tag:blogger.com,1999:blog-58821926881067991762024-03-13T04:50:07.745-07:00HackClarify-Security Ethics & Tech | Become an Ethical Hacker & Learn to Be SecureLearn Ethical Hacking , Free Hacking Scipts , Free Softwares Cracked , Computer Tricks , Scam Updates , Hacking & Security Tips & Tricks.Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.comBlogger123125tag:blogger.com,1999:blog-5882192688106799176.post-42593645716317027732012-08-15T01:06:00.001-07:002012-08-15T01:08:11.632-07:00Hack Qubee/Banglalion Use Net Free without making Payment.<div dir="ltr" style="text-align: left;" trbidi="on">This is For My Bengali Pals, trust me it wont work outside our country, i made it in bangla so its easy.<br />
<br />
Qubee হ্যাক করে ফ্রী-তে অথবা বিল পরিশধ না করে ইন্টারনেট ব্যবহার করুন।<br />
<br />
বিঃদ্রঃ "Hack"টি এখনও কাজ করে, শুধুমাত্র "qubee@qubee.com.bd" অ্যাকাউন্টটি কাজ করে না। "Hack"-টি বন্ধ করার মত বুদ্ধি এখনও Qubeer হয়নি। :P<br />
খুব সহজে বলতে হলে, আপনার অ্যাকাউন্ট যদি "suspended" হয়ে থাকে তাহলে আপনি আর ব্যাবহার করতে পারবেন না।<br />
তবে, আপনি যদি প্রিপেড গ্রাহক হন, এবং আপনার কার্ড-এর "usage limit" যদি শেষ হয়ে যায়, তাহলে আপনার অ্যাকাউন্ট-টি<br />
ঠিকই "connect" হবে, কিন্তু আপনি কোন ইন্টারনেট পাবেন না। এর বদলে, "Qubee" ওদের একটি পেজ-এ নিয়ে যাবে। এমতাবস্থায়, আপনি নিচের দাওয়া সফটওয়্যার ব্যাবহার করে ইন্টারনেট ব্যাবহার করতে পারবেন।<br />
অথবা, আপনি যদি পোস্টপেড গ্রাহক হন, কিন্তু আপনার বিল ঠিক সময়ে না পরিশোধ করায়, আপনার মডেম connect হবে, কিন্তু আপনি কোন ইন্টারনেট পাবেন না। এর বদলে, "Qubee" ওদের একটি পেজ-এ নিয়ে যাবে। এমতাবস্থায়, আপনি নিচের দাওয়া সফটওয়্যার ব্যাবহার করে ইন্টারনেট ব্যাবহার করতে পারবেন।<br />
আপনি যদি Banglalion গ্রাহক হন এবং আপনি উপরোক্ত অবস্থায় থাকেন, তাহলে নিচের সফটওয়্যার-টি কাজ করবে।<br />
শেষ কথাঃ<br />
আপনি যদি না বুঝতে পারেন বা না করতে পারেন তাহলে আমি কোন সাহায্য করবো না। এবং, আমি আর কোন অতি শহজ করে tune লিখব না। অর্থাৎ, আমি আপনাদের কাউকে চামচ দিয়ে তুলে, খাওাইয়ে দিব না।<br />
কারন, আমি চাই না যে যাদের মাথায় বিন্দু মাত্র বুদ্ধি বলে কিছু নেই, তারাও এই শুভিধা উপভগ করুক। এবং, না পেরে বলা শুরু করুক যে এইটা virus/trojan। যারা এটি বলেছে, তাদের আমি বলতে চাই যে, আপনার যদি তাই মনে হয় তাহলে, virustotal.com এ যেয়ে ৩৫টি antivirus দিয়ে চেক করতে পারেন এবং তাহলে দেখতে পাবেন এটিতে কোন virus নেই। "F*ck You"<br />
<br />
আর যারা, আমার উপর আস্থা রেখেছেন এবং ব্যাবহার করে খুব খুশি আছেন, তাদের আগাম শুখবর দিতে চাই। আমি খুব শিগ্রই,<br />
পুরো ঢাকাতে বিস্ত্রিত "iconnect" wifi ও BTCL-এর ADSL ইন্টারনেট free-তে ব্যাবহার করার নিয়মাবলি লিখে "tune" লিখব।<br />
<br />
এটি উভয় prepaid ও postpaid গ্রাহক-রা ব্যবহার করতে পারবেন। এবং, আপনারা একটু সাহায্য করলে Banglalion-এও এই শুভিধা উপভোগ করতে পারবেন।<br />
<br />
প্রথমত, আমি বাংলা খুব একটা লিখি না তাই ভুল ভ্রান্তি মাফ করবেন। দ্বিতীয়ত, আমি এটি করার জন্য অনেক কষ্ট করেছি, তাই দয়া করে ধন্যবাদ দিলে খুশি হবো এবং আপনি যদি আপনার ব্লগে আবার পোস্ট করেন, তাহলে দয়া করে আমার নাম লিখবেন।<br />
<br />
আমি এই পদ্ধতিতে গত ৬ মাস ধরে ইন্টারনেট ব্যাবহার করছি কোন বিল না দিয়ে এবং কোন সমস্যা ছাড়া। (যদিও ইন্টারনেট ব্রাওজিং মাঝে মাঝে একটু সমস্যা দেয়, Youtube video ও যে কোন ডাউনলোড অস্বাভাবিক ভালো। এখন আপনিও করতে পারেন। এই পদ্ধতিতে আপনি নিম্নে ৫১২ কেবিপিএস এবং সরবচ্চ ১/২ এমবিপিএস পাওয়া সম্ভব। এটি আপনার RSSI এবং CINR Signal Strength এর উপর নির্ভর করে।<br />
<br />
এখানে কি করা হচ্ছে, তা নিয়ে বিস্তারিত একদম নিচে লেখা আছে।<br />
<br />
প্রথমে এই লিঙ্ক থেকে ফাইলটি ডাউনলোড করে রেখে দিন। আমাদের এটি পরে লাগবে।<br />
<br />
http://www.mediafire.com/?84bbo4dnvtn3sjp<br />
<br />
Password: qubee<br />
<br />
১। প্রিপেড গ্রাহকদের জন্য নিয়মাবলী<br />
<br />
দয়া করে, এই নিম্নে লেখা কিছু করার আগে, আপনার নিজ নিজ username ও password সংরক্ষিত করে রাখুন।<br />
<br />
ক। আপনার যদি USB মডেম থাকে, তাহলে আপনার মডেম অপশন-এ গিয়ে<br />
<br />
Username: qubee@qubee.com.bd ও<br />
<br />
Password: prepaid<br />
<br />
লিখে Connect বতাম ক্লিক করুন।<br />
<br />
এইবার আপনি যদি কোন ইন্টারনেট ব্রাউজার খুলে, যে কোন ওয়েবসাইট-এ জান, আপনার সেই ওয়েবসাইট না এসে আপনাকে বিল দাওয়ার জন্য একটি পেজ আসবে।<br />
<br />
(এরপর “গ” থেকে পরুন)<br />
<br />
অথবা<br />
<br />
খ। আপনার যদি বড় Gigaset মডেম থাকে, তাহলে, আপনার ইন্টারনেট ব্রাউজার খুলে, নিম্নের এই অ্যাড্রেসে যান,<br />
<br />
http://192.168.3.1/<br />
<br />
তারপর OK ক্লিক করুন।<br />
<br />
“Advanced Settings” ক্লিক করুন<br />
<br />
তারপর, “Wimax Configuration” ক্লিক করুন<br />
<br />
তারপর,<br />
<br />
Username: qubee@qubee.com.bd ও<br />
<br />
Password: prepaid<br />
<br />
লিখে OK বতাম ক্লিক করুন।<br />
<br />
এবার, “Administration” ক্লিক করে “restart” ক্লিক করুন,<br />
<br />
তারপর, প্রতিবার “OK” চাপ দিয়ে, আপনার মডেম, restart ও connect হবার জন্নে ২ মিনিট সময় দিন।<br />
<br />
এইবার আপনি যদি কোন ইন্টারনেট ব্রাউজার খুলে, যে কোন ওয়েবসাইট-এ জান, আপনার সেই ওয়েবসাইট না এসে আপনাকে বিল দাওয়ার জন্য একটি পেজ আসবে।<br />
<br />
(এরপর “গ” থেকে পরুন)<br />
<br />
গ। এইবার পুরবে ডাউনলোড করা ফাইলটি extract করুন<br />
<br />
“Qubee Hack” আইকনটি “Right-click” করে “Run As Administrator” ক্লিক করে “continue” বা “Yes” চাপুন।<br />
<br />
এরপর আবার “yes” চাপুন।<br />
<br />
এবার হাতের ডান দিকে নিচে দেখতে পাবেন একটি লাল রঙের আইকন, এটি “Double-click” করুন এবং “Unblock” বা "Allow access" চেপে “yes” চাপুন।<br />
<br />
এরপর একটি window আসবে, যেটি পরলে বুঝবেন যে Connect হচ্ছে।<br />
<br />
আপনার এখন কিছু করতে হবে না, যখন window-টি, একাই নিচে চলে যাবে, আপনি “connected” হয়ে গিয়েছেন।<br />
<br />
এখন আপনার ব্রাউজার বা “torrent” খুলে internet browse বা download শুরু করুন।<br />
<br />
২। Postpaid গ্রাহকদের জন্য নিয়মাবলী<br />
<br />
যেহেতু Postpaid গ্রাহক রা একবার বিল দিলে সারা মাস চলে। আপনাদের নিয়মটা হাল্কা ভিন্ন।<br />
<br />
সাম্নের মাসে আর বিল দিবেন না, তারপর দেখবেন ১০-১৫ দিন পর আপনার সংযোগ বিচ্ছিন্ন হয়ে গিয়েছে এবং আপনি কোন ওয়েবসাইট-এ গেলে আপনাকে বিল দাওয়ার একটি পেজ-এ নিয়ে জাচ্ছে।<br />
<br />
এই অবস্থা থেকে আপনি, “গ”-এর নিয়মাবলী অনুসরণ করুন এবং আর বিল দাওয়া পুরোপুরি বন্ধ করুন।<br />
<br />
অথবা,<br />
<br />
আপনার অ্যাকাউন্ট যদি পুরোপুরি "suspended" হয়ে থাকে, বা "connect"-ই না হয়, তাহলে<br />
"প্রিপেড" গ্রাহকদের নিয়মাবলী অনুসরণ করুন।<br />
<br />
শেশ কথাঃ<br />
<br />
কোন সমস্যা হলে, নিচে লিখুন এবং আমি সাহায্য করবো।<br />
<br />
আমার “হ্যাক” টি সম্পরকে বিস্তারিত জানতে, আমার লেখা গুলা পরুন,<br />
<br />
http://groups.google.com/group/wimax-hacking/browse_thread/thread/33b52984d0837320/6325e2a8bb71a6ef?lnk=gst&q=progress#6325e2a8bb71a6ef<br />
<br />
http://groups.google.com/group/wimax-hacking/browse_thread/thread/89f171b0b574a861/c192ef674ea79bc9?lnk=gst&q=report#c192ef674ea79bc9<br />
<br />
খুব ছোট করে বলতে হলে,<br />
<br />
আপনাকে Qubee বিল দাওয়ার পেজ-টি, captive firewall, দিয়ে করে। এর জন্য udp protocol-এ port 53 খোলা রাখতে হয়, আর আমি খুব simply সব internet traffic udp 53 দিয়ে নিচ্ছি, আর তাই আপনি ইন্টারনেট পাচ্ছেন।<br />
<br />
আর কিছু সফটওয়্যার দিয়ে একি জিনিস করা সম্ভব, কিন্তু বেশির ভাগেই আপনার নিজস্ব server থাকা লাগে।<br />
<br />
নামগুলো হলও,<br />
<br />
iodine,<br />
<br />
dns2tcp,<br />
<br />
udptunnel,<br />
<br />
pd-proxy ও<br />
<br />
vpncup.com<br />
<br />
server-এ লোড কমানর জন্য এবং সবসময় ব্যাবহার-যোগ্য করতে, আমি PD-Proxy ও vpncup.com নিয়ে খুব শিঘ্রই আরও দুটি পোস্ট করবো।<br />
<br />
আমি নিজে Qubee পোস্টপেড ব্যাবহার করি। আপনারা যদি এটি আরও ভালো করতে চান, বা Banglalion-এও একি জিনিশ করতে চান।<br />
তাহলে, আপনার কারও Qubee prepaid modem অথবা Banglalion মডেম ১/২ দিনের জন্য আমাকে ধার দিলে, আমি Banglalion দিয়ে ফ্রী ইন্টারনেট ব্যাবহার করার একটি পোস্ট করতে পারব কারন আমার নিজের টাকা খরচ করে আর কোন মডেম কিনার ইচ্ছে নাই।<br />
<br />
আপনারা কেউ, সাহায্য করতে ইচ্ছুক হলে, আমাকে ফেসবুক-এ মেসেজ পাঠাতে পারেন অথবা নিচে কমেন্ট-এ লিখতে পারেন।<br />
<br />
রাহাত মাহবুব।<br />
<br />
32-bit user-রা যারা "connected" <br />
<br />
পাচ্ছেন কিন্তু, ব্রাউজার খুললে "server not found" পাচ্ছেন, তাদের জন্য একটি অস্থায়ী শমাধান দাওয়া হোল।<br />
<br />
http://www.mediafire.com/?o2qx4xg0ztrhrkf<br />
<br />
এটি ডাউনলোড করে extract করুন। তারপর "Reinstall Tap Driver" Right-click করে, "Run as Administrator"-এ ক্লিক করুন। এরপর, আবার লাল রঙের "Qubee hack" আইকনটি double-click করে, connect করুন।<br />
64-bit user-রা এটি ডাউনলোড করুন।<br />
<br />
http://db.tt/2BquDN0F<br />
<br />
এটি ডাউনলোড করে extract করুন। তারপর "Install" Right-click করে, "Run as Administrator"-এ ক্লিক করুন। এরপর, আবার লাল রঙের "Qubee hack" আইকনটি double-click করে, connect করুন।</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com24tag:blogger.com,1999:blog-5882192688106799176.post-63035543010154775602012-07-17T06:11:00.000-07:002012-07-17T06:11:54.934-07:00Macbook Thrashes Ultrabook Analysts Give Bad Numbers<div dir="ltr" style="text-align: left;" trbidi="on"><div style="font-family: inherit;"><img alt="The HP Envy 14 Spectre premium ultrabook starts around $1,399 directly from HP. PC markers don&#39;t fare well at all competing with Apple at the high end of the market, says an IDC analyst. " data-mce-src="http://asset1.cbsistatic.com/cnwk.1d/i/tim/2012/07/11/hp-envy-14-spectre-small.png" height="438" src="http://asset1.cbsistatic.com/cnwk.1d/i/tim/2012/07/11/hp-envy-14-spectre-small.png" width="480" />The HP Envy 14 Spectre premium ultrabook starts around $1,399 directly from HP. PC markers don't fare well at all competing with Apple at the high end of the market, says an IDC analyst.<br />
(Credit: Brooke Crothers)</div><div style="font-family: inherit;">Ultrabook numbers will fall far short of Intel's aggressive market share targets, an IDC analyst told CNET. The MacBook Air, meanwhile, continues to coast amid continued popularity.</div><div style="font-family: inherit;">An IDC report today showed a weak PC market caught in its seventh consecutive quarter of little to no growth.</div><div style="font-family: inherit;">"The volume isn't there and it's going to be way below what Intel had hoped for," IDC analyst Jay Chou told CNET, referring to ultrabooks.</div><div style="font-family: inherit;">"The first half [of 2012] is about 500,000 ultrabooks shipped worldwide. It's nowhere near Intel's initial hope," Chou said. Ultrabooks are thin, lightweight Windows laptops that compete with Apple's MacBook Air.</div><div style="font-family: inherit;"><img alt="Apple MacBook Air." data-mce-src="http://asset1.cbsistatic.com/cnwk.1d/i/tim/2012/07/11/macbook-air-2011-e-2-2.jpg" height="229" src="http://asset1.cbsistatic.com/cnwk.1d/i/tim/2012/07/11/macbook-air-2011-e-2-2.jpg" width="299" />Apple MacBook Air.<br />
(Credit: Apple)</div><div style="font-family: inherit;">Intel had said at the beginning of the year that ultrabooks could take 40 percent of the consumer laptop market.</div><div style="font-family: inherit;">"We might hit a million [ultrabooks] this year. The future really lies in 2013 and how well it jells with Windows 8," Chou added.</div><div style="font-family: inherit;">IDC expects about 225 million laptops to ship by the end of 2012. So, a million would be a tiny fraction of that market.</div><div style="font-family: inherit;">"The MacBook Air is a good part of Apple's business. It's had good growth," Chou said.</div><div style="font-family: inherit;">Unit shipments of Apple's MacBooks were up in the most recent reported quarter (Q2) to about 2.8 million (PDF) compared with 2.75 million in the same quarter last year.</div><div style="font-family: inherit;">Why the ultrabook shortfall? "A lot more models have to hit that $700 spot and they need a more lightweight and faster responding OS like Windows 8," according to Chou.</div><div style="font-family: inherit;">And it's hard to make inroads into a market that Apple practically invented. "They [Apple] really know how to magnify their strength. PCs typically out-spec them. But it's really just saying I have a bigger engine," which doesn't resonate with as many customers as before, he said.</div><div style="font-family: inherit;">Intel declined to comment.</div></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-61989924626779332392012-06-17T09:10:00.001-07:002012-06-17T09:12:08.989-07:00Yasar's Crypter v1.0(With Stubgen) Best FUD Crypter Publicly Available<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Hey there, well recently i just launched a Crypter that i have programmed, well i am not sure if i should say i fully coded it, but credit goes to a few crypter sources out there i have created my own cypter “Yasar’s Crypter” along with my Automatic Unique Stub Generator “Yasar’s StubGen”. It hs got all latest functionalities of all latest crypters. Its fully free and FUD. I have given a free FUD stub and you can create or modify your own stubs. <br />
Please do share and feel free to post it on your Blogs, Youtube Channel, Websites, Facebook, Twitter etc..<br />
