tag:blogger.com,1999:blog-15205109915691636582024-03-13T10:07:19.965+05:30Way2ComputerworldOne Place to get Hacking Tutorials, free softwares, free games, computer tricks, SEO tools, ebooks and much more.....Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comBlogger63125tag:blogger.com,1999:blog-1520510991569163658.post-38399896668148810372014-05-04T14:22:00.000+05:302014-05-05T01:24:27.439+05:304 Key Skills That Will Get You Hired!<div dir="ltr" style="text-align: left;" trbidi="on">
Freshers who understand what recruiters want and prepare themselves for the job market, have an edge<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvQQ-w_HhXZ3yh5BVI78IuvkNDjaMAspyhZWhSQDdcPKvBACQksVlT1rk1HzNTH_xZLTzmwsL-hdTVxHSEhrsceQ0xPHMS_Q-OMRjnBIFNA1BUbPAK3RvX-HJyDMNTpSvunzC85MUSMi4/s1600/fresher.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjvQQ-w_HhXZ3yh5BVI78IuvkNDjaMAspyhZWhSQDdcPKvBACQksVlT1rk1HzNTH_xZLTzmwsL-hdTVxHSEhrsceQ0xPHMS_Q-OMRjnBIFNA1BUbPAK3RvX-HJyDMNTpSvunzC85MUSMi4/s1600/fresher.jpg" /></a></div>
<br />
IT and ITeS companies are no longer mass hirers of technical talent but refined recruiters who are looking for a combination of skills. Thus the best jobs will go to freshers who understand what the industry wants and work on getting there.<br />
<br />
So how do you stand out against the few lakhs who are vying for the same job?<br />
Some key influencers who device hiring strategies. A few excerpts:<br />
<a name='more'></a><br />
<div>
• “Hiring will be focused on getting a ‘productive workforce’ and in the case of freshers it will depend on the degree of hunger he or she has to learn cross-domain skills,’’ says Abdul G Sait, CEO, Basket Option, a venture catalyst company. “So when hiring freshers, it is not as much the technical background that is the differentiator, but this inherent aspiration that makes the difference between hiring that individual or not."</div>
<br />
• Understanding and being able to articulate the short and long term goals of the organisation. A network of professional relationships and company pages on social media can be the key differentiator when it comes to hires.<br />
<br />
“It is essential a fresher understands the ecosystem of the company,’’ says Anjana Vivek, founder director VentureBean Consulting Private Limited, a consultancy focused on improving the capability index of management teams, systems and processes across the business sectors of the future. “A candidate who is able to communicate about the organisation’s culture and about the prominent people in the organisation is viewed more positively than someone who has just a broad knowledge of the company."<br />
<br />
• Parallel skilling over and above the course-ware is an added advantage.<br />
<br />
"An electronics engineer who has undertaken even capsule courses, like specialisation in mobile apps or emerging skills sets that include Web 2.0, Ruby On Rails, XML or EAI stands a better chance as he has shown an interest and has some basic knowledge of where the industry is headed,’’ says Sait.<br />
<br />
• Recruitment teams are hard pressed for time, it is thus essential that the candidate build and present his brand value.<br />
<br />
"Organisations like to hire freshers who are curious, fast learners who can do so on the job, and show signs of being lifelong learners,’’ says Vivek. “It is expected that they will not have in-depth real world knowledge. The differentiating factor is thus, their response to interview questions."</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com1tag:blogger.com,1999:blog-1520510991569163658.post-17168851935009065142014-03-25T02:06:00.002+05:302014-03-25T02:06:39.579+05:30Fix Common Problems with your Computer!.....<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEMnOh52Ho9fGkqAphQuAiD1g51vVAn4BO7TCp-PAyt6MJAmyB56goIQfwrOffDQNH6LOz0RkIRTzwCaWLQ4nQ-VysrLO6fHQaFN_4gJpZl0-JlTgVR6jy43ChutNsqGyvauVvWQvME4/s1600/index.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgMEMnOh52Ho9fGkqAphQuAiD1g51vVAn4BO7TCp-PAyt6MJAmyB56goIQfwrOffDQNH6LOz0RkIRTzwCaWLQ4nQ-VysrLO6fHQaFN_4gJpZl0-JlTgVR6jy43ChutNsqGyvauVvWQvME4/s1600/index.jpeg" /></a></div>
1. MONITOR LED IS BLINKING<br />Check all the connections like Monitor Cable, Data cables,RAM, Display Card , CPU connections.<br /><br />2. CONTINUOS THREE BEEPS<br />Problem in RAM Connection.<br />
<a name='more'></a><br />3. THREE BEEPS ( 1 Long 2 Short)<br />Problem in Display Card Connection<br /><br />4. THREE LONG BEEPS PERIOD WISE<br />Problem in BIOS or RAM (Basic Input Output System)<br /><br />5. CONTINUOS NON-STOP BEEPING<br />Key Board Problem (I.e.; Some Key is pressed for Longer time)<br /><br />6. FDD LED IS GLOWING CONTINUOSLY<br />Data cable to be connected properly (twisted cable).<br /><br />7. NO DISPLAY ON THE SCREEN AT ALL<br />Hard Disk cable connected wrongly. Connect rightly seeing the Red mark (Faces power supply) and then Restart.<br /><br />8. POWER LED IS OFF<br />a. Check main power cord<br />b. Check S.M.P.S.<br />c. Check Mother Board connection<br /><br />9. SHOWING CMOS ERROR<br />Replace 3 Volt battery of Mother Board . Set Original Settings Manually.(Refer CMOS Setup chart)<br />Enter your search termsSubmit search form<br /><br />10. SHOWING FDD ERROR OR FLOPPY DRIVE IS NOT WORKING PROPERLY<br />Check Power cord of FDD , Data Cables , set CMOS & Finally the Check drive.<br /><br />11. SHOWING HDD ERROR OR HARD DISK FAILURE<br />a. Check Power Cord<br />b. Check connection of HDD<br />c. Check Data cable<br />d. Check Hard Disk parameters in CMOS or Auto detecting Setting Partitions by Fdisk Command, then format it to set track 0.<br /><br />12. MOTHER BOARD HANGS DUE TO UNSTABILIZED POWER SUPPLY<br />a. Check S.M.P.S<br />b. RAM not functioning properly.<br />c. Software problem (due to using pirated software)<br />d. CPU fan not functioning properly.<br /><br />13. DANCING SCREEN<br />a. Check Display card connection<br />b. Virus Problem<br />c. Video Memory Problem<br /><br />14. SHAKING SCREEN<br />a. Earthing problem<br />b. Magnetic waves comes around.<br /><br />15. CPU CABINET SHOCK<br />a. Check Earthing<br />b. Check main power cord.<br /><br />16. NON-SYSTEM DISK ERROR<br />a. Floppy Drive having different disk (Non-Bootable Disk) OR CMOS Parameters for Hard Disk may not be set properly.<br />b. Hard Disk Partitions may not be created.<br />c. Hard Disk may not be formatted.<br /><br />7. MISSING OPERATING SYSTEM<br />The System files missing namely Ie; command.com} - User File IO.SYS & MS_DOS.SYS } - Hidden Files. These above three files required for Start up of the system that can be transferred by using SYS C: Command OR While the time of formatting by using Format c:/u/s<br /><br />18. MISSING COMMAND INTERPRETOR<br />May the file Command.com is corrupted OR Infected by Virus OR Some one has Erased it.<br /><br />19. SHOWING I/O ERROR<br />a. The type of Hard Disk in CMOS may not be set properly.<br />b. Operating system used for formatting is not valid<br /><br />20. SHOWING DIVIDE OVER- FLOW MESSAGE<br />a. May some Directories or Files crash with other files.<br />b. Use CHKDSK/F or SCANDISK Command to correct it.<br /><br />21. HARD DISK MAKING NOISE WHILE PROCESSING<br />a. Unstabilized power supply.<br />b. Check for Loose Contact.<br />c. Do not use Y Connectors for Hard Disk.<br />d. It may create Bad Sector OR Weak Hard Disk.<br /><br />22. HARD DISK HANGS WHILE PROCESSING<br />Check for Bad Sector by using CHKDSK or SCANDISK Command. If found format the Hard Disk and set Partition before that area.(This is the only procedure to use Hard Disk with Bad Sector) OR (To avoid Bad Sectors use Standard Power Supply)<br /><br />23. HARD DISK NOT DETECTED<br />a. Check Power Connector<br />b. Check Data Cables<br />c. Check Jumpers<br /><br />24. PARTITION NOT SHOWN<br />Operating System where the Hard Disk formatted is not supported with present Mother Board. For Eg: Hard Disk formatted with Pentium System will hide their partitions for 486 System.<br /><br />25. MMX/DLL FILE MISSING<br />May the above files may be corrupted due to power failure or Virus. Make available above files from other Computer. OR Reinstall Windows 98 Operating System. (This procedure will not make any effect on existing Data).<br /><br />26. WINDOWS REGISTRY ERROR<br />This will happen due to sudden ON/OFF of the system. Final solution is to Reinstall Operating System.<br /><br />27. DISPLAY COLOUR DOES NOT MATCH<br />a. Configure Display Card properly with their CD.<br />b. The Standard setting for Windows is set it to 800x600 for better performance.<br /><br />28. UNKNOWN DEVICE FOUND<br />May the Driver utility is not provided with operating system . Insert Driver CD and install software for the above Device.<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-15966537896640446092014-03-22T17:09:00.004+05:302014-03-22T17:09:33.510+05:30Microsoft extends security support for Windows XP<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiHHhhplk3Cru7h4Z7KCGUvAWCWifcF8xS0riYIPYf6Fiwns1b0trMbmCtW8Bl2CnVafxiC2OngDos9nQozsqGFhUcKW0981DGfRhlXX4ysNfpiYVTjLuAdV4WrmUqToWmJQ5wIDE0Gp0/s1600/xp.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiHHhhplk3Cru7h4Z7KCGUvAWCWifcF8xS0riYIPYf6Fiwns1b0trMbmCtW8Bl2CnVafxiC2OngDos9nQozsqGFhUcKW0981DGfRhlXX4ysNfpiYVTjLuAdV4WrmUqToWmJQ5wIDE0Gp0/s1600/xp.jpeg" /></a></div>
Despite so many warnings from Microsoft and Cyber Security Experts, Windows XP is still being used by a number of Government organizations, Financial institutions as well as big Corporations all around the world.<br />
<a name='more'></a><br />Michael Kan reported from Beijing that Windows XP will continue receiving security support in China after the April 8 cutoff date. Kan's analysis stemmed from an official Microsoft post, in Chinese, on Sina Weibo, the Chinese analog to both Facebook and Twitter. That's tremendous news for Windows XP users everywhere -- especially for those using Chinese-language versions of Windows XP.<br />
<br />If we look at the statistics then almost 30% of computers you will find that still run Windows XP, including banks, airline companies, and other huge enterprises, the count in real is likely to be even higher than the estimated.<br /><br />But If you stick with Windows XP after April 8 2014, you might be at a great risk as XP will take its last breath officially on that day and will die! This fact poses danger to its users as they will be exposed to all kinds of threats. Almost thirteen years after it was 'first released' i.e. April 8 when the Redmond, Washington-headquartered Corporation will stop support for its longest running and most successful OS, Windows XP.<br /><br />Continue using Windows XP after April 8, it will serve you as a Dead Zombie, because Microsoft will no longer support its own Operating System. So, the bugs and Security vulnerabilities will go forever unpatched. <br /><br />It’s difficult to believe that around 95% of the 420,000 bank’s ATMs in the USA, the country which is known for the world’s largest National Cyber Security Division, also run on Windows XP, but after the deadline if a serious security flaw or vulnerability is found in Windows XP, the banks on their own will defend against the increasingly high-tech cyber criminals.<br /><br />Since there is almost 29% of the desktop market share worldwide running the older version of Windows; So, a malware of epic scale could be fabricated if a suitable zero-day vulnerability was found and it’s beyond your reach that what damage and destruction, cyber criminals might cause with such exploits.<br /><br />As currently 95 percent of banks’ ATMs run XP which is around 2.2 million machines worldwide. So, it’s difficult to upgrade it all to Windows 7 by the April deadline, therefore the banks have arranged or are in the process of arranging extended support for Windows XP from Microsoft.<br /><br />It is estimated that for British banks alone, the cost of extending support for Windows XP would be around £50 to £60 million.<br /><br />"There are certainly large enterprise customers who haven't finished their migrations yet and are purchasing custom support," a spokesman for Microsoft told a Reuters.<br /><br />But, you are strongly advised to upgrade your system or if your friends or family members are still running the older version, help them upgrade to Windows 7/8 as soon as possible.<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-70878832046222107152014-03-22T16:22:00.000+05:302014-03-22T16:22:00.413+05:30SEA gather evidence that Microsoft selling your information to FBI<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhbzf6M9eFSn4c3keWxjg_QbKwwzkXOtS-7M9XX9ZY-B9AQXTJ3Tp11A5xFN8OJru9-MAH0uetQ8IuSRne2Mhrga77ZhFwXfaprRt-yqG-X4a_e6I05HUUNtOSAU6ubZ0iP2R5UCE4zHhs/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgA-xh5zPa_QF1u1So-KWsh5S8WqncSxdexX7c6R28QAKK64S126EDARqXFu8wBfL_PgG_tO4YomIWcJwV06mTV47NhQTrzlBH56d3KcT_iFjjFPf7sy9CRUSwEE0GpsW3eWdujkdIITgg/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
