-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgLgDbzwTpmGy2sYnjeRax23KXtawP9OVDfvCPoSKzbqsoBROgFW-UAGZoZuv30-Uu3vVyhVQZcpoODdJJOtwSjzeB40hn7xnpDc1Xf8umIO_iPyKMx4tNxKdD-gN9mm31whpbQyUKWZ4_r/s72-c/A+Beginners+Guide+to+Ethical+Hacking.JPG" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-7437145638643196943</guid><pubDate>Sat, 18 Aug 2012 07:00:00 +0000</pubDate><atom:updated>2012-11-19T15:44:23.998-08:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Software</category><title>Best Hacking Softwares For Facebook Accounts in 2012</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;1. Sniper Spy (Remote Install Supported)&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: green;&quot;&gt;Editors Rating:&lt;/span&gt;&lt;/i&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;8/10&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;b style=&quot;background-color: white; clear: left; color: #333333; float: left; line-height: 19.200000762939453px; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img src=&quot;http://www.sniperspy.com/images/box6b.gif&quot; style=&quot;border: 1px solid rgb(221, 221, 221); padding: 10px;&quot; /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; line-height: 18px;&quot;&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;i style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555807&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; linkindex=&quot;112&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;SniperSpy&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;is the industry leading&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;http://www.myhackingtips.com/2012/07/sniperspy-keylogger-best-remote-spy.html&quot; linkindex=&quot;113&quot; style=&quot;background-color: white; border: none; color: #666666; line-height: 19.200000762939453px; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;remote password hacking software&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;Remote password hacking software&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&amp;nbsp;combined with the&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;Remote Install and Remote Viewing feature.&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;Once installed on the remote PC(s) you wish, you only need to login to your own personal SniperSpy account to view activity logs of the remote PC’s!&amp;nbsp; This means that you can view logs of the remote PC’s from anywhere in the world as long as you have internet access!&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;Do you want to Spy on a Remote PC? Expose the truth behind the lies! Unlike the rest,&amp;nbsp;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555807&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; linkindex=&quot;114&quot; rel=&quot;&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;SniperSpy&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&amp;nbsp;allows you to remotely&amp;nbsp;spy&amp;nbsp;any&amp;nbsp;PC like a television! Watch what happens on the screen LIVE!&amp;nbsp;&lt;/span&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;The only remote PC spy software with a SECURE control panel!&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;This Remote PC Spy&amp;nbsp;software also saves screenshots along with text logs of chats, websites, keystrokes in any language and more. Remotely view everything your child, employee or anyone does while they use your distant PC. Includes LIVE admin and control commands!&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;SniperSpy Features:&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;1. SniperSpy is remotely-deployable spy software&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;2. Invisibility Stealth Mode Option. Works in complete stealth mode. Undetectable!&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;3. Logs All Keystrokes&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;4. Records any Password (Email, Login, Instant Messenger etc.)&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;5.&amp;nbsp;Remote Monitor&amp;nbsp;Entire IM Conversations so that you can spy on IM activities too&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;6. Captures a full-size jpg picture of the active window however often you wish&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;7. Real Time Screen Viewer&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;8. Remotely reboot or shutdown the PC or choose to logoff the current Windows user&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;9. Completely Bypasses any Firewall&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;For more information on this&amp;nbsp;program and&amp;nbsp;download&amp;nbsp;details visit the following link&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555807&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; linkindex=&quot;115&quot; rel=&quot;&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;SniperSpy&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; line-height: 18px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; color: #6fa8dc; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: black;&quot;&gt;2.Mobile spy(Cellphone hacking)&lt;/span&gt;&lt;/b&gt;&lt;i style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: green;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;i&gt;&lt;span style=&quot;color: green;&quot;&gt;Editors Rating:&lt;/span&gt;&lt;/i&gt;&amp;nbsp;&lt;span style=&quot;color: red;&quot;&gt;9/10&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #16293a; font-weight: normal;&quot;&gt;&lt;a href=&quot;https://www.plimus.com/jsp/buynow.jsp?contractId=1692669&amp;amp;referrer=rafay112&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot;&gt;&lt;img alt=&quot;Mobile Spy - Windows Mobile, BlackBerry, Android and Symbian Smartphone Monitoring Software&quot; border=&quot;0&quot; height=&quot;144&quot; hspace=&quot;5&quot; src=&quot;http://www.mobile-spy.com/images/img_msbox_2.jpg&quot; style=&quot;border: 0px solid rgb(221, 221, 221); padding: 10px;&quot; width=&quot;118&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;b style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;i&gt;&lt;i&gt;&lt;span style=&quot;color: green;&quot;&gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/i&gt;&lt;/i&gt;&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;There exists many cell phone spy&amp;nbsp;softwares on the market and hence people often get confused about which cell phone spy software to go for. To make this job simpler for you we personally&amp;nbsp;tested some of the top cell phone spy softwares and based on the results we conclude&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;a href=&quot;http://www.myhackingtips.com/2012/04/mobile-spy-how-to-hack-mobile-phones.html&quot; rel=&quot;&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;Mobile Spy&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&amp;nbsp;as one of best one.&lt;/span&gt;&lt;br style=&quot;background-color: white; line-height: 19.200000762939453px;&quot; /&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555852&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; rel=&quot;&quot; style=&quot;background-color: white; border: none; color: #666666; line-height: 19.200000762939453px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;Mobile Spy&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&amp;nbsp;is one of the best and award winning&amp;nbsp;cell phone spy softwares on the market with an affordable price. Mobile Spy team provides an excellent support and hence it becomes just a cakewalk to spy on your favorite cell phone! Today with an excessive usage of cell phones by many teenagers it becomes necessary for their parents to perform cell phone spying.&amp;nbsp;So what are you waiting for? If you’re really serious to spy on a cell phone then Mobile Spy is for you. Go grab&amp;nbsp;&lt;/span&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555852&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; rel=&quot;&quot; style=&quot;background-color: white; border: none; color: #666666; line-height: 19.200000762939453px; text-decoration: none;&quot; target=&quot;_blank&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #cc0000;&quot;&gt;Mobile Spy&lt;/span&gt;&lt;/a&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; line-height: 19.200000762939453px;&quot;&gt;&amp;nbsp;now and expose the truth.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/best-hacking-softwares-for-facebook.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-61369995488977066</guid><pubDate>Fri, 17 Aug 2012 21:38:00 +0000</pubDate><atom:updated>2012-08-17T14:39:17.936-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Tips</category><title>How To Use Google For Hacking!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAcGgWQdbnWKrJ3LjtCm10IJdvszAST6SWQyzk8m55czufLORZa0DViJDGAqCv8-PRGf7tdu5ElcqBi1LoOIxdSyF_9SUm5rKg0NXpRtL39CzNuzVRAGc9VPU8JL7Ia7ikalcQzdqLM4/s1600/googlepickle.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;166&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAcGgWQdbnWKrJ3LjtCm10IJdvszAST6SWQyzk8m55czufLORZa0DViJDGAqCv8-PRGf7tdu5ElcqBi1LoOIxdSyF_9SUm5rKg0NXpRtL39CzNuzVRAGc9VPU8JL7Ia7ikalcQzdqLM4/s400/googlepickle.jpg&quot; width=&quot;400&quot; /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Google serves almost 80 percent&amp;nbsp;of all the search queries on the Internet, proving itself as the most popular search engine. However, Google makes it possible to reach not only the publicly available information resources, but also gives access to some of the most confidential information that should never have been revealed.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;In this post, you will find the information on how to use Google for exploiting security vulnerabilities that exists within many websites.&amp;nbsp;The following are some of the hacks that can be accomplished using Google.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; margin: 27px 0px 3px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;
1. Hacking Security Cameras:&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;There exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic&amp;nbsp;etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-1228&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;inurl:”viewerframe?mode=motion”&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:&lt;/span&gt;&lt;/div&gt;