You can read about the functions and the crypter over here: <a href="http://www.yasarbase.wordpress.com/crypter" title="Yasar's Crypter">http://www.yasarbase.wordpress.com/crypter</a><br />
<strong>Screenshot:</strong><br />
<a href="https://yasarbase.files.wordpress.com/2012/06/yasars-crypter-thumb.png"><img alt="" class="alignnone size-medium wp-image-50" src="https://yasarbase.files.wordpress.com/2012/06/yasars-crypter-thumb.png?w=547" title="Yasar's Crypter in Action" /></a><br />
If there is any Bugs on it please inform me and if you find anything that makes you happy or sad, let me know via comments and pretty soon i will be posting a tutorial on using “Yasar’s Crypter v1.0″<br />
<a href="http://www.yasarbase.wordpress.com/crypter" target="_blank">Get Yasar’s Crypter NOW for Free!!</a><br />
If you make a review of Yasar’s Crypter on your Blog or Youtube Channel, the first 10 Reviewers will be getting the Yasar’s Crypter v2.0 before anyone else gets it and will be given a special stub (along with the free gifted stub).<br />
If you have reviewed/shared, please attach your link in the comment secion.<br />
So Happy Crypting & Sharing!!<br />
<br />
This blog post was posted on <a href="http://www.yasarbase.wordpress.com/" rel="nofollow" target="_blank">Yasar's Code Base</a> my personal code/software blog, so its not a real top of a class post but hope you liked it! </div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com6tag:blogger.com,1999:blog-5882192688106799176.post-67791747861170815702012-06-15T03:52:00.000-07:002012-06-15T03:52:20.726-07:00How To UNDO Sent Mail on Gmail<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://tricktactoe.com/tricks/trick-to-undo-sent-email-in-gmail/attachment/e-mail-marketing/" rel="attachment wp-att-1906"><img alt="E mail Marketing 200x150 Trick to Undo Sent Email in Gmail" class="alignleft size-medium wp-image-1906" height="120" src="http://tricktactoe.com/wp-content/uploads/2012/02/E-mail-Marketing-200x150.jpg" title="E-mail-Marketing" width="160" /></a><br />
Lot of times you might think to change the contents of the email, after you hit the send button. But there are no undo buttons in case of sent emails elsewhere rather then Gmail. By using this hidden Gmail feature, you get back your sent email from your gmail account. So in case you hit the send button a little too soon, you can click undo (CTRL+Z) button within 30 sec of hitting send button and you’re good to go.<br />
> Open Gmail and click on small settings icon on top right corner.<br />
> Select mail settings and go to Labs tab. Search for undo and check the undo send feature, Click save changes.<br />
Next time you hit the send button you can see a undo option for 30 sec. Have Fun!!</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com2tag:blogger.com,1999:blog-5882192688106799176.post-44217400413038758832012-06-08T23:56:00.000-07:002012-06-08T23:56:25.239-07:00Easily Share, Secure & Backup Your Files via Dropbox<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div style="margin-left: 1em; margin-right: 1em;"><img alt="http://www.geekestateblog.com/wp-content/uploads/2009/11/dropbox.jpg" height="317" src="http://www.geekestateblog.com/wp-content/uploads/2009/11/dropbox.jpg" width="400" /> </div><div style="margin-left: 1em; margin-right: 1em;"><br />
</div><div style="margin-left: 1em; margin-right: 1em;">Ever wanted to share photos from a recent party or your favorite music with friends? Or collaborate on a school project? <a href="http://www.dropbox.com/referrals/NTEzMjAwMzI0OQ">Dropbox</a> should be of a great use for you.</div><div style="margin-left: 1em; margin-right: 1em;"><br />
</div><br />
<br />
<a href="http://www.dropbox.com/">Dropbox</a> is an online backup, sync and sharing tool that provides free accounts which makes it easy share of files with your friends.<br />
With there are already hundreds of ways to share files, how does <a href="http://www.dropbox.com/">Dropbox</a> make the difference?<br />
<span id="more-214"></span><br />
Do you use Windows Live Messenger (MSN Messenger), Yahoo Messenger or Skype to share files with friends? On them, both you and your friend need to stay online while the transfer occurs.<br />
Use a file uploading service like MediaFire to share files with friends? While it allows both you (the uploader) and your friend (downloader) to be online at your own convenient time, there is still the hassle of sharing the “share links” itself.<br />
What <a href="http://www.dropbox.com/">Dropbox</a> offers, just a one time pairing of folders, and the sharing becomes as simple as placing the files on your local computer. No more waiting for friends to come online, no more copy pasting of share links!<br />
How <a href="http://www.dropbox.com/">Dropbox</a> works is rather syncing of two folders between the paired folders on two (or more) computers. Once you put something on that share folder, it gets auto updated on your friend’s computer who is sharing it with you. And as there is the<a href="http://www.dropbox.com/">Dropbox</a> servers to hold that file as well, both of you do not need to stay online at the same time. When you come online, the files get synced to the <a href="http://www.dropbox.com/">Dropbox</a> servers. Then when your friend comes online, it updates the files on his computer.<br />
The best possible use of <a href="http://www.dropbox.com/">Dropbox</a> can be collecting photos from a recent party. The “Send pics on mails”, “Upload pics you got on facebook”… those days are over!<br />
With <a href="http://www.dropbox.com/">Dropbox</a>, you create a share folder for the party and send share requests to your friends. Then everyone joins and puts the photos they got on that share folder on their own computer. The result? Now everyone on the share got all the photos of the party. No more going through facebook or mail to download every individual file. Cool ha?<br />
Join <a href="http://www.dropbox.com/referrals/NTEzMjAwMzI0OQ">Dropbox</a> today and start sharing your files (specially paty pics ;) ) easily. Dropbox gives you 2GB of storage for free. But if you use <a href="http://www.dropbox.com/5ouL1fFc">this link</a> (<a href="http://db.tt/5ouL1fFc">Dropbox.com</a>), you will get an <b>additional 250MB bonus space!</b><br />
So, what you waiting for? Join <a href="http://www.dropbox.com/referrals/NTEzMjAwMzI0OQ">Dropbox</a> now following this link: <a href="http://www.dropbox.com/">http://www.dropbox.com/</a><br />
Happy sharing :)</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-64784488695689549432012-05-30T00:30:00.001-07:002012-06-04T23:50:19.500-07:00Lock your PC with a USB Flash Drive<div dir="ltr" style="text-align: left;" trbidi="on">
<div>
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;">
<img alt="" height="180" src="http://asset3.cbsistatic.com/cnwk.1d/i/tim/2012/05/07/6984515573_8856f91dc8_270x180.jpg" width="270" /></div>
</div>
<div>
Ever wanted to be like <b>James Bond</b> and be secretive? So you can prevent access to your computer, but with just a password, you are missing out on an alternate (and more secure) way to lock down your computer.</div>
<div>
Predator, a free Windows program, turns your USB drive into a key that locks your computer when it's removed. To unlock your computer, you'll have to plug the USB drive back in. (Talk about having secret-agent-style security.)</div>
<div>
Anyone who attempts to access your computer without the USB flash drive will be hit with an epic "Access Denied" message. To get started, follow this guide:<br />
<br /></div>
<div>
<strong>Step 1</strong>: Download and install <a href="http://download.cnet.com/Predator-Free/3000-2144_4-10915340.html">Predator</a>.<br />
<br /></div>
<div>
<strong>Step 2</strong>: Once Predator launches, plug in your USB flash drive. None of the contents of the drive will be deleted or altered in any way, so feel free to use your primary thumbdrive.</div>
<div>
When you insert the drive, a dialog box will appear asking you to create a password. Click OK to continue.<br />
<br /></div>
<div>
<strong>Step 3</strong>: In the Preferences window, take note of a few key settings. First, enter a secure, unique password in the "New password" field. If you lose your USB drive, you'll use it to unlock your computer.</div>
<div>
If you'd like, you can check the Always Required box and you'll be asked to enter the password each time you use your thumbdrive to unlock your PC.</div>
<div>
Finally, in the section under Flash Drives, ensure that the correct USB flash drive is selected. When you're done, click "Create key" and then OK.</div>
<div>
</div>
<div>
<img alt="" height="547" src="http://asset1.cbsistatic.com/cnwk.1d/i/tim/2012/05/07/predatorprefs_610x547.jpg" width="610" />(Credit: Predator)<br />
<br /></div>
<div>
</div>
<div>
<strong>Step 4</strong>: Predator will exit. When it does, click the Predator icon in the taskbar to restart the program. A few seconds later, the icon will turn green, alerting you that Predator is running.</div>
<div>
Every 30 seconds, Predator will check to see that your USB drive is plugged in. If it isn't, your computer will dim and lock down.</div>
<div>
Here are some extra tips:</div>
<ul>
<li>To pause Predator at any time select "Pause monitoring" from the taskbar menu.</li>
<li>If someone tried to access your PC while it was locked down, you'll see the activity log when you log back in. You can see the log at any time by clicking "View log" from the taskbar menu.</li>
<li><a href="http://www.predator-usb.com/predator/en/index.php?n=Main.Documentation">Predator's Web site</a> has several cool how-tos, including one that shows you how to program your computer to take a snapshot each time someone tries and fails to log in to your computer. <a href="http://www.predator-usb.com/predator/en/index.php?n=Main.Snapshot">Check it out</a>.</li>
</ul>
<div>
</div>
<div>
One obvious flaw comes with this setup: you'll always be down one USB port. But if you're sold on Predator, consider purchasing a USB hub to compensate.</div>
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com2tag:blogger.com,1999:blog-5882192688106799176.post-80626981650346578062012-05-07T07:06:00.000-07:002012-05-07T07:08:13.786-07:00Some Maintainence & Slow Development<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-LVot0s-Mw7s/T5_U-g7P_qI/AAAAAAAAAQ0/k3QIDf0ZmdQ/s1600/hackclarify.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://4.bp.blogspot.com/-LVot0s-Mw7s/T5_U-g7P_qI/AAAAAAAAAQ0/k3QIDf0ZmdQ/s1600/hackclarify.png" /></a></div>
<br />
It is That <b>HackClarify</b> will not post any content, for some days. This was because of the random amount of posts by me, which led to less amount of comments,subscriptions and shares.<br />
<br />
We might also have to never post again in <b>HackClarify</b> for this reason.<br />
<br />
All readers are being dedicated.<br />
<br />
Well, at the time of the Break, <b>HackClarify</b> wants you to comment,share and subscribe.<br />
<br />
People who will contribute to the site by sharing,Liking,commenting will be rewarded by Samin Yasar with tons of things Like , Cracked Content/Softwares , Hacking Tools, Un posted posts that will be posted in HackClarify later on and more VIA gmail account.<br />
<br />
Plus: First Person with 100 comments will get Exclusive extra prizes. A whole Collection of Scripts and *SURPRISES* <br />
<br />
Thank You.<br />
<br />
<br />
Hope i get this done.<br />
<br />
Regards,<br />
Samin Yasar @hackclarify<br />
Founder/Super Admin<br />
Blogger<br />
HackClarify</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com5tag:blogger.com,1999:blog-5882192688106799176.post-18884645585875375072012-05-04T00:53:00.001-07:002012-05-05T08:51:18.470-07:00Hide Folders Not using any Software<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-U49EZFGnO1U/T6OMKYRQBPI/AAAAAAAAARA/i8W5gXYVjhU/s1600/folder-locker.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://1.bp.blogspot.com/-U49EZFGnO1U/T6OMKYRQBPI/AAAAAAAAARA/i8W5gXYVjhU/s640/folder-locker.png" width="640" /></a></div>
<br />
Sometimes you want to lock folder to hide your personal files and personal data from other users of your computer. You will find many Softwares in market for folder lock but it wont always working properly or if it works properly then it wants Registration or needs a crack to use it for longer time.</div>
So now i am showing a way by which you can hide your personal files or lock your folder without any software. Its very easy to use and very safe.