A document recently leaked by Syrian Electronic Army shows that Microsoft is charging FBI secret division to legally view customer information. The documents are said to have been taken from Microsoft.<br /><br />Syrian Electronic Army(SEA) is known for hacking social media accounts and websites of top organizations including Microsoft, CNN, Daily dot and more. <br />
<a name='more'></a><br />SEA allowed the Daily Dot to analyze the documents before they published in full.<br /><br />The document is said to be containing emails and invoices between Microsoft's Global Criminal Compliance team and the FBI's Digital Intercept Technology Unit (DITU).<br /><br />The documents shows that Microsoft charged FBI $145,100 in December 2012, broken down to $100 per request for information. But in 2013, Microsoft allegedly doubled the amount, charged FBI $200 per request for a total of $352,200. For the recent invoice(Nov 2013), they charged $281,000.<br /><br />The information provided to FBI including Live email ID, PUID, name, address, country, IP address, Date of Registration and few other details.<b><br /><br />Here is the screenshot of documents: -</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeb_gGgeMCaBWQn_eq8Ns1pNKiSWHp52Rl6j6Vidg4l3xk7ilecLvtLmxjyS1FHelTzRA39LWALbHVNJS7rXEXH8F8RGRggjzRB2MxoVwuyAMGPbWQYKDspe4mGQ-qoCwLVLpqO29OTMc/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgeb_gGgeMCaBWQn_eq8Ns1pNKiSWHp52Rl6j6Vidg4l3xk7ilecLvtLmxjyS1FHelTzRA39LWALbHVNJS7rXEXH8F8RGRggjzRB2MxoVwuyAMGPbWQYKDspe4mGQ-qoCwLVLpqO29OTMc/s1600/1.png" height="240" width="320" /></a></div>
<br /><br /><div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2TdIaIilrew6KTeP34RSvuaPAl-oX1u7ey8ESB_ZHqPy2GGt-LyyjwmVctm2O02UUZL7sXAQ4IzwgYKdU_BnCzxH4zj2d516wIIY3KDgLmfMkZkM2pdqEwRq0Y5yh2PRx3N6l85-YboQ/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj2TdIaIilrew6KTeP34RSvuaPAl-oX1u7ey8ESB_ZHqPy2GGt-LyyjwmVctm2O02UUZL7sXAQ4IzwgYKdU_BnCzxH4zj2d516wIIY3KDgLmfMkZkM2pdqEwRq0Y5yh2PRx3N6l85-YboQ/s1600/2.png" height="223" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhatNo6Ix8jdzyrFzapOEWSOZKODNg4791-FCbnMPakwdkkb3k99JMEE2t0_92mielO86nk1xRa0niLHv3c4KkHi3pkSC99BcD6So7YQ9ymMoxoZlKfeDoH27DhQsuHO20rmhQkhO-fTkc/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhatNo6Ix8jdzyrFzapOEWSOZKODNg4791-FCbnMPakwdkkb3k99JMEE2t0_92mielO86nk1xRa0niLHv3c4KkHi3pkSC99BcD6So7YQ9ymMoxoZlKfeDoH27DhQsuHO20rmhQkhO-fTkc/s1600/3.png" height="130" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmCO2WXYro5fHMJN8TNzo-oJBiUgAA5weuGfQWC3sUsY8A8STFURD3PQq6eAuWKKkie2y7cjib6JYCO-0K01AQ73dT0b-pb7dfnndP5X1LYtX6s2PERN57yHmWVcxTEy4CQnmF99nJiZQ/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgmCO2WXYro5fHMJN8TNzo-oJBiUgAA5weuGfQWC3sUsY8A8STFURD3PQq6eAuWKKkie2y7cjib6JYCO-0K01AQ73dT0b-pb7dfnndP5X1LYtX6s2PERN57yHmWVcxTEy4CQnmF99nJiZQ/s1600/4.png" height="185" width="320" /></a></div>
source: ehackingnews.com</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-61932393090182215152014-03-22T16:09:00.001+05:302014-03-22T16:09:56.303+05:308 UNKNOWN FACTS ABOUT ANDROID<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI79YFZ4xS1G_bQwdeOYzbKXSJIqAadV3TMQe0B_sTeXwKTHNxhIgSoECnKW0RueTnF2crpH57BrsFAQCto9MuVCesTngPECnUUkdkYpbWeT_m8dRLnNTfi7lQX7FniZRX65TyEWDnQk0/s1600/android.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjI79YFZ4xS1G_bQwdeOYzbKXSJIqAadV3TMQe0B_sTeXwKTHNxhIgSoECnKW0RueTnF2crpH57BrsFAQCto9MuVCesTngPECnUUkdkYpbWeT_m8dRLnNTfi7lQX7FniZRX65TyEWDnQk0/s1600/android.jpeg" /></a></div>
Well today we gonna learn 8 Unknown Facts About Android OS. Yes you heard right “Unknown and Unusual Facts about Android”. One of the most popular, gazing, and stunning (I cannot say elegant) Smart-Phones Operating System. I really don’t need to define it. You’ll really wonder about facts<br /><br />1. Android wasn’t Google’s Idea<br />
<a name='more'></a><br />Android was the brainchild and huge project of Andy Rubin, who founded Android Inc. in October 2003 with the aim of creating a new mobile platform/OS. Google later bought Android Inc. and hired Rubin and others in August 2005. There’s nothing unusual about it, but up till now I always thought Google created and founded Android.<br /><br />2. Android almost didn’t work out<br /><br />Isn’t this shocking ? – Android almost immediately ran out of cash after its founding, only to be saved according to the Businessweek, by Steve Perlman. The beginning was very hard for Android in market and by looking at this situation Google immediately acquired Android.<br /><br />3. Microsoft thought it would be a non-event<br /><br />Microsoft’s Scott Horn, then head of the Windows Mobile marketing team, had told Engadget after Android’s release, “I don’t understand the impact they are going to have.”<br /><br />4. The Nexus was a hot rumour years before the Nexus released<br /><br />People had started predicting about the “gPhone” (Google Phone) as early as 2007 though, Nexus came out in 2010. In reality Nexus was founded from myths and rumors.<br /><br />5. The first official version code name was NOT a Dessert<br /><br />Google’s Dan Morrill confirmed in January that the very first alpha version of Android released to internal developers was R2-D2.<br /><br />6. Every app you run on your Android phone gets its own virtual machine<br /><br />Well, you might don’t believe but it’s true that each active app on an Android device runs in its own Dalvik Virtual Machine (VM) which keeps it safe and separate from core functions. This improves battery life and boosts performance of the phone. But still people keeps complaining about “Android Consumes Much Battery!” Imagine if they’d not created Dalvik VM – then you might had to charge after every hour. That’s very unusual and unknown fact of Android that it still manages to save a lot of battery power.<br /><br />7. There’s an Android phone in Space<br /><br />A British firm launched a Nexus phone on Space, to control a satellite as part of an experiment and see how well consumer-grade electronics stand up to the rigors of space.<br /><br />8. Resolution scaling was introduced in Version 1.6<br /><br />The ability to automatically scale images based on display size appeared in Donut, or Android 1.6, paving the way for the huge range of device form factors on the Android market today.<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-12852135916721556912014-03-12T12:47:00.000+05:302014-03-12T12:47:12.188+05:30Dropped your phone in water? - Here's what to do next......<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-h_EmpuerU3lwuwp-4kVgIiJoDLhHA-njkXY72dmjJRrN2aWXLRjL_tFrQcgefpw_AN7hVhWYB_6wyliJuia7UHVx56yqDF0zK3ZuauoPov8LBMQxtr6tsrOg3iZCAkVRjDexQFKUB8k/s1600/Dropping-Phone-In-Water.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg-h_EmpuerU3lwuwp-4kVgIiJoDLhHA-njkXY72dmjJRrN2aWXLRjL_tFrQcgefpw_AN7hVhWYB_6wyliJuia7UHVx56yqDF0zK3ZuauoPov8LBMQxtr6tsrOg3iZCAkVRjDexQFKUB8k/s1600/Dropping-Phone-In-Water.jpg" height="165" width="320" /></a></div>
<span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">Accidents happen with phones and water but it doesn't always mean that all hope is lost. Below is a brief guide as to what you should do if your phone has been totally immersed in water.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">1. Take the phone out of the water as quickly as possible.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;"><br /></span><br />
<span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">2. Do not attempt to switch it on as this may cause further damage.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">3. Remove the battery as quickly as you can, also remove the memory and sim cards.</span><br />
<a name='more'></a><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">4. If dropped in fresh water dry it off with a towel. If dropped in salt water rinse it thoroughly with fresh water. I know it sounds crazy getting it wet again but salt can cause a lot of internal damage such as corrosion. Again dry with a towel. You may also want to rinse it if you dropped it in a toilet.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">5. Place the phone, battery and it's wet accessories in a plastic container (like a lunch box) and completely cover it with uncooked rice, use plenty of it. Again this sounds crazy but rice has desiccating properties that help draw the water out of the phone. Do not place a lid on the container.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">6. Place the container somewhere very warm and dry for at least 3 days. An airing cupboard is often the ideal place. </span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">7. Do not use a hair dryer directly on the phone to speed up the process. Too much heat can cause even more damage.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">This isn't guaranteed to work but many people have successfully revived their phones and retrieved their data using this method. Generally if the phone has been damaged by prolonged exposure to sweat over several sessions there is nothing that can be done to fix it. Sweat contains salt and salt is corrosive to the delicate circuitry inside a phone.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">Keep in mind that your phone is on borrowed time after you do this. Make it your first priority to retrieve any data that you would like to keep. It may only work for a few minutes, days, weeks, months or it may even last years.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">You should monitor the phone carefully during charging. If it gets very hot the battery may be damaged and should be replaced.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">After any exposure to water you no longer have a warranty as water damage is not covered. Any insurance policies on the phone may also be voided unless you are covered for accidental damage.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">A more efficient alternative to rice is silica gel. You most likely won't have enough of the stuff to hand when the accident happens but it is good to use. </span><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">Thank you to shunt field for this information.</span><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><br style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 0.665em;" /><span style="background-color: white; color: #333333; font-family: NokiaPureText, Helvetica, Arial, sans-serif; font-size: 13px; line-height: 15px;">Good luck!</span></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-55465304427006165792014-03-12T11:20:00.001+05:302014-03-12T11:20:55.736+05:30The Birth and history of C Programming Language<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWCbbRa2U_Qxu3f_uJIT386P2rN8ATJ3ZF1Yn1iwaC8EeDgTu1RvYWwUo4Y6p9gXQRzBKvGgSixan42-NRjCwJgQyBBzeqvIj12q5iq6r41BvFHNnDJjgplQx5TKXPwqFnxCAOTHtg_JQ/s1600/dennis.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjWCbbRa2U_Qxu3f_uJIT386P2rN8ATJ3ZF1Yn1iwaC8EeDgTu1RvYWwUo4Y6p9gXQRzBKvGgSixan42-NRjCwJgQyBBzeqvIj12q5iq6r41BvFHNnDJjgplQx5TKXPwqFnxCAOTHtg_JQ/s1600/dennis.jpeg" /></a></div>
<div style="text-align: justify;">
The C language shook the computer world. Its impact should not be underestimated, because it fundamentally changed the way programming was approached and thought about. The creation of C was a direct result of the need for a structured, efficient, high level language that could replace assembly code when creating systems programs. </div>