&lt;div align=&quot;center&quot; style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;img alt=&quot;Hacking Live Camera&quot; class=&quot;aligncenter size-full wp-image-2003&quot; height=&quot;480&quot; src=&quot;http://www.gohacking.com/wp-content/uploads/2009/12/Livecamera1.jpg&quot; style=&quot;border: 0px solid rgb(204, 204, 204); margin: 0px 10px 5px 0px; padding: 2px;&quot; title=&quot;&quot; width=&quot;562&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a&amp;nbsp;less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-6331&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;intitle:”Live View / – AXIS”&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; margin: 27px 0px 3px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;
2. Hacking Personal and Confidential Documents:&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Using Google, it is possible to gain access to an email repository containing CV of hundreds of people which were created when applying for their jobs. The documents containing their&amp;nbsp;Address, Phone, DOB, Education, Work experience etc. can be found just in seconds.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-324&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;intitle:”curriculum vitae” “phone * * *” “address *” “e-mail”&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;You can gain access to a list of .xls files (excel documents) which contains contact details including email addresses of large group of people. To do so, type the following search query and hit enter:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-6546&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;filetype:xls inurl:”email.xls”&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Also, it is possible to&amp;nbsp;gain access to the documents potentially containing information on bank accounts, financial summaries and credit card numbers using the following search query:&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-1705&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;intitle:index.of finances.xls&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;h3 style=&quot;background-color: white; margin: 27px 0px 3px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;
3. Hacking Google to Gain Access to Free Stuffs:&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Ever wondered how to hack Google for free music or ebooks. Well, here is a way to do that. To download free music, just enter the following query on google search box and hit enter.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;/div&gt;
&lt;div class=&quot;stb-info_box&quot; id=&quot;stb-box-5903&quot; style=&quot;background-color: #e2f8de; background-image: url(http://www.gohacking.com/wp-content/plugins/wp-special-textboxes/images/info.png); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(122, 217, 117); line-height: 24.683332443237305px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;&quot;&gt;
&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;“?intitle:index.of?mp3&amp;nbsp;&lt;span style=&quot;color: #cc0001; margin: 0px; padding: 0px;&quot;&gt;eminem&lt;/span&gt;“&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Now, you’ll gain access to the whole index of eminem album where in you can download the songs of your choice. Instead of eminem you can subtitute the name of your favorite album. To search for the ebooks all you have to do is replace “eminem” with your favorite book name. Also replace “mp3″ with “pdf” or “zip” or “rar”.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24.683332443237305px; margin-bottom: 15px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;I hope you enjoy this post. Pass your comments. Cheers!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/how-to-use-google-for-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrAcGgWQdbnWKrJ3LjtCm10IJdvszAST6SWQyzk8m55czufLORZa0DViJDGAqCv8-PRGf7tdu5ElcqBi1LoOIxdSyF_9SUm5rKg0NXpRtL39CzNuzVRAGc9VPU8JL7Ia7ikalcQzdqLM4/s72-c/googlepickle.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-3528016530210015545</guid><pubDate>Tue, 14 Aug 2012 20:30:00 +0000</pubDate><atom:updated>2012-08-14T13:31:42.762-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Latest Backtrack 5 R3 Download - Penetration Tester</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px; margin: 0px; padding: 0px;&quot; trbidi=&quot;on&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Offensive Security has released updated version of its PenTesting distribution, BackTrack 5 R3. &amp;nbsp;The update version&amp;nbsp;&amp;nbsp;focuses on bug-fixes as well as the addition of over 60 new tools-several of which were released in BlackHat and Defcon 2012.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtYvi3yA0LUMZ3l04Ddi8TgzyLAcWnFzlqnj1_Igm8iEmCKG-Szb2LsB5V0zAfnQ3MbDlrnz-5TWxq1e8EiS4FJjX91uFLNzO0d0lrTjMx6FcPmDzSjxWR2-dXcN1rys7V-5HEWK6CCoI/s200/BT5-R3.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtYvi3yA0LUMZ3l04Ddi8TgzyLAcWnFzlqnj1_Igm8iEmCKG-Szb2LsB5V0zAfnQ3MbDlrnz-5TWxq1e8EiS4FJjX91uFLNzO0d0lrTjMx6FcPmDzSjxWR2-dXcN1rys7V-5HEWK6CCoI/s200/BT5-R3.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px;&quot;&gt;A whole new tool category was populated – “Physical Exploitation”, which now includes tools such as the Arduino IDE and libraries, as well as the Kautilya Teensy payload collection.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px;&quot; /&gt;&lt;br style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px;&quot;&gt;&quot;Together with our usual KDE and GNOME, 32/64 bit ISOs, we have released a single VMware Image (Gnome, 32 bit). For those requiring other VM flavors of BackTrack – building your own VMWare image is easy – instructions can be found in the BackTrack Wiki.&quot; Offensive Security Team said.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;For the insanely impatient, you can&lt;span style=&quot;color: red;&quot;&gt;&amp;nbsp;download the BackTrack 5 R3 release via torrent&lt;/span&gt;&amp;nbsp;right now. Direct ISO downloads will be available once all their HTTP mirrors have synched, which should take a couple more hours. Once this happens, they will update their BackTrack Download page with all links.&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;background-color: white; color: #333333; font-size: 14px; line-height: 23px; list-style: square; margin: 20px 0px 20px 30px; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/torrents/BT5R3-GNOME-64.torrent&quot; rel=&quot;nofollow&quot; style=&quot;border: none; color: #004276; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;BackTrack 5 R3 Gnome 64 bit torrent&quot;&gt;BT5R3-GNOME-64.torrent&lt;/a&gt;&amp;nbsp;(md5:&amp;nbsp;8cd98b693ce542b671edecaed48ab06d)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/torrents/BT5R3-GNOME-32.torrent&quot; rel=&quot;nofollow&quot; style=&quot;border: none; color: #004276; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;BackTrack 5 R3 Gnome 32 bit torrent&quot;&gt;BT5R3-GNOME-32.torrent&lt;/a&gt;&amp;nbsp;(md5:&amp;nbsp;aafff8ff5b71fdb6fccdded49a6541a0)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/torrents/BT5R3-KDE-64.torrent&quot; rel=&quot;nofollow&quot; style=&quot;border: none; color: #004276; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;BackTrack 5 R3 KDE 64 bit torrent &quot;&gt;BT5R3-KDE-64.torrent&lt;/a&gt;&amp;nbsp;(md5:&amp;nbsp;981b897b7fdf34fb1431ba84fe93249f)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/torrents/BT5R3-KDE-32.torrent&quot; rel=&quot;nofollow&quot; style=&quot;border: none; color: #004276; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;BackTrack 5 R3 KDE 32 bit torrent &quot;&gt;BT5R3-KDE-32.torrent&lt;/a&gt;&amp;nbsp;(md5:&amp;nbsp;d324687fb891e695089745d461268576)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;a href=&quot;http://www.backtrack-linux.org/torrents/BT5R3-GNOME-32-VM.torrent&quot; rel=&quot;nofollow&quot; style=&quot;border: none; color: #004276; text-decoration: none;&quot; target=&quot;_blank&quot; title=&quot;BackTrack 5 R3 Gnome 32 bit VMWARE image torrent &quot;&gt;BT5R3-GNOME-32-VM.torrent&lt;/a&gt;&amp;nbsp;(md5:&amp;nbsp;bca6d3862c661b615a374d7ef61252c5)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/latest-backtrack-5-r3-download.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhtYvi3yA0LUMZ3l04Ddi8TgzyLAcWnFzlqnj1_Igm8iEmCKG-Szb2LsB5V0zAfnQ3MbDlrnz-5TWxq1e8EiS4FJjX91uFLNzO0d0lrTjMx6FcPmDzSjxWR2-dXcN1rys7V-5HEWK6CCoI/s72-c/BT5-R3.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-4067142769263905357</guid><pubDate>Mon, 13 Aug 2012 19:56:00 +0000</pubDate><atom:updated>2012-08-14T13:32:46.948-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Antivirus</category><title>Mcafee Security Software : Remove Viruses, Trojans, Spywares</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWK9kJete8hUP3R23QYl0woF_I5XmJKnpsV-BdxI46_HTyZ_wRpxxdGpYHJo3dewEYdADA_Lc73EHUdvac45JMUFxZ6zXRDdIjM41e_SvL5Lu2kf4opjgd8nlfHvbAjRKEEGGhxBKKmMSA/s1600/w32wecorl-a-dcom-server-process-launcher-terminated-unexpectedly.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWK9kJete8hUP3R23QYl0woF_I5XmJKnpsV-BdxI46_HTyZ_wRpxxdGpYHJo3dewEYdADA_Lc73EHUdvac45JMUFxZ6zXRDdIjM41e_SvL5Lu2kf4opjgd8nlfHvbAjRKEEGGhxBKKmMSA/s200/w32wecorl-a-dcom-server-process-launcher-terminated-unexpectedly.jpg&quot; width=&quot;200&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;span style=&quot;color: #666666; font-family: inherit; line-height: 21.600000381469727px;&quot;&gt;McAfee Active Protection Technology safeguards your system against new and potentially emerging threats, thus leaving virtually no gap in protecting your PC against harmful threats.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666; font-family: inherit; line-height: 21.600000381469727px;&quot;&gt;It automates your online defense, so there’s no need to wait for regular updates to arrive.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #666666; font-family: inherit; line-height: 21.600000381469727px;&quot;&gt;McAfee offers the most diverse set of Security SaaS solutions, covering emails, endpoint, vulnerability scanning, and web security. Reporting and management is hosted on McAfee&#39;s infrastructure.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Host-based and cloud-based web filtering protects your PC against malicious and suspicious sites. Cloud-based delivery takes the advantage of McAfee&#39;s threat prevention technologies, diverse SaaS portfolio, and industry-leading Global Threat Intelligence, powered by McAfee Labs.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;McAfee SecurityCenter provides total visibility with 24/7 access to an easy-to-use, online dashboard to view user protection, customize security policies, and generate and download reports.&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: inherit; font-size: small;&quot;&gt;Interesting &amp;amp; Powerful Features&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px; color: #333333; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Instantly accessible and always-on protection&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Secures your PC within minutes.