How to Lock Folder without any Software :<br />
1. Copy this below Code.<br />
<br />
<b>**********************************************************</b><br />
<b>cls</b><br />
<b>@ECHO OFF</b><br />
<b>title Folder Locker</b><br />
<b>if EXIST “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” goto UNLOCK</b><br />
<b>if NOT EXIST Locker goto MDLOCKER</b><br />
<b>:CONFIRM</b><br />
<b>echo **Folder Locker by http://hackclarify.blogspot.com**</b><br />
<b>echo ………………………………………………</b><br />
<b>echo Are you sure u want to Lock the folder(Y/N)</b><br />
<b>set/p “cho=>”</b><br />
<b>if %cho%==Y goto LOCK</b><br />
<b>if %cho%==y goto LOCK</b><br />
<b>if %cho%==n goto END</b><br />
<b>if %cho%==N goto END</b><br />
<b>echo Invalid choice.</b><br />
<b>goto CONFIRM</b><br />
<b>:LOCK</b><br />
<b>ren Locker “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”</b><br />
<b>attrib +h +s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”</b><br />
<b>echo Folder locked</b><br />
<b>goto End</b><br />
<b>:UNLOCK</b><br />
<b>echo **Folder Locker by http://hackclarify.blogspot.com**</b><br />
<b>echo ………………………………………………</b><br />
<b>echo Enter password to Unlock folder</b><br />
<b>set/p “pass=>”</b><br />
<b>if NOT %pass%== type your password here goto FAIL</b><br />
<b>attrib -h -s “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}”</b><br />
<b>ren “Control Panel.{21EC2020-3AEA-1069-A2DD-08002B30309D}” Locker</b><br />
<b>echo Folder Unlocked successfully</b><br />
<b>goto End</b><br />
<b>:FAIL</b><br />
<b>echo Invalid password</b><br />
<b>goto end</b><br />
<b>:MDLOCKER</b><br />
<b>md Locker</b><br />
<b>echo Locker created successfully</b><br />
<b>goto End</b><br />
<b>:End</b><br />
<b>echo Invalid password</b><br />
<b>goto end</b><br />
<b>:MDLOCKER</b><br />
<b>md Locker</b><br />
<b>echo Locker created successfully</b><br />
<b>goto End</b><br />
<b>:End</b><br />
<br />
2. Then paste it to the notepad.<br />
3. You will find “type your password here” in that code (Without quotes) so just write your password in place of “type your password here” (Without quotes).<br />
4. Save this notepad as <strong>Locker.bat</strong> anywhere you wish<br />
5. Then double click on Locker.bat.<br />
6. when you double click on this it will create ‘Locker’ folder automatically there itself, After creating of this folder place the contents you want to lock inside the Locker Folder and run locker.bat again, So it will ask to lock this folder… So just type “y” (without quotes) then press enter. Your folder get disappeared that means you locked your folder. No one can see your files of your locked folder.<br />
7. Now if you want to unlock folder then again double click on Locker.bat, It will ask your password so just enter password and then press enter, Your folder appears.
If you have any problems, please let me know in the comments section.
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com4tag:blogger.com,1999:blog-5882192688106799176.post-22385572037621265432012-05-02T05:33:00.002-07:002012-05-02T05:48:22.133-07:00Make Free Calls/SMS using fring<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: left;">
<img alt="Make Free Calls, SMS, Chat - Mobile to Mobile" class="alignright" height="121" src="http://www.hacker9.com/wp-content/uploads/2010/11/Make-Free-Calls-SMS-Chat-Mobile-to-Mobile.gif" title="Make Free Calls, SMS, Chat - Mobile to Mobile" width="127" /><a href="http://fring.com/" rel="nofollow" target="_blank"><strong>fring</strong></a> is a mobile internet service and community that allows you to access and interact with a variety of communication services such as Skype®, MSN® Messenger, Google Talk™, ICQ, SIP, Twitter, Yahoo!™ and AIM®. Through fring, you can send and receive calls as well as message all of your contacts all will using your cellular data plan or a WiFi connection rather than use your minutes. You can even make affordable local and international calls to landline and regular cellular numbers using your SkypeOut/SkypeIn account or almost any VoIP service. fring is compatible with Symbian 8, 9.1, 9.2, Windows Mobile 5 & 6 and UIQ handsets.</div>
<img alt="" height="303" src="http://www.hacker9.com/wp-content/uploads/2010/11/what_is_fring.png" title="what_is_fring" width="406" /><br />
<br />
<ul style="text-align: left;">
<li><strong>Availability</strong> – fring service can be used anywhere you have cellular or WiFi network connectivity.</li>
<li><strong>Free Calls </strong>- fring allows you to make free calls to all of your Skype, MSN Messenger, Google Talk, ICQ, Yahoo! and AIM friends. </li>
<li><strong>Instant Messaging -</strong> With fring you can instant message your Skype, MSN Messenger, Google Talk, ICQ, SIP, Twitter, Yahoo! and AIM friends. </li>
<li><strong>Special Features </strong>- fring users can send and receive files, in addition to setting up auto-roam so that fring automatically detects when you move from one WiFi hotspot to the next.</li>
</ul>
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com4tag:blogger.com,1999:blog-5882192688106799176.post-57330096989429637772012-05-02T05:18:00.003-07:002012-05-08T09:53:34.832-07:00Back Up Your Twitter Account Online<div dir="ltr" style="text-align: left;" trbidi="on">
<h1>
<img alt="How to Backup Twitter Bird Account Download your Tweets Followers" height="119" src="http://www.hacker9.com/wp-content/uploads/2011/01/How-to-Backup-Twitter-Bird-Account-Download-your-Tweets-Followers.png" title="How to Backup Twitter Bird Account Download your Tweets Followers" width="115" /></h1>
<div>
Have you ever thought of backing up your Twitter Account. Though Twitter has not yet launched its official backup service there are many 3rd parties that will help you download everything in your twitter account. None of us would like to lose all the tweets and followers, in case our account gets deleted or hacked or something else (imagine something bigger if you want to), so it is better backup your tweets and followers. Below i have Listed some 3rd party online tools that will help you to download all your Twitter account's tweets,followers,info and such efficiently for Free.
<br />
<h3>
<b>1) TweeTake</b></h3>
Taking backup at <a href="http://tweetake.com/" rel="nofollow" target="_blank">TweeTake</a> is as simple as logging into your Twitter account and posting a Tweet. For this you will just need to login at <a href="http://tweetake.com/" rel="nofollow" target="_blank">TweeTake</a> with your Twitter account and Tweettake will provide you the Download Options. With Tweetake you can take backup of items like tweets, followers, friends, favorites and Direct Messages. i recommend check ‘Everything’ to download the whole Twitter account. <a href="http://tweetake.com/" rel="nofollow" target="_blank">Click here to Backup at Tweetake</a>
<br />
<h3>
<b>2) TweetBackup</b></h3>
The Good part about<a href="http://tweetbackup.com/" rel="nofollow" target="_blank"> TweetBackup</a> is It provides you daily backup of Twitter data and guess what even bill gate loves <a href="http://tweetbackup.com/" rel="nofollow" target="_blank">TweetBackup</a>. The sign up process is little longer than TweeTake and requires you to provide your email address. First you need to connect TweetBackup credentials to your Twitter account. to do so first click the Button that says ‘Sign up now using twitter’. after the sign up process is over, just login with your twitter account. <a href="http://tweetbackup.com/" rel="nofollow" target="_blank">Click here to Backup at TweetBackup</a><br />
<br />
<a href="https://www.twitter.com/hackclarify" rel="nofollow" target="_blank"><img alt="" height="163" src="http://www.hacker9.com/wp-content/uploads/2011/01/Tweeter-follow.png" title="Tweeter-follow" width="256" /></a>
</div>
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-59366036913116807232012-05-02T04:54:00.002-07:002012-06-17T08:20:01.153-07:00Hiding Keyloggers/Rats/Worms/Viruses Using Crypters or Binders<div dir="ltr" style="text-align: left;" trbidi="on">The main thing you need to focus on after creating keylogger, is to convince your victim to install that keylogger on his PC. Normally free remote keyloggers like<i> Ardamax keylogger</i> or any other cheap, or free keyloggers will create standard .exe installation file without any stealth feature and you can use cracked Keylogger generators too. Also free keyloggers are easily detected by common antiviruses like Kaspersky,Microsoft Security Essentials and more, even the worst (according to me) Avast, the free antivirus detects keyloggers like this instantly. So Eventually your keylogging will end in vain. You might have heard about binders and Crypters before, but do you know what they are used for? and why they are used in keylogging? its simple as their Names stands out what they do. Lets first understand them. <br />
<ul><li>Crypter</li>
</ul><blockquote>It is a software that can encrypt executable (.exe) files. crypters are popularly used to encrypt viruses, RAT’s, keyloggers, spywares etc to make them undetectable from antiviruses.</blockquote>The Crypter takes the original binary code of .exe file and applies many encryption on it and stores at the end of file(EOF). So a new crypted executable file is created. The new exe is not detected by antiviruses because its code is scrambled by the crypter. <br />
<ul><li>Binder</li>
</ul><blockquote>Binder is a software used to bind or combine two or more files in one file under one name and extension.</blockquote>The files to be binded can have any extension or icon. The user has choice to select the name, icon and various attributes of binded file. Now that you are aware of these softwares, do you think antivirus softwares will allow you to run these on your system?Ofcourse not. This is the biggest setback for crypters and binders. With the flourishing use of Crypters and binders to bypass antiviruses, AV became more advanced and started including encryption definitions to even detect crypted or binded strings within code. So, use of crypter to hide Keyloggers became more complicated as nowadays, most of the popular crypters & Binders are easily detected by antiviruses too. So, if you are trying to crypt your keyloggers or viruses with publicly available crypters and binders, they are bound to be detected by antiviruses. This is because most FUD(fully undetectable) crypters remain “FUD” for maximum of one or two weeks, after their public release. When any free FUD crypter/binder becomes popular it also gets the eyes of antivirus companies. The antivirus companies update their software and employ detection mechanism that detect the encryption by the crypter. To obtain FUD crypters, you either need to search for it in hacking forums or make one by yourself. Soon i might post about creating your own crypter.. so be sure to drop back. Meanwhile you can try these latest crypters and binders that are available publicly: <br />
<br />
<h3 style="text-align: left;">1) Yasar's Crypter v1.0</h3><div><img alt="" class="alignnone size-medium wp-image-50" height="361" original="https://yasarbase.files.wordpress.com/2012/06/yasars-crypter-thumb.png?w=744" src="https://yasarbase.files.wordpress.com/2012/06/yasars-crypter-thumb.png?w=744" title="Yasar's Crypter in Action" width="640" /></div><div>This Crypter is 100% FUD (Fully Undetectable) and free. It has all features of best crypters taht were ever made and works on all well known RAT's & Keloggers. It has all modern functions like icon changer, binder, Fake Error, EOF, custom stub adder. You can crypt as many files as you want at once. Anti's methods and etc are all here. It might not that much of Noob friendly but only2 or 3 uses will do the trick.</div><div>It got its own Stub generator. Well if a Sub is FUD, then the crypter is FUD. You should search Google for what is a stub in crypters for info.</div><div><br />
</div><div><b>Download: <a href="https://www.box.com/s/8a168e7272bd5b7b9f07">Yasar's Crypter v1.0.rar</a></b></div><h3>2) Chrome Crypter v2.0</h3>This Crypter is 60% FUD (Fully Undetectable) and free. It has couple of extra features like .exe file binder and inbuilt ICON Changer. Its recommended that you name your resulting output file in the format: “filename.mp3.exe”. .exe extension will be hidden on most of the systems, so your victim will run it believing its an mp3 file. <img alt="Chrome Crypter v2" height="265" src="http://www.hacker9.com/wp-content/uploads/2011/10/Chrome-Crypter-v2.png" title="Chrome Crypter v2" width="426" /><br />
<b> </b><br />
<b> Download: <a href="http://www.box.net/shared/1q5ehhsfufvjtge46yrg" rel="nofollow" target="_blank">Chrome Crypter v2 – FUD.rar</a></b> <br />
<h3>3) 0crypter v5.0.8</h3>Like ‘Chrome crypter’, this crypter also has inbuilt ICON changer and few more advanced features like: Default Browser Injection, Custom Injection Method (VBC advanced), Effective StartUp on reboot, Custom Startup, Custom Assembly Change, etc. This is not FUD, as AVG quickly flagged the output file as Trojan virus, well there isn't a doubt that my Kaspersky on my desktop and my Microsoft Security Essentials on my Laptop detected them as well. <img alt="0crypter free download" height="394" src="http://www.hacker9.com/wp-content/uploads/2011/10/0crypter.png" title="0crypter" width="389" /><br />
<b>Download: <a href="http://www.box.net/shared/tgtr1hg9mapcxonto10h" rel="nofollow" target="_blank">0crypter v5.0.8 – FUD.rar</a></b></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com11tag:blogger.com,1999:blog-5882192688106799176.post-59570393537180364802012-04-28T10:05:00.001-07:002012-05-05T10:33:43.515-07:00Uninstall Programs Using CMD in Windows XP/Vista/7<div dir="ltr" style="text-align: left;" trbidi="on">
<div align="justify">
I have been into situation when you install a software on a computer, its starts freezing and you are not able to work on the computer. Suddenly the CPU usage shoots to 100% and there is nothing to do but to restart computer. Then also situation remains the same and even not able lo launch Add/Remove wizard to uninstall the newly installed software which caused all the problem. This is where our old DOS shell comes in handy. I am going to tell you how we can uninstall a program using command prompt with few simple commands.</div>
<div align="justify">
1. Click <strong>Start Menu</strong>.</div>
<div align="justify">