<a name='more'></a>As you probably know, when a computer language is designed, trade-offs are often made, such as the following:<br /><br />• Ease-of-use versus power<br />• Safety versus efficiency<br />• Rigidity versus extensibility<br /><br />Prior to C, programmers usually had to choose between languages that optimized one set of traits or the other. For example, although FORTRAN could be used to write fairly efficient programs for scientific applications, it was not very good for systems code. And while BASIC was easy to learn, it wasn't very powerful, and its lack of structure made its usefulness questionable for large programs. Assembly language can be used to produce highly efficient programs, but it is not easy to learn or use effectively. Further, debugging assembly code can be quite difficult.<br /><br />Another compounding problem was that early computer languages such as BASIC, COBOL, and FORTRAN were not designed around structured principles. Instead, they relied upon the GOTO as a primary means of program control. As a result, programs written using these languages tended to produce "spaghetti code"—a mass of tangled jumps and conditional branches that make a program virtually impossible to understand. While languages like Pascal are structured, they were not designed for efficiency, and failed to include certain features necessary to make them applicable to a wide range of programs. (Specifically, given the standard dialects of Pascal available at the time, it was not practical to consider using Pascal for systems-level code.)<br /><br />So, just prior to the invention of C, no one language had reconciled the conflicting attributes that had dogged earlier efforts. Yet the need for such a language was pressing. By the early 1970s, the computer revolution was beginning to take hold, and the demand for software was rapidly out pacing programmers' ability to produce it. A great deal of effort was being expended in academic circles in an attempt to create a better computer language. But, and perhaps most importantly, a secondary force was beginning to be felt. Computer hardware was finally becoming common enough that a critical mass was being reached. No longer were computers kept behind locked doors. For the first time, programmers were gaining virtually unlimited access to their machines. This allowed the<br />freedom to experiment. It also allowed programmers to begin to create their own tools. On the eve of C's creation, the stage was set for a quantum leap forward in computer languages.<br /><br />Invented and first implemented by Dennis Ritchie on a DEC PDP-11 running the UNIX operating system, C was the result of a development process that started with an older language called BCPL, developed by Martin Richards. BCPL influenced a language called B, invented by Ken Thompson, which led to the development of C in the 1970s. For many years, the de facto standard for C was the one supplied with the UNIX operating system and described in The C Programming Language by Brian Kernighan and Dennis Ritchie (Prentice-Hall, 1978). C was formally standardized in December<br />1989, when the American National Standards Institute (ANSI) standard for C was adopted.<br /><br />The creation of C is considered by many to have marked the beginning of the modern age of computer languages. It successfully synthesized the conflicting attributes that had so troubled earlier languages. The result was a powerful, efficient, structured language that was relatively easy to learn. It also included one other, nearly intangible aspect: it was a programmer's language. Prior to the invention of C, computer languages were generally designed either as academic exercises or by bureaucratic committees. C is different. It was designed, implemented, and developed by real, working programmers, reflecting the way that they approached the job of programming. Its features were honed, tested, thought about, and rethought by the people who actually used the language. The<br />result was a language that programmers liked to use. Indeed, C quickly attracted many followers who had a near-religious zeal for it. As such, it found wide and rapid acceptance in the programmer community. In short, C is a language designed by and for programmers. <br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-49735217543483643592014-03-05T18:18:00.002+05:302014-03-05T18:18:54.754+05:30Facebook launches election tracker app for India<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCnWB-iBsAIqrgXaEf0x4Af3_8mJOLvgEyVXFmV_6verDqk9kqztyKPhVNitOs7hf60xIPJnHwZKcOBiRrBnHOMtEF_jsP-82gJ-ZsZH_nv_bP8QoZQO1oxMdj3i6YL9-cy0fsq51OCOQ/s1600/fb.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjCnWB-iBsAIqrgXaEf0x4Af3_8mJOLvgEyVXFmV_6verDqk9kqztyKPhVNitOs7hf60xIPJnHwZKcOBiRrBnHOMtEF_jsP-82gJ-ZsZH_nv_bP8QoZQO1oxMdj3i6YL9-cy0fsq51OCOQ/s1600/fb.jpeg" /></a></div>
<span id="goog_686388034"></span><span id="goog_686388035"></span>Way2Computerworld: In a bid to gear up for the general election, social media network Facebook India has launched a tracker for the upcoming polls. The 'India Election Tracker' is a new dashboard that will track mentions of candidates and parties throughout the election period.</div>
<a name='more'></a><br />
Those who log into the app can see the livestream of candidates for the 2014 elections as well as take a poll about the issues that matter the most to them in the election and compare how much the Facebook community is talking about leading candidates and parties over time.<br />
<br />
Facebook says the app will be beneficial to the over 93 million Indians using Facebook in India. "We focus on making sure people have the power to share and to make the world more open and connected. This opportunity to engage actively and regularly with constituents have led campaign teams and leaders to use the medium, making Facebook a core part of the political infrastructure in the country," says Ankhi Das, director of Public Policy for India and South Asia, Facebook India. </div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-32291365856318298922014-02-26T12:50:00.001+05:302014-02-26T12:50:15.800+05:30Bitcoin- A brief intro......!!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJybxVOERFAQBQLWNvsrTdhslFE6gjMmuG6YT_Bb6w3PzRh4FEHs4cYezYgyIm5tR3kO0YFePKQfRGXhdXazTxQhNAF-Nmhxyhywzv3icuE1KgiIw1v_CsGgQ2i27wGDvodyfPB7johfg/s1600/bit.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJybxVOERFAQBQLWNvsrTdhslFE6gjMmuG6YT_Bb6w3PzRh4FEHs4cYezYgyIm5tR3kO0YFePKQfRGXhdXazTxQhNAF-Nmhxyhywzv3icuE1KgiIw1v_CsGgQ2i27wGDvodyfPB7johfg/s1600/bit.png" height="180" width="320" /></a></div>
<b><i>What is BitCoin?</i></b><br />
<b><i><br /></i></b>Bitcoin is a new currency that was created in 2009 by an unknown person using the alias Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! There are no transaction fees and no need to give your real name. More merchants are beginning to accept them: You can buy webhosting services, pizza or even manicures.<br />
<a name='more'></a><br />
<i><b>Why Bitcoins?</b></i><br /><br />Bitcoins can be used to buy merchandise anonymously. In addition, international payments are easy and cheap because bitcoins are not tied to any country or subject to regulation. Small businesses may like them because there are no credit card fees. Some people just buy bitcoins as an investment, hoping that they’ll go up in value.<br />
<br /><i><b>Acquiring Bitcoins</b></i><br /><br /><i>Buy on an Exchange</i><br />Several marketplaces called “bitcoin exchanges” allow people to buy or sell bitcoins using different currencies. Mt. Gox is the largest bitcoin exchange.<br /><br /><b><i>Transfers</i></b><br />People can send bitcoins to each other using mobile apps or their computers. It’s similar to sending cash digitally.<br /><br /><b><i>Mining</i></b><br />People compete to “mine” bitcoins using computers to solve complex math puzzles. This is how bitcoins are created. Currently, a winner is rewarded with 25 bitcoins roughly every 10 minutes.<br />
<br /><i><b>Owning Bitcoins</b></i><br /><br />Bitcoins are stored in a “digital wallet,” which exists either in the cloud or on a user’s computer. The wallet is a kind of virtual bank account that allows users to send or receive bitcoins, pay for goods or save their money. Unlike bank accounts, bitcoin wallets are not insured by the FDIC.<br /><br /><i>Wallet in cloud:</i> Servers have been hacked. Companies have fled with clients’ Bitcoins.<br /><br /><i>Wallet on computer:</i> You can accidentally delete them. Viruses could destroy them.<br /><br /><b><i>Anonymity</i></b><br /><br />Though each bitcoin transaction is recorded in a public log, names of buyers and sellers are never revealed – only their wallet IDs. While that keeps bitcoin users’ transactions private, it also lets them buy or sell anything without easily tracing it back to them. That’s why it has become the currency of choice for people online buying drugs or other illicit activities.<br />
<br /><b><i>Future in question<br /></i></b>No one knows what will become of bitcoin. It is mostly unregulated, but that could change. Governments are concerned about taxation and their lack of control over the currency.<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-3455265586526138162014-02-26T12:31:00.000+05:302014-02-26T12:31:08.331+05:30Nokia announces Android running Nokia X and Nokia X+<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpDUk4CqgXIbbnl3yx9FtfgCSz310qrrI36S4oBUz5WQEsFeQPHU8pulNNeieTDLCPRFJa0jLULwvgxxOeAvBq8PjbFMt0ydCIKNgHdra3IjcU6FJsohy3RqEtc7If2y-2eVSg4uUHbAc/s1600/nokia.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjpDUk4CqgXIbbnl3yx9FtfgCSz310qrrI36S4oBUz5WQEsFeQPHU8pulNNeieTDLCPRFJa0jLULwvgxxOeAvBq8PjbFMt0ydCIKNgHdra3IjcU6FJsohy3RqEtc7If2y-2eVSg4uUHbAc/s1600/nokia.jpg" height="224" width="320" /></a></div>
<div style="text-align: justify;">
Nokia announced its first Android-app running smartphones - the Nokia X and Nokia X+. The phones pack a 4" LCD display and come with Nokia and Microsoft app preloaded.<br /><br />The Nokia X, X+ and XL are powered by a 1GHz dual-core Qualcomm Snapdragon 8225 chipset with 512MB of RAM and 4GB of internal storage. Happily, it's expandable via the microSD card slot and supports up to 32GB cards.</div>
<a name='more'></a>The Nokia X and X+ feature a 4" 800x480 IPS LCD capacitive touch display making up for a pixel density of 233ppi. However, the Nokia X+ and XL get a bump in RAM to 768MB.<br /><br />At the back of the Nokia X and X+, there's a 3MP fixed focus camera with both phones weighing 129 grams and pack 1500mAh battery. It's good for 10.5 hours of 3G talk time and have a maximum standby time of 17 days. Both phones are also capable of maximum music playback of up to 26 hours, while video playback is rated at 8.4 hours before the battery needs a recharge.<br /><br />The Nokia X features the signature Nokia Glance Screen. A swipe to the right reveals a list of installed apps, and another one gets you to fastlane. You can reorganize the tiles similarly to Windows Phone 8 UI. They are resizable as well and the larger the tiles get, the more information they display.<br /><br />Unsurprisingly, the phone doesn't have the Google Play Services installed, so the Play Store isn't available on the Nokia X or Nokia X+. However, Stephen Elop highlighted that users can take advantage of the Nokia store for Android apps as well as the popular Yandex Store.<br /><br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com0tag:blogger.com,1999:blog-1520510991569163658.post-70360709281595220762014-02-10T01:14:00.004+05:302014-02-10T01:14:40.970+05:30Download 4-2 Cse Ist Mid Online Bits with Keys<div dir="ltr" style="text-align: left;" trbidi="on">
<span style="color: #0b5394;"><a href="https://adf.ly/dLjQi" target="_blank"><i><b>Management Science</b></i></a><br /><br /><a href="https://adf.ly/dLjZ9" target="_blank"><i><b>DataBase Security</b></i></a><br /><br /><a href="https://adf.ly/dLjiX" target="_blank"><i><b>Semantic Web & Social Networks</b></i></a></span></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-15248815529355500542014-02-09T12:19:00.003+05:302014-02-09T12:19:25.131+05:3015 interview questions banned by Google<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSzx1VvmGtd7LjtgjpjWNCsQJyan2mkZJfSKvZdc1aUhZoeOsk11HQCjrdkzSLFZJyEcY7bByqvFGOaIaq1C1_VIUDCpIJhEcl7IyfajRANqNhka8Nzug17XaHtazbcNHmgnkWJchHeBU/s1600/ban.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiSzx1VvmGtd7LjtgjpjWNCsQJyan2mkZJfSKvZdc1aUhZoeOsk11HQCjrdkzSLFZJyEcY7bByqvFGOaIaq1C1_VIUDCpIJhEcl7IyfajRANqNhka8Nzug17XaHtazbcNHmgnkWJchHeBU/s1600/ban.jpeg" height="178" width="320" /></a></div>
Google has been known to be among those companies that have an exhaustive process of interviewing, but this is a class apart. All of us may have often wondered what did the questions we were asked in a job interview had to do with our suitability to the role we were being interviewed for.<br />
<a name='more'></a><br />
But Google has woken up to this HR epidemic and slowly weeded out absurdities being asked, according to a report quoting a former Google recruiter.<br />
<br />
Below are the 15 questions banned by Google:<br />
<br />
Q1. How many golf balls can fit in a school bus?<br />
<br />
Job: Product Manager<br />
<br />
Q2. How much should you charge to wash all the windows in Seattle?<br />
<br />
Job: Product Manager<br />
<br />
Q3. In a country in which people only want boys every family continues to have children until they have a boy. If they have a girl, they have another child. If they have a boy, they stop. What is the proportion of boys to girls in the country?<br />
<br />
Job: Product Manager<br />
<br />
Q4. Design an evacuation plan for San Francisco<br />
<br />
Job: Product Manager<br />
<br />
Q5. Why are manhole covers round?<br />
<br />
Job: Software Engineer<br />
<br />
Q6. How many piano tuners are there in the entire world?<br />
<br />
Job: Product Manager<br />
<br />
Q7. How many times a day does a clock's hands overlap?<br />
<br />
Job: Product Manager<br />
<br />
Q8. Explain the significance of "dead beef"<br />
<br />
Job: Software Engineer<br />
<br />
Q9. A man pushed his car to a hotel and lost his fortune. What happened?<br />
<br />
Job: Software Engineer<br />
<br />
Q10. You need to check that your friend, Bob, has your correct phone number, but you cannot ask him directly. You must write the question on a card which and give it to Eve who will take the card to Bob and return the answer to you. What must you write on the card, besides the question, to ensure Bob can encode the message so that Eve cannot read your phone number?<br />
<br />
Job: Software Engineer<br />
<br />