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;McAfee SaaS Endpoint Protection provides integrated security and automated updates for uninterrupted protection.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;No need to buy additional security software or look out for technical support.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px; color: #333333; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Provides updates with minimal interference&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Keep desktops, servers, and networks protected against ever-evolving security threats.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;McAfee SaaS Total Protection is updated in real time, without interrupting users and requires minimal administrative effort by the IT staff.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; line-height: 21.600000381469727px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px; color: #333333; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Protects against viruses, spyware, and adware&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Detects and stops viruses, spyware, adware, and other potentially unwanted programs before they can install and compromise the security of your desktops, laptops, and servers.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;strong style=&quot;border: 0px; color: #333333; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Integrated firewall protection&lt;/span&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Built-in firewall blocks unwanted Internet access to and from your computer&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Keeps hackers and identity thieves at bay.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; line-height: 21.600000381469727px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Scans for vulnerabilities&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Identifies vulnerabilities residing in Internet services, shopping carts, ports, operations systems, servers, key applications, firewalls, addressable switches, load balancers, and routers.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;border: 0px; color: #666666; line-height: 21.600000381469727px; margin-bottom: 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Leave the management to us&lt;/span&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; line-height: 21.600000381469727px; margin: 0px 0px 10px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;Trust McAfee to handle your PC security.&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; color: #666666; margin: 0px 0px 0px 14px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white; font-family: inherit;&quot;&gt;McAfee Security SaaS solutions run in our data centers, which relieves you of the responsibility of managing the entire infrastructure.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;System Requirements&lt;br /&gt;
&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Intel Pentium processor or compatible architecture&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Internet connection: Microsoft Internet Explorer 5.5 with Service Pack 2 (SP2) or higher&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;RAM: 512 MB (1–2 GB recommended)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Microsoft mouse or compatible pointing device&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;256-color VGA monitor or better&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Endpoint Protection: Virus, Spyware &amp;amp; Firewall Protection&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; color: #666666; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; outline: 0px; padding: 0px;&quot;&gt;
&lt;strong style=&quot;background-color: white; border: 0px; color: #333333; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;(Client Computers)&lt;/strong&gt;&lt;/div&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 7 (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows Vista (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows XP Home or Professional with SP2 or higher (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 2000 Professional with SP3 or higher&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Servers&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 2008 Server (32-bit and 64-bit): Standard, Enterprise, Small Business, or Essential Business&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 2003 Standard Server: Enterprise, Web Edition, or Small Business&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 2000 Server: Advanced or Small Business (all with SP3 or higher)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Browser Protection (Client Computers)&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 7 (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows Vista (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows XP Home or Professional with SP2 or later (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 2000 Professional with SP3 or higher&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Web Filtering&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows 7 (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows Vista (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Windows XP Home or Professional with SP2 or higher (32-bit and 64-bit)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;&lt;/ul&gt;
&lt;h4 style=&quot;background-image: none; border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 16px; line-height: 21.600000381469727px; margin: 10px 0px 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Vulnerability Assessment&lt;/span&gt;&lt;/h4&gt;
&lt;ul style=&quot;border: 0px; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 21.600000381469727px; margin: 0px 0px 0px 16px; outline: 0px; padding: 0px;&quot;&gt;
&lt;li style=&quot;border: 0px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;&lt;span style=&quot;background-color: white;&quot;&gt;Vulnerability Assessment SaaS has no system requirements because it is an online service.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;h4 style=&quot;text-align: center;&quot;&gt;
&lt;a href=&quot;http://43a39mboyzvkow5f79vg8m2m44.hop.clickbank.net/&quot; target=&quot;_blank&quot;&gt;&lt;b&gt;&lt;span style=&quot;color: red; font-size: large;&quot;&gt;Download Mcafee Internet Security Software 2012&lt;/span&gt;&lt;/b&gt;&lt;/a&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/mcafee-security-software-remove-viruses.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWK9kJete8hUP3R23QYl0woF_I5XmJKnpsV-BdxI46_HTyZ_wRpxxdGpYHJo3dewEYdADA_Lc73EHUdvac45JMUFxZ6zXRDdIjM41e_SvL5Lu2kf4opjgd8nlfHvbAjRKEEGGhxBKKmMSA/s72-c/w32wecorl-a-dcom-server-process-launcher-terminated-unexpectedly.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-295978866970062637</guid><pubDate>Sun, 12 Aug 2012 23:29:00 +0000</pubDate><atom:updated>2012-08-13T12:57:23.231-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Facebook Malware Video Threat Spreading Virally!</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://6.mshcdn.com/wp-content/uploads/2010/05/facebook-bug.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://6.mshcdn.com/wp-content/uploads/2010/05/facebook-bug.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;A Facebook phishing attack is on the loose this weekend — the third widespread attack on the site in the past three weeks. The attack attempts to steal your Facebook login credentials, install malware on your computer and even get your home address.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The attack is spread via a “hilarious video” posted to Facebook walls,&amp;nbsp;reports WebSense. When clicked, a form appears requesting your Facebook login.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The attack then returns you to Facebook, installs an app called “Media Player HD,” and asks you to download the “FLV player” — doing so installs malware on your machine. It gets worse: Depending on your location, you may also be presented with a contest to win an iPad … if you just enter your home address.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;To avoid getting caught, simply remove the “hilarious video” if you find it on your&amp;nbsp;Facebook&amp;nbsp;wall. If you see it elsewhere on Facebook, don’t click it … and of course remember the obvious rule: Don’t enter your Facebook login anywhere other than Facebook.com.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;If you already fell for the attack, change your Facebook password, uninstall the Facebook app (often called “Media Player HD”), and run a virus/malware scan on your computer.&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;The video below, courtesy of&amp;nbsp;Websense, explains the attack.&lt;/span&gt;&lt;/div&gt;
&lt;center&gt;
&lt;object height=&quot;385&quot; style=&quot;border: 0px; color: #474747; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 21px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;&quot; width=&quot;640&quot;&gt;&lt;embed wmode=&quot;opaque&quot; src=&quot;http://www.youtube.com/v/nO7QzM3BN74&amp;amp;hl=en_US&amp;amp;fs=1&amp;amp;&quot; type=&quot;application/x-shockwave-flash&quot; allowscriptaccess=&quot;always&quot; allowfullscreen=&quot;true&quot; width=&quot;640&quot; height=&quot;385&quot;&gt;&lt;/object&gt;&lt;/center&gt;
&lt;center&gt;
&lt;hr style=&quot;border-bottom-color: rgb(204, 204, 204); border-style: none none dotted; color: #474747; font-family: Arial, Helvetica, sans-serif; font-size: 13px; height: 1px; line-height: 21px; margin: 0px 0px 24px; padding: 0px;&quot; /&gt;
&lt;/center&gt;
&lt;br /&gt;
&lt;div style=&quot;border: 0px; color: #474747; font-size: 13px; margin-bottom: 18px; margin-top: 18px; outline: 0px; padding: 0px; vertical-align: baseline;&quot;&gt;
&lt;/div&gt;
&lt;center&gt;
&lt;span style=&quot;color: #474747; font-family: Arial, Helvetica, sans-serif; font-size: 13px; line-height: 21px;&quot;&gt;&lt;/span&gt;&lt;/center&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/facebook-malware-video-threat-spreading.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-5590019160931850748</guid><pubDate>Thu, 09 Aug 2012 23:47:00 +0000</pubDate><atom:updated>2012-08-09T16:47:17.993-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Buysellads Approval</category><title>How To Get Approved For BuySellAds.com</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
