tag:blogger.com,1999:blog-20063377530220368792024-03-13T16:44:23.836+05:30Hackers Paradisejus moved to http://www.funandroid.inAadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.comBlogger446125tag:blogger.com,1999:blog-2006337753022036879.post-46141252315380670342011-07-03T13:10:00.000+05:302011-07-03T13:10:18.325+05:30Real Hide IP v4.1.2.2 + Crack<div dir="ltr" style="text-align: left;" trbidi="on">
<hr />
<img alt="Image" border="0" height="300" src="http://img850.imageshack.us/img850/2923/realhideip1900331265012.jpg" title="Image" width="400" />
<br />
<br />
<br />
Are you aware that your IP address is exposed every time you visit a
website? Do you know that many websites and hackers use your IP address
to monitor your home address and other personal information?
<br />
<br />
Real Hide IP allows you to surf anonymously, keep your IP address
hidden, protect your personal information against hackers and provide
full encryption of your online activity, all with a simple click of a
button.
<br />
<br />
<ul>Hide Your Real IP Address
<br />
Be assigned fake IP addresses from different countries to conceal your real IP.
<br />
Anonymous Web Surfing
<br />
Surf anonymously with fake IP, whenever you want to.
<br />
Protect Your Identity Against Hackers
<br />
Protect you from hackers and identity thieves who will be tricked by your fake IP.
<br />
Un-ban Yourself from Forums or Restricted Websites
<br />
Real Hide IP allows you to access any forums, blogs or websites that have ever banned you.
<br />
Prevent Websites from Tracking Your Online Activities
<br />
Hide your real IP when you are surfing the Internet to prevent you from being tracked by websites</ul>
<table align="center" border="0" cellpadding="3" cellspacing="1">
<tbody>
<tr>
<td><span class="genmed"><strong></strong></span></td>
</tr>
<tr>
<td class="code"><br /></td></tr>
</tbody></table>
<br />
Download:
<br />
<table align="center" border="0" cellpadding="3" cellspacing="1">
<tbody>
<tr>
<td><span class="genmed"><strong>Code:</strong></span></td>
</tr>
<tr>
<td class="code"><a href="http://www.filesonic.com/file/1289427401">http://www.filesonic.com/file/1289427401</a></td></tr>
</tbody></table>
<br />
<br />
No Password-Clean File-100% working</div>
Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-12384260316842095192011-06-22T16:11:00.001+05:302011-06-22T16:12:40.410+05:30moved to funandroid.in<div dir="ltr" style="text-align: left;" trbidi="on"><div style="font-family: "Trebuchet MS",sans-serif;"><span style="font-size: x-large;"><b>folks just got moved to <a href="http://www.funandroid.in/">www.funandroid.in</a></b></span></div></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-85478212123191049712011-06-22T15:31:00.000+05:302011-06-22T15:31:52.147+05:30Real Hide IP - Hide Your IP to Protect Your Privacy<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Are you aware that your IP address is exposed every time you visit a website? Do you know that many websites and hackers use your IP address to monitor your home address and other personal information?<br />
<strong>Real Hide IP</strong> allows you to <strong>surf anonymously</strong>, keep your IP address hidden, protect your personal information against hackers and provide full encryption of your online activity, all with a simple click of a button.<br />
<br />
<em><strong></strong></em><br />
<em><strong>buy at http://www.real-hide-ip.com/</strong></em><br />
<br />
<em><strong>or</strong></em><br />
<em><strong><br />
</strong></em><br />
<b style="font-family: "Trebuchet MS",sans-serif;"> download</b> <a href="http://www.mediafire.com/?meev75rx4c8vwiv">Real Hide IP + crack</a><br />
<br />
virus free<br />
tested<br />
100% works</div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-42163138492411743282011-06-20T13:00:00.001+05:302011-06-20T13:09:37.730+05:30FULL TUTORIAL SpyNet 2.7<div dir="ltr" style="text-align: left;" trbidi="on"><br />
<span style="font-weight: bold;">!</span> <span style="font-weight: bold;">I can not be responsible for possible damage after using this software!</span> <br />
<br />
<br />
<span id="goog_1937472311"></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="http://draft.blogger.com/goog_1937472314"><img alt="data:image/jpg;base64,/9j/4AAQSkZJRgABAQAAAQABAAD/2wCEAAkGBhMSDxUSEBIVFBIWFxkXGBcWFhYUExgcFRQYFxgXGBsYGyYfFxwmGRQVHy8gJCcpLSwsFx4xNTAqNSYrLCkBCQoKDgwOFw8PGi4lHh81MDIsNTUqLCk1NTUsNS0tLDU1KiwwNTQ1MDUsLC0pMikwNS8xNCwwKiwsLS0uNCwqKf/AABEIAJ8BPgMBIgACEQEDEQH/xAAcAAEAAgIDAQAAAAAAAAAAAAAABgcEBQECAwj/xABHEAABAwIDBQUEBgUKBwEAAAABAAIDBBEFEiEGBxMxQSJRYXGBIzKRoRRCUrGywRUzcqLRJENTYmNzgsLw8SU0NYOSs+EX/8QAGQEBAAMBAQAAAAAAAAAAAAAAAAMEBQIB/8QAMBEBAAIBAQQHBgcAAAAAAAAAAAECAxEEEiExIjJBUWGBkRMUcaGx0QUjJENSouH/2gAMAwEAAhEDEQA/AKNW1xrZaqpGxvqYXMZK0PjfoWODmhws5pIvYi7eY7lqlIKvb2ulpG0ck5dTtYGBhaw9lhBaL2vcWFnc7aXsgj6KeYdV4HBQBz4JqutcO0yUvhjY7KfcMTgC3NbmSSO46KCFBwiIgIiICIiAiIgIiICIiAiIgIizcTweancGzxuYXNDmk2LXNcAQ5jhdrxYjUEoMJEXJFuaDhERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEXrT0r5HZY2lzj0aCT8lKsJ3Y1c2paGD1c74N0+aCIKaVu37KjB4qCphdJLBm4U2cBzRcZNSCcobdhb1GXUFoW2bueLR7ScA+JjZ97ivGfdR9iXN5Ojd9xCDL2R3kYZR04b+jC2oAI47XRyy3I0eDM05TfpYjTryUO222tfiVa+qe0MzBrWsBLg1rRYC5tfqToNSdFlV+7+ePkQf2gWfxHzWhrcNliNpWOb3EjQ+R5FBioiICIiAiIgIiICIiAiIgIiICIiAiIgIiICIiAiIgIiICIiAiIgIiICkGzOyMlU4E3bH83d9r8h4leOzWBGokuR2AQP2j9n8z/9V3bKbNtcwFw9jyty4pGmvdEOVvrW7uZ7EasbZnZaOJgEEbSOsjr8Mkd31pj43DfFSCWg0s97neBOVnoxlh8brYVta2MWHO3Llb+A8FGMSxQnr6dFxrM8k+7SnX4z3O9W2Nul2t8srVoq10Z5SfNq02PbRxwjtu7R5NGrj6dB4lQXEdqZZCcnYb4au+P8F5uz3u4z44/bj1lPKmpmjF45bj7LvdPxuFhQbVwF3CqmNZm0Nxmhd5jXL5i48lXsdfIDcPdfxN/vW1psSZMMkoAPTuPl9kqOZvTjPGFvHi2XaejWdy/ZrxifPml2PbrOLC6pwy78ozPp75nW+1Cfrj+rqe4nkq1IU72R2slwuobmcXUxPmWX52/NvXzUo3u7CRzQfpegAyuAdO1mrTmt7Ztu+4zeYd9pTVtFo1hn5sN8N5peNJhTaIi6QiIiAiIgIiICIiAiIgIiICIiAiIgtnYvdzSw0QxDFBmDmOlZFrkaxrS4PeGkF7nBvZZcCx1PRYM232Eyu4TsJZHDcjiNEfFsToSGNaQQO53xVm0ZnmwpzhG2emnha1ovciOxBGVtjyNtDcFqqDHN18zBxKQ8VnPISBKPAdJPSx8EEl2p2CoqfBJquk9s2UxOZKSHhg4rW5WGwc2+Ygh2txY3tdRbYOrw9746aqoBLI4u9txpRfQuaDG1zR0tcO9LrEo9q3RYVVYbM2S75GOjBAAjIcDIHX1bfI3QDne6wth/+owftn8LkFx1Gx2D/RTOzDwLB5cDJOSDGzO4NHFAd01JF7jxtqNnsEwLEYZXRU5idEAS3iysmsdM4DpHMcL6WBPzAUlkeDhkwHPLU/8AoYqw3OYK+orJsujGwHM46NF5I8oJ8cpP+EoMXaTYf6GGVbGPmoxK1rmvu0875S9oF2uAIzAAju5XsLYLZrB8Tp3SsoGh7Dlki405kZfVpB4gD2kA62bqDpotrvMkkh2fdHKGcIsjY2/6wv4oc3KP2RfyYVUG7HbE4diLJXH2D/ZzDpkcfe82mzvQjqgsXeTsTQ4fRfSIsMa4OeGXE8wMeYOyuf2nA3IAsLWJ5qkYHgOBc3M0EEtuRcA6i41F+S+ycXoIaqnkppu1HMyxt3O5Oae8GxB7wF8uQ7v5zixw5+jmPOd9uyIx2jL5FhBA6lwHMoJ5g2G4RLhr6+fDWwRNz2vNPI55aQ1oZaRuYucS0XAALT5qrcXmiqKr+R03AY4hrIs7pTcmw7TuZJIUu3r7QMzx4bS9mnpOyQDcGQDKRfrkFxfq50h6rX7p8JE+JsJ92Fj5j5sbZv77mn0QTXZnZsNeynHJos9w52Gsrh4kkNH7Q7lZFTUiKMBoA0sAOQAFgB4AKObNMs6R55khvoBnPzc34LnGcRu468tFxPGdFinQpN+3lDxr6/nqoDtRtaGExQuBk+s7mGeHi77vku22e1BhbkjPtX9fsj7Xn0HqeirhoLjbmSu1dnOpw9xLpLuOpJNyfVecuGOHLUeGqzsT2SqqeJk00RZG/wB0nS/xWDFHKBdoNvDX5BR0y0vGtZiYezEwxXRkcwullmOrcw7Q9VjyN7lI8bfDKoSsMUmpt6kfxCtbcbtDfjYVU2e3K50YdqHMdpJH5drNbuc/uVJ082R4cOh/3+Sl2F4l9FxGkqmmwbI0OPexxs74sc5Vo/LyaRys2rT73sc3t18WnnE8vSWn222e+g4hPTC5Yx5yE8yx2rPWxsfEFSDd1V4ZI+OkrqIOke4gVBkmIu73GOjY5uUX0zAnppzK2G/Wn/l4k6kFpP7w/E5QXZt1q2A90rPxBWWKvuo3aYXJT5o6DJm04gklOUEaOaHSXubttmaOdyFRW1WzMtDUugl16sfawe08nDu7iOhBC+hdl94EbsRnwqoytIcDA7kH5mB7mH+tmJIPXlzAvj7yNhW1kXCAAmbd0D7dbDMHHuOl/Q9EFcbvH4XVuZSzYc0TCMe0MszhK4FoNw17eHe5P1vTktXtLjWFx1fDp8MBjhe9ryZ5W8Wwcy4aS4sGazhcn3RyuV5btKV8WMxxyNLXtcWuaeYIcLhRTFD7eX+8f+IoLn2SwjBqyON7sNycQEACWd1nNe5uW/FFwQL5rDyWs2pZg1FK2OXD9XtzjJxni2ZzRcuqm69nuWRupdanp7/0rvxuUd3vwOkxCnYwFznwtDWjUkmV4AA77oJHslFgFfUCnjomxyOHZEz52Fzh0blmcDpyF7lQTaPCII8bNOyPLBxomlmZxsHBmYXJvzLuvVe23uFjD6ymbBZkkcEbi5n9Ix7gX+Ju3n1stvj2zzpYYcajq4Z5ntbNPC4ticHRZBIG62dY5QW6O1uL3QbzaiDAaINZNRXqHNa/hxOnfkBv+sLp2gEixAGo69Cdhsvs3g1XG130C2dpcz2k7Scua4cBK4NsG3vc9fC9P4nVTV1VLPw3Pe92Yhgc/KOQHU2AAA8lcG7QhsNLm/o5b+BDJrhBoNoHYLR1PBmw9xNg7sult2hp2jUX/d+K67xdmsOZhcNZh8TQJXNs9r5TpZ2ZpbI42IcLW6W6300O94f8TP8AdR/cVohtM/8ARxoC0FnGEwdc3acpaWgcrG90GmREQEREFj7F7yavB70lVE/gGzwxwyyx5xmzR3tcG98ptr1BvexcLxinxA3heHF3N0fZkBJ/nIz73LmQCejlCN5+A8engq4gTIwOikaAbuaHGRjm95aHuBHOwB6G1ZUNdJDI2WF7o5Gm7XNJDh6hBe+1G6d9VBO5xHHiaXQuDTeTKL5CT0IBFjctPhe9P7B/9Sg/aP4HK9G7W1DsNNTWOEJiihmNhZxLozdpaeRecthpz7rqidi3E4lAQNTJyHiCgvLDKtsdJJxIxJGTUF+nbDGwsJa2+ljYi/PXpzURpd8lBTR5KTDnNZoTHmjijc4X7Ty1rnu5jm48lI2h5w+qsx1mx1LibaWdGAD5HI7XwK+e0En223g1WJyNdUENjZ7kTLiNt+upu51up9LKMIiC/N1237ZcM4U77T0lmtJDncSIg5AcvUBpb/hatht/tM2kgmrYowKl7Y4I5AO0A4Oe3OT1aS59gCCQzU5dKu3Y3tVWBPZZ8faWH5KZ74IXnCmvykMM8Qv4iFwPlqCPRBSTnEm5NyeZPNWfuGivVVff9FNvWViq9WPuKxER4m9jjYSwOaPNrmP+5rkFh0MmRzm/1nH8P5KM4xigaHucdBcn0Uj2mZwahh6SNI9W9k/5fiqt23riAYx9Z3yGv5tUcdeVq0a4Kz3TP0hFMQrXTSukdzcfgOg9BoszCZGt7XN4NxyHLxJWrWZQVLWu7QuPgR4g9F7eu9GitE6SmW2G2lViEUUXDDGxttlYS7MdBc38By8Smy+HyRRGaZr2WBOawOUfVLhz1Phayx8JxlrDcPjdYWAeLWvzvbmfRSeLeWQAOFStZYMtdx0BJ1ykki5PRY2XFnpj9jhxxp8fus1tTnaWnxjYdv0M1D3ZJSM9ybh1xe50FrjVV4+OxsVP9ptrop4g3NnI5Ma0xwM8m83nz0HcoHPLc3V/YsealJ9tPGfl4Ick1mei8it5if8AykZ69j8JWjAvoFJsRpr/AEenHNz2t+Fm/wCZSZZ6dIa34fX9NtN55aRHnM8Em3vyZwx3W8fzjddQPZtt62Af2rPxBSzefVglrf63yY0N/wAyiWzt/pkGUXdxYwAOZJeLBWWK3m8qQsxmdzCWuDo3Ag2IPDYQQRyN1dW7zbVmM0JhmcG1sQGYA2LwLASt8CdHDv8AAhUjvOJ/S1RfvYR4gxMLSPAixWlwPHJqOoZUU7yyRhuD0Pe1w6tI0IQX7Psu0YnDO6wqGmxs3KHtvfXr2ANHdQbdBb5+xf8A5iX+8f8AjK+mMH2sjxXDxVQWZPHlbMz6zed235lhvmB627wV8x1rryvPe5x+Ligtvdm7+TUvhMfL9Y86+FluMY3jR0VZA2op2lz2AuqA1nFjaXPZZjQ2wbpm0PU6ErRbrQ76NCbXHHd6AC5NudgTqel1pN9lC+LEIg/rTstoQPfffmAg676w0YiwMdnZwGlrr3u1z3uab/skKALdRx1WJTQxRRGSRsbIWhgPus0DnG+nPVxsFtd4OHtpW0tGw5jDG5z3WsHSSOu4i+uXsgDwA8UHfCd6tXS0IpKZkMNv56NhZOeeriHZXmxIu4Hp1F1M9g5S6mpjzOWe55kkxzEk95JJKplXNu2jd9FprNvcTd3VsjQT3AuIFzpdBC97Ml8UeO5kY/cv+ahqme92mdHi8rXixyx+P823uUMQEREBERBNanerUkRxxsjbBHY8IjOHOt2nl2jrk30BA9dVkRbyoBIJXYZTmUdbR2vb3tYi699efRQJEEj2s28qcQNpiGxBxcImXDMx0zG5Je62l3E6aCwXOzm2po2t4dJTPkaXe1ex5lIeCC0uDxYWJ5WPio2iCw//ANoqLBoo6QNa3IAGztAaRYt0mF2nuKh2N4wKh7XNp4YLCxELXNDje+ZwLjr5WWtRAXpTy5XtcWtdlIOV1y11jezrEaHkV5ognNHvSMQtFh1CxuZr8rWShuZl8rtJdSL9b26db+9dvhlma5stFSPa8guBExa4jqWmW1+l7fcLV+iDNxjERPMZGwxQA29nCHNjFhbQOJPzXbA8UNPUxzN5scD5jk4erSQsBEH0Ni84xDDDJEbzQ+1FubgG9sDzZZ48Wqntq38bJM3o2zvDX/XyW73cbXOheGZtW8vFo/MfcvbbbBGwyGrphmpJv1kY14Lj3f2ZubHp7p5C8d4nrRzhd2W9OliydW3b3T2T9/BXV0zLPrcNsM8XajOumpC166raLRrCDNgvhtu3j7T4xLsHlc8Uroi6QuxkK4uuFscPwxr2Fz3EC9gBa/Tv8wubXisaynwbPfPfcxxx9Hts9QZ5M591mvmeg/NSTZiDj1j6o/qoBZvcXHlb4k/BYVDQyzubRUrLO14j9QxjeriegI1PnZb3Hq6KhpWwU5va4aer3n3pD4D+AUGOs3vOS3k1dty02fZ67HinWed58e74R9UQ2wxDi1JANwzs+t7u+Zt6LnZ/ax1GQ6KCndI0kiSRjnSdptrAh4AtzBAB8Vo3OubnmuFZYaQ41tkaltpKWlacuUPYyQPaBa1iZDyAsAbgdyjyIg3myO1s2H1HGh1DmlkkZJySNPR1viD0IWtpK0MmEjo2SC5OSQOLDe/PKQeveOSxUQTbDd69RAGiGmpGZWuY20T+y1zi4tHtO88+fiux3s1BN3UtE42sM8LngAdwdIQFB0QT2PfHVtvkgpWAgAtYyVjNDcdlsoaDcDUC6iePY26qm4r2MYbAZYw4MFiT9ZzjzJ6rXIgy8NrhFJnMUcwsRklDizXr2XNN/VS6i3t1MTcsdPSAZBH+qf7jeTf1lgPL81BkQSXHNuX1d+NS0xdkyB4bLnaALCxMp5AaXuPBRpEQEREBERAREQERctdY3CDvNA5ji17S1w0IcCCPMHULzUy213jHE2N49LC2ZoaOM24k0vmHi06aG+WxtzWVWbE4fT0PGnxNks72EsjpckgzWGVj7uDhqTcloADT1sCEDREQEREBERB3ilLXBzTYg3BHMKf7NbWiRvCktmIsWm2V1+eW+hv1af8AavVyCgnWIbKvYTLQm7TqYjy9L6j1+Kj1SyMutNG6GTysPu/Je2FbYyxWD7vA63s8evX1Uto9t6aVuWZsbx9mZgB+PJR2xxM68pXMW2XpXcnS1e6Y1j/PLRBv0Qw+5M0+f+6DBR1mYB/rxVjspMIk1dRD/tTlo+ANl7jD8EZr+j3O/vKp4b8nLzcv/L5Qk942btw/2sreOGnYeZld0A1v6DT5qYYRsJVzWmqAMPpftyj2zx3RxHUm3LQDxK3J3hUlIP5HBSUx+1EwSzf+Zufiobju8aWZxLS4uP15Dmd6N5D5ryMMa624urfiOTd3MURSPDhPrz+aU4zj9LQwGGlaWsdqS43qKh32pHdB4cgqvxHEXzyF7zqeQ6AdAPBeM87nuLnuLnHmSbleamZ0zMzrIiIjwREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREFgYnsfTVGDxYjRXZMwFlRCT2LxMGeRhN8ptZ+UnUONgCLHI2O3KzVsH0l9REyKxOWMiom0F7ZWOytcRbsl19dQFXF1y2QjkSPI2QSHb3AKejrDBSzmdrWNL3HLo83LmdgkaC1+43HRRxEQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQEREBERAREQf/9k=" src="data:image/jpg;base64,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" style="margin-left: auto; margin-right: auto;" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://ultimate-hacker.blogspot.com/">ultimate-hacker.blogspot.com</a></td></tr>
</tbody></table><span id="goog_1937472312"></span><a href="http://draft.blogger.com/"><span id="goog_1937472294"><span id="goog_1937472298"></span><span id="goog_1937472302"></span><span id="goog_1937472306"></span></span><span id="goog_1937472307"></span><span id="goog_1937472303"></span></a><span id="goog_1937472299"></span><span id="goog_1937472295"></span><br />
Hello, First of all, disable your antivirus software because it is naturally considered a TROJAN.Une extracted once I advise you to configure your antivirus to ignore the issue of its Net_RAT_v26 Spt-SCAN if you are good to re- extract. RAR because the virus will delete the SpyNet.exe (the application). First, download the software SpyNet 2.6 to the address below and extract it on your desktop: <br />
<br />
<span id="goog_1937472288"></span><a href="http://draft.blogger.com/goog_1937472287"><br />
</a><br />
<div style="text-align: center;"><a href="http://draft.blogger.com/goog_1937472287"> </a><a class="postlink" href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=4216313849241174328&from=pencil" target="_blank">Here is the file </a><a href="http://www.ultimate-hacker.blogspot.com/">SpyNet RAT 2.6</a><a href="http://draft.blogger.com/"> </a><br />
<a href="http://draft.blogger.com/goog_1937472252"> </a><span style="font-size: 18px; line-height: normal;"><span style="font-weight: bold;"><a href="http://draft.blogger.com/"><span id="goog_1937472241"></span></a><span id="goog_1937472254"></span></span></span></div>Once extracted to your desktop, you will see its contents: File-Save (the three languages available for the software) <br />
Record-profile (or find the profiles of "Servers" you will create. For info, you have already created two basic but better to create one as explained below). <br />
<br />
Record-Settings.ini (Files software settings, DO NOT TOUCH THIS TIME) <br />
<br />
-Sound.wav (audio file used by Spynet when one of your client connects) <br />
<br />
-SpyNet.exe (executable Spynet) <br />
<br />
<br />
Open a web page and log in here: http://www.no-ip.com/Ce site allows you to create a DNS that will be clean. This is because many, your box / router (Livebox, Freebox etc ...) Change of IP every 24 hours, and thanks to this website (NOIP) you can create a dns that will always be the same despite your ip changes. eg votrenom.no-ip.biz.Pour short, the DNS allows, when you want to connect to a client after the server is installed on his pc, to bring back the information to your pc.CREATION ACCOUNT NOIP: Look at this tutorial well done to download the software, then create your account NOIP and configure it on your pc. <br />
<br />
<br />
<div style="text-align: center;"> <a class="postlink" href="http://www.youtube.com/watch?v=Nh7K9wgT22g%20" target="_blank"><span style="font-size: 18px; line-height: normal;"><span style="font-weight: bold;">http://www.youtube.com/watch?v=Nh7K9wgT22g</span></span></a> </div>LAUNCH SPYNET.EXE: <br />
<br />
- Run, having many disabled your antivirus before (because Spynet is seen as a Trojan by antivirus). <br />
- The software starts. Make start (top left), note that the software is in Spanish. <br />
- To put it in ENGLISH, follow the procedure to the letter: <br />
<br />
<br />
* Close the program, go to the folder RAT Spy-Net 2.6 Can Settings.ini in the folder, and the line: languages, replace default.ini with the full path of the file in the folder English.ini Spt-Net_RAT_v26. <br />
<br />
<br />
ex: C: \ Documents and Settings \ NAME OF YOUR SESSION \ Path where you placed your file Spy-Net Rat 2.6 \ Spy-Net 2.6 RAT \ language \ English.ini <br />
<br />
<br />
example: C: \ Documents and Settings \ Manu session \ Desktop \ Spy-Net Rat 2.6 \ Spy-Net 2.6 RAT \ language \ English.ini <br />
<br />
<br />
* Restart Spynet.exe, it should be in English now. (If not, check that you did not make a mistake in the line to edit). <br />
<br />
<br />
- Please, Select Options and Listening Ports. <br />
-Enter the ports 80, 81, 82, 83 and SAVE do. <br />
<br />
<br />
-Make: File, Create Server, and then NEW <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<span id="goog_1937472284"></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="http://draft.blogger.com/goog_1937472278"><img border="0" id=":current_picnik_image" src="http://img11.hostingpics.net/pics/626629first.jpg" style="margin-left: auto; margin-right: auto;" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;"><a href="http://www.ultimate-hacker.blogspot.com/">www.ultimate-hacker.blogspot.co<span id="goog_1937472274"></span><span id="goog_1937472275"></span>m</a><span id="goog_1937472280"></span><span id="goog_1937472281"></span></td></tr>
</tbody></table><span id="goog_1937472285"></span><br />
<div style="text-align: center;"><span id="goog_1937472267"></span><span id="goog_1937472268"></span><br />
<br />
<br />
<br />
</div>-Give it a name: eg "Server" and then select the OK and make-Forward (bottom right) .- Make "Add" and then add the following line: <br />
* Votrenom.no-ip.biz: 80 ok and then do the same for the ports 81,82,83. <br />
<br />
<br />
eg jojo.no-ip.biz: 80 <br />
jojo.no-ip.biz: 81 <br />
jojo.no-ip.biz: 82 <br />
jojo.no-ip.biz: 83 <br />
<br />
<br />
<br />
<br />
<br />
<br />
<div style="text-align: center;"><a href="http://www.ultimate-hacker.blogspot.com/"><img border="0" src="http://img11.hostingpics.net/pics/5585362nd.jpg" /></a><br />
<br />
<br />
<br />
</div>do not touch anything else on this page .- go to the tab: INSTALLATION, then check the following boxes: <br />
<br />
<br />
<br />
<br />
<br />
<br />
<div style="text-align: center;"><a href="http://www.ultimate-hacker.blogspot.com/"><img border="0" src="http://img11.hostingpics.net/pics/5204303rd.jpg" /> http://www.ultimate-hacker.blogspot.com/</a><br />
<br />
<br />
<br />
</div>Install server system * * * * HKEY_CURRENT_USER * HKEY_LOCAL_MACHINE ActiveSetup (and repeatedly press Random) * In the "Directory" can be written "Install" (which is the folder will be installed on the sever SpyNet your pc client). Feel free to note another folder name). <br />
* In the "File Name", note what you want! eg "explorer.exe" (this is the name under which processes will be installed SPYNET.EXE. <br />
* No injection (if you do not want the injection to a process already exists) <br />