Q11. You're the captain of a pirate ship and your crew gets to vote on how the gold is divided up. If fewer than half of the pirates agree with you, you die. How do you recommend apportioning the gold in such a way that you get a good share of the booty, but still survive?<br />
<br />
Job: Engineering Manager<br />
<br />
Q12. You have eight balls all of the same size 7 of them weigh the same, and one of them weighs slightly more. How can you find the ball that is heavier by using a balance and only two weighing?<br />
<br />
Job: Product Manager<br />
<br />
Q13. You are given 2 eggs, if you have access to a 100-story building. Eggs can be very hard or very fragile means it may break if dropped from the first floor or may not even break if dropped from 100th floor. Both eggs are identical. You need to figure out the highest floor of a 100-story building an egg can be dropped without breaking. The question is how many drops you need to make. You are allowed to break 2 eggs in the process.<br />
<br />
Job: Product Manager<br />
<br />
Q14. Explain a database in three sentences to your eight-year-old nephew.<br />
<br />
Job: Product Manager<br />
<br />
Q15. You are shrunk to the height of a nickel and your mass is proportionally reduced so as to maintain your original density. You are then thrown into an empty glass blender. The blades will start moving in 60 seconds. What do you do?<br />
<br />
Job: Product Manager</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-11069930352774981132014-02-08T19:25:00.003+05:302014-02-09T19:02:50.218+05:30Download 4-2 Cse Notes<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNV0BDBtlM2yON6krk-w7dsSiJ5C-bvQs_tTH1PZcKcScwni3rHBRQlPhyQmuo-xbXoaHQg4tvK8zZjr20o4OcXHKOm0QshLjL5RZP5Wlish5kwb09Wbjati3aRSU7eF46cjPNTaoVzp4/s1600/images.jpeg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNV0BDBtlM2yON6krk-w7dsSiJ5C-bvQs_tTH1PZcKcScwni3rHBRQlPhyQmuo-xbXoaHQg4tvK8zZjr20o4OcXHKOm0QshLjL5RZP5Wlish5kwb09Wbjati3aRSU7eF46cjPNTaoVzp4/s1600/images.jpeg" /></a></div>
<span style="color: magenta;"><i><b><span style="font-size: large;"><br />Data Base Security</span></b></i></span><br />
<br />
<a href="https://adf.ly/dGDa7" target="_blank">Click here to Download</a><br />
<a name='more'></a><span style="color: magenta;"><i><b><span style="font-size: large;"><br />Management Science</span></b></i></span><br />
<br />
<a href="https://adf.ly/dGDoF" target="_blank">Click here to Download</a><br />
<br />
<br />
<span style="color: magenta;"><span style="font-size: large;"><i><b>Semantic Web & Social Networks</b></i></span></span><br />
<br />
<a href="https://adf.ly/dGEmX" target="_blank">Click here to Download</a><br />
<br />
<br />
Note: To download the notes click on the above links and wait for 5seconds and then click skip to download.......</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-51907944816919451702014-02-02T10:44:00.002+05:302014-02-02T10:48:29.589+05:30Add Facebook Invite Friends Button To Blogger<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQC_ndR85gJOysTr6YzduMlbQ9b98I3GrLiGZhUhau4DYr9G2nSpbWKug77gp4blFXK-U-4IuexUYncJJaScfD7FbXqzGmZwh8FgqMh3nwjFCz4edixkTBzeZeMjuY6CjpzkmbzQYMv9I/s1600/invite_friends_bnr.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjQC_ndR85gJOysTr6YzduMlbQ9b98I3GrLiGZhUhau4DYr9G2nSpbWKug77gp4blFXK-U-4IuexUYncJJaScfD7FbXqzGmZwh8FgqMh3nwjFCz4edixkTBzeZeMjuY6CjpzkmbzQYMv9I/s1600/invite_friends_bnr.gif" /></a></div>
<b><i><br />What is the Invite Friends button?</i></b><br />
<br />
You typically see this sort of button on Facebook Pages only. Page administrators can invite their friends to like their page. Other people who visit the page, and have liked it can also invite their friends. This helps with generating a new audience for your Facebook page, and hence your website or blog.<br />
<a name='more'></a>You can put this button on your blog as well so that people can invite their friends from right there, instead of going to a Facebook page.<br />
<br />
<i><b>Invite Friends</b></i><br />
<br />
When a person clicks on the invite friend button, a new pop-up window opens. This allows them to search and select multiple friends of theirs at once. As per Facebook's limit, 50 people can be selected at a time. Clicking on the Send Requests button will send out requests to people on behalf of the sender to like the particular Facebook page.<br />
<br />
<b><i>How to Add Invite Friends button to Blogger?</i></b><br />
This process involves generating a small Facebook app of your own. Go to the <a href="https://developers.facebook.com/apps/" target="_blank">Facebook Developer Page</a>, and create a new app. In order to be able to access this page, you need to be registered as a developer.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOWXMqbDVECSSY-HdQZ43tFb0wOUhAGSvmiqyZd0xcJDm2QjkFzWN2VX7kmVvIdgJN4zim8sLEmXFUDJA7v0-VLlswTHgbo-yzYREnh7wUpV4AjptWmYsFm5w7dqJpf2TNo1tOAtPEQGw/s1600/1.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjOWXMqbDVECSSY-HdQZ43tFb0wOUhAGSvmiqyZd0xcJDm2QjkFzWN2VX7kmVvIdgJN4zim8sLEmXFUDJA7v0-VLlswTHgbo-yzYREnh7wUpV4AjptWmYsFm5w7dqJpf2TNo1tOAtPEQGw/s1600/1.PNG" height="27" width="320" /></a></div>
<b><i><br />Become a developer</i></b><br />
<br />
If you're not already registered as a developer, simply click on the Register button as shown. After confirmation, you will be taken to the Facebook Developers Page.<br />
<br />
<ul style="text-align: left;">
<li>Click on Apps > Create New<br /><br /><br /><div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBnaL6yBytKwMmpN6qrORBnNiDRdawsnQ9EJItd9fRYFrid-wL3ZDPAgXqCEUEsYTflCCrBhR3geUXrnMi3JEvCe3HbG4FPYORBU84U5uyGUHpk9qqjTKeP45EUt27TFf5ManJDPxjj4A/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiBnaL6yBytKwMmpN6qrORBnNiDRdawsnQ9EJItd9fRYFrid-wL3ZDPAgXqCEUEsYTflCCrBhR3geUXrnMi3JEvCe3HbG4FPYORBU84U5uyGUHpk9qqjTKeP45EUt27TFf5ManJDPxjj4A/s1600/2.png" /></a></div>
</li>
</ul>
<br />
<br />
<br />
<ul style="text-align: left;">
<li>Enter a name and identifier for your app, and then choose a category</li>
<li>Copy your App ID. This will be used later</li>
</ul>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP933gD4HKwDmlb2h3BfEcVdP1jLoZ4xUfISfJCOLkVfwXwYGOAV3QNwdFXqjOv3O8EsWKz_iltRbT0lxpucf9v19IDpqD3TJfVTCnpDHGaMhmmT07PBEtMhUTeGQLJfnnsZzSmr36qfc/s1600/3.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiP933gD4HKwDmlb2h3BfEcVdP1jLoZ4xUfISfJCOLkVfwXwYGOAV3QNwdFXqjOv3O8EsWKz_iltRbT0lxpucf9v19IDpqD3TJfVTCnpDHGaMhmmT07PBEtMhUTeGQLJfnnsZzSmr36qfc/s1600/3.PNG" height="67" width="320" /></a></div>
<br />
Now, take a look at the following code. It is the code for our button, but not quite ready yet. All you have to do is, replace the ID given in this code with your own (given in bold text). You can change the other text in bold as well with your own customized message. And of course, you can customize the CSS styling.<br />
<br />
<span style="background-color: lime;"><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><style></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">.MBT-FB a {</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">font-family: tahoma, verdana, arial, sans-serif !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">font-weight:bold !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">font-size:12px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">width:150px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">border:solid #29447e 1px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">border-bottom:solid #29447e 1px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">cursor:pointer !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">padding:6px 6px 6px 6px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">background-color:#5c75a9 !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">border-top:solid #8a9cc2 1px !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">text-align:center !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">color:#fff !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">text-decoration:none ! important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">}</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">.MBT-FB a:active {</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">background-color:#4f6aa3 !important;</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">}</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"></style></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><script src='http://connect.facebook.net/en_US/all.js'></script></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><script></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">FB.init ({</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">appId:'</span><b style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">412074162260996</b><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">',</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">cookie:true,</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">status:true,</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">xfbml:true</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">});</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">function FacebookInviteFriends () {</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">FB.ui ({</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">method: 'apprequests',</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">message: '</span><b style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">Invite your friends</b><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">'</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">});</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">}</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"></script></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><div id='fb-root'></div></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><span class='MBT-FB'></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><a href='#' onclick='FacebookInviteFriends();'></span><b style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">Invite your friends</b><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"></a></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"></span></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"><script type='text/javascript'></span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">if (top.location != self.location) {</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">top.location = self.location</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span class="Apple-tab-span" style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px; white-space: pre;"> </span><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;">}</span><br style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;" /><span style="color: #555555; font-family: helvetica, arial; font-size: 13px; line-height: 16.380001068115234px;"></script></span></span><br />
<br />
<ul style="text-align: left;">
<li><span style="color: #555555; font-family: helvetica, arial; line-height: 16.380001068115234px;">Now, go to your app page, and then go to settings.<br /><br /><div class="separator" style="clear: both; font-size: small; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNInGSYh9NVthPqlxArMLG6-ksQGrL5N9vtYqhA4Lm-xN4Pme_sCYsRLK-V9L_lFNNGPeGdv88M5vT5QjJpmBqzS_k-KkDk9JvRTJqppwXL1fvbUMrBile0-H7p6vzsHk3B8WZsZe1NXU/s1600/4.PNG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiNInGSYh9NVthPqlxArMLG6-ksQGrL5N9vtYqhA4Lm-xN4Pme_sCYsRLK-V9L_lFNNGPeGdv88M5vT5QjJpmBqzS_k-KkDk9JvRTJqppwXL1fvbUMrBile0-H7p6vzsHk3B8WZsZe1NXU/s1600/4.PNG" /></a></div>
</span></li>
</ul>
<br />
<div>
<div>
Click on Add a new platform and then click on Website. Enter the URL of your site, and then save your changes. This step ensures access to your app from your site URL.</div>
<div>
<br /></div>
<div>
You're now all done! You can add the code given above anywhere on your blog!</div>
<div>
<br /></div>
<div>
Facing problems? Please feel free to ask in the comments section below. Hope this post helped.</div>
</div>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-854345966731396692014-01-21T13:30:00.002+05:302014-01-21T13:30:58.962+05:30How to recover scratched CD’s<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIcKzZxUG_p5b43g-GV3SpR9hU0uIkOgQijdp0zIX3D_QIJ5Cz21JPdYZJcBLIVSe8FoTmeLOAZ64wW0uZ51gGhtMUoNJN53PHKpFAogREPNBHrXZm3nzp_LPeQWNig4qpkniekGlsJJo/s1600/cd.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhIcKzZxUG_p5b43g-GV3SpR9hU0uIkOgQijdp0zIX3D_QIJ5Cz21JPdYZJcBLIVSe8FoTmeLOAZ64wW0uZ51gGhtMUoNJN53PHKpFAogREPNBHrXZm3nzp_LPeQWNig4qpkniekGlsJJo/s1600/cd.jpg" height="213" width="320" /></a></div>
<i><b>Tips to recover scratched CD’s:</b></i><br /><br />1. Spread a cloth on a flat surface and place the CD on it.<br />
<a name='more'></a>2. Then, hold the disc with one hand, use the other to wipe the polish into the affected area with a soft cloth.<br />(Some tries using toothpaste which gives good effects and also use car paint cutting
compound on deeper scratches. It does leave lots of smaller scratches