2. Click <strong>All Programs</strong>.</div>
<div align="justify">
3. Click <strong>Accessories</strong> and select <strong>Command Prompt</strong>.</div>
<div align="justify">
4. When the command prompt is open, type <strong>wmic</strong> and press Enter.</div>
<div align="justify">
<img alt="part 4" border="0" height="326" src="http://lh5.ggpht.com/_yFmBpVroAVc/TAxQS4oBpAI/AAAAAAAAAVY/0OmSB0CJAps/part%204%5B6%5D.jpg?imgmax=800" title="part 4" width="589" /></div>
<div align="justify">
5. Now type command: <strong>product get name</strong> and hit Enter. This command will populates a list of installed applications on your PC with complete name of an application.</div>
<div align="justify">
<img alt="part 5" border="0" height="327" src="http://lh3.ggpht.com/_yFmBpVroAVc/TAxQTyXvQFI/AAAAAAAAAVc/qcFTVrBuyfQ/part%205%5B7%5D.jpg?imgmax=800" title="part 5" width="585" /></div>
<div align="justify">
6. Now type: <strong>product where name=” ” call uninstall</strong> and hit Enter (Note: Inside <strong>name” “</strong> you have to write the exact name of software you wish to uninstall from the populated list. For an example VMware Tools).</div>
<div align="justify">
Example: <strong>product where name=”VMware Tools” call uninstall</strong></div>
<div align="justify">
<img alt="part 6" border="0" height="370" src="http://lh6.ggpht.com/_yFmBpVroAVc/TAxQUzbCHjI/AAAAAAAAAVg/z44GSDMdhUs/part%206%5B5%5D.jpg?imgmax=800" title="part 6" width="590" /></div>
<div align="justify">
7. Type <strong>Y</strong> for confirming un-installation process then press Enter to uninstall the software completely.</div>
<div align="justify">
<img alt="part 7" border="0" height="372" src="http://lh4.ggpht.com/_yFmBpVroAVc/TAxQVsa1a6I/AAAAAAAAAVk/6OiqwKDRDuQ/part%207%5B5%5D.jpg?imgmax=800" title="part 7" width="593" /></div>
<div align="justify">
This trick works on Windows XP Professional, Windows Vista, Windows 7, Windows Server 2003 and Windows Server 2008.</div>
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com4tag:blogger.com,1999:blog-5882192688106799176.post-69367166695910168362012-04-28T02:52:00.002-07:002012-04-28T21:46:29.743-07:00A Cheap Do it Yourself Network Hacking-SkyNet<div dir="ltr" style="text-align: left;" trbidi="on">
<a href="http://4.bp.blogspot.com/-rgJ8MY9Tb90/T0xdrGIBJ3I/AAAAAAAAALI/gWdt0oN8_OM/s1600/44576-hi-parrot_ARDrone_10.jpg"><img alt="Sky Net Technology" border="0" class="alignleft" height="207" id="BLOGGER_PHOTO_ID_5714045022186317682" src="http://4.bp.blogspot.com/-rgJ8MY9Tb90/T0xdrGIBJ3I/AAAAAAAAALI/gWdt0oN8_OM/s400/44576-hi-parrot_ARDrone_10.jpg" width="400" /></a><br />
This must be the holy grail of hacking: a cheap, do-it-yourself flying drone that can break into Wi-Fi networks and turn computers into zombies that can be controlled remotely. The coolest part for evildoers: it makes the hacking untraceable.
<br />
<h4>
Technical Information:</h4>
The SkyNET drone is a modified $300 Parrot quadcopter with a Linux computer, 3G card, a GPS unit and two Wi-Fi cards.
<br />
<h4>
</h4>
<h4>
How It works:</h4>
Controlled by a botmaster using 3G, the drone or group of drones fly over any urban area looking for Wi-FI networks. As they find them, they automatically try to break in. Once they get inside the network, it searches for personal computers that can be compromised. Any computer that falls to the attack gets turned into a zombie without the user ever knowing it.
After the infection process, the hackers can easily control the zombies remotely through the Wi-Fi drone-to-host connection. The zombies can be used to perform any attack through their internet connections, receiving commands from SkyNET but with no traceable internet ties to the hacker botmaster:
Subsequent drone flights are used to issue command and control without ever linking the botmaster to the botnet via the Internet. Reverse engineering the botnet, or enumerating the bots, does not reveal the identity of the botmaster.
It's a perfect idea. Total cost: a mere $600. Anyone can easily build a complete fleet of these.</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-46067746693637129102012-04-23T13:46:00.001-07:002012-04-23T13:47:04.141-07:00Steal/Copy a Wordpress website's Theme<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Copying the whole wordpress theme is not easy task but not too difficult as you think. In this post, I’m going to teach you how to copy the wordpress theme using Firefox and Firefox plugin called Firebug. But I’m afraid that my guideness will lead you to be a thief. Keep in mind that you should consider copyright and respect other’s people work. This tutorial will helps you to improve your knowledge of XHTML, CSS and the wordpress coding.<br />
<br />
Before you start you must have Wordpress runing on your local machine, knowledge of XHTML, CSS and programming. And your computer must has Firefox installed and it’s plugin called Firebug.<br />
<br />
So, lets get started. First, make a theme folder (name it whatever you like) under /wp-content/themes/. Visit the blog you like to copy it’s theme. Here, I’m using Wordpress’s classic theme. Copy the CSS codes from CSS tab in Firebug Windows .<br />
<br />
<br />
<br />
Select all of CSS codes and paste into text editor (notepad). Put the following codes at the beginning of CSS codes previously copied into notepad. The following codes are used for wordpress theme information.<br />
<br />
/*<br />
Theme Name: Your theme name<br />
Theme URI: <a data-mce-href="http://www.moneymakerdiscussion.com/forum/redirector.php?url=http%3A%2F%2FyourthemeURL.com%2F" href="http://www.moneymakerdiscussion.com/forum/redirector.php?url=http%3A%2F%2FyourthemeURL.com%2F" rel="nofollow" target="_blank">OpenDNS</a><br />
Description: Your theme description blah blah blah<br />
Version: 1.1<br />
Author: Your name<br />
Author URI: E-Commerce Hosting<br />
*/<br />
<br />
Save it as style.css into theme folder you created under wp-content/themes/.<br />
Firebug’s HTML tab collasped the heading tag and body tag by default. Create a index.php under your theme folder. Write the following codes.<br />
<img alt="" border="0" data-mce-src="http://www.freeimagehosting.net/uploads/d9b889e4d4.png" src="http://www.freeimagehosting.net/uploads/d9b889e4d4.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /><br />
<br />
<!DOCTYPE html PUBLIC “-//W3C//DTD XHTML 1.0 Transitional//EN” “http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd”></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><html xmlns=”http://www.w3.org/1999/xhtml”><br />
<head profile=”http://gmpg.org/xfn/11″><br />
<br />
</head><br />
<br />
<body><br />
<br />
</body><br />
</html></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">language_attributes() can be used to add lang, xml:lang and dir attributes to the html tag for your theme. Put this function after xmlns attribute in html tag.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><html xmlns=”<a data-mce-href="http://www.moneymakerdiscussion.com/forum/redirector.php?url=http%3A%2F%2Fwww.w3.org%2F1999%2Fxhtml%26%238221%3B" href="http://www.moneymakerdiscussion.com/forum/redirector.php?url=http%3A%2F%2Fwww.w3.org%2F1999%2Fxhtml%26%238221%3B" rel="nofollow" target="_blank">http://www.w3.org/1999/xhtml”</a> <?php language_attributes(); ?>></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Understanding BlogInfo functions<br />
<br />
BlogInfo returns the information you set in User Profile and General Options from your Wordpress Administration panel. Following codes are the basic information of your wordpress needed for html. Those codes must be inside heading <head> tags.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><meta http-equiv=”Content-Type” content=”<?php bloginfo(’html_type’); ?>; charset=<?php bloginfo(’charset’); ?>” /><br />
<meta name=”generator” content=”WordPress <?php bloginfo(’version’); ?>” /><br />
<link rel=”alternate” type=”application/rss+xml” title=”RSS 2.0″ href=”<?php bloginfo(’rss2_url’); ?>” /><br />
<link rel=”alternate” type=”text/xml” title=”RSS .92″ href=”<?php bloginfo(’rss_url’); ?>” /><br />
<link rel=”alternate” type=”application/atom+xml” title=”Atom 0.3″ href=”<?php bloginfo(’atom_url’); ?>” /><br />
<link rel=”pingback” href=”<?php bloginfo(’pingback_url’); ?>” /><br />
<?php wp_get_archives(’type=monthly&format=link’); ?><br />
<?php wp_head(); ?><br />
<style type=”text/css” media=”screen”><br />
@import url( <?php bloginfo(’stylesheet_url’); ?> );<br />
</style></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Use Better Search Engine Optimization title</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><title><?php wp_title(”); ?> <?php if(is_single() || is_page() || is_category){ _e(’»’);}?><?php bloginfo(’name’); ?></title></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Title tag must be inside heading tags.<br />
<br />
Let’s start copy the well-formed tag elements<br />
Before you start this lesson, you must have the knowledge about html and wordpress coding. The idea is that we first copy the parent tag elements and then we copy it’s child elements. We repeat the process till all of the tags are copied.<br />
<br />
Expand each tags and try to understand the functions used in the theme<br />
<br />
It is important to know the wordpress functions used in the theme which you’re going to copy. First expand the tags and look up and determine what functions are used inside the tags.<br />
<br />
An example for code shown in above,<br />
<br />
Wordpress has bloginfo function that can generate the basic information of your wordpress I already mentioned. Right now, I’m going to change with the wordpress coding. The following codes will generate the result shown in above.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><h1><a href=”<?php bloginfo(’url’);?>“><?php bloginfo(’title’);?></a></h1><br />
<br />
<div class=”description”><?php bloginfo(’description’);?></div></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Many of wordpress theme creators used default posts query in the theme except custom one. Some used query_posts to make custom query for some purposed. It doesn’t matter. All are in the loop.<br />
<br />
Understand the basic structure of Post looping<br />
<br />
The Loop is used by WordPress to display each of your posts. Using The Loop, WordPress processes each of the posts to be displayed on the current page and formats them according to how they match specified criteria within The Loop tags. This is the basic structure of the_loop. Inside this we normally put the_title(), the_permalink(), the_content(), etc.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><?php if ( have_posts() ) : while ( have_posts() ) : the_post(); ?><br />
<br />
<?php endwhile; else: ?><br />
<?php _e(’Sorry, no posts matched your criteria.’); ?><br />
<?php endif; ?></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">If you’re doing programming, you can easily know that the following codes are generated from Loop.<br />
<img alt="" border="0" data-mce-src="http://www.freeimagehosting.net/uploads/bc0161f586.png" src="http://www.freeimagehosting.net/uploads/bc0161f586.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /><br />
<br />
The following codes will output shown above</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><div id=”post-<?php the_ID(); ?>” class=”post”><br />
<br />
</div></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Expand that div you’ll see the following sub elements<br />
<br />
Expand h2 tag element.<br />
<img alt="" border="0" data-mce-src="http://www.freeimagehosting.net/uploads/d7ca3d47c0.jpg" src="http://www.freeimagehosting.net/uploads/d7ca3d47c0.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /><br />
<br />
the_title and the_permalink<br />
<br />
the_title returns the post title and the_permalink returns the permalink of your post. So rewrite with the<br />
php code</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><h2><br />
<a title=”Permanet Link to <?php the_title();?>” rel=”bookmark” href=”<?php the_permalink();?>”><br />
<?php the_title();?></a><br />
</h2></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">the_time or the_date<br />
<br />
the_time returns the all the date of your post. and the_date only returns the date of first post which is published in same day. I prefer you to use the_time</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><small><?php the_time(’F d, Y’);?></small></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Check date time format from PHP.net<br />
the_content<br />
<br />
the_content returns the content of post. Optional parameter is used for showing read more link if the post used <!–more–></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><div class=”entry”><br />
the_content (’Read the rest of this entry’);<br />
</div></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">the_tags<br />
<br />
the_tags function return the tags link of the post. It was implemented in wordpress 2.3. the_tags(’start’, ’seperate’,’end’);</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><p class=”postmetadata”><br />
the_tags (”Tags:”, “, “, “<br />”);<br />
</p></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Wordpress uses header.php, index.php, single.php, page.php, category.php, search.php, comments.php, functions.php and footer.php for theme. Oh! you can use only index.php for your theme. But need to write more complicated codes when you’re using different style for different page. Let’s say, if you want main , single post and page different. You have to choose either conditional_tags or the page.<br />
<br />
For example, the following code will show excerpt post while browsing the category, search, tags and main page. It shows full content when browsing … ? ha ha single post</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><div></div><?php if (is_category() || is_search() || is_tags() || is_main()) {<br />
the_excerpt();<br />
}else {<br />
the_content();<br />
}<br />
?></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><br />