* Persistence <br />
<br />
<br />
- Create Server tab, check: <br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<div style="text-align: center;"><a href="http://www.ultimate-hacker.blogspot.com/"><img border="0" src="http://img11.hostingpics.net/pics/6442824eme.jpg" /></a><br />
<br />
<br />
<br />
</div>* * Use USB Icon Spreader (for the move to USB Spynet.exe on other items just by plugging ).__________________ OPTION: If you check "Bind Files" that can attach your server to SpyNet another program and it starts quietly and tutorials are available on youtube for that. <br />
__________________ <br />
<br />
<br />
* Make "Create server". <br />
<br />
<br />
Here is your server is now created. <br />
<br />
<br />
This does not mean that everything works. <br />
<br />
<br />
___________________ <br />
IMPORTANT <br />
___________________ <br />
<br />
<br />
We must now open your ports on your box (Livebox, Freebox etc ...) <br />
<br />
<br />
Above all, depending on whether you connect to your box by Ethernet or WiFi, I advise you to put a fixed IP on your network card. <br />
<br />
<br />
eg if your box has the IP: 192.168.1.1 <br />
return to your network card the following values:<br />
<br />
<div style="text-align: center;"><br />
</div>ip address: subnet 192.168.1.26 mask : 255.255.255.0 pass: 192.168.1.1DNS Primary: 192.168.1.1 <br />
In your box now going to open ports 80 and 83 in TCP and UDP to the fixed IP address for your network card (192.168.1.26). <span style="color: #9196a0;"><span style="font-size: 16px; line-height: normal;"><span style="font-family: Verdana,Arial,Helvetica,sansserif;"></span></span></span> ie open port 80 to 83 in TCP / UDP to 192.168.1.26. <br />
If you do not have fixed IP to your network card, your box will know how to bring that information to your client? <br />
this is what it is to set a fixed IP. <br />
<br />
COMPLETION <br />
___________________ <br />
It only remains for you to send your server SpyNet who you want: @ your MSN contacts etc ... <br />
<br />
<br />
I created this tutorial to help, but having slaved myself to set it up to the end, so I share my knowledge. <br />
<br />
<br />
<span style="background-color: #e6ecf9;"> Good luck</span></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-12992616263975004932011-02-06T22:22:00.001+05:302011-02-06T22:22:45.040+05:30Blogger app for Android<div><p>After a long time google ha s released a app for blogger.com for android platform. I dont know what took them so long. There are few unofficial blogger apps are apready there in android market like bloggerdroid which is pretty good actually. This official blogger app has very plane design and allows.to create and publish a decent post with less media in it like pics.and videos. </p>
<p>I expect few updates which will increase usability of this app. But overall its nice primary app for blogger to publish important posts on the go.</p>
<p>P.S this poat has been published by official blogger app for android using samsung galaxy 3. </p>
<br/><img src='http://lh4.ggpht.com/__W7qzU1mOpY/TU7R2mEXtdI/AAAAAAAAADE/E1H4bisLv2o/1297011179164.png' /></div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-13040570474957083902010-09-12T23:45:00.000+05:302010-09-12T23:45:10.852+05:30How to uncap Docsis compliant Cable Modems for unbelivable speeds<div style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: large;"><b>The information given below is for educational purpose only. If you’re thinking about uncapping your cable modem, be warned. Your service agreement prohibits uncapping or removing software blocks that limit or “cap” bandwidth. Uncap your cable modem and you will at the very least be banned from your ISP for life. The bottom line is that uncapping is questionable at best and illegal at worst.</b></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">There are usually two network configurations. (1) The PC is directly connected to the cable modem. (2) The PC is connected to a NAT router, whose WAN port is then in turn connected to the cable modem. All of the following steps apply to both cases, except the final one that deals with TFTP. I’ll explain the issues with this later.</span></div><div style="font-family: Verdana,sans-serif;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">Every time the cable modem is powered on, it looks in its configuration file for the address of an TFTP server and for a file name. This file is the Docsis configuration file that, among other things, sets a cap for the modem’s download/upload bandwidth. The cable modem then retrieves that file and connects to the backbone.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">How do we uncap it? Simple. We’ll download the docsis config file, edit it to change the cap parameters, then trick the cable modem in thinking our PC is the TFTP server so it then retrieves our copy of the docsis file.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">There’s a bit of work involved for this. First, we have to find out the TFTP server and file name used by the cable modem. For this we can use the docsisDiag utility (<a href="http://homepage.ntlworld.com/robin.d.h.walker/docsdiag/docsdiag.zip">http://homepage.ntlworld.com/robin.d.h.walker/docsdiag/docsdiag.zip</a>). This application, along with all others, is included in the <a href="http://www.netwide.net/users/CableGuy/CableUnCap.zip">CableUnCap.zip</a> file. Run <b>docsdiag.bat</b>. It uses SNMP to return many of the modem’s parameters. Among these, the one we need are:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">Configuration TFTP Server<span> </span>= 24.56.78.90 (replace this with yours throughout in the doc)</span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">Configuration filename<span> </span>= isrr.bin (replace this with yours throughout in the doc)</span><span></span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span> </span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span>And</span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span> </span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">IP fragments created<span> </span>= 0</span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">IP address.10.xxx.xxx.xxx<span> </span>= 10.xxx.xxx.xxx</span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><h4 style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">IP address.192.168.100.1<span> </span>= 192.168.100.1 <span> </span></span><span style="background: none repeat scroll 0% 0% yellow; font-weight: normal;">(the IP address of the cable modem, (replace this with yours throughout in the doc)</span><span style="background: none repeat scroll 0% 0% yellow;"></span></span></h4><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><span style="background: none repeat scroll 0% 0% yellow;">IP-to-If-index.10.xxx.xxx.xxx<span> </span>= 2</span></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">This application works as is in many cases. If not, please refer to the <b>DocsDiag - DOCSIS cable modem diagnostics.htm</b> file in the same directory. It has a lot of help on how to make it work for different modems.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">Note that you might now go to <a href="http://192.168.100.1/">http://192.168.100.1</a> and see some of you modem’s parameters.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><b> </b></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">Now from a DOS prompt type:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"><b>tftp -i 24.56.78.90 GET isrr.bin</b></span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">You just downloaded the docsis configuration file from your ISP. Now it’s time to edit it to change the modem’s cap. This is done by using the Cisco Docsis configuration software in the docsisConfig directory (also available from <a href="http://www.cisco.com/warp/public/109/docsis_config2.shtml">http://www.cisco.com/warp/public/109/docsis_config2.shtml</a>). Before running <b>ConfigEdit.bat</b> you’ll need to edit it and follow the instructions contained there. Then execute ConfigEdit.bat and open the .bin file you TFTP'd. Go to the "Class of Service" tab. Voila'. Change the Max DS Rate to 7MB (mine doesn't seem to go higher). Save. </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">We will now need to have the cable modem think we are the ISP and retrieve our version of the file by running our own TFTP server.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">How?</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">This is the point where our network configuration is important. Here are the two cases. Both assume we’re running Windows 2000.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><h3 style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><span style="font-size: small;"> 1.<span style="font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span> PC Directly Connected to Cable Modem</span></h3><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Configure your PC’s TCP settings for:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">IP: 24.56.78.90<span> </span>(replace with the ISP’s tftp server)</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Netmask: 255.255.255.0</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Gateway: 192.168.100.1<span> </span>(replace with your cable modem’s IP address)</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><br />
</div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">don't worry about the DNS...</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">When it's done change your TCP settings to use DHCP again, without. Check <a href="http://192.168.100.1/">http://192.168.100.1/</a></span> or with the docsDiag utility. Your speed limit should now be updated. </div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><h3 style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify; text-indent: -0.25in;"><span style="font-size: small;"> 2.<span style="font-size-adjust: none; font-stretch: normal; font-style: normal; font-variant: normal; font-weight: normal; line-height: normal;"> </span><span> </span>PC <span>à</span> NAT Router<span> </span><span>à</span> Cable Modem</span> </h3><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Set your Router not to use DHCP but to use:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">IP: 24.56.78.90<span> </span>(replace with the ISP’s tftp server)</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Netmask: 255.255.255.0</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Gateway: 192.168.100.1<span> </span>(replace with your cable modem’s IP address)</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">You’ll now have to configure the Router to send all traffic to your PC. LinkSys does this by configuring your PC for the DMZ setting. Other routers may be different. All that should be needed is to either forward all external traffic to your PC or to make your PC visible to the other side of the firewall.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Configure your PC with a static IP address in a range used by your router. Ex. If your router is at 192.168.1.1 then configure your PC for:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">IP: 192.168.1.100</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Netmask: 255.255.255.0</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Gateway: 192.168.1.1</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Now add an additional IP address to the TCP settings in your PC:</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">IP: 24.56.78.90<span> </span>(replace with the ISP’s tftp server)</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">Netmask: 255.255.255.0</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">don't worry about the DNS...</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;">This is done because you’ll have to tell you TFTP server to listen on the latter address.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; margin-left: 0.5in; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">You shouldn't have to reboot. Place your modified copy of the isrr.bin (replace this with your name) in the tftpd directory (also available at <a href="ftp://ftp.ida.net/pub/wireless/tftpd32.exe">ftp://ftp.ida.net/pub/wireless/tftpd32.exe</a>). If in your case the docsdiag showed it inside a subdirectrory you'll have to create one here. Start tftpd32 server. Go to Settings and set the Security to None. Increase the timeout to 20secs and the Max Retransmit to 6. Choose to translate Unix filenames. Make sure it's base directory point to where the isrr.bin is. Ok it. If you fall in case (2) make sure you set 24.56.78.90 IP address in the Server Interfaces.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">We now have to start filling the routing tables in the devices with our bogus data. So start pinging your cable modem, the TFTP IP address, and if applicable, your router. Do this for a couple of minutes. Now power off the cable modem (I usually wait a few seconds just to be sure) and then power it back on. Then immediately start pinging your cable modem until the config file has been transferred. After the traffic lights blinks the first time you should see that your tftp server is sending it your file...!</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">Now reconfigure your Router for DHCP (if case 2), and then reconfigure your PC to DHCP.</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">You’re done!</span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;"> </span></div><div style="font-family: Verdana,sans-serif; text-align: justify;"> </div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><span style="font-size: small;">You’ll have to repeat this procedure every time the modem is powered off.</span></div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div class="MsoNormal" style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div style="font-family: Verdana,sans-serif; text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div><div style="text-align: justify;"><br />
</div>Unknownnoreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-63203845553549275342010-08-16T18:29:00.000+05:302010-08-16T18:29:18.818+05:30Why people still use Blackberry?It's the smartphone everyone owns -- and no one seems to like.<br />
Whenever we buy a phone we always consider the looks but Blackberrys aren't much good lookiing then why do people buy them! <br />
<br />
Peek into any executive conference room in America, and you're bound to see one -- or a dozen -- of these anachronistic smartphones: BlackBerrys, their keys clicking like rain on a tin roof. Those red lights flashing, training their owners to pick them up on a second's notice: An e-mail! A BBM! Answer me!<br />
To owners of Android-based phones and the iPhone, particularly in the U.S., the BlackBerry is starting to look more than a little too old-school. These phones don't really run apps. They don't store much music. Their screens, in general, are much smaller than those of smartphone competitors, meaning it's difficult or impossible to browse the Web comfortably or watch online video.<br />
But here's the kicker: Despite the fact that the BlackBerry isn't hip, high-tech or cheaper than its main competitors, the phones are still the most popular (or at least the most common) in the U.S. market, and they're growing internationally.<br />
So why do so many people still tolerate these phones?<br />
It turns out, according to a handful of interviews with BlackBerry users, there are three basic reasons: People are addicted to the click-clacking keyboard; they love the blinking red light on the top, which alerts users to new messages; and many just happen to have the phone because it's required for work.<br />
<br />
<b>The click-clacking keyboard</b><br />
Ask a BlackBerry user what they like about their phone, and they're bound to mention the keyboard. Ask them why that keyboard is so great, and they'll go into sensual detail about the click of the keys, how the buttons are raised just so and how the "shift" key -- oh, the shift key! -- is just as easy to use as those on a full-size computer keyboard.<br />
<!--startclickprintexclude--> <script type="text/javascript">
var currExpandable = "expand19";
if(typeof CNN.expandableMap === 'object') {
CNN.expandableMap.push(currExpandable);
}
var currExpandableHeight = 436;
</script> <div class="cnn_strylftcntnt cnn_strylftcexpbx" id="expand19"> <div class="cnn_strylceclbtn" style="display: none;"><img alt="" border="0" height="23" src="http://i.cdn.turner.com/cnn/.element/img/3.0/mosaic/bttn_close.gif" width="58" /></div><div class="cnnStoryElementBox"><div class="parentMediaContainer" id="videoContainerexpand19" style="display: none;"><div class="mediaContainer" id="videoContainerexpand19Media"><img alt="" height="436" src="http://i2.cdn.turner.com/cnn/2010/images/08/04/stacks.phone.share.cnn.jpg" width="640" /></div></div><!--endclickprintexclude--></div></div>"The keyboard is definitely a hook for RIM, and it's interesting to see that the marketplace, in general, has conceded it to RIM," said <a href="http://crackberry.com/blog/kevin-michaluk" target="new">Kevin Michaluk</a>, founder of the BlackBerry fan website <a href="http://crackberry.com/" target="new">Crackberry.com</a>. "Everyone sees the iPhone, and they think apps. And I think everyone sees a phone with a keyboard, and they think BlackBerry, whether it is or isn't."<br />
This comes at a time when most smartphones -- including the iPhone -- are moving toward touch-screen-only interfaces, where users tap on glass to type instead of pecking away at tactile keys.<br />
The details of how the BlackBerry keyboard feels are what make it addictive, said <a href="http://twitter.com/nanpalmero" target="new">Nan Palmero</a>, a writer for another fan site, <a href="http://www.blackberrycool.com/" target="new">BlackBerryCool.com</a>.<br />
"They really go to great lengths to raise plastic in certain ways on the keys," he said of the tactile keyboard's design. "They kind of describe it as guitar frets: Your hand naturally knows where to go and where to be."<br />