(as it is a cutting compound after all) but it will remove the worst
scratches in most cases.<br />3. Wait for it to dry and buff using short, brisk strokes along the scratch, not across it.<br />4. A cloth sold to wipe spectacles or camera lenses will work superb.<br />5. When you can no longer see the scratch,, wash the disc with water and let it dry before playing. Interesting isn't it? Try it right now<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-29365418881867134912014-01-18T14:04:00.000+05:302014-01-18T14:04:15.753+05:30How to Play YouTube Playlist in VLC Media Player?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi98B6-Jz4xmd7veueEJNCp2C9NmuO5XMZ7FaBlBRGXlD56YeY4MOW5UKv_DyYgSL6vnl5s-Xz5jhCMATdcuQ7b6_jm74WyeFozQP7geQIC6WJt9xhuh3QDdxT1nj9a9oPCtnnY0znHFJc/s1600/vlc.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi98B6-Jz4xmd7veueEJNCp2C9NmuO5XMZ7FaBlBRGXlD56YeY4MOW5UKv_DyYgSL6vnl5s-Xz5jhCMATdcuQ7b6_jm74WyeFozQP7geQIC6WJt9xhuh3QDdxT1nj9a9oPCtnnY0znHFJc/s1600/vlc.png" height="320" width="314" /></a></div>
Hello Readers, Do you know that VLC Media Player, the world’s favorite video player that supports nearly every video format, can also play YouTube videos on your desktop without requiring the web browser or the Adobe Flash player.<br />
<a name='more'></a>To get started, open the VLC player, press Ctrl+N to open the Network URL dialog and paste any YouTube video URL in the input box.<br /><br /><b><i>The Benefits of Watching YouTube Videos with VLC</i></b>:<br /><br />The streaming videos will play inside VLC Media Player just like any other local video file while offering some additional benefits not available inside the standard YouTube player. For instance:<br /><br />
<ul style="text-align: left;">
<li>You can choose Video -> Always on Top inside VLC and the YouTube video window will stick to the foreground while you work on other tasks.</li>
</ul>
<ul style="text-align: left;">
<li>Press the Loop button in the player controls and the YouTube video will play non-stop in a loop (also possible with Chrome add-ons).</li>
</ul>
<ul style="text-align: left;">
<li>You can change the Playback speed of the YouTube video and make it run slower or faster than the normal speed.</li>
</ul>
<ul style="text-align: left;">
<li>Use the Tools -> Take Snapshot option to capture a screenshot image of any frame or scene in the YouTube video.</li>
</ul>
<ul style="text-align: left;">
<li>Watch the YouTube videos without the ads. I played a couple of movies and music videos inside VLC and none of them carried any pre-roll ads.</li>
</ul>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JQTUR4uGDGBDfJ_UwmTIP0GbfLidjIRqEBvVSnqAvDdw_Sb_L1R20apmuI6XAke3WA7NXLN1-6PS1OzDWWUC0W5CKcbupMQ7eEYpjTBywwGX3o0qJW4uii4sNKM9_1zJolrW0JJZhB0/s1600/YouTube-In-VLC-Media-Player.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<b><i>Play YouTube Playlists inside VLC</i></b>:<br /><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqm6-3Ir0LHdpsTPENF7nu3naiD1yeqcC1Lcxk_v_reKE7X_iYRqWhkQtmuL4Ii2X31sVhjf9dxv5ftESiuPFiNV69amyoFrFOsUlIG84EziYAR1k4FW0l5-LaNVvIAzw9PnObn8IQImo/s1600/youtube-playlist-vlc.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhqm6-3Ir0LHdpsTPENF7nu3naiD1yeqcC1Lcxk_v_reKE7X_iYRqWhkQtmuL4Ii2X31sVhjf9dxv5ftESiuPFiNV69amyoFrFOsUlIG84EziYAR1k4FW0l5-LaNVvIAzw9PnObn8IQImo/s1600/youtube-playlist-vlc.png" height="195" width="320" /></a></div>
<br />You can watch an entire playlist of YouTube videos inside VLC Media Player.<br />Here’s
the trick. Right-click and save this file to your desktop. Now open the
VLC installation folder (%ProgramFiles%\VideoLAN\VLC) and move the .lua
file into the exiting /lua/playlist folder.<br /><br />Restart the VLC
Media Player and choose Media -> Open Network Stream. Now paste the
URL of any public YouTube Playlist here and the enjoy the videos.<br /><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JQTUR4uGDGBDfJ_UwmTIP0GbfLidjIRqEBvVSnqAvDdw_Sb_L1R20apmuI6XAke3WA7NXLN1-6PS1OzDWWUC0W5CKcbupMQ7eEYpjTBywwGX3o0qJW4uii4sNKM9_1zJolrW0JJZhB0/s1600/YouTube-In-VLC-Media-Player.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JQTUR4uGDGBDfJ_UwmTIP0GbfLidjIRqEBvVSnqAvDdw_Sb_L1R20apmuI6XAke3WA7NXLN1-6PS1OzDWWUC0W5CKcbupMQ7eEYpjTBywwGX3o0qJW4uii4sNKM9_1zJolrW0JJZhB0/s1600/YouTube-In-VLC-Media-Player.jpg" height="250" width="320" /></a></div>
<br />In addition to YouTube, VLC Player can also play DailyMotion videos outside the browser. It is supposed to work with Vimeo videos as well but that is currently broken possibly due to a change in the URL structure at Vimeo’s end. <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JQTUR4uGDGBDfJ_UwmTIP0GbfLidjIRqEBvVSnqAvDdw_Sb_L1R20apmuI6XAke3WA7NXLN1-6PS1OzDWWUC0W5CKcbupMQ7eEYpjTBywwGX3o0qJW4uii4sNKM9_1zJolrW0JJZhB0/s1600/YouTube-In-VLC-Media-Player.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh4JQTUR4uGDGBDfJ_UwmTIP0GbfLidjIRqEBvVSnqAvDdw_Sb_L1R20apmuI6XAke3WA7NXLN1-6PS1OzDWWUC0W5CKcbupMQ7eEYpjTBywwGX3o0qJW4uii4sNKM9_1zJolrW0JJZhB0/s1600/YouTube-In-VLC-Media-Player.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br /></a></div>
VLC, by default, only supports single YouTube URLs but it also possible to import an entire YouTube Playlist into VLC and watch all the videos in sequence.</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-40891075876578506152014-01-18T12:21:00.002+05:302014-01-18T12:34:39.136+05:30Linux Basics: How to Compile & Execute C Programs<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCQyjc57RdRqtr5P2X34VpD5p6PZSNwsYaF63Id1v_yXw9s-oHo_xzS_0Dku_SkQuHhOmT2XI4BKX96d0ht_SfZCRS4fSgcSmPS4dpTy7fZsh67jrNSNKArt34VFq8OSA-b9YKhaTjp0Y/s1600/cprog.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhCQyjc57RdRqtr5P2X34VpD5p6PZSNwsYaF63Id1v_yXw9s-oHo_xzS_0Dku_SkQuHhOmT2XI4BKX96d0ht_SfZCRS4fSgcSmPS4dpTy7fZsh67jrNSNKArt34VFq8OSA-b9YKhaTjp0Y/s1600/cprog.jpg" height="180" width="320" /></a></div>
<div style="text-align: justify;">
It's Time to Learn Linux Friends you know what, after April 8, 2014, technical assistance for Windows XP will no longer be available, including automatic updates that help protect your PC.</div>
<a name='more'></a><div style="text-align: justify;">
Microsoft will also stop providing Microsoft Security Essentials for download on Windows XP on this date. If you continue to use Windows XP after support ends, your computer will
still work but it might become more vulnerable to security risks and
viruses.</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Government authorities are aware of the risk of continuing with Windows Xp and many of the 45 Indian banks using XP have shown little intent to
switch completely to Windows 7 or 8.1. "State Bank of India has around
1.35 lacs PCs still running Windows XP and they are looking to upgrade
these. </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
I heard that even the Indian government is also planning to move on to Linux and started training their workers to work on Linux as it is open source and free to use Operating System.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
This article is for those guys who used to write programs under Windows.. and now have entered the Linux territory and want to learn Basics of Linux in programming. You have probably heard a lot about Linux and how you can do some real good programming under Linux. But right now you cant even get the simplest of Hello World programs to compile.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<i><b>Here's how you do it -</b></i></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<b><i>Procedure :</i></b></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
You can type you C program using any of the editors that are available under Linux such as vi or emacs or any other editor. If you're familiar with notepad and you are started using Kali Linux just type "notepad" in the Terminal and write your program and save it as "helloworld.c"</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<i><b>Helloworld Program:</b></i></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
#include<stdio.h></div>
<div style="text-align: justify;">
int main()</div>
<div style="text-align: justify;">
{</div>
<div style="text-align: justify;">
printf("\nHello World");</div>
<div style="text-align: justify;">
return 0;</div>
<div style="text-align: justify;">
}</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Once you have written and saved your C program using any editor return to the prompt. An ls command should display your C program. It should have the .c extension. Now at the prompt type the following</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
$ gcc -o helloworld helloworld.c</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
If your file is named helloworld.c then type '-o helloworld' as the parameter to gcc. This is basically your suggested name for the executable file that gcc would create. In case you typed something like the following</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
$ gcc helloworld.c</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
You would be having a a.out in the same directory as the source C file. This is the default name of the executable that gcc creates. This would create problems when you compile many programs in one directory. So you override this with the -o option followed by the name of the executable</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
$ gcc -o hi hiworld.c</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Would create an executable by the name hi for your source code named hiworld.c</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Running the executable that you created is as simple as typing the following at the prompt.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
$ ./helloworld</div>
<div style="text-align: justify;">
OR</div>
<div style="text-align: justify;">
$ ./hi</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Or whatever you named your executable.</div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
Happy Programming with Linux.............</div>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-61021369718171718452014-01-18T00:20:00.001+05:302014-01-18T00:27:07.388+05:30How to remove last name from facebook account? <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO7tAOxtRv34N7tWe3SAxsH0JSmW55DOZytURNJtqmV11hOh1wqJwOc1ZxTl5-ESfD_jo5RtHgFDASPTQLy6zCyfUaSTwIVPmQ3FZdhm8Co2Cbf74tOs0Pfyo6xOHw55Z3kAmnHeWGre8/s1600/facebook-icon.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgO7tAOxtRv34N7tWe3SAxsH0JSmW55DOZytURNJtqmV11hOh1wqJwOc1ZxTl5-ESfD_jo5RtHgFDASPTQLy6zCyfUaSTwIVPmQ3FZdhm8Co2Cbf74tOs0Pfyo6xOHw55Z3kAmnHeWGre8/s1600/facebook-icon.jpg" height="180" width="320" /></a></div>
Some people want to show only the Single name on their Facebook profiles so here I am with a trick to do this by using Firefox<br />
<br />
Follow the <i><b>steps </b></i>given bellow:<br />
<br />
Login to your facebook account<br />
<a name='more'></a><br />
Open this <a href="https://www.facebook.com/settings?tab=account&section=language&view" target="_blank">Link</a> and change ur language to "Bahasa Indonesia" and hit enter.<br />
<br />
Now in Firefox click on tools-->options<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEURoTsTTHJYqKVB0VkJ8Um15z3iKXF88qq7woZI6PbjuqCRRUoGP6vkj3IW2Ug_OCMBTsyZU0CKMfGOmtB66b9dNzufbZmTNfAXvgBnZj3TYlgxqxpwKPmk9dKNUyHjn6VBBc6B_0RPM/s1600/1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjEURoTsTTHJYqKVB0VkJ8Um15z3iKXF88qq7woZI6PbjuqCRRUoGP6vkj3IW2Ug_OCMBTsyZU0CKMfGOmtB66b9dNzufbZmTNfAXvgBnZj3TYlgxqxpwKPmk9dKNUyHjn6VBBc6B_0RPM/s1600/1.png" height="91" width="320" /></a></div>
<br />
Click on advance tab-->network-->settings <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnTUWjmAET-aZGY5oIIaTLVeI2gVTjyyGSeFGP-SDJngEuPgUMbvjcbU_pi_8yVdMF4big3zNj5pIVaUeXvhf4eGyMzwPpZoSW_L0IbVofUgmhmDocdjN_aGB82fv9H7ryfgLMbhzEICI/s1600/2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjnTUWjmAET-aZGY5oIIaTLVeI2gVTjyyGSeFGP-SDJngEuPgUMbvjcbU_pi_8yVdMF4big3zNj5pIVaUeXvhf4eGyMzwPpZoSW_L0IbVofUgmhmDocdjN_aGB82fv9H7ryfgLMbhzEICI/s1600/2.png" height="320" width="297" /></a></div>
Click on manual proxy configuration-->use this proxy server for all protocols<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwwWrSkJJgOlJEpc9F3CdXSkOt_EwVpqdgFsrcIu-VijOJ58Z0LTGFkGfEc9EGM14jZ_Lt2B-ycDGFs_IshEgos6h3mRUQxF78XszV88e7P4r4cGUlAxGAosuux6LpLVosP0H8vV2Z55g/s1600/3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhwwWrSkJJgOlJEpc9F3CdXSkOt_EwVpqdgFsrcIu-VijOJ58Z0LTGFkGfEc9EGM14jZ_Lt2B-ycDGFs_IshEgos6h3mRUQxF78XszV88e7P4r4cGUlAxGAosuux6LpLVosP0H8vV2Z55g/s1600/3.png" height="320" width="293" /></a></div>
<br />
<a href="http://hidemyass.com/proxy-list" target="_blank">Click Here</a> and select country as "Indonesia" and write "8080" in port tab and then click on update results and Copy a proxy whose speed is looking fast.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3nPgVWrqvB_KORb2WmkS2IZxMyVKQAaGIwwV1ZMpokYC2J1n0_D1eS87Y3L0IxfizUSiDHw1qus47r_l-p89KRpzMZ-DcpGzcGLxWU5qbAZJe_vlaRb-BvQsmxYOB3Dh8KN59oV1hqCc/s1600/4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh3nPgVWrqvB_KORb2WmkS2IZxMyVKQAaGIwwV1ZMpokYC2J1n0_D1eS87Y3L0IxfizUSiDHw1qus47r_l-p89KRpzMZ-DcpGzcGLxWU5qbAZJe_vlaRb-BvQsmxYOB3Dh8KN59oV1hqCc/s1600/4.png" height="230" width="320" /></a></div>