</div><div style="text-align: -webkit-auto;"><span style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: x-small;"><span style="line-height: 19px;">This Post is completely for educational purposes, by no means you should copy someone else's personally made template, or steal something without paying for it! Please download a free theme if its that important!</span></span></div></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com4tag:blogger.com,1999:blog-5882192688106799176.post-91476137775031288732012-04-23T03:14:00.002-07:002012-04-23T03:14:57.298-07:00Brutus Password Cracker<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://2.bp.blogspot.com/-HNZnFL6xTSU/TZWfWrVnCKI/AAAAAAAAAOI/SM45OC08j_o/s1600/screenshot.jpg"><br />
<img alt="" border="0" height="285" src="http://2.bp.blogspot.com/-HNZnFL6xTSU/TZWfWrVnCKI/AAAAAAAAAOI/SM45OC08j_o/s320/screenshot.jpg" width="320" /></a>Brutus is one of the fastest, most flexible remote password crackers you can get your hands on – it’s also free. It is available for Windows 9x, NT and 2000, there is no UN*X version available although it is a possibility at some point in the future. Brutus was first made publicly available in October 1998 and since that time there have been at least 370,000 downloads. Development continues so new releases will be available in the near future.<br />
<br />
<em><strong>Brutus was written originally to check routers etc. for default and common passwords.</strong></em><br />
<br />
<strong>Features</strong><br />
<br />
Brutus version AET2 is the current release and includes the following authentication types :<br />
<ul><li>HTTP (Basic Authentication)</li>
<li>HTTP (HTML Form/CGI)</li>
<li>POP3</li>
<li>FTP</li>
<li>SMB</li>
<li>Telnet</li>
</ul><em>Other types such as IMAP, NNTP, NetBus etc are freely downloadable from this site and simply imported into your copy of Brutus. You can create your own types or use other peoples.</em><br />
<br />
<strong>The current release includes the following functionality :</strong><br />
<ul><li>Multi-stage authentication engine</li>
<li>60 simultaneous target connections</li>
<li>No username, single username and multiple username modes</li>
<li>Password list, combo (user/password) list and configurable brute force modes</li>
<li>Highly customisable authentication sequences</li>
<li>Load and resume position</li>
<li>Import and Export custom authentication types as BAD files seamlessly</li>
<li>SOCKS proxy support for all authentication types</li>
<li>User and password list generation and manipulation functionality</li>
<li>HTML Form interpretation for HTML Form/CGI authentication types</li>
<li>Error handling and recovery capability inc. resume after crash/failure.</li>
</ul>You can download it here:<br />
<br />
<a href="http://www.hoobie.net/brutus/brutus-download.html"><strong>Brutus AET2</strong></a></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-51021959533164604152012-04-23T03:12:00.002-07:002012-05-05T10:33:43.508-07:00Windows 8 to come with Bult in Malware Protection<div dir="ltr" style="text-align: left;" trbidi="on"><div><a href="http://4.bp.blogspot.com/-GWq4-G64xcg/TnHmEZuz7mI/AAAAAAAABDw/DXe3YXJQ0CE/s1600/windows-8.jpg" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="windows-8" border="0" height="260" src="http://4.bp.blogspot.com/-GWq4-G64xcg/TnHmEZuz7mI/AAAAAAAABDw/DXe3YXJQ0CE/s320/windows-8.jpg" width="320" /></a></div>Microsoft's next version of Windows will ship with "tons of security features," including one that automatically scans boot drives for malware and a revamped version of the Windows Defender antivirus program, company executives said.<br />
<br />
At the company's BUILD conference in Anaheim, California on Tuesday, Corporate Vice President of Windows Planning and Ecosystem Michael Angiulo demonstrated an early version of Windows 8 that automatically scanned an infected USB drive used to boot the next generation operating system. Before the OS was able to load, the computer stopped the process and displayed a warning that the boot volume contained an "invalid signature" indicating it had been compromised.<br />
<br />
He was able to get the valid version of Windows to load by turning off the system and turning it back on. The presentation starts around the 1:08 mark in the following video:<br />
<br />
<iframe frameborder="0" height="240" scrolling="no" src="http://channel9.msdn.com/Events/BUILD/BUILD2011/KEY-0001/player?w=580&h=329" width="320"></iframe><br />
<br />
The technology making this possible is known as UEFI, short for Unified Extensible Firmware Interface. A successor to the BIOS ROM firmware that Microsoft operating systems have relied on since their beginning, UEFI was designed to shorten the time it takes a PC to start up. It was built by Intel, but is designed to work with a variety of CPU architectures.<br />
<blockquote>"It's not just about speed and having a boot that looks better," Angiulo said during Tuesday's keynote, referring to UEFI. "It's about security, too."</blockquote>Steven Sinofsky, president of Microsoft's Windows and Windows Live division, went on to say that Windows 8 developers "have taken Defender and we've actually built a whole new range of protection, all the way up though antimalware, antivirus." Users are free to run Defender or security software supplied by another company. In all, the new OS will offer "tons of security features," he added.<br />
<br />
The company issued a statement Wednesday saying Windows 8 would include "low-level security features such as Secured Boot to help defeat classes of threats, and user facing features including Windows Defender and SmartScreen" spam-filtering. The statement didn't elaborate.<br />
<br />
Windows 8 will also offer a new way to log on to PCs equipped with a touchscreen. Sam Bowne, a security instructor at San Francisco City College, provided a <a href="http://samsclass.info//345/proj10/Win8picturepassword.png">screenshot here</a> that describes the feature this way: "You choose the picture – and the gestures you use with it – to create a password that's uniquely yours."<br />
<br />
Bowne and his students have been testing the security features in the new Windows beta, according to a source.<br />
<blockquote>"There is built in antivirus, and it works!" he wrote "It stopped not only thr EICAR test file, but more than a dozen malware items in Metasploit. So it might be time to sell your Symantec stock."</blockquote></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-6794957251046526372012-04-23T03:09:00.000-07:002012-05-05T10:33:43.522-07:00Network Forensic Analysis tool for Windows-Network Miner<div dir="ltr" style="text-align: left;" trbidi="on"><a href="http://1.bp.blogspot.com/-KgZPAGX1JeI/TnjLt5SrcgI/AAAAAAAABFU/FAWgQQ7KQCo/s1600/NetworkMiner_Professional_1-0_Files.png" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><br />
<img alt="NetworkMiner" border="0" height="223" src="http://1.bp.blogspot.com/-KgZPAGX1JeI/TnjLt5SrcgI/AAAAAAAABFU/FAWgQQ7KQCo/s320/NetworkMiner_Professional_1-0_Files.png" width="320" /></a><strong>NetworkMiner is a Network Forensic Analysis Tool (NFAT) for Windows. NetworkMiner can be used as a passive network sniffer/packet capturing tool in order to detect operating systems, sessions, hostnames, open ports etc. without putting any traffic on the network. NetworkMiner can also parse PCAP files for off-line analysis and to regenerate/reassemble transmitted files and certificates from PCAP files.<br />
<br />
NetworkMiner collects data (such as forensic evidence) about hosts on the network rather than to collect data regarding the traffic on the network. The main user interface view is host centric (information grouped per host) rather than packet centric (information showed as a list of packets/frames).<br />
<br />
NetworkMiner can extract files and certificates transferred over the network by parsing a PCAP file or by sniffing traffic directly from the network. This functionality can be used to extract and save media files (such as audio or video files) which are streamed across a network from websites such as YouTube. Supported protocols for file extraction are FTP, TFTP, HTTP and SMB.<br />
<br />
NetworkMiner has, since the first release in 2007, become popular tool among incident response teams as well as law enforcement<br />
<br />
<strong>The new version supports features such as:</strong><br />
<br />
</strong><br />
<ul><li><b>Extraction of Google Analytics data</b></li>
<li><b>Better parsing of SMB data</b></li>
<li><b>Support for PPP frames</b></li>
<li><b>Even more stable than the 1.0 release</b></li>
</ul><strong>You can download NetworkMiner v1.1 here:<br />
<br />
<a href="http://sourceforge.net/projects/networkminer/files/networkminer/NetworkMiner-1.1/NetworkMiner_1-1.zip/download">NetworkMiner_1-1.zip</a><br />
</strong></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-69369795170842867392012-04-23T03:07:00.001-07:002012-04-24T04:56:39.278-07:00Check if spammers are onto your Twitter Account<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong>With so many risks to your accounts and computer on the Web, wouldn't it be nice to know that none of the people you follow on Twitter are adding to those risks? Safego, a Bitdefender product, offers a free service that will scan your Twitter account for suspicious users, links, and messages. It won't take any action without your consent, but it can be set to alert you when a new issue arises. Here's how to get started:</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<a data-mce-href="http://3.bp.blogspot.com/-HsY7zMmTDOY/TpieqBdEjpI/AAAAAAAABIs/3v-JQw3myd0/s1600/safego_logo.png" href="http://3.bp.blogspot.com/-HsY7zMmTDOY/TpieqBdEjpI/AAAAAAAABIs/3v-JQw3myd0/s1600/safego_logo.png"><img alt="" border="0" data-mce-src="http://3.bp.blogspot.com/-HsY7zMmTDOY/TpieqBdEjpI/AAAAAAAABIs/3v-JQw3myd0/s1600/safego_logo.png" src="http://3.bp.blogspot.com/-HsY7zMmTDOY/TpieqBdEjpI/AAAAAAAABIs/3v-JQw3myd0/s1600/safego_logo.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong><br />
<strong>Step 1:</strong> Head over to http://safego.bitdefender.com/twitter/</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong>Step 2:</strong> Log in with your Twitter account. This means the Web site will not need you to sign up for a new account (hooray!).</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<a data-mce-href="http://1.bp.blogspot.com/-6rrcIYCDw2E/TpieqWYppII/AAAAAAAABI0/YdiCraaGBSE/s1600/safego2-3.jpg" href="http://1.bp.blogspot.com/-6rrcIYCDw2E/TpieqWYppII/AAAAAAAABI0/YdiCraaGBSE/s1600/safego2-3.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-6rrcIYCDw2E/TpieqWYppII/AAAAAAAABI0/YdiCraaGBSE/s1600/safego2-3.jpg" src="http://1.bp.blogspot.com/-6rrcIYCDw2E/TpieqWYppII/AAAAAAAABI0/YdiCraaGBSE/s1600/safego2-3.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong><br />
<strong>Step 3: </strong>Authorize Safego when prompted by Twitter.</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<a data-mce-href="http://1.bp.blogspot.com/-ie_S1Y69TMM/TpieqTK5rmI/AAAAAAAABJA/0iC0ej71he4/s1600/safego_scan.png" href="http://1.bp.blogspot.com/-ie_S1Y69TMM/TpieqTK5rmI/AAAAAAAABJA/0iC0ej71he4/s1600/safego_scan.png"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-ie_S1Y69TMM/TpieqTK5rmI/AAAAAAAABJA/0iC0ej71he4/s1600/safego_scan.png" src="http://1.bp.blogspot.com/-ie_S1Y69TMM/TpieqTK5rmI/AAAAAAAABJA/0iC0ej71he4/s1600/safego_scan.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong><br />
<strong>Step 4: </strong>Wait as Safego redirects you back to its site and starts scanning your Twitter friends for any suspicious behavior. The more people you follow; the longer this process will take.</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<a data-mce-href="http://2.bp.blogspot.com/-9EjJJaIxULg/Tpieq-GI_1I/AAAAAAAABJQ/SfDe6a4YT6Y/s1600/safego_scanned_610x394.png" href="http://2.bp.blogspot.com/-9EjJJaIxULg/Tpieq-GI_1I/AAAAAAAABJQ/SfDe6a4YT6Y/s1600/safego_scanned_610x394.png"><img alt="" border="0" data-mce-src="http://2.bp.blogspot.com/-9EjJJaIxULg/Tpieq-GI_1I/AAAAAAAABJQ/SfDe6a4YT6Y/s400/safego_scanned_610x394.png" height="258" src="http://2.bp.blogspot.com/-9EjJJaIxULg/Tpieq-GI_1I/AAAAAAAABJQ/SfDe6a4YT6Y/s400/safego_scanned_610x394.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" width="400" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong><br />
<strong>Step 5: </strong>Once scanning is complete, check out the Friends link on the top banner (next to the Scan Now button). This will change to reflect how many, if any, of your friends are showing suspicious activity.</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong>Step 6: </strong>Click on this Friends link to get a list of flagged friends.</div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<br /></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<a data-mce-href="http://1.bp.blogspot.com/-TRulMPg176Y/TpierBcO5VI/AAAAAAAABJY/752Y7UtPPDk/s1600/safego_friends.png" href="http://1.bp.blogspot.com/-TRulMPg176Y/TpierBcO5VI/AAAAAAAABJY/752Y7UtPPDk/s1600/safego_friends.png"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-TRulMPg176Y/TpierBcO5VI/AAAAAAAABJY/752Y7UtPPDk/s400/safego_friends.png" height="268" src="http://1.bp.blogspot.com/-TRulMPg176Y/TpierBcO5VI/AAAAAAAABJY/752Y7UtPPDk/s400/safego_friends.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" width="400" /></a></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
<strong><br />
<strong>Step 7:</strong> From the list that appears, you can choose to "unfollow" or clear your flagged friends.</strong></div>
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">
In the notifications area (link at top, or right-hand side on dashboard) you'll see the alerts that are currently disabled. If you'd like to enable any of these to help protect your Twitter account, click on Settings at the top and choose the alerts that work best for you. Additionally, you can use Safego to scan a Twitter user for suspicious activities before you follow them from the Home dashboard.</div>