Palmero said he can type up to 40 words per minute on his phone. Michaluk said he can hit 65. Neither has to look at the keyboard.<br />
Kevin Kovanich, a 23-year-old BlackBerry user in Chicago, Illinois, said he loves that he can still "rock the keyboard" even though his thumbs are "larger than average."<br />
"It is really nice how far the buttons stick up -- and you can really feel that click," he said. "It doesn't feel like you're making any mistakes ... no matter how big your fingers are."<br />
<br />
<b>That red light</b><br />
On top of every BlackBerry, there's a little sliver of a red light, and it blinks at you when a new message or call comes in.<br />
People get seriously addicted to that light, Michaluk said.<br />
"You put a blinking red light on a device, and when that light blinks, you jump," he said. "It's Pavlovian training, right? For me, really, it's my connection to my people. And second, it's my connection to the world in terms of news and everything." <br />
He added: "It's one of those things that always calls you back to your BlackBerry."<br />
Of course, other phones have ways of alerting people to new messages, too, but none has the same feel as that BlackBerry light, users said.<br />
<br />
<b>Because it's businessy</b><br />
The BlackBerry is the get-things-done phone.<br />
It's not designed to run flashy applications, for playing games or for uploading pictures to Facebook and Twitter. It started out a business-minded device, and RIM has continued to market it as a business-friendly device, although recent ads have pitched it as a leisure phone for young multitaskers as well.<br />
Part of the allure is that the BlackBerry is known for being secure. It encrypts messages, which makes business owners more comfortable giving the phones to their employees, who may share sensitive documents and e-mails over the phones.<br />
This issue came into focus this week as the United Arab Emirates and Saudi Arabia threatened to stop BlackBerry service for this very reason: because they wanted to get inside private messages on the phones and couldn't.<br />
Other smartphone operating systems,including iOS 4 from Apple, are trying to cater more to privacy-minded business clients, but overall they've been more focused on the consumer experience.<br />
That image can work in BlackBerry's favor, writes Callie Schweitzer on a blog called Neon Tommy. She says the phone has a "mullet effect" in that it's "business in the front, party in the back."<br />
"See someone typing away furiously on a Blackberry? They're probably sending a top-secret e-mail," she writes. "See someone intently focused on an iPhone? They're probably playing with the Bubblewrap or Lightsaber Unleashed apps. Regardless of what a Blackberry user is really doing, the phone itself just seems so much more straight-laced and serious than the iPhone."<br />
Businesspeople also say BlackBerrys are just good for productivity.<br />
Partly it's the keyboard. Partly is a range of shortcuts. But this no-frills phone has hooked many people in the bushiness world.<br />
That includes Michaluk, who said he was given his first BlackBerry phone -- he called it "old blue" -- from an employer several years ago.<br />
He's been hooked since.<br />
<div class="cnnInline">"That thing was just a tank; it was ugly; it had that low-res, almost monochrome display. And that thing -- I just loved [it]," he said.</div><div class="cnnInline"><br />
</div><div class="cnnInline">Via CNN </div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-24675975415276748142010-08-16T18:19:00.000+05:302010-08-16T18:19:42.034+05:30Graphics cards becoming the greatest password cracking tool<strong>Graphics cards aren't that smart. But they are good at doing the same thing over and over again. This, researchers reckon, makes them good at 'brute force' password attacks, in which, if one password doesn't hack it, another is tried. Using a decent graphics card, the number of attempts can ratchet up into the billions, depending on how determined the hacker is to bust in, researchers have warned.</strong><br />
<br />
Boffins at the <a href="http://www.gtri.gatech.edu/casestudy/Teraflop-Troubles-Power-Graphics-Processing-Units-GPUs-Password-Security-System" target="_blank">Georgia Tech Research Institute</a> say that seven-character passwords are becoming "hopelessly inadequate", mainly because graphics cards are so good at brute-force attacks.<br />
<br />
"We've been using a commonly-available graphics processor to test the integrity of typical passwords," said Richard Boyd, senior researcher on the Georgia Tech team "Right now we can confidently say that a seven-character password is hopelessly inadequate - and as GPU power continues to go up every year, the threat will increase."<br />
<br />
Higher-end, parallel processing GPUs operate at nearly two teraflops, processing <b>trillion floating-point operations per second, making seven-character passwords useless.</b><br />
The boffins say passwords should these day contain at leaset 12 characters, to be on the safe side. A combination of upper an lower-case letters, along with the odd number and a few symbols chucked in, add to the complexity of course.Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-33886681872674927732010-08-16T18:04:00.000+05:302010-08-16T18:04:23.659+05:30Scanning mobile phones viruses from PC?Wouldn't it be more feasible and hassle free, if we could scan for viruses from the PC anti-virus software?<br />
<br />
<b>PC2Mobile scan</b> does just the same. It is a new technology from <b>Quick Heal</b> which will come handy in allowing users to scan for mobile viruses but without installing an anti-virus on the cell phone itself. The software is installed on the PC and the cell phone is connected to the PC via USB cable or bluetooth connection.<br />
<br />
PC2Mobile scan features virus detection on (nearly) all mobile platforms (such as Symbian OS, Windows Mobile OS and other Linux based mobile OS). It also supports proprietary mobile firmwares, making it the only single product that supports virus scanning for variety of mobile phones available from vendors such as Nokia, Samsung, Sony Ericsson, LG, Panasonic, Motorola, O2, IMate, HP, HTC and Siemens. The product boasts supporting over 550 cell phone models.<br />
<br />
The software is a part of the main bundle i.e. <i>Quick Heal Total Security 2010 suite</i> (which is available for Rs. 2,000 for one year's subscription). A complete list of all the supported devices and other details about the product can be found <a href="http://www.quickheal.co.in/pc2mobile.asp">here</a>.<br />
<br />
via <a href="http://www.thinkdigit.com/Features/Scanning-mobile-phones-for-viruses-from-PC_5239.html">Thinkdigit </a>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-19300397154742005582010-08-08T18:39:00.000+05:302010-08-08T18:39:06.727+05:30iStealer 6.0 Tutorial<strong class="bbc">Firstly, you will need to download iStealer 6.0. You can download iStealer 6.0 from the link below or if you do not trust download from wherever you want<br />
</strong><br />
Turn of your webguard or av before download because istealer is a hacking tool so your antivirus will block it.<br />
Ive put some links but im not sure if they are infected or not working. I wont be responsible for the problems from downloads try any one of these<br />
<span style="color: red;"><a href="http://is.gd/e8DZN">http://is.gd/e8DZN</a> <a href="http://is.gd/e8EDU">http://is.gd/e8EDU</a> <a href="http://is.gd/e8EET">http://is.gd/e8EET</a><br />
</span><br />
<strong class="bbc">Register at <a class="bbc_url" href="http://justfree.com/" rel="nofollow external" title="External link">http://Justfree.com</a><br />
Once registered, make sure you verify your email. If you do not receive the email instantly check Junk/Spam, or wait a few minutes<br />
Now, login using your username you registered with and password you registered with.<br />
<br />
Once, you have logged in, click Create/delete MySQL database Now fill out the information as below:<br />
<br />
Database Name: username_db<br />
Simply create database your username will already be there,write any thing in the box then press Create Database. <br />
You should get "The requested operation has been completed successfully. " and then get redirected back to the database page.<br />
<br />
Username: username_user<br />
Then press Create user, fill the box with anything you like and enter password for the user and click create user. You should get "The requested operation has been completed successfully. " and then get redirected back to the database page.<br />
<br />
Now assign priviledges, Make sure that all the boxes are ticked after that click on assign priviledges.<br />
<br />
Now open up index.php in the PHP Logger folder which is in the iStealer 6.0 download. Copy and paste the Datebase info you got above like shown in the picture:<br />
<br />
Fill out your index.php like below:</strong><br />
<br />
$dbHost = "localhost"; // REMAINS LOCALHOST FOR EVERYONE<br />
$dbUser = "<strong class="bbc">username_</strong>db"; // (3)MySQL username<br />
$dbPass = "Your password you filled in for user"; // (4)MySQL password<br />
$dbDatabase = "<strong class="bbc">username_</strong>db"; // (2)MySQL database name<br />
<br />
$username = "username to login page"; // Login Username<br />
$password = "password to login page"; // Login Password<br />
<br />
$logspage = 100; // Number of logs per page<br />
<br />
<strong class="bbc">$dbHost will ALWAYS remain localhost.<br />
$dbUser will be the username you signed up with and db (or whatever you named your database), so for example username_db<br />
$dbPass is the password you used.<br />
Use the image below if you are confused:</strong><br />
<br />
<br />
<b>For:</b><br />
<br />
$username = "create username to login page"; // Login Username<br />
$password = "create password to login page"; // Login Password<br />
<br />
<strong class="bbc">Simply fill them in as the login you want for the actual iStealer login page.<br />
<br />
Once you have filled in YOUR database information in the setup, save the index.php file.</strong><br />
<br />
<strong class="bbc">Now press File Manager at the top.<br />
In file manager if you will find a index.php or index html file delete it<br />
<br />
Once there press Upload and upload the index.php and style.css files. <br />
Then click on index.php and Note the url .This address is important.<br />
<br />
Now open the istealer which you downloaded.<br />
In the url box type the address of the index.php file . If you dont know that address then click on index.php file you just uploaded in the file manager.It should be in this form http://account name.justfree.com/<br />
<br />
open the login page [ http://account name.jµstfree.com/] Log in with the username and password you put on these lines in the index.php:</strong><br />
<br />
<br />
$username = "username to login page"; // Login Username<br />
$password = "password to login page"; // Login Password<br />
<br />
<br />
<strong class="bbc">Now press Test Url, if it comes up with "Works perfect!", then press Build and select where you want to save your built iStealer server.</strong>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-79108539057271829762010-08-08T17:51:00.000+05:302010-08-08T17:51:34.948+05:30Simplified Hacking Terms for Newbies<span style="font-size: 26px;"></span>This is a little tut ive written for complete noobs who don't know anything about hacking, or for those who need help understanding the terminology.<br />
<br />
<b>Keylogger</b> - A keylogger is a program, usualy ran secretly in the background that records what users type, then the typed output is usually sent via email or uploaded by the keylogger somewhere to the web in secret. These can be attached to other executables so you never even know you ran them in the first place, once you click it once it often is started at startup from their on.<br />
<br />
<b>Bot</b> - A bot is a program that is ran secretly in the background of a victim's computer. The bot connects to an IRC channel usually where a Bot Herder(its creator) can use a number of commands to control these computers that are now it's under control. A zombie computer(a pc under control of a bot herder) can be manipulated in a number of ways. Some functions of a bot include stealing victims passwords, keylogging, ddosing a server to cause it to crash, turning on the webcam and being able to watch the zombie computer's users, visiting a website(to gain money + traffic for a bot herder), clicking ads, making ads appear randomly, destroying itself(the pc), and sending spam to email contacts.<br />
<br />
<b>Botnet</b> - A bunch of bot's connected to a server (usually IRC or web) that can be controlled and manipulated by its owner.<br />
<br />
<b>RAT (Remote Administration Tool) </b>- Sort of like a botnet in regards that you can gain acess to the victims computer and do stuff like look at their files, webcam, etc. Only this malware connects back to you, apposed to a server.<br />
<br />
<b>Crypter</b> - A crypter is used to make well known hacker's viruses (such as keyloggers and botnets) undetectable by anti-virus software by changing the virus program signatures that anti virus programs have in their databases to make them easier to spread.<br />
<br />
<b>Binder</b> - A binder is used to bind a virus(such as a keylogger,etc) to another program making it undetechtable and able to fool users into thinking its something else. (IE a victim will click an installPhotoshop.exe and it will install photoshop as well as your virus secretly.)<br />
<br />
<b>FUD</b> - Term for fully undetectable virus. (made by either coding your own virus or by crypting and binding an existing virus) Use <a class="bbc_url" href="http://novirusthanks.com/" rel="nofollow external" title="External link">http://novirusthanks.com</a> (uncheck distribute sample) to check if your virus is undetectable.<br />
<br />
<b>Database</b> - Used by most websites to store things such as User names, Passwords, Email, etc of an entire website or community.<br />
<br />
<b>SQL Injection</b> - A way of manipulating a website's forms as a way of retrieving it's databases. This can be used to find users and passwords as well as obtaining admin on a website in order to deface it.<br />
<br />
<b>XSS (Cross Site Scripting)</b> - a type of computer security vulnerability typically found in web applications which allow code injection by malicious web users into the web pages viewed by other users. An exploited cross-site scripting vulnerability can be used by attackers to bypass access controls such as the same origin policy. Vulnerabilities of this kind have been exploited to craft powerful phishing attacks and browser exploits. (From Wikipedia)<br />
<br />
<b>Cookie Stealing/Spoofing</b> - Used to fool a victim into clicking a link that will steal their cookies to websites which you can then use to have their privileges to various parts of a website or forum.<br />
<br />
<b>BruteForcer</b> - Program used to crack passwords by trying every password/password list on various forms.<br />
<br />
<b>Hashes</b> - How passwords are usually stored, this is a way of crypting a password so it is not plain text, harder passwords are very hard to crack but simple ones have often been cracked and can be found on online databases. Some common password hashes include MD5 and SHA.<br />
<br />
<b>Social Engineering</b> - Tricking a victim into doing something you want them to do by disguising or enticing them into doing what you want.<br />
<br />
<b>Phishing</b> - Creating a fake login page to a well known website (IE Facebook) and then fooling a victim into entering their information on the fake login page through social engineering.<br />
<br />
More to come, hope this helps you understand some of the different types of hacking and its terms.Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com1tag:blogger.com,1999:blog-2006337753022036879.post-60633101021525333062010-08-08T17:23:00.001+05:302010-08-08T17:24:43.942+05:30Windows7 Transformation pack for UbuntuMany user dont like user interface of ubuntu this is a windows7 transformation pack for ubuntu.it would ubuntu look like windows 7 so you wont blame for ubuntu for having unfriendly interface.<br />
<br />
This Package contains:<br />
GDM theme*<br />
Icons Theme*<br />
GTK Theme<br />
Wallpapers<br />
Sounds<br />
Gnomenu theme*<br />
Panel Backgrounds*<br />
Cursor theme<br />
DockBar<br />
<br />
<div style="font-family: "Trebuchet MS",sans-serif;"><span style="font-size: x-large;"><a href="http://www.gnome-look.org/content/show.php/Win7+Transformation+Pack+for+Ubuntu?content=113909"><b>Download Windows7 Transformation Pack for Ubuntu from </b></a><b><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=6063310102152533306" onclick="javascript:_gaq.push(['_trackEvent','outbound-article','www.gnome-look.org']);" target="_blank">here</a> </b></span></div><br />
About the sounds, they can’t be installed, just you can replace the Ubuntu original sounds or configure you preferences sounds at System / Preferences /Sounds or copying at /usr/share/sounds (accessing as root) and save the folder there or replace the original sounds. (because of they have the same name).<br />
<br />
<a href="http://www.ubuntugeek.com/win7-transformation-pack-for-ubuntu.html">source - Ubuntu Geek</a>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-4964822704703648582010-08-07T14:48:00.000+05:302010-08-07T14:48:56.843+05:30Simplified Torrent Guide for newbies.Ive been Facing with Readers having problems with torrents.<br />
<span style="color: red;">So here is Torrent Guide for newbies.</span><br />
<br />
<b>What is BitTorrent?</b><br />
<br />
BitTorrent (often abbreviated to 'BT') is a protocol that allows you to download files quickly and efficiently. <br />
It is a peer to peer protocol, which means you download and upload to other people downloading the same file. <br />
BitTorrent is often used for distribution of very large files, very popular files and files available for free, as it is a cheap, fast, efficient way to distribute files to users like you.<br />