And Paste it in the connection settings HTTP Proxy and write port no. as 8080.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyVDvmrPzgDowSzAETChhznWVa4FO0YOPx2CWRvyFEDr7OjnoNAPHEO3cIXnz_Je-oXhmTiu5toq4O6Yhe75ONrFigYaRfnDAWgzr0bV7qAAreHghAaKzhihDugHP5bHKKeUADp2eLonI/s1600/5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiyVDvmrPzgDowSzAETChhznWVa4FO0YOPx2CWRvyFEDr7OjnoNAPHEO3cIXnz_Je-oXhmTiu5toq4O6Yhe75ONrFigYaRfnDAWgzr0bV7qAAreHghAaKzhihDugHP5bHKKeUADp2eLonI/s1600/5.png" height="320" width="290" /></a></div>
<br />
Now Click OK and GOTO this <a href="https://www.facebook.com/settings?tab=account&section=name&view" target="_blank">Link</a> and delete your last name and save this...<br />
<br />
change your language back to your default language (English UK).<br />
<br />
Now your Profile is Ready with Single Name<br />
<br /></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-45438193708315431552014-01-17T23:51:00.000+05:302014-01-17T23:51:01.711+05:30How to create a Nameless Facebook page?<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf_Wx2Y3NzR8PJD-wHciSNMkbly1FNqmopNRoP_rbcDVvz3mIsHG2Z-pJ9YKdXa63AHw3XCjmbCcvb6rqVKwvkdOSatT2Y4eoeiKWTL5-whXwuS_IoCMnvdY1upXy74YWBMAfekQl9RXU/s1600/facebook.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhf_Wx2Y3NzR8PJD-wHciSNMkbly1FNqmopNRoP_rbcDVvz3mIsHG2Z-pJ9YKdXa63AHw3XCjmbCcvb6rqVKwvkdOSatT2Y4eoeiKWTL5-whXwuS_IoCMnvdY1upXy74YWBMAfekQl9RXU/s1600/facebook.png" height="169" width="320" /></a></div>
Follow the steps to create a nameless page on facebook<br /><br />Steps:<br /><br />Login to Facebook and Create a Page. (from options upper right).<br />
<a name='more'></a>Copy these characters ٌٍٍِّّْ and paste them in the name filed.<br />
<br />
Agree to facebook terms and Get Started<br /><br />Add some basic details and update page info<br /><br />Goto Page Info-->Name-->Select All<br /><br />Now just press Backspace button and your Nameless page is ready </div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-27977089694968477582014-01-15T14:32:00.001+05:302014-01-15T14:32:16.447+05:30TIOBE Programming Community index Jan 2014<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8obZ96Fs_jpAKUVsEqSV6LPAdiJmsn2glehRQSWJSffGxy12vGhULSi9clhnoVMQnUjS7SlNxoSOBSQuupEu-rsA1hkvWI2zsS1hVVW0te8yIaYRkchbDNBlQYZQaZsNhuJfQiXdvP30/s1600/programmin.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg8obZ96Fs_jpAKUVsEqSV6LPAdiJmsn2glehRQSWJSffGxy12vGhULSi9clhnoVMQnUjS7SlNxoSOBSQuupEu-rsA1hkvWI2zsS1hVVW0te8yIaYRkchbDNBlQYZQaZsNhuJfQiXdvP30/s1600/programmin.jpg" height="204" width="320" /></a></div>
The TIOBE Programming Community index is an indicator of the popularity of programming languages. The index is updated once a month. The ratings are based on the number of skilled engineers world-wide, courses and third party vendors. Popular search engines such as Google, Bing, Yahoo!, Wikipedia, Amazon, YouTube and Baidu are used to calculate the ratings. Observe that the TIOBE index is not about the best programming language or the language in which most lines of code have been written.<a name='more'></a>The index can be used to check whether your programming skills are still up to date or to make a strategic decision about what programming language should be adopted when starting to build a new software system.<br /><br /><table class="table table-striped table-top20"><thead>
<tr><th>Jan 2014</th>
<th>Jan 2013</th>
<th>Change</th>
<th>Programming Language</th>
<th>Ratings</th>
<th>Change</th>
</tr>
</thead>
<tbody>
<tr><td>1</td><td>1</td><td><br /></td><td>C</td><td>17.871%</td><td>+0.02%</td></tr>
<tr><td>2</td><td>2</td><td><br /></td><td>Java</td><td>16.499%</td><td>-0.92%</td></tr>
<tr><td>3</td><td>3</td><td><br /></td><td>Objective-C</td><td>11.098%</td><td>+0.82%</td></tr>
<tr><td>4</td><td>4</td><td><br /></td><td>C++</td><td>7.548%</td><td>-1.59%</td></tr>
<tr><td>5</td><td>5</td><td><br /></td><td>C#</td><td>5.855%</td><td>-0.34%</td></tr>
<tr><td>6</td><td>6</td><td><br /></td><td>PHP</td><td>4.627%</td><td>-0.92%</td></tr>
<tr><td>7</td><td>7</td><td><br /></td><td>(Visual) Basic</td><td>2.989%</td><td>-1.76%</td></tr>
<tr><td>8</td><td>8</td><td><br /></td><td>Python</td><td>2.400%</td><td>-1.77%</td></tr>
<tr><td>9</td><td>10</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/up.png" /></td><td>JavaScript</td><td>1.569%</td><td>-0.41%</td></tr>
<tr><td>10</td><td>22</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/upup.png" /></td><td>Transact-SQL</td><td>1.559%</td><td>+0.98%</td></tr>
<tr><td>11</td><td>12</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/up.png" /></td><td>Visual Basic .NET</td><td>1.558%</td><td>+0.52%</td></tr>
<tr><td>12</td><td>11</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/down.png" /></td><td>Ruby</td><td>1.082%</td><td>-0.69%</td></tr>
<tr><td>13</td><td>9</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/downdown.png" /></td><td>Perl</td><td>0.917%</td><td>-1.35%</td></tr>
<tr><td>14</td><td>14</td><td><br /></td><td>Pascal</td><td>0.780%</td><td>-0.15%</td></tr>
<tr><td>15</td><td>17</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/up.png" /></td><td>MATLAB</td><td>0.776%</td><td>+0.14%</td></tr>
<tr><td>16</td><td>45</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/upup.png" /></td><td>F#</td><td>0.720%</td><td>+0.53%</td></tr>
<tr><td>17</td><td>21</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/upup.png" /></td><td>PL/SQL</td><td>0.634%</td><td>+0.05%</td></tr>
<tr><td>18</td><td>35</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/upup.png" /></td><td>D</td><td>0.627%</td><td>+0.33%</td></tr>
<tr><td>19</td><td>13</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/downdown.png" /></td><td>Lisp</td><td>0.604%</td><td>-0.35%</td></tr>
<tr><td>20</td><td>15</td><td><img src="http://www.tiobe.com/content/paperinfo/tpci/images/downdown.png" /></td><td>Delphi/Object Pascal</td><td>0.595%</td><td>-0.32%</td></tr>
</tbody></table>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-75657301365691812692014-01-12T12:46:00.000+05:302014-01-17T12:47:39.665+05:30Hack Facebook Account by Phishing Method<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS6tKv7FI2hnRnO2iI3F3n6R86VHpNT-tJgKyXj6-D3Mi4JlwzjgkrM33If3jbgm2PAepJFf5tB0ZBRMUA7tve4KvRWMQNvsjLNMnTGRD3tGjPQbtTqqvIsVqKqQ3ngY0JY_RcEWsKV4s/s1600/phishing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiS6tKv7FI2hnRnO2iI3F3n6R86VHpNT-tJgKyXj6-D3Mi4JlwzjgkrM33If3jbgm2PAepJFf5tB0ZBRMUA7tve4KvRWMQNvsjLNMnTGRD3tGjPQbtTqqvIsVqKqQ3ngY0JY_RcEWsKV4s/s1600/phishing.jpg" height="240" width="320" /></a></div>
<div style="text-align: justify;">
Facebook is one of the best social networking website. All of you
want to hack your friend's facebook account to know what they are doing.
Even I have posted many advanced methods some of my viewers are asking
for phishing method. So This post is for all of you who were asking me
how to hack a facebook account by phishing method.</div>
<a name='more'></a><div style="text-align: justify;">
<i><b></b></i><br /></div>
<div style="text-align: justify;">
<span style="color: blue;"><i><b><span style="color: black;">What is Phishing?</span></b></i><br /><br /><span style="color: black;">Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.<br /><br />Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.</span></span></div>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"> </span><br /><b><i><span style="color: black;">How to Create A Phishing Page?</span></i></b><br /><span style="color: black;"><b><i>Let me show you a step by step tutorial.<br />Let's Start!<br /><br />Requirements:</i></b><br /><br />1.A Free Webhosting Site -----> http://wink.ws/<br /><br />2.Facebook Phishing Files------> <a href="http://www.4shared.com/folder/C37AiKNZ/FB_Phishing_files.html" target="_blank">Download Here </a><br /><br /><i><b><span style="color: black;">Steps:</span></b></i></span></span></div>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"><i><b><span style="color: black;"></span></b></i></span></span><br /></div>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"><i><b><span style="color: black;"></span></b></i></span></span>
</div>
<ul style="text-align: justify;">
<li>
<span style="color: blue;"><span style="color: black;">Sign up and Log in to Wink.ws</span></span></li>
</ul>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Click on Continue to My Account</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span>
</div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Now Create a New Account </span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span>
</div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Select Hosting Plan as --> Free</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span>
</div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Enter the fields Subdomain, password, captcha. Choose the subdomain which is similar to www.facebook.com for instance, www.fecebook.wink.ws (choose which is available). </span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span>
</div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Click on Create Button. Now your subdomain is created...</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span>
</div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Now click on Switch button from your active subdomain will enter into cpanel.</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">In the FILES section of your control panel, Click on File Manager (not on File manager1 / File manager2),</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">If file manager is not yet installed, Install it in English language. (Reload the page and see file manager is installed)</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Now Open File Manager and delete default.php file</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">Upload 3files which you have downloaded (index.htm, login.php,log.txt )</span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;">After uploading files your URL will look like <span style="color: red;">http://cpanel.wink.ws/files/file-manager <span style="color: black;">just change it to <span style="color: red;">http://cpanel.wink.ws/switcher <span style="color: black;">Continue to My Account.</span></span></span></span></span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><span style="color: red;"><span style="color: black;"></span></span></span></span></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><span style="color: red;"><span style="color: black;">Right Click on your Domain which you have created and open in New Tab</span></span></span></span></span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><span style="color: red;"><span style="color: black;"></span></span></span></span></span></span></div>
<ul style="text-align: justify;">
<li><span style="color: blue;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><span style="color: red;"><span style="color: black;">Wow, Your Phishing Page is Ready to Hack Just send the URL to your Victim as he enters the details you can see in your log.txt file.....</span></span></span></span></span></span></li>
</ul>
<div style="text-align: justify;">
<span style="color: blue;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><span style="color: red;"><span style="color: black;"><b><span style="color: blue;">Note:</span> </b>after some time the phishing page will be detected so no worries we'll create another domain from the same account and will hack</span><span style="color: black;"> the friends ID.<br /><br />Any queries just ask me....<br />Like and share with friends <br />Regards Way2Computerworld..</span></span></span></span></span></span></div>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-67183199379535491972014-01-12T12:07:00.003+05:302014-01-12T12:12:29.682+05:30New Facebook Hack: Cookie Stealing And Session Hijacking <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk8P_d3PceBgoAx7KnSISGJAzAEAwloQqnpRB4Ta7Z_30OY6d7wa6H2mKZi_DIK0MxubVqk_EPMPiD1FEmFgBOD9RwWIlFpK4k_4o6rk6ONtX9pGOlwP7oAgKSFVP_DRCjzeRfO0l1m4k/s1600/fb+hack.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgk8P_d3PceBgoAx7KnSISGJAzAEAwloQqnpRB4Ta7Z_30OY6d7wa6H2mKZi_DIK0MxubVqk_EPMPiD1FEmFgBOD9RwWIlFpK4k_4o6rk6ONtX9pGOlwP7oAgKSFVP_DRCjzeRfO0l1m4k/s1600/fb+hack.jpg" height="189" width="320" /></a></div>
<span style="color: red;"><span style="color: black;"><i><b>What is Session Hijacking?</b></i>Session Hijacking is Stealing the existing active Session. The main purpose of Session Hijacking is to bypass authentication process and gain unauthorized access to the computer or Website. </span></span><br />
<a name='more'></a>In simple words , hackers will login as some other client using their Sessions. TCP session hijacking is when a hacker takes over a TCP session between two machines. Since most authentication only occurs at the start of a TCP session, this allows the hacker to gain access to a machine<br />