Hello Friends, Today I will be sharing you some of the best ways for buysellads approval. &lt;span style=&quot;font-family: inherit;&quot;&gt;As&amp;nbsp;&lt;span style=&quot;background-color: white; color: #333333; line-height: 21.016666412353516px;&quot;&gt;BuySellAds nowadays is a very popular direct advertising method which makes us easy to get advertiser and publisher as well. Many of the people are trying to get approved by &amp;nbsp;BSA but are tired from disapproved messages! Today I will teach you, how can you easily get approved by buysellads.&lt;br /&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; line-height: 21.016666412353516px;&quot;&gt;&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqpLydXcyhUjIc2Z76WF_0ftih8lq5Wm131sfmpq33umRXWYvfaWCFYoRWLNVSd42D9jRuSrH2Jg5M1bbPR7d16sTZtCWNzqPEbq_Srd64xS8tnNYipg_eQeP2vBbmx54q948u0mFrBWA/s1600/BuySellAds-approved-blog.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;198&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqpLydXcyhUjIc2Z76WF_0ftih8lq5Wm131sfmpq33umRXWYvfaWCFYoRWLNVSd42D9jRuSrH2Jg5M1bbPR7d16sTZtCWNzqPEbq_Srd64xS8tnNYipg_eQeP2vBbmx54q948u0mFrBWA/s320/BuySellAds-approved-blog.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; line-height: 21.016666412353516px;&quot;&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;background-color: white; color: #333333; line-height: 21.016666412353516px;&quot;&gt;Following Are The Methods To Get Approved For Buysellads.com&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
1) Alexa Ranking :-&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-weight: normal; line-height: 21.016666412353516px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;
According to BSA terms, you only can submit your blog if you have less than 100K Alexa rank. But, you can get approved your blog for BSA, even if you have more than 100K Alexa rank. So, you don’t have to do harder for your Alexa ranking. But, try getting more traffic.&lt;br /&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; line-height: 21.016666412353516px;&quot;&gt;&lt;span style=&quot;font-family: inherit; font-size: small;&quot;&gt;2) Website Age :-&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; font-weight: normal; line-height: 21.016666412353516px;&quot;&gt;&lt;br /&gt;
&lt;br /&gt;
BSA will not approve if your blog is recent and just created. Your blog must be at least 3 months old. So, be patient for your new blog.&lt;/span&gt;&lt;/h4&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; line-height: 21.016666412353516px;&quot;&gt;3) Custom Domain :-&lt;br /&gt;
&lt;br /&gt;
&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; font-weight: normal; line-height: 21.016666412353516px;&quot;&gt;BSA will send ‘Your blog is declined’ message if you have not your own domain like .com .info or .net&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; font-weight: normal; line-height: 21.016666412353516px;&quot; /&gt;&lt;span style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; font-weight: normal; line-height: 21.016666412353516px;&quot;&gt;Try to get your own domain instead of free service like blogspot.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
4) Fresh Content &amp;amp; Regular Updates :-&lt;br /&gt;
&lt;br /&gt;
&lt;span style=&quot;background-color: white; color: #333333; font-family: verdana, &#39;Trebuchet MS&#39;, &#39;Lucida Grande&#39;, &#39;Lucida Sans Unicode&#39;, &#39;Lucida Sans&#39;, Arial, sans-serif; font-size: 12px; font-weight: normal; line-height: 21.016666412353516px;&quot;&gt;One thing that you have to do remember is “Content is King”. Try to make more unique content that can impress to all. Also you can post different article that we can’t find that in other’s site. Don’t copy any content from other’s site.&lt;/span&gt;&lt;br /&gt;
&lt;/h4&gt;
These are the important things which can help you in buysellads approval, Goodluck!&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/how-to-get-approved-for-buyselladscom.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgqpLydXcyhUjIc2Z76WF_0ftih8lq5Wm131sfmpq33umRXWYvfaWCFYoRWLNVSd42D9jRuSrH2Jg5M1bbPR7d16sTZtCWNzqPEbq_Srd64xS8tnNYipg_eQeP2vBbmx54q948u0mFrBWA/s72-c/BuySellAds-approved-blog.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-3506998028237280186</guid><pubDate>Wed, 08 Aug 2012 12:36:00 +0000</pubDate><atom:updated>2012-08-15T23:12:52.226-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Jailbreaking</category><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>Automatically Jailbreak/Unlock Any Iphone Ipad Easily</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNKv7gslriDwt525iHKeDhJMZ7sWm6NE9vh_8BF6Dgd0_OBQeKjKg1lp1NiojAIKQj_nxVqDkym0ilTST9__TEcmgyl-QjJqnLLhQjJtX3pd5HG9fDSIJXtIm3CabiOvkgPk3Dgb0DaE8/s1600/200x200x1.gif&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNKv7gslriDwt525iHKeDhJMZ7sWm6NE9vh_8BF6Dgd0_OBQeKjKg1lp1NiojAIKQj_nxVqDkym0ilTST9__TEcmgyl-QjJqnLLhQjJtX3pd5HG9fDSIJXtIm3CabiOvkgPk3Dgb0DaE8/s1600/200x200x1.gif&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;background-color: white; font-family: Helvetica, Arial, FreeSans, sans-serif; font-size: 12px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;AutomaticiPhoneUnlockers.com is a leader in the iPhone unlocking industry. You can feel safe knowing that over 100,000 iphone owners have used AutomaticiPhoneUnlockers to jailbreak and unlock their iPhones safely. Whether you have the original 2G iPhone, the 3G iPhone, the 3GS iPhone or the newest iPhone 4 AutomaticiPhoneUnlockers can jailbreak and unlock your iPhone. Our iPhone unlock software is capable of unlocking iPhones that have been damaged by other unlocking methods and also iPhones that have been previously unlocked but have been relocked due to upgrading through itunes.&lt;/span&gt;&lt;br /&gt;
&lt;h3 style=&quot;border: 0px; color: #666666; font-family: Helvetica, Arial, FreeSans, sans-serif; font-size: 21px; letter-spacing: -1px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-align: -webkit-auto; text-rendering: optimizelegibility; visibility: visible;&quot;&gt;


&lt;div class=&quot;module-title-surround&quot; style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin: 0px; outline: 0px; padding: 0px;&quot;&gt;
&lt;div class=&quot;module-title&quot; style=&quot;border: 0px; margin: 0px 0px 20px; outline: 0px; padding: 0px; position: relative;&quot;&gt;
&lt;h1 class=&quot;title&quot; style=&quot;border: 0px; font-size: 26px; font-weight: normal; letter-spacing: 1px; line-height: 33px; margin: 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility; visibility: visible;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Features&lt;/span&gt;&lt;/h1&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;clear&quot; style=&quot;background-image: none; border: 0px; clear: both; float: none; font-size: 0px; font-weight: normal; height: 0px; letter-spacing: normal; line-height: 20px; list-style: none; margin: 0px; outline: 0px; overflow: hidden; padding: 0px; visibility: hidden; width: 0px;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; smartload=&quot;0&quot; src=&quot;http://automaticiphoneunlockers.com/images/features1.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;/h3&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Use Any Cell Phone Company&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;When you use our iPhone unlocking solution you will be able to use any GSM SIM card from any cell phone provider, anywhere in the world.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;70&quot; src=&quot;http://automaticiphoneunlockers.com/images/features2.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;55&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Works On All iPhones&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Our solution has been tested on all iPhones (2G, 3G, 3GS, 4) and we constantly update it to make sure it works on all firmwares and basebands.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; smartload=&quot;1&quot; src=&quot;http://automaticiphoneunlockers.com/images/features3.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Easiest Unlocking Solution&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;We provide you with detailed step by step instructions with pictures and screenshots to show you the entire process from A to Z.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; src=&quot;http://automaticiphoneunlockers.com/images/features4.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Enable Tethering&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;An unlocked iPhone allows you to tether the iPhone to your laptop so that you can use your cell phone as a high speed modem for internet access.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; smartload=&quot;2&quot; src=&quot;http://automaticiphoneunlockers.com/images/features5.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Unlock All Features&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Not only can you use any carrier, you can also unlock hidden and banned apps, games, backgrounds, and customize your iPhone with apps such as winterboard.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; src=&quot;http://automaticiphoneunlockers.com/images/features6.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Instant Download&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Our automated order process automatically provides you the download link to our solution so you can immediately begin unlocking your phone within minutes.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; smartload=&quot;3&quot; src=&quot;http://automaticiphoneunlockers.com/images/features7.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Free Lifetime Updates&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Never worry about your iPhone getting re-locked, we provide you with 100% free lifetime updates to make sure that you always have an unlocked iPhone.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; height=&quot;48&quot; src=&quot;http://automaticiphoneunlockers.com/images/features8.png&quot; style=&quot;border: 0px; float: left; margin: 10px; outline: 0px; padding: 0px;&quot; width=&quot;48&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;24/7 Support Staff&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;If you ever do need help unlocking your iPhone our experienced support staff is here 24 hours a day, 7 days a week to answer your questions and assist you.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; class=&quot;&quot; height=&quot;auto&quot; smartload=&quot;4&quot; src=&quot;http://automaticiphoneunlockers.com/images/features9.png&quot; style=&quot;border: 0px; float: left; margin: 10px; opacity: 1; outline: 0px; padding: 0px; visibility: visible; zoom: 1;&quot; width=&quot;auto&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;100% Safe And Reliable&lt;/span&gt;&lt;/h4&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;Our unlocking solution is 100% safe and won&#39;t damage your iPhone. Unlike other software, our solution won&#39;t lock SIM card or &quot;brick&quot; your iPhone.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;img alt=&quot;Features&quot; border=&quot;0&quot; class=&quot;&quot; height=&quot;auto&quot; smartload=&quot;5&quot; src=&quot;http://automaticiphoneunlockers.com/images/features10.png&quot; style=&quot;border: 0px; float: left; margin: 10px; opacity: 1; outline: 0px; padding: 0px; visibility: visible; zoom: 1;&quot; width=&quot;auto&quot; /&gt;&lt;/div&gt;