<br />
<b>µTorrent</b> is a BitTorrent client.<br />
A 'client' in this case is a computer program that follows the rules of a protocol. <br />
For example, HTTP (HyperText Transfer Protocol) is the protocol used to download web pages and other content - like this page - and your HTTP client (or browser) is the program you use to get those web pages. <br />
Some popular browsers include Mozilla Firefox, Google Chrome and Safari.<br />
<div style="color: red;">Email , Direct Downloads Via File hosting and FTP rely on one computer Server hosting the file and transmitting it to another connected computer. </div><div style="color: red;"><br />
</div>BitTorrent introduces a major difference the hosting and the <br />
downloading is spread out over many computers using a technology called Peer-to-Peer .<br />
We <br />
can use BitTorrent to share or download any type of files .exe, mp3, AVI, Jpeg, and Doc <br />
etc. <br />
<br />
<span style="font-size: large;"><b>Some Important Terms:</b></span><br />
<br />
<span style="color: red;">Torrent:</span> Its is a file itself. The .torrent file is not the entire file the people who are sharing it. It is like a map which is used by the BitTorrent client to <br />
assemble all the pieces together. <br />
<span style="color: red;">BitTorrent client :</span>It is a piece of software which takes the .torrent file, reads the information in it and <br />
starts the download. <br />
<span style="color: red;">Peer :</span>A peer is any computer participating in the download and upload of a torrent file. <br />
<span style="color: red;">Seeder :</span>A seed (or seeder) is anyone who is uploading copy of the file being shared <br />
across the torrent network. <br />
<span style="color: red;">Leecher :</span>A leech (or a leecher) is the person who does not have the complete file yet but <br />
has joined the network to download it. A leecher becomes a seeder when he downloads the entire file and then shares it across the network. <br />
<span style="color: red;">Port : </span>it is where your computer receives the communication signals from the outside network. <br />
<span style="color: red;">Share ratio:</span> The ratio is the amount of data a user has uploaded divided by the amount of <br />
data they have downloaded for a particular torrent (UL÷DL). A share ratio of 1+ has a other users than he has received. Conversely, share ratios under 1 have a negative effect. <br />
<span style="color: red;">Swarm :</span>The swarm is the sum total of all the leechers and seeders (i.e. all the computers) <br />
participating in the torrent process. <br />
<span style="color: red;">Tracker:</span> The tracker is a server which has the information of who has what files and who <br />
needs which ones, thus acting as a bridge between seeders and leechers. Some trackers <br />
are private requiring a registration where most are public. <br />
<span style="color: red;">Availability :</span> That number tells you how many unique copies of the file are available between yourself and the peers you're connected to. If this is less than 1, you most likely will not be able to complete the torrent. The only thing you can do is wait and hope a seeder hops onto the torrent to allow you to complete it.<br />
You can also try and request a "reseed" on the tracker's forum. Sometimes, this may never happen because the torrent was abandoned, and you may need to find the torrent elsewhere.<br />
<br />
<br />
<br />
<span style="font-size: large;"><b style="font-family: "Trebuchet MS",sans-serif;">Be savvy about copyright laws </b></span><br />
The world of digital distribution can often be seen clashing with copyright laws.<br />
Peer to Peer file sharing is completely legal but using it for distribution of copyrighted material it a punishable offence.<br />
The protocol makes everyone a downloader as well as a distributor . <br />
There have been numerous cases where torrent trackers which index the torrents available <br />
have been shut down for infringing so Industry Association of America (RIAA) and the Motion Picture Association of America (MPAA) have become proactive against many of them, because it represents a source of piracy. <br />
<br />
The safest course of action is to follow the copyright laws as laid down. Browse to the <br />
copyright policy link of the respective tracker website; the better ones have it. <br />
<br />
<b>Getting Started </b><br />
<br />
Get your hands on a good torrent client, set it up and download our first file. <br />
Life on the BitTorrent lane gets easier if we have a good client to do the job for us.<br />
<br />
<span style="color: red;">I would recommend µTorrent And Vuze (formerly Azureus) . </span><br />
Both are free, lightweight and cross platform (for all operating systems). <br />
Make sure you have the latest updated version. <br />
Installing them is easy you can do it yourself.<br />
<br />
<b>Gearing up the torrent client for smoother run. </b><br />
Fortunately, µTorrent makes this very easy for the beginner.<br />
Here are the basic steps - <br />
1. When you start µTorrent for the first time it helps you out with a Speed Guide.<br />
<br />
2. The speed guide helps you to choose your correct upload speed . If you are not aware <br />
from DSLReports website. Connect to the site by pressing the button. Do not run any other application or browser at the time you are running the speed test. Run the test 2-3 <br />
times to get an idea of your average upload rate. <br />
<br />
3. Select a setting close to your obtained upload rate using the Connection Type <br />
dropdown. When µTorrent runs for the first time, a port is automatically selected for you. <br />
<br />
4. Use Selected Settings button and you are ready to begin. <br />
<br />
5. If you want to recheck your upload speed, you can also run the speed test from the <br />
µTorrent toolbar > Options > Speed Guide. <br />
<br />
<span style="font-size: large;"><b>Finding and downloading torrents</b></span><br />
Going to a reliable torrent site also lets us avoid the pitfalls of downloading a corrupted file or even worse, a malicious virus.<br />
A good torrent website filters out the undesirable and hosts clean torrents. <br />
<br />
The recommended ones are – <br />
<b>PirateBay</b> and <b>Btjunkie</b>– By its sheer size it is probably the most popular site in the torrent world with nearly 3.5 million users. The torrents also have little icons labeling them which say whether the torrents are from VIP users or trusted users. This reputation management serves as a mark of quality assurance. In their fight to bring the best they are constantly facing lawsuit threats<br />
<b>Mininova </b> – It enjoys a very good reputation of filtering out junk torrents. It is also one of the oldest torrent sites out there and definitely one of the cleanest sans any objectionable ads. If you have to restrict yourself to just torrent sites, then these two do the job. <br />
<b>Vertor </b> – In your continuing hunt to find clean, virus free and quality torrents, Vertor is a good place to stop by. Vertor separates itself from the herd by providing snippets of the file you are about to download. This helps to confirm the torrent as safe for download. Vertor by the way <br />
<br />
<b>Demonoid </b> – This site, though amongst the best, has one shortfall you need to register for a free account. The registrations are only open for some time and you require an invitation to get into Demonoid. If you manage to get an account you will see why this is one of the best. Being a restricted circle, it has a strict usage policy. <br />
<b>Legit Torrents </b>and <b>Legal Torrents</b> list only torrents which are in the public domain and thus 100%legal. <br />
<br />
<span style="font-size: large;"><b>Torrent search engines </b></span><br />
There are the torrent search engines, which basically search a bunch of torrent <br />
sites in one go and bring together all the results in one page. <br />
Torrent-Finder: Search 172 torrent sites and trackers with this multi-search engine. <br />
<a href="http://torrentz.com/">Torrentz</a>: A simple no fuss torrent meta-search engine. <br />
<br />
<span style="color: red;">I personally use Torrentz and Demonoid.</span><br />
<br />
The number of torrent search sites reflect the popularity of the protocol.<br />
<br />
1. Surf to any of the torrent sites and search for your desired torrent file. <br />
Remember, a torrent file is nothing but a small 15-100Kb sized file which points to <br />
the contents of the whole file and the people in the swarm.<br />
2. Click on the desired file (or any download link) to download the file to your computer. <br />
The small file sizes will take up just couple of seconds of your time. <br />
3. Browse to your saved .torrent file and double click it to open the file with your torrent <br />
client Or drag and drop the .torrent file into your software <br />
window. <br />
4. Now, your software begins the download by first connecting to the tracker server to <br />
find out who else is downloading the same file and which bits they have. <br />
5. The tracker server identifies the users participating in the share and labels them as <br />
either seeders or leechers. Look for a torrent with a higher number of seeders. The <br />
ratio of seeders to leechers is the share ratio and a higher figure makes for a <br />
healthier (and faster) torrent. <br />
6. The download begins and speeds up as the swarm increases. <br />
<br />
The time to complete the download will of course depend on the file size, the speed of your connection and the quality of the swarm. <br />
<br />
<b>When µTorrent finished downloading, but now it says it's Seeding</b><br />
It is where you leave your Torrent client open after you've finished your download to help distribute it (you distribute the file while downloading, but it's even more helpful if you continue to distribute the full file even after you have finished downloading).<br />
All the data you got was from seeds, so help give back to the community! <br />
It doesn't require anything - µTorrent will continue seeding until the torrent is removed.<br />
Proper practice is to seed until the ratio of upload:download is at least 1.00 or more if You like The torrent content and You Want other users to have it.<br />
After your download finishes, you may enjoy the file you just got.<br />
Now after all that hard work if you are thinking of deleting the leftover .torrent file and closing the client software just pause here. <br />
<b>This single selfish act. </b> <br />
<span style="color: red;">Always remember torrent remains alive And healthy only by uploading. </span><br />
<span style="color: red;">Upload is essential for torrenting.</span><br style="color: red;" /><span style="color: red;">if we just keep downloading and no one uploads torrents would die and so would the content.</span><br style="color: red;" /><span style="font-size: large;"><b style="color: red; font-family: "Trebuchet MS",sans-serif;">Uploading Wont Affect Your Download Speed!</b></span><br style="color: red;" /><span style="color: red;">So let the Torrent Seed while you can enjoy the download. </span><br style="color: red;" /><span style="color: red;"> </span><br />
<br />
<br />
<span style="font-size: large;"><b>How to be a good member of the torrent community? </b></span><br />
After your download finishes, leave your Torrent client software running for at least for a day, or until you have uploaded as much as you have downloaded. <br />
Sometimes it may not be possible to follow this rule but it is important to get close to it. <br />
<span style="color: red;"> </span><br />
<span style="color: red;">Tip: Do your downloading at night so that by the time you wake up you have downloaded </span><br style="color: red;" /><span style="color: red;">your file and you would uploaded your share too. </span><br style="color: red;" /><span style="color: red;"> </span><br />
1. Make a habit to check comments left by earlier downloaders regarding the quality of torrents. <br />
2. Download torrents from a reputable website or join a private tracker.<br />
Private trackers moderate the quality vigorously but then they are equally rigorous with their rules. <br />
3. Try to avoid downloading files which have been split and zipped. Commonly they are fake torrents. Beware as there are a many fake torrents out there. Most of them are malicious. <br />
4. Always read the rules and the copyright policy of the website you are downloading from.<br />
5. If the torrent site you obtained it from offers comments, be sure to read those first. <br />
But regardless of the comments, running a virus scan on the downloaded files is usually a good idea. <br />
µTorrent guarantees that the content you download is not altered from when the torrent was originally created, but if the source files used to create the torrent were already infected, this will provide no protection! <br />
<br />
<b>A fine-tuning tutorial for faster downloads </b><br />
By now you should be feeling confident about tackling a few settings under the hood. Just a <br />
few nips and tucks to the default settings will help boost your torrent download speeds and <br />
optimize it for your bandwidth. <br />
<br />
Your ISP is where it starts a specific bandwidths for both uploads and downloads. Obviously your torrent download speed depends on Isp so <span style="color: red;">you cant Exceed the limits by Isp.</span><br />
<br />
<b>Choosing the right BitTorrent client and Keep updated to the latest version. </b><b> </b><br />
<b>Go for healthy seeds and peers </b><br />
For high torrent speeds, the best bet is in numbers.<br />
Greater the number of seeders, healthier is the torrent and better is the chance of higher speeds.<br />
Choose torrent files with a high number of seeders and preferably lesser number of leechers i.e. a higher seed-leecher ratio. <br />
<br />
<br />
<b>Firewalls</b><br />
It can block all incoming BitTorrent connections coming through.<br />
To ensure otherwise, a firewall should be manually configured to accept the connections and let it through the client.<br />
Configure the firewall installed to accept the connections by checking the BitTorrent client on the allowed list i.e. Options>Preferences > Connection > (check) Add µTorrent to Windows Firewall .<br />
Also, check the Windows Firewall exception (if you keep it enabled) in your client too. Shutting down the firewall is not recommended as it leaves the computer open to attack. <br />
<br />
<b>Limit your Upload rate and Download rate too</b><br />
Using the speed tests, find out your maximum Upload speed and then set 80% of your maximum Download speed.<br />
You can try varying your upload speeds keep it high initially and then gradually bring it down towards the middle of the download.<br />
<span style="color: red;">Downloads also tend to go quicker if you seed more. </span><br />
Note: Mind the speed units it may be given in kilobits per second (kb/sec) or kilobytes per second (kB/sec). <span style="color: red;">1 kilobyte = 8 kilobit </span><br style="color: red;" /><span style="color: red;"> </span><br />
<b>Go to a different port </b><br />
The default port for the BitTorrent protocol is any between port numbers 6881-6999. ISPs <br />
throttle traffic on these ports as BitTorrent sharing <br />
configure a different port in your torrent client. Use some number above 10000 to get around <br />
ISPs and also avoid problems with other applications. By default, the µTorrent port is <br />
randomized each time it starts. Set a specific port by not enabling the Randomize Port <br />
setting. Again check if the port is forwarded properly using the button in the Speed Guide. <br />
<br />
Remember, different types of data, such as web sites, file downloads, and torrents, are each given a specific port. <br />
Port forwarding is the process that a software (or hardware like routers) uses to screen the right kind of data to the right port. <br />
<a href="http://portforward.com/"><b>Portforward.com</b></a> provides step-by-step guides on how to set up this port forwarding. <br />
<br />
<b>Increase the number of Max Half Open TCP connections </b><br />
This figure specifies how many connections a torrent client should attempt to establish <br />
simultaneously at any given time. To make it clearer it is the number of connection <br />
attempts in progress and NOT the total number of connections. <br />
Windows XP with Service Pack 2 (SP2) or newer, limits this to a default of 10 as a barrier torrent speeds as torrents too need a large number of simultaneous connections. A patch has been available for a while from <a href="http://www.lvllord.de/"><b>www.LvlLord.de</b></a> , which modifies the TCPIP.sys file in Windows to allow higher number of TCP connections. <br />
<br />
After running the patch, you have to set the number of connections in your torrent client. For example, in µTorrent go to Options > Preferences > Advanced > net.max_halfopen. <br />
Set any number from 50 to 100. But see that net.max_halfopen is set lower than the value set in TCPIP.SYS. Always check if it is still patched because Windows updates sometimes overwrite it. <br />
<br />
<span style="font-size: large;"><span style="color: red;">Mac and Linux need not Tweak it as this is a Windows Only Shit. </span></span><br />
<br />
<b>Experiment with Protocol Encryption </b><br />
Some ISPs love to act like Big Brothers and constrict bandwidth for P2P protocols. Protocol <br />
Encryption in most of the torrent clients helps to over ride this bandwidth shaping. Enable <br />
outgoing protocol encryption and put a checkmark on Allow Incoming Legacy Connections <br />
<br />
With protocol encryption, ISPs find it difficult if not impossible to detect that the traffic is <br />
coming from BitTorrent. Experiment with enabled, disabled and forced options because you could be getting better speeds with encryption disabled. Non-encryption makes a torrent connection compatible with someone who is not using encryption but as a minus it makes the torrent detectable but an ISP with a bandwidth restricting policy. <br />