<span style="color: lime;"><br /><span style="background-color: white;"><a href="http://way2computerworld.blogspot.in/2014/01/session-hijacking-hackers-way-to-hack.html" target="_blank"><i>More on Session Hijacking:</i></a></span></span><br />
<i><b><br />How To Capture Cookies?<br /></b></i>In this tutorial we're going to use Wireshark to capture cookies.<br />
<i><b><br />What is Wireshark?</b></i><br />
<br />
Wireshark is the best free packet sniffer software available today. Actually, it was developed for making a network secure. But, the same software is now used by hackers to test for vulnerability and security loopholes in the network and to attack the network accordingly. Cookie stealing being one of the types of hacks implemented using this Wireshark software.<br />
<i><b><br />Let's Start!<br /><br />Requirements:</b></i><br />
<br />
<i>Cain and Abel</i> : <span style="color: red;">http://www.oxid.it/cain.html</span><br />
<i>Wireshark</i> : <span style="color: red;">http://www.wireshark.org/</span><br />
<i>Firefox 3</i> (or one compatible with add and edit) : <span style="color: red;">http://www.oldapps.com/firefox.php?old_firefox=59</span><br />
<i>Add n Edit</i> (cookie editor for firefox) : <span style="color: red;">https://addons.mozilla.org/en-US/firefox/addon/add-n-edit-cookies/</span><br />
<span style="color: lime;"><i>Access to the network with user you want to hack</i></span><br />
<span style="color: lime;"><i>Network traffic</i></span><br />
<br />
<b><i>Prerequisites:</i></b><br />
<br />
Download and install all above programs. To add “Add n Edit” to your browser just open firefox, go to tools, then click add-ons. you can drag and drop the program from wherever you saved it into the little box that popped up and install it from there.<br />
<i><b><br />How to capture Facebook and other accounts cookies.</b></i><br />
<br />
Do you know how Wireshark and Cain-Abel can be used to sniff packets and capture cookies. No? Then just follow the steps.<br />
<br />
<i><b>Steps</b></i>:<br />
<span style="color: magenta;"><br /></span><b><i><span style="color: magenta;">First</span>:</i></b> Gain access to the Network. Open networks or your own network would be easy but if you have a specific slave you want you should be able to gain access using Backtrack/Kali Linux.<br />
<br />
Tip: use reaver to exploit WPS for WPA/WPA2 encryptions, WEPs are easy to crack given time and OPN means there is no password.<br />
<br />
<b><span style="color: magenta;"><i>Second:</i></span></b> Right click Cain and choose ‘run as administrator.’ on the top bar go to ‘configure’ and be sure to select your wireless card/adapter. now click where it says ‘Sniffer’ then this little button towards the top left:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi69arySIl-_UhzAOquNeoaK0c6OanlPtkeMg_nvnJ7Qiw3tUkdfr6Bd1B0evW7n9eUCaW7gutyuFhr3D4qYMRnxQOomVgeqFF3J_udBTIdLsieenYLUoNgldjWsaf8efvln90BcbGt1Ns/s1600/1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi69arySIl-_UhzAOquNeoaK0c6OanlPtkeMg_nvnJ7Qiw3tUkdfr6Bd1B0evW7n9eUCaW7gutyuFhr3D4qYMRnxQOomVgeqFF3J_udBTIdLsieenYLUoNgldjWsaf8efvln90BcbGt1Ns/s1600/1.jpg" height="165" width="320" /></a></div>
<br />
Next click any empty white box then the blue “+” symbol near the button you pressed just before. choose okay.<br />
should look like this: <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH76ZwPgePLfXN1-2NK8iClm92sHw_wolgnQnRzENxxiKiUM9yeX9xgoTEOxbQRZq8rf2B6aqs4RddpjqQdVV-fQ39xcjd4S_F5QLvrKOfiIoO0bwEIDnMwg1b2rCd8tC_7MqFdeMBRvI/s1600/2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjH76ZwPgePLfXN1-2NK8iClm92sHw_wolgnQnRzENxxiKiUM9yeX9xgoTEOxbQRZq8rf2B6aqs4RddpjqQdVV-fQ39xcjd4S_F5QLvrKOfiIoO0bwEIDnMwg1b2rCd8tC_7MqFdeMBRvI/s1600/2.jpg" height="164" width="320" /></a></div>
<br />
These are all the devices it was able to detect.<br />
Now we go to APR on the bottom bar. Once again click any empty white box then the blue cross. It’s easiest to just go one by one and choose all possibilities.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEiGS0DQta7WhwRj0UL5v_5wPze6dgdoG71vdvw90nl_HmUEg2OE2SMOeQAExIJKfMQiyqGkjix81KRm-AgQM7hidf8sUniuSmNoAsAlhW0gRPfiNa3nDOzfVvy-1sNxaQ0BK_fiQgx_c/s1600/3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgEiGS0DQta7WhwRj0UL5v_5wPze6dgdoG71vdvw90nl_HmUEg2OE2SMOeQAExIJKfMQiyqGkjix81KRm-AgQM7hidf8sUniuSmNoAsAlhW0gRPfiNa3nDOzfVvy-1sNxaQ0BK_fiQgx_c/s1600/3.jpg" height="162" width="320" /></a></div>
<br />
Now we have to poison them so we choose the little yellow hazard symbol towards the top left. should now look like this: <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4uDoUIvVdK1yB9T2bmkwGGuBRRnAbCcxnGIuzOcARBqHWSPCNdZPeG2jhmvNEKiz70oJqZxeaPonDQHHMRZ25XvK_bKe5hr-Pvu096_CEjWH4s1bk8qi7clbDPzB3BBwFoY0wVtx-3to/s1600/4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi4uDoUIvVdK1yB9T2bmkwGGuBRRnAbCcxnGIuzOcARBqHWSPCNdZPeG2jhmvNEKiz70oJqZxeaPonDQHHMRZ25XvK_bKe5hr-Pvu096_CEjWH4s1bk8qi7clbDPzB3BBwFoY0wVtx-3to/s1600/4.jpg" height="166" width="320" /></a></div>
<br />
we are done here, just minimize Cain for now.<br /><br />
<span style="color: magenta;"><i><b>Third: </b></i></span>Run wireshark as administrator. On the top bar choose ‘Capture’ then ‘Interfaces.’ Here you will have to choose your interface that is connected to the Network we are sniffing from. if you wait a few seconds you might see some traffic being collected as seen in my photo, just choose that interface b/c thats most likely it.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXP08GkePG7ShMfE47Xc2ZY6vCtT0mcWK24FdkT7tycyv7c9q0xpSNc5Ep2tNrNwVwygR0eGhbCobxDxGnMvFmMZyCJKPD_Z0OUCkaDkpmEK-F3tVOiq_vZ-RvmFYsknRd45gQd7qs0zA/s1600/5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjXP08GkePG7ShMfE47Xc2ZY6vCtT0mcWK24FdkT7tycyv7c9q0xpSNc5Ep2tNrNwVwygR0eGhbCobxDxGnMvFmMZyCJKPD_Z0OUCkaDkpmEK-F3tVOiq_vZ-RvmFYsknRd45gQd7qs0zA/s1600/5.jpg" height="190" width="320" /></a></div>
<br />
Wireshark will list and color-code all the traffic it sees for you. To make this simpler we can use the filter to only see the traffic we want, Type “http.cookie” in the filter. (Something to consider is to just filter to “http” and scroll through the entries looking for ones that start with the word “POST” this means that information was submitted to the webpage noted such as a username and a password! so if you see this just look through the details and you should see the info you want, most passwords will be hashed but use this site to decript them:<span style="color: red;">http://www.md5decrypter.co.uk/</span> )<br />
<br />
Here is an image:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLytFQsvSKYaas2Xp5B_i8Yp2SpdbEemaRBIWLbNRFkTfIziWZDMpAssTjCiWR5okmKbfVOkHiYgdvG76_edxCasjqR2QeiY3Aq7PTZVSKAq9RxLQGG8_H-FNyS4Zg-1gjrBSEHobP794/s1600/6.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjLytFQsvSKYaas2Xp5B_i8Yp2SpdbEemaRBIWLbNRFkTfIziWZDMpAssTjCiWR5okmKbfVOkHiYgdvG76_edxCasjqR2QeiY3Aq7PTZVSKAq9RxLQGG8_H-FNyS4Zg-1gjrBSEHobP794/s1600/6.jpg" height="180" width="320" /></a></div>
<br />
You can either look through this information manually or use the search function to find what you want. In my case i want to hijack the session of a user on the forum freerainbowtables.com so i will use the search function (press Ctrl+F, or go to edit -> search) and type in the information i know for sure will be in the entry. if your hijacking someones facebook put ‘facebook’ there. Most of the time to be safe i do not use the first entry i see b/c this will only work if the person is auto logged in, so just go down a few more until you see one you think will work (just use common sense).<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3cWvjvopKBDQ13TBBCCGpBtIaw9lckXLZMgx4mVvTaeum_ZJfXItHq0iNDBMstCMUKIhH4-2VXycrzEl0XtZKGJS8ElTw6IVK2yxYC8gMfqT0VlU8bJ2qjJSUmpFTjBfO5-fM08eNdJs/s1600/7.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj3cWvjvopKBDQ13TBBCCGpBtIaw9lckXLZMgx4mVvTaeum_ZJfXItHq0iNDBMstCMUKIhH4-2VXycrzEl0XtZKGJS8ElTw6IVK2yxYC8gMfqT0VlU8bJ2qjJSUmpFTjBfO5-fM08eNdJs/s1600/7.jpg" height="179" width="320" /></a></div>
<br />
What we need are the cookies. Here are what mine look like and how to get there. With practice you will be able to tell which cookies are used for logins and be able to limit failed attempts. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9y5PdEZEpGjS5KoU-0Xjr1wBVNEq1KWbXypmT78JnwycndstShLddzvLiE6r_J9O2EvSX9HhkhcUFnr1ukGH8LUV_fRQXSNATgZx5SEEQupS5qKTCe5JTepVO0HoQ8fxfz048uQaDplI/s1600/8.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh9y5PdEZEpGjS5KoU-0Xjr1wBVNEq1KWbXypmT78JnwycndstShLddzvLiE6r_J9O2EvSX9HhkhcUFnr1ukGH8LUV_fRQXSNATgZx5SEEQupS5qKTCe5JTepVO0HoQ8fxfz048uQaDplI/s1600/8.jpg" height="166" width="320" /></a></div>
<br />
Copy the cookies as value and save them into a notepad (shown in pic above). I would suggest to seperate everywhere you see a “;” bc this suggests that is the begining of the next entry. The text to the left of the = is the name of the cookie and the text to the right is its value.<br /><br />
<span style="color: magenta;"><i><b>Final:</b></i></span> Open up your firefox browser with Add n Edit enabled. You can get to your add ons by going to tools and they should all be listed in the drop down tab. First go to the website you are hijjacking the session from then open your cookie editor. Should look something like this:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ7K_Iqno0rm28ifPZKL5K3-B9X2TxFwpymke2mDpF2FGqc90Hs2M9cA9A8oVaZj1106GVWmaheK-juhEtv8M8yxj8xxDNO05Ivg0gP0eEN-KU9BKZULsBDzKC44t8vWUvMsSPunz793U/s1600/9.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiJ7K_Iqno0rm28ifPZKL5K3-B9X2TxFwpymke2mDpF2FGqc90Hs2M9cA9A8oVaZj1106GVWmaheK-juhEtv8M8yxj8xxDNO05Ivg0gP0eEN-KU9BKZULsBDzKC44t8vWUvMsSPunz793U/s1600/9.jpg" height="171" width="320" /></a></div>
<br />
The last thing to do is to change your cookies to match the ones you captured. If the cookies given to you by the site expire (like the ones in my picture do) you will have to delete them and add all the ones we captured earlier in. if they do not expire you can just edit them. Bottom line is all the cookies must match the cookies you captures in the earlier steps EXACTLY! Make sure you do not add any extras and that you did not miss anything. Also all fields must be filled in (Path and Domain as well as Name and Value). My path is “/” and my domain is “.freerainbowtables.com”<br />
mine looks like this:<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglXe0E07yT_9LCeNMCWsF30g_cnHvsYuvSw4xtHXkt_vgLt98zCJ8Ctb8B7IWMtAXA6iMwwGUeqybWcp6ZkH47NTNOv_hpS8HlTsFuHn-CYEETKI_GqTaC8Bfa6f8HJXAvf54A1HScrX8/s1600/10.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEglXe0E07yT_9LCeNMCWsF30g_cnHvsYuvSw4xtHXkt_vgLt98zCJ8Ctb8B7IWMtAXA6iMwwGUeqybWcp6ZkH47NTNOv_hpS8HlTsFuHn-CYEETKI_GqTaC8Bfa6f8HJXAvf54A1HScrX8/s1600/10.jpg" height="169" width="320" /></a></div>
You are now done, Just close the cookie editor and reload the webpage. If done correctly with the correct cookies you should be logged in as the user you attacked!<br /><br />
So guys, I hope this Facebook Cookie Stealing And Session Hijacking<br />
will help you to hack facebook as well as different types of account like hotmail yahoo etc by stealing their cookies. If you have any problem in above Facebook Cookie Stealing And Session Hijacking tutorial, please mention it in comments.</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-87853613645526239632014-01-12T11:27:00.002+05:302014-01-12T12:15:04.947+05:30Session Hijacking- A Hackers way to Hack! <div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT_bPi9CmprgB9a56CnpLcc0L1N1ZZ3QqpCWW8pY87dUqipKC1-Vxs6iFCWTAh_yCf0-jh1etfls0rI893gNnDR3_GvyfqYx0bc-lwJDDaXKeX85QqjeYnajqSjol_rxgfqTo45myDK3o/s1600/cookie-stealing.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgT_bPi9CmprgB9a56CnpLcc0L1N1ZZ3QqpCWW8pY87dUqipKC1-Vxs6iFCWTAh_yCf0-jh1etfls0rI893gNnDR3_GvyfqYx0bc-lwJDDaXKeX85QqjeYnajqSjol_rxgfqTo45myDK3o/s1600/cookie-stealing.jpg" height="256" width="320" /></a></div>
<span class="userContent" data-ft="{"tn":"K"}"><i><b>What is Session Hijacking?</b></i><br />
Session Hijacking is Stealing the existing active Session. The main
purpose of Session Hijacking is to bypass authentication process and
gain unauthorized access to the computer or Website. In simple words ,
hackers will login as some other client using their Sessions.</span><br />
<a name='more'></a><span class="userContent" data-ft="{"tn":"K"}">TCP session hijacking is when a hacker takes<span class="text_exposed_show">
over a TCP session between two machines. Since most authentication only
occurs at the start of a TCP session, this allows the hacker to gain
access to a machine<br /> <br /><b><i> Different Session Hijacking methods:</i></b><br /> <br /> Session stealing is achieved by following methods<br /> <br /> <span style="color: magenta;"><i>1. Session fixation:</i></span><br /> <br />
In this method, the Hacker sets a user's session id to known victim.