&lt;h4 style=&quot;border: 0px; font-size: 14px; line-height: 1.1em; margin: 15px 0px; outline: 0px; padding: 0px; text-rendering: optimizelegibility;&quot;&gt;


&lt;span style=&quot;background-color: white;&quot;&gt;Over 100,000 Users&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://www.plimus.com/jsp/buynow.jsp?contractId=2976000&amp;amp;referrer=1050050&quot; target=&quot;_blank&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;140&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpW0p7FI8ESybPmm4m9A5B0LAAu1UuR-vP_lLPSKTTs6bOYWzNU_McX7hrtNHqtS7fH-JRaky_yj9lvSKt9fJX6zZb5gXv1ebXATrp6e06T_KZTx8z-vbUYDOe6lI8CKb3jhcOC9ymE5M/s320/orderbutton02.png&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;border: 0px; font-size: 12px; font-weight: normal; letter-spacing: normal; line-height: 20px; margin-bottom: 15px; outline: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;background-color: white;&quot;&gt;This is the most trusted and stable unlocking solution available and was rated as #1 by over 100,000 users from over 70 countries.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/automatically-jailbreakunlock-any.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjNKv7gslriDwt525iHKeDhJMZ7sWm6NE9vh_8BF6Dgd0_OBQeKjKg1lp1NiojAIKQj_nxVqDkym0ilTST9__TEcmgyl-QjJqnLLhQjJtX3pd5HG9fDSIJXtIm3CabiOvkgPk3Dgb0DaE8/s72-c/200x200x1.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-7372956027194576994</guid><pubDate>Tue, 07 Aug 2012 14:51:00 +0000</pubDate><atom:updated>2012-08-12T20:26:44.442-07:00</atom:updated><title>5 Ways To Prevent Your Facebook Account From Hackers in 2012</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGSRZJldguNT9OgWhHN7QIoBBXUK2U_aU7RyAtckBr6JPx3XFK2HrS0U5wKz8zrK2-mUgjw6R7WCmsfVMDOnIrG_qbQMmXGj-3oATAyHGQGlwS1PDlmfYzw86dpw7zZUhzwaLRIT3KJ1s/s1600/facebook-security.gif&quot; imageanchor=&quot;1&quot; style=&quot;clear: right; float: right; margin-bottom: 1em; margin-left: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;200&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGSRZJldguNT9OgWhHN7QIoBBXUK2U_aU7RyAtckBr6JPx3XFK2HrS0U5wKz8zrK2-mUgjw6R7WCmsfVMDOnIrG_qbQMmXGj-3oATAyHGQGlwS1PDlmfYzw86dpw7zZUhzwaLRIT3KJ1s/s200/facebook-security.gif&quot; width=&quot;195&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
Facebook is the most popular social networking website which has more than 800million &amp;nbsp;users, more than 1million photos are updated every week by facebook users. So this is why facebook comes under the red list of hackers. Most of the users don&#39;t knows the close connection of entering personal information, like emails, making unknown friends and playing games on facebook. Today I will show you some of the quick steps on how to prevent your facebook account from hackers.&lt;br /&gt;
&lt;br /&gt;
&lt;h3 style=&quot;text-align: left;&quot;&gt;
Following are the steps :-&lt;/h3&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;1) Profile Privacy&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmKfHIgh6j-Dmq4fgiePEsjc7zWqHa-Uu-KGfftOzDw0GaJ84r6G4I9_9Du8OQ_HJEwSSEJRetFkOal0fcQTMrktCPWhNa37h4RGacj3jyUriFLfo8DbhkJdt-1fHz1-ihqpmoNNIznk/s1600/PrivacyProfile.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;230&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBmKfHIgh6j-Dmq4fgiePEsjc7zWqHa-Uu-KGfftOzDw0GaJ84r6G4I9_9Du8OQ_HJEwSSEJRetFkOal0fcQTMrktCPWhNa37h4RGacj3jyUriFLfo8DbhkJdt-1fHz1-ihqpmoNNIznk/s400/PrivacyProfile.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Profile Privacy is the first thing, for the protection of your private data like If you choose&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;border: 0px; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;Customize&lt;/strong&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;, you could be more specific. Your Profile Should only be viewed by your friends. Basic Information like email, graduation, job, etc should not be shared by unknowns! Hide your photos too.&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;2) Search Visibility&amp;nbsp;&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDQ5DE3dWjhGvl-8R2rLNEfwQD0lXy8kIjqASUEWOPo4Ocwd9xmiN7mJXjX0lCC6-i2nAWJwtTCfyhJJxyAm06D3GOIx90dEjU6RP8tOtPxIOtDmkIDAiAifbUx0iMllkVoleXzpgPG48/s1600/PrivacySearch.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;170&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDQ5DE3dWjhGvl-8R2rLNEfwQD0lXy8kIjqASUEWOPo4Ocwd9xmiN7mJXjX0lCC6-i2nAWJwtTCfyhJJxyAm06D3GOIx90dEjU6RP8tOtPxIOtDmkIDAiAifbUx0iMllkVoleXzpgPG48/s400/PrivacySearch.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Click&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; line-height: 20px; text-align: -webkit-auto;&quot;&gt;P&lt;/span&gt;&lt;span style=&quot;border: 0px; color: #3b3128; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;rivacy &amp;gt; Search&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;It is when someone searches you on facebook by your name. This option is an important way to get protected your Facebook privacy. It should be to Everyone but don&#39;t cross the limits of sharing, share your friend list if you want, Add Friend, Someone message you!&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;3) Controlling Feed Post &amp;amp; Friend Posts&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwAASEpyFu7GfpBv_XAo9Cy2-jp4fPMFte5Wo7sIlGVvIum1yPKMMShz8zyhZaiayKMSObRXgMcgt_M1L2lW4QJnd8YJLlaGKeKOjxScDGUaYA-O3xfM-_a6vv7ySvKpO87RvKCDgkKBE/s1600/PrivacyNewsFeed.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;293&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwAASEpyFu7GfpBv_XAo9Cy2-jp4fPMFte5Wo7sIlGVvIum1yPKMMShz8zyhZaiayKMSObRXgMcgt_M1L2lW4QJnd8YJLlaGKeKOjxScDGUaYA-O3xfM-_a6vv7ySvKpO87RvKCDgkKBE/s400/PrivacyNewsFeed.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Our practice and actions in Facebook such as likes, comments, posts appear as friend feed on ALL your friends’ home wall. You can only turn this privacy on or off.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Go to&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;border: 0px; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;Privacy &amp;gt; News Feed and then Wall&lt;/strong&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;and choose whether you want your friend or ex-boyfriend/girlfriend to know that you’re in love or not.&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;4) Facebook Wall Privacy&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC_z4cLnlkz2kRy3HM9MBFA_wXBjhF58G33fveh33Be7YdZx-CTnlZ81v4Iq1392YXExpaq09HFP3iil-aHyUweccKzjCyffjaWDHHEU8VkOtWNbIfu1zSEi5HoHTh6HQPicFyTHbJDcw/s1600/WallPrivacy.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;220&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC_z4cLnlkz2kRy3HM9MBFA_wXBjhF58G33fveh33Be7YdZx-CTnlZ81v4Iq1392YXExpaq09HFP3iil-aHyUweccKzjCyffjaWDHHEU8VkOtWNbIfu1zSEi5HoHTh6HQPicFyTHbJDcw/s400/WallPrivacy.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Go to your profile wall, click&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;border: 0px; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;Options &amp;gt; Settings&lt;/strong&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;under the option box.&amp;nbsp;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Here you can change the privacy whether your friends can post status or pictures on your Wall, and who can check the status made by your friends on your wall.&lt;/span&gt;&lt;br /&gt;
&lt;h4 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;font-size: large;&quot;&gt;5) Protect Yourself From Unknown Applications&lt;/span&gt;&lt;/h4&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHxogeSpoAWsNx4eIypfRHWlZv_-CkdP4413vxFTMgtd6bYIWncrVDTrwH2ONj5KA2RqN61nNgyqGUyyJAe17yjGrCthFw8bQCZ1uuuYa0hXq605ZPBRsub6Le1K3juXhllnlC9QmrERk/s1600/PrivacyApplications.png&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;153&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhHxogeSpoAWsNx4eIypfRHWlZv_-CkdP4413vxFTMgtd6bYIWncrVDTrwH2ONj5KA2RqN61nNgyqGUyyJAe17yjGrCthFw8bQCZ1uuuYa0hXq605ZPBRsub6Le1K3juXhllnlC9QmrERk/s400/PrivacyApplications.png&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;Go to&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;border: 0px; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;Privacy &amp;gt; Applications&lt;/strong&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif; font-size: 14px; line-height: 20px; text-align: -webkit-auto;&quot;&gt;, and click the&amp;nbsp;&lt;/span&gt;&lt;strong style=&quot;border: 0px; color: #3b3128; font-family: Arial, Helvetica, sans-serif; font: inherit; line-height: 20px; margin: 0px; padding: 0px; text-align: -webkit-auto; vertical-align: baseline;&quot;&gt;Settings&lt;/strong&gt;&lt;span style=&quot;text-align: -webkit-auto;&quot;&gt;&lt;span style=&quot;color: #3b3128; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 14px; line-height: 20px;&quot;&gt;&amp;nbsp;option check all the boxes should be unchecked. These settings share what information about you is visible to games/applications installed by your friends. It could be Facebook Virus, Trojans, Spywares made by your enemy friend.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt; &lt;br /&gt;