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-17369698929480566532012-04-23T03:05:00.000-07:002012-04-23T03:05:07.157-07:00Apple iPhone 4s Comprehensive Review<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Review </strong>Apple’s design language is easily recognisable: clear glass or plastic that’s spray-painted from the inside, a frequent use of aluminium, stainless steel and any colour so long as it’s white or black. But the new iPhone takes this familiarity further, by making the <a data-mce-href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4" href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4">iPhone 4S</a>almost identical to last year’s iPhone 4.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://1.bp.blogspot.com/-FVFBgMU_Rno/Tqf8EB57onI/AAAAAAAABNk/u0cItx6KzS4/s1600/apple_iphone_4s_6.jpg" href="http://1.bp.blogspot.com/-FVFBgMU_Rno/Tqf8EB57onI/AAAAAAAABNk/u0cItx6KzS4/s1600/apple_iphone_4s_6.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-FVFBgMU_Rno/Tqf8EB57onI/AAAAAAAABNk/u0cItx6KzS4/s1600/apple_iphone_4s_6.jpg" src="http://1.bp.blogspot.com/-FVFBgMU_Rno/Tqf8EB57onI/AAAAAAAABNk/u0cItx6KzS4/s1600/apple_iphone_4s_6.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Apple's iPhone 4S: external tweaks are subtle, the main changes are internal</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Of course, it’s not the first time this has happened – the 3G was followed by the matching 3GS. But for the millions who had been eagerly anticipating an iPhone 5 since, ooh, June this year, it came as a big disappointment. So, was that disappointment justified or should you upgrade without hesitation? Read on.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The cosmetic differences are few so you won’t need to hear much about the <a data-mce-href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4" href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4">iPhone 4S’s design</a>. It’s the same slim, solid and classy machine with components precision-tooled to the micron, not the millimetre, and the same buttons as every iPhone: a home button, volume, ringer and power buttons.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://1.bp.blogspot.com/-4lQDIhpiBFk/Tqf8jVNuxbI/AAAAAAAABNw/Y8Os7gazzvo/s1600/apple_iphone_4s_5.jpg" href="http://1.bp.blogspot.com/-4lQDIhpiBFk/Tqf8jVNuxbI/AAAAAAAABNw/Y8Os7gazzvo/s1600/apple_iphone_4s_5.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-4lQDIhpiBFk/Tqf8jVNuxbI/AAAAAAAABNw/Y8Os7gazzvo/s1600/apple_iphone_4s_5.jpg" src="http://1.bp.blogspot.com/-4lQDIhpiBFk/Tqf8jVNuxbI/AAAAAAAABNw/Y8Os7gazzvo/s1600/apple_iphone_4s_5.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Some older cases might not fit due to a slight shift of the buttons</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">One change is the position of the black lines on the steel band that edges the phone. Those black lines are functional, and are indicative of a whole new antenna. This aims to address the dropped calls and spotty signal of last year’s model. Not everyone suffered from a poor signal but if you did, then you’ll be pleased to hear the new set-up works splendidly, giving the iPhone something which performs like one of the strongest antennas around.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">So it reliably makes and receives calls – hurrah! Signal strength and battery life, the bare minimum for a phone, are both strong with clear voice quality. Daily charges are still recommended but it won’t need a lie-down by lunchtime, unlike some smarties. So what else is new?</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://1.bp.blogspot.com/-ejcUKJM6vJc/Tqf8jrTFh5I/AAAAAAAABN8/IN3Ntsc85aE/s1600/apple_iphone_4s_2.jpg" href="http://1.bp.blogspot.com/-ejcUKJM6vJc/Tqf8jrTFh5I/AAAAAAAABN8/IN3Ntsc85aE/s1600/apple_iphone_4s_2.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-ejcUKJM6vJc/Tqf8jrTFh5I/AAAAAAAABN8/IN3Ntsc85aE/s1600/apple_iphone_4s_2.jpg" src="http://1.bp.blogspot.com/-ejcUKJM6vJc/Tqf8jrTFh5I/AAAAAAAABN8/IN3Ntsc85aE/s1600/apple_iphone_4s_2.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The camera has been overhauled optically and captures stills at 8Mp</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The only other cosmetic alteration is situation of the volume buttons and ringer switch. They’ve also moved just enough to mean that some cases, including early editions of Apple’s own bumper, won’t fit. The buttons match the positions on the Verizon iPhone 4 sold in the US and newer bumpers are designed for both versions. But if you’re planning to recycle last year’s case, depending on when you bought it, it may not fit.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Internal affairs</strong></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Other changes, and there are several, are all internal. First of all, there’s a new processor. Well, not quite new, it’s the A5 chip found in the iPad 2. Just as it made the second iPad much faster than the first, the peppy A5 ensures the iPhone fast and responsive. Though the iPhone 4 rarely kept you waiting for long, here applications launch in a trice and content is downloaded fast – though this may be partly due to the improved antenna, too.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://2.bp.blogspot.com/-YrR2HhbkEVk/Tqf9K6kJggI/AAAAAAAABOI/WvFH5CncDN8/s1600/apple_iphone_4s_8.jpg" href="http://2.bp.blogspot.com/-YrR2HhbkEVk/Tqf9K6kJggI/AAAAAAAABOI/WvFH5CncDN8/s1600/apple_iphone_4s_8.jpg"><img alt="" border="0" data-mce-src="http://2.bp.blogspot.com/-YrR2HhbkEVk/Tqf9K6kJggI/AAAAAAAABOI/WvFH5CncDN8/s1600/apple_iphone_4s_8.jpg" src="http://2.bp.blogspot.com/-YrR2HhbkEVk/Tqf9K6kJggI/AAAAAAAABOI/WvFH5CncDN8/s1600/apple_iphone_4s_8.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The A5 CPU has yet to show its strengths with third party apps</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The CPU is swift, but its potential has yet to be fully realised yet – Apple promises performance that’s twice as fast but graphics that are seven times better. We need to wait for the improved games apps – that developers are coming up with now – to really notice the difference. Since the iPhone continues to have the one of highest pixel density ratings of any mobile, these visual treats should be worth waiting for.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The camera has also had an upgrade. It’s now 8Mp, which is good but not exceptional. The differentiators come in other forms: where the iPhone 4 had an array of four lenses, the 4S has five, promising sharper detail. The aperture is wider (f2.4) and the sensor has its wiring hidden around the back instead of on the front, where it is on most sensors. Both these aim to suck more light in through the lens, improving picture quality.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Sample Shots</strong></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://1.bp.blogspot.com/-AEgQ21dVyZg/Tqf9LN_TJ1I/AAAAAAAABOg/2_z67uM6nDQ/s1600/apple_iphone_4s_13.jpg" href="http://1.bp.blogspot.com/-AEgQ21dVyZg/Tqf9LN_TJ1I/AAAAAAAABOg/2_z67uM6nDQ/s1600/apple_iphone_4s_13.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-AEgQ21dVyZg/Tqf9LN_TJ1I/AAAAAAAABOg/2_z67uM6nDQ/s1600/apple_iphone_4s_13.jpg" src="http://1.bp.blogspot.com/-AEgQ21dVyZg/Tqf9LN_TJ1I/AAAAAAAABOg/2_z67uM6nDQ/s1600/apple_iphone_4s_13.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://1.bp.blogspot.com/-acRc5ASKUMQ/Tqf9LvqdddI/AAAAAAAABOo/70ZahZwKjvI/s1600/apple_iphone_4s_14.jpg" href="http://1.bp.blogspot.com/-acRc5ASKUMQ/Tqf9LvqdddI/AAAAAAAABOo/70ZahZwKjvI/s1600/apple_iphone_4s_14.jpg"><img alt="" border="0" data-mce-src="http://1.bp.blogspot.com/-acRc5ASKUMQ/Tqf9LvqdddI/AAAAAAAABOo/70ZahZwKjvI/s1600/apple_iphone_4s_14.jpg" src="http://1.bp.blogspot.com/-acRc5ASKUMQ/Tqf9LvqdddI/AAAAAAAABOo/70ZahZwKjvI/s1600/apple_iphone_4s_14.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://4.bp.blogspot.com/-r4BfcDnLTJ0/Tqf9Lvy0ZZI/AAAAAAAABO8/mlW09DjQmqQ/s1600/apple_iphone_4s_15a.jpg" href="http://4.bp.blogspot.com/-r4BfcDnLTJ0/Tqf9Lvy0ZZI/AAAAAAAABO8/mlW09DjQmqQ/s1600/apple_iphone_4s_15a.jpg"><img alt="" border="0" data-mce-src="http://4.bp.blogspot.com/-r4BfcDnLTJ0/Tqf9Lvy0ZZI/AAAAAAAABO8/mlW09DjQmqQ/s1600/apple_iphone_4s_15a.jpg" src="http://4.bp.blogspot.com/-r4BfcDnLTJ0/Tqf9Lvy0ZZI/AAAAAAAABO8/mlW09DjQmqQ/s1600/apple_iphone_4s_15a.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Wide mode – low resolution</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">And the processor is no slouch here, either, speeding up autofocus and rapidly readying the snapper for the first shot with subsequent photos captured even more quickly. Features like face recognition, auto exposure and auto focus controlled by one setting are now available. Not all of these are firsts, but they work well.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The new operating system, iOS 5, helps you get snapping more quickly by including a shortcut to the camera from the lock screen. You’ll find a more detailed exploration of the new software, which is also available on the iPhones 4 and 3GS, <a data-mce-href="http://www.apple.com/uk/iphone/ios/" href="http://www.apple.com/uk/iphone/ios/">here</a>.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://3.bp.blogspot.com/-Pk39uJcHZx0/Tqf9KwSeeZI/AAAAAAAABOQ/btOtZhcc0Qc/s1600/apple_iphone_4s_11.png" href="http://3.bp.blogspot.com/-Pk39uJcHZx0/Tqf9KwSeeZI/AAAAAAAABOQ/btOtZhcc0Qc/s1600/apple_iphone_4s_11.png"><img alt="" border="0" data-mce-src="http://3.bp.blogspot.com/-Pk39uJcHZx0/Tqf9KwSeeZI/AAAAAAAABOQ/btOtZhcc0Qc/s1600/apple_iphone_4s_11.png" src="http://3.bp.blogspot.com/-Pk39uJcHZx0/Tqf9KwSeeZI/AAAAAAAABOQ/btOtZhcc0Qc/s1600/apple_iphone_4s_11.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Vocal performance</strong></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Much has been made of Siri, the new key feature launched with the <a data-mce-href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4" href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&amp;tag=profehackitri-20&amp;linkCode=as2&amp;camp=217145&amp;creative=399373&amp;creativeASIN=B005VSR0U4">iPhone 4S</a>. It’s not the first voice-recognition application but just as FaceTime was far from the first video calling application, Apple aims to provide the best voice interface. Siri was available in the US App Store already, but those servers no longer respond if you launch that app now. Apple liked the company so much, it bought it, as <a data-mce-href="http://news.bbc.co.uk/1/hi/1356903.stm" href="http://news.bbc.co.uk/1/hi/1356903.stm">Victor Kiam</a> used to say.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://4.bp.blogspot.com/-Ez1BzfQA9fo/Tqf_BmsU7VI/AAAAAAAABPQ/vJlyTc3fTdM/s1600/apple_iphone_4s_7.jpg" href="http://4.bp.blogspot.com/-Ez1BzfQA9fo/Tqf_BmsU7VI/AAAAAAAABPQ/vJlyTc3fTdM/s1600/apple_iphone_4s_7.jpg"><img alt="" border="0" data-mce-src="http://4.bp.blogspot.com/-Ez1BzfQA9fo/Tqf_BmsU7VI/AAAAAAAABPQ/vJlyTc3fTdM/s1600/apple_iphone_4s_7.jpg" src="http://4.bp.blogspot.com/-Ez1BzfQA9fo/Tqf_BmsU7VI/AAAAAAAABPQ/vJlyTc3fTdM/s1600/apple_iphone_4s_7.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Siri originally appeared on the App Store until Apple acquired it</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">So does it work, and do you need it? Well, it mostly works pretty well. Its microphone does best in quiet environments and worst when it’s noisy or you’re trying to show it off to someone. Then it fails to understand what you’ve said.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">In the UK, it’s limited for now because mapping and business data doesn’t extend beyond the States, though this will follow. So you can’t ask directions or distances between places as you can in America. Switching to US English and adopting your best accent works splendidly… but only if you’re in the US at the time.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://2.bp.blogspot.com/-uykK5U4gSiI/Tqf_B2GZLDI/AAAAAAAABPc/OLWluY89J_A/s1600/apple_iphone_4s_10.jpg" href="http://2.bp.blogspot.com/-uykK5U4gSiI/Tqf_B2GZLDI/AAAAAAAABPc/OLWluY89J_A/s1600/apple_iphone_4s_10.jpg"><img alt="" border="0" data-mce-src="http://2.bp.blogspot.com/-uykK5U4gSiI/Tqf_B2GZLDI/AAAAAAAABPc/OLWluY89J_A/s1600/apple_iphone_4s_10.jpg" src="http://2.bp.blogspot.com/-uykK5U4gSiI/Tqf_B2GZLDI/AAAAAAAABPc/OLWluY89J_A/s1600/apple_iphone_4s_10.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Voice commands can be executed for any number of tasks</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">It can still do a lot. Say “Text my wife” and it will. First time, of course, you have to tell it which of your contacts is your wife – come on, it’s not psychic – but then it’ll remember. Then dictate your message and it’ll send it. Ask it to remind you to pick up the milk when you leave the office and it’ll use the phone’s location information from GPS and Wi-Fi to ping you a reminder as you walk out the door.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Siri is integrated throughout the phone’s features, and third parties can build functionality into their apps, so its potential may grow quickly. Sometimes it’s quicker to type a message, but for hands-free use when driving, say, it’s decidedly useful. Especially since you can talk to it very freely. Ask if it’s chilly tomorrow and it knows to seek out weather information and comment on whether tomorrow’s temperature qualifies as warm or cold.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://3.bp.blogspot.com/-kXfyqwbs-nU/Tqf_BWToOhI/AAAAAAAABPE/VYEzLLFebaE/s1600/apple_iphone_4s_1.jpg" href="http://3.bp.blogspot.com/-kXfyqwbs-nU/Tqf_BWToOhI/AAAAAAAABPE/VYEzLLFebaE/s1600/apple_iphone_4s_1.jpg"><img alt="" border="0" data-mce-src="http://3.bp.blogspot.com/-kXfyqwbs-nU/Tqf_BWToOhI/AAAAAAAABPE/VYEzLLFebaE/s1600/apple_iphone_4s_1.jpg" src="http://3.bp.blogspot.com/-kXfyqwbs-nU/Tqf_BWToOhI/AAAAAAAABPE/VYEzLLFebaE/s1600/apple_iphone_4s_1.jpg" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">The iPhone 5 could be some way off, so it's make your mind up time</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">Or ask it for share values and you can follow up asking it to compare two stocks. It’s highly sophisticated and though at times it seems to be a glorious, cool gimmick, this will change. One thing that hasn't changed though, is that the iPhone still doesn't offer an FM radio – something that appears on just about all competing smartphones.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Verdict</strong></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">So should you buy an iPhone 4S? For 3GS users, the answer is an emphatic yes. It’s less clear-cut for iPhone 4 owners, especially if you have a contract to buy your way out of. But if you suffered from poor call quality before, the 4S will restore your faith in the iPhone. Even if you didn’t, the upgraded performance and coolness of Siri and the improved camera are pretty compelling.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">If you’re wary of buying the 4S in the belief that a radically different iPhone is on the horizon, the fact is, beyond Infinite Loop, nobody knows – and really, don’t believe anyone who claims otherwise.</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><em>Apple's new talker looks the same on the outside, but its dual-core CPU delivers significant changes in capabilities.</em></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><strong>Suggested Price:</strong> £499 (16GB), £599 (32GB), £699 (64GB)</div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;"><a data-mce-href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&tag=profehackitri-20&linkCode=as2&camp=217145&creative=399373&creativeASIN=B005VSR0U4" href="http://www.amazon.com/gp/product/B005VSR0U4/ref=as_li_tf_tl?ie=UTF8&tag=profehackitri-20&linkCode=as2&camp=217145&creative=399373&creativeASIN=B005VSR0U4"><br />