<br />
<b>Bandwidth and connections </b><br />
Options will let you enter figures for Global maximum number of connections gives the maximum number of connections that a BitTorrent client can make for any P2P exchange. Setting this too high DOES not mean higher speeds.<br />
Setting it too high would take up useless bandwidth and too low a figure would miss out on peers.<br />
For my 256kbps connection, I have a setting of 130 Maximum number of connected peers per torrent gives the maximum number of peers that a BitTorrent client can connect to for any P2P exchange.<br />
Experiment by setting this number close to the available peers for a particular torrent. For my 256kbps connection, I have a default setting of 70. <br />
Number of upload slots per torrent gives the maximum number of peers that a BitTorrent <br />
client will upload to for any P2P exchange. A low setting may affect downloads.<br />
For my 256kbps connection, I have a setting of 3. <br />
<br />
Optimizing the speed of torrent downloads is a lot of trial and error and a bit of patience. <br />
<br />
<span style="font-size: large;"><b>Creating our own Torrent </b></span><br />
So far we have been preoccupied with downloading features but torrents are not a one way <br />
street. The community survives and thrives because somebody out there is taking the pains <br />
to create and upload the torrents. Uploading a torrent is not all about being large <br />
<br />
torrents and uploading them for your friends to download is also a cool way to distribute a <br />
large digital chunk in one go. <br />
and the manner of torrents before you start with your first upload.<br />
<br />
As soon as you save your torrent file, it gets added to your active list in µTorrent, and <br />
the Tracker. <br />
All that is left is to upload the .torrent file to a tracker website like Mininova or <br />
Piratebay. All tracker websites have an Upload link.<br />
Some like PirateBay require a <br />
log-in for you to access their upload page. Please read the rules and the copyright <br />
policy before you upload your .torrent file. <br />
<br />
Enter the details in the form. Click on submit and you are done. Not quite! Now let the <br />
torrent seed for a while so others can pick it up. <br />
<br />
Utorrent has a perfect guide for making Torrents <br />
http://www.utorrent.com/documentation/make-a-torrent <br />
<br />
If u got any problems Leave it in Comments Or check FAQ bu utorrent http://www.utorrent.com/faq/<br />
<br />
Keep seeding!<br />
Happy Torrenting!<br />
<br />
Related Posts<br />
Utorrent turbo patch <a href="http://ultimate-hacker.blogspot.com/2009/08/boost-and-increase-p2p-and-torrent.html">http://ultimate-hacker.blogspot.com/2009/08/boost-and-increase-p2p-and-torrent.html</a>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-4573553945728821152010-08-07T12:35:00.000+05:302010-08-07T12:35:58.861+05:30Shutdown Timer<div class="article-info-surround"> <div class="article-info-right"> <div class="buttonheading"> <a href="http://sinvise.net/home/projects/software/shutdown-timer?format=pdf" onclick="window.open(this.href,'win2','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,location=no'); return false;" rel="nofollow" title="PDF"><span class="icon pdf"></span></a><a href="http://sinvise.net/home/projects/software/shutdown-timer?tmpl=component&print=1&page=" onclick="window.open(this.href,'win2','status=no,toolbar=no,scrollbars=yes,titlebar=no,menubar=no,resizable=yes,width=640,height=480,directories=no,location=no'); return false;" rel="nofollow" title="Print"><span class="icon print"></span></a><a href="http://sinvise.net/home/component/mailto/?tmpl=component&link=aHR0cDovL3NpbnZpc2UubmV0L2hvbWUvcHJvamVjdHMvc29mdHdhcmUvc2h1dGRvd24tdGltZXI%3D" onclick="window.open(this.href,'win2','width=400,height=350,menubar=yes,resizable=yes'); return false;" title="E-mail"><span class="icon email"></span></a> </div></div><div class="iteminfo"> <div class="article-info-left"> </div></div></div><strong>What is Shutdown Timer?</strong><br />
Shutdown Timer is a utlity that will allow you to perform certain actions relating to shutting down the system. The user interface is easy to use and understand and you should be able to get to grips with it.<br />
<br />
<strong>What are the main features of Shutdown Timer?</strong><br />
Ability to:<br />
<ul><li>Shutdown</li>
<li>Restart</li>
<li>Logoff</li>
<li>Lock</li>
<li>Hibernate</li>
<li>Standy</li>
<li>Monitor Standby</li>
<li>Based on Date & Time</li>
<li>CPU/Memory Utilisation</li>
<li>CPU Temperature</li>
<li>Networking Usage</li>
<li>Ability to save your settings for furture use</li>
<li>Completely Portable, You can take it on a USB if you want to!</li>
</ul><a href="http://sinvise.net/home/projects/software/shutdown-timer"><b>Download Shutdown Timer</b></a>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-52004448873594602562010-08-06T18:36:00.000+05:302010-08-06T18:36:20.235+05:30Call free from Android<span style="font-size: large;">Rebtel for Android</span> <h2 style="color: #212121; font-size: 20px; font-weight: normal; line-height: 30px; margin-bottom: 18px;">Available now on the Android Market</h2>Download Rebtel for Android, sign up and start making free calls to friends between more than 50 countries and make savings of up to 90% to the rest. Among many features, the Rebtel app let's you make seamless Free Calls to any friend that has the app installed. No more hanging up and calling back - Rebtel for Android automates the entire hang up and call back procedure. <br />
Never waste time on chasing WiFi hotspots again. The app works anytime, anywhere and integrates with your regular Android address book and dial pad. No need to keep track of an additional address book, just call as you would normally do.<br />
If you need international calls for other phones free chk out<a href="http://www.rebtel.com/en/Rates/Rates/%20"> Cheap Rates</a>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-56785560247697219442010-08-05T18:08:00.000+05:302010-08-05T18:08:51.630+05:30WIFI Hacking Software Download<div style="font-family: "Trebuchet MS",sans-serif;">2 free WIFI software that can recover WEP, WPA PSK keys and more. Enjoy!<br />
<span id="ecxmore-5995"></span></div><h4 style="font-family: "Trebuchet MS",sans-serif;">1) WIFI Hacking Software </h4><div style="font-family: "Trebuchet MS",sans-serif;">This tool has many different tools to hack and crack wifi so you can use your neighbours internet and do whatever. Tools for Windows and Linux also some nice extra tools!</div><div style="font-family: "Trebuchet MS",sans-serif;">Windows : Aircrack, Wireshark, Ettercap, Netstumbler, Airsnare, WIFIfofum, Wdriver, Pong, CommView, Airsnort, AiroPeek, Knsgem 2, Aptools, And A Nice PDF File</div><div style="font-family: "Trebuchet MS",sans-serif;">Linux Hacks: Airpwn, WEPcrack, Prismstumbler, WIFIscanner, Airfart, Magicmap, WPA-cracker , Wellenreiter , Void, Kismet, Cowpatty, WIFIzoo, And A Nice PDF File</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"><strong>DOWNLOAD <a href="http://tinyurl.com/2854m4j"><span style="color: lime;">Part 1 </span></a><strong><a href="http://tinyurl.com/2b8yfxr"><span style="color: cyan;">Part 2</span></a></strong></strong></div><h4 style="font-family: "Trebuchet MS",sans-serif;">2) AirCrack 2.1, AirSnort 0.2.6, AeroPeek 2.02</h4><div style="font-family: "Trebuchet MS",sans-serif;">Aircrack ng is an 802.11 WEP and WPA PSK keys cracking program that can recover keys once enough data packets have been captured. It implements the standard FMS attack along with some optimizations like KoreK attacks, as well as the all new PTW attack, thus making the attack much faster compared to other WEP cracking tools. In fact, Aircrack ng is a set of tools for auditing wireless networks.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;">AirSnort is a wireless LAN (WLAN) tool which recovers encryption keys. AirSnort operates by passively monitoring transmissions, computing the encryption key when enough packets have been gathered. 802.11b, using the Wired Equivalent Protocol (WEP), is crippled with numerous security flaws. Most damning of these is the weakness described in Weaknesses in the Key Scheduling Algorithm of RC4 by Scott Fluhrer, Itsik Mantin and Adi Shamir. Adam Stubblefield was the first to implement this attack, but he has not made his software public. AirSnort, along with WEPCrack, which was released about the same time as AirSnort, are the first publicly available implementaions of this attack.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;">AiroPeek NX captures and decodes packets, with special emphasis on the 802.11 protocol. AiroPeek NX receives all wireless LAN packets based on user settable configuration parameters and stores these packets in memory. For example, you can set a filter to capture all packets, only 802.11 authentication request frames, or all frames except beacons frames. Just about any combination of packet types and protocols are possible.</div><div style="font-family: "Trebuchet MS",sans-serif;"><br />
</div><div style="font-family: "Trebuchet MS",sans-serif;"><a href="http://hotfile.com/dl/34332603/476697e/WiFi_Stealer_AIO_2009.rar.html" target="_blank">Download AirCrack 2.1, AirSnort 0.2.6, AeroPeek 2.02 </a></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com1tag:blogger.com,1999:blog-2006337753022036879.post-49451120320265135992010-08-04T20:55:00.000+05:302010-08-04T20:55:22.898+05:305 Best Free Video ConvertersThis doesn't have to cost you anything, as there are a host of excellent freeware tools that provide all the functionality you'll ever need - and we've uncovered five of the very best.<br />
<br />
<strong>1. SUPER</strong><br />
<a href="http://www.erightsoft.com/SUPER.html">SUPER</a> (the Simplified Universal Player Encoder & Renderer) uses several open-source tools to support a huge array of file conversion functionality.<br />
The program is able to import all the main video formats, of course: 3GP, 3G2, AMV, ASF, DAT, DVR-MS, FLI, FLC, FLV, M2TS, MPG, MKV, MOV, M4V, NSV, OGM, QT, RM(VB), STR, SWF, TS, TRP, TY, TY+, TMF, VIV, VOB and WMV.<br />
But SUPER can also record streaming internet videos. It's able to import sequences of images. And there's excellent support for audio file formats, too.<br />
<br />
Output options include all the main PC video and audio formats, and the program also supports creating 3GP and 3G2 files for mobile phones, along with clips for the iPod or iPhone, Sony PS3 and PSP, Nintendo DS, Microsoft Zune, and more.<br />
Figuring out how to do all this can take a while, as SUPER's interface comes packed with complex options. It's worth investing the time, though, because once you're familiar with how SUPER works then you'll be prepared for just about any file format conversion task.<br />
<br />
<strong>2. Format Factory</strong><br />
<a href="http://www.formatoz.com/">Format Factory</a> has a good list of output formats, being able to convert almost any video to MP4, AVI, 3GP, RMVB, WMV, MKV, MPG, VOB, MOV, FLV or even SWF files.<br />
The program comes with a huge selection of device presets, too. So if you're not quite sure how your video should be configured, just choose the "All to Mobile Device" option and you'll find built-in settings for the iPhone, iPod and iPad; Sony PSP and PS3; Xbox 360; Microsoft Zune; and mobiles and other devices from companies like Archos, ASUS, Creative, HTC, iRiver, LG, Nokia, Philips, BlackBerry, Samsung, Sony Ericsson and more.<br />
That's just the start, though. Format Factory can also convert audio files and images, join videos and audio files together, repair corrupted video files, rip CDs and DVDs, create ISO images - there are useful capabilities everywhere you look.<br />
<br />
The program is a little buggy, crashing a few times in our tests. But if you can avoid these traps then Format Factory is effective, and fairly easy to use. Drag and drop a file, choose an output format and settings, and the program will usually be creating your video in just a few clicks.<br />
<br />
<strong>3. Handbrake </strong><br />
<a href="http://handbrake.fr/">Handbrake</a> started life as an open source DVD ripper, quickly converting the disc of your choice into a more convenient video file. The program no longer provides any means of decrypting commercial DVDs, but by way of compensation it can now import just about any video format, thanks to the inclusion of some libraries from the FFmpeg project.<br />
Export options are rather more limited, however. You can convert to MP4, or MKV, and, well, that's it. <br />
<br />
If all you need to do is create videos suitable for your iPod or iPhone (or anything else that requires those formats), though, Handbrake will prove an excellent choice. The program provides a lengthy list of advanced options to control the final results, for instance. <br />
But if you prefer a simple life, then you can ignore all these and have the program working in seconds. Just specify the source and destination file names, choose one of the presets (iPod, say), then click Start, and watch as your movie is converted.<br />
<br />
<strong>4. HAMSTER Free Video Converter</strong><br />
<a href="http://videoconverter.hamstersoft.com/">HAMSTER Free Video Converter</a> is a well-designed conversion tool that manages to include plenty of powerful features, without compromising on ease of use.<br />
Importing files is as easy as dragging and dropping, for instance. Batch file conversion is possible so you can drop as many files as you like, and all the usual formats are supported.<br />
<br />
Videos may be exported as AVI, MPEG, WMV, FLV, 3GP or MP3 files (if you only need the audio). Or you can choose predefined formats that will work on particular devices: iPods, the iPad or iPhone, or hardware from BlackBerry, HTC, Nexus, Nokia, iRiver, Creative, Zune, Archos, Xbox, the PSP or PS3.<br />
It's then easy to customise your movie by choosing a video or audio codec, setting your file resolution, deciding whether you want to deinterlace the video, and more. Your preferred settings can then be saved in a list of Favourites for easy recall later, before you launch the conversion with a click.<br />
<br />
<strong>5. Miro Video Converter</strong><br />
While most conversion tools have focused on adding more and more features, <a href="http://www.mirovideoconverter.com/">Miro Video Converter</a> has moved in the other direction, stripping away every setting and option to make the program as simple as it can possibly be.<br />
The process starts by dragging and dropping your video onto Miro Video Converter (it can handle almost every format).<br />
Next, you're able to choose your output type. There's specific support for the iPhone, iPad and various iPods, the Sony PSP and a range of Android phones. Or you can do a simple format conversion to an MP4, Ogg Theora or WebM video.<br />
Finally, click Convert and the program will create a new video in the same folder as the source file (though with a new name, fortunately). <br />
<br />
There's no scope for customising your movie in any way, then - you can't change the resolution, frame rate, bit rate or anything else. This makes the program extremely simple to use, though, so if you're put off by the more intimidating interfaces of our other tools then Miro Video Converter could be worth a look.<br />
<div style="background-color: transparent; border: medium none; color: black; overflow: hidden; text-align: left; text-decoration: none;"><br />
Read more: <a href="http://www.techradar.com/news/software/applications/5-best-free-video-file-conversion-tools-707695#ixzz0veR2mi00" style="color: #003399;">http://www.techradar.com/news/software/applications/5-best-free-video-file-conversion-tools-707695#ixzz0veR2mi00</a></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-58924436756417303402010-08-04T20:41:00.000+05:302010-08-04T20:41:26.367+05:3040 Horrifying Statistics Of Collapsing U.S. Economy<span style="font-size: small;"></span><div style="font-family: "Trebuchet MS",sans-serif;"><span style="font-size: small;"><span style="line-height: 116%;">Most Americans still appear to be operating under the delusion that the "recession" will soon pass and that things will get back to "normal" very soon. Unfortunately, that is not anywhere close to the truth. What we are now witnessing are the early stages of the complete and total breakdown of the U.S. economic system. The U.S. government, state governments, local governments, businesses and American consumers have collectively piled up debt that is equivalent to approximately 360 percent of GDP. At no point during the Great Depression (or at any other time during our history) did we ever come close to such a figure. We have piled up the biggest mountain of debt that the world has ever seen, and now that gigantic debt bubble is beginning to pop. As this house of cards comes crashing down, the economic pain is going to become almost unimaginable. <br />
<br />
Already, things are really, really, really bad out there. Unemployment is at shockingly high levels. Foreclosures and personal bankruptcies continue to set new all-time records. Businesses are being shut down at a staggering rate, more than 40 million Americans are on food stamps, and the U.S. government continues to pile up debt at blinding speed.<br />
<br />
<span style="color: red;">There is no use sugar-coating it.<br />
<br />
The U.S. economy is collapsing.</span><br />
<br />
<span style="color: red;">The following are 40 bizarre statistics that reveal the truth about the collapse of the U.S. economy....</span><br />
<br />
1 - According to one shocking new survey, 28% of U.S. households have at least one member that is looking for a full-time job. (source: <!-- m --><a class="postlink" href="http://www.dailyfinance.com/story/careers/what-is-the-real-unemployment-rate/19556146/">http://www.dailyfinance.com/story/caree ... /19556146/</a><!-- m -->)<br />
<br />