For example, Hacker will send email to known victim with a link that
contains a particular session id. If the victim followed that link, the
hacker can use that session and gain access.<br /> <br /> <span style="color: magenta;">2. Session SideJacking(session Sniffing):</span><br /> <br />
In this method, the attacker use packet sniffing and steal the
Session cookie. In order to prevent this, some websites use SSL(encrypts
the session). but do not use encryption for the rest of the site once
authenticated. This allows attackers that can read the network traffic
to intercept all the data that is submitted to the server or web pages
viewed by the client.<br /> <br /> Unsecured Hotspots are vulnerable to this type of Session Hijacking.<br /> <br /> <span style="color: magenta;">3. Client-side attacks (XSS, Malicious JavaScript Codes, Trojans, etc):</span><br /> <br />
Hacker can steal the Session by running the Malicious Javascript codes
in client system. Usually hackers attack some websites using XSS and
insert their own Malicious Javascript codes.<br /> <br /> In client point
view it is trusted website, he will visit the website. When victim visit
the link , Malicious Javascript will executed. It will steal the
Session cookies and other confidential data.<br /> <br /> <span style="color: magenta;">4. Physical access:</span><br /> <br />
If the hacker has physical access, it is easy for him to steal the
Session. Usually this will occur in public cafe. In public cafe , one
user login to some websites. A hacker comes after victim and steal the
session cookies.<br /> <br /> <span style="color: magenta;">5. Session Hijacking using Firesheep-Mozilla Add on:</span><br /> Firesheep is Famous Mozilla add on that made Session Hijacking very easy. Using Firesheep , you can steal the Session of Public WIFI users.</span></span></div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-91945335182793132202014-01-11T01:38:00.003+05:302014-01-12T13:13:27.094+05:30Hack the Hacker!<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiT97EIoGHd5b7CAuQKOimZ4dRSEQxWa6tLl-RhxHGE7LKHJZiEV25iDwTABW0J7m3X_nXSkqi_rHP3jOkQ8tqslqQNZ33U1cf796pgbptzmQ76heGFk-MWAr8Pv79qX2jsox-exjkbhE/s1600/hack_the_hacker.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhiT97EIoGHd5b7CAuQKOimZ4dRSEQxWa6tLl-RhxHGE7LKHJZiEV25iDwTABW0J7m3X_nXSkqi_rHP3jOkQ8tqslqQNZ33U1cf796pgbptzmQ76heGFk-MWAr8Pv79qX2jsox-exjkbhE/s1600/hack_the_hacker.jpg" height="240" width="320" /></a></div>
<div style="text-align: justify;">
Hello friends, today i am going to teach you how to see the hackers illegal phish pages password file using Google, where all the passwords of victims are stored. </div>
<a name='more'></a>As we all know 99 % hackers over internet are novice hackers or simply script kiddies. They don't know the concepts and they just follow or use the material available on internet to create Phishers to Hack Facebook, Gmail or simply passwords. Which always result in creating Phisher successfully but not a secure one because none tells the after phisher technique like how to make phishers undetectable, how to protect password files where all hacked passwords are stored etc. As most of us know that Phishing is the easiest method over internet to hack Facebook and Email account passwords, so most novice hackers opt this option to hack victims passwords. In fact some professional hackers uses Phishing technique too but they are bit advanced and prefer tabnabbing over Phishing. As Way2Computerworld concentrates on concepts and digging the root causes. We will learn something better that no body does or tells. What loophole we are digging today?? Any idea?? No ?? So go on.<br />
<br />
<i><b>Where is the Loophole</b></i>?<br />
<br />
<div style="text-align: justify;">
Most of us who are webmasters i.e. people who design websites knows the concept of Google indexing but others might not have that good idea. So let me explain first. How any website results appears in Google search results? You made the website and how does Google knows you website? All search engines uses spider and crawler software's over the web to index the new websites or latest changes in the existing websites in order to give users the best latest results. And indexing of website depends on a file located at root level of all web hosting websites, if its not present Google treats as full index. Most people think that robots.txt file is used to tell Google to index your website but actually robots.txt file used to tell Google that what you want to index from your website and what you don't want. By default, robot file allow full website indexing i.e. all files are indexed even password and database files. Woooo! Here the loophole lies. Most almost all hackers uses free web hosting websites to run the Phish pages and all free web hosting websites have default robot.txt file which means when hacker uploads its phish pages, its indexed by Google. And we all know what we use to extract smart information from Google? Off course its Google Dorks. Now we have to learn how to make our own dorks to extract hackers phish page information.<br />
<br />
Hackers edits Form redirects of any login page and change the request mode from POST to GET in order to retrieve passwords in plain text and then they stores it in simple text and html files. Today we are going to learn how to extract those password files using Google. Well there is not much to learn in it because we have already made the DORK for you, what you have to do is just enter the same in Google and you will have access to all Hackers Phish pages password files containing all the hacked password they hacked till now. <br />
<br />
<i><b>Dork to extract all Hackers Phish Pages Password file :</b></i><br />
</div>
<div style="text-align: justify;">
inurl:"passes" OR inurl:"pass" OR inurl:"passwords" OR inurl:"credentials" -search -download -techsupt -git -games -gz -bypass -exe filetype:txt @yahoo.com OR @gmail OR @hotmail OR @rediff<br />
<br />
Just open the Google search and enter the above dork into it, you will get all Phish page password files. </div>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.comtag:blogger.com,1999:blog-1520510991569163658.post-68301117363037621622014-01-10T02:22:00.002+05:302014-01-10T02:31:37.886+05:30Saved Password Locations<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhYp7Zhx6ZMP3uJPam-5IRdUcKNUeZrDrq8EGQyMTO_kjGmOJZiB5P9-Y62uih9-zlg2JkCT4HDL3xMgIqwOEffOZu4Ooj8-dA-Mvqw1IGacvWzVSQ8A4OcSsUDEDtRcOBPeb13yG3Vj4/s1600/password.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhhYp7Zhx6ZMP3uJPam-5IRdUcKNUeZrDrq8EGQyMTO_kjGmOJZiB5P9-Y62uih9-zlg2JkCT4HDL3xMgIqwOEffOZu4Ooj8-dA-Mvqw1IGacvWzVSQ8A4OcSsUDEDtRcOBPeb13yG3Vj4/s1600/password.jpg" height="196" width="320" /></a></div>
<div style="text-align: justify;">
Hello Guys, Do you know when you press Remember Password Button on your Browser where those passwords are stored? In this Post let us look at which location all the passwords are stored.</div>
<a name='more'></a><span style="color: #3d85c6;"><i><b>Google Chrome:</b></i></span><br />
<br />
Chrome Passwords are stored in a SQLite file the sites name and sites username is in clear text but the password is seeded in a Triple DES algorithm. The file is called Web Data and is stored in the following location<br />
<br />
XP – C:\Documents and Settings\Username\Local Settings\Application Data\Google\Chrome\User Data\Default<br />
<br />
Vista – C:\Users\Username\Appdata\Local\Google\Chrome\User Data\Default<br />
<br />
<span style="color: #0b5394;"><i><b>Firefox:</b></i></span><br />
<br />
The passwords are stored in one of the following
filenames: signons.txt, signons2.txt, and signons3.txt (depends on
Firefox version)<br />
<br />
These password files are located inside the
profile folder of Firefox, in [Windows Profile]\Application
Data\Mozilla\Firefox\Profiles\[Profile Name]<br />
<br />
Also, key3.db, located in the same folder, is used for encryption/decription of the passwords. <br />
<br />
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<br />
<span style="color: #3d85c6;"><i><b><span style="color: #cc0000;">Google Talk:</span></b></i><span style="color: black;">Google
Talk passwords are encoded/decoded using Crypto API. Encrypted Gmail
passwords are stored by Google Talk in the registry under
HKEY_CURRENT_USER\Software\Google\Google<br /><br />Talk\Accounts\[Account Name]</span></span></div>
<div style="text-align: justify;">
</div>
<div style="text-align: justify;">
<span style="color: #3d85c6;"><i><b><span style="color: #0b5394;"><i><b>Opera:</b></i></span></b></i><span style="color: black;"><span style="background-color: white;">The passwords are stored in wand.dat filename, located under [Windows Profile]\Application Data\Opera\Opera\profile</span></span></span></div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
<span style="color: #3d85c6;"><i><b>Trillian:</b></i></span><br />
<br />
Note- I have just realised the new version of trillian the passwords made be stored/encrypted differently<br />
<br />
Trillian Passwords are stored in .ini files the first character of the password is encrypted with XOR with the key 243 then the password is converted into hex. The file is based on what the password is for so if it was icq it would be icq.ini (for new versions I think they are all stored in a file called accounts.ini or something similar if you open it up with notepad you will see all the data + the encrypted password). </div>
<div style="text-align: justify;">
<br /></div>
<div style="text-align: justify;">
The files are stored in the following location:<br />
</div>
<div style="text-align: justify;">
XP (old version) – C:\Program Files\Trillian\users\<br />
<br />
XP (new version) – C:\Documents and Settings\Username\Local Settings\Application Data\Trillian\user\global – I am not sure on exact but it is somewhere their<br />
<br />
Vista (old version)- C:\Program Files\Trillian\users\<br />
<br />
Vista (new version)- C:\Users\Username\Appdata\Roaming\Trillian\user\gl obal<br />
<br />
<span style="color: #3d85c6;"><b><i>MSN /Windows Live Messenger:</i></b></span><br />
<br />
MSN Messenger version 7.x: The passwords are stored under HKEY_CURRENT_USER\Software\Microsoft\IdentityCRL\C reds\[Account Name]<br />
<br />
Windows Live Messenger version 8.x/9.x: The passwords are stored in the Credentials file, with entry name begins with “WindowsLive:name=”. They a set of Win API functions (Credential API’s) to store its’ security data (Credentials). These functions store user information, such as names and passwords for the accounts (Windows Live ID credentials). Windows Live ID Credential records are controlled by the operating system for each user and for each session. They are attached to the “target name” and “type”. If you are familiar with SQL you can think of target name and type as the primary key. Table below lists most frequently used fields in Windows Live ID Credential records.<br />
<br />
<span style="color: #6aa84f;"><i><b>Paltalk:</b></i></span><br />
<br />
Paltalk Passwords are using the same password encryption algorithm. Paltalk passwords are stored in the registry. To encrypt the new password Paltalk looks at the serial number of the disk C:\ and performs a mix with the Nickname. The resulting string is then mixed again with the password and some other constants. The final string is then encoded and written to the registry.<br />
<br />
AIM, ICQ and Yahoo Messenger passwords that are stored by Paltalk are encoded by BASE64 algorithm.<br />
<br />
The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\Paltalk\[Account Name]<br />
<br />
<b><i><span style="color: #3d85c6;">Yahoo Messenger 6.x:</span></i></b><br />
The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager<br />
<br />
(”EOptions string” value)<br />
<br />
<span style="color: #0b5394;"><b><i>Yahoo Messenger 7.5 or later:</i></b></span><br />
<br />
The password is stored in the Registry, under HKEY_CURRENT_USER\Software\Yahoo\Pager – “ETS” value.<br />
<br />
The value stored in “ETS” value cannot be recovered back to the original password.<br />
</div>
<div style="text-align: justify;">
<span style="color: #0b5394;"><i><b>AIM:</b></i></span><br />
<br />
AIM uses Blowfish and base64 algorithms to encrypt the AIM passwords.<br />
<br />
448-bit keyword is used to encrypt the password with Blowfish. The encrypted string is then encoded using base64. The passwords are stored in the Registry, under HKEY_CURRENT_USER\Software\America Online\AIM6\Passwords<br />
Filezilla:<br />
<br />
Passwords are stored in a .xml file located in Filezilla on appdata their is sources for this<br />
<br />
<span style="color: #0b5394;"><b><i>Internet Explorer 4.00 – 6.00:</i></b></span><br />
<br />
The passwords are stored in a secret location in the Registry known as the “Protected Storage”.<br />
<br />
The base key of the Protected Storage is located under the following key:<br />
<br />
“HKEY_CURRENT_USER\Software\Microsoft\Protected Storage System Provider”.<br />
<br />
You can browse the above key in the Registry Editor (RegEdit), but you won’t be able to watch the passwords, because they are encrypted.<br />
<br />
Also, this key cannot easily moved from one computer to another, like you do with regular Registry keys.<br />
<br />
<span style="color: #3d85c6;"><i><b> Internet Explorer 7.00 – 8.00:</b></i></span><br />
<br />
The new versions of Internet Explorer stores the passwords in 2 different locations.<br />
<br />
AutoComplete passwords are stored in the Registry under HKEY_CURRENT_USER\Software\Microsoft\Internet Explorer\IntelliForms\Storage2.<br />
<br />
HTTP Authentication passwords are stored in the Credentials file under Documents and Settings\Application Data\Microsoft\Credentials , together with login passwords of LAN computers and other passwords.<br />
<br />
<span style="color: #3d85c6;"><b><i>Outlook Express (All Versions):</i></b></span><br />
<br />
The POP3/SMTP/IMAP passwords Outlook Express are also stored in the Protected Storage, like the passwords of old versions of Internet Explorer.<br />
<br />
<span style="color: #45818e;"><b><i>Outlook 98/2000:</i></b></span><br />
<br />
Old versions of Outlook stored the POP3/SMTP/IMAP passwords in the Protected Storage, like the passwords of old versions of Internet Explorer.<br />
<br />
<i><b><span style="color: #45818e;">Outlook 2002-2008:</span></b></i><br />
<br />
All new versions of Outlook store the passwords in the same Registry key of the account settings.<br />
<br />
The accounts are stored in the Registry under HKEY_CURRENT_USER\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\[Profile Name]\9375CFF0413111d3B88A00104B2A6676\[Account Index]<br />
<br />
If you use Outlook to connect an account on Exchange server, the password is stored in the Credentials file, together with login passwords of LAN computers.<br />
<br />
<span style="color: orange;"><b><i>ThunderBird:</i></b></span><br />
<br />
The password file is located under [Windows Profile]\Application Data\Thunderbird\Profiles\[Profile Name]<br />
<br />
You should search a filename with .s extension.<br />
<br />
<span style="color: lime;"><i><b>Digsby</b></i>:</span><br />
<br />
The main password of Digsby is stored in [Windows Profile]\Application Data\Digsby\digsby.dat<br />
<br />
All other passwords are stored in Digsby servers.</div>
</div>
Anonymoushttp://www.blogger.com/profile/11230628744018618476noreply@blogger.com