&lt;b&gt;These were the all main tips to get safeguarded from hackers, Hope you enjoy it :) Good Luck!&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class=&quot;about-author&quot;&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/5-ways-to-prevent-your-facebook-account.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgGSRZJldguNT9OgWhHN7QIoBBXUK2U_aU7RyAtckBr6JPx3XFK2HrS0U5wKz8zrK2-mUgjw6R7WCmsfVMDOnIrG_qbQMmXGj-3oATAyHGQGlwS1PDlmfYzw86dpw7zZUhzwaLRIT3KJ1s/s72-c/facebook-security.gif" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-2781777550833047527</guid><pubDate>Mon, 06 Aug 2012 21:15:00 +0000</pubDate><atom:updated>2012-08-06T14:17:01.237-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Anonymous Hacker Got Arrested For Facebook Malware Threat</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;background-color: white; color: #555555; font-family: inherit; line-height: 24px; text-align: justify;&quot;&gt;Hong Kong police said Sunday they had arrested a 21-year-old man believed to be a member of the international hacker group Anonymous, after he reportedly said on social networking site Facebook that he would hack several government websites.&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBj2KKJYdlNKslUCZHHHriVF2G6W8UXfFv0vYXdzApi56kjTJCOcA66y4_WtSa0coFe21Oaze3xvadbPffP0uKZmfSGJWrrF0dkZoAyCYG4oS3bHu1fPiUj4xZbJIlj2C-lMgdyP0L3vk/s1600/Facebook-Alleged+Anonymous+hacker+arrested+for+Facebook+threat.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBj2KKJYdlNKslUCZHHHriVF2G6W8UXfFv0vYXdzApi56kjTJCOcA66y4_WtSa0coFe21Oaze3xvadbPffP0uKZmfSGJWrrF0dkZoAyCYG4oS3bHu1fPiUj4xZbJIlj2C-lMgdyP0L3vk/s320/Facebook-Alleged+Anonymous+hacker+arrested+for+Facebook+threat.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #555555; line-height: 24px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; line-height: 24px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #555555; font-family: inherit;&quot;&gt;“&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;The Internet is not a virtual world of lawlessness&lt;/b&gt;,” a police spokesman said, adding that the man was required to report back to the police in October.&lt;br /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;color: #555555; margin: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;He faces up to five years imprisonment if found guilty.The man is a member of the global hacker group Anonymous, the South China Morning Post said. The group is said to have 20 members in the semi-autonomous Chinese territory, which guarantees civil liberties not seen on the mainland, including freedom of speech.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;color: #555555; margin: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;color: #555555;&quot;&gt;The police spokesman declined to confirm his link to Anonymous. The last posting on the “Anonymous HK” Facebook page on July 22 urged authorities to show “respect” to citizens&lt;/span&gt;&lt;br /&gt;Author Bio :- Arjun Sharma loves to write articles upon technology news and updates!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/08/anonymous-hacker-got-arrested-for.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBj2KKJYdlNKslUCZHHHriVF2G6W8UXfFv0vYXdzApi56kjTJCOcA66y4_WtSa0coFe21Oaze3xvadbPffP0uKZmfSGJWrrF0dkZoAyCYG4oS3bHu1fPiUj4xZbJIlj2C-lMgdyP0L3vk/s72-c/Facebook-Alleged+Anonymous+hacker+arrested+for+Facebook+threat.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-647375692369527658</guid><pubDate>Thu, 02 Aug 2012 13:43:00 +0000</pubDate><atom:updated>2012-08-06T14:19:04.348-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Dns Spoofing</category><title>DNS Spoofing Tutorial : Website Hacking Attack Guide</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;DNS spoofing or&lt;/span&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;DNS cache poisoning is a computer hacking attack in which data is introduced into a Domain Name System(DNS) name servers cac&lt;/span&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;he database, which causes the name server to return to an incorrect ip address, diverting traffic to another computer.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;In simple words, it redirects the traffic to another website.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;img border=&quot;0&quot; height=&quot;238&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUNrQ4PNEQJO828OBFllNIvaRTbCo_ZxfYCbXQFjYLVsOY7pfo8v_w3yXE8K8SmqLzb92wWRe2Am4BWOSGMev_dQF1DkeVVUcxqP_AbdFIJtSUsCOPwF-vSeND9t5KkVW4mUeXigt-FiXa/s320/b0004999_07053315.jpg&quot; style=&quot;background-color: transparent; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;320&quot; /&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;background-color: white; text-align: -webkit-auto;&quot;&gt;For example the victim wants to open www.facebook.com but is redirected to www.myspace.com&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-family: Verdana, sans-serif; line-height: 20px;&quot;&gt;
&lt;h3 style=&quot;text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;color: red; font-size: small;&quot;&gt;TUTORIAL&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Install Cain &amp;amp; Abel from &lt;span style=&quot;color: red;&quot;&gt;&lt;a href=&quot;http://www.oxid.it/cain.html&quot; target=&quot;_blank&quot;&gt;HERE&lt;/a&gt;&amp;nbsp;&lt;/span&gt;and open it, go to configure and select your adapter.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFWCPgJruuZ2_scpQ5moz3c-7-nsXS0aZtYWdV-rlTsGfyRm_fTen1I4yL_m-n4zKmoxKnfdaa74YgFXhX2GcMVuQqgvCBop7w-MGFAxdi6hLxUn1k3DC0wGSL8LIq-Lg3b43NH2_8_aV/s1600/1.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;281&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEixFWCPgJruuZ2_scpQ5moz3c-7-nsXS0aZtYWdV-rlTsGfyRm_fTen1I4yL_m-n4zKmoxKnfdaa74YgFXhX2GcMVuQqgvCBop7w-MGFAxdi6hLxUn1k3DC0wGSL8LIq-Lg3b43NH2_8_aV/s400/1.JPG&quot; style=&quot;background-color: transparent; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Select Sniffer option and then select the start/stop sniffer option from the toolbar.&lt;/span&gt;&amp;nbsp;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Right click in the white area and then click on scan MAC addreses.&lt;/span&gt;&amp;nbsp;&lt;/li&gt;
&lt;/ul&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgneZoqzuWoFG8NQ5q4-sxY3hkLiH8ktkhxbXXfeGANMB_pmKmWiNMEVVQts2hCbQdSHAPD3irE_xh3-Yb4B2VsnRg7ndJGs6qatMzVM2D4kFXqrwqa3DN8OVbDKHTuVgFcLsaiJuBRr7d5/s1600/2.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;226&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgneZoqzuWoFG8NQ5q4-sxY3hkLiH8ktkhxbXXfeGANMB_pmKmWiNMEVVQts2hCbQdSHAPD3irE_xh3-Yb4B2VsnRg7ndJGs6qatMzVM2D4kFXqrwqa3DN8OVbDKHTuVgFcLsaiJuBRr7d5/s400/2.JPG&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After scanning click on the APR option in the left bottom corner. Then click on the + sign in the top and select the computers you want to mess with.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOIswGtrmMEjRedYNW9G4E4eco2zWPAJF-KHJ8aRiWI8QMUUMiGFZOTDoDHBQufND09GPWDCuQqWK2aXafbturTo4369-Ii32RXSK6eJKI9Z_7Tp7G8rHVIcb1OqSnWUXieCfho-mktiJ2/s1600/3.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;291&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOIswGtrmMEjRedYNW9G4E4eco2zWPAJF-KHJ8aRiWI8QMUUMiGFZOTDoDHBQufND09GPWDCuQqWK2aXafbturTo4369-Ii32RXSK6eJKI9Z_7Tp7G8rHVIcb1OqSnWUXieCfho-mktiJ2/s400/3.JPG&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;After that select APR-DNS and again click on + sign to add websites. (Now here i have entered www.facebook.com), then click on resolve and type the website name that &amp;nbsp;you want to open up instead of www.facebook.com. (i have given www.myspace.com)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk_95UNBi68x6mU0Ht7-hRZUGjzRkM4_CHmapDwTQHiRdUDWlBG-2GMhWXACI_fLQ7SVWcXaWKK0B9WwsupTg8hjeaZE26F1oahqmrkJUJBXjQFTLBrGwN8gsAhZ5k7apg8VB6DdRu7cwd/s1600/4.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;235&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk_95UNBi68x6mU0Ht7-hRZUGjzRkM4_CHmapDwTQHiRdUDWlBG-2GMhWXACI_fLQ7SVWcXaWKK0B9WwsupTg8hjeaZE26F1oahqmrkJUJBXjQFTLBrGwN8gsAhZ5k7apg8VB6DdRu7cwd/s400/4.JPG&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkp5LlpnNPyH2vfV-06XbzhCT7Zfrph5HJTKV0BS6k9g3wT3fOfxXnQNTL0grNze5wrItp2pMrvc7DYBeDPZMW1UhUvulcxsYFXUWSotrxqPObP5MDMwzuhAMn7eyWzjxoIdA2jMWcDMSj/s1600/5.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;237&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgkp5LlpnNPyH2vfV-06XbzhCT7Zfrph5HJTKV0BS6k9g3wT3fOfxXnQNTL0grNze5wrItp2pMrvc7DYBeDPZMW1UhUvulcxsYFXUWSotrxqPObP5MDMwzuhAMn7eyWzjxoIdA2jMWcDMSj/s400/5.JPG&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif; text-align: left;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now click on the start/stop option.&lt;/span&gt;&lt;span style=&quot;text-align: center;&quot;&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; font-size: 12px; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrN8eZi_RVD5KZl2PtfZVv2myEYQkgGlMPxlxyTUe5QN8mbM_wpFHoBbe2RNEdnN8C8sqoYx8Tc0021X1RTaN14a2-hn7IvkDs2wap4k6Mua6YUCQdCSEViMl-QLg6Q4S29Ve_3qyzCJs6/s1600/6.JPG&quot; imageanchor=&quot;1&quot; style=&quot;color: #2f97ff; margin-left: 1em; margin-right: 1em; outline: none; text-decoration: none;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;323&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhrN8eZi_RVD5KZl2PtfZVv2myEYQkgGlMPxlxyTUe5QN8mbM_wpFHoBbe2RNEdnN8C8sqoYx8Tc0021X1RTaN14a2-hn7IvkDs2wap4k6Mua6YUCQdCSEViMl-QLg6Q4S29Ve_3qyzCJs6/s400/6.JPG&quot; style=&quot;background-color: transparent; background-position: initial initial; background-repeat: initial initial; border: 2px solid rgb(199, 199, 199); padding: 0px;&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;font-size: 12px;&quot;&gt;
&lt;ul style=&quot;list-style: none;&quot;&gt;
&lt;li style=&quot;background-attachment: scroll; background-color: transparent; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9yc22A7niAwN5XHW-VwZzN89zWp-_eiQzNZ4bvwl-txOLhrJ0YYzkqluxtZzuJkeFbkNl8U9psfDqxEgaQuFXE-znnb7kggUNVBSwYyQhKXhVP0243TfmgChIto01WI8hRYPWzWEnWhs/s400/265.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;&quot;&gt;&lt;span style=&quot;font-family: Arial, Helvetica, sans-serif;&quot;&gt;Now wait for a minute and see what happens to the victim. (In my case when the victim will open www.facebook.com he will be redirected to www.myspace.com). You can use any websites of your choice.&lt;br /&gt;&lt;span style=&quot;background-color: white; line-height: 20px;&quot;&gt;&lt;br /&gt;Hope You Like The Tutorial&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/dns-spoofing-tutorial-website-hacking.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiUNrQ4PNEQJO828OBFllNIvaRTbCo_ZxfYCbXQFjYLVsOY7pfo8v_w3yXE8K8SmqLzb92wWRe2Am4BWOSGMev_dQF1DkeVVUcxqP_AbdFIJtSUsCOPwF-vSeND9t5KkVW4mUeXigt-FiXa/s72-c/b0004999_07053315.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-375592071329976500</guid><pubDate>Mon, 30 Jul 2012 13:25:00 +0000</pubDate><atom:updated>2012-07-30T06:25:38.248-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking News</category><title>Security Researches Will Disclose Vulnerabilities in ARM &amp; NFC</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;br /&gt;
&lt;div style=&quot;background-color: white; font-family: Arial, Tahoma, &#39;Century gothic&#39;, sans-serif; font-size: 13px; line-height: 24px; margin: 0px; padding: 0px; text-align: justify;&quot;&gt;
&lt;span style=&quot;color: #555555;&quot;&gt;Security researchers are expected to disclose new vulnerabilities in near field communication (NFC), mobile baseband firmware, HTML5 and Web application firewalls next week at the Black Hat USA 2012 security conference.&amp;nbsp;The Black Hat session aim to expose sometimes shocking vulnerabilities in widely used products. They also typically show countermeasures to plug the holes.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;div style=&quot;color: #555555; margin: 0px; padding: 0px;&quot;&gt;