<img alt="" border="0" data-mce-src="http://3.bp.blogspot.com/-9vmXlqPi2x8/TqgDJEyQ4HI/AAAAAAAABPo/ts5WE_gxiT4/s320/amazon_us.png" height="28" src="http://3.bp.blogspot.com/-9vmXlqPi2x8/TqgDJEyQ4HI/AAAAAAAABPo/ts5WE_gxiT4/s320/amazon_us.png" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; cursor: default;" width="120" /></a></div><div style="color: #333333; font-family: Georgia, 'Times New Roman', 'Bitstream Charter', Times, serif; font-size: 13px; line-height: 19px; text-align: -webkit-auto;">More Info: <a data-mce-href="http://www.apple.com/uk/iphone/" href="http://www.apple.com/uk/iphone/">Apple's iPhone 4S page</a></div></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-77206808155254767372012-04-23T03:00:00.000-07:002012-04-23T03:00:58.762-07:00Prevent Google from Tracking You.<div dir="ltr" style="text-align: left;" trbidi="on">Much has been made of Google's new <a href="http://www.google.com/intl/en/policies/privacy/preview/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">privacy policy</a>, which takes effect March 1. If you're concerned about Google misusing your personal information or sharing too much of it with advertisers and others, there are plenty of ways to avoid Web trackers.<br />
<br />
The Electronic Frontier Foundation offers the <a href="https://panopticlick.eff.org/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Panopticlick</a>< service that rates the anonymity of your browser. The test shows you the identifiable information provided by your browser and generates a numerical rating that indicates how easy it would be to identify you based solely on your browser's fingerprint.<br />
<br />
According the the <a href="https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">entropy theory</a> explained by Peter Eckersley on the EFF's DeepLinks blog, 33 bits of entropy are sufficient to identify a person. According to Eckersley, knowing a person's birth date and month (not year) and ZIP code gives you 32 bits of entropy. Also knowing the person's gender (50-50, so one bit of entropy) gets you to the identifiable threshold of 33 bits.<br />
<br />
In some ways, <a href="http://support.google.com/websearch/bin/answer.py?hl=en&answer=1634057" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Google's explanation of personalized ads</a> is more informative than the company's privacy policy. Of course it's in Google's best interest to keep you in the personalized-ads fold, but the company does its best to present personalization as a boon to users. It certainly does help pay for the "free" services we've come to rely on.<br />
<span style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: verdana, Trebuchet, Arial; font-size: medium; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;"><b style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><br style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></b></span><br />
<span style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: verdana, Trebuchet, Arial; font-size: medium; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;"><b style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Use Google's own tools to opt out of ad networks</b></span><br />
<br />
Prominent in the Google privacy policy are links to services that let you view and manage the information you share with Google. Some of this personal data you volunteer, and some of it is collected by Google as you search, browse, and use other services.<br />
<br />
To view everything (almost) Google knows about you, open the <a href="https://www.google.com/dashboard/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Google Dashboard</a>. Here you can access all the services associated with your Google account: Gmail, Google Docs, YouTube, Picasa, Blogger, AdSense, and every other Google property. The dashboard also lets you manage your contacts, calendar, Google Groups, Web history, Google Voice account, and other services.<br />
<br />
<br />
<div class="separator" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a href="http://3.bp.blogspot.com/-9OX0qSapJi8/TygrzT9ftmI/AAAAAAAABUs/i1oBsLz1Xas/s1600/google.png" imageanchor="1" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; margin-bottom: 0px; margin-left: 1em; margin-right: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"><img border="0" height="380px" src="http://3.bp.blogspot.com/-9OX0qSapJi8/TygrzT9ftmI/AAAAAAAABUs/i1oBsLz1Xas/s1600/google.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" width="550px" /></a></div><br />
More importantly, you can view and edit the personal information stored by each Google service, or delete the service altogether. To see which other services have access to the account's information, click "Websites authorized to access the account" at the top of the Dashboard. To block an authorized service from accessing the account, click Revoke Access next to the service name.<br />
<br />
<div class="separator" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a href="http://2.bp.blogspot.com/-3E-6YWk8ZNA/TygrzXZaPJI/AAAAAAAABU4/8AxtQSblNJY/s1600/Screen_shot_2012-01-29_at_6.40.08_PM_610x277.png" imageanchor="1" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; margin-bottom: 0px; margin-left: 1em; margin-right: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"><img border="0" height="237px" src="http://2.bp.blogspot.com/-3E-6YWk8ZNA/TygrzXZaPJI/AAAAAAAABU4/8AxtQSblNJY/s1600/Screen_shot_2012-01-29_at_6.40.08_PM_610x277.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" width="550px" /></a></div><br />
The Google <a href="https://www.google.com/settings/u/0/ads/preferences/?hl=en" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Ads Preferences Manager</a> lets you block specific advertisers or opt out of all targeted advertising. Click the "<a href="https://www.google.com/settings/u/0/ads/onweb/?hl=en" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Ads on the web</a>" link in the left column and then choose "add or edit" under "Your categories and demographics" to select the categories of ads you want to be served or to opt out of personalized ads.<br />
<br />
<div class="separator" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a href="http://4.bp.blogspot.com/-cvswwCKbgag/Tygr1AMJDZI/AAAAAAAABVE/0QRRd0bOB50/s1600/Screen_shot_2012-01-29_at_8.08.41_PM_610x415.png" imageanchor="1" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; margin-bottom: 0px; margin-left: 1em; margin-right: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"><img border="0" height="355px" src="http://4.bp.blogspot.com/-cvswwCKbgag/Tygr1AMJDZI/AAAAAAAABVE/0QRRd0bOB50/s1600/Screen_shot_2012-01-29_at_8.08.41_PM_610x415.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" width="550px" /></a></div><br />
<span style="background-color: white; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; text-align: -webkit-auto;">Another option is to use Google's </span><a href="https://chrome.google.com/webstore/detail/hhnjdplhmcnkiecampfdgfjilccfpfoe" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Keep My Opt-Outs</a><span style="background-color: white; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; text-align: -webkit-auto;"> extension for Chrome. Google also participates in the </span><a href="http://www.networkadvertising.org/managing/opt_out.asp" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Network Advertising Initiative's opt-out program</a>Select some or all of the dozens of online advertisers from the NAI program and then click Submit to place a cookie in your browser instructing the ad networks not to serve personalized ads.<br />
<br />
<span style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; font-family: verdana, Trebuchet, Arial; font-size: medium; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto;"><b style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Free add-on for Firefox and Google Chrome targets tracking cookies</b></span><br />
<br />
Several free browser extensions help you identify and block the companies that are tracking you on the Web. For example, Ghostery (available in versions for <a href="https://addons.mozilla.org/en-US/firefox/addon/ghostery/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Firefox</a> and <a href="https://addons.mozilla.org/en-US/firefox/addon/ghostery/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Chrome</a>) adds an icon to your browser toolbar showing the number of trackers on the current page. Click the icon to see a list of the trackers and view options for blocking or white-listing specific ones.<br />
<br />
The free Disconnect extension (also available for Facebook and Chrome) takes a more direct approach to wiping your Web tracks. Disconnect blocks tracking by Google, Facebook, Twitter, Yahoo, and Digg. It also has an option for depersonalizing searches.<br />
<br />
<div class="separator" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: both; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a href="http://2.bp.blogspot.com/-Nwu9almlj_8/Tygr1fIGEPI/AAAAAAAABVU/544g6xeMZI8/s1600/Screen_shot_2012-01-30_at_11.43.30_AM.png" imageanchor="1" style="border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; clear: left; color: #104e8b; float: left; margin-bottom: 1em; margin-left: 0px; margin-right: 1em; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;"><img border="0" src="http://2.bp.blogspot.com/-Nwu9almlj_8/Tygr1fIGEPI/AAAAAAAABVU/544g6xeMZI8/s1600/Screen_shot_2012-01-30_at_11.43.30_AM.png" style="background-attachment: initial; background-clip: initial; background-image: initial; background-origin: initial; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></a></div>As with Ghostery, Disconnect places an icon in the browser toolbar that shows the number of elements it has blocked on the current page. Click the icon to open a window showing the number of trackers blocked for each service. To unblock tracking for one of the services, click its entry. (Note that I tested Disconnect only with Google; also, blocking of international Google domains is not yet available, according to <a href="https://chrome.google.com/webstore/detail/jeoacafpbcihiomhlakheieifhpjdfeo" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Disconnect's developers</a>.)<br />
<br />
When I tested Disconnect, I had to sign into Gmail, Google Docs, and other Google services every time I returned to or refreshed one of those pages, which is understandable considering that blocking the cookie prevents Google from keeping you signed in. Otherwise I was able to use Google services without a problem, including search, viewing and sending Gmail, and accessing, creating, uploading, and downloading Google Docs files.<br />
<br />
While people are rightly concerned about who is watching and recording their Web activities, at least Google makes it possible to use the company's services without being too forthcoming with your personal information. ISPs and other Web services do as much tracking as Google--or more--but garner far fewer headlines. For a detailed look at the state of privacy in the digital world, read about the <a href="https://ssd.eff.org/" style="background-color: white; border-bottom-width: 0px; border-color: initial; border-image: initial; border-left-width: 0px; border-right-width: 0px; border-style: initial; border-top-width: 0px; color: #104e8b; font-family: verdana, Trebuchet, Arial; font-size: 12px; line-height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: -webkit-auto; text-decoration: none;">Electronic Frontier Foundation's Surveillance Self-Defense</a>project.<br />
<br />
After all, the true threat to privacy is from the trackers we don't know about, and who aren't household names. </div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com1tag:blogger.com,1999:blog-5882192688106799176.post-1649264846693343452012-04-22T01:27:00.000-07:002012-05-02T05:28:10.941-07:00Improve Browser Speed by Changing DNS<div dir="ltr" style="text-align: left;" trbidi="on">
Most people use the default DNS settings provided by their ISP, and while they are usually sufficient for most purposes, there are plenty of free options out there, like OpenDNS and Google DNS. Namebench is a free app that checks to see whether your current settings are optimized and, if not, which free option is best for you. Here's how to use it:
Download and install <a href="http://code.google.com/p/namebench/" target="_blank">Namebench</a>.
Fire it up and choose your settings. Keep the top two boxes checked. If you're concerned about network censorship, check the third box, and if you want to help the developers, check the last box. You can tweak the rest if you're outside U.S. or want to experiment with different browsers.
<br />
<div>
<a href="http://2.bp.blogspot.com/-kwDaQbyvTbQ/T33ZRWIt8bI/AAAAAAAABaM/2zXw13WIh1Q/s1600/Namebench.jpg"><img alt="NameBench Dns" border="0" height="397px" src="http://2.bp.blogspot.com/-kwDaQbyvTbQ/T33ZRWIt8bI/AAAAAAAABaM/2zXw13WIh1Q/s1600/Namebench.jpg" width="550px" /></a></div>
Click Start Benchmark and wait while Namebench runs its tests. It should take several minutes. A browser tab should pop open when Namebench is done and give you a list of DNS servers and how much faster they are than the one you're currently using, unless yours are already the fastest possible.