2 - A recent Pew Research survey found that 55 percent of the U.S. labor force has experienced either unemployment, a pay decrease, a reduction in hours or an involuntary move to part-time work since the recession began.(source: <!-- m --><a class="postlink" href="http://pewsocialtrends.org/pubs/759/how-the-great-recession-has-changed-life-in-america">http://pewsocialtrends.org/pubs/759/how ... in-america</a><!-- m --> )<br />
<br />
3 - There are 9.2 million Americans that are unemployed but that are not receiving an unemployment insurance check.(source:http://news.goldseek.com/GoldenJackass/1278532800.php)<br />
<br />
4 - In America today, the average time needed to find a job has risen to a record 35.2 weeks.(source: <!-- m --><a class="postlink" href="http://www.telegraph.co.uk/finance/comment/ambroseevans_pritchard/7871421/With-the-US-trapped-in-depression-this-really-is-starting-to-feel-like-1932.html">http://www.telegraph.co.uk/finance/comm ... -1932.html</a><!-- m -->)<br />
<br />
5 - According to one analysis, the United States has lost 10.5 million jobs since 2007.(source: <!-- m --><a class="postlink" href="http://www.wnd.com/index.php?fa=PAGE.view&pageId=173169">http://www.wnd.com/index.php?fa=PAGE.view&pageId=173169</a><!-- m -->)<br />
<br />
6 - China's trade surplus (much of it with the United States) climbed 140 percent in June compared to a year earlier.(source: <!-- m --><a class="postlink" href="http://www.bloomberg.com/news/2010-07-10/china-june-trade-surplus-20-02-billion-exports-rise-44-customs-says.html">http://www.bloomberg.com/news/2010-07-1 ... -says.html</a><!-- m -->)<br />
<br />
7 - This is what American workers now must compete against: in China a garment worker makes approximately 86 cents an hour and in Cambodia a garment worker makes approximately 22 cents an hour.( source: <!-- m --><a class="postlink" href="http://theeconomiccollapseblog.com/archives/the-declining-value-of-work">http://theeconomiccollapseblog.com/arch ... ue-of-work</a><!-- m -->)<br />
<br />
8 - According to a poll taken in 2009, 61 percent of Americans "always or usually" live paycheck to paycheck. That was up significantly from 49 percent in 2008 and 43 percent in 2007.(source: <!-- m --><a class="postlink" href="http://www.cnbc.com/id/32862851/">http://www.cnbc.com/id/32862851/</a><!-- m --> )<br />
<br />
9 - According to a recent poll conducted by Bloomberg, 71% of Americans say that it still feels like the economy is in a recession.(source: <!-- m --><a class="postlink" href="http://www.zerohedge.com/article/bloomberg-poll-finds-americans-no-longer-drinking-kool-aid-71-see-economy-mired-recession">http://www.zerohedge.com/article/bloomb ... -recession</a><!-- m --> )<br />
<br />
10 - Banks repossessed 269,962 U.S. homes during the second quarter of 2010, which was a new all-time record.(source: <!-- m --><a class="postlink" href="http://www.reuters.com/article/idUSNLLEIE69820100715">http://www.reuters.com/article/idUSNLLEIE69820100715</a><!-- m -->)<br />
<br />
11 - Banks repossessed an average of 4,000 South Florida properties a month in the first half of 2010, up 83 percent from the first half of 2009.(source: <!-- m --><a class="postlink" href="http://www.bizjournals.com/southflorida/stories/2010/07/12/daily12.html?ana=from_rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+bizj_southflorida+%28South+Florida+Business+Journal%29&utm_content=Google+Reader">http://www.bizjournals.com/southflorida ... gle+Reader</a><!-- m -->)<br />
<br />
12 - According to RealtyTrac, a total of 1.65 million U.S. properties received foreclosure filings during the first half of 2010.(source: <!-- m --><a class="postlink" href="http://www.realtytrac.com/contentmanagement/pressrelease.aspx?channelid=9&itemid=9555">http://www.realtytrac.com/contentmanage ... temid=9555</a><!-- m -->)<br />
<br />
13 - The Mortgage Bankers Association recently announced that demand for loans to purchase U.S. homes has sunk to a 13-year low.(source: <!-- m --><a class="postlink" href="http://www.newsdaily.com/stories/tre66d1l2-us-usa-economy-mortgages/">http://www.newsdaily.com/stories/tre66d ... mortgages/</a><!-- m -->)<br />
<br />
14 - Only the top 5 percent of U.S. households have earned enough additional income to match the rise in housing costs since 1975.(source: <!-- m --><a class="postlink" href="http://www.dailyfinance.com/story/are-the-rich-getting-richer-the-data-says-yes/19356546/">http://www.dailyfinance.com/story/are-t ... /19356546/</a><!-- m -->)<br />
<br />
15 - 1.41 million Americans filed for personal bankruptcy in 2009 - a 32 percent increase over 2008.(source: <!-- m --><a class="postlink" href="http://www.mybudget360.com/141-million-americans-filed-for-personal-bankruptcies-in-2009-a-jump-of-32-percent-from-2008-more-and-more-average-americans-resorting-to-bankruptcy-even-with-tougher-rules-to-file/">http://www.mybudget360.com/141-million- ... s-to-file/</a><!-- m --> )<br />
<br />
16 - Back in 1950 each retiree's Social Security benefit was paid for by 16 workers. Today, each retiree's Social Security benefit is paid for by approximately 3.3 workers. By 2025 it is projected that there will be approximately two workers for each retiree.(source: <!-- m --><a class="postlink" href="http://theeconomiccollapseblog.com/archives/the-silent-entitlements-monster-social-security-medicare-and-interest-on-the-debt-will-gobble-up-every-single-tax-dollar-by-2020">http://theeconomiccollapseblog.com/arch ... ar-by-2020</a><!-- m --> )<br />
<br />
17 - According to a new poll, six of 10 non-retirees believe that Social Security won't be able to pay them benefits when they stop working.(source: <!-- m --><a class="postlink" href="http://www.usatoday.com/news/washington/2010-07-20-1Asocialsecurity20_ST_N.htm">http://www.usatoday.com/news/washington ... 0_ST_N.htm</a><!-- m -->)<br />
<br />
18 - 43 percent of Americans have less than $10,000 saved for retirement.(source: <!-- m --><a class="postlink" href="http://endoftheamericandream.com/archives/43-percent-of-americans-have-less-than-10000-dollars-saved-for-retirement">http://endoftheamericandream.com/archiv ... retirement</a><!-- m -->)<br />
<br />
19 - According to one survey, 36 percent of Americans say that they don't contribute anything to retirement savings.(source: <!-- m --><a class="postlink" href="http://www.cnbc.com/id/32862851/">http://www.cnbc.com/id/32862851/</a><!-- m -->)<br />
<br />
20 - According to one recent survey, 24% of American workers say that they have postponed their planned retirement age in the past year.(source: <!-- m --><a class="postlink" href="http://money.cnn.com/2010/03/09/pf/retirement_confidence/index.htm">http://money.cnn.com/2010/03/09/pf/reti ... /index.htm</a><!-- m -->)<br />
<br />
21 - The Conference Board's Consumer Confidence Index declined sharply to 52.9 in June. Most economists had expected that the figure for June would be somewhere around 62.(source: <!-- m --><a class="postlink" href="http://www.conference-board.org/data/consumerconfidence.cfm">http://www.conference-board.org/data/co ... idence.cfm</a><!-- m -->)<br />
<br />
22 - Retail sales in the U.S. fell in June for a second month in a row.(source: <!-- m --><a class="postlink" href="http://www.bloomberg.com/news/2010-07-11/retail-sales-in-u-s-probably-fell-for-second-month-as-economy-moderated.html">http://www.bloomberg.com/news/2010-07-1 ... rated.html</a><!-- m -->)<br />
<br />
23 - Vacancies and lease rates at U.S. shopping centers continued to get worse during the second quarter of 2010.(source: <!-- m --><a class="postlink" href="http://online.wsj.com/article/SB10001424052748704178004575351350812562256.html?mod=WSJ_article_MoreIn">http://online.wsj.com/article/SB1000142 ... cle_MoreIn</a><!-- m -->)<br />
<br />
24 - Consumer credit in the United States has contracted during 15 of the past 16 months.(source: <!-- m --><a class="postlink" href="http://theeconomiccollapseblog.com/archives/credit-crunch-2010">http://theeconomiccollapseblog.com/arch ... runch-2010</a><!-- m -->)<br />
<br />
25 - During the first quarter of 2010, the total number of loans that are at least three months past due in the United States increased for the 16th consecutive quarter.(source: <!-- m --><a class="postlink" href="http://online.wsj.com/article/SB10001424052748704513104575256680430484878.html?mod=WSJ_hpp_LEFTWhatsNewsCollection">http://online.wsj.com/article/SB1000142 ... Collection</a><!-- m -->)<br />
<br />
26 - Things are now so bad in California that in the region around the state capital, Sacramento, there is now one closed business for every six that are still open.(source: <!-- m --><a class="postlink" href="http://www.sacbee.com/topstories/story/2536025.html">http://www.sacbee.com/topstories/story/2536025.html</a><!-- m -->)<br />
<br />
27 - The state of Illinois now ranks eighth in the world in possible bond-holder default. The state of California is ninth.(source: <!-- m --><a class="postlink" href="http://endoftheamericandream.com/archives/illinois-bankrupt">http://endoftheamericandream.com/archiv ... s-bankrupt</a><!-- m -->)<br />
<br />
28 - More than 25 percent of Americans now have a credit score below 599, which means that they are a very bad credit risk.(source: <!-- m --><a class="postlink" href="http://endoftheamericandream.com/archives/money-crunch-how-can-an-economy-built-on-debt-function-if-nobody-can-get-loans">http://endoftheamericandream.com/archiv ... -get-loans</a><!-- m -->)<br />
<br />
29 - On Friday, U.S. regulators closed down three banks in Florida, two in South Carolina and one in Michigan, bringing to 96 the number of U.S. banks to be shut down so far in 2010.(source: <!-- m --><a class="postlink" href="http://www.usatoday.com/money/industries/banking/2010-07-16-bank-failures_N.htm?csp=34money&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+UsatodaycomMoney-TopStories+%28Money+-+Top+Stories%29&utm_content=Google+Reader">http://www.usatoday.com/money/industrie ... gle+Reader</a><!-- m -->) <br />
<br />
30 - The FDIC's deposit insurance fund now has negative 20.7 billion dollars in it, which represents a slight improvement from the end of 2009.(source: <!-- m --><a class="postlink" href="http://online.wsj.com/article/SB10001424052748704513104575256680430484878.html?mod=WSJ_hpp_LEFTWhatsNewsCollection">http://online.wsj.com/article/SB1000142 ... Collection</a><!-- m -->)<br />
<br />
31 - The U.S. federal budget deficit has topped $1 trillion with three months still to go in the current budget year.(source: <!-- m --><a class="postlink" href="http://www.usatoday.com/money/economy/2010-07-13-federal-budget-deficit_N.htm">http://www.usatoday.com/money/economy/2 ... icit_N.htm</a><!-- m -->)<br />
<br />
32 - According to a U.S. Treasury Department report to Congress, the U.S. national debt will top $13.6 trillion this year and climb to an estimated $19.6 trillion by 2015.(source: <!-- m --><a class="postlink" href="http://www.reuters.com/article/idUSN088462520100608">http://www.reuters.com/article/idUSN088462520100608</a><!-- m -->)<br />
<br />
33 - The M3 money supply plunged at a 9.6 percent annual rate during the first quarter of 2010.(source: <!-- m --><a class="postlink" href="http://www.presstv.ir/detail.aspx?id=128098&sectionid=3510213">http://www.presstv.ir/detail.aspx?id=12 ... id=3510213</a><!-- m -->)<br />
<br />
34 - According to a new poll of Americans between the ages of 44 and 75, 61% said that running out money was their biggest fear. The remaining 39% thought death was scarier.(source: <!-- m --><a class="postlink" href="http://www.walletpop.com/blog/2010/07/07/compared-to-money-shortage-fear-of-death-no-biggie/">http://www.walletpop.com/blog/2010/07/0 ... no-biggie/</a><!-- m -->)<br />
<br />
35 - One study found that as of 2007, the bottom 80 percent of American households held about 7% of the liquid financial assets.(source: <!-- m --><a class="postlink" href="http://www.dailyfinance.com/story/are-the-rich-getting-richer-the-data-says-yes/19356546/">http://www.dailyfinance.com/story/are-t ... /19356546/</a><!-- m -->)<br />
<br />
36 - The bottom 40 percent of all income earners in the United States now collectively own less than 1 percent of the nation’s wealth.(source: <!-- m --><a class="postlink" href="http://www.informationclearinghouse.info/article25430.htm">http://www.informationclearinghouse.inf ... e25430.htm</a><!-- m -->)<br />
<br />
37 - The number of Americans with incomes below the official poverty line rose by about 15% between 2000 and 2006, and by 2008 over 30 million U.S. workers were earning less than $10 per hour.(source: <!-- m --><a class="postlink" href="http://endoftheamericandream.com/archives/22-statistics-that-prove-that-the-middle-class-is-being-systematically-wiped-out-of-existence-in-america">http://endoftheamericandream.com/archiv ... in-america</a><!-- m -->)<br />
<br />
38 - According to one recent study, approximately 21 percent of all children in the United States are living below the poverty line in 2010 - the highest rate in 20 years.(source: <!-- m --><a class="postlink" href="http://theeconomiccollapseblog.com/archives/more-than-1-in-5-american-children-are-now-living-below-the-poverty-line">http://theeconomiccollapseblog.com/arch ... verty-line</a><!-- m -->)<br />
<br />
39 - For the first time in U.S. history, more than 40 million Americans are on food stamps, and the U.S. Department of Agriculture projects that number will go up to 43 million Americans in 2011.(source: <!-- m --><a class="postlink" href="http://thetruthwins.com/archives/40-million-americans-on-food-stamps">http://thetruthwins.com/archives/40-mil ... ood-stamps</a><!-- m -->)<br />
<br />
40 - A new Rasmussen Reports national telephone survey has found that just 23% of American voters nationwide believe the federal government today has the consent of the governed.(source: <!-- m --><a class="postlink" href="http://www.rasmussenreports.com/public_content/politics/general_politics/july_2010/23_say_u_s_government_has_the_consent_of_the_governed">http://www.rasmussenreports.com/public_ ... e_governed</a><!-- m -->)</span></span></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-20121797709046048172010-08-03T19:52:00.003+05:302010-08-05T19:44:42.166+05:30Instant messaging to all networks in your Browser<div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">IMO.im is new way of chatting in your browser.</span></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">check out its features</span></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><br />
</span></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">A single login for all your IM accounts.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/link.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">imo lets you link your accounts on aim, gmail, msn, skype, etc. When </span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">you login to a linked account, you will automatically be logged into all the accounts you have linked to it as well. This way, you only have to enter one login to access all your instant messenging accounts.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">This feature requires no additional registration or sign-up. Simply login with your pre-existing usernames and passwords. Once you are logged into multiple accounts, you can link the active accounts in the session by clicking the "link accounts" button in the "Accounts" menu. A green bar will pop up at the top of the page alerting you that your accounts have been linked.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Star the buddies you chat with most for easy access!</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/favbuddies1.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">imo places the buddies you star in a group called "favorites" at the top of your buddylist. this helps you easily see whether your favorite buddies are online or not.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">to star or unstar a buddy, simply hover your cursor over his/her screenname in your buddylist and click the star in the box that appears. alternately, you can directly drag buddies in and out of the "favorites" group.</span></div></div><div id="clear" style="clear: both;"></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="Pop-OutMode"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Chat and browse at the same time with Pop-Out mode.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/popout.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Pop-Out mode opens imo in a separate browser window. You can set imo to Pop-Out mode by clicking the "Pop-out" link located at the top-right corner of your screen, above your buddy list.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">In order to exit Pop-Out mode, click on the "Sign-On" tab at the top of your browser window and then click on "Switch to Full Screen."</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Voice Chat with anyone.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/voice.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">With imo, you can voice chat with any of your buddies, regardless of what IM client they use and whether that client has built-in voice support.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To start a voice chat, simply click the, "Voice Chat" link in the im window of the buddy you want to voice chat with.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Video Chat with anyone.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/video.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">imo's video chat feature works just like the voice chat feature, but with video. It allows you to video chat with any of your buddies, regardless of what IM client they use and whether that client has built in video chat capabilities.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To start a video chat, simply click the, "Video Chat" link in the im window of the buddy you want to hold a video chat with.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Change how your buddies are displayed in your buddy </span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/rename.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div><span class="Apple-style-span">list.</span></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Simply hover your cursor over your buddy's screenname in the buddylist. Click on the "Rename" link in the box that appears, and enter the name you would like your buddy to appear under in your buddylist.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"></span><br />