Two independent security consultants will give a class called &quot;&lt;b style=&quot;margin: 0px; padding: 0px;&quot;&gt;Advanced ARM exploitation&lt;/b&gt;,&quot; part of a broader five-day private class the duo developed. In a sold-out session, they will detail hardware hacks of multiple ARM platforms running Linux, some described on a separate blog posting.&lt;/div&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; color: #555555; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKjh5yCBS-CeZ-AF8cMNBkKZ0l5JnUCTYkY6p2NWG7GXI1kFVBs9cU7mhK8mRu-1wlk5Z0R3ZwgwhFo0WPXxzOMVMm6uJSG2TyzrW27CsEtqUmca3yqkEUgzElwrBale_LO0MTVEuzNIg/s1600/Black-Hat-USA-Conference.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; height=&quot;231&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKjh5yCBS-CeZ-AF8cMNBkKZ0l5JnUCTYkY6p2NWG7GXI1kFVBs9cU7mhK8mRu-1wlk5Z0R3ZwgwhFo0WPXxzOMVMm6uJSG2TyzrW27CsEtqUmca3yqkEUgzElwrBale_LO0MTVEuzNIg/s400/Black-Hat-USA-Conference.jpg&quot; width=&quot;400&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style=&quot;color: #555555; margin: 0px; padding: 0px;&quot;&gt;
&lt;br style=&quot;margin: 0px; padding: 0px;&quot; /&gt;&lt;/div&gt;
&lt;div style=&quot;color: #555555; margin: 0px; padding: 0px;&quot;&gt;
The purpose of the talk is to reach a broader audience and share the more interesting bits of the research that went into developing the Practical ARM Exploitation and presenters Stephen Ridley and Stephen Lawler demonstrate how to defeat XN, ASLR, stack cookies, etc. using nuances of the ARM architecture on Linux.&lt;/div&gt;
&lt;div style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: #555555;&quot;&gt;In addition to mobile and Web security, Black Hat presentations will also cover security issues and attack techniques affecting industrial control systems, smart meters and embedded devices.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;b&gt;&lt;span style=&quot;color: red;&quot;&gt;Author Bio :-&lt;/span&gt;&lt;span style=&quot;color: #555555;&quot;&gt; &amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;span style=&quot;color: #555555;&quot;&gt;Robert Clifton, love to write articles and news on hacking and world wide web technologies!&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/security-researches-will-disclose.html</link><author>noreply@blogger.com (Anonymous)</author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhKjh5yCBS-CeZ-AF8cMNBkKZ0l5JnUCTYkY6p2NWG7GXI1kFVBs9cU7mhK8mRu-1wlk5Z0R3ZwgwhFo0WPXxzOMVMm6uJSG2TyzrW27CsEtqUmca3yqkEUgzElwrBale_LO0MTVEuzNIg/s72-c/Black-Hat-USA-Conference.jpg" height="72" width="72"/><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-5085086890996791702</guid><pubDate>Mon, 30 Jul 2012 12:59:00 +0000</pubDate><atom:updated>2012-07-30T05:59:58.755-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Hacking Software</category><category domain="http://www.blogger.com/atom/ns#">Hide Ip</category><title>Hide The Ip : Software For Hiding Your IP Address</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;Your&lt;/span&gt; IP is exposed when ever you visit a website,when your Ip gets exposed it becomes easy to trace you&amp;nbsp;and find out your personal information,Hackers can use your Ip to gain access to your personal files and&amp;nbsp;documents and even can get into your paypal,alert etc accounts,&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Hide the Ip&lt;/b&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;is a Software which masks your IP&amp;nbsp;with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide&amp;nbsp;theiridentity and not get caught,its benificial for all and i recommend that every Pc should have this software installed&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div style=&quot;background-color: white; color: #333333; line-height: 19px; margin: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 24px;&quot;&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;Hide the IP&lt;/strong&gt;&amp;nbsp;to be the best one. It’s&amp;nbsp;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;ease of use&lt;/strong&gt;,&amp;nbsp;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;reliability&lt;/strong&gt;,&amp;nbsp;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;wide range of options&lt;/strong&gt;,&amp;nbsp;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;speed&lt;/strong&gt;&amp;nbsp;and&amp;nbsp;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;unmatchable price&lt;/strong&gt;&amp;nbsp;were on top when compared to that of the remaining IP Hising softwares on the market.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px; margin: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 24px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px; margin: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: 24px;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;line-height: normal;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-family: Verdana, sans-serif;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;img src=&quot;http://www.hide-the-ip.com/banners_new/box.jpg&quot; style=&quot;padding: 10px;&quot; /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;h2 style=&quot;text-align: left;&quot;&gt;
&lt;span style=&quot;color: red; font-family: inherit; font-size: small;&quot;&gt;Key Features of&amp;nbsp;&lt;span style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;b&gt;Hide the IP:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;font-size: x-small;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;b style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Hide IP Address »&lt;/b&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&amp;nbsp;Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;b style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Select Your Physical IP Location »&lt;/b&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;b style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Anonymous Web Surfing »&lt;/b&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;b&gt;&lt;/b&gt;You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;b style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;Bypass Website Country Restrictions »&amp;nbsp;&lt;/b&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;b&gt;&lt;/b&gt;Surf websites which are restricted for your country. Surf in forums on which you were banned.&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;br /&gt;&lt;/span&gt;&lt;br style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot; /&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;background-color: white; color: #333333; line-height: 19px; text-align: -webkit-auto;&quot;&gt;&lt;/span&gt;&lt;/span&gt;&lt;div style=&quot;background-color: white; color: #333333; line-height: 19px; margin: 0px 0px 15px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.&lt;/span&gt;&lt;/div&gt;
&lt;div style=&quot;background-color: white; color: #333333; line-height: 19px; margin: 0px 0px 15px; padding: 0px; text-align: -webkit-auto;&quot;&gt;
&lt;span style=&quot;font-family: inherit;&quot;&gt;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;So what are you waiting for?&amp;nbsp;&lt;/strong&gt;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;a href=&quot;http://www.hide-the-ip.com/203-download.shtml&quot; style=&quot;border: none; color: #666666; text-decoration: none;&quot;&gt;&lt;span class=&quot;Apple-style-span&quot; style=&quot;color: #3d85c6;&quot;&gt;Download the free trial&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong style=&quot;margin: 0px; padding: 0px;&quot;&gt;&amp;nbsp;and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/hide-ip-software-for-hiding-your-ip.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>0</thr:total></item><item><guid isPermaLink="false">tag:blogger.com,1999:blog-4572740781380543251.post-104826447254456349</guid><pubDate>Sun, 29 Jul 2012 13:02:00 +0000</pubDate><atom:updated>2012-07-29T06:06:01.255-07:00</atom:updated><category domain="http://www.blogger.com/atom/ns#">Mobile hacking</category><title>How To Spy On Cellphones? MSPY CellPhone Tracker Software</title><description>&lt;div dir=&quot;ltr&quot; style=&quot;text-align: left;&quot; trbidi=&quot;on&quot;&gt;
&lt;div style=&quot;text-align: -webkit-auto;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;http://i1.squidoocdn.com/resize/squidoo_images/-1/lens19577115_1340645054a-a-.jpg&quot; imageanchor=&quot;1&quot; style=&quot;clear: left; float: left; margin-bottom: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; src=&quot;http://i1.squidoocdn.com/resize/squidoo_images/-1/lens19577115_1340645054a-a-.jpg&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif;&quot;&gt;&lt;span style=&quot;font-size: 12px; line-height: 20px;&quot;&gt;Hello Everyone! I back once again, today i will show you how to spy on any cellphone.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style=&quot;background-color: white; color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px;&quot;&gt;mSpy is a background smartphone application that secretly records and logs SMS messages, Call history, calendar tasks and memos; bugs meeting rooms or whatever surroundings; tracks GPS locations of the phone in real time and displays all routes on a convenient map. The software installs directly into the phone you wish to spy on. However, physical access to the device is only needed for initial download. All settings may be adjusted remotely anytime online right from your web Control Panel. After the installation process is completed, as soon as in 20 minutes, all data, even those deleted, are uploaded to your private Control Panel account which is available from any PC or phone browser.&lt;br /&gt;&lt;br /&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;div class=&quot;grey_block_2&quot; style=&quot;background-color: #f2f1f2; color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 14px; font-weight: bold; line-height: 20px; margin-bottom: 12px; padding: 11px 16px; text-align: left; width: auto;&quot;&gt;
This invisible application is installed directly onto the device you own and is automatically activated every time the device is powered up, running invisibly and quietly in the background, unknown to the operator of the device.&lt;/div&gt;
&lt;br /&gt;