Namebench does not change your settings, but it's generally pretty easy to do it yourself. Check with the instructions you got from your ISP to set up your modem and/or router and just substitute the DNS addresses you received from Namebench for the addresses given by your ISP. It's best to do this with your router, as it will assign that DNS address for all the devices attached to it.
That's it! This can dramatically improve your browsing speed, and it's fairly easy to work through.</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com1tag:blogger.com,1999:blog-5882192688106799176.post-65934566253506278692012-04-22T01:07:00.000-07:002012-04-22T01:07:27.265-07:00PC Tools Registry Mechanic v11.0.1.716 + Serial<div dir="ltr" style="text-align: left;" trbidi="on"><div class="separator" style="clear: both; text-align: center;"></div><div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></div><div style="text-align: left;"><img alt="Image" class="" id="test" src="http://www.monsterup.com/upload/1334845127312.jpg" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="text-align: left;"><span style="font-family: candara;"><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;"><br />
</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">Powerfully simple performance and privacy tools to clean up your PC.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;"><br />
</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">Clean and optimize your PC. With powerfully simple performance and privacy tools, PC Tools Registry Mechanic cleans your computer to keep it fast, private and healthy. Optimization and privacy tools fix Windows® errors, wipe computer usage, and shred deleted items. Best of all, PC Tools Registry Mechanic delivers a simple, intuitive experience that everyone can enjoy.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;"><br />
</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">PC Tools Registry Mechanic Features:</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;"><br />
</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Clean and Compact Registry. Speed up your PC by cleaning and repairing errors.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Optimize Windows®. Speed up Windows with PC Tools’ preset optimizations.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Clear Cookies and Browser History. Erases Internet activities from your browsers.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Clear Browser Passwords and Form Data. Erases saved passwords and form information.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Clear Temporary and Deleted Files. Free up hard drive space by clearing unused files.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Clear Recent File History. Erases your recently opened files lists.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Shared Files. Permanently shreds files and folders from your computer.</span></span></div><div><span style="color: #333333; font-size: x-small;"><span style="line-height: 15px;">*Bleach Disks. Permanently wipes your deleted files, making them unrecoverab</span></span></div><div style="color: #333333; font-size: 13px; line-height: 15px;"><br />
</div></span></div></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span class="reimg-zoom" style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 1px; margin-left: 1px; margin-right: 1px; margin-top: 1px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; position: absolute; text-align: left;"><img alt="Zoom in (real dimensions: 800 x 565)" class="reimg-zoom" src="http://doridro.com/forum/images/spacer.gif" style="background-attachment: initial; background-clip: initial; background-color: initial; background-image: url(http://doridro.com/forum/styles/1thank_green/imageset/icon_reimg_zoom_in.gif); background-origin: initial; background-position: 0% 0%; background-repeat: no-repeat no-repeat; border-bottom-style: none !important; border-bottom-width: 0px; border-color: initial !important; border-image: initial !important; border-left-style: none !important; border-left-width: 0px; border-right-style: none !important; border-right-width: 0px; border-top-style: none !important; border-top-width: 0px; border-width: initial !important; cursor: pointer !important; height: 20px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; opacity: 0.5; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; width: 20px;" title="Zoom in (real dimensions: 800 x 565)" /></span><div style="text-align: left;"><img alt="Image" class="reimg-width reimg-link" height="452" id="test" src="http://www.pctools.com/res/images/registry-mechanic/registry-mechanic_scan_large.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; cursor: pointer !important; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; height: auto; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; vertical-align: top; width: 640px;" title="Zoom in (real dimensions: 800 x 565)" width="640" /></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; text-align: left;"><span style="font-family: candara;">Filename::PC.Tools.Registry.Mechanic.v11.0.1.716.Serial.FahimAdib.Doridro.com.rar</span></div><span style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;"><div style="color: #333333; font-family: candara; font-size: 13px; line-height: 15px; text-align: left;">Format::RAR</div><div style="color: #333333; font-family: candara; font-size: 13px; line-height: 15px; text-align: left;">Size::17 MB</div><div style="text-align: left;"><span style="color: #333333; font-family: candara; font-size: x-small;"><span style="line-height: 15px;"><br />
</span></span></div></span></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><div style="text-align: left;"><img alt="Image" class="" id="test" src="http://img.doridro.com/files/36721.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="text-align: left;"><a class="postlink" href="http://www.mediafire.com/?zdvpo23si9gw52m" rel="nofollow" style="border-bottom-color: rgb(102, 102, 102); border-bottom-style: dotted; border-bottom-width: 1px; color: #5d8fbd; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">http://www.mediafire.com/?zdvpo23si9gw52m</a></div></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><div style="text-align: left;"><img alt="Image" class="" id="test" src="http://img.doridro.com/files/36720.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="text-align: left;"><a class="postlink" href="http://jumbofiles.com/d2gcane2aaow" rel="nofollow" style="border-bottom-color: rgb(102, 102, 102); border-bottom-style: dotted; border-bottom-width: 1px; color: #5d8fbd; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">http://jumbofiles.com/d2gcane2aaow</a></div></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><div style="text-align: left;"><img alt="Image" class="" id="test" src="http://img.doridro.com/files/36722.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="text-align: left;"><a class="postlink" href="http://uploadorb.com/m62ss6g3hzl3" rel="nofollow" style="border-bottom-color: rgb(102, 102, 102); border-bottom-style: dotted; border-bottom-width: 1px; color: #5d8fbd; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">http://uploadorb.com/m62ss6g3hzl3</a></div></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><span style="background-color: #f8f7f7; color: red; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><div style="text-align: left;"><span style="font-size: 14px;">Operating systems</span></div></span><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px;"><br />
</span></div><div style="text-align: left;"><img alt="Image" class="" id="test" src="http://img.doridro.com/files/35716.jpg" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></div><br />
<br />
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0tag:blogger.com,1999:blog-5882192688106799176.post-5195812289036877432012-04-22T01:03:00.000-07:002012-04-22T01:03:16.436-07:00WiFi Hacking/Cracking Tool Collection<div dir="ltr" style="text-align: left;" trbidi="on"><img alt="Image" class="" id="test" src="http://resources.dientutieudung.vn/b41c587e120d1bb7ee75a7629cc82f2e/2009/10/21/wifi-logo.jpg" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;" /><br />
<br />
<div style="text-align: center;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">The pack contains the MOST updated and licensed softwares.</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">1. AirCrack 2.1</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">Aircrack-ng is an 802.11 WEP and WPA-PSK keys cracking program that can recover keys once enough data</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">attacks, as well as the all-new PTW attack, thus making the attack much faster compared to other WEP</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">cracking tools. In fact, Aircrack-ng is a set of tools for auditing wireless networks.</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">2. AirSnort 0.2.6</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b,</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">is the weakness described in " Weaknesses in the Key Scheduling Algorithm of RC4 " by Scott Fluhrer, Itsik</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">the first publicly available implementaions of this attack.</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">3. AeroPeek 2.02</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">AiroPeek NX captures and decodes packets, with special emphasis on the 802.11 protocol. AiroPeek NX</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">receives all wireless LAN packets based on user settable configuration parameters and stores these packets</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">in memory. For example, you can set a filter to capture all packets, only 802.11 authentication request</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><div style="text-align: left;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;">frames, or all frames except beacons frames. Just about any combination of packet types and protocols are</span></span></div><div style="text-align: center;"><br />
</div><br />
<br />
<div style="text-align: center;"><span style="color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif;"><span style="font-size: 12px; line-height: 16px;"><br />
</span></span></div><img alt="Image" class="" id="test" src="http://img.doridro.com/files/36277.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;" /><br />
<br />
<span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><span style="font-family: candara; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Filename::WiFi.Attacker.AIO.FahimAdib.Doridro.com.rar<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />Format::RAR<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" />Size::34 mB<br style="margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;" /></span></span><br />
<img alt="Image" class="" id="test" src="http://img.doridro.com/files/36721.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;" /><br />
<br />
<span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a class="postlink" href="http://www.mediafire.com/?f6y9zm5t2pwwm3g" rel="nofollow" style="border-bottom-color: rgb(102, 102, 102); border-bottom-style: dotted; border-bottom-width: 1px; color: #5d8fbd; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">http://www.mediafire.com/?f6y9zm5t2pwwm3g</a></span><br />
<br />
<img alt="Image" class="" id="test" src="http://img.doridro.com/files/36720.png" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;" /><br />
<br />
<span style="background-color: #f8f7f7; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><a class="postlink" href="http://jumbofiles.com/ltgefq09y9d0" rel="nofollow" style="border-bottom-color: rgb(102, 102, 102); border-bottom-style: dotted; border-bottom-width: 1px; color: #5d8fbd; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-decoration: none;">http://jumbofiles.com/ltgefq09y9d0</a></span><br />
<br />
<span style="background-color: #f8f7f7; color: red; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;"><span style="font-size: 14px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px;">Operating systems</span></span><br />
<br />
<img alt="Image" class="" id="test" src="http://img.doridro.com/files/35716.jpg" style="background-color: #f8f7f7; border-bottom-width: 0px; border-left-width: 0px; border-right-width: 0px; border-top-width: 0px; color: #333333; font-family: 'Lucida Grande', 'Trebuchet MS', Verdana, Helvetica, Arial, sans-serif; font-size: 12px; line-height: 16px; margin-bottom: 0px; margin-left: 0px; margin-right: 0px; margin-top: 0px; padding-bottom: 0px; padding-left: 0px; padding-right: 0px; padding-top: 0px; text-align: center;" /> </div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com5tag:blogger.com,1999:blog-5882192688106799176.post-54556967083450411442012-04-20T01:49:00.000-07:002012-04-20T01:49:56.883-07:00Hide Your Prohibited Data on a Image<div dir="ltr" style="text-align: left;" trbidi="on">Here comes the most secure method (according to me cuz its AWESOME) to hide your data from stranger or someone you don’t want to show. Its just amazing, no one will imagine that the data they want to access is in front of them but they just get the picture.<br />
<br />
Like This One:<br />
<img src="http://images2.fanpop.com/image/photos/14300000/I-m-a-girl-too-justin-bieber-14342507-400-298.jpg" /> <br />
<br />
<br />
The Method is really Simple and easy. Just follow the Easy Steps.<br />
<br />
(1) Create a New Folder. Name it as you like.<br />
(2) Create a zip/rar/zip file ( Which you want to hide)<br />
(3) Select a picture in which You want to hide your data.<br />
(4) Copy these zip and picture into the New Folder you created.<br />
(5) Go to “start”. type Cmd. ( run Command Prompt )<br />
(6) Go to that directory where you create a New Folder.<br />
<br />
For Example i created a New Folder in c:\.<br />
<br />
c:\>cd new folder<br />
<br />
next command look like.<br />
<br />
c:\>NEWFOLDER><br />
<br />
Now Type the following command.<br />
<br />
copy /b picture.jpg + data.zip new image.jpg<br />
<br />
Here picture. jpg is your image name, data.zip is your zip folder name of data, new image.jpg is that name you want to give to the picture that will hide your data.<br />
<br />
E.g<br />
copy /b Zeeshi.jpg + Hide.zip Zeeshi1.jpg<br />
<br />
</div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com1tag:blogger.com,1999:blog-5882192688106799176.post-79612574983334346282012-04-19T23:04:00.000-07:002012-04-19T23:04:32.000-07:00Shrink Your File sizes using Fileminimizer Suite<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="3ec720b68217cdd141e012f.jpg" border="0" class="aligncenter" src="http://img820.imageshack.us/img820/3333/3ec720b68217cdd141e012f.jpg" title="3ec720b68217cdd141e012f.jpg" /> </div><br />
<br />
FILEminimizer Suite compresses PowerPoint, Word, Excel and image files by up to 98% without zipping. The software sports an intuitive interface and lets you optimize the size of your Office files (97-2010) as well as your JPG, TIF, BMP, GIF, EMF and PNG image files without changing the native file format or quality. It integrates into Microsoft Office and into your email program (supports Microsoft Outlook and Lotus Notes clients) and can optimize your office and image attachments directly before sending. You can easily bypass email size limitations and won’t clog up your recipient’s inbox. It relieves Microsoft Exchange and Lotus Domino email servers.<br />
<br />
<br />
<br />
<br />
<br />
<div style="font-family: Verdana,sans-serif;"><b>Features:</b></div>» Office file compression by up to 98% – a 50MB document is compressed to 1MB in size<br />
» Compresses all new Office 2007 formats (PowerPoint 2007, Word 2007, Excel 2007)<br />
» Compresses all Office formats (PowerPoint 97 to 2003, Word 97 to 2003, Excel 97 to 2003)<br />
» Compresses pictures and embedded objects and shrinks the size of Office files<br />
» Keeps the original file format – simply edit, view and change it without the need to unzip<br />
» Compresses StarOffice and OpenOffice files provided they are saved in a Microsoft format<br />
» Compact edition runs directly from CD or USB flash drive – no installation required<br />
» Integrated search function finds all optimizable files on the PC<br />
» “Drag & Drop” files directly into FILEminimizer to optimize several files at once (batch processing)<br />
» Add-ins for Microsoft Outlook, PowerPoint, Word, Excel and Windows Explorer<br />
» Fully compatible with Windows Vista and Seven<br />
<br />
Install notes:<br />
Install<br />
Use incl. serial to register<br />
<br />
Screenshot:<br />
<img alt="przechwytywanieq.jpg" border="0" height="243" src="http://img231.imageshack.us/img231/8467/przechwytywanieq.jpg" title="przechwytywanieq.jpg" width="400" /> <br />
<br />
<a href="http://www.mediafire.com/?wi38nbx8vblrj7r" target="_blank"><b style="font-family: Verdana,sans-serif;">Download it Now!</b></a></div><div class="blogger-post-footer">© <a href="http://www.twitter.com/smn_ysr">Samin Yasar</a></div>Anonymoushttp://www.blogger.com/profile/18081137558769831181noreply@blogger.com0