<div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Upload and view buddy icons directly in imo.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/uploadicon.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">You can easily upload a new buddy icon for your profile through imo by clicking on the "Upload Pic" link located at the top of the buddylist.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To view someone's buddy icon, hover your cursor over their screenname in the buddylist window. Their icon will appear in the window that pops-up.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Control who can instant message you with invisibilty and blocking capabilities.</span><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/blockinvisible.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span">When you </span><u><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">block</span></u><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"> a buddy, you will appear offline to that buddy, and he/she will not be able to instant message you, as if you are offline.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To block a buddy, hover your cursor over his/her screenname in your buddy list and click on the link that says "Block". All your blocked buddies will appear in a group labeled "Blocked". To unblock a buddy, go to the "Blocked" group and hover your cursor over the buddy's screename. Click on the link "Unblock" that appears.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">When you make yourself </span><u><span class="Apple-style-span">invisible,</span></u><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"> you will appear offline to all of your buddies. This mode gives you the ability to instant message buddies you want to chat with, while continuing to appear offline to everyone else.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To make yourself invisible, select the "Invisible" option from the status drop-down menu. The status drop-down menu is located at the top of your buddy list, above the search bar.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="PrivacyPreferences"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><b><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Privacy Preferences -</span></b><span class="Apple-style-span"> Choose who can send you messages.</span><br />
<div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/nonbuddy2.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">By default, imo blocks messages sent by people who are not on your buddy list.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">To change this setting, click the "Preferences" link in the top right corner of your browser window. In the pop-up that appears, click "Allow individuals who are not on my buddy list to contact me.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="BuddyListSearch"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><b><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Buddy List Search - </span></b><br />
<div style="text-align: right;"><img class="img_features" src="https://imo.im/graphics/features/search.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Find your buddies, fast!</span></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Simply type in the name of the buddy that you would like find in the "Search Buddies" field at the top of your buddy list.</span><br />
<span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">The search will encompass your online as well as offline buddies.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="BuddyListOrganization"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><b><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Buddy List Organization-</span></b><span class="Apple-style-span"> Sort your contacts by groups.</span><br />
<div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">imo lets you move contacts between groups. To move a buddy from one contact group to another, just click and drag the name of the buddy to the new contact group.</span></div></div><div id="clear" style="clear: both;"></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="KeyboardShortcuts"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Chat faster with imo Keyboard Shortcuts:</span></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">Tab = Cycles through open chat windows.<br />
ESC = Close current chat window.<br />
Forward slash = Moves focus to the Search Buddy field.</span></div></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">Who's at their desk and who's on the run?</span></div><div style="font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;">imo puts a mobile phone icon next to the screenname of any buddies who are chatting from their phone, to help you keep track of your buddies.</span></div></div><div id="clear" style="clear: both;"></div></div><div style="background-color: white; border: 0px dotted rgb(153, 153, 153); clear: both; font-family: helvetica; margin-bottom: 50px; margin-left: 30px; overflow: hidden; padding: 0px 20px 15px 0px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;"><a href="http://www.blogger.com/post-edit.g?blogID=2006337753022036879&postID=2012179770904604817" name="Translate"></a></span></span><br />
<div id="temp2" style="float: left; margin-left: 0px; margin-right: 0px; margin-top: 4px;"></div><div id="sectiontitle" style="border-color: orange orange rgb(187, 187, 187); border-style: solid; border-width: 0px; font-size: 18px; font-weight: normal; letter-spacing: 1px; margin-bottom: 0px; margin-top: 0px; padding: 0px; text-align: left; width: 492px;"><div style="font-size: 18px; font-weight: bold; letter-spacing: 0px; line-height: 22px;"><span class="Apple-style-span">imo.im in every language!</span><br />
<div style="text-align: right;"><div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img class="img_features" src="https://imo.im/graphics/features/translate.gif" style="border: 0px solid purple; float: right; margin: 0px 10px 5px;" /></div></div></div><div style="color: #666666; font-size: 13px; line-height: 16px;"><span class="Apple-style-span" style="font-family: 'Trebuchet MS',sans-serif;"><span class="Apple-style-span" style="color: black;">Via our user-driven translation program, imo.im offers language support for Spanish, Portuguese, Russian, Italian, Macedonian, French, Turkish, and more.</span></span></div></div></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-46677818010850260902010-08-02T19:53:00.000+05:302010-08-02T19:53:31.313+05:30Windows 7 SP1 Crack Download<span id="intelliTxt">A workaround designed to bypass the activation process of <strong>Windows 7 Service Pack 1 (SP1)</strong> has already been released in the wild, and is available for download from various sources of illegal content, including warez websites and torrent trackers. Dubbed the Windows 7 Loader, the activation crack is updated constantly, especially as Microsoft is also constantly tackling workarounds that illegally activate the latest iteration of the Windows client. <br />
<br />
<div align="center" class="article_ad" style="margin: 10px 0pt 10px 10px;"><script type="text/javascript">
<!--
google_ad_client = "pub-2364887827571271";
/* News, 300x250 */
google_ad_slot = "4688543047";
google_ad_width = 300;
google_ad_height = 250;
//-->
</script> <script src="http://pagead2.googlesyndication.com/pagead/show_ads.js" type="text/javascript">
</script> </div>What is interesting is that the authors of Windows 7 Loader are indicating that the crack will also work with Windows 7 SP1. Microsoft only recently released the first public Beta development milestone of Service Pack 1, and the upgrade is also designed to render useless an impressive number of cracks, among other things. <br />
<br />
According to the software giant, Windows 7 SP1 contains the <strong>Windows Activation Technologies for Windows 7 (KB 971033)</strong>, an anti-crack update released by Microsoft earlier this year. At the time of the initial release, the Redmond company revealed that the Windows Activation Technologies update was designed to kill no less than 70 illegal activation exploits for the RTM Build 7600 of the operating system. It appears that Windows 7 Loader is one exploit that the Windows Activation Technologies cracks killer is not capable of, well, killing. <br />
<br />
Of course, Windows 7 SP1 is only due in the first half of next year, most probable in the first quarter of 2011. By that time, Microsoft can update its cracks killer in order to tackle all Windows 7 activation workarounds, including those designed for the first Windows 7 upgrade. <br />
<br />
The authors of the Windows 7 Loader underline that the crack is especially designed to render WAT (Windows Activation Technologies) useless. The workaround is set up to inject a SLIC (Software Licensing Description Table) into the Windows 7 system ahead of the Windows boot process, managing to bypass the activation process and pass the OS off as genuine.</span><br />
<br />
<span id="intelliTxt">God bless Piracy! </span><br />
<span id="intelliTxt"><br />
</span><br />
<span id="intelliTxt">via news.softpedia.com</span>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-18803668163390782812010-07-30T15:56:00.000+05:302010-07-30T15:56:42.235+05:30How cheap technology is costing us??Our technology has never been smarter - or cheaper. It's just a shame about the whole economic damage, worker exploitation, environmental catastrophe side of things.<br />
<div class="content"><br />
Cheap technology isn't as cheap as you might think. When something's designed to a particular price, compromises have to be made. Those compromises aren't just in the design, although of course you can't expect Luxury quality at cheap prices; they're in every part of the technology company's business from the factories it uses to the way it provides technical support. Typically, cheap technology means cutting every possible corner to make the price as low as possible.<br />
<br />
What happens when you cut one corner too many? Let's ask Dell, the pioneer of ultra-cheap PCs, who managed to ship 11.8 million faulty - and potentially explosive - PCs between 2003 and 2005<br />
<br />
The problem was with dodgy capacitors, manufactured from a stolen - and, it turned out, incorrect - formula. Writing in The Independent in 2003, Charles Arthur noted that Dell was aware of the compromised capacitors, and interviewed Dennis Zogbi of Paumanok Publications, who said: "People want Western quality and Chinese prices. Well, you can't have both."<br />
<br />
Cheap technology is a balancing act between price and quality control, and it seems that Dell lost its balance: the NYT reports that Dell suffered far more from bad capacitors than its rivals.<br />
<br />
Despite internal tests finding that Optiplex desktops might have a failure rate as high as 97%, Dell didn't want an enormous and enormously expensive product recall, so it had a brilliant idea: it would blame its customers for the faulty computers.<br />
<br />
According to the NYT Dell told the University of Texas its computers were failing because staff were "making them perform difficult math calculations."<br />
<br />
<img alt="Image" src="http://mos.futurenet.com/techradar/classifications/world%20of%20tech/images/techtoocheap/Bad-420-90.jpg" /><br />
<br />
<span style="font-weight: bold;">BAD CAPACITORS:</span> This Dell customer's capacitors don't look too clever. In total, Dell shipped 11.8 million machines with capacitors likely to fail<br />
<br />
Still, at least if your Optiplex exploded you'd be able to speak to somebody knowledgeable about it. Wouldn't you? Nope. Dell was one of the first tech firms to outsource its customer service and technical support to Bangalore, and while the results were so bad and unpopular that Dell very quickly reinstated US-based support for its lucrative corporate customers, the idea stuck. These days, cheap kit means outsourced or online-only, irritating and inadequate technical support. You get what you pay for.<br />
<br />
<span style="font-weight: bold;">Unemployment and unhappy workers</span><br />
<br />
Decent wages, employee healthcare, pensions and other benefits aren't compatible with cheap kit.<br />
<br />
Because of those costs, Western technology firms have been outsourcing assembly work since the 1980s. Incredibly, there are fewer people making computers in the US now than there were in the 1970s: writing in BusinessWeek, former Intel boss Andy Grove says: "manufacturing employment in the US computer industry is about 166,000, lower than it was before the first PC, the MITS Altair 2800, was assembled in 1975."<br />
<br />
<span style="font-weight: bold;">OUTSOURCED:</span> There are fewer people employed making computers in the US today than there were when this was cutting-edge tech<br />
<br />
People still make our gadgets, of course. They just don't do it in the West. From Xbox 360s to iPhone 4s, many of our devices are put together in China. China's biggest electronics subcontractor, Foxconn, has around 800,000 employees and adds 100,000 more every year; Grove says that Foxconn employs "more than the combined worldwide headcount of Apple, Dell, Microsoft, HP, Intel and Sony."<br />
<br />
In total, an estimated 1.5 million people work in Asian assembly plants. For every Western employee a technology firm has, there are ten Asian assembly workers putting its products together - often on very low wages and in poor working conditions.<br />
<br />
By outsourcing the assembly work, we're missing out on money that would otherwise be spent locally. With no factories here, there are no machines for local firms to service, no subcontractors providing key components, no armies of hungry workers for the local shops and take-aways to feed, no pay packets injecting cash into local businesses from cake shops to car dealers.<br />
<br />
For now it's Foxconn's turn in the sun, but that won't last forever. The same things that eventually made the US too expensive for tech firms - rising wages, good working conditions and organised labour - are starting to happen in China, too.<br />
<br />
After a wave of suicides led to unwelcome foreign attention, Foxconn massively increased employee wages; meanwhile, a wave of strikes in China is forcing other firms to pay more, too.<br />
<br />
That's good and bad. It's good if you're getting a pay rise, but it's not so good if your employer decides to up sticks to somewhere cheaper. And there is always somewhere cheaper. Right now that's inland China, where living costs and therefore wage expectations are lower than in coastal regions, so firms are moving there.<br />
<br />
In the longer term firms may leave China altogether and go where labour costs are lower: South America, perhaps, or Vietnam. They're already thinking about it.<br />
<br />
<span style="font-weight: bold;">Carcinogens, conflict and child labour</span><br />
<br />
Tim Hunt is with Ethical Consumer magazine, which hopes to make us think again about cheap, disposable technology. As EC reports, the gadgets we dump often end up in places like Indonesia, where "those processing the waste are often overworked (up to 18 hours per day) and underpaid, and the use of child labour is common… often unprotected, workers use fire and mercuric acid baths to extract the precious metals. Burning releases dioxins - some of the most toxic compounds on Earth - while the acid residue contaminates drinking water."<br />
<br />
"There are also problems around the mining of natural resources, from the Congo for instance," Hunt told TechRadar. "Here the trade in metals has been blamed for fuelling the conflict that has raged there for several years."<br />
<br />
<img alt="Image" src="http://mos.futurenet.com/techradar/classifications/world%20of%20tech/images/techtoocheap/ewaste-420-90.jpg" /><br />
<br />
<span style="font-weight: bold;">WASTED:</span> Disposable technology doesn't always end up in recycling plants. E-Waste has become a global problem<br />
<br />
As technology becomes increasingly fashion-driven, this year's must-have gadget quickly becomes unwanted - and the move to mobile-based computing means things are speeding up. Where a PC has a useful lifespan of three to five years, we replace our mobiles every 18 months.<br />
<br />
"It is clearly worse than it was 20 years ago because there is just more technology around and things are progressing so quickly," Hunt says. "If there is a closed loop where all products and materials are recycled then it shouldn't be a problem. Unfortunately, even with the new EU regulations, much of the waste finds its way into the landfills of poorer countries."<br />
<br />
Greenpeace wants to see tech firms eradicate toxic chemicals altogether. "The issue of toxicity is overarching," it says. "Until the use of toxic substances is eliminated, it is impossible to secure 'safe' recycling."</div><div class="content"> </div><div class="content"><div class="content"><span style="font-weight: bold;"><span style="font-size: 200%; line-height: 116%;"><span style="color: red;">Can we fix this??</span></span></span><br />
<br />
Perhaps the Electronics Industry Code of Conduct will save the world. The work of the Electronic Industry Citizenship Coalition, the EICC is a code of practice for electronics companies that prohibits the use of child labour, illegal working practices, dumping poison into duck ponds and so on.<br />
<br />
It's been around since 2004 and signatories include Dell, who Greenpeace is currently attacking for its use of toxic chemicals and Microsoft, whose KYE subcontractor has been accused of child labour. So that's working well.<br />
<br />
"Images of electronic waste in the form of discarded computers and other 'electro-scrap' dumped in Asia, other social and labour issues as well as pressure from civil society, prompted the electronics sector to develop an Electronics Industry Code of Conduct," Greenpeace says.<br />