&lt;table border=&quot;0&quot; cellpadding=&quot;0&quot; cellspacing=&quot;0&quot; style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 18px; margin: 0px; padding: 0px;&quot;&gt;&lt;colgroup style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;col style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;137px&quot;&gt;&lt;/col&gt;&lt;col style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;158.5px&quot;&gt;&lt;/col&gt;&lt;col style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;158.5px&quot;&gt;&lt;/col&gt;&lt;col style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;158.5px&quot;&gt;&lt;/col&gt;&lt;col style=&quot;margin: 0px; padding: 0px;&quot; width=&quot;158.5px&quot;&gt;&lt;/col&gt;&lt;/colgroup&gt;&lt;tbody style=&quot;margin: 0px; padding: 0px;&quot;&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(216, 218, 220) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr0&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Undetectable / Hidden Icon&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(216, 218, 220) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(216, 218, 220) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(216, 218, 220) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(216, 218, 220) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr1&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Full Remote Control&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr2&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Call logs&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr3&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Emails&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr4&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;SMS messages&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr5&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Address Book&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr6&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Install without Cable, PC&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr7&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Ease of Use&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr8&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Upgrades and Updates&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr9&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Cell ID Tracking&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr10&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Spy Call, Bugging device&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr11&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;GPS Location Tracking&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr12&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Photos&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr13&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Videos&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr14&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Events&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr15&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Memos&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr16&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Tasks&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr17&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Log Encryption&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr18&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Unlimited Device Change&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr19&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Internet Capability Required&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr20&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;Web Account&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr21&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;10 Days Money Back Guarantee&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-weight: bold; height: 50px; margin: 0px; overflow: hidden; padding: 0px 20px 0px 0px; position: relative; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;image&quot; class=&quot;icon&quot; src=&quot;http://www.mspy.com/images/icon_1.gif&quot; style=&quot;border: 0px; margin: 0px; padding: 0px; position: relative; top: 3px;&quot; /&gt;&lt;span class=&quot;button_descr butt_open_descr22&quot; style=&quot;background-image: url(http://www.mspy.com/images/icon_1.gif); background-position: -20px 0%; background-repeat: no-repeat no-repeat; border-bottom-color: rgb(0, 0, 0); border-bottom-style: dotted; border-bottom-width: 1px; cursor: pointer; float: none; margin: 0px 0px 0px 10px; padding: 0px; position: relative;&quot;&gt;100% Customer Satisfaction&lt;/span&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;basic&quot; style=&quot;border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;img alt=&quot;supported&quot; src=&quot;http://www.mspy.com/images/yes.png&quot; style=&quot;border: 0px; height: 24px; margin: 0px; padding: 0px; position: relative; top: 0px; width: 24px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr class=&quot;gray&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;&lt;td class=&quot;name header&quot; style=&quot;background-color: whitesmoke; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; font-size: 14px; font-weight: bold; height: 50px; line-height: 20px; margin: 0px; overflow: hidden; padding: 3px 20px 10px 11px; position: relative; text-align: center; width: 140px;&quot; valign=&quot;middle&quot;&gt;&lt;/td&gt;&lt;td class=&quot;&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;b style=&quot;color: black; font-size: 17px; margin: 0px; padding: 0px;&quot;&gt;3 months&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;item_price&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;$99.00&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;Add to cart&quot; src=&quot;http://www.mspy.com/images/button_add_to_cart.png&quot; style=&quot;border: 0px; margin: auto; padding: 0px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;b style=&quot;color: black; font-size: 17px; margin: 0px; padding: 0px;&quot;&gt;6 months&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;item_price&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;$119.00&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;Add to cart&quot; src=&quot;http://www.mspy.com/images/button_add_to_cart.png&quot; style=&quot;border: 0px; margin: auto; padding: 0px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;b style=&quot;color: black; font-size: 17px; margin: 0px; padding: 0px;&quot;&gt;9 months&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;item_price&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;$139.00&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;Add to cart&quot; src=&quot;http://www.mspy.com/images/button_add_to_cart.png&quot; style=&quot;border: 0px; margin: auto; padding: 0px;&quot; /&gt;&lt;/td&gt;&lt;td class=&quot;&quot; style=&quot;background-color: whitesmoke; background-position: initial initial; background-repeat: initial initial; border-color: rgb(255, 255, 255) rgb(216, 218, 220) rgb(216, 218, 220) rgb(255, 255, 255); border-style: solid; border-width: 1px; color: #4b4b4b; height: 50px; margin: 0px; padding: 0px; text-align: center;&quot; valign=&quot;middle&quot;&gt;&lt;b style=&quot;color: black; font-size: 17px; margin: 0px; padding: 0px;&quot;&gt;12 months&lt;/b&gt;&lt;br /&gt;
&lt;span class=&quot;item_price&quot; style=&quot;margin: 0px; padding: 0px;&quot;&gt;$159.00&lt;/span&gt;&lt;br /&gt;
&lt;img alt=&quot;Add to cart&quot; src=&quot;http://www.mspy.com/images/button_add_to_cart.png&quot; style=&quot;border: 0px; margin: auto; padding: 0px;&quot; /&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/tbody&gt;&lt;/table&gt;
&lt;div style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; padding: 0px;&quot;&gt;
During initial setup, you specify which activities you want monitored, such as&lt;/div&gt;
&lt;ul style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 22px; margin: 2px 0px 4px 15px; padding: 0px;&quot;&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Incoming and outgoing text messages&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;Call logs&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;User location&lt;/li&gt;
&lt;li style=&quot;margin: 0px; padding: 0px;&quot;&gt;And much, much more&lt;/li&gt;
&lt;/ul&gt;
&lt;div style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; margin-bottom: 9px; padding: 0px;&quot;&gt;
Then this information is recorded and immediately sent wirelessly to your secure internet Control Panel where you simply log in with your chosen username and secret password to view the phone&#39;s activity in real time, using a web browser on any computer, smartphone or mobile device running a web browser to view this information.&lt;/div&gt;
&lt;div style=&quot;color: #101010; font-family: Arial, Helvetica, sans-serif; font-size: 12px; font-style: italic; line-height: 20px; margin-bottom: 9px; padding: 0px;&quot;&gt;
With mSpy running on a mobile device that you own, you will be able to determine where your children are located, who they are communicating with, or even if they are using the device while behind the wheel of a vehicle, a dangerous habit that every parent wants to know about and eliminate.&lt;/div&gt;
&lt;div style=&quot;color: #323232; font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; margin-bottom: 9px; padding: 0px;&quot;&gt;
If you are running a business and have employees who use your mobile devices, mSpy will enable you to see exactly what they are doing with your device.&lt;/div&gt;
&lt;div style=&quot;font-family: Arial, Helvetica, sans-serif; font-size: 12px; line-height: 20px; margin-bottom: 19px; padding: 0px;&quot;&gt;
&lt;span style=&quot;color: #323232;&quot;&gt;If your employees are disclosing sensitive and confidential company information or making personal calls on your dime, even if they erase their phone logs you will know: mSpy doesn&#39;t depend on the phone&#39;s internal logging system and once an activity is performed on the phone, this information is automatically sent to your web-based Control Panel and is recorded, rendering the act of erasing one&#39;s footprints on the phone obsolete and giving you a total picture of what&#39;s happening on your device and on your time.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;


&lt;b&gt;&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555975&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;DOWNLOAD MSPY FOR 3months!&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;


&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555997&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;DOWNLOAD MSPY FOR 6months!&lt;/span&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;h2 style=&quot;text-align: left;&quot;&gt;


&lt;a href=&quot;https://secure.avangate.com/order/cart.php?PRODS=4555999&amp;amp;QTY=1&amp;amp;AFFILIATE=37492&quot; target=&quot;_blank&quot;&gt;&lt;span style=&quot;color: red;&quot;&gt;DOWNLOAD MSPY FOR 12months!&lt;/span&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div class=&quot;blogger-post-footer&quot;&gt;By Kazmi&lt;/div&gt;</description><link>http://saqlainhacking.blogspot.com/2012/07/how-to-spy-on-cellphones-mspy-cellphone.html</link><author>noreply@blogger.com (Anonymous)</author><thr:total>2</thr:total></item></channel></rss>