<br />
"However, despite this Code, the hi-tech sector continues to produce ever shorter-life, often superfluous products with inherently hazardous materials. Why are hi-tech corporations, which profess to be responsible corporate citizens, allowing this to happen?"<br />
<br />
It's a rhetorical question. "One answer is that CSR [Corporate Social Responsibility] initiatives, whether they involve Codes of Conduct or reporting guidelines, are voluntary," Greenpeace adds. "At best, CSR can be a way for the best companies to lead the way. At worst, CSR initiatives can even be a diversionary tactic, used by industry to pretend that they are taking action and to avoid regulation."<br />
<br />
<img alt="Image" src="http://mos.futurenet.com/techradar/classifications/world%20of%20tech/images/techtoocheap/ethicalconsumer-420-90.jpg" /><br />
<br />
<span style="font-weight: bold;">BAD GRADES:</span> Ethical Consumer grades firms on their Corporate Social Responsibility pronouncements. It's not a great result for HTC<br />
<br />
<span style="font-weight: bold;">Economic realities</span><br />
<br />
Those iPhones you see being assembled in Foxconn factories have an estimated profit margin of 60 per cent. Could Apple still make money without using Foxconn? Absolutely. Could it still make money if its kit was assembled in the US? Probably. Will it try? No chance.<br />
<br />
Apple, like every other corporation, must give its shareholders the best return on their investment - and the best way to do that isn't to get your products made in your own country, or to work only with firms whose assembly plants are filled with joy and laughter.<br />
<br />
"Most companies are taking some steps," Tim Hunt says, "but as they all strive to generate more profit by producing more and more goods at the lowest possible price, they are clearly going to come into conflict with labour and the environment."<br />
<br />
Perhaps the answer is to embarrass them. When Greenpeace wanted to draw public attention to the tech industry's environmental record in 2006 it picked on Apple, which was actually one of the more environmentally friendly firms; nevertheless, the Green My Apple campaign used Apple's high profile to great effect and Apple made more improvements. Apple now mentions its products' green credentials in its marketing.<br />
<br />
<img alt="Image" src="http://mos.futurenet.com/techradar/classifications/world%20of%20tech/images/techtoocheap/greenerelectronics-420-90.jpg" /><br />
<br />
<span style="font-weight: bold;">POOR FORM:</span> It's no coincidence that the firms low on Greenpeace's green electronics meter tend to be makers of low-cost kit<br />
<br />
Could the same trick work with corporate citizenship? Probably not, because the way our economy works - essentially, shares are owned by large pension funds whose managers are paid by performance and therefore don't really care about the longer term or the bigger picture - means firms' number one priority is short-term profit.<br />
<br />
Then again, perhaps the problem isn't the companies. Maybe it's us. Those pension funds are our pension funds, and we're the people who choose to buy cheap kit. Apple is atypical: the profit margin on a laptop is around 2%, while the margin on a netbook is less than one per cent. The aggressive pricing that makes netbooks so attractive also means manufacturers can be left with a margin of just twenty cents.<br />
<br />
<span style="font-weight: bold;">That means our buying choices matter: if we buy entirely on price, choosing our kit on the basis of who offers the most bang for the least amount of bucks, then we're helping to perpetuate the system.</span><br />
<br />
<span style="font-size: 150%; line-height: 116%;"><span style="color: yellow;">If we want companies to care about the bigger picture, we need to show them that we care about it, too.</span></span></div><div class="content"><span style="font-size: 150%; line-height: 116%;"><span style="color: yellow;"> </span></span></div><div class="content"><span style="font-size: 150%; line-height: 116%;"><span style="color: yellow;">think about it.</span></span></div><div class="content"><span style="font-size: 150%; line-height: 116%;"><span style="color: yellow;"> </span></span></div><div class="content"><span style="font-weight: bold;"></span>Dont forget to say thanks. keep commenting.</div> </div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-48452480102715990492010-07-23T19:24:00.008+05:302010-07-23T19:33:11.507+05:30How Unique and Trackable Is Your Browser?<div style="color: white; font-family: "Trebuchet MS",sans-serif;"><span style="font-size: large;"> </span><span style="font-size: large;">Is your browser configuration rare or unique?</span><br />
</div><div style="color: white; font-family: "Trebuchet MS",sans-serif; text-align: justify;"><span style="font-size: large;">If so, web sites may be able to track you, <i>even if you limit or disable cookies.</i></span><br />
</div><div style="color: white; font-family: "Trebuchet MS",sans-serif; text-align: justify;"><span style="font-size: large;">Panopticlick tests your browser to see how unique it is based on the <a href="https://www.eff.org/deeplinks/2010/01/primer-information-theory-and-privacy">information</a> it will share with sites it visits. </span><br />
<br />
<span style="font-size: large;">Click below and you will be given a uniqueness score, letting you see how easily identifiable you might be as you surf the web.</span></div><div style="color: white; font-family: "Trebuchet MS",sans-serif;"><span style="font-size: large;"><br />
</span></div><div style="color: white; font-family: "Trebuchet MS",sans-serif;"><div><span style="font-size: large;"><a href="https://panopticlick.eff.org/index.php?action=log&js=yes" id="clicklink" title="Click here to test how trackable your browser is">Click here to test how trackable your browser is</a></span></div><div><span style="font-size: large;"><br />
</span></div><span style="font-size: large;">A research project of the Electronic Frontier Foundation</span> </div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-58877683235474283982010-07-23T19:16:00.002+05:302010-07-23T19:21:02.364+05:30Internet Explorer, Firefox, Chrome, and Safari browsers are susceptible to attacks and lets attackers steal user names and addresses<div style="font-family: "Trebuchet MS",sans-serif;">The Internet Explorer, Firefox, Chrome, and Safari browsers are susceptible to attacks that allow webmasters to glean highly sensitive information about the people visiting their sites, including their full names, email addresses, location, and even stored passwords, a security researcher says.</div><div style="font-family: "Trebuchet MS",sans-serif;">In a talk scheduled for next week's Black Hat security conference in Las Vegas, Jeremiah Grossman, CTO of White Hat Security, plans to detail critical weaknesses that are enabled by default in the browsers, which are the four biggest by market share. The vulnerabilities have yet to be purged by the respective browser makers despite months, and in some cases, years of notice.</div><div id="article-mpu-container" style="font-family: "Trebuchet MS",sans-serif;">Among the most serious is a vulnerability in Apple's Safari and earlier versions of Microsoft's IE that exposes names, email addresses, and other sensitive information when a user visits a booby-trapped website. The attack exploits the browsers' autocomplete feature used to automatically enter commonly typed text into websites. It works by creating a webpage with fields carrying titles such as “First Name,” “Last Name,” “Email Address,” and “Credit Card Number” and then adding javascript that simulates the user entering various letters, numbers or keystrokes into each one.</div><div style="font-family: "Trebuchet MS",sans-serif;">Users who in the past have used the autocomplete features to store that information in versions 6 and 7 of IE or versions 4 and 5 of Safari will find that the information will be automatically zapped to the rogue website. No interaction is necessary other than to visit the page. Webmasters can set the input fields to be invisible to better conceal the attack.</div><div style="font-family: "Trebuchet MS",sans-serif;">In the case of Safari, Grossman's proof-of-concept attack simulates a user entering various letters or numbers into the fields. In a demonstration, when the script entered the letter J under a field titled “Name,” the browser automatically exposed “Jeremiah Grossman” to the web server. Grossman said he alerted Apple to the vulnerability on June 17, but received no reply other than an automatic response saying his message had been received.</div><div style="font-family: "Trebuchet MS",sans-serif;">“I would never have talked about this publicly if Apple had taken this seriously,” he told <i>The Register</i>. “I figured somebody else must have found this before because it's so brain-dead simple.” When he sent a follow up query “I never heard anything back, human or robotic.”</div><div style="font-family: "Trebuchet MS",sans-serif;">Tricking IE 6 and 7 into coughing up the autocomplete details works in a similar fashion, but instead of simulating the entering of numbers or letters into a field, Grossman enters a user's down arrow twice and then the enter key to extract the stored information. If more than one record is stored in that field, the script will repeat the process so they can be lifted as well.</div><div style="font-family: "Trebuchet MS",sans-serif;">Grossman's research is the latest to shatter the widely held myth that web surfing is largely an anonymous act, at least when done from a public or widely used IP address. In May, researchers demonstrated how a decade-old browser history disclosure vulnerability made the vast majority of web users <a href="http://www.theregister.co.uk/2010/05/20/browser_history_attack/">vulnerable to practical attacks</a> that lifted their viewing habits, including news articles they've read and the Zip Codes they've entered into online forms. That same month, separate researchers showed how most browsers <a href="http://www.theregister.co.uk/2010/05/17/browser_fingerprint/">leave behind digital fingerprints</a> that can be used to uniquely identify their users.</div><div style="font-family: "Trebuchet MS",sans-serif;">Grossman's research take those findings to new highs. In addition to the weaknesses in IE and Safari, he has uncovered flaws in Mozilla Firefox and Google Chrome that can expose passwords stored by the browsers. The feature is designed to automatically enter the user name and password when a user visits a site such as Gmail or Facebook. The researcher says it's possible for unscrupulous webmasters to steal that information by hiding malicious code on their pages. For the attack to work, an XSS, or cross-site scripting vulnerability must be present on the site on which the stored password is used.</div><div style="font-family: "Trebuchet MS",sans-serif;">Grossman's Black Hat presentation will also demonstrate how a webmaster can silently delete all of a user's browser cookies. The mass cookie deleter works by setting thousands of cookies as soon as a user visits the site. When the number of cookies set exceeds a certain amount – it's about 3,000 for Firefox and just slightly higher for other browsers – all older cookies will automatically be erased. His proof-of-concept takes about 2.5 seconds.<br />
<br />
via www.theregister.co.uk </div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0tag:blogger.com,1999:blog-2006337753022036879.post-30116825120372475622010-07-23T17:51:00.001+05:302010-07-23T17:52:09.000+05:30A Laptop Unveiled by Indian Government For Rs.1,500 Only<table cellpadding="0" cellspacing="2"><tbody>
<tr><td></td> <td><script type="text/javascript">
addthis_pub = 'indobase';
</script> <script src="http://s7.addthis.com/js/152/addthis_widget.js" type="text/javascript">
</script></td></tr>
</tbody></table><div class="text"><div style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img alt="New Laptop" border="0" class="imgbrd" src="http://www.india-server.com/news-images/new-laptop-30646.jpg" width="188" /></div><div class="cap"><b></b>India on Thursday unveiled a Rs.1,500 (around $30) laptop designed specifically for students.</div><table align="left" border="0" cellpadding="0" cellspacing="0" sspace="0" style="width: 310px;" vspace="0"><tbody> </tbody></table><div align="justify"></div><div align="justify">The device is a cross between iPad and tablet PC and is designed by experts from IIT, Kanpur, Kharagpur, Madras and Indian <span class="IL_AD" id="IL_AD3">Institute of Science</span>, Bangalore. It can be charged by a solar panel.</div><div align="justify"></div><div align="justify">However, the device can only be available to students in 2011.</div><div align="justify"></div><div align="justify">On the occasion of the launch of the device, <span class="IL_AD" id="IL_AD2">Human Resource Development</span> Minister Kapil Sibal said, "If more companies decide to manufacture a similar device, prices will come down automatically.”</div><div align="justify"></div><div align="justify">The ministry floated the concept of a low cost laptop some years ago that was to come at Rs.500 ($10). However, the cost has tripled over the years and would cost now around $30 (Rs 1500).</div><div align="justify"></div><div align="justify">The ministry expects the prices to drop to Rs.1,000 ($20) and reach Rs.500($10) as innovations are introduced.</div><div align="justify"></div><div align="justify">The device looks similar to the conventional laptop and comes with a touch screen and a built in key board along with features like a 2 GB RAM memory, Wi-Fi connectivity, USB port, video-conferencing facility, multimedia content, searchable Pdf reader and unzip tool. The mini laptop is powered by a 2-watt system to suit poor power supply areas.</div><div align="justify"></div><div align="justify">"This is real and tangible and we will take it forward. Sun will rise for the Indian students in 2011," Sibal said.</div><div align="justify"></div><div align="justify">The low cost laptops will be distributed in institutions under the National Mission on Education through <span class="IL_AD" id="IL_AD1">Information and Technology</span> (NMEICT) connectivity. Currently, already 8,500 colleges have been connected under this programme.</div></div>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com1tag:blogger.com,1999:blog-2006337753022036879.post-17927280009656202562010-07-23T11:57:00.002+05:302010-07-23T18:28:01.189+05:30Olive unveils India's First 3G Tablet<span class="Apple-style-span" style="font-family: Arial;"></span><br />
<div class="separator" style="clear: both; text-align: center;"><span class="Apple-style-span" style="font-family: Arial;"><a href="http://images.techtree.com/ttimages/story/112364_olive-pad.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="319" src="http://images.techtree.com/ttimages/story/112364_olive-pad.jpg" width="400" /></a></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><br />
</span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">Olive has launched India's first 3G network supporting tablet OlivePad VT-100.</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">Sporting a 7-inch capacitive touchscreen, this tablet comes loaded with Google's Android OS.</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">It's the first Indian tablet to have 3G support and has all major features ideally sought in a full feature tablet.</span></span></div><div></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">The OlivePad is expected to hit Croma retail stores in August and is expected be sold below Rs. 25,000.</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">The all new OlivePad VT-100 comes with 600MHz Qualcomm M7227 chipset and is India's first 3.5G tablet with HSUPA (High Speed Uplink Packet Access) support. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">Olive has loaded 512MB ROM and 512MB RAM which can be expanded to 32GB with a memory card. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">OlivePad will have quad-band GSM support and also would be available with tri-band WCDMA support. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">At the rear of the tablet, there is a 3 megapixel autofocus camera supporting 4x zoom. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">This glossy appearing tablet also has Wi-Fi (802.11 b/g) and Bluetooth support. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">Olive has also added compass, G-sensor, ambient light sensor and dual speakers in the tablet. </span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">Users would be able to read ebooks and browse web over the webkit browser with Flash support.</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">What really makes OlivePad distinct is that it is loaded with features of a tablet as well as a smartphone.</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;"><br />
</span></span></div><div><span class="Apple-style-span" style="font-family: Arial;"><span class="Apple-style-span" style="color: white;">While Apple's iPad tablet is yet to hit Indian shores officially, OlivePad makes an impressive entry.</span></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoS4mLwTk4AVbcd5v8f61yApNV7z6gEfkgMzjP4nwSPuYB0m8ZV9LpW4Q6glWi7G86Ff3JFH20nG0tkd8Y9Kr7kYEA71ao_PHSbYANeGAALKnqILjl16QILkBsM7ZBnokiwi59vcgRLb0g/s1600/olivepad.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="201" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjoS4mLwTk4AVbcd5v8f61yApNV7z6gEfkgMzjP4nwSPuYB0m8ZV9LpW4Q6glWi7G86Ff3JFH20nG0tkd8Y9Kr7kYEA71ao_PHSbYANeGAALKnqILjl16QILkBsM7ZBnokiwi59vcgRLb0g/s400/olivepad.jpg" width="400" /></a></div></div><div style="font-family: 'Times New Roman';"></div><div style="font-family: 'Times New Roman';"></div><span class="Apple-style-span" style="font-family: Arial;"></span>Aadihttp://www.blogger.com/profile/09712795339107135586noreply@blogger.com0